System and method for controlled access to up-to-date contact information
First Claim
1. A system for selectively enabling access to a first user'"'"'s personal information, wherein said system comprises:
- memory for storing said first user'"'"'s information and for storing a plurality of programmatic instructions that, when executed by one or more processors, cause said system to;
electronically receive an instruction from said first user to assign a second user, from among a plurality of users, to a first category, and in response to said instruction, assign said second user to said first category;
electronically receive an instruction from said first user to assign a third user, from said plurality of users, to a second category different than said first categoryand in response to said instruction, assign said third user to said second category;
based upon said first category, permit said second user to access a first amount of the first user'"'"'s personal information including a first information item about the first user;
based upon said second category, permit said third user to access a second amount of the first user'"'"'s personal information, wherein said first amount is different than said second amount and does not include said first information item about the first user;
detecting a change of said first information item to an updated first information item;
finding a second set of users, including said second user, who have said access to said first information item about the first user;
updating local computers that are associated with said second set of users, without updating other local computers that are not associated with said second set of users, including updating a first local computer associated with said second user and not updating a second local computer associated with said third user.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for controlling a recipient'"'"'s access to a user'"'"'s information. The method includes receiving a plurality of contact information, registration information and access information from the user. Only person'"'"'s knowing the user'"'"'s registration information can update the contact and access information of the user. The contact information entered by a user is about that user. The access information defines accessible sets of contact information to be made accessible to recipients. A telephone exchange is associated with each recipient; and a local server is associated with each telephone exchange. The accessible set of information is stored in the local server for access by the recipient. The system handles updates to information on the local servers when a user updates their contact information. The system can automatically place calls for a recipient to a user that has granted the recipient access to a number for communicating with the user.
-
Citations
29 Claims
-
1. A system for selectively enabling access to a first user'"'"'s personal information, wherein said system comprises:
-
memory for storing said first user'"'"'s information and for storing a plurality of programmatic instructions that, when executed by one or more processors, cause said system to; electronically receive an instruction from said first user to assign a second user, from among a plurality of users, to a first category, and in response to said instruction, assign said second user to said first category; electronically receive an instruction from said first user to assign a third user, from said plurality of users, to a second category different than said first category and in response to said instruction, assign said third user to said second category; based upon said first category, permit said second user to access a first amount of the first user'"'"'s personal information including a first information item about the first user; based upon said second category, permit said third user to access a second amount of the first user'"'"'s personal information, wherein said first amount is different than said second amount and does not include said first information item about the first user; detecting a change of said first information item to an updated first information item; finding a second set of users, including said second user, who have said access to said first information item about the first user; updating local computers that are associated with said second set of users, without updating other local computers that are not associated with said second set of users, including updating a first local computer associated with said second user and not updating a second local computer associated with said third user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for selectively enabling a second user access to a first user'"'"'s personal information, wherein said system comprises memory for storing said first user'"'"'s information and for storing a plurality of programmatic instructions, wherein said instructions comprise:
-
instructions for electronically assigning the second user to a first group that has access to first information about the first user; instructions for electronically assigning other users to a second group that does not have access to first information about the first user but has access to other information about the first user; and instructions for permitting said second user to access information associated with said first group and for not permitting said second user from accessing information associated with said second group; instructions for detecting a change of a first information item in said first users personal information to updated first information; finding a second set of users, including said second user, who are assigned to said first group that has access to said first information item about the first user; updating local computers that are associated with said second set of users, without updating other local computers that are not associated with said second set of users, including updating a first local computer associated with said second user and not updating a second local computer associated with a third user who is one of said other users. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for managing information exchanges comprising:
-
storing in a memory associated with a computer personal information of a first member; for at least a portion of the personal information, storing a relationship definition required for another member to access the portion of personal information, wherein a second member is not allowed to access the portion of personal information if the second member does not have said relationship with the first member; and b. storing a degree of separation required for another member to contact the first member through the computer system, wherein the second member is not allowed to contact the first member through the computer system if the second member is separated from the first member by more than the stored degree of separation. - View Dependent Claims (18, 19, 20)
-
-
21. A server computer system comprising:
-
a processor and memory that store information about multiple different users, said memory storing personal information about a first user and assignment information indicating which other users have access to different subsets of said personal information about said first user, where said assignment information includes first assignment information assigning a second user to a first group of users that has access to first information about the first user, and second assignment information assigning other users to a second group of users that does not have access to first information about the first user but has access to other information about the first user; said processor programmed for allowing users access to said personal information about said first user based on said assignment information, where said second user is allowed access to said first information about the first user and said other users assigned to the second group are not allowed access to said first information, said processor programmed for detecting a change of said first information to updated first information and responsive to detecting the change, finding the first group of users, including said second user, that have access to said first information about the first user and operating to update local computers that are associated with said first group of users, without updating other local computers that are not associated with said first group of users, including updating a first local computer associated with said second user and not updating at least one second local computer assigned to the second group are not allowed access to said first information. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A server computer system comprising:
-
a processor and memory that store information about multiple different users, said memory storing personal information about a first user and assignment information indicating which users have access to different subsets of said personal information about said first user, said assignment information including first assignment information assigning a second user to a first group that has access to first information about the first user, and second assignment information assigning other users other than said second user to a second group that does not have access to first information about the first user but has access to other information about the first user; said processor programmed for allowing users access to said personal information about said first user based on said assignment information, where said second user is allowed access to said first information about the first user and said other users are not allowed access to said first information, wherein the processor is programmed to update the first information to updated first information by receiving changes to the first information from another user other than the first user, verifying that the another user has change access information to change the first information associated with the first user, and allowing said another user to change the first information to the updated first information, only if the user has said change access information. - View Dependent Claims (28, 29)
-
Specification