The number of techniques for managing electronic communications has increased rapidly over recent years. Voice communications such as telephone communications are typically managed electronically within both homes and businesses, such that answering machines, voice mail systems, and call forwarding mechanisms handle calls when no one is physically present to accept the calls. Occasionally, a recording will provide a calling party with a pager number in order to reach an individual more promptly. Similarly to voice communications, text communications may also be received instantaneously through text messaging techniques on mobile devices or through email accounts using instant messaging when a person is present to receive the communications. Typically however, email communications remain in queue until a recipient logs into an email account to check messages.
Even when a recipient is present to receive voice or text communications, the recipient may want to receive the communications only from selected individuals and may want to avoid sales calls, spam messages, or communications from individuals unknown to the recipient. Caller ID is frequently used to assist a telephone user in determining which calls to accept. Additionally, various filtering systems have been developed to appropriately handle email from unknown addresses.
In order to initiate contact using either a voice method or a text method, a sender must locate an email address or telephone number referencing the targeted recipient. A current storage structure for such information is a database field entry such as those used for storing contacts in electronic mail programs. An alternative structure is a listing, such as a web page or a phone book having a list of telephone numbers. These storage techniques often result in out-of-date information and lack of individual control over the stored information.
The aforementioned techniques for handling electronic communications do not provide an overall management scheme. Typically, individuals possess many electronic devices for receiving various types of information electronically. These devices include for example: cellular telephones; home telephones; office telephones; pagers; and personal computers. It would be desirable for individuals to have control over which entities are authorized to communicate with them and over which devices such communication would be authorized at any given time. Accordingly, there is a need for a solution, which allows increased individual control over electronic contacts. There is also a need for a comprehensive approach for managing incoming communications and outgoing communications.
In one aspect, the present invention is directed to a method for facilitating electronic communications management capability. The method provides a technique for managing a unique identity owned by an identity owner, wherein the unique identity is accessible through an associated reference. The method includes providing identity access tools for allowing the identity owner to select a set of authorized identities that have rights to communicate with the identity owner and providing device selection tools for allowing the identity owner to select at least one electronic device for reception of communications.
In a further aspect, a method is provided for facilitating electronic communications management by a system user. The method includes permitting access to a unique identity of the system user through a unique reference, wherein the unique identity comprises a plurality of components. The method additionally includes allowing the system user to alter any one of the identity components without altering the reference and providing the system user with tools for regulating access to the identity components such that selected known identities have access to selected identity components.
In yet another aspect, a system is provided for allowing a system user to manage communications with a unique identity, wherein the unique identity is associated with a plurality of electronic devices. The system includes a service for assigning a reference to a user's unique identity, wherein other identities can access the user's unique identity only by using the reference. The system additionally includes permission controls for allowing the user to control access to the unique identity by restricting authorization to a selected set of other identities and preference controls for allowing the user to select at least one associated device from a plurality of associated devices for receiving communication upon an access attempt by an authorized user.
The present invention is described in detail below with reference to the attached drawing figures, wherein:
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
With reference to
Computer 110 typically includes a variety of computer readable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. The system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information between elements within computer 110, such as during start-up, is typically stored in ROM 131. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120. By way of example, and not limitation,
The computer 110 may also include other removable/nonremovable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
The computer 110 in the present invention may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180. The remote computer 180 may be a personal computer, and typically includes many or all of the elements described above relative to the computer 110, although only a memory storage device 181 has been illustrated in
When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170. When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the Internet. The modem 172, which may be internal or external, may be connected to the system bus 121 via the user-input interface 160, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
Although many other internal components of the computer 110 are not shown, those of ordinary skill in the art will appreciate that such components and the interconnection are well known. Accordingly, additional details concerning the internal construction of the computer 110 need not be disclosed in connection with the present invention.
The reference created by the centralized identity service 50 may be any type of reference, such as an alphanumeric indicator. The reference serves as a pointer to the unique identity created by the identity owner. The identity itself can include any number of components that the identity owner wants other system users to access. Although the present system is directed to electronic communications management, the identity may include personal data such as photographs, home address, birthday, hobbies, occupation or any information the identity owner would like to allow other system users to access.
The data storage section 32 may store a personal directory 34, permissions 36, and preferences 38. The personal directory 34 may be established by a system user to include a plurality of contacts. These contacts give the system user the ability to access and possess information about other system users and allow the system user to access identities of other system users.
