System and method for controlled access to up-to-date personal information

ABSTRACT

A method and system for controlling a recipient&#39;s access to a user&#39;s information. The method includes receiving a plurality of contact information, registration information and access information from the user. Only person&#39;s knowing the user&#39;s registration information can update the contact and access information of the user. The contact information entered by a user is about that user. The access information defines accessible sets of contact information to be made accessible to recipients. A telephone exchange is associated with each recipient; and a local server is associated with each telephone exchange. The accessible set of information is stored in the local server for access by the recipient. The system handles updates to information on the local servers when a user updates their contact information. The system can automatically place calls for a recipient to a user that has granted the recipient access to a number for communicating with the user.

This application is a continuation of U.S. patent application Ser. No.13/312,071 filed Dec. 6, 2011, which is a continuation application ofU.S. patent application Ser. No. 12/253,263 filed Oct. 17, 2008, nowU.S. Pat. No. 8,095,655 issued Jan. 10, 2012, which is continuation ofU.S. patent application Ser. No. 11/300,668, filed Dec. 13, 2005, nowU.S. Pat. No. 7,441,031 issued Oct. 21, 2008, which is acontinuation-in-part of U.S. patent application Ser. No. 09/862,111,filed May 21, 2001, now U.S. Pat. No. 7,010,599 issued Mar. 7, 2006, thedisclosure of which is herewith incorporated by reference in theirentirety.

BACKGROUND OF THE INVENTION

Many people and organizations desire to share different contactinformation with other people and organizations. For example, a personmay desire for a creditor to know his social security number and hishome address but not his home telephone number. To extend the example,the person may have multiple creditors and may desire for all of thecreditors to know his social security number and home address (but nothis home telephone number). On the other hand, the person may desire forhis employer(s) to know his home telephone number as well as his homeaddress.

As another example, a person may desire for an old high school boyfriendto know her business address and telephone number (but not her homeinformation) so that he may keep her apprised of any plans for a classreunion (without dropping by her apartment uninvited). Conversely, shemay desire for some of her family members to know her home information(but not her business information) so that they may keep her apprised ofany plans for a family reunion (without bothering her at the office).

As yet another example, a company may desire for its attorneys to have adirect office telephone number, a home telephone number, and a cellphone number for its Chief Executive Officer (“CEO”), while desiring forits suppliers to have only its shipping and mailing addresses and atelephone number for its purchasing department (without the CEO's directcontact information).

Historically, changes in contact information about one party haverequired individual notifications of numerous other interested partiessuch as, for example, employers, customers, family, friends, etc.Individual notifications have been subject to errors and omissions; andfailures to promptly and accurately communicate changes in contactinformation to interested parties typically result in returnedcorrespondence, misdirected shipping, lost business prospects, and otherundesirable losses of time and/or money.

Thus, there is a need for a system and method that facilitatescommunication of changes in contact information for one party to otherinterested parties. Further, there is a need for a system and methodthat provides control over what particular contact information for oneparty is accessible to which other particular interested parties.

SUMMARY OF THE INVENTION

The present invention provides a method for controlling recipient'saccess to a first user's information over a communications network. Themethod includes receiving a plurality of contact information,registration information and access information from the first user overthe communications network. Only the first user and person's knowing theregistration information of the first user are allowed to enter orupdate the contact information and access information of the first user.The contact information entered by the first user is information aboutthe first user. The access information defines a first accessible set ofcontact information about the first user that is to be made accessibleto a first recipient. A first telephone exchange is associated with thefirst recipient; and a first local server computing device is associatedwith the first telephone exchange. The first accessible set ofinformation about the first user is stored in the first local servercomputing device; and the first recipient can access the firstaccessible set of information about the first user stored in the firstlocal server computing device.

The present invention comprises the following steps when the pluralityof contact information about the first user is updated. The updatedportion of the plurality of contact information about the first user isdetermined. The access information of the first user is then searched todetermine any update recipients, which are recipients with access rightsto part of the updated portion of the plurality of contact informationabout the first user. Then, for any update recipient, the systemdetermines the local server computing device associated with the updaterecipient; and updates the set of the plurality of contact informationabout the first user accessible to the update recipient in the localserver computing device associated with the update recipient.

The present invention can also place calls for a recipient. When thesystem receives a request from the first recipient to place a telephonecall, the system checks the first local server computing device todetermine a callable set of users, the callable set of users being usersthat have granted the first recipient access rights to a telephonenumber. The system then prompts the first recipient to select a userfrom the callable set of users; and places a call connecting the firstrecipient to the selected user. If the first recipient has been grantedaccess rights to more than one telephone number of the selected user,the system prompts the first recipient to select a telephone number fromthe more than one telephone number of the selected user; and places acall connecting the first recipient to the selected person using theselected telephone number.

The features and advantages of the present invention described above, aswell as additional features and advantages, will be readily apparent tothose skilled in the art upon reference to the following detaileddescription and the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a system according to the presentinvention;

FIG. 2 is a flowchart of an exemplary method of operation according tothe present invention;

FIG. 3 is a depiction of an exemplary “blank” profile definition pageaccording to the present invention;

FIG. 4 is a depiction of an exemplary “completed” profile definitionpage according to the present invention;

FIG. 5 is a block diagram of a system according to the present inventionshowing telephone exchanges and telephone devices;

FIG. 6 is a flowchart of an exemplary method of the information updateprocess; and

FIG. 7 is a flowchart of an exemplary method of using the system toplace a telephone call.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

As used throughout this disclosure and the claims, “contact information”means an alphanumeric address such as those presently used to send mailvia the United States Postal Service (“USPS”), a telephone (orfacsimile, or beeper) number such as those presently used by PublicSwitched Telephone Networks (“PSTN”) and wireless telephone serviceproviders, an e-mail address such as those presently used to sendmessages over the World Wide Web (“www”) and the Internet, and/or anyother visual or auditory word, number, symbol, and/or visual or auditorycollection of words and/or numbers and/or symbols that a first person orentity may input into a communications network or system to initiate acommunication with a second person or entity over the communicationsnetwork or system. To this end, it is noted that “contact information”as used throughout this disclosure and the claims includes any signal orcollection of signals which transmits, carries, or otherwise representsor includes any of the aforementioned forms of contact information.

As used throughout this disclosure and the claims, “access information”means any visual or auditory word, number, symbol, and/or visual orauditory collection of words and/or numbers and/or symbols thatindicates which of a first user's contact information the first userdesires to be accessible by a second user. To this end, it is noted that“access information” as used throughout this disclosure and the claimsincludes any signal or collection of signals which transmits, carries,or otherwise represents or includes any of the aforementioned forms ofaccess information.

FIG. 1 is a block diagram of a system 100 according to the presentinvention. The system 100 includes a communications network 120, aserver computing device 140, and at least one of a plurality of clientcomputing devices (client computing device 160.sub.1, client computingdevice 160.sub.2, client computing device 160.sub.3, . . . clientcomputing device 160.sub.x).

The communications network 120 operably couples the server computingdevice 140 to the at least one of the plurality of client computingdevices such that the server computing device 140 and the at least oneof the plurality of client computing devices may share informationaccording to the present invention. To this end, the communicationsnetwork 120 is the Internet, the World Wide Web, and/or any othersuitable collection of devices that is connected to share information.It should be readily appreciated that the communications network 120 mayinclude multiple public and/or private Local Area Networks (“LANs”)and/or Wide Area Networks (“WANs”) (not shown) that are operably coupledto one another via routers, switches, hubs, gateways, proxies, and/orfirewalls (not shown). Additionally, it is noted that the communicationsnetwork 120 may include a hardwired telephone network, a wirelesstelephone network, and/or a satellite network.

In general, the server computing device 140 is implemented with a servercomputer system or web server manufactured by Dell Computer Corporationof Round Rock, Tex., Gateway, Inc. of San Diego, Calif., or CompaqComputer Corporation of Houston, Tex. Further, the server computingdevice 140 may alternatively, or in addition, include network serverappliances, server farms, server clusters, network accessible storagedevices, and/or any other device suitable for executing operationsaccording to the present invention. In the exemplary embodiment of FIG.1, the server computing device 140 includes a processor 142, a storagedevice 144, memory 146, a network interface 148, and a system bus 150.

The processor 142 is generally operable to obtain software and/orfirmware instructions from the storage device 144, load them into memory146, and execute the instructions from memory 146. To this end, theprocessor 142 includes a single x86 processor from Intel or AMD.Alternatively, the processor 142 may include one or more processorsutilizing very long instruction words, (“VLIW”) code morphing, complexinstruction set computer (“CISC”), reduced instruction set computer(“RISC”), single instruction/multiple data (“SIMD”), multipleinstruction/multiple data (“MIMD”), or any other suitable architecture;and may be obtained from Compaq, National Semiconductor Corporation,Transmeta Corporation, or any other suitable vendor.

The storage device 144 is generally operable to store data and/orsoftware instructions for the server computing device 140. To this end,the storage device 144 includes a hard disk drive, a floppy disk drive,a CD-ROM drive, a DVD-RAM drive, a RAID device, a Disk-On Chip device,and/or any other suitable computer readable and/or writeable mediadevice. Additionally, the storage device 144 may include multiple mediadevices and may be distributed among several computing devices such asother servers of a server farm, other database servers, or other networkaccessible storage (“NAS”) devices. Furthermore, the storage device 144may store data in a number of different manners such as raw data to themedia of the storage device 144, files in a file system of the storagedevice 144, and/or data, records, or objects in a database of thestorage device 144. In the exemplary embodiment, the server computingdevice 140 transmits and receives information over the Internetaccording to the HyperText Transfer Protocol (“HTTP”) and theTransmission Control Protocol/Internet Protocol (“TCP/IP”) networkprotocol. To this end, the instructions in the storage device 144include the Internet Information Server available from MicrosoftCorporation, the Apache HTTP Server available from the Apache Group, theZope web application server available from Digital Creations, Inc., orinstructions for any other suitable HTTP server or web applicationserver. It is noted, however, that the instructions in the storagedevice 144 may alternatively include instructions for FTP, TFTP, SMTP,or any other suitable transfer protocol and/or UDP, SMB, NetBUI, or anyother suitable network protocol in addition to or instead ofinstructions for the HTTP protocol and the TCP/IP protocol.

Memory 146 stores data and instructions used by the processor 142. Tothis end, memory 146 includes standard random access memory for storingthe data and software instructions needed by the processor 142.Alternatively, memory 146 may include other volatile memory types suchas DRAM, SDRAM, and SRAM for storing data and software instructionsand/or non-volatile memory such as ROMs, PROMs, EEPROMs, and flashmemory for storing data and firmware instructions.

The network interface 148 operably couples the server computing device140 to the communications network 120 such that the server computingdevice 140 may communicate with the at least one of the plurality ofclient computing devices that are also operably coupled to thecommunications network 120. To this end, the network interface 148comprises a network interface controller such as an Ethernet controlleror Token Ring controller that connects the server computing device 140to the communications network 120 via a local area network, firewall,gateway, and/or router. Alternatively, or in addition, the networkinterface 148 may include an analog modem for use over Plain OldTelephone System (“POTS”) telephone lines such as a 28.8K or 56K modem,a digital modem such as a Cable modem for use over a cable distributionnetwork, an Integrated Services Digital Network (“ISDN”) modem for useover an ISDN telephone line, or a Digital Subscriber Line (“DSL”) modemfor use over a DSL telephone line.

The system bus 150 is generally operable to interconnect the processor142, the storage device 144, memory 146, and the network interface 148,and to enable these components of the server computing device 140 tocommunicate with one another. To this end, the system bus 150 isimplemented with one or more of the PCI, ISA, and VME bus architectures,or any other suitable bus architecture(s). In the exemplary embodiment,the system bus 150 includes a separate address bus and data bus;however, in alternative embodiments, the address bus and data bus neednot be separated.

In any event, it is noted that the above described components of theserver computing device 140 are merely exemplary, and in alternativeembodiments those skilled in the art may elect to replace all orportions of these components with suitable discrete analog circuitcomponents, discrete digital circuit components, integrated analogcircuits, integrated digital circuits, and/or integrated analog/digitalhybrid circuits without undue experimentation.

As a result of executing the instructions read from memory 146, theprocessor 142 controls the general operation of the server computingdevice 140. More specifically, pursuant to the instructions read frommemory 146, the processor 142 causes the server computing device 140 toreceive a plurality of contact information from the at least one of theplurality of client computing devices over the communications network120, receive access information from the same or any different one ofthe plurality of client computing devices over the communicationsnetwork 120, and selectively transmit at least some of the plurality ofcontact information to at least one of the plurality of client computingdevices over the communications network 120 based at least in part onthe access information. Further details regarding exemplary operationsof the server computing device 140 are discussed below.

Next, those of the plurality of client computing devices included in thesystem 100 are configured and coupled to the communications network 120in a like manner to the client computing device 160.sub.1. So, forclarity of exposition, the exemplary embodiment of FIG. 1 is furtherdescribed below with particular reference to the client computing device160.sub.1. In general, the client computing device 160.sub.1 isimplemented with a personal computer system, a desktop computer system,and/or a workstation manufactured by Dell Computer Corporation of RoundRock, Tex., Gateway, Inc. of San Diego, Calif., and Compaq ComputerCorporation of Houston, Tex. Further, the client computing device160.sub.1 may alternatively, or in addition, include a handheldcomputer, a laptop computer, a set-top box, a network appliance, agaming console and/or any other suitable network enabled (preferablyInternet enabled) computing device. In the exemplary embodiment, theclient computing device 160.sub.1 includes a processor 162, a storagedevice 164, memory 166, a network interface 168, one or more user I/Odevices 170, and a system bus 172.

