Contact information management methods and apparatus
First Claim
1. A portable electronic apparatus associated with a first party that facilitates exchange of contact information among a plurality of parties, comprising:
- a processing apparatus;
a computer readable apparatus having a non-transitory storage medium in data communication with the processing apparatus; and
a network interface in data communication with the processing apparatus;
wherein the non-transitory storage medium has at least one computer program stored thereon, the at least one computer program comprising a plurality of computer executable instructions that when executed by the processing apparatus, cause the portable electronic apparatus to;
cause a second party to be contacted with a data transmission request transmitted via the network interface, the data transmission request comprising a request for a contact information associated with a third party;
process an authorization for the data transmission request received from the second party via the network interface, where the process is further configured to verify a digital signature of the second party at the portable electronic apparatus; and
when the verification of the digital signature of the second party is successful, transmit information to the third party that is configured to enable access for download retrieval of the contact information associated with the third party by the second party from the third party, only after the download retrieval has been authorized by the third party;
wherein the information configured to enable access for the download retrieval of the contact information associated with the third party comprises both (i) a digital signature from the first party that facilitates exchange of the contact information and (ii) the digital signature of the second party, that was verified by the first party.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus for controlled and/or secure distribution of contact information. In one embodiment, transfers of contact information must be authorized by the affected party. The party distributing the contact data, the party receiving the contact data, and the party described by the contact data initiate a secure dialog to exchange contact data. Various embodiments also enable piecemeal authorization and transfer of contact information, allowing the affected party to control the portion of contact data transferred, as well as apply specific rule sets or templates. In one variant, the authorization and transfer process is optimized to reduce the number of transaction steps. Additionally, solutions for distributing contact information among larger groups of participants are also disclosed.
-
Citations
19 Claims
-
1. A portable electronic apparatus associated with a first party that facilitates exchange of contact information among a plurality of parties, comprising:
-
a processing apparatus; a computer readable apparatus having a non-transitory storage medium in data communication with the processing apparatus; and a network interface in data communication with the processing apparatus; wherein the non-transitory storage medium has at least one computer program stored thereon, the at least one computer program comprising a plurality of computer executable instructions that when executed by the processing apparatus, cause the portable electronic apparatus to; cause a second party to be contacted with a data transmission request transmitted via the network interface, the data transmission request comprising a request for a contact information associated with a third party; process an authorization for the data transmission request received from the second party via the network interface, where the process is further configured to verify a digital signature of the second party at the portable electronic apparatus; and when the verification of the digital signature of the second party is successful, transmit information to the third party that is configured to enable access for download retrieval of the contact information associated with the third party by the second party from the third party, only after the download retrieval has been authorized by the third party; wherein the information configured to enable access for the download retrieval of the contact information associated with the third party comprises both (i) a digital signature from the first party that facilitates exchange of the contact information and (ii) the digital signature of the second party, that was verified by the first party. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10, 11, 12)
-
-
6. A computer readable apparatus having a non-transitory storage medium with at least one computer program stored thereon, the at least one computer program comprising a plurality of computer executable instructions that when executed by a processor, causes a second party'"'"'s client device to:
-
receive a data transmission request transmitted from a first party via a network interface, the data transmission request comprising a request for a contact information associated with a third party; authorize the received data transmission request from the first party'"'"'s client device, where the received data transmission request requests permission to share a third party'"'"'s contact information with the second party'"'"'s client device; and transmit an authorization message comprising a digital signature of the second party'"'"'s client device to the first party'"'"'s client device, where the authorization message is configured to allow the first party'"'"'s client device to share the third party'"'"'s contact information to at least the second party'"'"'s client device via a transmission of the third party'"'"'s contact information from the third party'"'"'s client device; wherein the transmission of the third party'"'"'s contact information from the third party'"'"'s client device occurs responsive to an authorization of;
(i) a digital signature from the first party that facilitates exchange of the contact information and (ii) the digital signature of the second party that is verified by the first party.
-
-
13. A method for transmitting contact information of an affected party device to a consignee device, the method comprising:
-
receiving at the affected party device, a contact data transmission request from a consignor device, the contact data transmission request comprising at least a first digital signature associated with the consignee device and a second digital signature associated with the consignor device; wherein the first digital signature indicates a successful authorization of the contact data transmission request by the consignee; wherein the second digital signature indicates a successful verification of the contact data transmission request by the consignor; verifying the first digital signature associated with the consignee device and the second digital signature associated with the consignor device; and when the act of verifying is successful, (i) authorizing a transfer of the contact information of the affected party device and (ii) modifying the contact information, before transmitting the contact information of the affected party device to the consignee device from the affected party device. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification