Access to user information
First Claim
1. A method, comprising:
- storing user information associated with a first user, the user information including address book information, calendar information and at least one of location information or presence information;
storing access control information, the access control information identifying criteria for allowing parties other than the first user to access the user information, wherein the access control information includes at least two of time information indicating when the parties are authorized to access at least some of the user information, location information associated with the first user'"'"'s location, or requestor identifier information identifying the parties,receiving, from a first party, a request for access to at least a first portion of the user information, wherein the first portion of the user information includes at least one of the address book information or the calendar information;
determining, in response to the request and based on the access control information, whether the first party is authorized to access the first portion of the user information; and
providing access to the first portion of the user information, in response to determining that the first party is authorized to access the first portion of the user information,wherein the determining further comprises;
performing an implicit authorization determination by accessing the first user'"'"'s address book or contact list to determine whether the first party is authorized to access the first portion of the user information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method may include storing user information associated with a first user, where the user information includes at least two of location information, presence information, address book information or calendar information. The method may also include storing access control information identifying criteria for allowing parties to access the user information and receiving, from a first party, a request for access to at least a first portion of the user information. The method may further include determining, based on the access control information, whether the first party is authorized to access the first portion of the user information and providing access to the first portion of the user information, when it is determined that the first party is authorized to access the first portion of the user information.
17 Citations
17 Claims
-
1. A method, comprising:
-
storing user information associated with a first user, the user information including address book information, calendar information and at least one of location information or presence information; storing access control information, the access control information identifying criteria for allowing parties other than the first user to access the user information, wherein the access control information includes at least two of time information indicating when the parties are authorized to access at least some of the user information, location information associated with the first user'"'"'s location, or requestor identifier information identifying the parties, receiving, from a first party, a request for access to at least a first portion of the user information, wherein the first portion of the user information includes at least one of the address book information or the calendar information; determining, in response to the request and based on the access control information, whether the first party is authorized to access the first portion of the user information; and providing access to the first portion of the user information, in response to determining that the first party is authorized to access the first portion of the user information, wherein the determining further comprises; performing an implicit authorization determination by accessing the first user'"'"'s address book or contact list to determine whether the first party is authorized to access the first portion of the user information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A device, comprising:
-
a communication interface configured to receive communications from other devices; a memory configured to store information associated with a plurality of users, the information including address book information, calendar information and at least one of location information or presence information; and logic configured to; provide a graphical user interface (GUI) configured to receive, from a first user, user-defined criteria for controlling access to information associated with the first user, wherein the user defined criteria include at least two of time information indicating a time period when each of a plurality of parties is authorized to access the information associated with the first user, frequency information indicating how frequently each of the plurality of parties is permitted to access information associated with the first user, or requestor identifier information identifying each of the plurality of parties, receive requests, via the communication interface and subsequent to receiving the user-defined criteria, for information stored in the memory, control access to the information stored in the memory based on the user-defined criteria, receive a request from a first party, via the communication interface, for a first type of information associated with the first user, wherein the first type of information includes at least one of the address book information or the calendar information, and determine, based on the first type of information and the user-defined criteria, whether the first party is authorized to access the information associated with the first user stored in the memory, wherein when determining, the logic is further configured to; perform an implicit authorization determination by accessing the first user'"'"'s address book or contact list to determine whether the first party is authorized to access the information associated with the first user. - View Dependent Claims (14)
-
-
15. A non-transitory computer-readable medium having stored thereon sequences of instructions which, when executed by at least one processor, cause the at least one processor to:
-
provide a graphical user interface (GUI) configured to allow users to input user-defined access control information associated with accessing address book information, calendar information and at least one of location information or presence information; receive, from a first party, a request for access to at least a first portion of information associated with a first user, wherein the first portion of information includes at least one of the address book information or the calendar information; determine, in response to the request and based on user-defined access control information input by the first user, whether the first party is authorized to access the first portion of information, wherein the user-defined access control information comprises at least two of time information associated with requests, location information associated with the first user, or requestor identifier information; and provide access to the first portion of information, in response to determining that the first party is authorized to access the first portion of information, wherein when determining, the instructions cause the at least one processor to; perform an implicit authorization determination by accessing the first user'"'"'s address book or contact list to determine whether the first party is authorized to access the first portion of information. - View Dependent Claims (16, 17)
-
Specification