Using a masking value for contact identification

ABSTRACT

A relationship management system and method are configured to enable a user to manage a relationship with their contacts from the initial interaction through the life cycle of a transaction or relationship and beyond. For example, a relationship management system may record and sort all communications (for example, phone calls, text messages, and emails) into a contact&#39;s profile, empowering a user to easily see the entire relationship at a glance. Moreover, using actionable business intelligence, an exemplary relationship management system may utilize a workflow engine to send notifications, schedule tasks, and allow users to see reports, thus allowing a user to increase productivity and save time. Exemplary relationship management systems are configured for use in the multi-family housing industry.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of, claims priority to and thebenefit of, U.S. patent application Ser. No. 16/828,153, filed on Mar.24, 2020 and entitled “SYSTEMS AND METHODS FOR RELATIONSHIP MANAGEMENT,”which is a continuation of U.S. patent application Ser. No. 16/103,783,filed on Aug. 14, 2018 and entitled “SYSTEMS AND METHODS FORRELATIONSHIP MANAGEMENT (now U.S. Pat. No. 10,636,016 issued on Apr. 28,2020),” which is a continuation of U.S. patent application Ser. No.15/084,989, filed on Mar. 30, 2016 and entitled “SYSTEMS AND METHODS FORRELATIONSHIP MANAGEMENT (now U.S. Pat. No. 10,127,527 issued on Nov. 13,2018),” which is a continuation of, claims priority to and the benefitof, U.S. patent application Ser. No. 14/740,562, filed on Jun. 16, 2015and entitled “SYSTEMS AND METHODS FOR RELATIONSHIP MANAGEMENT,” whichclaims priority to and the benefit of Provisional Application No.62/012,809, filed on Jun. 16, 2014 and entitled “SYSTEMS AND METHODS FORRELATIONSHIP MANAGEMENT,” which are hereby incorporated by reference intheir entirety for all purposes.

TECHNICAL FIELD

The present disclosure generally relates to mobile applications, andmore particularly, to methods and systems for the management andorganization of communications information received from multiplesources using multiple methods of communication.

BACKGROUND

In today's world, there are countless communication methods available tosend communications. Accordingly, everyone is constantly receivingcommunications from multiple sources, whether it is from a mobile phonetext message, email, voicemail, social media message, etc. This overloadof information may cause confusion and miscommunication ascommunications are misplaced or forgotten.

Some forms of communication are easily consolidated, such as calendarsand emails sharing data between mobile phones and computers. However,there may still be communications from other people or different sourcesthat get lost in the mix. Accordingly, there is a shortfall incommunication organization because there is no method for organizing alldata received through various communication types with others from allsources.

SUMMARY

In accordance with principles of the present disclosure, a relationshipmanagement system and method are configured to enable a user to manage arelationship with their contacts from the initial interaction throughthe life cycle of a transaction or relationship and beyond. For example,a relationship management system may record and sort all communicationsinto a contact's profile, empowering a user to easily see the entirerelationship at a glance. Moreover, using actionable businessintelligence, an exemplary relationship management system may utilize aworkflow engine to send notifications, schedule tasks, and allow usersto see reports, thus allowing a user to increase productivity and savetime.

In accordance with an exemplary embodiment, a relationship managementsystem comprises a user interface operable on a mobile device; a serverin communication with the user interface, the server configured toimplement business processes associated with communication informationreceived by the relationship management system; and a database incommunication with the server, the database configured to store thecommunication information received at the relationship managementsystem. The relationship management system is configured to managemultiple forms of communication information associated with a contact ofa user using actionable business intelligence to provide a workflowengine to send notifications, schedule tasks, and allow users to seereports, thus allowing a user to increase productivity and save time.

In another exemplary embodiment, a computerized method for relationshipmanagement comprises receiving, at a relationship management system, anitem of communication from a user; filtering, by a relationshipmanagement engine in the relationship management system, the item ofcommunication into at least one of a plurality of buckets; analyzing, bya workflow engine in the relationship management system, the item ofcommunication to identify at least one of a plurality of actions to takein response to the item of communication; and implementing, via a mobilesoftware application of the relationship management system, the at leastone of the plurality of actions responsive to the item of communication.

The contents of this section are intended as a simplified introductionto the disclosure, and are not intended to limit the scope of any claim.

BRIEF DESCRIPTION OF THE DRAWINGS

With reference to the following description, appended claims, andaccompanying figures, in which like reference numbers refer to likeelements or acts throughout the figures:

FIG. 1 is a block diagram of an exemplary relationship management systemin accordance with an exemplary embodiment;

FIG. 2 is a block diagram illustrating exemplary operationalcharacteristics of an exemplary relationship management system inaccordance with an exemplary embodiment;

FIG. 3A illustrates exemplary data and process flows in an exemplaryrelationship management system in accordance with an exemplaryembodiment;

FIG. 3B illustrates exemplary functional components and data/processflows of an exemplary relationship management system in accordance withan exemplary embodiment;

FIG. 3C illustrates an exemplary technology architecture for anexemplary relationship management system in accordance with an exemplaryembodiment;

FIG. 3D illustrates an exemplary architecture for a user interfacecomponent (mobile application) of an exemplary relationship managementsystem in accordance with an exemplary embodiment;

FIG. 3E illustrates data and process flows in an exemplary relationshipmanagement system in accordance with an exemplary embodiment;

FIG. 3F illustrates a process for management of telephoniccommunications in an exemplary relationship management system inaccordance with an exemplary embodiment;

FIGS. 4A through 4R are screenshots illustrating functionality and/orconfiguration of a user interface component (mobile application) of anexemplary relationship management system in accordance with an exemplaryembodiment; and

FIGS. 5A through 5P are screenshots illustrating functionality and/orconfiguration of a user interface component (mobile application) of anexemplary relationship management system in accordance with an exemplaryembodiment.

DETAILED DESCRIPTION

The following description is of various embodiments only, and is notintended to limit the scope, applicability or configuration of thepresent disclosure in any way. Rather, the following description isintended to provide a convenient illustration for implementing variousembodiments including the best mode. As will become apparent, variouschanges may be made in the function and arrangement of the elementsdescribed in these embodiments without departing from the scope of thepresent disclosure or appended claims.

It should be appreciated that exemplary components and steps may berealized by any number of hardware, software, or other componentsconfigured to perform the specified functions. For example, an exemplaryembodiment employs various graphical user interfaces, softwarecomponents, and networking and/or database functionality. In addition,various embodiments may be practiced in any number of communicationsmanagement and/or information management contexts, and the embodimentsdisclosed are merely indicative of exemplary applications. For example,the principles, features and methods discussed may be applied to variousindustries, and are not limited to use in connection with communicationsinformation. Moreover, various exemplary embodiments are discussed inconnection with management of communications associated withmulti-family housing management; however, it will be appreciated thatprinciples of the present disclosure, and exemplary systems and/ormethods implementing the same, may suitably be applied in various otherindustries and/or contexts, for example any sales or service-relatedprofession requiring travel outside of a home office forbusiness-related transactions such as realtors, auto dealers, insuranceagents, lawyers, doctors, pest control professionals, pool serviceprofessionals, landscapers, plumbers, electricians, contractors,pharmaceutical salesmen, etc.

The detailed description of exemplary embodiments herein makes referenceto the accompanying figures, which show embodiments by way ofillustration. While these embodiments are described in sufficient detailto enable those skilled in the art to practice the disclosure, it shouldbe understood that other embodiments may be realized and that logicaland/or functional changes may be made without departing from the spiritand scope of the disclosure. Thus, the detailed description herein ispresented for purposes of illustration only and not of limitation. Forexample, the steps recited in any of the method or process descriptionsmay be executed in various orders and are not limited to the orderpresented. Moreover, certain of the functions or steps may be outsourcedto or performed by one or more third parties. Furthermore, any referenceto singular includes plural embodiments, and any reference to more thanone component may include a singular embodiment.

Systems, methods and computer program products are provided. In thedetailed description herein, references to “an exemplary embodiment”,“various embodiments”, “one embodiment”, “an embodiment”, “an exampleembodiment”, etc., indicate that the embodiment described may include aparticular feature, structure, or characteristic, but every embodimentmay not necessarily include the particular feature, structure, orcharacteristic. Moreover, such phrases are not necessarily referring tothe same embodiment. Further, when a particular feature, structure, orcharacteristic is described in connection with an embodiment, it issubmitted that it is within the knowledge of one skilled in the art toaffect such feature, structure, or characteristic in connection withother embodiments whether or not explicitly described. After reading thedescription, it will be apparent to one skilled in the relevant art(s)how to implement the disclosure in alternative embodiments.

As used herein, “match” or “associated with” or similar phrases mayinclude an identical match, a partial match, meeting certain criteria,matching a subset of data, a correlation, satisfying certain criteria, acorrespondence, an association, an algorithmic relationship and/or thelike. Similarly, as used herein, “authenticate” or similar terms mayinclude an exact authentication, a partial authentication,authenticating a subset of data, a correspondence, satisfying certaincriteria, an association, an algorithmic relationship and/or the like.

In various embodiments, the methods described herein are implementedusing the various particular machines described herein. The methodsdescribed herein may be implemented using the below particular machines,and those hereinafter developed, in any suitable combination, as wouldbe appreciated immediately by one skilled in the art. Further, as isunambiguous from this disclosure, the methods described herein mayresult in various transformations of certain articles.

For the sake of brevity, conventional techniques for data networking,software application development, cloud computing, and/or the like, maynot be described in detail herein. Furthermore, the connecting linesshown in various figures contained herein are intended to representexemplary functional relationships and/or physical or communicativecouplings between various elements. It should be noted that manyalternative or additional functional relationships or physical orcommunicative connections may be present in a practical relationshipmanagement system.

Exemplary relationship management systems configured in accordance withprinciples of the present disclosure enable a user to manage arelationship with their contacts from the initial interaction throughthe life cycle of a transaction or relationship and beyond. For example,a relationship management system may record and sort all communicationsinto a contact's profile, empowering a user to easily see the entirerelationship at a glance. Moreover, using actionable businessintelligence, an exemplary relationship management system may utilize aworkflow engine to send notifications, schedule tasks, and allow usersto see reports, thus allowing a user to increase productivity and savetime. It will be appreciated that exemplary relationship managementsystems and/or methods disclosed herein can enable a user to save time,money, and resources, for example by facilitating management of allbusiness and personal communications in one place.

In an exemplary embodiment, a “relationship management system” may beconfigured to facilitate organization, storage, and/or display ofcommunications information, for example information sent or received bya management system user. A relationship management system may also takecertain actions, for example based on communications types, usersettings, and/or the like. With reference now to FIG. 1, in an exemplaryembodiment, a relationship management system, for example system 100,may comprise a user interface component 100A, a server component 100B,and a database component 100C. User interface component 100A may beconfigured to deliver information to and/or receive information from auser. For example, system 100 may be able to send communications of anyavailable form (phone call, email, text message, etc.) via a user'sinteraction with user interface component 100A. Server component 100Bmay be configured to interact with user interface component 100A, forexample to facilitate system functionality. Database component 100C maybe configured for storage and retrieval of information utilized insystem 100, and may interact with user interface component 100A and/orserver component 100B. It will be appreciated that in various exemplaryembodiments, one or more of user interface component 100A, servercomponent 100B, and/or database component 100C may comprise multiplesub-components, systems, or elements; moreover, a single element orcomponent may offer functionality of (or be considered to be) more thanone of user interface component 100A, server component 100B, or databasecomponent 100C. For example, in an exemplary embodiment, servercomponent 100B and database component 100C may comprise a singlecomputing and/or communications resource.

In general, relationship management system 100 may comprise any systems,components, and/or modules configured with any suitable methods,algorithms, and/or techniques for communications information management,organization, action, and display. Additionally, system 100 may alsosuitably interface with any number and/or types of communications, forexample, phones, emails, text messages, manual entries, users,aggregation services routers/interactive voice responses, social mediawebsites, etc.

Turning now to FIG. 2, in various exemplary embodiments, system 100 maycomprise a relationship management engine 120, buckets 130, a workflowengine 140, and user interface 160 on some sort of display screen, suchas on a smartphone or tablet. Relationship management engine 120 mayreceive and organize any type of communications 110 and may placecommunications 110 in buckets 130, for example, based on predeterminedcriteria set by a user. Workflow engine 140 may determine actions 150taken by the system 100 in response to certain types of communications,for example based on the business rules determined by the user. Itshould be appreciated that the types of communications labeled 110 inFIG. 2 are examples, and system 100's capabilities for organizingcommunications should not be limited to those listed in the figures.Also, the term “phone call” is meant to include video calls and/or voicecalls, IP telephony, and/or the like.

In various exemplary embodiments, relationship management engine 120 maybe any engine, system, or method within system 100 configured to receivecommunications from any available source, organize it by placing it intocategorical buckets 130, and save the communications. Throughrelationship management engine 120, the user of system 100 may be ableto easily search, retrieve, edit, and/or add notes to any type ofcommunications. It should be appreciated that the functions ofrelationship management engine 120 are not limited to those listedabove, but that those are simply examples of its functionality.

Relationship management engine 120 may receive communications frommultiple sources by parsing incoming emails to have a uniform format,for example. Depending on the type of incoming communications, there maybe different ways the system 100 and relationship management engine 120receive and process inputs. For example, all phone calls may be routedto the system 100's telephony systems and all emails are forwarded tospecific email accounts associated to the system 100 user.

Relationship management engine 120 may organize communications receivedfrom multiple sources by placing the communications into categoricalbuckets 130. A user of system 100 may set relationship management engine120 to recognize certain characteristics to identify which bucket 130 inwhich to place the communications. For example, the user may set therelationship management engine 120 to recognize and identify certainphone numbers, email addresses, social media accounts, etc. and placethe recognized communications into buckets 130 based on the relationshipthe system 100 user has with the contact sending the communications.Once the contact is identified by the identifying characteristic(s) ofthe communications, the communications are placed in the appropriatecontact and bucket. For example, a contact may have a relationshipstatus to the user of system 100 of a family member, friend, businessassociate, potential client, etc., and the user may create buckets 130for each of those relationship statuses. An example of such buckets isillustrated in FIG. 4J.

If communications are received from an unknown source, the system 100may try to identify the communications as a different source from anexisting contact and merge that communication with other communicationsfrom that contact, or receive the communications and indicate to thesystem 100 user through the user interface that the contact is unknown.If multiple contacts are created for multiple sources of communications,and it turns out that all of the communications are coming from the sameperson or entity, the user may merge these multiple contacts into onecontact folder. In other words, in the event that multiple pieces ofcommunications come in under different emails or phone numbers, the usermay manually merge the contacts. Similarly, a system 100 user may beable to transfer a contact's information to another user's system, andwhen doing so, the transferring user may be prompted to add a note toinform the other user of the contact's information and the reason forthe information transfer.

Within each bucket 130, there may be contact folders for each contact,in which communications from all sources coming from that contact may bestored. FIG. 4D, for example, shows a display of contact folders fromwhich to choose and view communications from a certain contact. A system100 user may also make notes about the inbound or outboundcommunications and/or the relationship with that contact and store themin the contact folder for that contact. For example, FIG. 4F illustratesa contact folder for communications from a particular contact in whichthere are notes as well as a display of inbound and outgoing calls.Multiple phone numbers or other communications reception locations for acontact may be organized within a contact folder. The communicationstype and location (email address or phone number, for example) may belisted, for example in order of preference by the system 100 user. Notesmay also be made in any bucket 130 or other folder within system 100.Accordingly, all communications may be tracked and shown on a timelineas a summary of the system 100 user's communication relationship withthat contact. If system 100 user wishes, he can set certain types ofcommunications as priority to be shown first, whether it becommunications from a certain person or entity and/or a certain type ofcommunications from a person or entity. The system 100 may alsoprioritize inbound communications so that the system 100 useracknowledges and answers the most important communications first. Thisfunction may be accomplished by the system 100 user pre-determining whatcontact and/or type of relationship should receive priority. The system100 may then prioritize the new communications accordingly. If thesystem 100 user's relationship status with a contact changes or ends,(if their business dealings end, for example) the user may have theability to make a note of what happened and why the status with thatcontact has changed.

Communications are safely stored within system 100 and access ispassword protected. The system 100 user may allow others to have accessto the system information on their own device (smartphone, tablet, etc.)by giving the other people access. The degree of access for the otherpeople may be determined by the user, whether the access level be high,like that of an administrator (allowing edits to communications and/orinformation) or low, like that of a viewer (can only see thecommunications and/or information in the system 100). The degree ofaccess of another person to a system 100 user's information may bedetermined by the user. Once communications and information is safelystored in the data cloud, the system 100 user may archive and easilyretrieve the information and/or search for key words within a bucket 130or contact folder to easily locate the desired communications. As anillustration, recorded phone calls may be transcribed, and therefore,may be searchable via the system's 100 search function. Through thesearch function, all forms of communications stored within system 100are searchable within system 100. Also, displays before entering abucket 130 or contact folder may show how many unviewed messages orother types of communications exist in that bucket or contact folder(see FIG. 3), and relationship management engine 120 may be responsiblefor detecting such unviewed communications.

In addition to the foregoing, relationship management engine 120 mayhave other functions related to the reception, storage, organization,and prioritization of communications received from any source. Forexample, relationship management engine 120 may automatically recordphone calls as they are taking place based on the system 100 user'ssettings for that particular contact, or distribute inbound phone callsto multiple mobile phones that may also have system 100 running at thattime. Using geo-fencing, system 100 may be configured not to send a callto any system 100 user who may be too far away from a centralizedlocation, or other location determined by a system 100 user. Also, ifthe system 100 user is placing a call to a certain contact, the user canset the relationship management engine 120 to mask the outbound phonenumber. This function may also mask any other source-identifyinginformation in any type of outbound communications. This may beaccomplished by configuring system 100 to set the masking value for anoutbound phone number, email address, or any other source-identifyingcharacteristic of any type of communications. System 100 will then usethat configuration value to use for contact identification for incomingcommunications and/or for sending outbound communications.

With continued reference to FIG. 2, in various exemplary embodiments,work flow engine 140 is any engine, system, or method within system 100configured to analyze, take action upon, and/or display communicationsand information received by the relationship management system 100. Itshould be appreciated that the functions performed by relationshipmanagement engine 120 and work flow engine 140 may be performed inconjunction by a single component or system. Additionally, functionalityof relationship management engine 120 and/or workflow engine 140 may besupplemented by and/or implemented as inputs or configurations being setand/or performed manually by a system 100 user. Once communications areorganized and stored into its appropriate bucket(s) 130, workflow engine140 may analyze what action should be taken regarding each piece ofcommunications. Work flow engine 140 may look at system parameters, acontact's status, and/or time elapsed to perform certain actions toprompt the user to do something or automatically take appropriate actionas configured. For example, the application may send an email reminderor text message to a user about an appointment. A system 100 user maymake settings in the workflow engine 140 to govern operation thereof.For example, by utilizing system 100's administrative function, a system100 user may create settings and set-up pre-determined courses of actionin the case(s) of communications having certain characteristics (i.e.,contact source, communications type, age of communications, etc.).

For example, for emails received from certain contacts that containcertain content, the system 100 user may set the workflow engine 140 toautomatically reply with form emails. Workflow engine 140 may also beset to send communications automatically to certain contacts or allcontacts within a bucket 130. For example, if the system 100 user ismanaging a multifamily housing complex, on the first of each month, theworkflow engine 140 may be set to automatically email or text, forexample, all contacts in a “tenants” bucket on the last day of eachmonth. As another example, every contact in a “Lead” or “ProspectiveClient” bucket may automatically be sent communications notifying themof upcoming or present sales for the system 100 user's business.

Workflow engine 140 may also display reminders to the system 100 user ifa certain type of communications or communications from a certaincontact or contact type is not viewed or answered in a timely fashion.Workflow engine 140 may also move communications to other buckets basedon the communications and/or the contact's status or whether the system100 user has viewed or answered the communications. Communications mayremain within the same contact folder, and a contact folder may movebetween buckets 130.

A system 100 user may be able to set the appropriate amount of responsetime based on the contact and/or communications types. Similarly, if thesystem 100 user has not responded in the set amount of time, theworkflow engine 140 may be set by the system 100 user to transfer orshare the communications to a second system 100 user's communicationdevice (smartphone, tablet, etc.), so that second user may be able torespond to the contact's communications. The second user may then benotified via email or text message, for example, to take action. Also,one system 100 user may transfer an ongoing phone call, route anincoming call to a second system 100 user, or set the system 100 so thatincoming communications will be automatically routed to a second system100 user through the system 100. When a phone call is transferred, therecording of the call may continue on the second user's device(smartphone, tablet, etc.). Since all information is stored on thesystem 100 data cloud, any user within system 100 may access anyrecording on their electronic device (smartphone, tablet, etc.).

Workflow engine 140 may automatically schedule tasks set by the system100 user, such as tasks that must be performed periodically. Similarly,workflow engine 140 may automatically place tasks on the system 100user's calendar by identifying event names and associated times inreceived communications. System 100 will display possible calendarevents to the user, the user may accept the event, and then the event isadded to the calendar. If a system 100 user updates his calendar, sendsan email from a different device than the smartphone or tablet with thesystem 100, or if there are relevant informational updates detected onthe Internet or from other system 100 users, the system 100 willperiodically sync all accessible data onto the system 100 in order tokeep the information displayed by the system 100 in accordance withupdates from all accessible sources.

In system 100, interaction with a user may be via user interface 160.User interface 160 may comprise any suitable displays, windows,applications, apps, pop-ups, audio/visual content, and/or the like toallow a user to utilize functionality of system 100. In an exemplaryembodiment, user interface 160 comprises a mobile application. Inanother exemplary embodiment, user interface 160 comprises desktopsoftware. FIGS. 4A-4R illustrate exemplary screenshots of an exemplaryuser interface 160, illustrating how a user may access functionality ofsystem 100. FIGS. 5A-5P illustrate exemplary screenshots of anotherexemplary user interface 160, illustrating how a user may accessfunctionality of system 100.

User interface 160 may display any suitable information for a user. Forexample, the displays may include lists of buckets with contactrelationship statuses, contact names, communications types, notes withincommunications made by the system 100 user, etc. The user interface 160may also provide email templates created by the system 100 user, as wellas graphics that may be loaded onto emails or other forms ofcommunications. These templates and graphics may be stored in the system100, along with all other communications and information. Through thesedisplays on the user interface 160, the user may navigate thecommunications and information stored within the system 100 or createcommunications, for example by searching key words, navigating throughbuckets and contact lists, looking at calendar schedules or businessreports, or any number of appropriate actions. A system 100 user maysave, delete, archive, prioritize, move, copy, transfer to anothersystem 100 user, or perform any other suitable action to (or with)communications information associated with system 100.

Turning now to FIGS. 3A through 3F, in various exemplary embodiments asystem 100 may be configured with components, methods, and data flows asillustrated.

While examples may have been used above or shown in the figuresregarding the relationship management system's applicability to certainindustries, those examples herein should not be read to limit thepresent disclosure to such industries. Principles of the presentdisclosure may suitably be applied in connection with relationshipmanagement in various industries and/or contexts.

While the exemplary embodiments described herein are described insufficient detail to enable those skilled in the art to practiceprinciples of the present disclosure, it should be understood that otherembodiments may be realized and that logical and/or functional changesmay be made without departing from the spirit and scope of the presentdisclosure. Thus, the detailed description herein is presented forpurposes of illustration and not of limitation.

While the description references specific technologies, systemarchitectures and data management techniques, practitioners willappreciate that this description is of various embodiments, and thatother devices and/or methods may be implemented without departing fromthe scope of principles of the present disclosure. Similarly, while thedescription references a user interfacing with the system via a computeruser interface, practitioners will appreciate that applicable interfacesmay include mobile devices, kiosks and handheld devices such as mobilephones, smartphones, tablet computing devices, etc.

While the steps outlined herein represent exemplary embodiments ofprinciples of the present disclosure, practitioners will appreciate thatthere are any number of computing algorithms and user interfaces thatmay be applied to create similar results. The steps are presented forthe sake of explanation only and are not intended to limit the scope ofthe present disclosure in any way. Benefits, other advantages, andsolutions to problems have been described herein with regard to specificembodiments. However, the benefits, advantages, solutions to problems,and any element(s) that may cause any benefit, advantage, or solution tooccur or become more pronounced are not to be construed as critical,required, or essential features or elements of any or all of the claims.

It should be understood that the detailed description and specificexamples, indicating exemplary embodiments, are given for purposes ofillustration only and not as limitations. Many changes and modificationsmay be made without departing from the spirit thereof, and principles ofthe present disclosure include all such modifications. Correspondingstructures, materials, acts, and equivalents of all elements areintended to include any structure, material, or acts for performing thefunctions in combination with other elements. Reference to an element inthe singular is not intended to mean “one and only one” unlessexplicitly so stated, but rather “one or more.” Moreover, when a phrasesimilar to “at least one of A, B, or C” or “at least one of A, B, and C”is used in the claims or the specification, the phrase is intended tomean any of the following: (1) at least one of A; (2) at least one of B;(3) at least one of C; (4) at least one of A and at least one of B; (5)at least one of B and at least one of C; (6) at least one of A and atleast one of C; or (7) at least one of A, at least one of B, and atleast one of C.