The processor 162 is generally operable to obtain software and/orfirmware instructions from the storage device 164, load them into memory166, and execute the instructions from memory 166. To this end, theprocessor 162 includes a single x86 processor from Intel or AMD.Alternatively, the processor 162 may include one or more processorsutilizing VLIW, code morphing, CISC, RISC, SIMD, MIMD, or any othersuitable architecture; and may be obtained from Compaq, NationalSemiconductor Corporation, Transmeta Corporation, or any other suitablevendor.

The storage device 164 is generally operable to store data and/orsoftware instructions for the client computing device 160.sub.1. To thisend, the storage device 164 may include a hard disk drive, a floppy diskdrive, a CD-ROM drive, a DVD-RAM drive, a RAID device, a Disk-On Chipdevice and/or other suitable computer readable and/or writeable mediadevice. Additionally, the storage device 164 may include multiple mediadevices and may be distributed among several computing devices or othernetwork accessible storage NAS devices. Furthermore, the storage device164 may store data in a number of different manners such as raw data tothe media of the storage device 164, files in a filesystem of thestorage device 164, and/or data, records, or objects in a database ofthe storage device 164. In the exemplary embodiment, the clientcomputing device 160.sub.1 transmits and receives the information overthe Internet according to the HTTP protocol and the TCP/IP networkprotocol. To this end, instructions in the storage device 164 includethe Internet Explorer web browser, available from Microsoft Corporationof Redmond, Wash.; the Netscape Communicator web browser, available fromNetscape Communications Corporation of Mountain View, Calif.; orinstructions for any other suitable web browser. Standard web browsersare generally operable to send and receive packets of information thatconform to the HTTP and the TCP/IP protocols, send requests forHyper-Text Markup Language (“HTML”) documents, receive HTML documents,display HTML documents, and send data that a user has input into a HTMLform.

Additionally, standard web browsers typically provide mechanisms whichenable remote computer systems such as the server computing device 140to cause the client computing device 160.sub.1 to execute softwareroutines. For example, many web browsers support execution of JavaApplets, JavaScript, ActiveX Controls, and other types of softwaretechnologies by which the server computing device 140 may cause theclient computing device 160.sub.1 to execute software routines inresponse to information received from the server computing device 140.Also, standard web browsers typically include the ability to determinewhether a particular software component such as an ActiveX Control, aplug-in application, or a Java Applet is already installed on the clientcomputing device 160.sub.1 in response to information received from aserver computing device 140. Further, standard web browsers typicallyinclude the ability to determine the version of such installed softwarecomponents. Standard web browsers also typically include the ability todownload and install a software component such as an ActiveX Control, aplug-in application, or a Java Applet from the server computing device140 in response to information received from the server computing device140. Standard web browsers also generally include the ability to cacheinformation received from the server computing device 140 and determinewhether the information in the cache is up-to-date with correspondinginformation of the server computing device 140. In this manner, the webbrowser of the client computing device 160.sub.1 can prevent therepetitive transfer of the same information from the server computingdevice 140 to the client computing device 160.sub.1. In other words, ifthe client computing device 160.sub.1 requests a particular resourcefrom the server computing device 140 and the client computing device160.sub.1 already has a copy of that resource in the cache, then the webbrowser can cause the client computing device 160.sub.1 to use thecached version of the resource, thus eliminating a transfer of theresource from the server computing device 140 to the client computingdevice 160.sub.1.

It is noted, however, that in alternative embodiments, the web browsermay not include all of the aforementioned features. Moreover, inalternative embodiments the web browser functions may be implemented asa native custom application of the client computing device 160.sub.1that is specifically designed for the system 100. The custom applicationmay be implemented to display HTML and other markup language documentsin a manner similar to a standard web browser, but need not include allof the features of a standard web browser. Further, in alternativeembodiments the custom application may be implemented to receiveinformation from the server computing device 140 in a non-markuplanguage format, and to display the information via a customizedgraphical interface.

Memory 166 stores data and instructions used by the processor 162. Tothis end, memory 166 includes standard random access memory for storingthe data and software instructions needed by the processor 162.Alternatively, memory 166 may include other volatile memory types suchas DRAM, SDRAM, and SRAM for storing data and software instructionsand/or non-volatile memory such as ROMs, PROMs, EEPROMs, and flashmemory for storing data and firmware instructions.

Additionally, it is noted that the client computing device 160.sub.1 mayalternatively be implemented with memory chips and/or other suitablehardware such that the same hardware implements both the storage device164 and memory 166. Many handheld computing devices (e.g. Palm Pilots),Internet enabled cellular phones, and other special purpose computingdevices are implemented in such a manner. It should be readilyappreciated that any such device may be used to implement the clientcomputing device 160.sub.1.

The network interface 168 operably couples the client computing device160.sub.1 to the communications network 120 such that the clientcomputing device 160.sub.1 may communicate with the server computingdevice 140 via the communications network 120. To this end, the networkinterface 168 comprises an analog modem for use over POTS telephonelines such as a 28.8K or 56K modem, a digital modem such as a cablemodem for use over a cable distribution network, an ISDN modem for useover an ISDN telephone line, or a DSL modem for use over a DSL telephoneline. Alternatively, or in addition, the network interface 168 mayinclude a network interface controller such as an Ethernet controller orToken Ring controller that can be used to connect the client computingdevice 160.sub.1 to the communications network 120 via a local areanetwork, firewall, gateway, and/or router.

The client computing device 160.sub.1 also includes one or more user I/Odevices 170. In general, the user I/O devices 170 provide a user of theclient computing device 160.sub.1 with mechanisms for enteringinformation into the client computing device 160.sub.1, receivinginformation from the client computing device 160.sub.1, and/orcontrolling the operation of the client computing device 160.sub.1. Tothis end, the user I/O devices 170 may include cathode ray tubes(“CRT”), liquid crystal displays (“LCDs”), light emitting diodes(“LEDs”), printers, and/or other output devices that are operable tovisually present information to a user of the exemplary client computingdevice 160.sub.1. The user I/O devices 170 may also include sound cards,wave generators, sequencers, mixers, speakers, and/or other audiodevices that are used to audibly present information to a user of theexemplary client computing device 160.sub.1. Further, the user I/Odevices 170 may include a mouse, a keyboard, a touch pad, a push button,a scanner, a stylus, a touch screen, a diskette drive, a compact discread-only-memory (“CDROM”) drive, and/or other input devices thatprovide a user of the exemplary client computing device 160.sub.1 withan interface to directly control the operation of the client computingdevice 160.sub.1 and/or indirectly control the operation of the servercomputing device 140. In the exemplary embodiment, the user I/O devices170 are operable to display HTML documents and HTML forms. However, inalternative embodiments the user I/O devices 170 may display documentsin SGML, XML, Tex, LaTeX and/or other suitable markup language formats.

The system bus 172 is generally operable to enable the variouscomponents of the client computing device 160.sub.1 to communicate withone another. To this end, the system bus 172 may be implemented with oneor more of the PCI, ISA, and VME architectures, or any other suitablebus architecture(s). In the exemplary embodiment, the system bus 172includes bus lines and/or traces which interconnect the processor 162,the storage device 164, memory 166, the network interface 168, and theuser I/O devices 170.

In any event, it is noted that the above described components of theclient computing device 160.sub.1 are merely exemplary, and inalternative embodiments those skilled in the art may elect to replaceall or portions of these components with suitable discrete analogcircuit components, discrete digital circuit components, integratedanalog circuits, integrated digital circuits, and/or integratedanalog/digital hybrid circuits without undue experimentation.

As a result of executing the instructions read from memory 166, theprocessor 162 controls the general operation of the client computingdevice 160.sub.1. More specifically, pursuant to the instructions readfrom memory 166, the processor 162 causes the client computing device160.sub.1 to transmit a plurality of contact information to the servercomputing device 140 over the communications network 120, transmitaccess information to the server computing device 140 over thecommunications network 120, and receive at least some of the pluralityof contact information from the server computing device 140 over thecommunications network 120. Further details regarding exemplaryoperations of the client computing device 160.sub.1 are discussed below.

FIG. 2 is a flowchart of an exemplary method of operation 300 accordingto the present invention. As noted above, those of the plurality ofclient computing devices included in the system 100 are configured andcoupled to the communications network 120 in a like manner to the clientcomputing device 160.sub.1. So, for clarity of exposition, the exemplarymethod of operation 300 is described below with particular reference tothe client computing device 160.sub.1. Further, for clarity ofexposition, the exemplary method of operation 300 is described belowwith particular reference to an exemplary embodiment of the system 100in which the communications network 120 is the Internet.

At step 320, the system 100 executes “Home Page” operations. Here, afirst user accesses a home page display via the user I/O devices 170 ofthe client computing device 160.sub.1 (see FIG. 1, discussed above). Thefirst user directs the client computing device 160.sub.1 to initiatecommunications with the server computing device 140 by inputting theUniform Resource Locator (“URL”) for the server computing device 140 orby any other suitable manner. In any event, the client computing device160.sub.1 obtains instructions from the server computing device 140which cause the client computing device 160.sub.1 to execute the HomePage operations.

The home page display is similar in form and function to a typicalInternet website home page. To this end, the client computing device160.sub.1 displays welcoming messages to the user and displays a generaldescription of the services provided by the present invention. Inalternative embodiments, the Home Page operations may also suitablydisplay commercial advertisements and/or otherwise provide advertisingspace that may be sold or leased to generate revenue for the owner ofthe present invention. After step 320 operations, the system 100proceeds to step 340.

At step 340, the system 100 (through the user I/O devices 170 of theclient computing device 160.sub.1) displays a query asking the firstuser whether the first user is a “registered user” of the presentinvention. A “registered user” is a user who has previously entered therequested “registration information” (discussed in more detail below).It should be readily appreciated that restricting access to the presentinvention to registered users may provide a source of revenue for theowner of the present invention in the form of one time registration feesand/or periodic subscription fees. In any event, if the first userindicates that the first user is a registered user, then the system 100skips to step 400 (discussed further below); else, the system 100proceeds to step 360.

At step 360, the system 100 executes “Registration” operations. Here,the system 100 (through the user I/O devices 170 of the client computingdevice 160.sub.1) prompts the first user to enter “registrationinformation.” The registration information suitably comprises analphanumeric user identification name (“User ID”) and security code (or“password”), both of the first user's arbitrary choosing. The clientcomputing device 160.sub.1 transmits the User ID and password to theserver computing device 140 via the communications network 120. Inconnection with the Registration operations, the server computing device140 maintains a registration database (shown as step 380 operations).The server computing device 140 checks the contents of its registrationdatabase to ensure that the first user's registration information doesnot conflict with (i.e., is not the same as) any previously storedregistration information. If the server computing device 140 detects aconflict, then the server computing device 140 notifies the clientcomputing device 160.sub.1, which in turn notifies the first user andprompts the first user for non-conflicting registration informationthrough the user I/O devices 170. The system 100 repeats the prompts forregistration information, receipts of registration information, andconflicts checks until the first user enters non-conflictingregistration information. When non-conflicting registration informationis received, the server computing device 140 saves the User ID andpassword as associated data in the registration database (step 380operations). After step 360 operations (and step 380 operations), thesystem 100 skips to step 420 (discussed further below).

At step 400, the system 100 executes “User Verification” operations.Here, the client computing device 160.sub.1 (through the user I/Odevices 170) prompts the first user for the first user's User ID andpassword, which should have been received from the first user during aprevious registration session (see step 360 operations, discussedabove). The client computing device 160.sub.1 receives the User ID andpassword and transmits them to the server computing device 140 via thecommunications network 120. The server computing device 140 determineswhether the User ID and password are valid (i.e., whether the User IDand password have been previously stored and associated with each otherin the registration database). After the server computing device 140determines that the User ID and password are valid (or “verified”), thenthe system 100 proceeds to step 420; else the system 100 loops back toHome Page operations (see step 320, discussed above).

At step 420, the system 100 executes “Main Menu” operations. Here, theserver computing device 140 causes the client computing device 160.sub.1to display a “main page” which presents links to “Personal Information”operations (see step 440, below), “Profile Definition” operations (seestep 480, below), and “Profile Assign/Access” operations (see step 520,below). Via the user I/O devices 170, the first user selects which oneof these sets of operations are to be executed by the system 100. Theclient computing device 160.sub.1 receives the first user's selectionand transmits the selection to the server computing device 140. Uponreceipt of the selection by the server computing device 140, the system100 proceeds to the selected operations. In other words, the Main Menuoperations provide a menu by which the first user can cause the system100 to branch to the selected operations. In alternative embodiments,the Main Menu operations may also provide selections for e-mailservices, Internet chat rooms, and/or other communications tools thatmay be desirable to the first user. Further, it should be readilyappreciated that in alternative embodiments the Main Menu operations mayalso suitably provide advertising for others.

At step 440, the system 100 executes “Personal Information” operations.Here, the server computing device 140 causes the client computing device160.sub.1 to prompt the first user for the first user's contactinformation, and other personal information that the first user may wishto make accessible to other registered users such as a list of specialevents (e.g., birthdays, wedding anniversary dates, employment servicedates, etc.), miscellaneous demographic information (e.g., a socialsecurity number, a license plate number, a resume, a date of birth, arace, a sex, a family description, a home description, an income, etc.),and/or image data files from a diskette, CDROM, or other storage device.The image data files suitably comprise digitized photographs of thefirst user's family, for example. In any event, the client computingdevice 160.sub.1 receives the contact information and/or other personalinformation from the first user and transmits it to the server computingdevice 140 via the communication network 120. In connection with thePersonal Information operations, the server computing device 140maintains the contact information and/or other personal information in apersonal details database (shown as step 460 operations). Further,during the Personal Information operations the system 100 also allowsthe first user to view, modify, and/or delete the first user's contactinformation and/or other personal information and to add new contactinformation and/or other personal information beyond that which may havealready been stored in the personal information database during a prioruse of the present invention. For instance, Personal Informationoperations allow a first user to input the first user's home address forthe first time and then subsequently update/change the first user's homeaddress after a move. After step 440 operations (and step 460operations), the system 100 returns to the Main Menu operations (seestep 420, discussed above).

At step 480, the system 100 executes “Profile Definition” operations.Here, the server computing device 140 causes the client computing device160.sub.1 to display “profile definition” pages. Through the profiledefinition pages, the client computing device 160.sub.1 receives someaccess information from the first user as profile definition informationand communicates the profile definition information to the servercomputing device 140 via the communications network 120. The profiledefinition information identifies a portion of the first user's contactinformation and/or other personal information, and identifies arelationship between the first user and a desired recipient or group ofrecipients of that portion of the information (see, for example, FIGS. 3and 4, discussed below). In connection with the Profile Definitionoperations, the server computing device 140 maintains the profiledefinition information in a profile definition database (shown as step500 operations). Further, the system 100 also allows the first user toview, modify, and/or delete the first user's profile definitioninformation and to add new profile definition information beyond thatwhich may have already been stored in the profile definition databaseduring a prior use of the present invention. After step 480 operations(and step 500 operations), the system 100 returns to the Main Menuoperations (see step 420, discussed above).

At step 520, the system 100 executes “Profile Assign/Access” operations.Here, the server computing device 140 causes the client computing device160.sub.1 to display “profile assign/view” pages by which the clientcomputing device 160.sub.1 receives profile assign/access informationfrom the first user. The client computing device 160.sub.1 transmits theprofile assign/access information to the server computing device 140 viathe communications network 120. More particularly, via the ProfileAssign/Access operations, the system 100 allows the first user to assignor link another registered user(s) to the first user's profiledefinition information. In other words, via the Profile Assign/Accessoperations, the system 100 receives further access information from thefirst user that specifies which other registered users are grantedaccess to the particular portion(s) of the first user's contactinformation and/or other personal information that are identified by thefirst user's profile definition information. In connection with theProfile Assign/Access operations, the server computing device 140maintains the profile assign/access information in a profileassign/access database (shown as step 540 operations). Further, thesystem 100 also allows the first user to view, modify, and/or delete thefirst user's profile assign/access information and to add new profileassign/access information beyond that which may have already been storedin the profile assign/access database during a prior use of the presentinvention.

Via the Profile Assign/Access operations, the system 100 also allows thefirst user to view and/or download the respective contact informationand/or other personal information of other registered users who haveassigned the first user to their respective profile definitioninformation. After step 520 operations (and step 540 operations), thesystem 100 returns to the Main Menu operations (see step 420, discussedabove).

FIG. 3 is a depiction of an exemplary “blank” profile definition page504 (i.e., with no input yet from the first user) according to thepresent invention. In general, FIG. 3 depicts an exemplary page by whichthe system 100 allows the first user to select which of the first user'scontact information and/or other personal information from the personaldetails database (see steps 440 and 460, discussed above) that the firstuser wishes to make accessible to other registered users whom the firstuser designates to be within the group or category of the named profilevia the “Profile Assign/Access” operations (see step 520, discussedabove).

According to the example depicted by FIG. 3, during Profile Definitionoperations (see step 480, discussed above) the system 100 allows thefirst user to assign an alphanumeric profile name of the first user'sarbitrary choosing (such as, for example, “Friends”, “Family”, “BusinessColleagues”, “Schoolmates”, etc.) to a profile by entering (via the userI/O devices 170 of the client computing device 160.sub.1) the desiredname of the profile into a profile name field 508. Then, the first userinputs selections into the system 100 by entering an “X” into each ofthe respective selection boxes 510 of the profile definition page 504.To this end, it should be readily appreciated that FIG. 3 depicts boxesfor indicating that particular residential (or present place of living)contact information such as address, phone number, pager number, faxnumber, and e-mail address are to be accessible by the other registeredusers within the named group (see the “Residential” column); furtherdepicts boxes for indicating that particular permanent (or domicile)contact information such as address, phone number, pager number, faxnumber, and e-mail address are to be accessible by the other registeredusers within the named group (see the “Permanent” column); furtherdepicts boxes for indicating that particular business contactinformation such as address, phone number, pager number, fax number, ande-mail address are to be accessible by the other registered users withinthe named group (see the “Business” column); further depicts boxes forindicating that particular temporary (e.g., vacation) contactinformation such as address, phone number, pager number, fax number, ande-mail address are to be accessible by the other registered users withinthe named group (see the “Temporary” column); further depicts boxes forindicating that personal and/or business images data (e.g., digitizedpictures of that sky trip to Aspen) is to be accessible by the otherregistered users within the named group; further depicts boxes forindicating that personal and/or business special events information(e.g., high school graduation date, college graduation date, and/orother events) is to be accessible by the other registered users withinthe named group; and further depicts boxes for indicating that date ofbirth information, miscellaneous family details information, and/orwedding date information are to be accessible by the other registeredusers within the named group.

It should be readily appreciated that prior to the first user'sselections, the system 100 has prompted the first user for and receivedthe necessary contact information and/or other personal information fromthe first user via the “Personal Information” operations (see step 440,discussed above). These prompts suitably comprise, for example, a seriesof corresponding queries such as “What is your residential address?”,“What is your residential telephone number?”, etc.; or may suitablycomprise a “personal information” page similar to the profile definitionpage 504 but with input fields for the necessary information in place ofthe selection boxes 510. In any event, it is noted that the profiledefinition page 504 and the prompts for the necessary informationdiscussed herein are merely exemplary, and alternative embodiments ofthe present invention may include different page layouts, differentqueries, or any other suitable alternatives. Additionally, it is notedthat the present invention is not limited to the specific contactinformation and/or other personal information depicted in FIG. 3 (orFIG. 4, discussed below).

FIG. 4 is a depiction of an exemplary “completed” profile definitionpage 514 (i.e., with a name entered in the profile name field 508 andselections indicated in the selection boxes 510) according to thepresent invention. The “completed” profile definition page 514 isdisplayed by the client computing device 160.sub.1. In the exampledepicted in FIG. 4, the first user has created a profile named“Friends.” Further, the first user has indicated that all otherregistered users whom the first user designates as the first user's“Friends” via the “Profile Assign/Access” operations (see step 520,discussed above) shall have access to certain of the first user'scontact and/or personal information from the personal details database,namely: the first user's residential address, permanent address, andtemporary address; the first user's residential telephone number,permanent telephone number, and temporary telephone number; the firstuser's residential pager number, permanent pager number, business pagernumber, and temporary pager number; the first user's residential faxnumber; the first user's residential e-mail address; the first user'spersonal image data; and the first user's personal special eventsinformation. On the other hand, it should be readily appreciated thatthe system 100 does not allow the other users to access the variousother information which the first user has not selected. The clientcomputing device 160.sub.1 transmits the profile definition information(i.e., the profile name and the selections) to the server computingdevice 140 via the communications network 120.

Continuing the example discussed above in connection with FIGS. 3 and 4,during the Profile Assign/Access operations (see step 520, discussedabove) the client computing device 160.sub.1 receives the first user'sindication that “John Doe” (a second registered user) is one of thefirst user's “Friends” through the user I/O devices 170 of the clientcomputing device 160.sub.1 via a “profile assignment” prompt whichsuitably includes a first entry field for receiving the profile name anda second entry field for receiving John Doe's (the other registereduser's) User ID. Accordingly, the server computing device 140 updatesits profile assign/access database to clear John Doe for access to thefirst user's particular contact and/or personal information from thefirst user's Friends profile, namely: the first user's residentialaddress, permanent address, and temporary address; the first user'sresidential telephone number, permanent telephone number, and temporarytelephone number; the first user's residential pager number, permanentpager number, business pager number, and temporary pager number; thefirst user's residential fax number; the first user's residential e-mailaddress; the first user's personal image data; and the first user'spersonal special events data (as discussed above in connection with FIG.4). On the other hand, it should be readily appreciated that in theevent that the first user has also setup another profile, for example, a“Business Colleagues” profile, the first user's assignment of John Doeto the first user's Friends profile does not clear John Doe for accessto the information in the first user's Business Colleagues profile. Toclear John Doe for access to any of the first user's profiles, the firstuser must assign John Doe to that respective profile.

Additionally, for example, when John Doe has assigned the first user toJohn Doe's “Friends” profile during a prior use of the present invention(where John Doe operated the invention in the role of a “first user”(see steps 440 and 480, discussed above), the first user suitably entersa request for the contact information of “John Doe” into the clientcomputing device 160.sub.1 (via the user I/O devices 170). The clientcomputing device 160.sub.1 transmits this request to the servercomputing device 140. In response to the request, the server computingdevice 140 causes the client computing device 160.sub.1 to indicate tothe first user John Doe's particular contact information and/or otherpersonal information which John Doe has included in John Doe's Friendsprofile.

Accordingly, it should be readily appreciated that the first user causesthe system 100 to clear a second registered user for access to arespective plurality of the first user's profiles by making a pluralityof respective profile assignments for the second user, thereby grantingthe second user access to a respective plurality of the first user'scontact information. For instance, the first user may assign John Doe toa “Family” profile and/or a “Schoolmates” profile as well as oralternatively to the first user's Friends profile. Further, it should bereadily appreciated that the first user repeats operations of thepresent invention as desired to similarly effectuate various profileassignments for a plurality of other registered users, and any of thoseor other registered users grants the first user access to their contactinformation and/or other personal information by designating the firstuser in their own profile assignments.

Thus, when a registered user of the present invention updates his or hercontact information and/or other personal information, the presentinvention makes the updated information available to the otherregistered users (or registered “contacts”) according to the registereduser's profile definitions and assignments.

FIG. 5 shows another exemplary embodiment of the contact informationsystem that maintains current contact information for multiple users.The system utilizes a plurality of local server computing devices 560and a global server computing device 562. The local server computingdevices 560 and the global server computing device 562 are connectedthrough a communications network 572, which could be the Internet, awide or local are network or another type of communications network.Each of the plurality of local server computing devices 560 isassociated with a local telephone exchange 570. The local servercomputing device 560 associated with a local telephone exchange 570 canbe collocated with or remote from that local telephone exchange 570. Theplurality of local telephone exchanges 570 are also interconnectedthrough the communications network 572. The communications network 572connecting the plurality of local telephone exchanges 570 with oneanother, and connecting the plurality of local server computing devices560 and the global server computing device 562 can be comprised ofmultiple separate communication networks or a single communicationsnetwork.

Each user of the contact information system has a client computingdevice 580 and/or a telephone device 582. The client computing device580 and the telephone device 582 can be the same device or separatedevices. Each of the client computing devices 580 is connected to thecommunication network 572 and each of the telephone devices 582 isconnected to one of the local telephone exchanges 570. More than oneuser may be connected to the same local telephone exchange 570. It isnoted that the client computing device 580 and the telephone device 582,whether integrated into one device or separate, may be implemented withvarious types of devices with limited or extensive computing power, someexemplary devices being computers, handheld computing devices, personaldata assistants (PDAs), cellular phones, or regular landline telephones.By way of example but not limitation, some devices that can function asboth a client computing device 580 and a telephone device 582 are somepersonal data assistants (PDAs) with telephone capability and cellulartelephones.

Each of the local server computing devices 560 associated with a localtelephone exchange 570 maintains a database of current up-to-datecontact information that is accessible to the users and telephonedevices 582 associated with that local telephone exchange 570. Theglobal server computing device 562 maintains a global database ofcurrent up-to-date contact information for all of the users of thecontact information system. The global server computing device 562 maycomprise one or more servers that have the global database sharedbetween them.

FIG. 6 shows a flow diagram illustrating an example of the use of thecontact information system. At step 610, User A or someone knowing theaccess information for User A enters a change to User A's home telephonenumber. The example would also apply to a change in any other telephoneinformation of User A. User A or someone knowing the access informationfor User A accesses the contact information system, goes through theregistration and/or verification process and enters the change to UserA's home telephone number. One method of accessing the contactinformation system would be to dial a specific telephone numberconnecting the user to the contact information system for the entry andupdating of user information. The change in User A's home telephonenumber is communicated through the communications network 572 to theglobal server computing device 562.

At step 620, the contact information system searches in the globalcontact database 562 for each of the recipients that have been grantedaccess rights to User A's home telephone number.

At step 630, the contact information system checks whether any of therecipients with access rights to User A's home telephone number have notreceived the updated information (“non-updated recipients”) or if theend of file (EOF) for the global contact database 562 has been reached.If all of the recipients with access rights to User A's home telephonenumber have been updated with User A's new telephone number, then theprocess is complete. However, if there are non-updated recipients withaccess rights to User A's home telephone number then the contactinformation system continues to step 640.

At step 640, the contact information system examines the personalinformation of the recipient that is stored in the global contactdatabase 562, including the recipient's telephone number used to accessthe contact information system, to determine the local telephoneexchange 570 for the recipient. If a recipient uses multiple telephonenumbers to access the contact information system, and each of thesetelephone numbers is associated with a different telephone exchange 570,then more than one telephone exchange 570 would need to be updated forthat recipient.

At step 650, the recipient's records in the database on the local servercomputing device 560 that is associated with the recipient's localtelephone exchange 570 are updated with the new home telephone numberfor User A.

Then at step 660, the contact information system checks for the nextrecipient with access rights to User A's home telephone number andcontrol loops back to step 630. This process continues until all of therecipients with access rights to User A's home telephone number havetheir records updated in the databases on the local server computingdevices 560 associated with the telephone exchanges 570 of therecipients. The databases of some local server computing devices 560 maynot be updated because there are no recipients with the associatedtelephone exchange 570 that have access rights to User A's hometelephone number and/or that are registered for the contact informationsystem.

