System and method for providing a secure contact management system
First Claim
1. A method of managing personal information, comprising:
- depositing personal contact data into a secure contact management system (CMS);
identifying at least one entity to the secure CMS to enable access to the personal contact data by the at least one entity;
specifying indicia to control access to the personal contact data; and
accessing the personal contact data by the at least one entity based on the indicia for allowing authorized access to the personal contact data.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a Contact Management System (CMS) so that individual owners of personal contact data may control and manage the access and dissemination of the personal data. The owner of personal contact data may securely register the data with secured information vault of the CMS and specify which other parties may have access to the personal data. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party'"'"'s device, such as a telephone or a PDA may access the CMS database and under public key infrastructure (PKI) controls identify themselves so that access to the owner'"'"'s personal data may be verified. Once verified, the telephone number or other data may be returned to the device where a call may be automatically placed or otherwise used.
-
Citations
20 Claims
-
1. A method of managing personal information, comprising:
-
depositing personal contact data into a secure contact management system (CMS);
identifying at least one entity to the secure CMS to enable access to the personal contact data by the at least one entity;
specifying indicia to control access to the personal contact data; and
accessing the personal contact data by the at least one entity based on the indicia for allowing authorized access to the personal contact data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of providing information to a second party, comprising:
-
creating an account by an owner in a secure vault;
depositing contact information in the account;
establishing a relationship between the contact information and a user of the contact information in the secured vault defined by indicia provided by the owner; and
accessing the contact information based on the indicia to allow controlled access to the contact information by the user other than the owner. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A secure contact management system, comprising:
-
a data storage medium which securely contains contact information;
a registration system which registers a plurality of users;
a contact information storage system which securely stores the contact information of a first user of the plurality of users; and
a contact information accessing system which accesses the contact information by a second user of the plurality of users, wherein the accessing is controlled based upon indicia specified by the first user. - View Dependent Claims (18, 19)
-
-
20. A computer program product comprising a computer usable medium having readable program code embodied in the medium, the computer program product includes at least one component to:
-
deposit personal contact data by an owner into a secure contact management system (CMS);
identify at least one entity to the secure CMS to enable access to the personal contact data by the at least one entity;
specify indicia to control access to the personal contact data; and
access the personal contact data by the at least one entity based on the indicia allowing authorized access to the personal contact data.
-
Specification