US 12,411,981 B2
Permissions-based communication management systems and methods
Christopher David Whipple, Jr., Cumberland, RI (US)
Appl. No. 18/036,543
Filed by Christopher David Whipple, Jr., Cumberland, RI (US)
PCT Filed Nov. 11, 2021, PCT No. PCT/US2021/059019
§ 371(c)(1), (2) Date May 11, 2023,
PCT Pub. No. WO2022/103986, PCT Pub. Date May 19, 2022.
Claims priority of provisional application 63/112,273, filed on Nov. 11, 2020.
Prior Publication US 2023/0409740 A1, Dec. 21, 2023
Int. Cl. G06F 21/62 (2013.01); G06F 16/23 (2019.01)
CPC G06F 21/6245 (2013.01) [G06F 16/23 (2019.01)] 20 Claims
OG exemplary drawing
 
1. A permissions-based communication management system comprising:
a processor;
a data store that stores a data structure that is linked to a user account associated with a member, the data structure comprising protected contact information specific to the member; and
a memory coupled to the processor storing:
a permissions module comprising instructions that, when executed by the processor in response to receiving a request to communicate with the member submitted by an Initiator, cause the processor to: (i) conduct a search of the data store to identify the member; (ii) in response to identifying the member, transmit an approval request over a communication network to be reviewed by the member; (iii) receive an approval submitted by the member granting permission to the Initiator to communicate with the member; and (iv) modify the data structure to store the permission of the Initiator to communicate with the member;
a routing module comprising instructions that, when executed by the processor, cause the processor to: (i) determine that the permission of the Initiator to communicate with the member is stored by the data structure in response to an attempt by the Initiator to communicate with the member, (ii) after determining that the permission of the Initiator to communicate with the member is stored by the data structure, using protected contact information of the Initiator as a verification of authenticity of the Initiator, wherein the protected contact information of the Initiator is stored by the data structure, and (iii) route a communication from the Initiator to the member using the protected contact information specific to the member stored by the data structure, without revealing the protected contact information to the Initiator; and
an update module comprising instructions that, when executed by the processor, cause the processor to modify the data structure in response to receiving an update request from the member to change at least a portion of the protected contact information of the member, wherein the portion of the protected contact information that is updated comprises updated protected contact information that is different from the protected contact information, wherein the routing module causes the processor to route the communication from the Initiator to the member using the updated protected contact information without requiring the permissions module to obtain a second permission of the Initiator to communicate with the member.