. . . "Continuing with the example, a different computing device such as a mobile device or a personal computer is used by users to manipulate the contact information and the identification definitions." . .