Real-time chat and conference contact information manager

ABSTRACT

An extension or accessory to a real-time, online virtual collaboration session, meeting and messaging system, which scans a participant&#39;s contact list for partially complete contact records, accesses an administered contact information store such as a corporate personnel contact database, and completes the partially complete records in the participant&#39;s contact list. This enables each participant in such an online meeting or conversation to rely upon his or her contact list to contain a consistent level of information regarding each participant in previously conducted meetings and conversations, avoids the entry of inaccurate and deceptive participant information into the contact list, and allows for reliable communication to the members of a participant&#39;s contact list.

BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention

[0002] This invention relates to technologies and methods for managing personal contact information, and more particularly to management of online personal contact information for real-time online collaboration, conference and message facilities.

[0003] 2. Background of the Invention

[0004] Online collaboration and messaging in real-time has become very popular in recent years. Programs and services such as America Online's (“AOL”) Instant Messenger (“IM”), Microsoft's NetMeeting, and Lotus' Sametime are well-known programs and services which allow real-time white board collaboration, chatting, conference sessions and instant messaging via a corporate intranet and/or the Internet.

[0005] Using programs and services such as these, a plurality of online users may participate in a joint conference involving text messaging, application program sharing, and real-time photo and video sharing. Many companies have begun to use these services in place of actual face-to-face meetings of personnel which are physically or geographically dispersed.

[0006] During these “virtual” meetings, often times one participant will supply other participants with drawings, presentation graphics, and text for discussion. The ensuing discussion between the participants may be logged to a file for later review, which is more convenient than the record keeping mechanisms of actual physical face-to-face meetings. As such, these online virtual meetings and conversations provide advantages over traditional face-to-face meetings, not the least of which are automatic record keeping, reduced travel costs and greater convenience.

[0007] Turning to FIG. 3, the arrangement of components of these types of real-time online collaboration systems is shown. A number of collaboration clients (32) are interconnected through a computer network (31). These collaboration clients typically comprise a personal computer equipped with software such as Netscape's Navigator™, AOL's Instant Messenger™, or Lotus' Sametime Connect™ client product. These collaboration clients (32) may also include other computing platforms such as personal digital assistants (“PDA”) and advanced web-enabled wireless telephones.

[0008] The collaboration clients (32) may interface to the computer network (31) through a number of well-known technologies including, but not limited to, Transmission Control/Internet Protocol (“TCP/IP”), dial-up modems, cable modems, asymmetric digital subscriber line (“ADSL”), or other interface technologies such as wireless interfaces.

[0009] Typically, the collaboration client (32) maintains a local contact list (33), such as AOL Instant Messenger's “buddy list” or Netscape Navigators “address book.” These contact lists (33) may take the form of simple text files, or as advanced as database files. In some cases, the contact list are stored in proprietary formats.

[0010] When an online meeting or collaboration session is established, each new participant may supply the other participants with his or her email address as he or she logs into the session. The other participants may then chose to store that email address in their local contact list. In some cases, such as with the Instant Messenger product, there are other options for users to transmit their entire contact list to other meeting participants.

[0011] In general, however, these email addresses as well as any other participant contact information which is exchanged between participants is defined and by the participants themselves. This means that a participant logging in to a virtual meeting may supply accurate and complete information regarding his or her email address and other contact data, such as telephone and company location. However, a participant may choose not to supply some of this information, or may supply incorrect information.

[0012] Another method for exchanging personnel information and automatically storing it into such a contact list is called a “vCard”. A vCard is a data record that may be attached automatically to an email message, if an email user desires to share his or her vCard with recipients of his or her messages.

[0013] A vCard which may contain a number of personal information data items as defined by the sender or originator. This may include email address (e.g. “return email address”), personal or company physical address, telephone numbers, and other descriptive information as defined by the sender.

[0014] vCards are an industry standard format data developed by a consortium including Apple, ATT, IBM, and others. Responsibility for maintaining and evolving the vCard specification was assumed by the Internet Mail Consortium (“IMC”) in 1996.

[0015] By attaching vCards to an email message, a sender may enable the recipient to automatically store information into his or her contact list which is contained in the vCard. For example, a sender of an email message may wish to enable a recipient to automatically store the sender's name, email address, telephone number, position title, and company name into the recipient's address book without having to type it. Upon receipt, the recipient can select an automatic function in his or hers email client software which extracts the information from the attached vCard and stores it into his or her local address book. Later, the recipient may use that information in the address book to address new messages, export to other application programs such as word processors and contact managers, and to load into other databases.

[0016] As all of these currently available methods and systems rely on information which is defined and supplied by the sender or the originator of the information, such as a newly joined member of a virtual online conference, these methods and systems are subject to inconsistencies and inaccuracies in the data which may be stored into the recipient's or other participant's address books or contact lists.

[0017] For example, one participant in a online conference may supply a full set of information including his name, job title, telephone numbers, and company name. Another participant in the same conference may only supply his email address. When all of the participants in the conference store all of the information supplied by the other participants into their local contact lists, they may later find that their contact list has varying levels of degree of details in the information about each of those participants (and may contain errors).

[0018] Later, when one of the participants wants to contact another participant, such as by making a telephone call to that participant, he may or not be able to find that telephone number based upon the information which was or was not supplied by the participant during the online conference.

[0019] Therefore, as the vCard industry standard and as the proprietary information standards of the various online conferencing services and suppliers do not assure accuracy or enforce uniformity of detail of the information supplied by online conference participants, the very flexibility of the system becomes a disadvantage of the systems as well.

[0020] Therefore, there is a need in the art for a system and a method which allow participants of online conferences and collaboration sessions to automatically store reliable and accurate information regarding the participants of those sessions. There is also a need in the art for this system and method to provide a consistent level of detail of information about each participant so that the participants may rely upon the contents of their local contact list in the future.

BRIEF DESCRIPTION OF THE DRAWINGS

[0021] The following detailed description when taken in conjunction with the figures presented herein provide a complete disclosure of the invention.

[0022]FIG. 1 depicts a generalized computing platform architecture, such as a personal computer, server computer, personal digital assistant, web-enabled wireless telephone, or other processor-based device.

[0023]FIG. 2 shows a generalized organization of software and firmware associated with the generalized architecture of FIG. 1.

[0024]FIG. 3 shows an organization of system components for typical real-time virtual online collaboration, meeting and messaging systems.

[0025]FIG. 4 illustrates the organization of components according to the present invention.

[0026]FIG. 5 sets forth the logical process of the preferred embodiment of the present invention.

SUMMARY OF THE INVENTION

[0027] As an extension to and in cooperation with a real-time, online virtual collaboration session, meeting and messaging system, the invention scans a participant's contact list for partially complete contact records, accesses an administered or managed contact information store such as a corporate personnel contact database, and completes the partially complete records in the participant's contact list.

[0028] This allows each participant in such an online meeting or conversation to rely upon his or her contact list to contain a consistent level of information regarding each participant in previously conducted meetings and conversations, avoids the entry of inaccurate and potentially deceptive participant information into the contact list, and allows for reliable communication to the members of a participant's contact list.

DETAILED DESCRIPTION OF THE INVENTION

[0029] The invention is preferably realized as a feature or addition to the software already found present on well-known computing platforms such as personal computers, web servers, and web browsers. These common computing platforms can include personal computers as well as portable computing platforms, such as personal digital assistants (“PDA”), web-enabled wireless telephones, and other types of personal information management (“PIM”) devices.

[0030] Therefore, it is useful to review a generalized architecture of a computing platform which may span the range of implementation, from a high-end web or enterprise server platform, to a personal computer, to a portable PDA or web-enabled wireless phone.

[0031] Turning to FIG. 1, a generalized architecture is presented including a central processing unit (1) (“CPU”), which is typically comprised of a microprocessor (2) associated with random access memory (“RAM”) (4) and read-only memory (“ROM”) (5). Often, the CPU (1) is also provided with cache memory (3) and programmable FlashROM (6). The interface (7) between the microprocessor (2) and the various types of CPU memory is often referred to as a “local bus”, but also may be a more generic or industry standard bus.

[0032] Many computing platforms are also provided with one or more storage drives (9), such as a hard-disk drives (“HDD”), floppy disk drives, compact disc drives (CD, CD-R, CD-RW, DVD, DVD-R, etc.), and proprietary disk and tape drives (e.g., lomega Zip™ and Jaz™, Addonics SuperDisk™, etc.). Additionally, some storage drives may be accessible over a computer network.

[0033] Many computing platforms are provided with one or more communication interfaces (10), according to the function intended of the computing platform. For example, a personal computer is often provided with a high speed serial port (RS-232, RS-422, etc.), an enhanced parallel port (“EPP”), and one or more universal serial bus (“USB”) ports. The computing platform may also be provided with a local area network (“LAN”) interface, such as an Ethernet card, and other high-speed interfaces such as the High Performance Serial Bus IEEE-1394.

[0034] Computing platforms such as wireless telephones and wireless networked PDA's may also be provided with a radio frequency (“RF”) interface with antenna, as well. In some cases, the computing platform may be provided with an infrared data arrangement (IrDA) interface, too.

[0035] Computing platforms are often equipped with one or more internal expansion slots (11), such as Industry Standard Architecture (ISA), Enhanced Industry Standard Architecture (EISA), Peripheral Component Interconnect (PCI), or proprietary interface slots for the addition of other hardware, such as sound cards, memory boards, and graphics accelerators.

[0036] Additionally, many units, such as laptop computers and PDA's, are provided with one or more external expansion slots (12) allowing the user the ability to easily install and remove hardware expansion devices, such as PCMCIA cards, SmartMedia cards, and various proprietary modules such as removable hard drives, CD drives, and floppy drives.

[0037] Often, the storage drives (9), communication interfaces (10), internal expansion slots (11) and external expansion slots (12) are interconnected with the CPU (1) via a standard or industry open bus architecture (8), such as ISA, EISA, or PCI. In many cases, the bus (8) may be of a proprietary design.

[0038] A computing platform is usually provided with one or more user input devices, such as a keyboard or a keypad (16), and mouse or pointer device (17), and/or a touch-screen display (18). In the case of a personal computer, a full size keyboard is often provided along with a mouse or pointer device, such as a track ball or TrackPoint™. In the case of a web-enabled wireless telephone, a simple keypad may be provided with one or more function-specific keys. In the case of a PDA, a touch-screen (18) is usually provided, often with handwriting recognition capabilities.

[0039] Additionally, a microphone (19), such as the microphone of a web-enabled wireless telephone or the microphone of a personal computer, is supplied with the computing platform. This microphone may be used for simply reporting audio and voice signals, and it may also be used for entering user choices, such as voice navigation of web sites or auto-dialing telephone numbers, using voice recognition capabilities.

[0040] Many computing platforms are also equipped with a camera device (100), such as a still digital camera or full motion video digital camera.

[0041] One or more user output devices, such as a display (13), are also provided with most computing platforms. The display (13) may take many forms, including a Cathode Ray Tube (“CRT”), a Thin Flat Transistor (“TFT”) array, or a simple set of light emitting diodes (“LED”) or liquid crystal display (“LCD”) indicators.

[0042] One or more speakers (14) and/or annunciators (15) are often associated with computing platforms, too. The speakers (14) may be used to reproduce audio and music, such as the speaker of a wireless telephone or the speakers of a personal computer. Annunciators (15) may take the form of simple beep emitters or buzzers, commonly found on certain devices such as PDAs and PIMs.

[0043] These user input and output devices may be directly interconnected (8′, 8″) to the CPU (1) via a proprietary bus structure and/or interfaces, or they may be interconnected through one or more industry open buses such as ISA, EISA, PCI, etc.

[0044] The computing platform is also provided with one or more software and firmware (101) programs to implement the desired functionality of the computing platforms.

[0045] Turning to now FIG. 2, more detail is given of a generalized organization of software and firmware (101) on this range of computing platforms. One or more operating system (“OS”) native application programs (23) may be provided on the computing platform, such as word processors, spreadsheets, contact management utilities, address book, calendar, email client, presentation, financial and bookkeeping programs.

[0046] Additionally, one or more “portable” or device-independent programs (24) may be provided, which must be interpreted by an OS-native platform-specific interpreter (25), such as Java™ scripts and programs.

[0047] Often, computing platforms are also provided with a form of web browser or micro-browser (26), which may also include one or more extensions to the browser such as browser plug-ins (27).

[0048] The computing device is often provided with an operating system (20), such as Microsoft Windows™, UNIX, IBM OS/2™, LINUX, MAC OS™ or other platform specific operating systems. Smaller devices such as PDA's and wireless telephones may be equipped with other forms of operating systems such as real-time operating systems (“RTOS”) or Palm Computing's PalmOS™.

[0049] A set of basic input and output functions (“BIOS”) and hardware device drivers (21) are often provided to allow the operating system (20) and programs to interface to and control the specific hardware functions provided with the computing platform.

[0050] Additionally, one or more embedded firmware programs (22) are commonly provided with many computing platforms, which are executed by onboard or “embedded” microprocessors as part of the peripheral device, such as a micro controller or a hard drive, a communication processor, network interface card, or sound or graphics card.

[0051] As such, FIGS. 1 and 2 describe in a general sense the various hardware components, software and firmware programs of a wide variety of computing platforms, including but not limited to personal computers, PDAs, PIMs, web-enabled telephones, and other appliances such as WebTV™ units. As such, we now turn our attention to disclosure of the present invention relative to the processes and methods preferably implemented as software and firmware on such a computing platform. It will be readily recognized by those skilled in the art that the following methods and processes may be alternatively realized as hardware functions, in part or in whole, without departing from the spirit and scope of the invention.

[0052] We now turn our attention to description of the method of the invention and it's associated components. It is preferrably realized as a standalone executable script, which accesses and modifies certain system files and resources as described in more detail in the following paragraphs, but may well be integrated into existing online collaboration client software such as Instant Messenger™, Navigator™ or Internet Explorer™ without departing from the spirit and scope of the invention.

[0053] According to the preferred embodiment, the invention is implemented to cooperate with Lotus' Sametime product and IBM's BluePages corporate personnel contact database.

[0054] IBM's BluePages is an administered database containing personnel contact information, including name, division, location, mailing address, email address, supervisor, telephone number, and fax number. It can be accessed or queried over a corporate intranet through a number of utilities, including a Microsoft Windows-based graphical user interface program, or a DOS-based command line. In alternative embodiments of the invention, any administered contact information database may be accessed by the invention, such as an online services members database (e.g. Yahoo!'s members directory or white pages, AOL IM's directory service, etc.), through any number of query methods including but not limited to SQL.

[0055] Lotus' Sametime™ product supports immediate communication with people across the hall or around the world, through secure text message, audio and video, or full collaborative meetings.

[0056] The Sametime™ product family includes the Sametime™ server, the Sametime Connect Client™, and a range of Application Developer Tools. The Sametime Server was designed to be T-120 compliant and inter works with Microsoft's NetMeeting service.

[0057] The Sametime Server also works seamlessly with popular web browsers as well as Lotus Notes™, and has audio and video capabilities to enhance a user's online experience.

[0058] The Sametime Connect client program lets users find other team members who are concurrently online, and to create personalized lists of team members and colleagues in a contact list. This contact list is stored as a text file on the computing platform on which the Sametime Connect client is running, which makes interfacing to this contact list particularly straightforward. For alternate realizations of the invention with other collaboration client products, the contact list may be a proprietary format file or database, requiring use of appropriate querying and modification functions and interfaces.

[0059] Once a team member is aware of who is online, immediate communication is easy. A single mouse-click lets users send an message instantly to any other team member, start a chat session with several people, or establish an instant, online meeting.

[0060] Users can take advantage of Sametime's shared-objects capabilities to quickly move into an application-sharing or whiteboard session. Session participants can share a screen frame, their desktops or applications with others. Sametime's shared-objects capabilities can also be used to show presentations and drawings on the whiteboard.

[0061] With application sharing, users can share any application, from desktop word processing or spreadsheets, to project management software, without requiring other users to have that application installed.

[0062] Like many of the other online collaboration products, Sametime allows a session participant to automatically store another session participant's email address into his or her own contact list.

[0063] Very often, the BluePages are used by a participant to find phone information, location or division details for other corporate employees subsequent to a online meeting or collaboration session as this information is not captured into the user's Sametime contact list. For example, two days after an online meeting is conducted, a first participant may wish to telephone a second participant instead of sending the second participant an email. So, the first participant would access BluePages, search on the second participant's email address, and usually find the telephone number of the second participant.

[0064] A similar process may be followed by a user of NetMeeting™ or Instant Messenger™ by accessing alternate administered personal contact information databases, such as online white pages (administered by telephone operating companies) or members directories (administered by the club or service management).

[0065] However, this process sometimes has the problem in that the administered contact database (e.g. BluePages, white pages, members directory, etc.) server may be down, or query responses may be very slow which, in mission critical situations, may mean the difference between catching a person before they leave an office in a different part of the world, or having to wait until the next day to hold the telephone conversation.

[0066] To solve this problem, the invention retrieves phone information and potentially other available contact information from an administered contact database, such as BluePages, for each user listed in a contact list, such as the Sametime contact list, and adds that retrieved information to the contact list used by real time collaboration client. According to a preferred embodiment, the invention uses email addresses as search keys, but those skilled in the art will readily recognize that other available data items (e.g. name, employee or member number, etc.) may be used for searching keys as well. Preferably, the invention also removes invalid entries from the contact list, as well.

[0067] Turning to FIG. 4, the arrangement of components (40) according to the preferred embodiment of the invention is shown. A real time conference chat or messaging client (32) is typically provided with a contact list or database (33) on the user's local computing platform persistent storage such as on a hard drive. The contact builder script or executable program (41) is provided to interface (42) to the contact database or list (33), according to the preferred embodiment in association with the Sametime connect client.

[0068] The contact builder (41) interfaces to the Sametime contact list (33) through opening the text file of the list and scanning in lines looking for incomplete records for team members stored in the list.

[0069] Table 1 shows a typical record construction of the text-based contact list file used by Sametime. In this format, semi-colons “;” are used to separate data items within a contact record, and end-of-line characters <EOL> are used to separate contact records. Other implementations of the invention with other real-time collaboration clients products may require the interface (42) to the contact list (43) to be more sophisticated, such as a SQL database interface. TABLE 1 Example Simple Text File Contact List <full_name>;<nick_name>;<email>;<tel_1>; <tel_2>;<phys_addr>; <company>; <title>; <EOL> smith, john; johnny; jsmith@company.com; 703-111-2222;;;Company Inc.;;; doe, jane; janey; janey2002@aol.com;;;;;; : : <end_of_file>

[0070] The contact builder (41) also interfaces one or more managed personal information stores (43). This may include such things as an Netscape address book (44), a company directory (45) such as IBM BluePages, or a member's database (46). Interfaces to these managed personal information stores typically use well-known methods such as Hyper Text Markup Language (“HTML”) or SQL. According to the preferred embodiment, implementation and cooperation with IBM BluePages products requires only the use of a DOS command line function.

[0071] Turning to FIG. 5, the process (50) of the invention is shown in more detail. The process is started (51) either by manual invocation or by automatic triggering, such as on a timed basis or due to a detected change to the user's contact list.

[0072] First, the contact list or database is accessed (52), such as by opening a text file or obtaining a reference to a database query function. The first record or entry in the contact list is retrieved, and a first search key item is retrieved from that record (53). According to the preferred embodiment, the email address of that particular record is extracted. An email address is normally the most unique data key available to use as a search key. In an enhanced embodiment, multiple keys can be extracted (e.g. email address, location, etc.) to produce more exact search results.

[0073] Then, unless all other possible elements are present in the record, such as a telephone number for that contact and location or other desired data items, the managed personal information store may be queried (54) for matching related records and data items using the search key item previously retrieved from the record (53).

[0074] If any matching entries in the managed personnel information store are found (55), then the entry in the contact list or database is modified (56) or otherwise updated (56) to include the additional data items found in the managed personal information store record.

[0075] If no matching entries in the managed personal information storer are found (55), then processing may simply proceed to the next entry or record in the contact list. According to the preferred embodiment, the user may optionally enable the invention to automatically delete entries in his or her contact list if no matching or confirming records are found in the managed personal information store.

[0076] Next, if more records exist in the contact list or the database (57), then the next search key item from the next contact list record or entry (58) is retrieved. This next key item is then processed by querying the managed personal information store for matching related data items (54), and updating (56) any matched entries in the contact list or database.

[0077] This process is continued until all entries in the contact list or database have been updated and expanded to include all available information (or all desirable information) from the managed personal information store.

[0078] As the invention may be run periodically on a timed basis, upon detection of changes to the contact list, or by manual invocation, a user may control how often his or her contact list is updated and expanded to include other data from their most trusted administered contact database.

[0079] While certain examples and details of a preferred embodiment have been disclosed, it will be recognized by those skilled in the are that variations in implementation such as use of different programming methodologies, computing platforms, and processing technologies, may be adopted without departing from the spirit and scope of the present invention. Therefore, the scope of the invention should be determined by the following claims. 

What is claimed is:
 1. A method of fulfilling a contact list, said contact list having one or more contact records, each contact record having one or more data items, said method comprising the steps of: accessing a contact list to retrieve a contact record; parsing said retrieved contact record to obtain a search key value from at least one data item; using said search key value to retrieve from an administered contact information store at least one additional data item not already present in said contact record; modifying said contact record to include said additional data item; and repeating said steps of accessing, parsing, using, and modifying until a set of contact records have been processed.
 2. The method as set forth in claim 1 wherein said step of accessing a contact list comprises accessing a text file.
 3. The method as set forth in claim 1 wherein said step of accessing a contact list comprises accessing a database file.
 4. The method as set forth in claim 1 wherein said step of accessing a contact list comprises accessing an online address book file.
 5. The method as set forth in claim 1 wherein said step of parsing said retrieved contact record comprises extracting an email address from said retrieved contact record.
 6. The method as set forth in claim 1 wherein said step of using said search key value to retrieve from an administered contact information store comprises accessing a corporate personnel information database.
 7. The method as set forth in claim 1 wherein said step of using said search key value to retrieve from an administered contact information store comprises accessing an electronic telephone directory.
 8. The method as set forth in claim 1 wherein said step of using said search key value to retrieve from an administered contact information store comprises accessing an electronic members directory.
 9. The method as set forth in claim 1 wherein said step of modifying said contact record comprises adding a telephone number to said retrieved contact record.
 10. A computer readable medium encoded with software for fulfilling a contact list, said contact list having one or more contact records, each contact record having one or more data items, said software causing a computing platform to perform the steps of: accessing a contact list to retrieve a contact record; parsing said retrieved contact record to obtain a search key value from at least one data item; using said search key value to retrieve from an administered contact information store at least one additional data item not already present in said contact record; modifying said contact record to include said additional data item; and repeating said steps of accessing, parsing, using, and modifying until a set of contact records have been processed.
 11. The computer readable medium as set forth in claim 10 wherein said software for accessing a contact list comprises software for accessing a text file.
 12. The computer readable medium as set forth in claim 10 wherein said software for accessing a contact list comprises software for accessing a database file.
 13. The computer readable medium as set forth in claim 10 wherein said software for accessing a contact list comprises software for accessing an online address book file.
 14. The computer readable medium as set forth in claim 10 wherein said software for parsing said retrieved contact record comprises software for extracting an email address from said retrieved contact record.
 15. The computer readable medium as set forth in claim 10 wherein said software for using said search key value to retrieve from an administered contact information store comprises software for accessing a corporate personnel information database.
 16. The computer readable medium as set forth in claim 10 wherein said software for using said search key value to retrieve from an administered contact information store comprises software for accessing an electronic telephone directory.
 17. The computer readable medium as set forth in claim 10 wherein said software for using said search key value to retrieve from an administered contact information store comprises software for accessing an electronic members directory.
 18. The computer readable medium as set forth in claim 10 wherein said software for modifying said contact record comprises software for adding a telephone number to said retrieved contact record.
 19. A system for automatically completing, verifying and expanding a electronic contact list in a computing platform, said contact list having one or more contact records, each contact record having one or more data items, and said computing platform being communicably interconnected to at least one administered contact information store, said system comprising: a contact list accesser for accessing a contact list to retrieve a contact record; a record parser for parsing said retrieved contact record to obtain a search key value from at least one data item; an administered contact information store interface for using said search key value to retrieve at least one additional data item from an administered contact information store not already present in said retrieved contact record; a contact record modifier to add said additional data item to said retrieved contact record; and a means for operating said accesser, parser, interface, and modifier repetitively until a set of contact records have been processed.
 20. The system as set forth in claim 19 wherein said accesser is adapted to access a text file.
 21. The system as set forth in claim 19 wherein said accesser is adapted to access a database.
 22. The system as set forth in claim 19 wherein said accesser is adapted to access an online address book file.
 23. The system as set forth in claim 19 wherein said parser is adapted to extract an email address from said retrieved contact record.
 24. The system as set forth in claim 19 wherein said administered contact information store interface is adapted to search a corporate personnel information database.
 25. The system as set forth in claim 19 wherein said administered contact information store interface is adapted to search an electronic telephone directory.
 26. The system as set forth in claim 19 wherein said administered contact information store interface is adapted to search an electronic members directory.
 27. The system as set forth in claim 19 wherein said record modifier is adapted to add a telephone number to said retrieved contact record. 