PERMISSION-BASED UPDATING OF CONTACT INFORMATION
First Claim
Patent Images
1. A method for updating a database of personal contact information on an end-user electronic communications device, comprising:
- providing at least a first end-user electronic communications device and a second end-user electronic communications device, with each end-user device being capable of coupling to a communications network,wherein said first and/or said second end-user electronic communications device stores, in a contact database, at least one contact data element pertaining to said second user or said first user respectively;
providing a manager server having programmed instructions for controlling a server database, said server database comprising a plurality of contact data elements,wherein one or more of said plurality of contact data elements comprises a preferred permission protocol selected via said first and/or second user;
receiving a request, from said program operative on said first user and/or second end-user electronic communications device, for one or more of said plurality of contact data elements stored on said server database, said one or more of said plurality of contact data elements being identified by said at least one contact data element of said first and/or second user;
systematically applying, by said manager server, said preferred permission protocol of requested said one or more of said plurality of contact data elements,wherein if said preferred permission protocol allows, systematically supplying, by said server manager, a requested contact data element to said program operative on said first and/or second end-user electronic communications device, and, wherein if said preferred permission protocol does not allow supplying of said requested contact data element, said first or second user generating and sending a permission request for said requested contact data element.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for automatically updating personal consumer and business contact information is disclosed. A server located “in the cloud” automatically controls a database of contact data elements, some of which have preferred privacy protocol. These protocols may restrict some data elements from being shared unless a data-owner'"'"'s explicit permission is obtained. When the server receives a request for such a restricted data element, the server issues an email or text message in order to obtain the necessary permissions. If permission is granted, the server then supplies the requested data.
4 Citations
17 Claims
-
1. A method for updating a database of personal contact information on an end-user electronic communications device, comprising:
-
providing at least a first end-user electronic communications device and a second end-user electronic communications device, with each end-user device being capable of coupling to a communications network, wherein said first and/or said second end-user electronic communications device stores, in a contact database, at least one contact data element pertaining to said second user or said first user respectively; providing a manager server having programmed instructions for controlling a server database, said server database comprising a plurality of contact data elements, wherein one or more of said plurality of contact data elements comprises a preferred permission protocol selected via said first and/or second user; receiving a request, from said program operative on said first user and/or second end-user electronic communications device, for one or more of said plurality of contact data elements stored on said server database, said one or more of said plurality of contact data elements being identified by said at least one contact data element of said first and/or second user; systematically applying, by said manager server, said preferred permission protocol of requested said one or more of said plurality of contact data elements, wherein if said preferred permission protocol allows, systematically supplying, by said server manager, a requested contact data element to said program operative on said first and/or second end-user electronic communications device, and, wherein if said preferred permission protocol does not allow supplying of said requested contact data element, said first or second user generating and sending a permission request for said requested contact data element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for systematically updating a database of personal contact information on an end-user electronic communications device, comprising:
-
providing at least a first and a second end-user electronic communications device, with each end-user device being capable of coupling to a communications network, wherein said first and/or said second end-user electronic communications device stores, in a contact database, at least one contact data element pertaining to said second user or said first user respectively; providing a manager server having programmed instructions for systematically controlling a server database, said server database comprising a plurality of contact data elements, wherein one or more of said plurality of contact data elements comprises a preferred permission protocol selected via a user, and wherein said server database is capable of querying at least one third party database, wherein said at least one third party database comprises at least one B2C contact information database and at least one B2B contact information database; said user receiving a request, from said program operative on said end-user electronic communications device, for one or more of said plurality of contact data elements stored on said server database; systematically applying, by said manager server, said preferred permission protocol of requested said one or more of said plurality of contact data elements, wherein if said preferred permission protocol allows, systematically supplying, by said server manager, a requested contact data element to said program operative on said end-user electronic communications device, and, wherein if said preferred permission protocol does not allow a supplying of said requested contact data element, said server manager generating and sending a permission request for said requested contact data element to said user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification