System and method for providing a secure contact management system
First Claim
1. A method of managing personal information, comprising:
- depositing personal contact data into a secure contact management system (CMS);
identifying at least one entity to the secure CMS to enable access to the personal contact data by the at least one entity;
specifying indicia to control access to the personal contact data; and
allowing access of the personal contact data by the at least one entity based on the indicia for allowing authorized access to the personal contact data,wherein the personal contact data is encrypted and associated with an owner'"'"'s public key,the access by the at least one entity is accomplished using a device being at least any one of a telephone device, a personal digital assistant device (PDA) and a computer, andthe device avoids storing any of the personal contact data in persistent memory.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a Contact Management System (CMS) so that individual owners of personal contact data may control and manage the access and dissemination of the personal data. The owner of personal contact data may securely register the data with secured information vault of the CMS and specify which other parties may have access to the personal data. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party'"'"'s device, such as a telephone or a PDA may access the CMS database and under public key infrastructure (PKI) controls identify themselves so that access to the owner'"'"'s personal data may be verified. Once verified, the telephone number or other data may be returned to the device where a call may be automatically placed or otherwise used.
16 Citations
20 Claims
-
1. A method of managing personal information, comprising:
-
depositing personal contact data into a secure contact management system (CMS); identifying at least one entity to the secure CMS to enable access to the personal contact data by the at least one entity; specifying indicia to control access to the personal contact data; and allowing access of the personal contact data by the at least one entity based on the indicia for allowing authorized access to the personal contact data, wherein the personal contact data is encrypted and associated with an owner'"'"'s public key, the access by the at least one entity is accomplished using a device being at least any one of a telephone device, a personal digital assistant device (PDA) and a computer, and the device avoids storing any of the personal contact data in persistent memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of providing information to a second party, comprising:
-
creating an account of an owner in a secure vault; receiving deposited contact information in the account; establishing a relationship between the contact information and a user of the contact information in the secured vault defined by indicia provided by the owner; and allowing access to the contact information based on the indicia to allow controlled access to the contact information by the user other than the owner, wherein the contact information is encrypted using a public key of the vault, and the allowing access includes returning the contact information to a user'"'"'s device for use without storing the contact information in persistent memory in the user'"'"'s device. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A secure contact management system, comprising:
-
a data storage medium which securely contains contact information; a registration system which registers a plurality of users; a contact information storage system which securely stores the contact information of a first user of the plurality of users; and a contact information accessing system which accesses the contact information by a second user of the plurality of users and prevents the contact information from being stored in persistent memory of a device used by the second user to access the contact information, wherein the accessing is controlled based upon indicia specified by the first user and the contact information is encrypted and associated with the first user'"'"'s public key. - View Dependent Claims (16, 17, 18)
-
-
19. A computer program product comprising a computer usable medium having readable program code embodied in the medium, the computer program product includes at least one component to:
-
deposit personal contact data by an owner into a secure contact management system (CMS), wherein the personal contact data is encrypted and associated with the owner'"'"'s public key; identify at least one entity to the secure CMS to enable access to the personal contact data by the at least one entity; specify indicia to control access to the personal contact data; and access the personal contact data by the at least one entity, without storing the personal contact data in persistent memory of a device used to access the personal contact data, based on the indicia allowing authorized access to the personal contact data. - View Dependent Claims (20)
-
Specification