Method and apparatus for optimizing networking potential using a secured system for an online community
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/60
G06K-005/00
G06K-007/08
출원번호
US-0901630
(2001-07-11)
우선권정보
IN-542/MAS/2000(2000-07-13)
발명자
/ 주소
Jaipuria,Amit
Jaipuria,Pradeep
출원인 / 주소
Jaipuria,Amit
Jaipuria,Pradeep
대리인 / 주소
Arent Fox PLLC
인용정보
피인용 횟수 :
189인용 특허 :
10
초록▼
The present invention provides a method and apparatus for users to search networks, both their own network and their peers' networks, all under the umbrella of a "multiple level access" security system. The present invention has been designed to optimize networking capabilities among users in a comp
The present invention provides a method and apparatus for users to search networks, both their own network and their peers' networks, all under the umbrella of a "multiple level access" security system. The present invention has been designed to optimize networking capabilities among users in a comprehensive online community. Networking among such a secured environment will allow users an opportunity to enhance their networking potential by expanding their networks to their peers' and beyond. A user registers with the online community and personally adds individuals that they know to their personal networking database. While adding these peers to the networking database, the user grants a specific level of access to each individual. This security measure is devised to discourage solicitation from other unwanted online users. The levels of access give the user an opportunity to control the amount of personal information, including contacts that they make, available to their individual peers. Based on the level of access granted by the user, the peer may or may not be able to access the users information or the user's personal databases for potential networking. The level of access granted by two individuals need not be the same for each other.
대표청구항▼
What is claimed is: 1. A method of providing a multi-level hierarchical communications network comprising the steps of: accessing a network central database; creating a networking data set by entering information relating to multiple entities; assigning specific access rights of varying levels to e
What is claimed is: 1. A method of providing a multi-level hierarchical communications network comprising the steps of: accessing a network central database; creating a networking data set by entering information relating to multiple entities; assigning specific access rights of varying levels to each entity; storing the information at the database; searching the networking data set to identify entities satisfying a specific criteria; and verifying the access rights assigned to the entities found in the search result. 2. The method of claim 1 wherein the access rights convey or deny access to further database searching. 3. The method of claim 1 wherein the access rights comprise at least two different security levels. 4. The method of claim 3 wherein the different security levels are associated with unique information relating to each entity. 5. The method of claim 1 further comprising the step of displaying the search result. 6. The method of claim 1 further comprising the step of transmitting information to the entities found in the search result. 7. The method of claim 1 wherein the search result contains information relating to entities assigned a specific level access right. 8. The method of claim 1 wherein the information relating to the multiple entities is at least one of name, address, date of birth, academic degrees, family tree, employment history, professional organizations, company name, products, services, brands, expertise, hobbies and sports interests. 9. A method of providing a networking database comprising the steps of: connecting to a central database; storing multiple user profiles at the central database; assigning user access rights to each user profile; searching network search fields associated with each user profile for specific criteria; receiving information regarding user profiles related to the specific search criteria; and performing a subsequent network search by searching the information received to determine additional user profiles. 10. The method of claim 9 wherein the access rights comprise at least two different security levels. 11. The method of claim 9 wherein the different security levels are associated with unique information relating to the specific search criteria. 12. The method of claim 9 further comprising the step of displaying the search result from the subsequent network search. 13. The method of claim 9 wherein the network search fields contain information selected from the group consisting of name, address, date of birth, academic degree(s), family tree, employment history, professional organizations, company name, products, services, brands, hobbies and sports interests. 14. A method of searching a network database comprising the steps of: (a) storing information relating to a first entity in a first network database; (b) storing information relating to a second entity in a second network database; (c) assigning access rights to the information relating to each entity in the first and second network databases; (d) searching the first network database for specific data relating to the first entity; (e) searching the second network database for the specific data requirement if the search of the first network database does not find criteria matching the specific data requirement; (f) associating a multibridge linking code with the second entity if the entity has criteria matching the specific data requirement from the second search; (g) retrieving the specific data by using the multibridge linking code; and (h) establishing contact with the entity. 15. The method of claim 14 wherein the multibridge linking code grants the privilege to access further information relating to each entity in the second group. 16. The method of claim 14 wherein the multibridge linking codes are time-bound codes. 17. The method of claim 14 wherein the multibridge linking codes are at least one of alphanumeric, symbols and icons. 18. The method of claim 14 wherein the multibridge linking codes are randomly assigned. 19. The method of claim 14 wherein the method of establishing contact is by at least one of telephone, e-mail, mail, wireless communication device and the Internet. 20. The method of claim 19 wherein a contact message is auto-forwarded to the entity. 21. The method of claim 14 further comprising the step of (i) searching the second network database for the specific data requirement even if the search of the first network database results in finding criteria matching the specific data requirement. 22. The method of claim 14 wherein the first entity and the second entity each comprise at least one individual. 