`
`Attorney Docket Number 19487.31.1.1.1.1
`
`Responsive to Office Action mailed September 6, 2019
`
`AMENDMENTS TO THE CLAIMS
`
`This listing of claims replaces all prior versions and listings of claims in the application:
`
`1.
`
`(Currently Amended) A computer-implemented method comprising:
`
`maintaining a people list referencing a plurality of users where each user of the plurality of
`
`users is associated with a plurality of user identifier types, wherein the people list is accessible
`
`from within each of a te—a—plurality of different applications on a single client device associated
`
`with a user: the plurality of different applications comprising a first application on the single client
`
`
`device and a second application on the single client device;
`
`enabling, by at least one processor, the first application on the single client device to access
`
`the people list to share a first type of electronic message corresponding to the first application to a
`
`plurality of client devices associated with the plurality of users, wherein the first type of electronic
`
`message uses a first type of user identifier from the plurality of user identifier types; and
`
`enabling the second application on the single client device to access the people list to share
`
`a second type of electronic message corresponding to the second application to the plurality of
`
`client devices associated with the plurality of users, wherein the second type of electronic message
`
`uses a second type of user identifier from the plurality of user identifier types.
`
`2.
`
`(Currently Amended) The computer-implemented method of claim 1, wherein
`
`maintaining the people list referencing the plurality of users comprises maintaining the people list
`
`in a central repository accessible to [[a]]th_e plurality of different applications comprising the first
`
`application and the second application.
`
`Page 2 of 13
`
`
`
`Application No. 16/178,331
`
`Attorney Docket Number 19487.31.1.1.1.1
`
`Responsive to Office Action mailed September 6, 2019
`
`3.
`
`(Original) The computer-implemented method of claim 2, wherein:
`
`the central repository is available to the plurality of different applications via electronic
`
`communication; and
`
`the plurality of different applications comprises a plurality of different application types
`
`where each of the different applications use a corresponding user identifier type from the plurality
`
`of user identifier types.
`
`4.
`
`(Original) The computer-implemented method of claim 2, wherein maintaining the
`
`people list in the central repository comprises maintaining a filtered version of a single list of
`
`contacts.
`
`5.
`
`(Original) The computer-implemented method of claim 2, wherein maintaining the
`
`people list in the central repository comprises maintaining the people list in an address book.
`
`6.
`
`(Original) The computer-implemented method of claim 1, wherein the first
`
`application comprises an email application, an instant messaging application, a digital image
`
`sharing application, a contact information sharing application, or an application for sending alerts
`
`and reminders.
`
`7.
`
`(Currently Amended) The computer-implemented method of claim 6, wherein the
`
`first application presents the people list within a first graphical user interface corresponding to the
`
`first application and the second application presents the people list within a second graphical user
`
`interface corresponding to differs—frem—the second application.
`
`Page 3 of 13
`
`
`
`Application No. 16/178,331
`
`Attorney Docket Number 19487.31.1.1.1.1
`
`Responsive to Office Action mailed September 6, 2019
`
`8.
`
`(Original) The computer-implemented method of claim 1, wherein the first
`
`application comprises an e-mail filtering application, an application for applying parental controls
`
`to an account, or an electronic joumaling application.
`
`9.
`
`(Original) The computer-implemented method of claim 1, wherein the first type of
`
`user identifier is an email identifier and the second type of user identifier is an instant message
`
`identifier.
`
`10.
`
`(Original) The computer-implemented method of claim 1, wherein the people list
`
`specifies an access control list for the first type of electronic message.
`
`11.
`
`(Original) The computer-implemented method of claim 1, wherein enabling the
`
`first application to access the people list to share the first type of electronic message to the plurality
`
`of client devices associated with the plurality of users comprises enabling a digital image sharing
`
`program to access the people list to share a digital image.
`
`12.
`
`(Original) The computer-implemented method of claim 1, wherein enabling the
`
`first application to access the people list to share the first type of electronic message to the plurality
`
`of client devices associated with the plurality of users comprises enabling an electronic journaling
`
`application to access the people list to share a portion of an electronic journal.
`
`Page 4 of 13
`
`
`
`Application No. 16/178,331
`
`Attorney Docket Number 19487.31.1.1.1.1
`
`Responsive to Office Action mailed September 6, 2019
`
`13.
`
`(Currently Amended) A system comprising:
`
`at least one processor; and
`
`at least one non-transitory computer-readable storage medium storing instructions that,
`
`when executed by the at least one processor, cause the system to:
`
`maintain a people list referencing a plurality of users where each user of the
`
`plurality of users is associated with a plurality of user identifier types, wherein the people
`
`list is accessible from within each of a te—a—plurality of different applications on a single
`
`client device associated with a user: the plurality of different applications comprising a first
`
`application on the single client device and a second application on the single client device;
`
`enable, by at least one processor, the first application on the single client device to
`
`access the people list to share a first type of electronic message corresponding to the first
`
`application to a plurality of client devices associated with the plurality of users, wherein
`
`the first type of electronic message uses a first type of user identifier from the plurality of
`
`user identifier types; and
`
`enable the second application on the single client device to access the people list to
`
`share a second type of electronic message corresponding to the second application to the
`
`plurality of client devices associated with the plurality of users, wherein the second type of
`
`electronic message uses a second type of user identifier from the plurality of user identifier
`
`types.
`
`Page 5 of 13
`
`
`
`Application No. 16/178,331
`
`Attorney Docket Number 19487.31.1.1.1.1
`
`Responsive to Office Action mailed September 6, 2019
`
`14.
`
`(Original) The system of claim 13, wherein maintaining the people list referencing
`
`the plurality of users comprises maintaining the people list in a central repository accessible to a
`
`plurality of different applications comprising the first application and the second application.
`
`15.
`
`(Original) The system of claim 14, wherein:
`
`the central repository is available to the plurality of different applications via electronic
`
`communication; and
`
`the plurality of different applications comprises a plurality of different application types
`
`where each of the different applications use a corresponding user identifier type from the plurality
`
`of user identifier types.
`
`16.
`
`(Original) The system of claim 14, wherein maintaining the people list in the central
`
`repository comprises maintaining a filtered version of a single list of contacts.
`
`17.
`
`(Original) The system of claim 14, wherein maintaining the people list in the central
`
`repository comprises maintaining the people list in an address book.
`
`Page 6 of 13
`
`
`
`Application No. 16/178,331
`
`Attorney Docket Number 19487.31.1.1.1.1
`
`Responsive to Office Action mailed September 6, 2019
`
`18.
`
`(Currently Amended) A non-transitory computer-readable medium storing
`
`instructions that, when executed by at least one processor, cause a computer system to:
`
`maintain a people list referencing a plurality of users where each user of the plurality of
`
`users is associated with a plurality of user identifier types, wherein the people list is accessible
`
`from within each of a te—a—plurality of different applications on a single client device associated
`
`with a user: the plurality of different applications comprising a first application on the single client
`
`
`device and a second application on the single client device;
`
`enable, by at least one processor, the first application on the single client device to access
`
`the people list to share a first type of electronic message corresponding to the first application to a
`
`plurality of client devices associated with the plurality of users, wherein the first type of electronic
`
`message uses a first type of user identifier from the plurality of user identifier types; and
`
`enable the second application on the single client device to access the people list to share
`
`a second type of electronic message corresponding to the second application to the plurality of
`
`client devices associated with the plurality of users, wherein the second type of electronic message
`
`uses a second type of user identifier from the plurality of user identifier types.
`
`19.
`
`(Original) The non-transitory computer-readable medium of claim 18, wherein:
`
`the first application comprises an email application, an instant messaging application, a
`
`digital image sharing application, a contact information sharing application, or an application for
`
`sending alerts and reminders; and
`
`the first application differs from the second application.
`
`Page 7 of 13
`
`
`
`Application No. 16/178,331
`
`Attorney Docket Number 19487.31.1.1.1.1
`
`Responsive to Office Action mailed September 6, 2019
`
`20.
`
`(Original) The non-transitory computer-readable medium of claim 18, wherein
`
`enabling the first application to access the people list to share the first type of electronic message
`
`to the plurality of client devices associated with the plurality of users comprises enabling a digital
`
`image sharing program to access the people list to share a digital image.
`
`Page 8 of 13
`
`