The instant invention relates to a method of populating contact information fields for a newly added contact within a contact database and more particularly to an automated method of populating the contact information fields without requiring an individual to manually enter data in same.
Electronic messaging has dramatically changed the manner in which people communicate with one another in the digital age. Electronic messaging systems, for example, permit users on different computers to communicate with one another by transmitting information such as text messages and the like between the different computers. Electronic messaging is often used to permit employees in a company to communicate with other employees connected to the company's internal network, regardless of whether they are in the same or another company facility. Also, due to the explosive growth of the Internet, electronic messaging has now become a relatively common way for anyone with a computer to communicate with other computer users all over the world.
In most electronic messaging systems, users are assigned user identifiers, or “user id's” that uniquely identify each user. Furthermore, each user is typically assigned one or more “mailboxes,” (also referred to as “post office boxes”) that have a unique address so that any user wishing to send an electronic message (often referred to as an “e-mail”) to another user can do so by addressing the electronic message to the mailbox assigned to that user.
Many electronic messaging systems furthermore keep electronic “address books,” which typically include contact information databases within which are stored records of the mailbox addresses for different users. Therefore, for example, a user wishing to send an electronic message to a user named John Smith, whose mailbox address is “smithj@xyz.com”, is then able to search through an address book to find an entry for “Smith, John”, rather than having to remember a relatively cryptic mailbox address that is assigned to that user.
Some address books also store additional information about users, such as telephone numbers, mailing addresses, job titles, and other information that is more or less unrelated to electronic messaging. Such an address book is often referred to as a “contact manager,” as a user is capable of using the address book to maintain a wide variety of information about many different people (referred to in this context as “contacts”). As the use of electronic messaging has become more widespread, many computer users send and receive more electronic messages to and from a larger number of other computer users.
Typically, a user of a prior art contact management software application is required to enter the contact information that they want to store in their address book. A variety of methods exist for entering this contact information. It may be entered manually using a keyboard device, imported from an existing file on their computer, or imported via a peripheral device such as a business card scanner. Unfortunately, often the user does not have a complete set of contact information, and accordingly some contact information fields remain unpopulated when a new contact is added to the address book.
Prior art methods of updating and maintaining contact information databases are known. For example, services such as Internet-Based “White Pages” and E-Mail Directory Services are used to synchronize contact information of locally maintained address books with current contact information stored on a central storage system. Such a service may be used to populate empty contact information fields at some time after a new contact has been added to a local address book. It is a disadvantage of this form of service that each party is required to be a member of the service and that members of the address book, which are not already subscribed, still have to manually inform the subscribed user of their contact information. Furthermore, it is a disadvantage that this form of service requires the contact information to be stored on a central storage system. Although security may be strictly enforced, there are still privacy and security concerns because all personal information is accessible from outside the server.
It would be highly advantageous to provide a method for populating contact information fields for newly added contacts within a contact database absent security concerns, privacy concerns and mandatory subscription to a service by each party within a given contact list.
In an attempt to overcome these and other limitations of the prior art it is an object of the instant invention to provide a method for automatically obtaining additional contact information from a new contact when the new contact is added to an existing contact information database.
In an attempt to overcome these and other limitations of the prior art it is another object of the instant invention to provide a method for automatically populating contact information fields for newly added contacts within a contact database absent security concerns, privacy concerns and mandatory subscription to a service by each party within a given contact list.
In accordance with the instant invention there is provided a method of adding a new contact to an electronic contact information database comprising the steps of:
In accordance with another aspect of the instant invention there is provided a method of adding a new contact to an electronic contact information database of a user system comprising the steps of: using an electronic message application in execution on a system of the new contact, receiving an electronic message transmitted from the user system via a communication network; using an automated reply filter cooperatively in execution with the electronic message application, intercepting the received electronic message prior to storage thereof within an inbox of the electronic message application; parsing information fields within the intercepted electronic message to determine that the electronic message is one of a contact information request message transmitted in dependence upon the new contact being added to the electronic contact information database and another message; generating a new electronic message including data indicative of current contact information for the new contact in reply to a determined contact information request message; providing all other messages for storage within the inbox; and
In accordance with yet another aspect of the instant invention there is provided method of adding a new contact to an electronic contact information database of a user system comprising the steps of: automatically transmitting an electronic message from the user system to a system of the new contact via a communication network and in dependence upon the new contact being added to the electronic contact information database, the electronic message being identified for interception by an automated reply filter in execution on the system of the new contact; receiving at the user system a new electronic message generated by the automated reply filter in response to the electronic message and transmitted via the communication network, the new electronic message including current contact information retrieved from a memory accessible to the automated reply filter; automatically extracting from the received new electronic message the current contact information for the new contact; and, automatically storing the extracted current contact information in association with other contact information relating to the new contact within the electronic contact information database of the user system.
