System and method for providing a proxied contact management system
First Claim
1. A method of providing proxied communications using a proxied contact management system (PCMS), comprising:
- requesting a connection to a communication device of a first party by a communication device of a second party at the PCMS by submitting a public key of the first party from the communication device of the second party to the PCMS;
retrieving, by the PCMS using the public key of the first party, stored information associated with the first party, the stored information including at least one party permitted to contact the first party and, for each of the at least one party permitted to contact the first party, a permitted mode of communication and a time period during which the contact may occur;
verifying that the second party has permission to contact the first party based on the retrieved stored information;
denying the proxied communications when the retrieved stored information indicates that the second party is ineligible to contact the first party; and
if permitted, establishing the proxied communications via the PCMS between the communication device of the first party and the communication device of the second party while preventing the communication device of the second party from receiving any information regarding contact information including at least one of a telephone number and an email address of the first party, other than the public key, wherein the proxied communications comprise the PCMS contacting the communication device of the first party via a same communication mechanism used by the communication device of the second party to contact the PCMS in order to request the connection to the communication device of the first party,wherein, during the establishing, the connection between the communication device of the second party and the communication device of the first party is enabled and sustained via the PCMS, andwherein the PCMS utilizes a vault services system that allows users to create accounts, deposit contact information, and read, update or remove information.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a Proxied Contact Management System (PCMS) so that individual owners of personal contact data may control and manage the access and dissemination of their personal data and also control who may contact them. The owner of personal contact data may securely register the data with a secured information vault of the PCMS and specify which other parties may contact them. In this way, duplication of the personal data is avoided, but at the same time is always current. In use, a second party'"'"'s device, such as a telephone or a PDA may request that the PCMS, under public key infrastructure (PKI) control, establish a connection with the first party. Once verified, the PCMS may establish a proxy connection between the first and second parties according to the permitted mode of communication defined by criteria established by the first party and managed by the PCMS. In this way, personal contact information, such as a telephone number, is kept secure and private and not provided to the second party.
24 Citations
16 Claims
-
1. A method of providing proxied communications using a proxied contact management system (PCMS), comprising:
-
requesting a connection to a communication device of a first party by a communication device of a second party at the PCMS by submitting a public key of the first party from the communication device of the second party to the PCMS; retrieving, by the PCMS using the public key of the first party, stored information associated with the first party, the stored information including at least one party permitted to contact the first party and, for each of the at least one party permitted to contact the first party, a permitted mode of communication and a time period during which the contact may occur; verifying that the second party has permission to contact the first party based on the retrieved stored information; denying the proxied communications when the retrieved stored information indicates that the second party is ineligible to contact the first party; and if permitted, establishing the proxied communications via the PCMS between the communication device of the first party and the communication device of the second party while preventing the communication device of the second party from receiving any information regarding contact information including at least one of a telephone number and an email address of the first party, other than the public key, wherein the proxied communications comprise the PCMS contacting the communication device of the first party via a same communication mechanism used by the communication device of the second party to contact the PCMS in order to request the connection to the communication device of the first party, wherein, during the establishing, the connection between the communication device of the second party and the communication device of the first party is enabled and sustained via the PCMS, and wherein the PCMS utilizes a vault services system that allows users to create accounts, deposit contact information, and read, update or remove information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification