摘要 |
Devices and methods are disclosed which relate to managing multiple public user identifiers (PUIDs) in a database by setting customizable access rules and requiring authorization from applications for access. These PUIDs can be virtually any electronic identifier such as a telephone number, email address, FACEBOOK name, etc. The PUID database is on the memory of a mobile communication device. Applications on the mobile communication device or on the network request access to the PUID database. Access logic on the mobile communication device checks another database of PUID Access Policies and Preferences (PAPP) for authorization. The PAPP database may allow the application immediate access, deny access, or query the user for allowance. The PUID database and PAPP database are on a server on a network. |
主权项 |
1. A mobile communication device comprising:
a display; a processor; and a memory that stores
a user identifier database that stores a plurality of user identifiers associated with a user of the mobile communication device,an access database that stores rules for determining whether to allow access to each user identifier of the plurality of user identifiers included in the user identifier database, andinstructions which, when executed by the processor, cause the processor to perform operations comprising
receiving, from an application, a request for access to a user identifier of the plurality of user identifiers,in response to receiving the request, referencing the access database for a permission regarding whether the application is allowed to access the user identifier based upon at least a portion of the rules,in response to receiving the permission from the access database, granting the application access to the user identifier from the user identifier database, andotherwise,
causing a query to be presented on the display, the query comprising an access request by which the user can grant or deny the application access to the user identifier,in response to the query, receiving an input from the user, the input identifying whether the user grants or denies the application access to the user identifier,in response to the input identifying that the user grants the application access to the user identifier, granting the application access to the user identifier from the user identifier database, andin response to the input identifying that the user denies the application access to the user identifier, denying the application access to the user identifier from the user identifier database. |