As a specific example, assume the following situation. User A has threeprofiles: Business, Friend and Family; and has assigned Users B, C and Dthe access rights shown in the table below:

Users with Access Profile Telephone Numbers Included in Profile toProfile Business Business telephone User B Friend Home and celltelephone User C Family Home, cell and business telephone User DAlso, assume that each telephone exchange 570 services one area code andthe Users A-D are in the area codes shown in the following table:

Telephone Exchange/ User Area Code A 978 B 314 C 302 D 978

As a first example using the above scenario, we will again have User A'shome telephone number change. User A or anyone knowing User A's accessinformation can update the information in the contact informationsystem. User A's home telephone number is changed in the database on theglobal server computing device 562 and the contact information systemsearches the recipients that have been granted access rights to User A'shome telephone number. As shown in the above table, the search willreveal Users C and D have access right to User A's home telephonenumber. The contact information system will update User A's hometelephone number in the local server computing device 560 associatedwith the telephone exchange 570 for area code 302 where User C hasactivated/subscribed the service. The contact information system willalso update User A's home telephone number in the local server computingdevice 560 associated with the telephone exchange 570 for area code 978where User D has activated/subscribed the service. User A's hometelephone number may not be updated if the relevant user has notactivated/subscribed to the service.

As a second example using the above scenario, we will have User A'sbusiness telephone number change. User A or anyone knowing User A'saccess information can update the information in the contact informationsystem. User A's business telephone number is changed in the database onthe global server computing device 562 and the contact informationsystem searches the recipients that have been granted access rights toUser A's business telephone number. As shown in the above table, thesearch will reveal Users B and D have access right to User A's businesstelephone number. The contact information system will update User A'sbusiness telephone number in the local server computing device 560associated with the telephone exchange 570 for area code 314 where UserB has activated/subscribed the service. The contact information systemwill also update User A's business telephone number in the local servercomputing device 560 associated with the telephone exchange 570 for areacode 978 where User D has activated/subscribed the service. User A'sbusiness telephone number may not be updated if the relevant user hasnot activated/subscribed to the service.

FIG. 7 shows a flow diagram illustrating an example of how this contactinformation system is utilized by a user to make a telephone call. Inthis example, User C wants to place a call to User A. At step 710, UserC uses a telephone device 582 to access the contact information system.User C may have a hot-key, such as *2 or other shortcut that providesquick access to the contact information system for making telephonecalls. User C goes through the verification process when accessing thecontact information system.

At step 720, when User C gains access to the contact information system,User C is connected to the local telephone exchange 570 associated withUser C, which for the above scenario would be the telephone exchange 570for area code 302. The local telephone exchange 570 associated with UserC then accesses the local server computing device 560 associated withthe telephone exchange 570 for area code 302.

At step 730, the contact information system prompts User C to select oneof the users that has granted access rights to User C. User C makes aselection of one of those users, which in this case is User A.

At step 740, the contact information system checks the local servercomputing device 560 to determine whether User C has access rights tomultiple phone numbers of User A. If User C has been granted accessrights to multiple phone numbers of User A, then control is transferredto step 750, otherwise control is transferred to step 760. In the abovescenario, User C has access rights to two of User A's telephone numbers:User A's home telephone number and User A's cellular telephone number.

At step 750, the contact information system prompts User C to select oneof the multiple telephone numbers of User A to which User C has accessrights, and waits for User C to make a selection of the desiredtelephone number of User A for the contact information system to call.

At step 760, the contact information system dials the telephone numberof User A and connects User C to User A.

Note that this phone number is kept up to date by User A using theprocess described in FIG. 6. It is not up to a user to update thecontact information of other users, rather it is up to each user to keeptheir own personal contact information up to date.

From the above description, it should be clear to those skilled in theart that the client computing device 580 could not only be implementedby a computer device but also by a telephone with very limited computingcapability. Using a voice prompt system with menus, the contactinformation system can present a user with the necessary interface forusing a simple telephone as the client computing device 580. It will beclear to those skilled in the art that the client computing device 580and the telephone device 582 could be integrated in one device or beseparate devices.

The contact information system allows a plurality of users to updatetheir contact information and make it accessible to a selected subset ofother users through the use of access rights. The aspects of the contactinformation system described in FIGS. 6 and 7 can also be applied toother personal and contact information that is stored in the localserver computing devices 560 and is accessible through the clientcomputing devices 580 of the users.

The foregoing description of the invention is illustrative only, and isnot intended to limit the scope of the invention to the precise termsset forth. Although the invention has been described in detail withreference to certain illustrative embodiments, variations andmodifications exist within the scope and spirit of the invention asdescribed and defined in the following claims.

