System and Method for Private Contract Sharing
First Claim
1. A system for sharing contact information, comprising:
- a processor and a memory unit for storing instructions thereon, wherein said instructions, when executed by said processor, causes said system to;
i) access one or more address books via at least one user device in connection with a network, wherein said at least one user device comprises a first user device operated by a first user and a second user device operated by a second user, and further wherein said one or more address books comprise a contacts list;
ii) enhance contact information for contacts within said contacts list by populating metadata related to each of said contacts via a metadata population service;
iii) process said contact information through a blacklist to determine whether said contacts is unsharable or sharable;
iv) hash said contact information to hide personally identifiable information related to said contacts;
v) identify said contacts representing a same real person;
vi) create a more complete profile of said real person by supplying missing contact information with said metadata;
vii) receive a request to share at least one of said contact information having specific criteria; and
viii) match and share at least one of said contact information meeting said criteria.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a system having a plurality of user devices, a plurality of databases, and servers in communication over a network. Each of the devices synchronizes one or more address books comprising contact information. The contact information is enhanced and then cleansed. The enhanced contact information is then hashed so that the personally identifiable information is made unavailable. The system then identifies common contacts representing the same real person and creates a single composite view of the person. Thereafter, the system shares the single composite view between users while obfuscating information that personally identifies such contacts.
22 Citations
20 Claims
-
1. A system for sharing contact information, comprising:
-
a processor and a memory unit for storing instructions thereon, wherein said instructions, when executed by said processor, causes said system to; i) access one or more address books via at least one user device in connection with a network, wherein said at least one user device comprises a first user device operated by a first user and a second user device operated by a second user, and further wherein said one or more address books comprise a contacts list; ii) enhance contact information for contacts within said contacts list by populating metadata related to each of said contacts via a metadata population service; iii) process said contact information through a blacklist to determine whether said contacts is unsharable or sharable; iv) hash said contact information to hide personally identifiable information related to said contacts; v) identify said contacts representing a same real person; vi) create a more complete profile of said real person by supplying missing contact information with said metadata; vii) receive a request to share at least one of said contact information having specific criteria; and viii) match and share at least one of said contact information meeting said criteria. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of sharing contact information, comprising the steps of:
-
i) accessing one or more address books accessible via at least one user device in connection with a network, wherein said at least one user device comprises a first user device operated by a first user and a second user device operated by a second user and further wherein said one or more address books comprise a contacts list; ii) enhancing contact information for contacts within said contacts list by populating metadata related to each of said contacts via a metadata population service; iii) processing said contact information through a blacklist to determine whether said contacts is unsharable or sharable; iv) hashing said contact information to hide personally identifiable information related to said contacts; v) identifying said contacts representing a same real person; vi) creating a more complete profile of said real person by supplying missing contact information with said metadata; vii) receiving a request to share at least one of said contact information having specific criteria; and viii) matching and share at least one of said contact information meeting said criteria. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification