System and mechanisms for sharing information in telecom domain in ethical way.
Publication Date: 2016-Oct-05
The IP.com Prior Art Database
Sharing of information with service providers in telecom space is absolutely essential for a consumer to get more richer experience in terms of usage of various services. There are multiple solutions which enable this but they do this in a unethical manner, on which end consumers have no or little control. This publication provides for mechanisms for sharing such information using a ethical system.
Page 01 of 6
System and mechanisms for sharing information in telecom domain in ethical way .
Sharing of information with service providers in telecom space is absolutely essential for a consumer to get more richer experience in terms of usage of various services. Take for example Bill generation system, owned by most of the providers in telecom space. It would be very nice for a consumer to see contact names in addition to plain numbers.
There are solutions in market which allows companies to capture everything in a user mobile including contacts which would allow them to generate a bill with names and other solutions having such features. The problem with most of these solutions is lack of control with user with whom his data should be shared, other problems include leakage of personal information. Leakage of such personal information out in open could lead to losses and harassment for an end user.
Additionally a consumer would want his information to be restricted to a set of people, based on a contract, rather than opening it up for broader consumption and would want control on what gets shared and what not, this again could be contract driven.
It is not uncommon to find such applications being at logger heads with security agencies for displaying open names of Cabinet ministers, heads of intelligence agencies CEOs of largest companies etc. One of many reasons why they have been shunted out of popular application stores.
Simply put it is impossible for an average end user to fully understand security implications of installing and using such applications. What we are targeting to provide is a system which puts consumer in control, not only that, consumer whose information gets shared should also be in control if he really wants to let that happen.
A system that enables a consumer (seeker) to select phone number owner (from his telephone bill) for which he needs information. The system enables a mechanism for a seeker to explicitly mark this interest of data to be one time or to be persisted. The proposed system then captures this seeker interest information along with the seeker details, parses it and sends the request to the owner for which the seeker is seeking the information. The system also sends the details of the seeker to the owner. The system provides a mechanism for the owner to control how this information is shared and to whom. The system allows the owner to choose whether that information needs to be shared with numbers in seeker's contact list, or owner can choose to share information till nth degree of contact list of seeker, or if owner and seeker share a common contact, in a particular geographical zone etc., then the system will identify such configuration possibilities for the owner to choose from. The system will also allow an owner to choose to keep his information to be completely private or he can request for intimation on such requests so he can manually accept or reject such requests each time.
The underlying syst...