Systems and methods for managing contact information
First Claim
Patent Images
1. Method for secure management of contact information via a network, comprising:
- attaching contact information to an e-mail having a recipient'"'"'s e-mail address,associating a transaction ID with the contact information,associating a first hash of the recipient'"'"'s e-mail address with the transaction ID,transmitting the e-mail with the transaction ID to the recipient via the network,receiving from the recipient a message including the transaction ID and producing a second hash of the recipient'"'"'s e-mail address, and if the second hash of the recipient'"'"'s e-mail address and the transaction ID match the first hash of the recipient'"'"'s e-mail address and the transaction ID, forwarding the contact information to the recipient.
2 Assignments
0 Petitions
Accused Products
Abstract
A service provider maintains a database with subscribers'"'"' updated contact information, such as address book entries and other personal and business information. When a user'"'"'s information changes, subscribers on a recipient list are automatically updated without any user intervention. The subscribers'"'"' anonymity is assured by correlating contact information in the provider'"'"'s database with encrypted subscriber ID'"'"'s, such as hashed e-mail addresses.
-
Citations
17 Claims
-
1. Method for secure management of contact information via a network, comprising:
-
attaching contact information to an e-mail having a recipient'"'"'s e-mail address, associating a transaction ID with the contact information, associating a first hash of the recipient'"'"'s e-mail address with the transaction ID, transmitting the e-mail with the transaction ID to the recipient via the network, receiving from the recipient a message including the transaction ID and producing a second hash of the recipient'"'"'s e-mail address, and if the second hash of the recipient'"'"'s e-mail address and the transaction ID match the first hash of the recipient'"'"'s e-mail address and the transaction ID, forwarding the contact information to the recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. Method for secure management of contact information over a network, comprising:
-
associating a transaction ID with the contact information, computing a hash of an e-mail address of an intended recipient of the contact information, associating the hashed e-mail address with the transaction ID and when the intended recipient requests the contact information, computing a second hash of the recipient'"'"'s e-mail address associated with the request, matching the second hashed recipient'"'"'s e-mail address with the first hashed e-mail address for the transaction ID, and if the first and second hashed e-mail addresses agree, transmitting the contact information to the recipient.
-
-
16. A system for disseminating contact information via a network, comprising:
-
a server connected to the network and storing the contact information, a sender'"'"'s computer connected to the network and transmitting via the network to a recipient'"'"'s e-mail address an e-mail that includes an identifier associated with the sender'"'"'s contact information, a recipient'"'"'s computer connected to the network and receiving the e-mail with the identifier, the recipient'"'"'s computer accessing the server via the network and retrieving from the server the contact information by providing the server with the identifier and wherein the server stores an association between the contact information and the recipient'"'"'s e-mail address based on an encrypted value of the recipient e-mail address and the identifier is a transaction ID of the contact information. - View Dependent Claims (17)
-
Specification