US20120009902A2 - Method for distributing contact information between applications - Google Patents

Method for distributing contact information between applications Download PDF

Info

Publication number
US20120009902A2
US20120009902A2 US12/705,268 US70526810A US2012009902A2 US 20120009902 A2 US20120009902 A2 US 20120009902A2 US 70526810 A US70526810 A US 70526810A US 2012009902 A2 US2012009902 A2 US 2012009902A2
Authority
US
United States
Prior art keywords
user
information
device associated
data
provisioned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/705,268
Other versions
US20110201312A1 (en
US9636053B2 (en
Inventor
Jon Peterson
Webb Dryfoos
Peter Davis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deutsche Bank AG New York Branch
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US12/705,268 priority Critical patent/US9636053B2/en
Assigned to NEUSTAR, INC. reassignment NEUSTAR, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PETERSON, JON, DAVIS, PETER CHARLIER, DRYFOOS, WEBB
Publication of US20110201312A1 publication Critical patent/US20110201312A1/en
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. SECURITY AGREEMENT Assignors: AMACAI INFORMATION CORPORATION, MUREX LICENSING CORPORATION, NEUSTAR, INC., QUOVA, INC, TARGUS INFORMATION CORPORATION, ULTRADNS CORPORATION
Publication of US20120009902A2 publication Critical patent/US20120009902A2/en
Assigned to TARGUS INFORMATION CORPORATION, MUREX LICENSING CORPORATION, AMACAI INFORMATION CORPORATION, QUOVA, INC., ULTRADNS CORPORATION, NEUSTAR, INC. reassignment TARGUS INFORMATION CORPORATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: MORGAN STANLEY SENIOR FUNDING, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. SECURITY AGREEMENT Assignors: NEUSTAR DATA SERVICES, INC., NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC., NEUSTAR, INC., ULTRADNS CORPORATION
Priority to US15/487,178 priority patent/US10117609B2/en
Application granted granted Critical
Publication of US9636053B2 publication Critical patent/US9636053B2/en
Assigned to NEUSTAR, INC., AGGREGATE KNOWLEDGE, INC., ULTRADNS CORPORATION, NEUSTAR DATA SERVICES, INC., NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC., MARKETSHARE ACQUISITION CORPORATION, MARKETSHARE HOLDINGS, INC., MARKETSHARE PARTNERS, LLC reassignment NEUSTAR, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: MORGAN STANLEY SENIOR FUNDING, INC.
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AGGREGATE KNOWLEDGE, INC., MARKETSHARE PARTNERS LLC, NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC., NEUSTAR, INC.
Assigned to UBS AG, STAMFORD BRANCH reassignment UBS AG, STAMFORD BRANCH SECOND LIEN PATENT SECURITY AGREEMENT Assignors: AGGREGATE KNOWLEDGE, INC., MARKETSHARE PARTNERS LLC, NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC., NEUSTAR, INC.
Priority to US16/178,915 priority patent/US10693840B2/en
Assigned to DEUTSCHE BANK AG NEW YORK BRANCH reassignment DEUTSCHE BANK AG NEW YORK BRANCH GRANT OF SECURITY INTEREST IN PATENT RIGHTS Assignors: MARKETSHARE PARTNERS, LLC, NEUSTAR DATA SERVICES, INC., NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC., NEUSTAR, INC., SONTIQ, INC., TRU OPTIK DATA CORP., TrustID, Inc.
Assigned to JPMORGAN CHASE BANK, N.A reassignment JPMORGAN CHASE BANK, N.A GRANT OF SECURITY INTEREST IN UNITED STATES PATENTS Assignors: AGGREGATE KNOWLEDGE, LLC, EBUREAU, LLC, IOVATION, INC., MARKETSHARE PARTNERS, LLC, NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC., NEUSTAR, INC., SIGNAL DIGITAL, INC., SONTIQ, INC., TRANS UNION LLC, TRANSUNION HEALTHCARE, INC., TRANSUNION INTERACTIVE, INC., TRANSUNION RENTAL SCREENING SOLUTIONS, INC., TRANSUNION TELEDATA LLC, TRU OPTIK DATA CORP., TrustID, Inc.
Assigned to NEUSTAR, INC., AGGREGATE KNOWLEDGE, INC., MARKETSHARE PARTNERS LLC, NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC. reassignment NEUSTAR, INC. SECOND LIEN PATENT SECURITY AGREEMENT RELEASE Assignors: UBS AG, STAMFORD BRANCH
Assigned to NEUSTAR, INC., AGGREGATE KNOWLEDGE, INC., MARKETSHARE PARTNERS LLC, NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC. reassignment NEUSTAR, INC. FIRST LIEN PATENT SECURITY AGREEMENT RELEASE Assignors: BANK OF AMERICA, N.A.
Assigned to SIGNAL DIGITAL, INC., NEUSTAR IP INTELLIGENCE, INC., IOVATION, INC., TrustID, Inc., TRANSUNION INTERACTIVE, INC., TRU OPTIK DATA CORP., MARKETSHARE PARTNERS, LLC, EBUREAU, LLC, TRANSUNION TELEDATA LLC, SONTIQ, INC., AGGREGATE KNOWLEDGE, LLC, TRANSUNION RENTAL SCREENING SOLUTIONS, INC., NEUSTAR INFORMATION SERVICES, INC., NEUSTAR, INC., TRANS UNION LLC reassignment SIGNAL DIGITAL, INC. TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161 Assignors: JPMORGAN CHASE BANK, N.A.
Assigned to DEUTSCHE BANK AG NEW YORK BRANCH reassignment DEUTSCHE BANK AG NEW YORK BRANCH CORRECTIVE ASSIGNMENT TO CORRECT THE APPLICATION NO. 16/990,698 PREVIOUSLY RECORDED ON REEL 058294 FRAME 0010. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: MARKETSHARE PARTNERS, LLC, NEUSTAR DATA SERVICES, INC., NEUSTAR INFORMATION SERVICES, INC., NEUSTAR IP INTELLIGENCE, INC., NEUSTAR, INC., SONTIQ, INC., TRU OPTIK DATA CORP., TrustID, Inc.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/145Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue
    • A61B5/14546Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue for measuring analytes not otherwise provided for, e.g. ions, cytochromes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/145Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue
    • A61B5/1486Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue using enzyme electrodes, e.g. with immobilised oxidase
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N33/00Investigating or analysing materials by specific methods not covered by groups G01N1/00 - G01N31/00
    • G01N33/48Biological material, e.g. blood, urine; Haemocytometers
    • G01N33/50Chemical analysis of biological material, e.g. blood, urine; Testing involving biospecific ligand binding methods; Immunological testing
    • G01N33/53Immunoassay; Biospecific binding assay; Materials therefor
    • G01N33/543Immunoassay; Biospecific binding assay; Materials therefor with an insoluble carrier for immobilising immunochemicals
    • G01N33/54366Apparatus specially adapted for solid-phase testing
    • G01N33/54373Apparatus specially adapted for solid-phase testing involving physiochemical end-point determination, e.g. wave-guides, FETS, gratings
    • G01N33/5438Electrodes
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N33/00Investigating or analysing materials by specific methods not covered by groups G01N1/00 - G01N31/00
    • G01N33/48Biological material, e.g. blood, urine; Haemocytometers
    • G01N33/50Chemical analysis of biological material, e.g. blood, urine; Testing involving biospecific ligand binding methods; Immunological testing
    • G01N33/53Immunoassay; Biospecific binding assay; Materials therefor
    • G01N33/543Immunoassay; Biospecific binding assay; Materials therefor with an insoluble carrier for immobilising immunochemicals
    • G01N33/54393Improving reaction conditions or stability, e.g. by coating or irradiation of surface, by reduction of non-specific binding, by promotion of specific binding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B5/00Measuring for diagnostic purposes; Identification of persons
    • A61B5/145Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue
    • A61B5/14532Measuring characteristics of blood in vivo, e.g. gas concentration, pH value; Measuring characteristics of body fluids or tissues, e.g. interstitial fluid, cerebral tissue for measuring glucose, e.g. by tissue impedance measurement

Definitions

  • the present invention relates to the field of electronic communications. More particularly, the invention relates to sharing contact information across applications such as mobile telephones and the Internet.
  • the invention provides a method for sharing contact information of a first user between a first application and a second application.
  • the method comprises using a server on a computer network to perform the steps of: identifying first information relating to the first user; provisioning identification data associated with the first information; storing the provisioned data and the first information together in a first database; receiving a request for the provisioned data from a second user; determining whether the second user is authorized to obtain the provisioned data; when a determination is made that the second user is authorized to obtain the provisioned data, retrieving the provisioned data from the first database; and transmitting the provisioned data to a device associated with the second user.
  • the method may further comprise the step of receiving from the first user data for identifying authorized potential users.
  • the step of determining whether the second user is authorized to obtain the provisioned data may further comprise determining whether the data for identifying authorized potential users includes data for identifying the second user.
  • the step of identifying first information relating to the first user may further comprise receiving a prompt and the first information from a device associated with the first user.
  • the first information may comprise a telephone number.
  • the device associated with the first user may comprise a mobile telephony device associated with the first user.
  • the first information may comprise a telephone number associated with the device associated with the first user.
  • the mobile telephony device associated with the first user may comprise a middleware tool kit.
  • the middleware tool kit may comprises a first network interface configured to transmit prompts and information over the computer network; a second network interface configured to transmit queries over the computer network and to receive responses to the transmitted queries; a first application programming interface (API) for receiving provisioning requests from applications; and a second API for receiving information requests from applications and for transmitting responses to the information requests to the requesting applications.
  • API application programming interface
  • the provisioned data may comprise at least one Uniform Resource Indicator (URI).
  • the at least one provisioned URI may be associated with an identifier selected from the group consisting of a telephone number, an e-mail address, an instant messaging handle, and a Uniform Resource Locator (URL) of a web page.
  • the device associated with the second user may comprise a mobile telephony device associated with the second user.
  • the step of transmitting the provisioned data may further comprise transmitting an SMS text message to the mobile telephony device associated with the second user.
  • the step of provisioning identification data associated with the first information may further comprise transmitting an SMS text message to a device associated with the first user to determine whether the identification data to be provisioned is correctly associated with the first information.
  • the invention provides a system for sharing contact information of a first user between a first application and a second application.
  • the system comprises a server configured for communicating with client devices over a computer network.
  • the server is configured to perform the steps of: identifying first information relating to a first user; provisioning identification data associated with the first information; storing the provisioned data and the first information together in a first database; receiving a request for the provisioned data from a second user; determining whether the second user is authorized to obtain the provisioned data; when a determination is made that the second user is authorized to obtain the provisioned data, retrieving the provisioned data from the first database; and transmitting the provisioned data to a client device associated with the second user.
  • the server may be further configured to perform the steps of receiving from the first user data for identifying authorized potential users, and determining whether the data for identifying authorized potential users includes data for identifying the second user.
  • the server may be further configured to perform the step of receiving a prompt and the first information from a client device associated with the first user.
  • the first information may comprise a telephone number.
  • the client device associated with the first user may comprise a mobile telephony device associated with the first user.
  • the first information may comprise a telephone number associated with the client device associated with the first user.
  • the mobile telephony device associated with the first user may comprise a middleware tool kit.
  • the middleware tool kit may comprise a first network interface configured to transmit prompts and information over the computer network; a second network interface configured to transmit queries over the computer network and to receive responses to the transmitted queries; a first application programming interface (API) for receiving provisioning requests from applications; and a second API for receiving information requests from applications and for transmitting responses to the information requests to the requesting applications.
  • API application programming interface
  • the provisioned data may comprise at least one Uniform Resource Indicator (URI).
  • the at least one provisioned URI may be associated with an identifier selected from the group consisting of a telephone number, an e-mail address, an instant messaging handle, and a Uniform Resource Locator (URL) of a web page.
  • the client device associated with the second user may comprise a mobile telephony device associated with the second user.
  • the server may be further configured to perform the step of transmitting an SMS text message to the mobile telephony device associated with the second user.
  • the server may be further configured to perform the step of transmitting an SMS text message to a device associated with the first user to determine whether the identification data to be provisioned is correctly associated with the first information.
  • FIG. 1 illustrates a block diagram of an architecture for a system for sharing contacting information across applications according to a preferred embodiment of the invention.
  • FIG. 2 shows a flow chart that illustrates a method for sharing contacting information across applications according to a preferred embodiment of the invention.
  • FIG. 3 illustrates a directory containing installed applications and a database for storing provisioned contacting information as used in the system of FIG. 1 .
  • FIG. 4 illustrates an information flow diagram for the provisioning and querying steps of a method for sharing contacting information across applications according to a preferred embodiment of the invention.
  • the present inventors have recognized the need to enable sharing of contact information across multiple applications and among multiple users in a reasonably simple and efficient manner. Accordingly, it is an object of the present invention to provision ENUM in an automated and transparent way, while preventing public disclosure of contact information.
  • a system is designed to enable sharing of supplemental contact information between users of mobile telephones.
  • the system allows them to learn other ways of communicating over the Internet, for example email addresses or addresses for instant messaging.
  • Applications can leverage this knowledge to help users discover contacts who also utilize the same application.
  • the invention was inspired by ENUM, in particular by the difficulty of seeding directories for translating telephone numbers into Internet identifiers. Many mobile telephones, notably the iPhone, have rich contact books with numerous identifiers that could be published via ENUM.
  • ENUM is typically a cumbersome step, and many users are reluctant to make their contact information public.
  • the provisioning is made transparent, and reciprocal authorization whitelisting is used as a baseline, thereby preventing public disclosure of contact information.
  • the system 100 includes a directory 105 and a middleware toolkit 110 which are leveraged by applications 115 to discover new identifiers associated with the telephone number of a contact.
  • the system 100 also includes an authorization database 120 which can be accessed by the directory 105 in order to verify that a requesting client is authorized to receive contacting information in response to a request for same.
  • the system 100 is designed to translate one identifier into a set of different identifiers.
  • the identifier so translated is, for the sake of readability, hereafter exemplified by a telephone number, and although the telephone number is used for the translated identifier in the preferred implementation, the invention is not limited to the use of telephone numbers for translated identifiers.
  • a flow chart 200 that illustrates a method of sharing contacting information across applications according to preferred embodiment of the present invention is shown.
  • the identifiers associated with a telephone number are provisioned into a server on a computer network, either as a bulk operation or one by one, by various clients attached to the same computer network.
  • the server upon receiving the provisioning instructions from clients, the server stores that data in a database table, with the telephone number serving as the key and one or more identifiers associated with the telephone number serving as the value.
  • a translation is instigated by one such client, generally in order to acquire information provisioned by other clients, and performed by said server, which returns the response to the client.
  • the server verifies that the requesting client is authorized to receive the requested information by consulting a second database, which includes information that identifies authorized senders of queries.
  • the second database may be resident locally, or it may reside elsewhere on the network.
  • the server returns the identifiers in response to the client, and the client delivers the response to an application in step 225 .
  • the application may make use of the identifiers immediately, or it may store them for future use or invocation by the user. If the identifiers are stored, they are stored for a specific lifetime, after which application must ask the client to make a new query to the server.
  • an application may learn identifiers of a user through manual input, as is the case with a contact book, or the application may actually assign identifiers to a use, as is the case with an instant messaging application in which a user registers a new identifier.
  • the system 100 may be implemented, for example, where users commonly contact one another by dialing a telephone number, and where terminals commonly record the calling and called parties in a telephone conversation, thus building a list of contacts by telephone number. In this manner, the system 100 allows users to discover other communications and applications identifiers associated with their contacts, even if they know their contact only by telephone number.
  • the directory 105 is the back-end database that maintains the mappings from telephone numbers to various application identifiers, and also the server interface to that directory.
  • the directory 105 is populated by the middleware toolkit 110 , which sends provisioning information to the directory 105 .
  • the directory 105 is queried through the middleware toolkit 110 by applications 115 that want to acquire mappings for a particular telephone number.
  • the directory 105 also maintains, or accesses externally, a list of contacts associated with a particular telephone number, in order to learn which telephone numbers are authorized to query for a particular application.
  • the middleware toolkit 110 is a software library that contains the necessary code to interface with the directory 105 over the Internet.
  • Applications 115 use the middleware toolkit 110 to learn about the application identifiers associated with a particular telephone number.
  • the application 115 is a communications application residing on a general purpose computer, be it a desktop or a mobile handset, that makes use of the middleware toolkit to learn and provision the application identifiers associated with a telephone number.
  • the application 115 may be understood broadly to include any software used for personal communication on the Internet, including various messaging, real-time audio transmission, and gaming applications.
  • An identifier includes any information that represents a user within the scope of a particular communications system. Examples include telephone numbers, e-mail addresses, instant messaging handles, and the Uniform Resource Locator (URL) of a web page where a user might be reached. Calling, invoking, or dereferencing an application identifier typically causes the invocation of the application and contacts through the application the user has designated by the identifier.
  • URL Uniform Resource Locator
  • the directory 105 resides on one or more servers.
  • the server is preferably implemented by the use of one or more general purpose computers, such as, for example, a Sun Microsystems Fire F15k.
  • Each of the middleware tool kit 110 , the applications 115 , and the authorization database 120 may also be implemented by the use of one or more general purpose computers, such as, for example, a typical personal computer manufactured by Dell, Gateway, or Hewlett-Packard; or more preferably, the middleware tool kit 110 and the applications 115 may be implemented on a smart mobile telephone, such as, for example, an Apple iPhone or a Blackberry Storm mobile telephone or a smart mobile telephone manufactured by Google.
  • Each of the server and the client devices on which the middleware tool kit 110 , the applications 115 , and the authorization database 120 reside can include a microprocessor.
  • the microprocessor can be any type of processor, such as, for example, any type of general purpose microprocessor or microcontroller, a digital signal processing (DSP) processor, an application-specific integrated circuit (ASIC), a programmable read-only memory (PROM), or the like.
  • DSP digital signal processing
  • ASIC application-specific integrated circuit
  • PROM programmable read-only memory
  • the server may use its microprocessor to read a computer-readable medium containing software that includes instructions for carrying out one or more of the functions of the directory 105 , as further described below.
  • Each of the server and the client devices on which the middleware tool kit 110 , the applications 115 , and the authorization database 120 reside can also include computer memory, such as, for example, random-access memory (RAM).
  • the computer memory of each of the server and the client devices can be any type of computer memory or any other type of electronic storage medium that is located either internally or externally to the server or the client devices, such as, for example, read-only memory (ROM), compact disc read-only memory (CDROM), electro-optical memory, magneto-optical memory, an erasable programmable read-only memory (EPROM), an electrically-erasable programmable read-only memory (EEPROM), a computer-readable medium, or the like.
  • ROM read-only memory
  • CDROM compact disc read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically-erasable programmable read-only memory
  • the respective RAM can contain, for example, the operating program for either the server or the respective client device.
  • the RAM can, for example, be programmed using conventional techniques known to those having ordinary skill in the art of computer programming.
  • the actual source code or object code for carrying out the steps of, for example, a computer program can be stored in the RAM.
  • Each of the server and the client devices can also include a database.
  • the database can be any type of computer database for storing, maintaining, and allowing access to electronic information stored therein.
  • the server preferably resides on a network, such as a local area network (LAN), a wide area network (WAN), a virtual private network (VPN), or the Internet.
  • Each of the client devices preferably is wirelessly connected to the network on which the host server resides, thus enabling electronic communications between the server and the respective client device.
  • the directory 105 includes the following components:
  • mobile Internet-enabled smart telephones 305 are typically used by clients of the system 100 .
  • the telephones 305 are understood to be general purpose end user devices which have been assigned telephone numbers; for example, the Apple iPhone.
  • the middleware toolkit 110 is incorporated into one or more applications 115 running on the mobile telephone 305 , and each of these applications could register an associated communications address with the directory 105 .
  • the directory 105 receives queries and sends responses using a protocol such as ENUM, which is a DNS-based protocol for the mapping of telephone numbers into Uniform Resource Indicators (URIs), which are the identifiers that designate Internet applications such as web pages and e-mail inboxes.
  • ENUM is a DNS-based protocol for the mapping of telephone numbers into Uniform Resource Indicators (URIs), which are the identifiers that designate Internet applications such as web pages and e-mail inboxes.
  • the middleware toolbox 110 therefore acts as an ENUM resolver, a type of DNS resolver with additional capabilities to understand NAPTR DNS Resource Records, which contain URIs, and is capable of properly formulating ENUM queries and understanding ENUM replies.
  • the directory 105 is capable of mapping ENUM queries to the keys of its database, extracting the values associated with those keys, and formulating them into NAPTR DNS RR format to be sent back to the client.
  • One exemplary application 115 that could make use of the URIs returned by the directory 105 is an extension to the iPhone contact book.
  • a user might provision, through the user interface of the iPhone, certain identifiers associated with his own telephone number.
  • the contact book application uploads these identifiers to the directory, along with the list of contacts and associated telephone numbers that the user has provisioned in his contact book.
  • the directory 105 will return the set of provisioned identifiers, which will in turn populate the querying user's entry for the provisioning user in his own contact book. This allows identifiers to spread automatically and seamlessly between contacts, without revealing that information to anyone who is not a contact.
  • system 100 may be implemented by devices that are not tied to mobile telephones, but are identified by telephone numbers.
  • This could include, for example, telephony applications operating on a desktop computer.
  • This could also include applications that run on a general purpose computer operated by a user who also subscribes to a traditional, non-Internet based telephone service, and wishes simply to use that telephone number as a means of identifying various Internet services.
  • Some external applications might benefit from querying the database to learn which telephone numbers are associated with various applications. For example, a “lobby service” that helps users find partners for online games might query the database externally to learn which games two users have in common as part of a rendezvous activity.
  • reciprocal authorization works according to the following rule: If a first user has provisioned a second user as a contact, then the second user is authorized to see the identifiers provisioned by the first user, and conversely if the second user has provisioned the first user as a contact, then the first user is authorized to see the identifiers provisioned by the second user.
  • Reciprocal authorization is a simple policy. However, users may desire finer grained policy controls that could, for example, allow particular identifiers to be authorized or forbidden to particular requesters on a case-by-case basis. In a preferred embodiment of the invention, the system may use any acceptable form of authorization, including fine-grained policy controls that make authorization determinations on a case-by-case basis.

Landscapes

  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Immunology (AREA)
  • Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • Molecular Biology (AREA)
  • Chemical & Material Sciences (AREA)
  • Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Hematology (AREA)
  • Urology & Nephrology (AREA)
  • Veterinary Medicine (AREA)
  • Optics & Photonics (AREA)
  • Public Health (AREA)
  • Animal Behavior & Ethology (AREA)
  • Surgery (AREA)
  • Medical Informatics (AREA)
  • Heart & Thoracic Surgery (AREA)
  • Biophysics (AREA)
  • Cell Biology (AREA)
  • Medicinal Chemistry (AREA)
  • General Physics & Mathematics (AREA)
  • Microbiology (AREA)
  • Biochemistry (AREA)
  • Analytical Chemistry (AREA)
  • Food Science & Technology (AREA)
  • Biotechnology (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Investigating Or Analyzing Materials By The Use Of Electric Means (AREA)
  • Emergency Medicine (AREA)

Abstract

A method and system for distributing contacting information between applications is provided. The system preferably uses an ENUM-type protocol and a middleware tool kit to associate telephone numbers to other identifying information, such as e-mail addresses or URLs for web sites. The system enables the associated contacting information to be shared across multiple applications that may be implemented on a computer or a mobile telephony device. Information is shared only after verification that a requester is authorized to receive the requested contacting information.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to the field of electronic communications. More particularly, the invention relates to sharing contact information across applications such as mobile telephones and the Internet.
  • 2. Related Art
  • Many existing technologies use ENUM or ENUM-like mechanisms for resolving telephone numbers into the URIs that identify network services. Many systems also enable portability of contact books, i.e., allowing a user to transfer a list of contacts from one computer to another, or synchronizing between mobile and desktop systems, or allowing a user to purchase a new mobile device and then to download or otherwise transfer a contact book from the old device. There are also conventional systems that use reciprocal authorization. For example, some instant messaging systems enable two parties to identify themselves as “buddies”, who are then able to detect each other's presence, or online status, and to send messages to one another.
  • However, these conventional systems primarily address situations in which contact information is being transferred between devices controlled by a single user. In the instant messaging example, although two users are involved, reciprocal authorization is required, and the functionality is relatively limited. Accordingly, there is a need for a capability to share contact information between multiple users across applications simply and efficiently.
  • SUMMARY OF THE INVENTION
  • In one aspect, the invention provides a method for sharing contact information of a first user between a first application and a second application. The method comprises using a server on a computer network to perform the steps of: identifying first information relating to the first user; provisioning identification data associated with the first information; storing the provisioned data and the first information together in a first database; receiving a request for the provisioned data from a second user; determining whether the second user is authorized to obtain the provisioned data; when a determination is made that the second user is authorized to obtain the provisioned data, retrieving the provisioned data from the first database; and transmitting the provisioned data to a device associated with the second user.
  • The method may further comprise the step of receiving from the first user data for identifying authorized potential users. The step of determining whether the second user is authorized to obtain the provisioned data may further comprise determining whether the data for identifying authorized potential users includes data for identifying the second user. The step of identifying first information relating to the first user may further comprise receiving a prompt and the first information from a device associated with the first user. The first information may comprise a telephone number. The device associated with the first user may comprise a mobile telephony device associated with the first user. The first information may comprise a telephone number associated with the device associated with the first user.
  • The mobile telephony device associated with the first user may comprise a middleware tool kit. The middleware tool kit may comprises a first network interface configured to transmit prompts and information over the computer network; a second network interface configured to transmit queries over the computer network and to receive responses to the transmitted queries; a first application programming interface (API) for receiving provisioning requests from applications; and a second API for receiving information requests from applications and for transmitting responses to the information requests to the requesting applications.
  • The provisioned data may comprise at least one Uniform Resource Indicator (URI). The at least one provisioned URI may be associated with an identifier selected from the group consisting of a telephone number, an e-mail address, an instant messaging handle, and a Uniform Resource Locator (URL) of a web page. The device associated with the second user may comprise a mobile telephony device associated with the second user. The step of transmitting the provisioned data may further comprise transmitting an SMS text message to the mobile telephony device associated with the second user. The step of provisioning identification data associated with the first information may further comprise transmitting an SMS text message to a device associated with the first user to determine whether the identification data to be provisioned is correctly associated with the first information.
  • In another aspect, the invention provides a system for sharing contact information of a first user between a first application and a second application. The system comprises a server configured for communicating with client devices over a computer network. The server is configured to perform the steps of: identifying first information relating to a first user; provisioning identification data associated with the first information; storing the provisioned data and the first information together in a first database; receiving a request for the provisioned data from a second user; determining whether the second user is authorized to obtain the provisioned data; when a determination is made that the second user is authorized to obtain the provisioned data, retrieving the provisioned data from the first database; and transmitting the provisioned data to a client device associated with the second user.
  • The server may be further configured to perform the steps of receiving from the first user data for identifying authorized potential users, and determining whether the data for identifying authorized potential users includes data for identifying the second user. The server may be further configured to perform the step of receiving a prompt and the first information from a client device associated with the first user. The first information may comprise a telephone number. The client device associated with the first user may comprise a mobile telephony device associated with the first user. The first information may comprise a telephone number associated with the client device associated with the first user.
  • The mobile telephony device associated with the first user may comprise a middleware tool kit. The middleware tool kit may comprise a first network interface configured to transmit prompts and information over the computer network; a second network interface configured to transmit queries over the computer network and to receive responses to the transmitted queries; a first application programming interface (API) for receiving provisioning requests from applications; and a second API for receiving information requests from applications and for transmitting responses to the information requests to the requesting applications.
  • The provisioned data may comprise at least one Uniform Resource Indicator (URI). The at least one provisioned URI may be associated with an identifier selected from the group consisting of a telephone number, an e-mail address, an instant messaging handle, and a Uniform Resource Locator (URL) of a web page. The client device associated with the second user may comprise a mobile telephony device associated with the second user. The server may be further configured to perform the step of transmitting an SMS text message to the mobile telephony device associated with the second user. The server may be further configured to perform the step of transmitting an SMS text message to a device associated with the first user to determine whether the identification data to be provisioned is correctly associated with the first information.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a block diagram of an architecture for a system for sharing contacting information across applications according to a preferred embodiment of the invention.
  • FIG. 2 shows a flow chart that illustrates a method for sharing contacting information across applications according to a preferred embodiment of the invention.
  • FIG. 3 illustrates a directory containing installed applications and a database for storing provisioned contacting information as used in the system of FIG. 1.
  • FIG. 4 illustrates an information flow diagram for the provisioning and querying steps of a method for sharing contacting information across applications according to a preferred embodiment of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present inventors have recognized the need to enable sharing of contact information across multiple applications and among multiple users in a reasonably simple and efficient manner. Accordingly, it is an object of the present invention to provision ENUM in an automated and transparent way, while preventing public disclosure of contact information.
  • In a preferred embodiment of the invention, a system is designed to enable sharing of supplemental contact information between users of mobile telephones. When two mobile phone users know one another's telephone numbers, the system allows them to learn other ways of communicating over the Internet, for example email addresses or addresses for instant messaging. Applications can leverage this knowledge to help users discover contacts who also utilize the same application.
  • The invention was inspired by ENUM, in particular by the difficulty of seeding directories for translating telephone numbers into Internet identifiers. Many mobile telephones, notably the iPhone, have rich contact books with numerous identifiers that could be published via ENUM. The difficulties are that provisioning ENUM is typically a cumbersome step, and many users are reluctant to make their contact information public. Accordingly, in a preferred embodiment of the invention, the provisioning is made transparent, and reciprocal authorization whitelisting is used as a baseline, thereby preventing public disclosure of contact information.
  • Referring to FIG. 1, a block diagram of an architecture of a system 100 according to a preferred embodiment of the invention is shown. The system 100 includes a directory 105 and a middleware toolkit 110 which are leveraged by applications 115 to discover new identifiers associated with the telephone number of a contact. The system 100 also includes an authorization database 120 which can be accessed by the directory 105 in order to verify that a requesting client is authorized to receive contacting information in response to a request for same. In a broad sense, the system 100 is designed to translate one identifier into a set of different identifiers. The identifier so translated is, for the sake of readability, hereafter exemplified by a telephone number, and although the telephone number is used for the translated identifier in the preferred implementation, the invention is not limited to the use of telephone numbers for translated identifiers.
  • Referring to FIG. 2, a flow chart 200 that illustrates a method of sharing contacting information across applications according to preferred embodiment of the present invention is shown. In the first step 205, the identifiers associated with a telephone number are provisioned into a server on a computer network, either as a bulk operation or one by one, by various clients attached to the same computer network. In the second step 210, upon receiving the provisioning instructions from clients, the server stores that data in a database table, with the telephone number serving as the key and one or more identifiers associated with the telephone number serving as the value. In the third step 215, a translation is instigated by one such client, generally in order to acquire information provisioned by other clients, and performed by said server, which returns the response to the client.
  • In the fourth step 220, the server verifies that the requesting client is authorized to receive the requested information by consulting a second database, which includes information that identifies authorized senders of queries. The second database may be resident locally, or it may reside elsewhere on the network. Then, upon verification that the requesting client is so authorized, the server returns the identifiers in response to the client, and the client delivers the response to an application in step 225. Finally, in step 230, the application may make use of the identifiers immediately, or it may store them for future use or invocation by the user. If the identifiers are stored, they are stored for a specific lifetime, after which application must ask the client to make a new query to the server.
  • In the system 100, an application may learn identifiers of a user through manual input, as is the case with a contact book, or the application may actually assign identifiers to a use, as is the case with an instant messaging application in which a user registers a new identifier. The system 100 may be implemented, for example, where users commonly contact one another by dialing a telephone number, and where terminals commonly record the calling and called parties in a telephone conversation, thus building a list of contacts by telephone number. In this manner, the system 100 allows users to discover other communications and applications identifiers associated with their contacts, even if they know their contact only by telephone number.
  • Referring again to FIG. 1, the directory 105 is the back-end database that maintains the mappings from telephone numbers to various application identifiers, and also the server interface to that directory. The directory 105 is populated by the middleware toolkit 110, which sends provisioning information to the directory 105. The directory 105 is queried through the middleware toolkit 110 by applications 115 that want to acquire mappings for a particular telephone number. The directory 105 also maintains, or accesses externally, a list of contacts associated with a particular telephone number, in order to learn which telephone numbers are authorized to query for a particular application.
  • The middleware toolkit 110 is a software library that contains the necessary code to interface with the directory 105 over the Internet. Applications 115 use the middleware toolkit 110 to learn about the application identifiers associated with a particular telephone number. The application 115 is a communications application residing on a general purpose computer, be it a desktop or a mobile handset, that makes use of the middleware toolkit to learn and provision the application identifiers associated with a telephone number. The application 115 may be understood broadly to include any software used for personal communication on the Internet, including various messaging, real-time audio transmission, and gaming applications.
  • An identifier includes any information that represents a user within the scope of a particular communications system. Examples include telephone numbers, e-mail addresses, instant messaging handles, and the Uniform Resource Locator (URL) of a web page where a user might be reached. Calling, invoking, or dereferencing an application identifier typically causes the invocation of the application and contacts through the application the user has designated by the identifier.
  • The directory 105 resides on one or more servers. The server is preferably implemented by the use of one or more general purpose computers, such as, for example, a Sun Microsystems Fire F15k. Each of the middleware tool kit 110, the applications 115, and the authorization database 120 may also be implemented by the use of one or more general purpose computers, such as, for example, a typical personal computer manufactured by Dell, Gateway, or Hewlett-Packard; or more preferably, the middleware tool kit 110 and the applications 115 may be implemented on a smart mobile telephone, such as, for example, an Apple iPhone or a Blackberry Storm mobile telephone or a smart mobile telephone manufactured by Google. Each of the server and the client devices on which the middleware tool kit 110, the applications 115, and the authorization database 120 reside can include a microprocessor. The microprocessor can be any type of processor, such as, for example, any type of general purpose microprocessor or microcontroller, a digital signal processing (DSP) processor, an application-specific integrated circuit (ASIC), a programmable read-only memory (PROM), or the like. The server may use its microprocessor to read a computer-readable medium containing software that includes instructions for carrying out one or more of the functions of the directory 105, as further described below.
  • Each of the server and the client devices on which the middleware tool kit 110, the applications 115, and the authorization database 120 reside can also include computer memory, such as, for example, random-access memory (RAM). However, the computer memory of each of the server and the client devices can be any type of computer memory or any other type of electronic storage medium that is located either internally or externally to the server or the client devices, such as, for example, read-only memory (ROM), compact disc read-only memory (CDROM), electro-optical memory, magneto-optical memory, an erasable programmable read-only memory (EPROM), an electrically-erasable programmable read-only memory (EEPROM), a computer-readable medium, or the like. According to exemplary embodiments, the respective RAM can contain, for example, the operating program for either the server or the respective client device. As will be appreciated based on the following description, the RAM can, for example, be programmed using conventional techniques known to those having ordinary skill in the art of computer programming. The actual source code or object code for carrying out the steps of, for example, a computer program can be stored in the RAM. Each of the server and the client devices can also include a database. The database can be any type of computer database for storing, maintaining, and allowing access to electronic information stored therein. The server preferably resides on a network, such as a local area network (LAN), a wide area network (WAN), a virtual private network (VPN), or the Internet. Each of the client devices preferably is wirelessly connected to the network on which the host server resides, thus enabling electronic communications between the server and the respective client device.
  • In a preferred embodiment, the directory 105 includes the following components:
      • a back-end database whose keys are telephone numbers and whose values are identifiers of applications, for example, e-mail addresses, running on a general purpose computer
      • a first network interface that receives queries and sends responses to those queries after consulting the database
      • a second network interface that receives provisioning from middleware toolkits to populate the database
      • a set of policies for the formulation of responses, based on the preference of users, which are either defaults built into the system or are provisioned directly by the user through a third network interface
        In a preferred embodiment, the middleware toolkit 110 includes the following components:
      • a first network interface for sending provisioning requests to the directory
      • a second network interface for sending queries to the directory and receiving responses
      • a first application programming interface (API) for receiving provisioning requests from applications
      • a second application programming interface for receiving requests for the identifiers associated with a telephone number, and sending responses back to the application
        The system 100 may be implemented by installing the middleware 110 in a mobile telephone device, where one or more applications 115, such as, for example, a contact book, invoke the middleware toolkit 110. The middleware toolkit 110 communicates over the Internet with the directory 105, either by provisioning the directory 105, or querying for information that has already been provisioned in the directory 105, or both. The application 115 then makes use of the contact information learned by the middleware toolkit 110; the manner in which this information is used by the application 115 varies based on the application's needs. For example, a contact book application could render to the user the various contact addresses associated with applications that it learned from the middleware toolkit 110. The user might then select one of these contact addresses in order to initiate a communication with that application, for example, e-mail.
  • Referring to FIG. 3, in a preferred embodiment of the invention, mobile Internet-enabled smart telephones 305 are typically used by clients of the system 100. The telephones 305 are understood to be general purpose end user devices which have been assigned telephone numbers; for example, the Apple iPhone. The middleware toolkit 110 is incorporated into one or more applications 115 running on the mobile telephone 305, and each of these applications could register an associated communications address with the directory 105.
  • Referring to FIG. 4, in a preferred embodiment of the present invention, the directory 105 receives queries and sends responses using a protocol such as ENUM, which is a DNS-based protocol for the mapping of telephone numbers into Uniform Resource Indicators (URIs), which are the identifiers that designate Internet applications such as web pages and e-mail inboxes. The middleware toolbox 110 therefore acts as an ENUM resolver, a type of DNS resolver with additional capabilities to understand NAPTR DNS Resource Records, which contain URIs, and is capable of properly formulating ENUM queries and understanding ENUM replies. The directory 105 is capable of mapping ENUM queries to the keys of its database, extracting the values associated with those keys, and formulating them into NAPTR DNS RR format to be sent back to the client.
  • One exemplary application 115 that could make use of the URIs returned by the directory 105 is an extension to the iPhone contact book. A user might provision, through the user interface of the iPhone, certain identifiers associated with his own telephone number. The contact book application uploads these identifiers to the directory, along with the list of contacts and associated telephone numbers that the user has provisioned in his contact book. Whenever any of those contacts queries the directory 105 for the user's telephone number, the directory 105 will return the set of provisioned identifiers, which will in turn populate the querying user's entry for the provisioning user in his own contact book. This allows identifiers to spread automatically and seamlessly between contacts, without revealing that information to anyone who is not a contact.
  • In an alternative embodiment, the system 100 may be implemented by devices that are not tied to mobile telephones, but are identified by telephone numbers. This could include, for example, telephony applications operating on a desktop computer. This could also include applications that run on a general purpose computer operated by a user who also subscribes to a traditional, non-Internet based telephone service, and wishes simply to use that telephone number as a means of identifying various Internet services.
  • Some external applications might benefit from querying the database to learn which telephone numbers are associated with various applications. For example, a “lobby service” that helps users find partners for online games might query the database externally to learn which games two users have in common as part of a rendezvous activity.
  • The use of reciprocal authorization works according to the following rule: If a first user has provisioned a second user as a contact, then the second user is authorized to see the identifiers provisioned by the first user, and conversely if the second user has provisioned the first user as a contact, then the first user is authorized to see the identifiers provisioned by the second user. Reciprocal authorization is a simple policy. However, users may desire finer grained policy controls that could, for example, allow particular identifiers to be authorized or forbidden to particular requesters on a case-by-case basis. In a preferred embodiment of the invention, the system may use any acceptable form of authorization, including fine-grained policy controls that make authorization determinations on a case-by-case basis.
  • While the present invention has been described with respect to what is presently considered to be the preferred embodiment, it is to be understood that the invention is not limited to the disclosed embodiments. To the contrary, the invention is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures and functions.

Claims (20)

1. A method for sharing contact information of a first user between a first application and a second application, the method comprising using a server on a computer network to perform the steps of:
identifying first information relating to the first user;
provisioning identification data associated with the first information;
storing the provisioned data and the first information together in a first database;
receiving a request for the provisioned data from a second user;
determining whether the second user is authorized to obtain the provisioned data;
when a determination is made that the second user is authorized to obtain the provisioned data, retrieving the provisioned data from the first database; and
transmitting the provisioned data to a device associated with the second user.
2. The method of claim 1, further comprising the step of receiving from the first user data for identifying authorized potential users, and wherein the step of determining whether the second user is authorized to obtain the provisioned data further comprises determining whether the data for identifying authorized potential users includes data for identifying the second user.
3. The method of claim 1, wherein the step of identifying first information relating to the first user further comprises receiving a prompt and the first information from a device associated with the first user.
4. The method of claim 3, wherein the first information comprises a telephone number, and wherein the device associated with the first user comprises a mobile telephony device associated with the first user, and wherein the first information comprises a telephone number associated with the device associated with the first user.
5. The method of claim 4, wherein the mobile telephony device associated with the first user comprises a middleware tool kit,
wherein the middleware tool kit comprises:
a first network interface configured to transmit prompts and information over the computer network;
a second network interface configured to transmit queries over the computer network and to receive responses to the transmitted queries;
a first application programming interface (API) for receiving provisioning requests from applications; and
a second API for receiving information requests from applications and for transmitting responses to the information requests to the requesting applications.
6. The method of claim 1, wherein the provisioned data comprises at least one Uniform Resource Indicator (URI).
7. The method of claim 6, wherein the at least one provisioned URI is associated with an identifier selected from the group consisting of a telephone number, an e-mail address, an instant messaging handle, and a Uniform Resource Locator (URL) of a web page.
8. The method of claim 1, wherein the device associated with the second user comprises a mobile telephony device associated with the second user.
9. The method of claim 8, wherein the step of transmitting the provisioned data further comprises transmitting an SMS text message to the mobile telephony device associated with the second user.
10. The method of claim 9, wherein the step of provisioning identification data associated with the first information further comprises transmitting an SMS text message to a device associated with the first user to determine whether the identification data to be provisioned is correctly associated with the first information.
11. A system for sharing contact information of a first user between a first application and a second application, the system comprising a server configured for communicating with client devices over a computer network, wherein the server is configured to perform the steps of:
identifying first information relating to a first user;
provisioning identification data associated with the first information;
storing the provisioned data and the first information together in a first database;
receiving a request for the provisioned data from a second user;
determining whether the second user is authorized to obtain the provisioned data;
when a determination is made that the second user is authorized to obtain the provisioned data, retrieving the provisioned data from the first database; and
transmitting the provisioned data to a client device associated with the second user.
12. The system of claim 11, wherein the server is further configured to perform the steps of:
receiving from the first user data for identifying authorized potential users, and determining whether the data for identifying authorized potential users includes data for identifying the second user.
13. The system of claim 11, wherein the server is further configured to perform the step of receiving a prompt and the first information from a client device associated with the first user.
14. The system of claim 13, wherein the first information comprises a telephone number, and wherein the client device associated with the first user comprises a mobile telephony device associated with the first user, and wherein the first information comprises a telephone number associated with the client device associated with the first user.
15. The system of claim 14, wherein the mobile telephony device associated with the first user comprises a middleware tool kit,
wherein the middleware tool kit comprises:
a first network interface configured to transmit prompts and information over the computer network;
a second network interface configured to transmit queries over the computer network and to receive responses to the transmitted queries;
a first application programming interface (API) for receiving provisioning requests from applications; and
a second API for receiving information requests from applications and for transmitting responses to the information requests to the requesting applications.
16. The system of claim 11, wherein the provisioned data comprises at least one Uniform Resource Indicator (URI).
17. The system of claim 16, wherein the at least one provisioned URI is associated with an identifier selected from the group consisting of a telephone number, an e-mail address, an instant messaging handle, and a Uniform Resource Locator (URL) of a web page.
18. The system of claim 11, wherein the client device associated with the second user comprises a mobile telephony device associated with the second user.
19. The system of claim 18, wherein the server is further configured to perform the step of transmitting an SMS text message to the mobile telephony device associated with the second user.
20. The system of claim 19, wherein the server is further configured to perform the step of transmitting an SMS text message to a device associated with the first user to determine whether the identification data to be provisioned is correctly associated with the first information.
US12/705,268 2010-02-12 2010-02-12 Method for distributing contact information between applications Active 2033-02-27 US9636053B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US12/705,268 US9636053B2 (en) 2010-02-12 2010-02-12 Method for distributing contact information between applications
US15/487,178 US10117609B2 (en) 2010-02-12 2017-04-13 Method for distributing contact information between applications
US16/178,915 US10693840B2 (en) 2010-02-12 2018-11-02 Method for distributing contact information between applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/705,268 US9636053B2 (en) 2010-02-12 2010-02-12 Method for distributing contact information between applications

