US20050182644A1 - E-service to manage contact information with privacy levels - Google Patents

E-service to manage contact information with privacy levels Download PDF

Info

Publication number
US20050182644A1
US20050182644A1 US11/035,249 US3524905A US2005182644A1 US 20050182644 A1 US20050182644 A1 US 20050182644A1 US 3524905 A US3524905 A US 3524905A US 2005182644 A1 US2005182644 A1 US 2005182644A1
Authority
US
United States
Prior art keywords
user
electronic business
business card
card file
web site
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/035,249
Inventor
James Douvikas
Terry Sheehy
Christopher McKay
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/035,249 priority Critical patent/US20050182644A1/en
Publication of US20050182644A1 publication Critical patent/US20050182644A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3678Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99939Privileged access

Definitions

  • the present disclosure relates to electronic commerce, more specifically electronic storage and retrieval of information.
  • the information on a card is public, yet other information (such as a mobile or home phone number) is necessarily shared with some acquaintances. In such situations, the cardholder or recipient must firnble for a pen and the additional data must be dictated and captured.
  • Electronic means of capturing and storing conventional business card data are currently known. Examples of this technology include card scanners, personal digital assistant (PDA) devices and related software, electronic address books, commercial email programs such as Microsoft®D Outlook having their own electronic address books, “smart phones” or PDA/wireless communication device hybrids, Internet (also referred to as the World Wide Web, or simply “Web”) based contact organizers, and the like.
  • PDA personal digital assistant
  • This technology all suffers from the same limitation in that it generally lacks multi-level privacy for users and cardholders, it cannot help locate the cardholder, it (generally) lacks the ability to seamlessly export to or import from other database systems, and (with the possible exception of some prior art Web-based contact organizers) it lacks centralized control and universal access.
  • What is needed is a widely-accessible electronic service and method for organizing contact information entered by cardholders, including but not limited to all of the information on a standard business card.
  • This service must provide for the ability to export data to standard databases. Privacy of information should be configurable at an information record and field level by the cardholder so that access to some records and some fields in all records can be denied to certain people while access to other records and fields is still allowed.
  • a location feature to allow service users to determine how to best reach a listed cardholder at a given time is also desirable.
  • a dynamic electronic link such as the % vell-known Internet hyperlink, is also needed to connect the recipients of email from a cardholder to the service.
  • an electronic business card (EBC) access and organization system operates from a Web-based computer system that includes a database and-software for managing access, data privacy, and dynamic updates.
  • the cardholder database i.e., the database containing records of each registered cardholder (or “Member” of the EBC system)
  • the EBC system may be installed behind a conventional network “firewall” security device and thus made accessible only to browsers connected to and authorized to use the intranet defined by and behind the firewall.
  • Access to and delivery of contact information in the EBC system is not limited to a Web browser interface as commonly known today.
  • Some embodiments of the present invention provide multi-mode access interfaces, including but. not limited to interfaces using voice-controlled and conventional wireless PDA and/or cell phones, two-way pagers, and wireless access protocol (WAP)-enabled devices.
  • Further embodiments of the present invention provide data delivery interface embodiments using, for example, the common alphanumeric pager, wireless markup language (WML), or voice delivery (e.g., audio playback) systems commonly used in the art.
  • WML wireless markup language
  • voice delivery e.g., audio playback
  • Users are permitted to search for cardholder information. Access to individual records is controlled at both the record level and the field level. Users having certain permissions (set by the cardholder) are permitted to read a defined group of records, though not necessarily all fields in each record. Thus, a cardholder may make her business information available to all users (or all users in a defined group or groups, such as “Aerospace Engineers” or “Family”), but keep certain information, such as her cellular phone number, private to all but a few individuals. Access control is implemented, in some embodiments of the present invention, with multiple privacy levels for each field, in addition to the well-known “public” and “private” levels.
  • the cardholder can specify the degree of privacy associated for each field.
  • a cellular phone number may be designated as semi-private and thus available to only those defined users granted “semi-private” access to the cardholder's data.
  • more than three privacy levels are defined, allowing even more degrees of privacy and finer-grained access control.
  • FIG. 1 is a high-level schematic of the hardware platform, according to one embodiment of the present invention.
  • FIG. 2 is a flowchart of the “Search” process, according to one embodiment of the present invention.
  • FIG. 3A is a screen shot of the Member Login display, according to one embodiment of the present invention.
  • FIG. 3B is a screen shot of the Search display, according to one embodiment of the present invention.
  • FIG. 4 is a screen shot of the Card Display screen, according to one embodiment of the present invention.
  • FIG. 5 is a flowchart of the “Make New Member” process, according to one embodiment of the present invention.
  • FIG. 6 is a screen shot of the Terms & Conditions display, according to one embodiment of the present invention.
  • FIG. 7 is a screen shot of the New User data entry display, according to one embodiment of the present invention.
  • FIG. 8 is a screen shot of the Registration Confirmation display, according to one embodiment of the present invention.
  • FIG. 9 is a screen shot of the Welcome display, according to one embodiment of the present invention.
  • FIG. 10 is a screen shot of the My ecardfile display, according to one embodiment of the present invention.
  • FIG. 11 is a flowchart of the Export process, according to one embodiment of the present invention.
  • FIG. 12 is a screen shot of the File Maintenance display, according to one embodiment of the present invention.
  • FIG. 13 is a screen shot of the Export display, according to one embodiment of the present invention.
  • FIG. 14 is a flowchart of the “Where Am I?” process, according to one embodiment of the present invention.
  • FIG. 15 is a screen shot of the “Where Am I?” display, according to one embodiment of the present invention.
  • FIG. 16 is a flowchart of the signature hyperlink export process, according to one embodiment of the present invention.
  • FIG. 17 is a screen shot signature hyperlink export display, according to one embodiment of the present invention.
  • FIG. 18 is a function block diagram of the Boomerang software application, according to one embodiment of the present invention.
  • FIG. 19A is a schematic map of some of the database relationships, according to one embodiment of the present invention.
  • FIG. 19B is a schematic map of some of the database relationships, according to one embodiment of the present invention.
  • FIG. 19C is a schematic map of some of the database relationships, according to one embodiment of the present invention.
  • the electronic business card (EBC) access and organization system consists of a hardware complex providing the physical interface to the Internet, firewall security, web server functionality, data storage, and system redundancy protection.
  • the hardware is controlled and operated by computer instructions (i.e., software) in various forms, including but not limited to microcode, firmware, assembly and other high-level language modules.
  • the EBC system is the integration of the hardware and software elements to perform the functions and provide the features noted in the Summary above.
  • the EBC access and organization system (also referred to as ecardfileTM, the Hewlett-Packard® product embodying a certain aspect of the present invention) is run on 4 N-class Hewlett-Packard 9000 computers 110, as shown in FIG. 1 .
  • These computers are configured, in one embodiment, with 4 Gigabytes (GB) of memory and 4 processors, running the HP-UX® operating system version 11.0.
  • Other memory/processor/operating system configurations are also possible.
  • Warm fail-over server (I I OD), which uses in one embodiment MC-Service GuardTM, a Hewlett-Packard product, protects database server 110 C.
  • N-class Hewlett-Packard 9000 Although an N-class Hewlett-Packard 9000 is described, those skilled in the art will realize that servers other than the N-class Ilewlett-Packard 9000 can be used. Accordingly, the invention is not limited to any particular type or brand of server.
  • the two front-end web servers 110A and IlOB are served by a two Cisco SystemsI, Inc. CatalystTM 5505 switches 130A and 130B, which are served by two Cisco Local DirectorM units 140A and 140B, which in turn are server by two Cisco PIX® Firewall units 150A and 150B.
  • the firewall units 150 connect through an internet service provider (ISP) local area network (LAN) 160 to the Internet 170.
  • ISP internet service provider
  • LAN local area network
  • the web servers are running, in one embodiment of the present invention, the Stronghold® Apache web server operating program, available from C2Net, Inc. This is a 128 bit secured web server. Other commercially-available server operating programs are also useable.
  • the Local Director units 140A and 140B load balance the incoming requests to the two web servers 1 1OA and 1I OB by switching packets in switches 130A and 130B.
  • the web content (resident in web servers 110A and 11 OB) is dynamically built with the aid of server-side JavaTM applications known as serylets.
  • the JRumm serylet engine (in one embodiment of the present invention, version 2.3, build 145) executes these serylets, with the aid of a dynamic loaded module within the Apache web server operating program.
  • the serylets are written to conform to the Java Serylet Development Kit API v2.1, available from Sun Microsystems, in order to properly interface with the Apache web server software.
  • a single Java virtual machine (in one embodiment of the present invention, the HP-UX Java Virtual Machine version 1.1.8.1) runs on the server and the serylet is loaded once when it is called. It is not loaded again until the serylet changes, and a modified serylet can be re-loaded without restarting the server.
  • the serylet stays resident in memory and is very fast. Static or persistent information can be shared across multiple invocations of the serylet, allowing the sharing of information between multiple users. For instance, a single database connection can be use by multiple browser requests.
  • Database Server 5 The database servers 1° C. and 110D run, in one embodiment of the present invention, Informix® Dynamic Server® Version 7.31.UC4.
  • JDBC JDBC applications programming interface
  • Informix' JDBC drivers in one embodiment of the present invention, driver version 1 .40.JC2.
  • JDBC ensures scalability and database and platform independence.
  • FIG. 2 A user's interaction with the ecardfile EBC system, according to one embodiment of the present invention, is illustrated in FIG. 2 .
  • This flowchart shows a typical use of the EBC system to perform a search on cardholder data. Note that, in some embodiments, the user need not be a registered Member of the ecardfile system. In an alternate embodiment, only registered Members can use the system.
  • Interaction begins at step 200.
  • the user starts a conventional Web browser, such as Internet Explorer or Netscape Navigator, 210, and enters the ecardfile Uniform Resource Locator (URL) 215.
  • This URL is the Internet address of the EBC system hardware described above and is defined, disseminated, and maintained through means well-known in the art.
  • Internet 170 generally speaking
  • the user's browser is redirected to a secure web site 218 by conventional techniques common in the art.
  • ecardfile returns the web browser codes (e.g., HTML) to the user to display the Member Login screen, shown in one embodiment in FIG. 3A .
  • the Member Login screen display consists of window 310 containing the ecardfile login graphic 320, copyright notice 330 and hyperlinks 340 and 345, to a terms of use page and a privacy statement, respectively.
  • step 230 of FIG. 2 the user selects the “Go” button (350) associated with the “View Cards” command in login graphic 320.
  • This selection brings up search screen 360 ( FIG. 3B ) in window 310.
  • the user is given the choice 232 of searching by cardholder name 234 or ecardfile ID number 236, a multi-digit number or multi-character alphanumeric value representing a cardholder. If the user selects lookup by name, the user is given the further choice 238 of searching by similar sounding names using, for example, the SoundEx software toolbox. In the latter case, the user checks check box 365 to conduct a sounds-like search.
  • the search begins 250 when the user selects the “Go” button 370 or 375 corresponding to the type of search desired in step 240.
  • the EBC system returns results 260 in the Results Screen 410 shown in FIG. 4 . This screen replaces search screen 360 in window 310.
  • a user may chose, at step 220 of FIG. 2 , to become a Member of the ecardfile user community, rather than performing a search.
  • the interaction follows the flowchart of FIG. 5 instead.
  • the process begins in step 501.
  • the user starts a Web browser 210 and visits the ecardfile login screen 320 as before (steps 215, 218, and 220).
  • the user selects the “Become New Member” button 370 ( FIG. 3A ) in step 510.
  • New User data entry screen 710 in window 310 brings up, in step 525, New User data entry screen 710 in window 310 (shown in FIGS. 7A and 7B ).
  • the user selects an ecardfile ID and password and fills out the personal data using conventional data entry means for any of the well-known access devices and systems discussed above, such as using a keyboard or a voice-controlled (audio) prompt and response scheme.
  • Privacy levels 720 are also set by the user for each field in the user (soon-to-be Member and Cardholder) data record. In one embodiment, depicted in FIGS.
