Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD OF COMPUTER IMPLEMENTED CONTACT INFORMATION EXCHANGE
Document Type and Number:
WIPO Patent Application WO/2014/089687
Kind Code:
A1
Abstract:
A method of computer implemented contact information exchange involves establishing a cloud computing contact database on a remote server accessible on the world wide web and assigning to each individual user responsibility for maintaining and updating their individual contact information in the contact database. An interface is then provided to the contact database to display information from the contact database on computers or mobile devices of individual users. This enables individual users to be relieved of having to store contact information on their individual computers or mobile devices and of the need to continually update the contact information to keep it current.

Inventors:
CASLER DANIEL R (CA)
Application Number:
PCT/CA2013/001038
Publication Date:
June 19, 2014
Filing Date:
December 10, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CASLER DANIEL R (CA)
International Classes:
H04W4/12; H04W4/80; H04L12/24; H04W4/08; G06V30/224
Domestic Patent References:
WO2006088627A22006-08-24
Foreign References:
US20100088276A12010-04-08
US20110252091A12011-10-13
Attorney, Agent or Firm:
THOMPSON, Douglas B. et al. (Suite 201 1007 Fort Stree, Victoria British Columbia V8V 3K5, CA)
Download PDF:
Claims:
What is Claimed is:

1. A method of computer implemented contact information exchange, comprising: establishing a cloud computing contact database on a remote server accessible on the world wide web;

assigning to each individual user responsibility for maintaining and updating their individual contact information in the contact database; and

providing an interface to the contact database to display information from the contact database on computers or mobile devices of individual users, such that individual users are relieved of having to store contact information on their individual computers or mobile devices and are relieved of the need to continually update the contact information to keep it current. 2. The method of Claim 1 , wherein the contact database on the remote server is

restricted to a group having a membership roster and the interface to the contact database is accessible only to members of the group, such that individual members of the group have access to the entire membership roster at all times without having to store the entire membership roster on their computers or mobile devices.

3. The method of Claim 1, comprising further:

providing on the contact database a plurality of blank contact information templates, each of the blank contact information templates having a unique identifier code by means of which each of the blank contact information templates may be individually accessed through the world wide web; and

providing to an individual member of the public a machine readable version of the unique identifier code for a particular one of the blank contact information templates and inviting the individual member of the public to populate the particular blank contact information template with their contact information, such that the individual member of the public may selectively chose to share their contact information with a third party by allowing the third party to use their mobile phones to save the unique identifier code which allows the third party to receive contact information for the individual member of the public from the remote server.

4. The method of Claim 3, wherein the machine readable version of the unique identifier code is provided to the individual member of the public on an adhesive sticker, along with instructions regarding mounting the adhesive sticker to a back of a mobile telephone.

5. The method of Claim 3, wherein the machine readable version of the unique identifier code is provided to the individual member of the public on a plastic credit card sized card.

6. The method of Claim 3, wherein the machine readable unique identifier code is based upon one of bar code technology, QR code technology, or Near Field Communication (NFC) technology. 7. The method of Claim 3, wherein the remote server records in the database an outgoing contact information listing of every third party that has received the contact information of the individual member of the public.

8. The method of Claim 7, wherein upon the individual member of the public updating his or her contact information in the database, the remote server updates the records of every third party on the outgoing contact information listing as the third party logs on to the remote server.

9. The method of Claim 7, wherein remote server enables the individual member of the public to view the outgoing contact information listing stored in the database of every third party that has saved the contact information of the individual member of the public.

10. The method of Claim 9, wherein the remote server enables the individual member of the public to designate any third party on the outgoing contact information listing as being blocked from receiving further automatic updates.

1 1. The method of Claim 3, wherein the remote server records in the database an incoming contact information listing of every third party who has given his or her contact information to the individual member of the public. 12. The method of Claim 1 1, wherein the remote server permits the individual member of the public to download to their mobile phone the incoming contact information listing.

Description:
TITLE

[0001 ] Method of computer implemented contact information exchange

FIELD

[0002] There is described a method of computer implemented contact information exchange.

BACKGROUND

[0003] A relatively new development with business cards is the addition to the face of the business card of a QR code. There are computer programs, such as SCANLIFE tm , that can be downloaded to a mobile phone and used to scan the QR code. The QR code takes the reader to the business website, where a wealth of additional information may be accessed. It should be noted that these systems can also be implemented with other code forms, the QR code being merely one of the more common forms of codes currently in use.

[0004] There are computer programs, such as SCANBIZCARDS business card reader, which are used to scan and organize business cards for future reference.

[0005] There will hereinafter be described an alternative method of computer implemented contact information exchange, which can be implemented by a potential user, even if the user does not have a business card and does not have a website. There will also be described how this method can be adapted for various applications.

SUMMARY

[0006] There is provided a method of computer implemented contact information exchange which involves establishing a cloud computing contact database on a remote server accessible on the world wide web and assigning to each individual user responsibility for maintaining and updating their individual contact information in the contact database. An interface is then provided to the contact database to display information from the contact database on computers or mobile devices of individual users. This enables individual users to be relieved of having to store contact information on their individual computers or mobile devices and of the need to continually update the contact information to keep it current. [0007] This method will be extremely valuable to members of organizations. The contact database on the remote server can be restricted to a group having a membership roster and the interface to the contact database is accessible only to members of the group. This enables individual members of the group to have access to the entire membership roster at all times without having to store the entire membership roster on their computers or mobile devices.

[0008] This method will also be valuable to business organizations in keeping their business contact information current, as the business contacts themselves will be assuming responsibility for maintaining the contact information on the remote server.

[0009] The method is also of value to individual members of the public who do not have business or organizational affiliations. Individual members of the public are accommodated by providing on the contact database a plurality of blank contact information templates, each of the blank contact information templates having a unique identifier code by means of which each of the blank contact information templates may be individually accessed through the world wide web. An individual member of the public is provided with a machine readable version of the unique identifier code for a particular one of the blank contact information templates and invited to populate the particular blank contact information template with their contact information. This enables the individual member of the public to selectively chose to share their contact information with a third party by allowing the third party to use their mobile phones to save the unique identifier code which allows the third party to receive contact information for the individual member of the public from the remote server.

[0010] When we meet persons in a business setting, the established etiquette is to exchange business cards. The business cards provide business contact information to facilitate future business communications. In contrast, when we meet persons in a social setting a business card with business contact information is usually not appropriate. A social setting requires the exchange of personal contact information, such as our home address and our home phone number. At the present time, personal contact information is usually communicated verbally or provided ad hoc by writing such personal contact information on a slip of paper. The above described method facilitates a computer implemented contact information exchange in which the individual member of the public may selectively chose to share their contact information with a third party by merely allowing the third party to use their mobile phone to save the machine readable unique identifier code.

[001 1] It is recognized that in order for this method to be useful, the unique identifier codes must readily available on the person of the individual member of the public. There are a number of ways in which this can be done. One way is for the unique identifier code to be provided to the individual member of the public as an adhesive sticker, along with instructions regarding mounting the adhesive sticker to a back of a mobile telephone. Another way is for the unique identifier code is provided to the individual member of the public as a plastic credit card sized card, which can be stored in the wallet of the individual member. [0012] Although the described method has strong advantages for the exchange of personal contact information in a social contact, it will be appreciated that there is no reason why the method may not also be used for the exchange of business contact information. It is envisaged that for the exchange of business contact information that the unique identifier code will be placed on a business card that is given to and retained by the third party. In a business context, a company may reserve a block of unique identifier codes for employees of the company, with each of the unique identifier codes providing access to one of the blank contact information templates. As a new employee joins the company, he or she is provided with one of the unique identifier codes and asked to populate the blank contact information template associated with that particular unique identifier code with his or her business contact information. It will also be appreciated that in a business context, the contact information template may include information that differs slightly from that which the contact information template for a social exchange requires.

[0013] The present method has a unique aspect when viewed from the point of view of a third party who has received contact information. When programs, such as

SCANBIZCARDS business card reader, are used; a major concern is making sure that the information in the database is kept current. The task of keeping the information current falls upon the third party. However, when one exchanges contact information in accordance with the present method, keeping information in the database current is not a concern. The information is always provided from the contact information template. The information in the contact information template is maintained by the individual to whom the contact information template has been assigned. Presumably, this will always result in the information in the contact information template being updated on a timely basis.

[0014] There are a number of different machine readable technologies that can be used to implement the present method. QR technology is one that is presently being used on business cards and appears to be a logical choice. There are, however, older bar code technologies that would work. There are technologies currently used in the retail industry that would work. There are also technologies that are currently gaining popularity, such as Near Field Communication (NFC), that would work. BRIEF DESCRIPTION OF THE DRAWINGS

[0015] These and other features will become more apparent from the following description in which reference is made to the appended drawings, the drawings are for the purpose of illustration only and are not intended to be in any way limiting, wherein:

[0016] FIG. 1 is a flow chart of a contact information activation process.

[0017] FIG. 2 is a flow chart of an automatic contact information synchronization feature, with blocking capabilities.

[0018] FIG. 3 is a flow diagram providing an overview of the process as applied to groups or organizations. DETAILED DESCRIPTION

[0019] A method of computer implemented contact information exchange will now be described with reference to FIG. 1 through FIG. 3.

Overview

[0020] Referring to FIG. 3, the computer implemented contact information exchange involves establishing a cloud computing contact database 12 on a remote server 14 accessible on the world wide web 16 and assigning to each individual user responsibility for maintaining and updating their individual contact information in contact database 12. An interface 18 is then provided to contact database 12 to display information from contact database 12 on computers or mobile devices 20 of individual users. This enables individual users to be relieved of having to store contact information on their individual computers or mobile devices 20 and of the need to continually update the contact information to keep it current.

Application to Individual Users

[0021] Referring to FIG. 1, in order to accommodate individual members of the public, the database has a plurality of blank contact information templates 22. A unique identifier code 24 is assigned to each of the blank contact information templates by means of which each of the blank contact information templates may be individually accessed through the world wide web. The individual member of the public is provided with a machine readable version of the unique identifier code for a particular one of the blank contact information templates and invited to populate the particular blank contact information template with their contact information. This enables the individual member of the public may selectively chose to share their contact information with a third party by allowing the third party to save the unique identifier code which allows the third party to receive contact information for the individual member of the public from the remote server. The method will now be further described.

[0022] The present method is a complete system that allows an inactive QR code or any form of image recognition (element) to be placed on an adhesive sticker, a credit card sized plastic card 26 or any medium for that matter and then be distributed. This inactive element can then be activated by going to a web site. The element is inactive because when it is scanned by a smartphone, it takes the user to "blank or not found web page". Basically, there is not data at the destination address or assigned to the element. All that the element contains (encoded with) is a web address and a unique identifier for that specific element.

[0023] A user (individual or business) can go to a web site and type, either on a PC or through their smartphone and activate the element by typing in a serial number that accompanies the element. The serial number is an alternative, user friendly way of uniquely identifying the element. Alternatively, the user could use the unique identifier that is encoded in the element. The primary method will be the serial number; however, the unique identifier should be cited as well. Upon typing the serial number into a web site and having the web site validate that the serial number as being valid, the user can proceed to create and account and setup a contact information profile. This contact information profile contains any and all relevant contact information such as phone number, email address, physical address, fax number, etc. The profile can also contain a link to a web site, Facebook, Twitter, Linkedin or YouTube page. Upon successfully completing the activation process, the element becomes active and the next time it is scanned by a smartphone user, it will display the profile which was setup for it.

Application to Business

[0024] This same concept of pre-generated elements for individuals, can also be used for businesses. The profile information that can be assigned to the element varies depending on whether the profile is for an individual or business. Individuals have information that businesses do not and vice versa. It is therefore preferred that there be pre-generated elements for individuals and pre-generated elements for businesses. It will be appreciated that we can have an infinite number of element types that could be tailored for specific applications. In a business context, the pre-generated element will usually be placed on a business card. It could, of course, be on a brochure or other piece of material that is handed out to potential customers. [0025] Additionally, by having multiple types of pre-generated elements for specific purposes (individuals and businesses) it allows us to pre-generate what we call "business packs". A business pack comprises of a parent element (for the business), the primary element with the serial number, as well as "sub elements", which are intended for employees and are associated (owned by/belong to) the parent element. This allows a business that gets business cards printed to have a unique element placed on every employees business card. Once the parent element is activated and an account created, the inactivated elements on each employees business card can be activated through the parent account. Employee activation takes place by the owner of the parent account logging into a web site and then providing the unique employment details for each inactive employee code. [0026] The purpose of distributing inactive elements on cards for consumers is it allows us to potentially create millions of inactive cards that can be distributed to consumers, who can then activate these cards and use them to share/exchange their contact information. For businesses, it allows partner companies to place/offer the option of having an element that can be scanned to access their business and employee information without having to make any form of financial commitment. A customer can choose to have the elements placed on their business cards and then activate them at their convenience, when they're ready; or never. This makes it much easier for partners to convince a customer to place the element on their business cards, since there is no up-front commitment. [0027] I will note at this point that the purpose of the system is once activated, an element can be scanned by any scanning application on any smartphone in order to access a virtual profile for the individual or business. A third party can scan the element and then save the contact information for the individual or business directly to their smartphones contacts. This is quick and convenient. If two persons wish to exchange information, they can go through the scanning process twice (one for each) or they can merely select an exchange option and go through the scanning process once. In addition, our application keeps a contact that was added by scanning one of our elements up-to-date, when the owner of the element updates their information. This process is a way to get cards with these elements out to the masses. [0028] Users who have activated elements have the ability to login to a web site and manage the profiles that are attached to the elements. They can change/update their information so that anyone who scans their element always see the latest information. Business users can manage all of their employee elements, terminate and reassigning elements as required. This falls outside of the core activation process and is more into the post activation management side of things.

[0029] It is possible for retail companies to purchase cards with pre-generated (inactive) elements on them, which they can distribute to their customers. The model is the customer is being given something of value, a card they can activate to be able to conveniently exchange contact information. The retail company can offer promotions (discounts, free items, etc.) to customers who activate their cards. This promotion can be offered during the activation process, from the website. When the customer activates their card with an element they received from the retail company, they will automatically opt in to receive SMS (text message) marketing from the retail company. This allows the retail company to market to any opted in customer who has activated a card they've distributed. [0030] When an individual user adds another contact to their contacts using this application, the app keeps that contact information current. In this scenario, individuals and businesses are maintaining their own information and this application is keeping those details updated. This automatic updating feature will now be further described. [0031] Once registered, the user maintains a contact profile, which contains their information. Users who use the associated mobile application can by using a unique a unique ID for another user, access a profile on his or her mobile device and save the corresponding profile details to their mobile devices contacts. Upon saving a profile to a user's contacts on their mobile device, the mobile application also saves that user as a contact in a remote database and web application. The mobile application requires the user to be "logged in", in order to identify their account on the remote web application and be able to save contacts to this remote web application. This form of authentication is a username and password that can be used to log into the mobile application as well as the web application.

[0032] The web application provides users with a contacts view that shows every contact they have saved. In addition, they are able to see every user that has saved them to their contacts. These would be others users who have accessed their profile using the mobile application and saved them to their contacts. In summary, users can see everyone they've saved and everyone who has saved them. [0033] FIG. 2, at certain interval's the mobile application checks the remote web application for any changes to the contact list and if the mobile application finds a record or contact that has updated their information, the mobile application will update the contact record on the mobile device with the new information and notify the user that it has done so.

[0034] To protect users privacy, if a user has been added to someone's contacts and they no longer want that user to have access to their new information, they can disable/block that user from receiving new profile changes. This is intended to prevent unwanted individuals from having new information they are not entitled to.

[0035] In addition, the mobile application provides a restoration feature if they lose or replace the smartphone. By simply downloading the mobile application and selecting a "restore" option, the mobile application will download all contacts previously saved to the users contacts, restoring their data.

Use of Extended Profiles

[0036] Provision can be made for adding subject matter to the profile of any individual or organization. For example, if an individual is a realtor, the realtor may wish his or her profile to include information regarding current listings. If an individual is a singer, actor, comedian or other entertainer, the entertainer may wish his or her profile to include a resume of past achievements together with a schedule of performances for the coming year. For a restaurant, the profile may include menus. It must be noted, that the system updates in real time. This means that the restaurant can indicate the feature soup for the day. If the supply of soup is exhausted and the feature soup changes, by updating their profile that change is communicated in real time to all persons to whom they are connected.