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/487,178 Continuation US10117609B2 (en) 2010-02-12 2017-04-13 Method for distributing contact information between applications

Publications (3)

Publication Number Publication Date
US20110201312A1 US20110201312A1 (en) 2011-08-18
US20120009902A2 true US20120009902A2 (en) 2012-01-12
US9636053B2 US9636053B2 (en) 2017-05-02

Family

ID=44369986

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/705,268 Active 2033-02-27 US9636053B2 (en) 2010-02-12 2010-02-12 Method for distributing contact information between applications
US15/487,178 Active US10117609B2 (en) 2010-02-12 2017-04-13 Method for distributing contact information between applications
US16/178,915 Active US10693840B2 (en) 2010-02-12 2018-11-02 Method for distributing contact information between applications

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/487,178 Active US10117609B2 (en) 2010-02-12 2017-04-13 Method for distributing contact information between applications
US16/178,915 Active US10693840B2 (en) 2010-02-12 2018-11-02 Method for distributing contact information between applications

Country Status (1)

Country Link
US (3) US9636053B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110321134A1 (en) * 2010-06-28 2011-12-29 Seigo Kotani Consigning Authentication Method
US10693840B2 (en) 2010-02-12 2020-06-23 Neustar, Inc. Method for distributing contact information between applications

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
JP5792181B2 (en) 2009-11-23 2015-10-07 ブリマン、ミカイル Controlled electrochemical activation of carbon-based electrodes
US9638663B2 (en) 2011-07-25 2017-05-02 Proxim Diagnostics Corporation Cartridge for diagnostic testing
EP3077806B1 (en) * 2013-12-06 2019-09-11 Ortho Clinical Diagnostics, Inc. Assay device having a wash port
US9770207B2 (en) 2013-12-23 2017-09-26 Verily Life Sciences Llc Sensor electrodes in a bio-compatible device
US10262362B1 (en) 2014-02-14 2019-04-16 Experian Information Solutions, Inc. Automatic generation of code for attributes
WO2018144612A1 (en) 2017-01-31 2018-08-09 Experian Information Solutions, Inc. Massive scale heterogeneous data ingestion and user resolution
US11103163B2 (en) 2017-04-21 2021-08-31 2Pi-Sigma Corporation Test cartridge and lancet for automated medical sample collection and testing
US11202593B2 (en) 2017-04-21 2021-12-21 2Pi-Sigma Corp. Adjustable lancet and test cartridge for automated medical sample collection and testing
US10928411B2 (en) 2017-04-21 2021-02-23 2Pi-Sigma Corporation Automated medical sample collection and testing
US10791972B2 (en) 2017-04-21 2020-10-06 2Pi-Sigma Corporation Fluid measurement for automated medical sample collection and testing
US10816545B2 (en) * 2017-04-21 2020-10-27 2Pi-Sigma Corporation Automated medical sample collection, testing, and analysis
US11175303B2 (en) 2017-04-21 2021-11-16 2Pi-Sigma Corp. Automated medical sample collection and testing for providing blood coagulation indication
US11356551B2 (en) 2018-06-19 2022-06-07 Securelogix Corporation Active audio calling device identification system
WO2019246506A1 (en) 2018-06-21 2019-12-26 Securelogix Corporation Call authentication service systems and methods
US10963434B1 (en) 2018-09-07 2021-03-30 Experian Information Solutions, Inc. Data architecture for supporting multiple search models
JP7469309B2 (en) 2019-07-24 2024-04-16 大塚製薬株式会社 Measurement method and device
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US20220052980A1 (en) * 2020-08-13 2022-02-17 Oleksiy Ptashniy Method of service identification in enum structure
US11880377B1 (en) 2021-03-26 2024-01-23 Experian Information Solutions, Inc. Systems and methods for entity resolution

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020049828A1 (en) * 2000-10-11 2002-04-25 Peter Pekarek-Kostka Method and system for facilitating access to always current contact information
US20020152265A1 (en) * 2001-04-06 2002-10-17 Hillel Felman Method and apparatus for selectively releasing personal contact information stored in an electronic or telephonic database
US20030177246A1 (en) * 2002-03-15 2003-09-18 International Business Machines Corporation Centrally enhanced peer-to-peer resource sharing method and apparatus
US20030186704A1 (en) * 2002-03-26 2003-10-02 Ryo Tamura Data transmission/reception system, mobile terminal, content server, radio base station device and method for data transmission/reception
US20050266835A1 (en) * 2004-04-09 2005-12-01 Anuraag Agrawal Sharing content on mobile devices
US20070038720A1 (en) * 2001-02-27 2007-02-15 Mci Financial Management Corp. Method and Apparatus for Address Book Contact Sharing
US20090089292A1 (en) * 1998-10-13 2009-04-02 Chris Cheah Method and System for Controlled Distribution of One or More Distinct Profiles for a User
US20100082761A1 (en) * 2008-09-30 2010-04-01 Nokia Corporation Method and apparatus for address book contact management

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003058877A1 (en) * 2001-12-28 2003-07-17 Woodstock Systems, Llc Personal digital servertm (pdstm)
US8719375B2 (en) * 2007-03-22 2014-05-06 Microsoft Corporation Remote data access techniques for portable devices
US9636053B2 (en) 2010-02-12 2017-05-02 Neustar, Inc. Method for distributing contact information between applications

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090089292A1 (en) * 1998-10-13 2009-04-02 Chris Cheah Method and System for Controlled Distribution of One or More Distinct Profiles for a User
US20120016939A1 (en) * 1998-10-13 2012-01-19 Chris Cheah Method and system for controlled distribution of information over a network
US20020049828A1 (en) * 2000-10-11 2002-04-25 Peter Pekarek-Kostka Method and system for facilitating access to always current contact information
US20070038720A1 (en) * 2001-02-27 2007-02-15 Mci Financial Management Corp. Method and Apparatus for Address Book Contact Sharing
US20020152265A1 (en) * 2001-04-06 2002-10-17 Hillel Felman Method and apparatus for selectively releasing personal contact information stored in an electronic or telephonic database
US20030177246A1 (en) * 2002-03-15 2003-09-18 International Business Machines Corporation Centrally enhanced peer-to-peer resource sharing method and apparatus
US20030186704A1 (en) * 2002-03-26 2003-10-02 Ryo Tamura Data transmission/reception system, mobile terminal, content server, radio base station device and method for data transmission/reception
US20050266835A1 (en) * 2004-04-09 2005-12-01 Anuraag Agrawal Sharing content on mobile devices
US20100082761A1 (en) * 2008-09-30 2010-04-01 Nokia Corporation Method and apparatus for address book contact management

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10693840B2 (en) 2010-02-12 2020-06-23 Neustar, Inc. Method for distributing contact information between applications
US20110321134A1 (en) * 2010-06-28 2011-12-29 Seigo Kotani Consigning Authentication Method
US9467448B2 (en) * 2010-06-28 2016-10-11 Fujitsu Limited Consigning authentication method

Also Published As

Publication number Publication date
US20110201312A1 (en) 2011-08-18
US20190239783A1 (en) 2019-08-08
US10693840B2 (en) 2020-06-23
US10117609B2 (en) 2018-11-06
US20170281061A1 (en) 2017-10-05
US9636053B2 (en) 2017-05-02