  • Private denoted by the locked padlock icon 722
  • Semi- Private denoted by the partially-locked icon 724
  • Public denoted by the open lock icon 726.
  • Public and Private privacy levels represent the familiar “all access” and “no access” privacy settings known in the art.
  • Semi-Private privacy represents a level of access granted only to certain members of the public, such as a predefined group of users designated by the Member or by a EBC system administrator. Non-designated users do not have access to Semi-Private fields.
  • the user chooses to continue or not at step 535. If the user decides not to continue by pressing Cancel button 740 ( FIG. 7B ), the process ends at step 599. If, however, the user chooses Okay button 730, the system displays a Registration Confirmation page 810 ( FIG. 8 ) in window 310. Here the user is given the choice 545 to accept the terms of use of the EBC system (via Accept button 820) or to go back (via Back button 830) to step 530 to edit personal data or enter additional data.
  • a welcome screen 910 ( FIG. 9 ) is then displayed to the new Member, step 560, in window 310.
  • an authorization email message by conventional means.
  • an email message is as shown in Table I below.
  • This email authorization method provides a measure of additional security by ensuring that each Member is associated with a valid email address.
  • the email address is also used to verin a user identity in case of a lost password: on the user's request, the password will be sent to the authorized email address only.
  • the EBC system directs the Member (in step 580) to home page 1010 in window 310 ( FIG. 10 ).
  • FIG. 11 shows the process whereby a user is able to export card data to a file.
  • the user must first login to ecardfile.com.
  • file maintenance button 394 At step 1610, the user selects file maintenance button 394.
  • a user file maintenance screen ( FIG. 12 ) is then displayed, step 1620.
  • the user selects a card to export, step 1630, from the list of cards added by the user to his/her private list. These cards represent other users to whom the user has granted extra privileges. Non-member users do not have export privileges. Of course, only the information to which the user has been granted access is exported.
  • the exported card is formatted into a pre-defined data file structure readable by one or more conventional and commercially-available contact management programs.
  • the Member selects an icon or button denoting the function “Edit My Card.” In one embodiment of the present invention, this function is iconified in button 395.
  • the EBC system displays (step 1140) a user information screen (not shown) in window 310. The Member there selects a button denoting the function “Where Am I?” in step 1150.
  • the EBC system displays “Where Am I?” screen 1210 ( FIG. 15 ) in window 310 thereby prompting the Member for a phone number and additional details of the Member's location, step 1165.
  • This information also includes an expiration date, i.e., a date beyond which the “Where Am I?” data is no longer valid.
  • Signature Hyperlinking The process of exporting a signature hyperlink, shown in FIG. 16 , is almost the same as that of exporting a card, except that the user selects the My Card button 395 rather than the file maintenance button 394.
  • the options screen, shown in FIG. 17 is presented at step 1820.
  • the output of the process, step 1830, is a file containing either a hyperlink or a conventional vCard file, as selected from the options display of FIG. 17 .
  • Either the signature hyperlink or the vCard can then be used by conventional email programs.
  • Electronic mail sent by the cardholder is automatically formatted to contain a signature hypertext link, according to the well-known hypertext markup language (HTML) standard or any of its common variants, directing recipients of the email to the electronic business card access and organization system.
  • This hyperlink enables the recipient of the email to rapidly access the EBC system to locate the cardholder and/or obtain additional information. In effect, receipt of an email containing the hyperlink enables the recipient to easily become a user.
  • the signature hyperlink is part of the vCard feature known and implemented in common email programs such as Microsoft Outlook and Netscape Communicator®.
  • the signature hyperlink is implemented using the well-known email signature block feature.
  • ecardfile Help, Screens The following topics are the subject of individual help screens, available to any EBC system user or Member by pushing (in some embodiments of the present. invention) the Question Mark (”?”) button 390, shown in, e.g., FIG. 3A .
  • the contents of these help screens are reproduced below as an aid to understanding the EBC system.
  • Level 1- Public. Inforination at this level will be displayed to anyone who looks up your card. This could be anyone viewing cards from the World Wide Web, whether you know them or not.
  • Level 3- Private. Information at this level will displayed only to other ecardfile Members who are in your personal ecardfile and who have been designated to receive your private information.
  • All field information is set to private when you first fill out a Card Profile. Be sure to select other privacy levels for fields that are either semi-private or public.
  • Email Auth field is used only by ecardfile.com for verification purposes. It is never displayed on your Card. You must enter a current email address in the Email Auth field. Once you complete the Card Profile and click “,OK,” ecardfile sends an email to this address and waits for your reply before authorizing your membership and enabling you to log in. This authorization process has been designed to protect your privacy and identity.
  • Add others' cards to your ecardfile From your personal ecardfile screen use the Look Up fields to view the card of the Member you want to add. When the card is displayed, press the Add icon.
  • a signature file has an HTML link to your Card; when downloaded, the signature file will embed the link into all of your email messages. When someone reads your message and wants to view your contact information, he just clicks on the HTML link and is immediately connected to your Card and your up-to-the-minute contact information.
  • a vCard is a file that holds your contact information in a standard format.
  • Some email packages such as Microsoft Outlook and Netscape Communicator recognize this format and can treat it in a special way. Because it is not a live link, it may display old or inaccurate information, particularly if someone is reading an old email message from you.
  • Set/Change privacy levels ecardfile.com gives you two ways to control who sees what information about you: You can designate each field in your Card Profile with a specific privacy level that governs private, semi-private or public viewing of that field. Alternatively, you can specify which Members have access to which level of privacy about you. If a particular Member has access to your semi-private information, he or she will see all of the fields marked public or semi-private when viewing your card.
  • a public field has the open padlock icon selected.
  • a semi-private field has the partly-open padlock icon selected.
  • a private field as the closed padlock icon selected.
  • the controlling software application providing some of the EBC system functionality is called Boomerang.
  • the Boomerang application has five major components, shown schematically in FIG. 18 :
  • Boomerang is designed to scale and perform well under extreme loads. It is designed to operate on multiple processors simultaneously, i.e., with multiple instances of objects and methods. Multiple Web servers and Java virtual machines may be used as server loading and traffic demands.
  • most of the Boomerang application, Web server 1360 (in one embodiment of the present invention, Stronghold Apache), JRun Serylet Engine 1370, and a Remote Memory Invocation (RMI) registry will run on each of the two Web server machines I I OA and 1 I OB ( FIG. 1 ).
  • the JRun Serylet Engine 1370, and RMI registry are common Java objects; the RMI API allows a serylet to invoke the methods of a Java object executing on another machine.
  • the Session Manager 1310, another RMI registry, and the Informix database software 1380 will run on one of the databases servers 11° C. or II OD, the other database server acting as a warm fail-over device.
  • Member and “user” are used interchangeably to refer to a person who has established a login identify in the EBC system. Strictly speaking, however, a Member is a person who has completed the New Member process and properly replied to the authorization email; user is a person who has not.
  • This session When the system is first accessed, a session will be created. This session will be identified by a unique session ID. This ID will be used for the following tasks.
  • the session ID will make a record of this fact so that when a user returns to a page that requires user authentication or identification, the user will not be re-prompted to login.
  • the session ID will be passed from Web page to page as either a hidden field in a form or by rewriting the URL, both well-known techniques in the art.
  • the user may be given the option of saving authentication information in a local file, known in the art as a cookie. The system will check for this cookie prior to displaying the login page.
  • the session ID will expire if it has not been accessed in a time configured by the EBC system administrator.
  • This serylet is activated when a function requiring user authentication is called and the user has not yet logged in.
  • the login screen is shown and user name and password input received.
  • the input name and password are matched against a users table. If the user name is found and the proper password supplied, the request (and session ID, if present) is passed to the Search Serylet.
  • the Search Serylet requests a session ID if one was not passed to it, or validates the ID if one was passed. If the requested operation requires user authentication and the user has not already logged in, the Login Serylet is called. All URL and form parameters are passed to the application logic of the serylet for processing.
  • a HTML document (e.g., a results screen) is returned to the requestor, typically the browser window.
  • SQL structured query language
  • database connection pool 1390 creates a number of connections to the database, the precise number of which is configurable by the EBC system administrator. These connections are utilized by each serylet thread on an as-needed basis. Additional connections are created as demand requires; inactive connections are periodically recycled.
  • All pages displayed by the Boomerang application including the help and information screens, are dynamically generated.
  • the base HTML code and image links for these pages are stored as template files which are preloaded on serylet initialization. These files are parsed and custom tags replaced with data extracted from the database (or calculated) before sending the page to the requester and display to the user.
  • the EBC system also includes a set of shell and SQL scripts that operate on a periodic basis (i.e., are activated by cron) to perform housekeeping and maintenance tasks.
  • cron a periodic basis
  • the following program functions are required.
  • FIGS. 19A, 19B , and 19 C illustrate the database structure and one-to-many /6ne-to- one relationships between records and fields in one embodiment of the present invention.
  • the notations PK, FKI, and 11-15 represent SQL field labels.
  • SERIAL in particular, is a well-known data type.
  • the EBC system may be installed behind a conventional network “firewall” security device and thus made accessible only to browsers connected to and authorized to use the intranet defined by and behind the firewall.
  • Access to and delivery of contact information in the EBC system is also not limited to a Web browser interface as commonly known today.
  • Some embodiments of the present invention provide multi-mode access interfaces, including but not limited to interfaces using voice-controlled and conventional wireless PDA and/or cell phones, two-way pagers, and wireless air protocol (WAP)-enabled devices.
  • WAP wireless air protocol
  • FIG. 1 Further embodiments of the present invention provide data delivery interface embodiments using, for example, the common alphanumeric pager, wireless markup language (WML), or voice delivery (e.g., audio playback) systems commonly used in the art.
  • WML wireless markup language
  • voice delivery e.g., audio playback
  • the EBC system also provides an advanced search function that allows users to search for records matching specific, desired characteristics.
  • the cardholder can rapidly designate one of a pre-defined set of contact locations described by meatspace address, phone number, FAX number, and/or email address.
  • the method of the present invention may be performed in either hardware, software, or any combination thereof, as those terms are currently known in the art.
  • the present method may be carried out by software, firmware, or microcode operating on a computer or computers of any type.
  • software embodying the present invention may comprise computer instructions in any form (e.g., source code, object code, or interpreted code) stored in any computer-readable medium (e.g., ROM, RAM, magnetic media, punched tape or card, compact disc (CD) in any form, DVD).
  • computer-readable medium e.g., ROM, RAM, magnetic media, punched tape or card, compact disc (CD) in any form, DVD.
  • such software may also be in the form of a computer data signal embodied in a carrier wave, such as that found within the well-known Web pages transferred among computers connected to the Internet. Accordingly, the present invention is not limited to any particular platform, unless specifically stated otherwise in the present disclosure.
  • Cisco Systems and PIX are registered trademarks and Catalyst, Local Director are trademarks of Cisco Systerns, Inc., San Jose Calif.
  • Hewlett-Packard and HP-UX are registered trademarks and MC-Service Guard and ecardfile are trademarks of the Hewlett-Packard Company, Palo Alto, Calif.
  • Informix is a registered trademark and Infonnix Dynamic Server is a trademark of Informix Software, Menlo Park, Calif.
  • Java is a trademark of Sun Microsystems, Inc., Palo Alto, Calif.
  • JRun is a trademark of Allure Corp., Cambridge, Mass.
  • Microsoft is a registered trademark of Microsoft Corp., Redmond, Wash.
  • Netscape, Netscape Navigator, and Netscape Communicator are registered trademarks of Netscape Communications Corp., Mountain View, Calif.
  • Stronghold is a registered trademark of C2Net, Inc., Oakland, California.

