Privacy protection in network-based phonebooks
DCFirst Claim
1. A phonebook system for providing a network-based phonebook, the phonebook system comprising:
- a phonebook database adapted to store a network-based phonebook for a subscriber, wherein the network-based phonebook includes at least one contact; and
a processing system adapted to identify privacy criteria for the at least one contact in the network-based phonebook, process the privacy criteria to identify contact information for the at least one contact that is authorized to be included in the network-based phonebook for the subscriber, and include the authorized contact information in the network-based phonebook for the subscriber;
wherein the processing system is further adapted to block the unauthorized contact information from being included in the network-based phonebook for the subscriber.
6 Assignments
Litigations
0 Petitions

Accused Products

Abstract
Phonebook systems and associated methods are disclosed that provide a mechanism for protecting private information of a contact from being published in a network-based phonebook. A typical network-based phonebook service allows subscribers to set up network-based phonebooks, where each phonebook includes one or more contacts and associated contact information. Before contact information for a contact is included in a network-based phonebook for a subscriber, a phonebook system identifies privacy criteria for the contact. The privacy criteria may be predefined by the contact, predefined by the service provider, or predefined by another entity. The phonebook system then processes the privacy criteria to identify the contact information for the contact that is authorized to be included in the network-based phonebook. The processing system may then include the authorized contact information in the network-based phonebook, and block the unauthorized contact information from being included in the network-based phonebook.
6 Citations
18 Claims
-
1. A phonebook system for providing a network-based phonebook, the phonebook system comprising:
- a phonebook database adapted to store a network-based phonebook for a subscriber, wherein the network-based phonebook includes at least one contact; and
a processing system adapted to identify privacy criteria for the at least one contact in the network-based phonebook, process the privacy criteria to identify contact information for the at least one contact that is authorized to be included in the network-based phonebook for the subscriber, and include the authorized contact information in the network-based phonebook for the subscriber;
wherein the processing system is further adapted to block the unauthorized contact information from being included in the network-based phonebook for the subscriber. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- a phonebook database adapted to store a network-based phonebook for a subscriber, wherein the network-based phonebook includes at least one contact; and
-
8. A method of providing a network-based phonebook for a subscriber, the method comprising:
- storing the network-based phonebook for the subscriber, wherein the network-based phonebook includes at least one contact;
identifying privacy criteria for the at least one contact in the network-based phonebook;
processing the privacy criteria to identify contact information for the at least one contact that is authorized to be included in the network-based phonebook for the subscriber; and
including the authorized contact information in the network-based phonebook for the subscriber; and
blocking the unauthorized contact information from being included in the network-based phonebook for the subscriber. - View Dependent Claims (9, 10, 11, 12, 13, 14)
- storing the network-based phonebook for the subscriber, wherein the network-based phonebook includes at least one contact;
-
15. A method of operating a communication network for providing a network-based phonebook service, the method comprising:
-
storing a network-based phonebook for a subscriber, wherein the network-based phonebook includes at least one contact; identifying privacy criteria for the at least one contact responsive to a trigger; processing the privacy criteria to identify contact information for the at least one contact that is authorized to be included in the network-based phonebook for the subscriber; including the authorized contact information in the network-based phonebook for the subscriber; blocking the unauthorized contact information from being included in the network-based phonebook for the subscriber; receiving a request for the network-based phonebook from an access device of the subscriber; and transmitting a copy of the network-based phonebook to the access device of the subscriber responsive to the request. - View Dependent Claims (16, 17, 18)
-
Specification