23. The method of claim 14 wherein the first entity and the second entity each comprise at least one Industry or Company. 24. The method of claim 21 further comprising the step of (j) storing information relating to a variable number of entities in a variable number of network databases and repeating steps (c)-(i) for entities having criteria matching the specific data requirement. 25. A network database system comprising: means for storing information relating to a first entity in a first network central database; means for storing information relating to a second entity in a second network central database; means for assigning access rights to the information relating to each entity in the first and second network databases; means for searching the first network database for the specific data relating to the first entity; means for searching the second network database for the specific data requirement if the search of the first network does not find criteria matching the specific data requirement; means for associating a multibridge linking code with each individual in the second group; and means for retrieving the specific data by using the multibridge linking code. 26. The system of claim 25 wherein the multibridge linking code grants the privilege to access further information relating to the second entity. 27. The system of claim 25 wherein the multibridge linking codes are time-bound codes. 28. The system of claim 25 wherein the multibridge linking codes are at least one of alphanumeric, symbols and icons. 29. The method of claim 25 wherein the multibridge linking codes are randomly assigned. 30. A system for providing a networking database comprising: means for connecting to a central database; means for storing multiple user profiles at the central database; means for assigning user access rights to each user profile; means for searching network search fields associated with each user profile for specific criteria; means for receiving information regarding user profiles related to the specific search criteria; and means for performing a subsequent network search by searching the information received to determine additional user profiles. 31. The system of claim 30 wherein the access rights comprise at least two different security levels. 32. The system of claim 30 wherein the different security levels are associated with unique information relating to the specific search criteria. 33. The system of claim 30 further comprising the step of displaying the search result. 34. The system of claim 30 wherein the network search fields contain information selected from the group consisting of name, address, date of birth, academic degrees, family tree, employment history, professional organizations, company name, products, services, brands, hobbies and sports interests. 35. A communications network comprising: means for accessing a network central database; means for creating a networking data set by entering information relating to multiple entities; means for assigning specific access rights of varying levels to each entity; means for storing the information at the database; means for searching the networking data set to identify entities satisfying a specific criteria; and means for verifying the access rights assigned to the entities found in the search result. 36. The network of claim 35 wherein the access rights convey or deny access to further database searching. 37. The network of claim 35 wherein the access rights comprise at least two different security levels. 38. The network of claim 37 wherein the different security levels are associated with unique information relating to each entity. 39. The network of claim 35 further comprising the step of displaying the search result. 40. The network of claim 35 further comprising the step of transmitting information to the entities found in the search result. 41. The network of claim 35 wherein the search result contains information relating to entities assigned a specific level access right. 42. The network of claim 35 wherein the information relating to multiple entities is selected from the group consisting of name, address, date of birth, academic degrees, family tree, employment history, professional organizations, company name, products, services, brands, hobbies and sports interests. 43. A method of optimizing networking capability comprising the steps of: providing a networking database comprised of information relating to multiple entities; searching the networking database for specific data relating to the entities; assigning a multibridge linking code to each entity found during the search that has criteria matching the specific data requirement; creating a hierarchical chain between each entity found during the search; assigning a key to represent all the multibridge linking codes that have been assigned during the search; configuring the key to be passed between each entity in the hierarchical chain; using the key to contact the first entity in the hierarchical chain found during the search; using the key to contact the next entity in the hierarchical chain found during the search; wherein each entity in the hierarchical chain decides whether to forward the key to the subsequent entity in the hierarchical chain. 44. The method of claim 43 wherein each entity in the hierarchical chain conveys or denies access to their information by not using the key to contact a subsequent entity. 45. The method of claim 43 wherein the key is configured to be time-bound. 46. The method of claim 43 wherein the key is configured to be at least one of alphanumeric, symbols and icons. 47. The method of claim 43 wherein the key is randomly assigned.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (10)
O'Toole ; Jr. James W. ; Gifford David K., Controlled transfer of information in computer networks.
Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J., Mechanism and apparatus for using messages to look up documents stored in spaces in a distributed computing environment.
Weinreich Andrew P. ; Salamon Mark R. ; Zilberberg Shoshana ; Berlyn Nicole D. ; Mitchell Leeann ; Rosen Cliff ; Seifer Adam ; Green Justin ; Haber David ; Samuels David ; Chibnik Ron ; Clifford Scot, Method and apparatus for constructing a networking database and system.
Bly Sara A. (Mountain View CA) Farrand A. Brady (Berkeley CA) Hodges Jeffery D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Maybury William J. (Torrance CA) Tallan , Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstat.
Bly Sara A. (Mountain View CA) Hodges Jeffrey D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Tallan Michael L. (Mountain View CA) Tom Stephen B. (San Francisco CA), Updating local copy of shared data in a collaborative system.
Markus, Michael J.; Markus, Heather A.; Smith, Brian N., Collections of linked databases and systems and methods for communicating about updates thereto.
Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Connection architecture for a mobile network.
Akella, Prasad N.; Connors, Timothy J.; Kelly, James; Roon, Christopher J.; Rosenbaum, Andrew M.; Smith, IV, Ben T.; Tolles, Christopher S., Creation and maintenance of social relationship network graphs.
Luna, Michael; Ponomarenko, Andrei, Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
Luna, Michael, Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications.
Vernal, Michael Steven; Zhu, Wei; Leszczenski, James M.; Elman, Joshua E.; Morin, David Brookes; Cheever, Charles Duplain; Sanghvi, Ruchi, Dynamic enforcement of privacy settings by a social networking system on information shared with an external system.
Vernal, Michael Steven; Zhu, Wei; Leszczenski, James M.; Elman, Joshua E.; Morin, David Brookes; Cheever, Charles Duplain; Sanghvi, Ruchi, Dynamic enforcement of privacy settings by a social networking system on information shared with an external system.
Bott, Ross, Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network.
Deguchi, Hikaru; Ninomiya, Kenichi, Human relationships registering system and device for registering human relationships, program for registering human relationships, and medium storing human relationships registering program and readable by computer.
Deguchi, Hikaru; Ninomiya, Kenichi, Human relationships registering system and device for registering human relationships, program for registering human relationships, and medium storing human relationships registering program and readable by computer.
Deguchi, Hikaru; Ninomiya, Kenichi, Human relationships registering system and device for registering human relationships, program for registering human relationships, and medium storing human relationships registering program and readable by computer.
Deguchi, Hikaru; Ninomiya, Kenichi, Human relationships registering system and device for registering human relationships, program for registering human relationships, and medium storing human relationships registering program and readable by computer.
Deguchi, Hikaru; Ninomiya, Kenichi, Human relationships registering system and device for registering human relationships, program for registering human relationships, and medium storing human relationships registering program and readable by computer.
Deguchi, Hikaru; Ninomiya, Kenichi, Human relationships registering system and device for registering human relationships, program for registering human relationships, and medium storing human relationships registering program and readable by computer.
Deguchi, Hikaru; Ninomiya, Kenichi, Human relationships registering system and device for registering human relationships, program for registering human relationships, and medium storing human relationships registering program and readable by computer.
Polonsky, Nir; Malangi, Girish; Volpe, Kevin, Methods and systems for modifying a user profile for a recommendation algorithm and making recommendations based on user interactions with items.
Bladel, James M.; Lee, Yong; Plumb, Noah D.; Thayer, Wayne, Methods for verifying person's identity through person's social circle using person's photograph.
Luna, Michael, Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation.
Alisawi, Rami, Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network.
Luna, Michael, Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor.
Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device power management in data synchronization over a mobile network with or without a trigger notification.
Backholm, Ari; Bott, Ross; Luna, Michael, Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system.
Wendling, Michael; Kokhanovskyi, Andrii; Backholm, Ari; Bott, Ross, Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion.
Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
Finnegan, Michael Edward; Konicek, Jeffrey C.; Lisa, Steven G., Realtime, interactive and geographically defined computerized personal identification and payment matching systems and methods.
Finnegan, Michael Edward; Konicek, Jeffrey C.; Lisa, Steven G., Realtime, interactive and geographically defined computerized personal matching systems and methods.
Rathod, Yogesh Chunilal, System and method for accessing and posting nodes of network and generating and updating information of connections between and among nodes of network.
Amidon, Christopher; Issa, Alfredo; Walsh, Richard; Stafford, Sid, System and method for controlled viral distribution of digital content in a social network.
Vanasco, Jonathan Brian, System and method for indexing, correlating, managing, referencing and syndicating identities and relationships across systems.
Issa, Alfredo; Amidon, Christopher; Walsh, Richard, System and method for rights propagation and license management in conjunction with distribution of digital content in a social network.
Chunilal, Rathod Yogesh, System and method for social networking for managing multidimensional life stream related active note(s) and associated multidimensional active resources and actions.
Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, System and method for tracking billing events in a mobile wireless network for a network operator.
Amidon, Christopher; Walsh, Richard; Issa, Alfredo, System and method of optimizing social networks and user levels based on prior network interactions.
Issa, Alfredo; Walsh, Richard; Amidon, Christopher, System and method of sharing content among multiple social network nodes using an aggregation node.
Luna, Michael, System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation.
Vera, Nicolas; Wang, James H.; Steinberg, Arieh; Kelly, Christopher; D'Angelo, Adam, Systems and methods for providing privacy settings for applications associated with a user profile.
Bladel, James M.; Lee, Yong; Plumb, Noah D.; Thayer, Wayne, Systems for verifying person's identity through person's social circle using person's photograph.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.