Abstract

A method of providing access to a collection of electronic business cards, includes: providing an electronic business card file Web site to a user; allowing the creation of an electronic business card file by the user using said Web site, said creation comprising: allowing the user to enter information into a plurality of fields; storing said information; and sending an authentication email to the user, wherein a reply to said authentication email is required to complete said creation; allowing the user to search for one or more records; allowing the user to view said records; and if said creation is completed, allowing the setting of privacy levels by the user of each field, said setting comprising selecting one of more than two privacy levels.

Description

    CROSS-REFERENCE TO MICROFICHE APPENDIX
  • A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the patent and trademark office patent file or records, but otherwise reserves all copyright rights whatsoever.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present disclosure relates to electronic commerce, more specifically electronic storage and retrieval of information.
  • 2. Description of the Related Art
  • The ordinary paper business card has become ubiquitous worldwide. Social rituals have even developed concerning the exchange and scrutiny of these small slips of cardboard. By some estimates, billions of business cards change hands every day, yet the cards themselves have numerous shortfalls. Each business card contains only static information on the cardholder, i.e., the person for whom the card was printed and whose name is on the card. Business cards must be reprinted every time any cardholder information (such as a phone number, electronic mail [email] address, or title) changes. Business cards consume not inconsequential amounts of space, yet lack an inherent card-to-card organization. Thus, it can be difficult to retrieve information from a stack of cards, especially if that stack numbers in the hundreds or thousands of cards.
  • Privacy of information is also a growing issue among modern business people.
  • By definition, the information on a card is public, yet other information (such as a mobile or home phone number) is necessarily shared with some acquaintances. In such situations, the cardholder or recipient must firnble for a pen and the additional data must be dictated and captured.
  • Dynamic access to the cardholder by others is not addressed by the prior art 110 business card, as it only shows static location information as of the last printing of the card. Thus, if a business person is based in Huntington, New York but happens to be traveling to San Jose, Calif., that person's business card will not reflect the California address or phone numbers.
  • Electronic means of capturing and storing conventional business card data are currently known. Examples of this technology include card scanners, personal digital assistant (PDA) devices and related software, electronic address books, commercial email programs such as Microsoft®D Outlook having their own electronic address books, “smart phones” or PDA/wireless communication device hybrids, Internet (also referred to as the World Wide Web, or simply “Web”) based contact organizers, and the like. This technology all suffers from the same limitation in that it generally lacks multi-level privacy for users and cardholders, it cannot help locate the cardholder, it (generally) lacks the ability to seamlessly export to or import from other database systems, and (with the possible exception of some prior art Web-based contact organizers) it lacks centralized control and universal access. What is needed is a widely-accessible electronic service and method for organizing contact information entered by cardholders, including but not limited to all of the information on a standard business card. This service must provide for the ability to export data to standard databases. Privacy of information should be configurable at an information record and field level by the cardholder so that access to some records and some fields in all records can be denied to certain people while access to other records and fields is still allowed. A location feature to allow service users to determine how to best reach a listed cardholder at a given time is also desirable. A dynamic electronic link, such as the % vell-known Internet hyperlink, is also needed to connect the recipients of email from a cardholder to the service.
  • SUMMARY
  • In one embodiment of the present invention, an electronic business card (EBC) access and organization system operates from a Web-based computer system that includes a database and-software for managing access, data privacy, and dynamic updates. The cardholder database, i.e., the database containing records of each registered cardholder (or “Member” of the EBC system), is accessible from any Web browser connected to the Internet. Examples of such common Web browsers are Microsoft's Internet Explorer and Netscape® Navigator. In an alternate embodiment, the EBC system may be installed behind a conventional network “firewall” security device and thus made accessible only to browsers connected to and authorized to use the intranet defined by and behind the firewall.
  • Access to and delivery of contact information in the EBC system is not limited to a Web browser interface as commonly known today. Some embodiments of the present invention provide multi-mode access interfaces, including but. not limited to interfaces using voice-controlled and conventional wireless PDA and/or cell phones, two-way pagers, and wireless access protocol (WAP)-enabled devices. Further embodiments of the present invention provide data delivery interface embodiments using, for example, the common alphanumeric pager, wireless markup language (WML), or voice delivery (e.g., audio playback) systems commonly used in the art.
  • Users (those desiring access to one or more cardholder records) are permitted to search for cardholder information. Access to individual records is controlled at both the record level and the field level. Users having certain permissions (set by the cardholder) are permitted to read a defined group of records, though not necessarily all fields in each record. Thus, a cardholder may make her business information available to all users (or all users in a defined group or groups, such as “Aerospace Engineers” or “Family”), but keep certain information, such as her cellular phone number, private to all but a few individuals. Access control is implemented, in some embodiments of the present invention, with multiple privacy levels for each field, in addition to the well-known “public” and “private” levels. In these embodiments, the cardholder can specify the degree of privacy associated for each field. For example, a cellular phone number may be designated as semi-private and thus available to only those defined users granted “semi-private” access to the cardholder's data. In an alternate embodiment, more than three privacy levels are defined, allowing even more degrees of privacy and finer-grained access control.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present disclosure may be better understood and its numerous features and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
  • FIG. 1 is a high-level schematic of the hardware platform, according to one embodiment of the present invention.
  • FIG. 2 is a flowchart of the “Search” process, according to one embodiment of the present invention.
  • FIG. 3A is a screen shot of the Member Login display, according to one embodiment of the present invention.
  • FIG. 3B is a screen shot of the Search display, according to one embodiment of the present invention.
  • FIG. 4 is a screen shot of the Card Display screen, according to one embodiment of the present invention.
  • FIG. 5 is a flowchart of the “Become New Member” process, according to one embodiment of the present invention.
  • FIG. 6 is a screen shot of the Terms & Conditions display, according to one embodiment of the present invention.
  • FIG. 7 is a screen shot of the New User data entry display, according to one embodiment of the present invention.
  • FIG. 8 is a screen shot of the Registration Confirmation display, according to one embodiment of the present invention.
  • FIG. 9 is a screen shot of the Welcome display, according to one embodiment of the present invention.
  • FIG. 10 is a screen shot of the My ecardfile display, according to one embodiment of the present invention.
  • FIG. 11 is a flowchart of the Export process, according to one embodiment of the present invention.
  • FIG. 12 is a screen shot of the File Maintenance display, according to one embodiment of the present invention.
  • FIG. 13 is a screen shot of the Export display, according to one embodiment of the present invention.
  • FIG. 14 is a flowchart of the “Where Am I?” process, according to one embodiment of the present invention.
  • FIG. 15 is a screen shot of the “Where Am I?” display, according to one embodiment of the present invention.
  • FIG. 16 is a flowchart of the signature hyperlink export process, according to one embodiment of the present invention.
  • FIG. 17 is a screen shot signature hyperlink export display, according to one embodiment of the present invention.
  • FIG. 18 is a function block diagram of the Boomerang software application, according to one embodiment of the present invention.
  • FIG. 19A is a schematic map of some of the database relationships, according to one embodiment of the present invention.
  • FIG. 19B is a schematic map of some of the database relationships, according to one embodiment of the present invention.
  • FIG. 19C is a schematic map of some of the database relationships, according to one embodiment of the present invention.
  • The use of the same reference symbols in different drawings indicates similar or identical items.
  • DETAILED DESCRIPTION
  • Introduction
  • The electronic business card (EBC) access and organization system consists of a hardware complex providing the physical interface to the Internet, firewall security, web server functionality, data storage, and system redundancy protection. The hardware is controlled and operated by computer instructions (i.e., software) in various forms, including but not limited to microcode, firmware, assembly and other high-level language modules. The EBC system is the integration of the hardware and software elements to perform the functions and provide the features noted in the Summary above.
  • Hardware Platform
  • In one embodiment of the present invention, the EBC access and organization system (also referred to as ecardfile™, the Hewlett-Packard® product embodying a certain aspect of the present invention) is run on 4 N-class Hewlett-Packard 9000 computers 110, as shown in FIG. 1 . These computers are configured, in one embodiment, with 4 Gigabytes (GB) of memory and 4 processors, running the HP-UX® operating system version 11.0. Other memory/processor/operating system configurations are also possible. There are two front-end web servers (I IOA and 110B) talking to a database server (1 IOC) that has access to one or more shared automatic redundant arrays of inexpensive disk drives (RAIDs) 120, each RAID having 64 GB of memory. Warm fail-over server (I I OD), which uses in one embodiment MC-Service Guard™, a Hewlett-Packard product, protects database server 110C.
  • Although an N-class Hewlett-Packard 9000 is described, those skilled in the art will realize that servers other than the N-class Ilewlett-Packard 9000 can be used. Accordingly, the invention is not limited to any particular type or brand of server.
  • Web Servers
  • The two front-end web servers 110A and IlOB are served by a two Cisco SystemsI, Inc. Catalyst™ 5505 switches 130A and 130B, which are served by two Cisco Local DirectorM units 140A and 140B, which in turn are server by two Cisco PIX ® Firewall units 150A and 150B. The firewall units 150 connect through an internet service provider (ISP) local area network (LAN) 160 to the Internet 170.
  • The web servers are running, in one embodiment of the present invention, the Stronghold® Apache web server operating program, available from C2Net, Inc. This is a 128 bit secured web server. Other commercially-available server operating programs are also useable.
  • The Local Director units 140A and 140B load balance the incoming requests to the two web servers 1 1OA and 1I OB by switching packets in switches 130A and 130B.
  • The web content (resident in web servers 110A and 11 OB) is dynamically built with the aid of server-side Java™ applications known as serylets. The JRumm serylet engine (in one embodiment of the present invention, version 2.3, build 145) executes these serylets, with the aid of a dynamic loaded module within the Apache web server operating program. The serylets are written to conform to the Java Serylet Development Kit API v2.1, available from Sun Microsystems, in order to properly interface with the Apache web server software.
  • The biggest advantage in using serylets as opposed to other web development tools is performance. A single Java virtual machine (in one embodiment of the present invention, the HP-UX Java Virtual Machine version 1.1.8.1) runs on the server and the serylet is loaded once when it is called. It is not loaded again until the serylet changes, and a modified serylet can be re-loaded without restarting the server. The serylet stays resident in memory and is very fast. Static or persistent information can be shared across multiple invocations of the serylet, allowing the sharing of information between multiple users. For instance, a single database connection can be use by multiple browser requests. Database Server 5 The database servers 1° C. and 110D run, in one embodiment of the present invention, Informix® Dynamic Server® Version 7.31.UC4. Other database server software packages and versions are also useable. Access to the database is via the industry standard JDBC applications programming interface (API) and Informix' JDBC drivers (in one embodiment of the present invention, driver version 1 .40.JC2). The use of JDBC ensures scalability and database and platform independence.
  • User Interaction
  • A user's interaction with the ecardfile EBC system, according to one embodiment of the present invention, is illustrated in FIG. 2. This flowchart shows a typical use of the EBC system to perform a search on cardholder data. Note that, in some embodiments, the user need not be a registered Member of the ecardfile system. In an alternate embodiment, only registered Members can use the system.
  • Interaction begins at step 200. The user starts a conventional Web browser, such as Internet Explorer or Netscape Navigator, 210, and enters the ecardfile Uniform Resource Locator (URL) 215. This URL is the Internet address of the EBC system hardware described above and is defined, disseminated, and maintained through means well-known in the art. Upon receipt and processing of the URL by Internet 170 (generally speaking), the user's browser is redirected to a secure web site 218 by conventional techniques common in the art.
  • Once connected, ecardfile returns the web browser codes (e.g., HTML) to the user to display the Member Login screen, shown in one embodiment in FIG. 3A. The Member Login screen display consists of window 310 containing the ecardfile login graphic 320, copyright notice 330 and hyperlinks 340 and 345, to a terms of use page and a privacy statement, respectively.
  • In step 230 of FIG. 2, the user selects the “Go” button (350) associated with the “View Cards” command in login graphic 320. This selection brings up search screen 360 (FIG. 3B) in window 310. In one embodiment of the present invention, the user is given the choice 232 of searching by cardholder name 234 or ecardfile ID number 236, a multi-digit number or multi-character alphanumeric value representing a cardholder. If the user selects lookup by name, the user is given the further choice 238 of searching by similar sounding names using, for example, the SoundEx software toolbox. In the latter case, the user checks check box 365 to conduct a sounds-like search.
  • The search begins 250 when the user selects the “Go” button 370 or 375 corresponding to the type of search desired in step 240. The EBC system returns results 260 in the Results Screen 410 shown in FIG. 4. This screen replaces search screen 360 in window 310.
  • A user may chose, at step 220 of FIG. 2, to become a Member of the ecardfile user community, rather than performing a search. In this case, the interaction follows the flowchart of FIG. 5 instead. The process begins in step 501. The user starts a Web browser 210 and visits the ecardfile login screen 320 as before (steps 215, 218, and 220). Here, however, the user selects the “Become New Member” button 370 (FIG. 3A) in step 510.
  • This selection brings up Terms screen 610 (FIG. 6) in window 310 (step 515). The user is then given choice 520 to go back to login screen 320 (which ends the “Become New Member” process, step 599) or to continue the process to step 525. Choice 520 is implemented, in one embodiment of the present invention, using Back button 620 and Continue button 630.
  • The selection of Continue button 630 brings up, in step 525, New User data entry screen 710 in window 310 (shown in FIGS. 7A and 7B). The user selects an ecardfile ID and password and fills out the personal data using conventional data entry means for any of the well-known access devices and systems discussed above, such as using a keyboard or a voice-controlled (audio) prompt and response scheme. Privacy levels 720 are also set by the user for each field in the user (soon-to-be Member and Cardholder) data record. In one embodiment, depicted in FIGS. 7A and 7B, three privacy levels are possible: Private, denoted by the locked padlock icon 722; Semi- Private, denoted by the partially-locked icon 724; and Public, denoted by the open lock icon 726. Public and Private privacy levels represent the familiar “all access” and “no access” privacy settings known in the art. Semi-Private privacy represents a level of access granted only to certain members of the public, such as a predefined group of users designated by the Member or by a EBC system administrator. Non-designated users do not have access to Semi-Private fields.
  • Although a three-level (Private, Semi-Private, and Public) privacy scheme is described, those skilled in the art will realize that privacy (or security) schemes implemented in more than three levels can be used. For example, a variety of different user groups can be defined with exclusive Semi-Private access given to some groups over others on a field-by-field basis. Accordingly, the invention is not limited to any particular number of privacy levels.
  • Once all requested information has been entered (or left blank, where optional as defined by the EBC system), the user chooses to continue or not at step 535. If the user decides not to continue by pressing Cancel button 740 (FIG. 7B), the process ends at step 599. If, however, the user chooses Okay button 730, the system displays a Registration Confirmation page 810 (FIG. 8) in window 310. Here the user is given the choice 545 to accept the terms of use of the EBC system (via Accept button 820) or to go back (via Back button 830) to step 530 to edit personal data or enter additional data.
  • If the user accepts the terms of use, and email message is automatically dispatched 550 by the EBC system to the new Member's designated authorizing email address (field 750 in FIG. 7B). A welcome screen 910 (FIG. 9) is then displayed to the new Member, step 560, in window 310.
  • Meanwhile, the user (now a Member) receives an authorization email message by conventional means. In one embodiment of the present invention, such an email message is as shown in Table I below. This email authorization method provides a measure of additional security by ensuring that each Member is associated with a valid email address. The email address is also used to verin a user identity in case of a lost password: on the user's request, the password will be sent to the authorized email address only.
  • When the user selects the embedded hyperlink (in this example, the string beginning http://ecardfile.com . . . ) in step 570, the EBC system directs the Member (in step 580) to home page 1010 in window 310 (FIG. 10). In some embodiments (not shown), home page 1010 is personalized with Member data, such as the Member's name.
    TABLE 1
    Welcome! You have been added as a new Member of ecardfile.com. To
    activate your password, please click on the Web address below:
    http://ecardfile.com/search?op=Confirm&eCardId=terry&createId=
    0Av4Jj6nWZwA4
    You can also type the above Web address into your Web browser.
    Once you have connected to the ecardfile.com site through the above
    address, your password activation is complete, and you can begin to
    enjoy the ease and convenience of having your business contact
    information on the Web.
    If you do not connect to ecardfile.com through the above address
    within two weeks, your card will be deactivated.
    We look forward to having you as an ecardfile.com Member!
    webmaster@ecardfile.com

    Export Process
  • FIG. 11 shows the process whereby a user is able to export card data to a file. As above, the user must first login to ecardfile.com. At step 1610, the user selects file maintenance button 394. A user file maintenance screen (FIG. 12) is then displayed, step 1620. The user selects a card to export, step 1630, from the list of cards added by the user to his/her private list. These cards represent other users to whom the user has granted extra privileges. Non-member users do not have export privileges. Of course, only the information to which the user has been granted access is exported.
  • The user next selects the export button 1710 (FIG. 12) in step 1640, which brings up an export options screen, shown in FIG. 13. The user selects the desired output format, step 1660, and is presented with a conventional “Save As” dialog, step 1670. The user enters a name of the file into which the card export will be saved, step 1680 and selects the Save button, step 1685. If Save is selected, the data will be saved by conventional means in step 1687. If not, as when the user selects “Cancel” instead, the process drops to the end state, step 1690, and returns to waiting for user input. The exported card is formatted into a pre-defined data file structure readable by one or more conventional and commercially-available contact management programs. In some embodiments, custom export file formats may also be defined by the user to provide even wider connectivity and cross-platform utility. “Where Am I?” Contact Location Tracking The process of setting up a temporary location pointer for a specific Cardholder/Member begins in step 1110 of FIG. 14. As before, the Member sets his or her browser to the appropriate EBC system URL and connects to the system, steps 210, 215, 218, and 220. The Member then logs in, step 11 20, and is displayed home page 1010 (FIG. 10) in step 1130.
  • The Member then selects an icon or button denoting the function “Edit My Card.” In one embodiment of the present invention, this function is iconified in button 395. In response, the EBC system displays (step 1140) a user information screen (not shown) in window 310. The Member there selects a button denoting the function “Where Am I?” in step 1150.
  • At this point (step 1160), the EBC system displays “Where Am I?” screen 1210 (FIG. 15) in window 310 thereby prompting the Member for a phone number and additional details of the Member's location, step 1165. This information also includes an expiration date, i.e., a date beyond which the “Where Am I?” data is no longer valid.
  • To exit the “Where Am I?” information dialog, the Member clicks Okay button 1220 (step 1167), to save the “Where Am I?” data, or the Back button 1230 to cancel “Where Am I?” data input. The process returns to a display of the user information screen, step 1140, and stops, step 1199. Signature Hyperlinking The process of exporting a signature hyperlink, shown in FIG. 16, is almost the same as that of exporting a card, except that the user selects the My Card button 395 rather than the file maintenance button 394. The options screen, shown in FIG. 17, is presented at step 1820. The output of the process, step 1830, is a file containing either a hyperlink or a conventional vCard file, as selected from the options display of FIG. 17.
  • Either the signature hyperlink or the vCard (which can also contain a hyperlink) can then be used by conventional email programs. Electronic mail sent by the cardholder is automatically formatted to contain a signature hypertext link, according to the well-known hypertext markup language (HTML) standard or any of its common variants, directing recipients of the email to the electronic business card access and organization system. This hyperlink enables the recipient of the email to rapidly access the EBC system to locate the cardholder and/or obtain additional information. In effect, receipt of an email containing the hyperlink enables the recipient to easily become a user. In some embodiments, the signature hyperlink is part of the vCard feature known and implemented in common email programs such as Microsoft Outlook and Netscape Communicator®. In an alternate embodiment, the signature hyperlink is implemented using the well-known email signature block feature. ecardfile Help, Screens The following topics are the subject of individual help screens, available to any EBC system user or Member by pushing (in some embodiments of the present. invention) the Question Mark (”?”) button 390, shown in, e.g., FIG. 3A. The contents of these help screens are reproduced below as an aid to understanding the EBC system.
  • Become a Member
      • * Set up your card
      • * Set up “VWhere Am I?”
      • * Add others' cards to your ecardfile
      • * Exchange cards with others
      • * Set/change privacy levels
      • * Export cards to your address book
      • * Set up your email signature
      • * Contact ecardfile.com support
  • Become a Member
  • As an ecardfile Member, you set up your own Card Profile and establish your own unique Card ID and Password. Then, whenever you log in, you are located at your personal ecardfile and can view cards from other Members and add them into your ecardfile.
  • Let's walk through the process of becoming a Member.
  • 1. From the Member login screen, click the Become a Member button.
  • 2. Fill in your Card Profile: the profile contains all of your contact information and can be updated as needed. See the help menu topic “Set Up Your Card” for more information.
  • After your membership is confirmed, you can log in to ecardfile.com using your Card ID and password. After log in, you are brought to your personal ecardfile area. Here is where you can store other Member cards and perform functions such as adding, deleting, changing the privacy level access to your Card that you have given to other Members, and exporting a card to your address book.
  • It's a good idea to keep your “Where Am I?” information current. To access it, click on the My Card Profile icon and scroll to the bottom of the screen.
  • The more people you know who join ecardfile.com, the easier it is to use this convenient way to access business information. To help get the word out, please download your personal email signature or vCard (accessible from the export button at the bottom of your Card Profile) and attach it to all your emails. When people receive email from you, they can click on your signature link and go directly to your Card Profile in ecardfile.com. From there, they cart also choose to become ecardfile Members, if they are not Members already.
  • Set Up Your Card When filling in your Card Profile, please keep a few concepts in mind: When selecting your Card ID, use up to 40 alphanumeric characters. Because you will be giving out this ID to your business and personal contacts, make your ID simple and easy to remember; it's use is similar to that of your email username. Although ecardfile.com also enables you to be looked up through a first name/last name search, it will usually be much faster for people to look you up by your Card ID.
  • When selecting your password, use up to 10 alphanumeric characters. Make your password something easy for you to remember and hard for others to guess.
  • As you are entering information into your Card Profile, please keep in mind that ecardfile.com gives you three levels of privacy for each field:
  • Level 1- Public. Inforination at this level will be displayed to anyone who looks up your card. This could be anyone viewing cards from the World Wide Web, whether you know them or not.
  • Level 2- Semi-Private. Information at this level will displayed only to other ecardfile Members who are in your personal ecardfile and who have been designated to receive your semi-private information.
  • Level 3- Private. Information at this level will displayed only to other ecardfile Members who are in your personal ecardfile and who have been designated to receive your private information.
  • All field information is set to private when you first fill out a Card Profile. Be sure to select other privacy levels for fields that are either semi-private or public.
  • The Email Auth field is used only by ecardfile.com for verification purposes. It is never displayed on your Card. You must enter a current email address in the Email Auth field. Once you complete the Card Profile and click “,OK,” ecardfile sends an email to this address and waits for your reply before authorizing your membership and enabling you to log in. This authorization process has been designed to protect your privacy and identity.
  • Add others' cards to your ecardfile From your personal ecardfile screen, use the Look Up fields to view the card of the Member you want to add. When the card is displayed, press the Add icon.
  • If you would like to give this Member access to your semi-private or private ecardfile information, be sure to change the privacy level displayed next to the Member's name. See the help topic “Set/change privacy levels” for more information.
  • Exchange cards with others
  • In order to protect your privacy, ecardfile.com offers several ways you can exchange cards with others.
  • Anyone, whether they know you or not, can look you up by name and see the information designated as “public” in your Card Profile. Note: for this reason, you may decide not to have your email addresses be part of your public information.
  • Casual or new acquaintances can look you up by name search or by Card ID and see the information designated as “public” in your Card Profile.
  • Members can look you up by name search or Card ID and see the public, semi- private or private information you have specifically designated for them.
  • For example, let's say a new person, Hans, has joined your project team; he works out of your company's Munich office, and you are in Los Angeles. Hans is not yet a Member of ecardfile.com.
  • 1. At the initial team conference call, you give Hans your Card ID and tell him that's where all your contact information is.
  • 2. Hans accesses ecardfile.com and becomes a Member. He looks up your Card and adds it to his personal ecardfile. He wants you to have his semi-private information so he marks your card with the semi-private access key.
  • 3. You look up Hans's card and add it to your personal ecardfile. You then mark Hans's card with the semi-private access key so that he can see more detailed information about you than what appears on your public card.
  • 4. Over the next 6 months, Hans changes office locations and gets a new phone number; your fax number changes, and the Post Office gives your part of town a new zip code. Thanks to ecardfile.com, your contact information is always current.
  • Set Up “here Am I?”
  • From your Card Profile, scroll to the bottom of the screen and click on “Where Am I?” You'll have the option to input a current phone number, details about your whereabouts, and an expiration date. Note that you can specify different privacy levels for the phone number, details and expiration fields, so you might want your phone number to be public, while the details of where you are remain private. To see another Member's “Where Am I?” information, select her card from your personal ecardfile or look up her card. When the card is displayed, scroll to the bottom of the screen and click on “Where Am I?” The expiration date uses the date at the ecardfile server's location, US Pacific Standard Time (PST). The expiration date is customizable to the ecardfile Member's own location.
  • Set up your email signature
  • Use this function to download a signature file or a vCard from ecardfile.com to your email system. Access it by going to your Card Profile, scrolling to the bottom of the screen, and clicking on Export. Then follow the instructions on the screen to export to your particular email system.
  • A signature file has an HTML link to your Card; when downloaded, the signature file will embed the link into all of your email messages. When someone reads your message and wants to view your contact information, he just clicks on the HTML link and is immediately connected to your Card and your up-to-the-minute contact information.
  • A vCard is a file that holds your contact information in a standard format. Some email packages such as Microsoft Outlook and Netscape Communicator recognize this format and can treat it in a special way. Because it is not a live link, it may display old or inaccurate information, particularly if someone is reading an old email message from you.
  • If your email package, or more importantly the message recipient's email package, does not support HTML tags or vCards, you may cut and paste the HTML link displayed and attach it to your messages. The recipient just clicks or cut and pastes the HTML link into a browser and is immediately connected to your Card and your up-to-the-minute contact information.
  • Export cards toyour address book Use this function to download cards from your personal ecardfile to your email address book.
  • 1. Go to your personal ecardfile.
  • 2. Select the card for export by placing a check mark next to it.
  • 3. Click on the maintenance button.
  • 4. Select export.
  • 5. Select the format of your address book.
  • 6. Follow the online instructions to export the card information.
  • Contact ecardfile.com support hyperlink Here, an email window automatically pops up if this link is selected, and ecardfile.com's technical support address is automatically inserted into the “To” field.
  • Get help on a specific screen, field or icon To get help on a specific screen or field, place the mouse arrow on the gray bar of the screen and press the “Help” key on the keyboard.
  • To get help on a specific icon, pass the mouse over the icon, and the icon title will display.
  • One of ordinary skill in the art will appreciate that many other methods of activating context sensitive help are known in the art; the present disclosure is intended to encompass all such well-known methods and is not limited to any single form. Set/Change privacy levels ecardfile.com gives you two ways to control who sees what information about you: You can designate each field in your Card Profile with a specific privacy level that governs private, semi-private or public viewing of that field. Alternatively, you can specify which Members have access to which level of privacy about you. If a particular Member has access to your semi-private information, he or she will see all of the fields marked public or semi-private when viewing your card.
  • Designate Your Card Profile privacy:
  • To change privacy levels on a field in your Card Profile (for example, to make your business email address, which had been public, semi-private) click on the My Card Profile icon and then click the appropriate new privacy button next to the email address field. A public field has the open padlock icon selected. A semi-private field has the partly-open padlock icon selected. A private field as the closed padlock icon selected.
  • Specif Member privacy:
  • Let's say you want to give your new manager access to your private information.
  • 1. From your personal ecardfile, look up your manager's card and add it to your file.
  • 2. Select the card for maintenance by placing a check mark next to it.
  • 3. Click on the Maintenance button.
  • 4. Select Edit Privacy.
  • 5. Select the new privacy level you want your new manager to have about you.
  • 6. Select Update to save the new privacy level.
  • Now, whenever your new manager accesses your Card, she will see all information you have designated as public, semi-private and private.
  • Software ImDlementation
  • In one embodiment of the present invention, the controlling software application providing some of the EBC system functionality is called Boomerang. The Boomerang application has five major components, shown schematically in FIG. 18:
      • 1. Session Manager daemon 1310, which maintains state information;
      • 2. Login Serylet 1320, which handles user/Member authentication;
      • 3. Search Serylet 1330, which handles most of the user/Member interface functionality;
      • 4. JDBC Objects/Classes 1340, which implement the database functionality; and
      • 5. HTML Template Engine, which handles conventional dynamic HTML processing. This component is typically implemented in Java and reads HTML tagged files.
  • Boomerang is designed to scale and perform well under extreme loads. It is designed to operate on multiple processors simultaneously, i.e., with multiple instances of objects and methods. Multiple Web servers and Java virtual machines may be used as server loading and traffic demands.
  • In one embodiment of the present invention, most of the Boomerang application, Web server 1360 (in one embodiment of the present invention, Stronghold Apache), JRun Serylet Engine 1370, and a Remote Memory Invocation (RMI) registry will run on each of the two Web server machines I I OA and 1 I OB (FIG. 1). The JRun Serylet Engine 1370, and RMI registry are common Java objects; the RMI API allows a serylet to invoke the methods of a Java object executing on another machine. The Session Manager 1310, another RMI registry, and the Informix database software 1380 will run on one of the databases servers 11° C. or II OD, the other database server acting as a warm fail-over device.
  • Software Components
  • In the following discussion, the terms “Member” and “user” are used interchangeably to refer to a person who has established a login identify in the EBC system. Strictly speaking, however, a Member is a person who has completed the New Member process and properly replied to the authorization email; user is a person who has not.
  • Session Manager 1310
  • When the system is first accessed, a session will be created. This session will be identified by a unique session ID. This ID will be used for the following tasks.
  • Once a user has successfully logged in, the session ID will make a record of this fact so that when a user returns to a page that requires user authentication or identification, the user will not be re-prompted to login. The session ID will be passed from Web page to page as either a hidden field in a form or by rewriting the URL, both well-known techniques in the art. Alternatively, the user may be given the option of saving authentication information in a local file, known in the art as a cookie. The system will check for this cookie prior to displaying the login page.
  • The session ID will expire if it has not been accessed in a time configured by the EBC system administrator.
  • Login Serylet 1320
  • This serylet is activated when a function requiring user authentication is called and the user has not yet logged in. The login screen is shown and user name and password input received. The input name and password are matched against a users table. If the user name is found and the proper password supplied, the request (and session ID, if present) is passed to the Search Serylet.
  • Search Serylet 1330
  • The Search Serylet requests a session ID if one was not passed to it, or validates the ID if one was passed. If the requested operation requires user authentication and the user has not already logged in, the Login Serylet is called. All URL and form parameters are passed to the application logic of the serylet for processing.
  • After processing the URL and form parameters, a HTML document (e.g., a results screen) is returned to the requestor, typically the browser window.
  • JDBC Objects/Classes 1340
  • These consist of generic JDBC classes that execute queries and return results in a Java hash table indexed by column name. To make more efficient use of database resources, all structured query language (SQL) statements are prepared at serylet initialization.
  • Also at serylet initialization, database connection pool 1390 creates a number of connections to the database, the precise number of which is configurable by the EBC system administrator. These connections are utilized by each serylet thread on an as-needed basis. Additional connections are created as demand requires; inactive connections are periodically recycled.
  • HTML Template Engine I
  • All pages displayed by the Boomerang application, including the help and information screens, are dynamically generated. The base HTML code and image links for these pages are stored as template files which are preloaded on serylet initialization. These files are parsed and custom tags replaced with data extracted from the database (or calculated) before sending the page to the requester and display to the user.
  • Administration Programs
  • In addition to the Boomerang application, the EBC system also includes a set of shell and SQL scripts that operate on a periodic basis (i.e., are activated by cron) to perform housekeeping and maintenance tasks. In particular, the following program functions are required.
      • a) Purge inactive users who have not activated themselves via the login email after a defined period of time, for example one month b) Expire “Where Am I?” temporary contact information c) Lock and unlock IP addresses (to prevent access by IP addresses that appear to be attempting to access the service for illicit purposes)
      • d) Rollover logs and reports One of ordinary skill in the art will recognize that these functions may be implemented in a single program or script or in a set of programs and/or scripts. Accordingly, the present invention is not limited by the method of implementation of these functions.
  • Database Schema
  • FIGS. 19A, 19B, and 19C illustrate the database structure and one-to-many /6ne-to- one relationships between records and fields in one embodiment of the present invention. In particular, relationship symbol 1410 denotes a one-to-many correspondence, the “one” side represented by the “=” sign end. See FIG. 19A for an example. Relationship symbol 1420 (see FIG. 19B) denotes a one-to-one mapping, the “one” side again represented by the “=” sign end.
  • The notations PK, FKI, and 11-15 represent SQL field labels. SERIAL, in particular, is a well-known data type.
  • Although a particular database schema and naming convention for records and fields is described, those skilled in the art will realize that schema other than that described can also be used. Accordingly, the invention is not limited to any particular type of database schema.
  • Alternate Embodiments
  • In an alternate embodiment, the EBC system may be installed behind a conventional network “firewall” security device and thus made accessible only to browsers connected to and authorized to use the intranet defined by and behind the firewall.
  • Access to and delivery of contact information in the EBC system is also not limited to a Web browser interface as commonly known today. Some embodiments of the present invention provide multi-mode access interfaces, including but not limited to interfaces using voice-controlled and conventional wireless PDA and/or cell phones, two-way pagers, and wireless air protocol (WAP)-enabled devices.
  • Further embodiments of the present invention provide data delivery interface embodiments using, for example, the common alphanumeric pager, wireless markup language (WML), or voice delivery (e.g., audio playback) systems commonly used in the art.
  • The EBC system also provides an advanced search function that allows users to search for records matching specific, desired characteristics. The search can be made based on one or more of a variety of database parameters, including but not limited to field value (e.g., NAME=Sheehy), date of entry, or a Boolean combination of search terms.
  • In an alternate embodiment of the “Where Am l?” location tracking feature, the cardholder can rapidly designate one of a pre-defined set of contact locations described by meatspace address, phone number, FAX number, and/or email address.
  • The order in which the steps of the processes depicted above are performed is purely illustrative in nature. In fact, the steps in each process flow can be performed in any order or in parallel, unless otherwise indicated by the present disclosure.
  • The method of the present invention may be performed in either hardware, software, or any combination thereof, as those terms are currently known in the art. In particular, the present method may be carried out by software, firmware, or microcode operating on a computer or computers of any type. Additionally, software embodying the present invention may comprise computer instructions in any form (e.g., source code, object code, or interpreted code) stored in any computer-readable medium (e.g., ROM, RAM, magnetic media, punched tape or card, compact disc (CD) in any form, DVD). Furthermore, such software may also be in the form of a computer data signal embodied in a carrier wave, such as that found within the well-known Web pages transferred among computers connected to the Internet. Accordingly, the present invention is not limited to any particular platform, unless specifically stated otherwise in the present disclosure.
  • While particular embodiments of the present invention have been shown and described, it will be apparent to those skilled in the art that changes and modifications may be made without departing from this invention in its broader aspect and, therefore, the appended claims are to encompass within their scope all such changes and modifications as fall within the true spirit of this invention.
  • Trademark Notices
  • Cisco Systems and PIX are registered trademarks and Catalyst, Local Director are trademarks of Cisco Systerns, Inc., San Jose Calif.
  • Hewlett-Packard and HP-UX are registered trademarks and MC-Service Guard and ecardfile are trademarks of the Hewlett-Packard Company, Palo Alto, Calif.
  • Informix is a registered trademark and Infonnix Dynamic Server is a trademark of Informix Software, Menlo Park, Calif.
  • Java is a trademark of Sun Microsystems, Inc., Palo Alto, Calif.
  • JRun is a trademark of Allure Corp., Cambridge, Mass.
  • Microsoft is a registered trademark of Microsoft Corp., Redmond, Wash.
  • Netscape, Netscape Navigator, and Netscape Communicator are registered trademarks of Netscape Communications Corp., Mountain View, Calif.
  • Stronghold is a registered trademark of C2Net, Inc., Oakland, California.