1. A method comprising: identifying, by a processor, a source contact inan incoming communication based on a masking value; assigning, by theprocessor and using the masking value, the incoming communication into afirst file associated with the source contact that sent the incomingcommunication; receiving, by the processor, an unknown communication;determining, by the processor, that the unknown communication is from anunknown contact, based on the unknown communication lacking the maskingvalue; and recording, by the processor, the unknown communication into asecond file associated with the unknown contact.
 2. The method of claim1, further comprising masking, by the processor, source-identifyinginformation of an outbound communication with the masking value.
 3. Themethod of claim 1, further comprising sending, by the processor, anoutbound communication with the masking value to the source contact. 4.The method of claim 1, further comprising: receiving, by the processorand from the source contact, the incoming communication comprising themasking value; and determining, by the processor, that the incomingcommunication is from the source contact, based on the incomingcommunication including the masking value.
 5. The method of claim 1,further comprising associating, by the processor, the incomingcommunication with the masking value.
 6. The method of claim 1, whereinthe masking value masks source-identifying information that includes anoutbound number.
 7. The method of claim 1, further comprising grouping,by the processor, at least one of the incoming communication or theunknown communication by communication type, wherein the communicationtype includes at least one of an email, a text message, social mediacommunication, telephone call, manual entry or a voice call from acomputing device.
 8. The method of claim 1, wherein the incomingcommunication includes content characteristics having at least one ofphone number, email address, social media account, or relationshipbetween the source contact and a user of a first user system.
 9. Themethod of claim 1, further comprising: receiving, by the processor, apriority preference based on a type of communication and the sourcecontact; and displaying, by the processor, the incoming communicationbased on the priority preference.
 10. The method of claim 1, furthercomprising: receiving, by the processor, notes associated with theincoming communication, wherein the notes include a reason fortransferring the source contact to a second user system; incorporating,by the processor, the notes into the incoming communication; andtransferring, by the processor, the source contact to the second usersystem.
 11. The method of claim 1, further comprising: analyzing, by theprocessor, the incoming communication to identify an action to take inresponse to the incoming communication, wherein the action comprisescreating a calendar event; and identifying, by the processor, an eventname and an event time of the calendar event in the incomingcommunication.
 12. The method of claim 1, further comprising restrictinga call from being sent to the source contact, in response to the sourcecontact being outside of a geo-fence area.
 13. The method of claim 1,further comprising displaying, by the processor, the incomingcommunication in a timeline with other communications from the sourcecontact.
 14. The method of claim 1, wherein the incoming communicationis associated with management of tenants in a multi-family housingcomplex.
 15. The method of claim 1, further comprising: analyzing, bythe processor, the incoming communication; and selecting, by theprocessor and based on the analyzing, an action from among a pluralityof actions.
 16. The method of claim 15, wherein the analyzing is basedon at least one of system parameters, a status of the source contact, ora time elapsed.
 17. The method of claim 15, wherein the plurality ofactions comprises at least one of automatically replying to an email,moving the incoming communication from the source contact into a thirdfile or transferring a telephone call from a first mobile device to asecond mobile device.
 18. The method of claim 1, further comprisingfacilitating, by the processor, at least one of sending notifications,scheduling tasks, or displaying reports.
 19. The method of claim 1,further comprising filtering, by the processor, at least one of theincoming communication or the unknown communication based on at leastone of a communication type, the source contact, business rules, contentcharacteristics or user settings.
 20. A system comprising: a processorin communication with a processor; a tangible, non-transitory memoryconfigured to communicate with the processor, the tangible,non-transitory memory having instructions stored thereon that, inresponse to execution by the processor, cause the processor to performoperations comprising: identifying, by the processor, a source contactin an incoming communication based on a masking value; assigning, by theprocessor and using the masking value, the incoming communication into afirst file associated with the source contact that sent the incomingcommunication; receiving, by the processor, an unknown communication;determining, by the processor, that the unknown communication is from anunknown contact, based on the unknown communication lacking the maskingvalue; and recording, by the processor, the unknown communication into asecond file associated with the unknown contact.