ACCESS TO USER INFORMATION
First Claim
1. A method, comprising:
- storing user information associated with a first user, the user information including at least two of location information, presence information, address book information or calendar information;
storing access control information, the access control information identifying criteria for allowing parties to access the user information;
receiving, from a first party, a request for access to at least a first portion of the user information;
determining, based on the access control information, whether the first party is authorized to access the first portion of the user information; and
providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information.
-
Citations
20 Claims
-
1. A method, comprising:
-
storing user information associated with a first user, the user information including at least two of location information, presence information, address book information or calendar information; storing access control information, the access control information identifying criteria for allowing parties to access the user information; receiving, from a first party, a request for access to at least a first portion of the user information; determining, based on the access control information, whether the first party is authorized to access the first portion of the user information; and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A device, comprising:
-
a communication interface configured to receive communications from other devices; a memory configured to store information associated with a plurality of users, the information including at least two of location information, presence information, address book information or calendar information; and logic configured to; receive requests, via the communication interface, for information stored in the memory, and control access to the information stored in the memory based on user-defined criteria. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer-readable medium having stored thereon sequences of instructions which, when executed by at least one processor, cause the at least one processor to:
-
provide a graphical user interface (GUI) configured to allow users to input user-defined access control information associated with accessing at least two of location information, presence information, address book information or calendar information; receive, from a first party, a request for access to at least a first portion of information associated with a first user; determine, based on user-defined access control information input by the first user, whether the first party is authorized to access the first portion of information; and provide access to the first portion of information, when it is determined that the first party is authorized to access the first portion of the user information. - View Dependent Claims (20)
-
Specification