Claims (35)

1. A method of providing access to a collection of electronic business cards, comprising the steps of:
providing an electronic business card file Web site to a user;
allowing the creation of an-electronic business card file by the user using said Web site, said creation comprising:
allowing the user to enter information into a plurality of fields;
storing said information; and
sending an authentication email to the user, wherein a reply to said authentication email is required to complete said creation;
allowing the user to search for one or more records;
allowing the user to view said records; and
if said creation is completed, allowing the setting of privacy levels by the user of each field, said setting. comprising selecting one of more than two privacy levels.
2. The method of claim 1, wherein said electronic business card file Web site is accessible from the Internet.
3. The method of claim 1, wherein said electronic business card file Web site is accessible from an intranet isolated from the Internet by a firewall security device.
4. The method of claim 1, wherein said electronic business card file Web site is accessible from a web browser.
5. The method of claim 1, wherein said electronic business card file Web site is accessible from a personal digital assistant.
6. The method of claim 1, wherein said electronic business card file Web site is accessible from a browser-enabled telephone.
7. The method of claim 1, wherein said electronic business card file Web site is accessible by spoken commands.
8. The method of claim 1, wherein aid first format comprises audio playback.
9. A computer system for providing access to a collection of electronic business cards, comprising computer instructions for:
providing an electronic business card file Web site to a user;
allowing the creation of an electronic business card file by the user using said Web site, said creation comprising:
allowing the user to enter information into a plurality of fields;
storing said information; and
sending an authentication email to the user, wherein a reply to said authentication email is required to complete said creation;
allowing the user to search for one or more records;
allowing the user to view said records;
if said creation is completed, allowing the setting of privacy levels by the user for each said field, said setting comprising selecting one of more than two privacy levels.
10. The computer system of claim 9, wherein said electronic business card file Web site is accessible from the Internet.
11. The computer system of claim 9, wherein said electronic business card file Web site is accessible from an intranet isolated from the Internet by a firewall security device.
12. The computer system of claim 9, wherein said electronic business card file Web site is accessible from a web browser.
13. The computer system of claim 9, wherein said electronic business card file Web site is accessible from a personal digital assistant.
14. The computer system of claim 9, wherein said electronic business card file Web site is accessible from a browser-enabled telephone.
15. The computer system of claim 9, wherein said electronic business card file Web site is accessible by spoken commands.
16. The computer system of claim 9, wherein said first format comprises audio playback.
17-24. (canceled)
25. A computer data signal embodied in a carrier wave, comprising computer instructions for:
providing an electronic business card file Web site to a user;
allowing the creation of an electronic business card file by the user using said Web site, said creation comprising:
allowing the user to enter information into a plurality of fields;
storing said information; and
sending an authentication email to the user, wherein a reply to said authentication email is required to complete said creation;
allowing the user to search for one or more records;
allowing the user to view said records;
if said creation is completed, allowing the setting of privacy levels by the user for each said field, said setting comprising selecting one of more than two privacy levels.
26. The computer data signal of claim 25, wherein said electronic business card file Web site is accessible from the Internet.
27. The computer data signal of claim 25, wherein said electronic business card file Web site is accessible from an intranet isolated from the Internet by a firewall security device.
28. The computer data signal of claim 25, wherein said electronic business card file Web site is accessible from a web browser.
29. The computer data signal of claim 25, wherein said electronic business card file Web site is accessible from a personal digital assistant.
30. The computer data signal of claim 25, wherein said electronic business card file Web site is accessible from a browser-enabled telephone.
31. The computer data signal of claim 25, wherein said electronic business card file Web site is accessible by spoken commands.
32. The computer data signal of claim 25, wherein said first format comprises audio playback.
33. A computer data signal embodied in a carrier wave, comprising computer instructions for:
providing an electronic business card file web site to a user;
allowing the creation of an electronic business card file by the user using said Web site, said creation comprising:
allowing the user to enter information into a plurality of fields in the electronic business card file;
storing said information; and
sending an authentication email to the user, wherein a reply to said authentication email is required to complete said creation;
allowing the user to search for one or more records;
allowing the user to view said records and to export electronic business card data from records in a private list of the user to a file readable by a contact management program, wherein another user associated with a record in the private list has extra privileges granted by the user;
if said creation is completed, allowing the setting of privacy levels by the user for each said field, said setting comprising selecting one of more than two privacy levels, wherein the electronic business card file Web site is accessible by spoken commands, wherein the user can sent the privacy level to Private, Semi-Private, or Public for each particular field in the electronic business card file, wherein the user can set the privacy level to Privacy, Semi-Private, or Public by selecting a Private icon, Semi- Private icon, or Public icon, respectively, for a corresponding field in the electronic business card file; and
allowing the user to indicate a location of the user prior to an expiration date; and
sending an electronic mail by the user to a recipient, wherein the electronic mail contains a signature hypertext link that permits the recipient to access the electronic business card file Web site in order to create a new electronic business card file for the recipient and to access information in a permitted field of the electronic business card file of the user.
34. The method of claim 1, further comprising:
editing the electronic business card to permit a temporary location pointer to the user.
35. The computer system of claim 9, further comprising:
editing the electronic business card to permit a temporary location pointer to the user.
36. The method of claim 1, wherein the electronic business card file Web site is implemented by user of two front-end web servers and a database server that is accessed by the two front-end web servers.
37. The method of claim 1, wherein the user can set the privacy level to Private, Semi-Private, or Public by selecting a Private icon, Semi-Private icon, or Public icon, respectively, for a corresponding field in the electronic business card file.
38. The computer system of claim 9, wherein the electronic business card file Web site is implemented by use of two front-end web servers and a database server that is accessed by the two front-end and web servers.
39. The computer system of claim 9, wherein the user can set the privacy level to Private, Semi- Private, or Public by selecting a Private icon, Semi- Private icon, or Public icon, respectively, for a corresponding field in the electronic business card file.
40. A method of processing electronic business cards, the method comprising:
creating an electronic business card file by use of a communication network;
storing the electronic business card file in a storage device in the communication network; and
permitting a setting of at least one security level for at least one information field in the electronic business card file so that access is restricted for the information field.
41. An apparatus for processing electronic business cards, the apparatus comprising:
a communication network; and
a storage device connected to the communication network and configured to store an electronic business card file, wherein the electronic business card file is configured to permit a setting of at least one security level for at least one information field in the electronic business card file so that access is restricted for the information field.
42. An apparatus for processing electronic business cards, the apparatus comprising:
means for creating an electronic business card file by use of a communication network;
means for storing the electronic business card file in a storage device in the communication network; and
means for permitting a setting of at least one security level for at least one information field in the electronic business card file so that access is restricted for the information field.
US11/035,249 2000-02-18 2005-01-12 E-service to manage contact information with privacy levels Abandoned US20050182644A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/035,249 US20050182644A1 (en) 2000-02-18 2005-01-12 E-service to manage contact information with privacy levels

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/507,215 US6889213B1 (en) 2000-02-18 2000-02-18 E-service to manage contact information with privacy levels
US11/035,249 US20050182644A1 (en) 2000-02-18 2005-01-12 E-service to manage contact information with privacy levels

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/507,215 Division US6889213B1 (en) 2000-02-18 2000-02-18 E-service to manage contact information with privacy levels

Publications (1)

Publication Number Publication Date
US20050182644A1 true US20050182644A1 (en) 2005-08-18

Family

ID=24017705

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/507,215 Expired - Lifetime US6889213B1 (en) 2000-02-18 2000-02-18 E-service to manage contact information with privacy levels
US11/035,249 Abandoned US20050182644A1 (en) 2000-02-18 2005-01-12 E-service to manage contact information with privacy levels

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/507,215 Expired - Lifetime US6889213B1 (en) 2000-02-18 2000-02-18 E-service to manage contact information with privacy levels

Country Status (2)

Country Link
US (2) US6889213B1 (en)
JP (1) JP2001265772A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020042727A1 (en) * 2000-10-05 2002-04-11 Takafumi Soramoto Compensation-granting system and method and server thereof
US20040210455A1 (en) * 2003-03-05 2004-10-21 Sandy Kosloff Method and apparatus for promoting individuals and companies and marketing the goods and services of others
US20050182767A1 (en) * 2002-08-30 2005-08-18 Shoemaker Daniel D. System and method for secure reciprocal exchange of data
US20060065707A1 (en) * 2004-09-29 2006-03-30 Microsoft Corporation Information processing system, information processing method, program, and recording system
US20060293905A1 (en) * 2005-06-23 2006-12-28 Microsoft Corporation Exchanging electronic business cards over digital media
US20070231777A1 (en) * 2006-03-30 2007-10-04 Dimarco Anthony M Personal and career management system
US20080275878A1 (en) * 2007-05-04 2008-11-06 Samsung Electronics Co., Ltd. Method of managing user data in communication terminal
US20090008440A1 (en) * 2004-03-05 2009-01-08 Sandy Kosloff System and method for interactive electronic data card
US20090164589A1 (en) * 2007-12-21 2009-06-25 Kaushal Shroff Virtual electronic card based networking
US20090171807A1 (en) * 2003-03-05 2009-07-02 Sandy Kosloff System and method for interactive electronic data card with survey and purchase options
US20090216839A1 (en) * 2005-06-30 2009-08-27 Keiichi Yokoyama Electronic Business Card Exchange System and Method
US20090222414A1 (en) * 2008-02-29 2009-09-03 John R Mattox Methods and systems for providing additional information and data in cooperation with a communication application
US20090282138A1 (en) * 2008-05-08 2009-11-12 Haynes Thomas R System, method, and apparatus for electronic communication initiation contingent on busyness
US20100030779A1 (en) * 2006-10-09 2010-02-04 Winmark Investments Pte. Ltd. system and method for identifying and linking users having matching confidential information
US20100162387A1 (en) * 2008-12-19 2010-06-24 Ernest Samuel Baugher Mobile device with separate access to private and public information stored in the device
US7974877B2 (en) 2005-06-23 2011-07-05 Microsoft Corporation Sending and receiving electronic business cards
US20110219436A1 (en) * 2003-11-17 2011-09-08 Canon Kabushiki Kaisha Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US20110246620A1 (en) * 2010-03-31 2011-10-06 Cedar Point Communications, Llc Systems and methods for fused services including an integrated management system
US20110271108A1 (en) * 2010-05-03 2011-11-03 Intuit Inc. Method and system for secure exchange and use of electronic business cards
US20130014279A1 (en) * 2010-07-29 2013-01-10 Ethan Leland System for providing privacy of user information in an online social network with inline editing of privacy levels and customized privacy groups
US20130174095A1 (en) * 2011-12-29 2013-07-04 Jacob J. Dayan Graphic-based electronic signature management system and method
US20150089417A1 (en) * 2011-12-29 2015-03-26 Jacob J. Dayan Electronic signature management system and method
WO2015072670A1 (en) * 2013-11-13 2015-05-21 Samsung Electronics Co., Ltd. System and method of sharing profile image card for communication
US9285943B2 (en) 2011-12-29 2016-03-15 Jacob J. Dayan Graphic-based electronic signature management system and method
US10867004B2 (en) * 2008-11-03 2020-12-15 Salesforce.Com, Inc. Publicly providing web content of a tenant using a multi-tenant on-demand database service

