SYSTEM AND METHOD FOR MANAGING ELECTRONIC COMMUNICATIONS
First Claim
1. A method for providing electronic communications management capability for managing a unique identity owned by an identity owner, wherein the unique identity is accessible through an associated reference, the method comprising:
- providing identity access tools in the form of a permission control for allowing the identity owner to select a set of authorized identities that have rights to communicate with the identity owner; and
providing device selection tools in the form of a preference control for allowing the identity owner to select at least one electronic device for reception of communications.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system are provided for allowing a user to efficiently manage communications. A system for allowing a user having a unique identity is provided, wherein the unique identity is associated with a plurality of electronic devices. The system includes a service for assigning a reference to a user'"'"'s unique identity, wherein other identities can access the user'"'"'s unique identity only by using the reference. The system additionally includes permission controls for allowing the user to control access to the unique identity by restricting authorization to a selected set of other identities. Groups of individuals may receive different levels of authorization such that some individuals may be authorized to make live contact and others may be required to leave a message. Preference controls allow the system user to select at least one associated device from a plurality of associated devices for receiving communication upon an access attempt by an authorized user. The preference controls also allow a system user to select a preferred mode of receiving communication such as audio, video or text modes.
-
Citations
20 Claims
-
1. A method for providing electronic communications management capability for managing a unique identity owned by an identity owner, wherein the unique identity is accessible through an associated reference, the method comprising:
-
providing identity access tools in the form of a permission control for allowing the identity owner to select a set of authorized identities that have rights to communicate with the identity owner; and providing device selection tools in the form of a preference control for allowing the identity owner to select at least one electronic device for reception of communications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more computer storage media having computer-executable instructions embodied thereon, that when executed by a computing system having a processor and memory, cause the computing system to perform a method for facilitating electronic communications management by a system user, the method comprising:
-
permitting access to a unique identity belonging to the system user through a unique reference, wherein the unique identity comprises a plurality of components; allowing the system user to alter any one of the identity components without altering the reference; providing the system user with tools for regulating access to the identity components such that selected known identities have access to selected identity components; and allowing the system user to select, utilizing a preference control, a particular communications delivery method for receiving communications from each of the selected known identities using at least one selected device associated with the unique identity. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system utilizing a processor and memory for allowing a user having a unique identity to manage communications, wherein the unique identity is associated with a plurality of electronic devices, the system comprising:
-
a service utilizing the processor and memory for assigning a reference to a user'"'"'s unique identity, wherein other identities can access the user'"'"'s unique identity only by using the reference; permission controls that utilize the processor and memory for allowing the user to control access to the unique identity by restricting authorization to a selected set of other identities; and preference controls that utilize the processor and memory for allowing the user to select at least one associated device from a plurality of associated devices for receiving communication upon an access attempt by an authorized user. - View Dependent Claims (17, 18, 19, 20)
-
Specification