System and method for providing a proxied contact management system
First Claim
1. :
- A method of managing communications, comprising;
depositing personal contact data of a first party into a secured proxied contact management system (PCMS);
identifying at least one entity to the secure PCMS to enable proxied communications by the at least one entity to the first party;
specifying indicia to control access to the personal contact data; and
establishing or denying the proxied communications to the first party from the at least one entity based on the indicia.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a Proxied Contact Management System (PCMS) so that individual owners of personal contact data may control and manage the access and dissemination of their personal data and also control who may contact them. The owner of personal contact data may securely register the data with a secured information vault of the PCMS and specify which other parties may contact them. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party'"'"'s device, such as a telephone or a PDA may request that the PCMS, under public key infrastructure (PKI) control, establish a connection with the first party. Once verified, the PCMS may establish a proxy connection between the first and second parties according to the permitted mode of communication defined by criteria established by the first party and managed by the PCMS. In this way, personal contact information, such as a telephone number, is kept secure and private and not provided to the second party.
41 Citations
29 Claims
-
1. :
- A method of managing communications, comprising;
depositing personal contact data of a first party into a secured proxied contact management system (PCMS);
identifying at least one entity to the secure PCMS to enable proxied communications by the at least one entity to the first party;
specifying indicia to control access to the personal contact data; and
establishing or denying the proxied communications to the first party from the at least one entity based on the indicia. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
- A method of managing communications, comprising;
-
16. :
- A method of providing communications, comprising;
requesting a connection to a first party by a second party at a PCMS by submitting a public key to identify the first party;
validating whether the second party is permitted to contact the first party by using the public key to locate indicia associated with the first party; and
if permitted, establishing communications between the first party and the second party while preventing the second party from receiving any information regarding contact information of the first party. - View Dependent Claims (17, 18, 19, 20)
- A method of providing communications, comprising;
-
21. :
- A proxied contact management system (PCMS), comprising;
a data storage medium which securely contains personal contact information;
a contact information storage system which securely stores the personal contact information of a first user of a plurality of users; and
a contact information accessing system which accesses the contact information when a request is made by a second user of the plurality of users, wherein the accessing is controlled based upon an identification of the first user; and
a connection control system which establishes, maintains and releases a connection between the first user of a plurality of users and the second user of the plurality of users based upon indicia associated with the first user. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
- A proxied contact management system (PCMS), comprising;
-
29. A computer program product comprising a computer usable medium having readable program code embodied in the medium, the computer program product includes at least one component to:
-
deposit personal contact data of a first party into a secured proxied contact management system (PCMS);
identify at least one entity to the secure PCMS to enable proxied communications by the at least one entity to the first party;
specify indicia to control access to the personal contact data; and
establish or deny the proxied communications to the first party from the at least one entity based on the indicia.
-
Specification