Families Citing this family (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6691158B1 (en) * 2000-02-18 2004-02-10 Hewlett-Packard Development Company, L.P. E-service to manage contact information and track contact location
US20040076139A1 (en) * 2000-07-03 2004-04-22 Kenneth Kang-Yeh Wireless name service registry and flexible call routing and scheduling
US7047202B2 (en) * 2000-07-13 2006-05-16 Amit Jaipuria Method and apparatus for optimizing networking potential using a secured system for an online community
US7099304B2 (en) 2000-09-05 2006-08-29 Flexiworld Technologies, Inc. Apparatus, methods and systems for anonymous communication
JP3851944B2 (en) * 2000-10-17 2006-11-29 株式会社メキキ Human network relationship registration system, human network relationship registration method and server, human network relationship registration program, and computer-readable recording medium recording the program
US7249066B1 (en) * 2001-03-16 2007-07-24 Identity Branding Incorporated Internet-based sales aid
US20020138633A1 (en) * 2001-03-23 2002-09-26 International Business Machines Corporation Method, apparatus, and program for providing scripted electronic business cards and electronic calendars
US7441031B2 (en) 2001-05-21 2008-10-21 Sridhar Shrinivasan System using registration information set by a user to allow other users to access updated portion of contact information of the user
US6990495B1 (en) * 2001-09-05 2006-01-24 Bellsouth Intellectual Property Corporation System and method for finding persons in a corporate entity
US20030236759A1 (en) * 2002-06-21 2003-12-25 Tsung-Hsuan Ho Neural network for determining the endpoint in a process
JP2004102381A (en) * 2002-09-05 2004-04-02 Sony Corp Information providing device, method and program
US7904432B2 (en) * 2003-01-24 2011-03-08 Hewlett-Packard Development Company, L.P. Compressed data structure for extracted changes to a database and method of generating the data structure
US7472170B2 (en) 2003-02-13 2008-12-30 Bruce Zak System and method for managing content on a network interface
US20100088105A1 (en) * 2003-10-23 2010-04-08 Feldhahn Jeffrey M Method and system for updating electronic business cards
US7246099B2 (en) * 2003-10-23 2007-07-17 Feldhahn Jeffrey M Method and system for updating electronic business cards
US20080163075A1 (en) * 2004-01-26 2008-07-03 Beck Christopher Clemmett Macl Server-Client Interaction and Information Management System
US20060155750A1 (en) * 2004-08-12 2006-07-13 Fowler James F System to generate unpublished corporate data
US7533418B1 (en) * 2004-10-07 2009-05-12 Nortel Networks Limited Tokens for contact information
US20100325297A1 (en) * 2005-04-13 2010-12-23 Romney Todd H Apparatus, system, and method for facilitating electronic communication and privacy of electronic records based on a personal contact
US8166011B2 (en) * 2005-10-03 2012-04-24 Personalized Business Products, Inc. System and method for electronically managing individual and business information
US20080189292A1 (en) * 2007-02-02 2008-08-07 Jed Stremel System and method for automatic population of a contact file with contact content and expression content
US9183599B2 (en) * 2005-12-14 2015-11-10 Facebook, Inc. Mapping relationships between members in a social network
US7725492B2 (en) 2005-12-23 2010-05-25 Facebook, Inc. Managing information about relationships in a social network via a social timeline
US20070164554A1 (en) * 2005-12-16 2007-07-19 Krone Craig E Order fulfillment system and method for printing products including individualized information
US9459622B2 (en) 2007-01-12 2016-10-04 Legalforce, Inc. Driverless vehicle commerce network and community
US9070101B2 (en) 2007-01-12 2015-06-30 Fatdoor, Inc. Peer-to-peer neighborhood delivery multi-copter and method
US8965409B2 (en) 2006-03-17 2015-02-24 Fatdoor, Inc. User-generated community publication in an online neighborhood social network
US9037516B2 (en) 2006-03-17 2015-05-19 Fatdoor, Inc. Direct mailing in a geo-spatial environment
US9064288B2 (en) 2006-03-17 2015-06-23 Fatdoor, Inc. Government structures and neighborhood leads in a geo-spatial environment
US9098545B2 (en) 2007-07-10 2015-08-04 Raj Abhyanker Hot news neighborhood banter in a geo-spatial social network
US9071367B2 (en) 2006-03-17 2015-06-30 Fatdoor, Inc. Emergency including crime broadcast in a neighborhood social network
US9002754B2 (en) 2006-03-17 2015-04-07 Fatdoor, Inc. Campaign in a geo-spatial environment
US9373149B2 (en) 2006-03-17 2016-06-21 Fatdoor, Inc. Autonomous neighborhood vehicle commerce network and community
US7529795B2 (en) 2006-03-20 2009-05-05 Stragent, Llc Message board aggregator
US7647351B2 (en) 2006-09-14 2010-01-12 Stragent, Llc Web scrape template generation
US20080133669A1 (en) * 2006-11-30 2008-06-05 Li Ge Sending and receiving electronic mail using group headers
US8224298B2 (en) * 2007-02-05 2012-07-17 Boadin Technology, LLC Systems and methods for mobile media services utilizing a short form command structure
US7827265B2 (en) * 2007-03-23 2010-11-02 Facebook, Inc. System and method for confirming an association in a web-based social network
CN101681252B (en) 2007-05-24 2017-09-01 费斯布克公司 System and method for providing privacy settings for the application associated with user profiles
JP5401461B2 (en) * 2007-09-07 2014-01-29 フェイスブック,インク. Dynamic update of privacy settings in social networks
US20090094668A1 (en) * 2007-10-08 2009-04-09 International Business Machines Corporation Email privacy system and method
US8244037B2 (en) * 2007-11-15 2012-08-14 Master Wave International Company Ltd Image-based data management method and system
US8117225B1 (en) 2008-01-18 2012-02-14 Boadin Technology, LLC Drill-down system, method, and computer program product for focusing a search
US8117242B1 (en) 2008-01-18 2012-02-14 Boadin Technology, LLC System, method, and computer program product for performing a search in conjunction with use of an online application
US8073590B1 (en) 2008-08-22 2011-12-06 Boadin Technology, LLC System, method, and computer program product for utilizing a communication channel of a mobile device by a vehicular assembly
US8131458B1 (en) 2008-08-22 2012-03-06 Boadin Technology, LLC System, method, and computer program product for instant messaging utilizing a vehicular assembly
US8190692B1 (en) 2008-08-22 2012-05-29 Boadin Technology, LLC Location-based messaging system, method, and computer program product
US8265862B1 (en) 2008-08-22 2012-09-11 Boadin Technology, LLC System, method, and computer program product for communicating location-related information
US8078397B1 (en) 2008-08-22 2011-12-13 Boadin Technology, LLC System, method, and computer program product for social networking utilizing a vehicular assembly
US20100262491A1 (en) * 2009-02-09 2010-10-14 Kenneth Siciliano Searchable on-line business card system
US20100257023A1 (en) * 2009-04-07 2010-10-07 Facebook, Inc. Leveraging Information in a Social Network for Inferential Targeting of Advertisements
CN102317955A (en) * 2009-04-20 2012-01-11 万涛国际有限公司 Data managing method and system based on image
US8752186B2 (en) * 2009-07-23 2014-06-10 Facebook, Inc. Dynamic enforcement of privacy settings by a social networking system on information shared with an external system
IT1396340B1 (en) 2009-10-20 2012-11-16 Tiziano Tresanti SYSTEM AND METHOD FOR MANAGEMENT AND SHARING WITHIN A INFORMATION NETWORK OF INFORMATION AND CONTACTS RELATED TO USERS
SG172508A1 (en) 2010-01-04 2011-07-28 Smart Communications Inc System and method for a global directory service
WO2011149558A2 (en) 2010-05-28 2011-12-01 Abelow Daniel H Reality alternate
US8996573B2 (en) 2011-10-10 2015-03-31 George Peter Kelesis Journaling system with segregated data access
US8893287B2 (en) * 2012-03-12 2014-11-18 Microsoft Corporation Monitoring and managing user privacy levels
US9824145B1 (en) * 2013-10-18 2017-11-21 Google Inc. User experience in social networks by weighting user interaction patterns
US20150213353A1 (en) * 2014-01-24 2015-07-30 Antonio Cuervo Smart business card
US9439367B2 (en) 2014-02-07 2016-09-13 Arthi Abhyanker Network enabled gardening with a remotely controllable positioning extension
KR101492623B1 (en) * 2014-03-05 2015-02-24 지익주 Cloud server for providing business card page and method for providing business card page on the cloud server
US9457901B2 (en) 2014-04-22 2016-10-04 Fatdoor, Inc. Quadcopter with a printable payload extension system and method
US9004396B1 (en) 2014-04-24 2015-04-14 Fatdoor, Inc. Skyteboard quadcopter and method
US9022324B1 (en) 2014-05-05 2015-05-05 Fatdoor, Inc. Coordination of aerial vehicles through a central server
US9971985B2 (en) 2014-06-20 2018-05-15 Raj Abhyanker Train based community
US9441981B2 (en) 2014-06-20 2016-09-13 Fatdoor, Inc. Variable bus stops across a bus route in a regional transportation network
US9451020B2 (en) 2014-07-18 2016-09-20 Legalforce, Inc. Distributed communication of independent autonomous vehicles to provide redundancy and performance
CN105991702B (en) * 2015-02-09 2020-04-14 阿里巴巴集团控股有限公司 Connection establishing method and device
US9646329B2 (en) * 2015-05-22 2017-05-09 Autodesk, Inc. Configurable electronic business card
US10796015B2 (en) 2017-03-29 2020-10-06 Mybitchbook, Inc. Method and system for anonymous user data storage and controlled data access
US11009886B2 (en) 2017-05-12 2021-05-18 Autonomy Squared Llc Robot pickup method
US11468399B2 (en) * 2018-05-18 2022-10-11 United States Postal Service Digitally informed delivery with custom electronic supplements for hardcopy mail
KR102468636B1 (en) * 2020-11-20 2022-11-17 정상훈 Apparatus for managing electronic business card
CN117439818B (en) * 2023-12-20 2024-02-20 北京北科融智云计算科技有限公司 Data transmission method and system based on privacy calculation

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5231578A (en) * 1988-11-01 1993-07-27 Wang Laboratories, Inc. Apparatus for document annotation and manipulation using images from a window source
US5778367A (en) * 1995-12-14 1998-07-07 Network Engineering Software, Inc. Automated on-line information service and directory, particularly for the world wide web
US5848412A (en) * 1996-11-19 1998-12-08 Ncr Corporation User controlled browser identification disclosing mechanism
US5903878A (en) * 1997-08-20 1999-05-11 Talati; Kirit K. Method and apparatus for electronic commerce
US5940478A (en) * 1996-05-31 1999-08-17 Octel Communications Corporation Method and system for extended addressing plans
US5962829A (en) * 1994-03-10 1999-10-05 Fujitsu Limited Customer management terminal equipment, customer managing method, and media for customer management
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US6073138A (en) * 1998-06-11 2000-06-06 Boardwalk A.G. System, method, and computer program product for providing relational patterns between entities
US6122642A (en) * 1996-01-18 2000-09-19 Sabre Inc. System for propagating, retrieving and using transaction processing facility airline computerized reservation system data on a relational database processing platform
US6138908A (en) * 1997-09-19 2000-10-31 Ericsson Inc. Method for updating communications facilitation data
US6157954A (en) * 1997-09-29 2000-12-05 Ericsson Inc. Communication control device including business card database with associated business card agents for controlling communicated electronic mail between user and card provider
US6208659B1 (en) * 1997-12-22 2001-03-27 Nortel Networks Limited Data processing system and method for providing personal information in a communication network
US6247011B1 (en) * 1997-12-02 2001-06-12 Digital-Net, Inc. Computerized prepress authoring for document creation
US6269336B1 (en) * 1998-07-24 2001-07-31 Motorola, Inc. Voice browser for interactive services and methods thereof
US6415277B1 (en) * 2000-01-10 2002-07-02 Imagex, Inc. Method of generating print production tasks using information extracted from enterprise databases
US6442263B1 (en) * 1997-04-23 2002-08-27 Nortel Networks Limited Electronic business cards
US6633311B1 (en) * 2000-02-18 2003-10-14 Hewlett-Packard Company, L.P. E-service to manage and export contact information
US6873861B2 (en) * 2001-04-12 2005-03-29 International Business Machines Corporation Business card presentation via mobile phone