In accordance with still another aspect of the instant invention there is provided a method of adding a new contact to an electronic contact information database comprising the steps of:
The novel features that are considered characteristic of the invention are set forth in the appended claims; the invention itself, however, both as to its organization and method of operation, together with additional objects and advantages thereof, will best be understood from the following description of a specific embodiment when read in conjunction with the accompanying drawings, in which similar reference numbers designate similar items:
a is a simplified code block diagram in accordance with a first embodiment of the instant invention;
b is a simplified code block diagram in accordance with a second embodiment of the instant invention;
c is a simplified code block diagram in accordance with a third embodiment of the instant invention;
a is a simplified code block diagram in accordance with a fourth embodiment of the instant invention;
b is a simplified code block diagram in accordance with a fifth embodiment of the instant invention;
c is a simplified code block diagram in accordance with a sixth embodiment of the instant invention; and
The following description is presented to enable a person skilled in the art to make and use the invention, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and the scope of the invention. Thus, the present invention is not intended to be limited to the embodiments disclosed, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
Referring to
The instant invention will now be described by way of a specific and non-limiting example in which the contact information database is in the form of an electronic address book stored on memory 5 for use with an electronic messaging application when in execution on processor 4 of user system 1. It should be understood, however, that other types of contact information databases are envisaged for use with the method according to the instant invention.
Referring to
Referring now to
Referring again to
Referring to
Referring to
Referring to
Optionally, the application 18 attaches an electronic tag to the electronic message, wherein the electronic tag is for automatic interception of the tagged electronic message by the electronic messaging application 17b, for manual review by the new contact.
Advantageously, the new contact decides whether or not to provide additional contact information to the user. Of course, optionally the new contact provides only some of the additional contact information requested based on the type of user making the request for additional contact information. For instance, if the user were a known personal acquaintance of the new contact then the new contact would provide residential contact information. Alternatively, if the user were a major client of the new contact then the new contact would provide residential and professional contact information. Of course, if the user were a minor client of the new contact then the new contact would provide professional contact information only. In each case the new contact decides the type of contact information that is provided.
Referring to
Optionally, the application 20 prompts the new contact to select a type of contact information that is to be provided to the user system. For example, the new contact selects an information file from a plurality of information files, each information file including different types of contact information. Accordingly, the new contact may select an information file including residential contact information only when the user is a personal acquaintance, an information file including residential and professional contact information when the user is a major client, and an information file including professional contact information only when the user is a minor client. Advantageously, the new contact controls the distribution of contact information.
Referring to
Optionally, the application 18 attaches an electronic tag including information relating to the user. The application 23 categorizes the user according to a set of rules established by the new contact. For instance, the user may be unknown to the new contact or the user may appear in the new contact's address book. If the user is unknown, the application 23 responds according to a predetermined rule, for example the application 23 transmits a response message denying the user's request for additional contact information. If the user appears in the new contact's address book, then the user may be further categorized as, for instance, one of a personal contact, a business contact, a “good” contact, and a “bad” contact. The response message prepared by the application 23 includes current contact information stored in one of a plurality of memory files accessible to the application 23, wherein each different memory file contains a predetermined set of contact information that the new contact is willing to provide in an automated manner to a predetermined category of user.
In each of the embodiments discussed supra the application 18, 20 or 23 is preferably independent of the electronic messaging application 17a or 17b being used.
Referring to
Referring to
Referring to
Referring to
Advantageously, the user address book is neither provided to nor stored on a central storage system, such as for instance a central database of a computer system remote to the user system. The address book always remains on the user system, and accordingly the user data is secure since the data is not provided to any central authority.
Optionally, the user customizes the electronic message such that it is very clear that the email comes from the user and not an unauthorized third party. For example, the user writes the subject header and the message. Furthermore, the new contact can be assigned to a group selected from a plurality of different group, wherein a different message is sent to new contacts in each of the plurality of different groups.