What is claimed is:
 1. A personal information system, comprising: aserver computer system, having memory storing first user's personalinformation associated with a first user, and to store information aboutwhich of a plurality of other users, other than said first user, havebeen granted access rights to said first user's personal information;said server computer detecting a first change in said first user'spersonal information to updated first personal information; said servercomputer system operating to determine locations of said plurality ofother users and determines locations of first server computer systemswhich are local to said plurality of other users, and updates said firstserver computer systems to have said updated first information and toprovide said updated first information to said plurality of other users,and said server computer system determining second server computersystems which are not local to any of said plurality of other users, andnot providing said updated first information to said second servercomputer systems.
 2. The system as in claim 1, wherein said servercomputer system determines a list of said plurality of other users, andlocation information associated with said plurality of other users, eachsaid location information indicating a location of one of said otherusers, and wherein said location information is used by said servercomputer system to find said other server computer systems, where saidother server computer systems are computer systems which are local tosaid location.
 3. The system as in claim 2, wherein said locationinformation comprises information about a telephone exchange of saidother users.
 4. The system as in claim 1, wherein said storedinformation comprises information about said other server computersystems which are local to said plurality of other users who areauthorized to have updated information.
 5. The system as in claim 4,wherein said server computer determines said first server computersystems by also determining if users among said plurality of other usershave subscribed to an update service, and updates only said first servercomputer systems which are local to users who have been granted accessrights to said first user's personal information, and have subscribed tosaid update service and does not update second server computer systemswhich are not local to any of said plurality of other users who havesubscribed to said update service.
 6. The system as in claim 1, whereinsaid server computer stores information about an amount of access rightsto the first user's personal information which has been granted tousers, where a second user is stored associated with a first category,where based upon said first category, said server computer permits saidsecond user to access a first amount of the first user's personalinformation, and a third user is stored associated with a secondcategory, wherein based upon said second category, said server computerpermits said third user to access a second amount of the first user'spersonal information, wherein said first amount is different than saidsecond amount.
 7. The system of claim 6 wherein the second user is notpermitted to access the second amount of the first user's personalinformation.
 8. The system of claim 1 wherein the first user's personalinformation stored in the memory comprises multiple different image datafiles associated with said first user.
 9. The system of claim 8, whereinsaid server computer stores information about an amount of access rightsto the first user's personal information which has been granted tousers, where a second user is stored associated with a first category,where based upon said first category, said server computer permits saidsecond user to access a first amount of the user's information includingsaid image files, and to obtain updates to said image files, and where athird user is stored associated with a second category, wherein basedupon said second category, said server computer permits said third userto access a second amount of the first user's personal information,wherein said second amount of said information does not include saidimage files.
 10. A personal information system, comprising: a servercomputer system, having memory storing a first user's personalinformation, and to store information about which of a plurality ofother users, other than said first user, have been granted access rightsto said first user's personal information; said server computerdetecting a first change in said first user's personal information toupdated first personal information; said server computer systemoperating to provide said updated first information to said plurality ofother users, wherein said server computer stores information about anamount of access rights to the first user's personal information whichhas been granted to users, where a second user is stored associated witha first category, where based upon said first category, said servercomputer permits said second user to access a first amount of the firstuser's personal information, and a third user is stored associated witha second category, wherein based upon said second category, said servercomputer permits said third user to access a second amount of the firstuser's personal information, wherein said first amount is different thansaid second amount, said server computer system operating to determinelocations of said plurality of other users and determines locations offirst server computer systems which are local to said plurality of otherusers, and updates said first server computer systems to have saidupdated first information and to provide said updated first informationto said plurality of other users, and said server computer systemdetermining second server computer systems which are not local to any ofsaid plurality of other users, and not providing said updated firstinformation to said second server computer systems.
 11. The system as inclaim 10, wherein said server computer system only updates some of saidother server computer systems based on stored information.
 12. Thesystem as in claim 10, wherein said stored information comprisesinformation about said other server computer systems which are local tosaid plurality of other users who are authorized to have updatedinformation.
 13. The system as in claim 12, wherein said storedinformation is based on said server computer determining if users amongsaid plurality of other users have subscribed to an update service,wherein said server computer determines said first server computersystems by also determining if users among said plurality of other usershave subscribed to said update service, and updates only those otherserver computer systems which are local to users who have been grantedaccess rights to said first user's information, and have subscribed tosaid update service and does not update second server computer systemswhich are not local to any of said plurality of other users who havesubscribed to said update service.
 14. The system as in claim 10,wherein said server computer system determines a list of said pluralityof other users, and location information associated with said pluralityof other users, each said location information indicating a location ofone of said other users, and wherein said location information is usedby said server computer system to find said other server computersystems, where said other server computer systems are computer systemswhich are local to said location.
 15. The system as in claim 14, whereinsaid location information comprises information about a telephoneexchange of said other users.
 16. The system of claim 10 wherein thefirst user's personal information stored in the memory comprisesmultiple different image data files associated with said first user. 17.The system of claim 16 wherein the first user receives updates to theimage data files and the second user does not receive updates to theimage data files.
 18. A system for selectively enabling a second useraccess to a first user's personal information, wherein said systemcomprises memory for storing said first user's information and forstoring a plurality of programmatic instructions, wherein saidinstructions comprise: a. instructions for electronically assigning thesecond user to a first named group based upon an instruction from saidfirst user; b. instructions for electronically assigning other users toa second named group based upon instructions from said first user; c.instructions for permitting said second user to access multipledifferent image files associated with said first named group and forpreventing said second user from accessing said multiple differentassociated with said second named group; d. instructions for permittingsaid second user to update of said first user's information to updatedfirst information; and e. instructions for determining locations of saidother users and first server computer systems and to update said firstserver computer systems which are local to said other users to have saidupdated first information and said instructions determining locations ofsecond server computer systems which are not local to any of saidplurality of other users, and not providing said updated firstinformation to said second server computer systems.
 19. The system ofclaim 18 wherein, the system further permits the other users to accesssaid updated first user's information.
 20. The system of claim 18wherein the system controls defining which of said first user's personalinformation is accessible by users assigned to said first named groupand said second named group.
 21. The system as in claim 18, wherein saidstored information comprises information about said other servercomputer systems which are local to said other users who are authorizedto have updated information.
 22. The system as in claim 21, wherein saidstored information is based on said server computer determining saidfirst server computer systems by also determining if users among saidother users have subscribed to an update service, and updates only saidfirst server computer systems which are local to users who have beengranted access rights to said first user's information, and havesubscribed to said update service and does not update second servercomputer systems which are not local to any of said plurality of otherusers who have subscribed to said update service.
 23. The system as inclaim 18, wherein said system determines a list of said plurality ofother users, and location information associated with said other users,each said location information indicating a location of one of saidother users, and wherein said location information is used by saidsystem to find other server computer systems, where said other servercomputer systems are computer systems which are local to said location.24. The system as in claim 23, wherein said location informationcomprises information about a telephone exchange of said other users.25. The system of claim 18 wherein the first user's personal informationstored in the memory comprises multiple different image data filesassociated with said first user.
 26. The system of claim 25 wherein thefirst user receives updates to the image data files and the second userdoes not receive updates to the image data files.
 27. A personalinformation system, comprising: a server computer system, having memorystoring a first user's personal information including multiple differentphotographs that have been provided by the first user, and to storeinformation about which of a plurality of other users, other than saidfirst user, have been granted access rights to said first user'spersonal information; said server computer detecting a first change insaid first user's personal information to updated first personalinformation; said server computer system operating to provide saidupdated first information to said plurality of other users, wherein saidserver computer stores information about an amount of access rights tothe first user's personal information which has been granted to users,where a second user is stored associated with a first category, wherebased upon said first category, said server computer permits said seconduser to access a first amount of the first user's personal informationincluding said photographs, and a third user is stored associated with asecond category, wherein based upon said second category, said servercomputer permits said third user to access a second amount of the firstuser's personal information that does not include said photographs, saidserver computer system operating to determine locations of saidplurality of other users and determines locations of first servercomputer systems which are local to said plurality of other users, andupdates said first server computer systems to have said updated firstinformation and to provide said updated first information to saidplurality of other users, and said server computer system determiningsecond server computer systems which are not local to any of saidplurality of other users, and not providing said updated firstinformation to said second server computer systems.
 28. The system as inclaim 27, wherein said stored information comprises information aboutsaid other server computer systems which are local to said plurality ofother users who are authorized to have updated information.
 29. Thesystem as in claim 28, wherein said stored information is based on saidserver computer determining said first server computer systems by alsodetermining if users among said plurality of other users have subscribedto an update service, and updates only those other server computersystems which are local to users who have been granted access rights tosaid first user's information, and have subscribed to said updateservice and does not update second server computer systems which are notlocal to any of said plurality of other users who have subscribed tosaid update service.
 30. The system as in claim 27, wherein said servercomputer system determines a list of said plurality of other users, andlocation information associated with said plurality of other users, eachsaid location information indicating a location of one of said otherusers, and wherein said location information is used by said servercomputer system to find said other server computer systems, where saidother server computer systems are computer systems which are local tosaid location.
 31. The system as in claim 30, wherein said locationinformation comprises information about a telephone exchange of saidother users.