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002215254A (en) * 2001-01-23 2002-07-31 Canon Inc Portable information storage medium, information processor, distribution system of software, information processing method and computer readable storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5231578A (en) * 1988-11-01 1993-07-27 Wang Laboratories, Inc. Apparatus for document annotation and manipulation using images from a window source
US5962829A (en) * 1994-03-10 1999-10-05 Fujitsu Limited Customer management terminal equipment, customer managing method, and media for customer management
US5778367A (en) * 1995-12-14 1998-07-07 Network Engineering Software, Inc. Automated on-line information service and directory, particularly for the world wide web
US6122642A (en) * 1996-01-18 2000-09-19 Sabre Inc. System for propagating, retrieving and using transaction processing facility airline computerized reservation system data on a relational database processing platform
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US5940478A (en) * 1996-05-31 1999-08-17 Octel Communications Corporation Method and system for extended addressing plans
US5848412A (en) * 1996-11-19 1998-12-08 Ncr Corporation User controlled browser identification disclosing mechanism
US6442263B1 (en) * 1997-04-23 2002-08-27 Nortel Networks Limited Electronic business cards
US5903878A (en) * 1997-08-20 1999-05-11 Talati; Kirit K. Method and apparatus for electronic commerce
US6138908A (en) * 1997-09-19 2000-10-31 Ericsson Inc. Method for updating communications facilitation data
US6157954A (en) * 1997-09-29 2000-12-05 Ericsson Inc. Communication control device including business card database with associated business card agents for controlling communicated electronic mail between user and card provider
US6247011B1 (en) * 1997-12-02 2001-06-12 Digital-Net, Inc. Computerized prepress authoring for document creation
US6208659B1 (en) * 1997-12-22 2001-03-27 Nortel Networks Limited Data processing system and method for providing personal information in a communication network
US6073138A (en) * 1998-06-11 2000-06-06 Boardwalk A.G. System, method, and computer program product for providing relational patterns between entities
US6269336B1 (en) * 1998-07-24 2001-07-31 Motorola, Inc. Voice browser for interactive services and methods thereof
US6415277B1 (en) * 2000-01-10 2002-07-02 Imagex, Inc. Method of generating print production tasks using information extracted from enterprise databases
US6633311B1 (en) * 2000-02-18 2003-10-14 Hewlett-Packard Company, L.P. E-service to manage and export contact information
US6873861B2 (en) * 2001-04-12 2005-03-29 International Business Machines Corporation Business card presentation via mobile phone

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020042727A1 (en) * 2000-10-05 2002-04-11 Takafumi Soramoto Compensation-granting system and method and server thereof
US9489536B2 (en) 2002-08-30 2016-11-08 Boss Logic, Llc System and method for secure reciprocal exchange of data
US20050182767A1 (en) * 2002-08-30 2005-08-18 Shoemaker Daniel D. System and method for secure reciprocal exchange of data
US7958144B2 (en) * 2002-08-30 2011-06-07 Boss Logic, Llc System and method for secure reciprocal exchange of data
US20140337933A1 (en) * 2002-08-30 2014-11-13 Boss Logic, Llc System and method for secure reciprocal exchange of data
US9270664B2 (en) * 2002-08-30 2016-02-23 Boss Logic, Llc System and method for secure reciprocal exchange of data
US10133877B2 (en) 2002-08-30 2018-11-20 Knapp Investment Company Limited System and method for secure reciprocal exchange of data
US20040210455A1 (en) * 2003-03-05 2004-10-21 Sandy Kosloff Method and apparatus for promoting individuals and companies and marketing the goods and services of others
US20090171807A1 (en) * 2003-03-05 2009-07-02 Sandy Kosloff System and method for interactive electronic data card with survey and purchase options
US8621579B2 (en) * 2003-11-17 2013-12-31 Canon Kabushiki Kaisha Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US10243948B2 (en) 2003-11-17 2019-03-26 Canon Kabushiki Kaisha Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US20110219436A1 (en) * 2003-11-17 2011-09-08 Canon Kabushiki Kaisha Communication apparatus, electronic mail transmitting method, and electronic mail transmitting program
US20090008440A1 (en) * 2004-03-05 2009-01-08 Sandy Kosloff System and method for interactive electronic data card
US20060075050A1 (en) * 2004-09-29 2006-04-06 Microsoft Corporation Business card exchange system
US20060075231A1 (en) * 2004-09-29 2006-04-06 Microsoft Corporation Terminal for exchanging electronic business cards
US8156330B2 (en) 2004-09-29 2012-04-10 Microsoft Corporation Terminal for exchanging electronic business cards
US7753260B2 (en) 2004-09-29 2010-07-13 Microsoft Corporation Information processing system, information processing method, program, and recording system
US20060065707A1 (en) * 2004-09-29 2006-03-30 Microsoft Corporation Information processing system, information processing method, program, and recording system
US20060293905A1 (en) * 2005-06-23 2006-12-28 Microsoft Corporation Exchanging electronic business cards over digital media
US7974877B2 (en) 2005-06-23 2011-07-05 Microsoft Corporation Sending and receiving electronic business cards
US20090216839A1 (en) * 2005-06-30 2009-08-27 Keiichi Yokoyama Electronic Business Card Exchange System and Method
US8005904B2 (en) 2005-06-30 2011-08-23 Microsoft Corporation Electronic business card exchange system and method
US20070231777A1 (en) * 2006-03-30 2007-10-04 Dimarco Anthony M Personal and career management system
US20100030779A1 (en) * 2006-10-09 2010-02-04 Winmark Investments Pte. Ltd. system and method for identifying and linking users having matching confidential information
US20080275878A1 (en) * 2007-05-04 2008-11-06 Samsung Electronics Co., Ltd. Method of managing user data in communication terminal
US7921167B2 (en) * 2007-12-21 2011-04-05 Kaushal Shroff Virtual electronic card based networking
US20090164589A1 (en) * 2007-12-21 2009-06-25 Kaushal Shroff Virtual electronic card based networking
US20090222414A1 (en) * 2008-02-29 2009-09-03 John R Mattox Methods and systems for providing additional information and data in cooperation with a communication application
US9430538B2 (en) * 2008-02-29 2016-08-30 Red Hat, Inc. Providing additional information and data in cooperation with a communication application
US8219624B2 (en) * 2008-05-08 2012-07-10 International Business Machines Corporation System, method, and apparatus for electronic communication initiation contingent on busyness
US20090282138A1 (en) * 2008-05-08 2009-11-12 Haynes Thomas R System, method, and apparatus for electronic communication initiation contingent on busyness
US10867004B2 (en) * 2008-11-03 2020-12-15 Salesforce.Com, Inc. Publicly providing web content of a tenant using a multi-tenant on-demand database service
US20100162387A1 (en) * 2008-12-19 2010-06-24 Ernest Samuel Baugher Mobile device with separate access to private and public information stored in the device
US9787827B2 (en) * 2010-03-31 2017-10-10 Genband Us Llc Systems and methods for fused services including an integrated management system
US20110246620A1 (en) * 2010-03-31 2011-10-06 Cedar Point Communications, Llc Systems and methods for fused services including an integrated management system
US8621648B2 (en) * 2010-05-03 2013-12-31 Intuit Inc. Method and system for secure exchange and use of electronic business cards
US20110271108A1 (en) * 2010-05-03 2011-11-03 Intuit Inc. Method and system for secure exchange and use of electronic business cards
US20130014279A1 (en) * 2010-07-29 2013-01-10 Ethan Leland System for providing privacy of user information in an online social network with inline editing of privacy levels and customized privacy groups
US20130174095A1 (en) * 2011-12-29 2013-07-04 Jacob J. Dayan Graphic-based electronic signature management system and method
US9292168B2 (en) * 2011-12-29 2016-03-22 Jacob J. Dayan Graphic-based electronic signature management system and method
US9285943B2 (en) 2011-12-29 2016-03-15 Jacob J. Dayan Graphic-based electronic signature management system and method
US10013141B2 (en) * 2011-12-29 2018-07-03 Jacob J. Dayan Electronic signature management system and method
US20150089417A1 (en) * 2011-12-29 2015-03-26 Jacob J. Dayan Electronic signature management system and method
US10162479B2 (en) 2011-12-29 2018-12-25 Jacob J. Dayan Graphic-based electronic signature management system and method
US20140208247A1 (en) * 2011-12-29 2014-07-24 Jacob J. Dayan Graphic-based electronic signature management system and method
US8677256B2 (en) * 2011-12-29 2014-03-18 Jacob J. Dayan Graphic-based electronic signature management system and method
US11061530B2 (en) * 2011-12-29 2021-07-13 Jacob J. Dayan Electronic signature management system and method
CN105900136A (en) * 2013-11-13 2016-08-24 三星电子株式会社 System and method of sharing profile image card for communication
WO2015072670A1 (en) * 2013-11-13 2015-05-21 Samsung Electronics Co., Ltd. System and method of sharing profile image card for communication

Also Published As

Publication number Publication date
US6889213B1 (en) 2005-05-03
JP2001265772A (en) 2001-09-28

Similar Documents

Publication Publication Date Title
US6889213B1 (en) E-service to manage contact information with privacy levels
US6633311B1 (en) E-service to manage and export contact information
US6691158B1 (en) E-service to manage contact information and track contact location
US7017109B1 (en) E-service to manage contact information and signature ECards
US7117271B2 (en) Web server enabling direct scheduling and calendaring capability
CA2243097C (en) A method and apparatus for importing information from a network resource
US6341290B1 (en) Method and system for automating the communication of business information
US6434607B1 (en) Web server providing role-based multi-level security
US8839090B2 (en) System and method to capture and manage input values for automatic form fill
US7630974B2 (en) Multi-language support for enterprise identity and access management
US7788222B2 (en) Information exchange engine providing a critical infrastructure layer and methods of use thereof
US6610105B1 (en) Method and system for providing resource access in a mobile environment
JP5305581B2 (en) Method, portal, and computer program for exchanging portlet configuration data
US20060195778A1 (en) Document management systems and methods
US20100185611A1 (en) Re-ranking search results from an enterprise system
US20060129935A1 (en) Integrated information management system and method
WO2001033430A1 (en) Method and system for updating user information maintained by another user system
US7093285B2 (en) Supplier portal for global procurement e-business applications
US20020069247A1 (en) Business network platform method and system
US7627766B2 (en) System and method for providing java server page security
WO2000067106A1 (en) Automatically generating a request to an online service utilizing personal information maintained by a management application
US20020194165A1 (en) System and method for address book customization for shared emessaging
US7395267B2 (en) System and method for customized document selection
WO2006100499A1 (en) Automatic intranet service publishing and service access
US20020188729A1 (en) Collaboration control system and method

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: EXPRESSLY ABANDONED -- DURING EXAMINATION