Linking of personal information management data
First Claim
Patent Images
1. A system for sharing Personal Information Management (PIM) data comprising:
- a first computing device configured to provide PIM data;
a second computing device configured to receive PIM data;
an intermediate computing device coupling the first computing device to the second computing device, the intermediate computing device configured to;
host a user profile associated with a user of the first computing device and a user profile associated with a user of the second computing device,identify a common relationship between the user profiles, wherein identification of the relationship includes identification of information common to both the user profiles, andoverwrite out-of-date PIM data at one of the two computing devices, whereby the overwritten PIM data will correspond to up-to-date PIM data at the other of the two computing devices when the intermediate computing device identifies the information common to both the user profiles, wherein overwriting out-of-date PIM data includes changing one or more values of the out-of-date PIM data at the one of the two computing devices when the one or more values differ between the user profiles and populating one or more values when the one or more values is unpopulated for the out-of-date PIM data at the one of the two computing devices.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for linking information of one user to other users via a data aggregation server is provided. Various security settings govern the linking of information. Various methodologies for initiating a link of PIM data are also provided including automatic linking, targeted linking and requested linking. Implementations utilizing group profiles are also provided.
397 Citations
34 Claims
-
1. A system for sharing Personal Information Management (PIM) data comprising:
-
a first computing device configured to provide PIM data; a second computing device configured to receive PIM data; an intermediate computing device coupling the first computing device to the second computing device, the intermediate computing device configured to; host a user profile associated with a user of the first computing device and a user profile associated with a user of the second computing device, identify a common relationship between the user profiles, wherein identification of the relationship includes identification of information common to both the user profiles, and overwrite out-of-date PIM data at one of the two computing devices, whereby the overwritten PIM data will correspond to up-to-date PIM data at the other of the two computing devices when the intermediate computing device identifies the information common to both the user profiles, wherein overwriting out-of-date PIM data includes changing one or more values of the out-of-date PIM data at the one of the two computing devices when the one or more values differ between the user profiles and populating one or more values when the one or more values is unpopulated for the out-of-date PIM data at the one of the two computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for updating Personal Information Management (PIM) data amongst a plurality of users, comprising:
-
providing a first set of PIM data, the first set of PIM data including up-to-date PIM data; providing a second set of PIM data, the second set of PIM data including out-of-date PIM data; establishing a link between a user of the first set of PIM data and a user of the second set of PIM data, wherein the link between the user of the first set of PIM data and the user of the second set of PIM data is established as a result of information in the first set of PIM data also being in the second set of PIM data; causing the second set of PIM data to correspond to the first set of PIM data such that the out-of-date PIM data is overwritten by the up-to-date PIM data, wherein causing the second set of PIM data to correspond to the first set of PIM data is subject to security limitations on updating PIM data imposed by the user of the first or second set of PIM data, and wherein overwriting the out-of-date PIM data includes changing one or more values of the out-of-date PIM data when the one or more values differ between the first set of PIM data and second set of PIM data and populating one or more values into the second set of PIM data when the one or more values is unpopulated for the second set of PIM data. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
15. A method for updating Personal Information Management (PIM) data amongst a plurality of users, comprising:
-
providing a first set of PIM data, the first set of PIM data including up-to-date PIM data; providing a second set of PIM data, the second set of PIM data including out-of-date PIM data; establishing a link between a user of the first set of PIM data and a user of the second set of PIM data, wherein the link between the user of the first set of PIM data and the user of the second set of PIM data is established as a result of a data aggregation server identifying a correlation between the user of the first set of PIM data and the user of the second set of PIM data, the correlation based at least in part on information common to the first set of PIM data and the second set of PIM data; causing the second set of PIM data to correspond to the first set of PIM data such that the out-of-date PIM data is overwritten by the up-to-date PIM data, wherein causing the second set of PIM data to correspond to the first set of PIM data is subject to security limitations on updating PIM data imposed by the user of the first or second set of PIM data, and wherein overwriting the out-of-date PIM data includes changing one or more values of the out-of-date PIM data when the one or more values differ between the first set of PIM data and second set of PIM data and populating one or more values into the second set of PIM data when the one or more values is unpopulated for the second set of PIM data. - View Dependent Claims (25, 26, 27, 28, 29)
-
-
16. A method for updating Personal Information Management (PIM) data amongst a plurality of users, comprising:
-
providing a first set of PIM data, the first set of PIM data including up-to-date PIM data; providing a second set of PIM data, the second set of PIM data including out-of-date PIM data; establishing a link between a user of the first set of PIM data and a user of the second set of PIM data, wherein the link between the user of the first set of PIM data and the user of the second set of PIM data is established as a result of the user of information in the second set of PIM data also being in the first set of PIM data; causing the second set of PIM data to correspond to the first set of PIM data such that the out-of-date PIM data is overwritten by the up-to-date PIM data, wherein causing the second set of PIM data to correspond to the first set of PIM data is subject to security limitations on updating PIM data imposed by the user of the first or second set of PIM data, and wherein overwriting the out-of-date PIM data includes changing one or more values of the out-of-date PIM data when the one or more values differ between the first set of PIM data and second set of PIM data and populating one or more values into the second set of PIM data when the one or more values is unpopulated for the second set of PIM data. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
17. A method for completing Personal Information Management (PIM) data entries amongst a plurality of users, comprising:
-
providing a first set of PIM data, the first set of PIM data including an incomplete user contact profile; providing a second set of PIM data, the second set of PIM data including at least one PIM data entry not present in the user contact profile of the first set of PIM data; identifying the presence of the second set of PIM data including the at least one PIM data entry not present in the user contact profile of the first set of PIM data; establishing a link between a user of the first set of PIM data and a user of the second set of PIM data, the link based at least in part on information in the first set of PIM data also being in the second set of PIM data; updating the first set of PIM data in accordance with a security limitation imposed by a user of the first set of PIM data such that the user contact profile comprises at least the one PIM data entry of the second set of PIM data, and wherein updating the first set of PIM data includes changing one or more entries in the first set of PIM data based at least in part on one or more corresponding entries in the second set of PIM data when the one or more entries differ from the one or more corresponding entries. - View Dependent Claims (18, 19)
-
Specification