Applicability to Membership Organizations

[0037] There exists many applications where a group of contacts who belong to a organization, industry or category (application) would benefit from being able to access other users from the said application from a mobile device or a web app, without having to create and maintain the groups contents themselves or having to have those contacts stored in their local device.

[0038] The real-estate industry is a perfect example of such an industry. Realtors from a certain organization within a geographical area contact each other on a daily basis. For a realtor to contact another realtor they would need to know or obtain the other realtors contact information, or have that realtors contact information stored in their device. This is extremely inefficient since most real-estate organizations have over one thousand (1,000) members. It would be almost impossible for a realtor to put all one thousand (1,000) realtors into their devices local contacts.

[0039] The present method solves this problem by allowing the creation of an Enterprise Contact Group (ECG). Once in the enterprise contact group, the invited user would be able to access contact profiles for other members in the group. In the real-estate industry a group admin for a real-estate board can create an ECG for all members of a real-estate board. From their mobile device or a web application, any realtor that is part of the ECG can access contact information by simply searching for the user they wish to contact. Upon locating another realtors contact profile, the searching user would be able to access full contact details and be able to call, email or text message the searched user as if the searched user was stored in their local contacts. By create an ECG or remote contact group for all realtors in a geographical area or that belong to a common application, realtors can now get in contact quickly and easily with realtors, without having to maintain any information on a local device. The contacts exist in the Cloud. A realtor would open the mobile application, search or browse to a contact profile for another group member and then contact the searched user directly from their profile or by saving the searched user to their local device. ECG have various privilege and privacy settings specific further in this document. This allows an ECG to be created and protected or not based on an applications needs.

[0040] Enterprise Contact Groups can also be deployed in the medical industry. All doctors, psychiatrists, chiropractors, neurologists, etc., which belong to a specific application can all belong to a ECG and be able to access contact information on other related members that are part of the application from their mobile device or web application. [0041] ECG members maintain their own contact profiles and the contact information they contain. This means that user information is always up to date since users are responsible for maintaining their own data. When a user changes a phone number, all group members will automatically see the latest contact information since it's all stored in the Cloud. A user maintains their own data while being subscribed or a member of an ECG.

[0042] Enterprise Contact Groups can also be implemented for businesses as well as consumers. A business could create an ECG for all of its employees or partner companies for example. A consumer could create a contact group for friends and family members. A consumers could create an ECG for a club or organization. There exists many practical applications were users need to access contact information for other users from/for a common application without having to store said information on their local device.

[0043] On a mobile device accessing an ECG is like accessing your local devices contacts directory except an ECG is stored in the cloud. Users can browse and search contact profiles for every group member from their mobile device or the web application. From a contact profile all contact information can be accessed, including; telephone numbers, fax number(s), email address(s), mailing address, postal address, web site, and more. A contact profile in an ECG is the same as accessing a contact profile in your local device except it's not stored in your local device. From a contact profile users can click to call and click to email. Users can also save the contact profile to their local device. ECG are administered by a ECG administrator(s). The ECG administrator(s) can manage all ECG members as well as the privacy and generals settings for the ECG. They can remove members and invite new members to the ECG. Full user management functionality is provided to ECG administrators.

[0044] ECG have different access and privacy settings. These settings include:

1. Private: This settings means that only group members can access the group and view its member's profiles. Only an ECG administrator(s) can add new users to the ECG. No information on the ECG is available and access is highly restricted. Users cannot request to join a private ECG, they are by invite only. 2. Semi private: This setting means that only group members can access the group and view its member's profiles. A semi private ECG can be found through a search process and users can request to join the group as well as access information on what the group is about, such as a description.

3. Public: This setting means that users can join a public ECG on their own, as well as access its member's profiles without having to be approved by an ECG administrator. Anyone can join a public ECG and access information on group members and what the group is about. An administrator or group owner still manages the group itself. There exists numerous other formats for maintaining privacy and access settings for a ECG. The above three (3) are only the main ones.

[0045] In this patent document, the word "comprising" is used in its non-limiting sense to mean that items following the word are included, but items not specifically mentioned are not excluded. A reference to an element by the indefinite article "a" does not exclude the possibility that more than one of the element is present, unless the context clearly requires that there be one and only one of the elements.

[0046] The scope of the claims should not be limited by the preferred embodiments set forth in the examples, but should be given a broad purposive interpretation consistent with the description as a whole.