The control modules 40 may include look-up tools 42 to assist system users in looking up contacts stored in the personal directory 34 or in looking up references stored in the centralized identity service 50. Preference controls 43 set preferences 38 such as default settings for delivery methods, modes, devices, and times as described above. A user interface for utilizing the preference controls 43 is described below with reference to
Transmission controls 45 assist a system in transmitting communications to other system users. The transmission controls 45 allow a system user to select a delivery method such as “live” or “message” and a mode, such as video, audio, or text. If the system user sends a message, the transmission controls 45 allow the system user to maintain control over the message until the receiver reads or hears the message. Using the transmission controls 45, the sender can retract the message if it is time sensitive. The receiver will be unaware that the message was ever sent. A user interface for transmitting communications is further described below with reference to
Translation services 46 translate the communication if a receiver has restricted the sender to a mode different from the one selected by the sender. For instance if the sender wants to send an email message, but the receiver has elected to receive the sender's communications by voice mail, the translation services 46 will translate the message from text to audio or email to voice mail.
The user interface shown in
The present invention has been described in relation to particular embodiments, which are intended in all respects to be illustrative rather than restrictive. Alternative embodiments will become apparent to those skilled in the art to which the present invention pertains without departing from its scope. For instance, although the invention is described as having a centralized identity service 50 and individual identity management systems 20, these components could be combined into one service or distributed differently such that more system controls may be centrally located.
From the foregoing, it will be seen that this invention is one well adapted to attain all the ends and objects set forth above, together with other advantages, which are obvious and inherent to the system and method. It will be understood that certain features and sub-combinations are of utility and may be employed without reference to other features and sub-combinations. This is contemplated and with the scope of the claims.
This is a continuation application of application Ser. No. 10/602,626, filed Jun. 25, 2003, the entirety of which is incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
5493692 | Theimer et al. | Feb 1996 | A |
5689642 | Harkins et al. | Nov 1997 | A |
5928325 | Shaughnessy et al. | Jul 1999 | A |
6311210 | Foladare et al. | Oct 2001 | B1 |
6359970 | Burgess | Mar 2002 | B1 |
6526129 | Beaton et al. | Feb 2003 | B1 |
6631398 | Klein | Oct 2003 | B1 |
6714519 | Luzzatti et al. | Mar 2004 | B2 |
6751297 | Nelkenbaum | Jun 2004 | B2 |
6766002 | Cannon et al. | Jul 2004 | B1 |
6839410 | Infosino | Jan 2005 | B2 |
6895257 | Boman et al. | May 2005 | B2 |
7054621 | Kennedy | May 2006 | B2 |
7099304 | Liu et al. | Aug 2006 | B2 |
7139806 | Hayes et al. | Nov 2006 | B2 |
7143356 | Shafrir et al. | Nov 2006 | B1 |
7162640 | Heath et al. | Jan 2007 | B2 |
7164936 | Heatley | Jan 2007 | B2 |
7177403 | Meyerson et al. | Feb 2007 | B2 |
7216143 | Creamer et al. | May 2007 | B2 |
7240298 | Grossman et al. | Jul 2007 | B2 |
7260715 | Pasieka | Aug 2007 | B1 |
7496628 | Arnold et al. | Feb 2009 | B2 |
7512655 | Armstrong et al. | Mar 2009 | B2 |
7631062 | Motoyama | Dec 2009 | B2 |
7639157 | Whitley et al. | Dec 2009 | B1 |
7710945 | Jonsson | May 2010 | B2 |
7774823 | Goldthwaite et al. | Aug 2010 | B2 |
20020128033 | Burgess | Sep 2002 | A1 |
20020149705 | Allen et al. | Oct 2002 | A1 |
20030031304 | Heatley et al. | Feb 2003 | A1 |
20030041048 | Balasuriya | Feb 2003 | A1 |
20030050096 | Heatley | Mar 2003 | A1 |
20030065779 | Malik et al. | Apr 2003 | A1 |
20030078033 | Sauer et al. | Apr 2003 | A1 |
20030104805 | Weksel | Jun 2003 | A1 |
20040010549 | Matus et al. | Jan 2004 | A1 |
20040073643 | Hayes et al. | Apr 2004 | A1 |
20040100974 | Kreiner et al. | May 2004 | A1 |
20040148506 | Prince | Jul 2004 | A1 |
20040187013 | Heath et al. | Sep 2004 | A1 |
20040248560 | Bedingfield et al. | Dec 2004 | A1 |
20070240081 | Grossman et al. | Oct 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
20100255815 A1 | Oct 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10602686 | Jun 2003 | US |
Child | 12819789 | US |