Similar Documents

Publication Publication Date Title
US10693840B2 (en) Method for distributing contact information between applications
US8379837B2 (en) Method and system for providing and managing public telephone directory service
EP1790150B1 (en) Secured domain name system use based on pre-existing trust
US8463915B1 (en) Method for reducing DNS resolution delay
EP2266064B1 (en) Request routing
US20100299340A1 (en) Distributed contact information discovery and sharing
EP2518972A1 (en) System and method for device addressing
US20170104747A1 (en) Methods and systems for single sign-on while protecting user privacy
US20120023247A1 (en) Anonymous communication system, anonymous communication method, communication control apparatus, terminal apparatus and communication control program
WO2011010276A1 (en) Exchange of service capabilities in communication networks
TW201512855A (en) Cloud storage server and management method thereof
US20070050507A1 (en) Context discovery for DNS names
CN101878633A (en) Method and apparatus for use in xml document management architecture
JPWO2010119626A1 (en) ID authentication system, method and program
US8861503B2 (en) Method and system for synchronizing data between mobile terminal and internet phone
US20100303060A1 (en) Second call mode call set-up between two users
KR101973531B1 (en) Method and apparatus for automatically sharing applications between multiple clients
KR20100026874A (en) Resource common security for devide to device system and resource common method for devide to device
JP2007226343A (en) Presence system, presence presentation method, and program
US10277421B2 (en) Route lookup resolution
EP1819132B1 (en) Method and system for addressing in relation to multiple applications
US11233749B2 (en) External access to internal network resource
KR101005778B1 (en) Method and apparatus for getting information in database of Domain Name System
KR20070082774A (en) Integrated interface system and method
CN116112467A (en) Message processing system, method, device and equipment

Legal Events

Date Code Title Description
AS Assignment

Owner name: NEUSTAR, INC., VIRGINIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PETERSON, JON;DRYFOOS, WEBB;DAVIS, PETER CHARLIER;SIGNING DATES FROM 20100222 TO 20100305;REEL/FRAME:024074/0928

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNORS:NEUSTAR, INC.;TARGUS INFORMATION CORPORATION;QUOVA, INC;AND OTHERS;REEL/FRAME:027512/0119

Effective date: 20111108

AS Assignment

Owner name: NEUSTAR, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:029809/0177

Effective date: 20130122

Owner name: TARGUS INFORMATION CORPORATION, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:029809/0177

Effective date: 20130122

Owner name: AMACAI INFORMATION CORPORATION, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:029809/0177

Effective date: 20130122

Owner name: MUREX LICENSING CORPORATION, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:029809/0177

Effective date: 20130122

Owner name: ULTRADNS CORPORATION, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:029809/0177

Effective date: 20130122

Owner name: QUOVA, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:029809/0177

Effective date: 20130122

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNORS:NEUSTAR, INC.;NEUSTAR IP INTELLIGENCE, INC.;ULTRADNS CORPORATION;AND OTHERS;REEL/FRAME:029809/0260

Effective date: 20130122

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: NEUSTAR DATA SERVICES, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: NEUSTAR, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: MARKETSHARE HOLDINGS, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: NEUSTAR INFORMATION SERVICES, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: NEUSTAR IP INTELLIGENCE, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: MARKETSHARE ACQUISITION CORPORATION, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: ULTRADNS CORPORATION, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: MARKETSHARE PARTNERS, LLC, VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

Owner name: AGGREGATE KNOWLEDGE, INC., VIRGINIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:043618/0826

Effective date: 20170808

AS Assignment

Owner name: UBS AG, STAMFORD BRANCH, CONNECTICUT

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:MARKETSHARE PARTNERS LLC;AGGREGATE KNOWLEDGE, INC.;NEUSTAR INFORMATION SERVICES, INC.;AND OTHERS;REEL/FRAME:043633/0527

Effective date: 20170808

Owner name: BANK OF AMERICA, N.A., NORTH CAROLINA

Free format text: SECURITY INTEREST;ASSIGNORS:MARKETSHARE PARTNERS LLC;AGGREGATE KNOWLEDGE, INC.;NEUSTAR INFORMATION SERVICES, INC.;AND OTHERS;REEL/FRAME:043633/0440

Effective date: 20170808

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: SURCHARGE FOR LATE PAYMENT, LARGE ENTITY (ORIGINAL EVENT CODE: M1554); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A, NEW YORK

Free format text: GRANT OF SECURITY INTEREST IN UNITED STATES PATENTS;ASSIGNORS:EBUREAU, LLC;IOVATION, INC.;SIGNAL DIGITAL, INC.;AND OTHERS;REEL/FRAME:058294/0161

Effective date: 20211201

Owner name: DEUTSCHE BANK AG NEW YORK BRANCH, NEW YORK

Free format text: GRANT OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNORS:TRU OPTIK DATA CORP.;NEUSTAR INFORMATION SERVICES, INC.;NEUSTAR DATA SERVICES, INC.;AND OTHERS;REEL/FRAME:058294/0010

Effective date: 20211201

AS Assignment

Owner name: NEUSTAR IP INTELLIGENCE, INC., VIRGINIA

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:058300/0762

Effective date: 20211201

Owner name: NEUSTAR INFORMATION SERVICES, INC., VIRGINIA

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:058300/0762

Effective date: 20211201

Owner name: AGGREGATE KNOWLEDGE, INC., VIRGINIA

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:058300/0762

Effective date: 20211201

Owner name: MARKETSHARE PARTNERS LLC, VIRGINIA

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:058300/0762

Effective date: 20211201

Owner name: NEUSTAR, INC., VIRGINIA

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:058300/0762

Effective date: 20211201

Owner name: NEUSTAR IP INTELLIGENCE, INC., VIRGINIA

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:058300/0739

Effective date: 20211201

Owner name: NEUSTAR INFORMATION SERVICES, INC., VIRGINIA

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:058300/0739

Effective date: 20211201

Owner name: AGGREGATE KNOWLEDGE, INC., VIRGINIA

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:058300/0739

Effective date: 20211201

Owner name: MARKETSHARE PARTNERS LLC, VIRGINIA

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:058300/0739

Effective date: 20211201

Owner name: NEUSTAR, INC., VIRGINIA

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT RELEASE;ASSIGNOR:UBS AG, STAMFORD BRANCH;REEL/FRAME:058300/0739

Effective date: 20211201

AS Assignment

Owner name: SONTIQ, INC., MARYLAND

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: MARKETSHARE PARTNERS, LLC, VIRGINIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: NEUSTAR IP INTELLIGENCE, INC., VIRGINIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: NEUSTAR, INC., VIRGINIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: TRUSTID, INC., VIRGINIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: NEUSTAR INFORMATION SERVICES, INC., VIRGINIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: TRU OPTIK DATA CORP., ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: AGGREGATE KNOWLEDGE, LLC, VIRGINIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: TRANSUNION TELEDATA LLC, ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: TRANSUNION RENTAL SCREENING SOLUTIONS, INC., ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: TRANSUNION INTERACTIVE, INC., ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: TRANS UNION LLC, ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: SIGNAL DIGITAL, INC., ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: IOVATION, INC., ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

Owner name: EBUREAU, LLC, ILLINOIS

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL 058294, FRAME 0161;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:058593/0852

Effective date: 20211223

AS Assignment

Owner name: DEUTSCHE BANK AG NEW YORK BRANCH, NEW YORK

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE APPLICATION NO. 16/990,698 PREVIOUSLY RECORDED ON REEL 058294 FRAME 0010. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:TRU OPTIK DATA CORP.;NEUSTAR INFORMATION SERVICES, INC.;NEUSTAR DATA SERVICES, INC.;AND OTHERS;REEL/FRAME:059846/0157

Effective date: 20211201