Numerous other embodiments may be envisaged without departing from the spirit and scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
5293256 | Fukushima et al. | Mar 1994 | A |
5559867 | Langsenkamp et al. | Sep 1996 | A |
5737726 | Cameron et al. | Apr 1998 | A |
5740230 | Vaudreuil | Apr 1998 | A |
5813006 | Polnerow et al. | Sep 1998 | A |
5903845 | Buhrmann et al. | May 1999 | A |
5933778 | Buhrmann et al. | Aug 1999 | A |
5963951 | Collins | Oct 1999 | A |
5999932 | Paul | Dec 1999 | A |
6009149 | Langsenkamp | Dec 1999 | A |
6023700 | Owens et al. | Feb 2000 | A |
6047327 | Tso et al. | Apr 2000 | A |
6049801 | Whitmyer, Jr. | Apr 2000 | A |
6157954 | Moon et al. | Dec 2000 | A |
6185551 | Birrell et al. | Feb 2001 | B1 |
6195686 | Moon et al. | Feb 2001 | B1 |
6247043 | Bates et al. | Jun 2001 | B1 |
6249805 | Fleming, III | Jun 2001 | B1 |
6269369 | Robertson | Jul 2001 | B1 |
6373940 | Shaffer et al. | Apr 2002 | B2 |
6374259 | Celik | Apr 2002 | B1 |
6404884 | Marwell et al. | Jun 2002 | B1 |
6405243 | Nielsen | Jun 2002 | B1 |
6405319 | Arnold et al. | Jun 2002 | B1 |
6427164 | Reilly | Jul 2002 | B1 |
6442241 | Tsumpes | Aug 2002 | B1 |
6457012 | Jatkowski | Sep 2002 | B1 |
6529723 | Bentley | Mar 2003 | B1 |
6546416 | Kirsch | Apr 2003 | B1 |
6564264 | Creswell et al. | May 2003 | B1 |
6615241 | Miller et al. | Sep 2003 | B1 |
6694353 | Sommerer | Feb 2004 | B2 |
6701348 | Sommerer | Mar 2004 | B2 |
6760727 | Schroeder et al. | Jul 2004 | B1 |
6791050 | Daniels, Jr. et al. | Sep 2004 | B2 |
6829348 | Schroeder et al. | Dec 2004 | B1 |
6839737 | Friskel | Jan 2005 | B1 |
6883000 | Gropper | Apr 2005 | B1 |
6895426 | Cortright et al. | May 2005 | B1 |
6952805 | Tafoya et al. | Oct 2005 | B1 |
7054886 | Stern et al. | May 2006 | B2 |
20010032089 | Schiller | Oct 2001 | A1 |
20020007400 | Pedersen | Jan 2002 | A1 |
20020010747 | Jaehyuk-Hwang | Jan 2002 | A1 |
20020016857 | Harari | Feb 2002 | A1 |
20020049610 | Gropper | Apr 2002 | A1 |
20020052841 | Guthrie et al. | May 2002 | A1 |
20020052921 | Morkel | May 2002 | A1 |
20020103932 | Bilbrey et al. | Aug 2002 | A1 |
20020107925 | Goldschneider et al. | Aug 2002 | A1 |
20020124057 | Besprosvan | Sep 2002 | A1 |
20020169748 | Macholda | Nov 2002 | A1 |
20030069874 | Hertzog et al. | Apr 2003 | A1 |
20030212745 | Caughey | Nov 2003 | A1 |
20040015554 | Wilson | Jan 2004 | A1 |
20040039779 | Armstrong et al. | Feb 2004 | A1 |
20040054734 | Gilbert | Mar 2004 | A1 |
20050010799 | Kelley et al. | Jan 2005 | A1 |
20050060638 | Mathew et al. | Mar 2005 | A1 |
Number | Date | Country |
---|---|---|
0 927 945 | Jul 1999 | EP |
WO 0067105 | Nov 2000 | WO |
WO 0067108 | Nov 2000 | WO |
WO 0067416 | Nov 2000 | WO |
WO 0106497 | Jan 2001 | WO |
WO 0133430 | May 2001 | WO |
WO 0159595 | Aug 2001 | WO |
Number | Date | Country | |
---|---|---|---|
20030158860 A1 | Aug 2003 | US |