IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0299959
(2005-12-13)
|
등록번호 |
US-7761383
(2010-08-09)
|
우선권정보 |
IN-542/MAS/2000(2000-07-13) |
발명자
/ 주소 |
- Jaipuria, Amit
- Jaipuria, Pradeep
|
대리인 / 주소 |
Birch, Stewart, Kolasch & Birch, LLP
|
인용정보 |
피인용 횟수 :
0 인용 특허 :
16 |
초록
▼
The present invention provides a method and apparatus for users to search networks, both their own network and their peers' networks, all under the umbrella of a “multiple level access” security system. The present invention has been designed to optimize networking capabilities among u
The present invention provides a method and apparatus for users to search networks, both their own network and their peers' networks, all under the umbrella of a “multiple level access” security system. The present invention has been designed to optimize networking capabilities among users in a comprehensive online community. Networking among such a secured environment will allow users an opportunity to enhance their networking potential by expanding their networks to their peers' and beyond. A user registers with the online community and personally adds individuals that they know to their personal networking database. While adding these peers to the networking database, the user grants a specific level of access to each individual. This security measure is devised to discourage solicitation from other unwanted online users. The levels of access give the user an opportunity to control the amount of personal information, including contacts that they make, available to their individual peers. Based on the level of access granted by the user, the peer may or may not be able to access the user's information or the user's personal databases for potential networking. The level of access granted by two individuals need not be the same for each other.
대표청구항
▼
What is claimed is: 1. A computer-implemented method of social networking with contacts of people within groups or companies comprising the steps of: storing, on a server, a social network database comprised of different companies and/or groups to facilitate social networking; geographically segmen
What is claimed is: 1. A computer-implemented method of social networking with contacts of people within groups or companies comprising the steps of: storing, on a server, a social network database comprised of different companies and/or groups to facilitate social networking; geographically segmenting, by a server controller at the social network database, the companies and/or groups; categorizing, by the server controller at the social network database, the companies and/or groups by industry; categorizing, by the server controller at the social network database, the companies and/or groups by services provided; categorizing, by the server controller at the social network database, the companies and/or groups by products made; categorizing, by the server controller at the social network database, the companies and/or groups by expertise; assigning, by the server controller at the social network database, one or more keywords to each category; searching by the server controller the social network database using the one or more keywords for one or more companies and/or groups having criteria matching a specific requirement; further searching by the server controller the social network database to identify one or more contacts, in the social network database, associated with the companies and/or groups found in a search result, wherein the one or more contacts are associated with the searcher; creating, by the server controller, a hierarchical chain between a searcher and each contact found during the search; assigning, by the server controller, a multibridge linking code to each link in the hierarchical chain between the server and each contact found during the search a the social network database that has criteria matching the specific data requirement; creating, by the server controller, a key comprising all of the multibridge linking codes that have been assigned during the search; passing, by the server controller, the key to a computing device of at least one of the contacts in the hierarchical chain; determining, by a controller of the computing device of the at least one contact, whether to forward the key to a computing device of a next sequential contact in the hierarchical chain based on an indication to forward the key received by the controller of the computing device from the contact; and forwarding, by the controller, the key to the computing device of the next sequential contact in the hierarchical chain based on the determination to forward the key. 2. A computer-implemented method of social networking with contacts of people within groups or companies comprising the steps of: storing on a server a social network database comprised of at least one of different companies or groups to facilitate social networking; geographically, by a server controller at the social network database, segmenting the at least one company or group; categorizing, by the server controller at the social network database, the at least one company or group by industry; categorizing, by the server controller at the social network database, the at least one company or group by services provided; categorizing, by the server controller at the social network database, the at least one company or group by products made; categorizing, by the server controller at the social network database, the at least one company or group by expertise; assigning, by the server controller at the social network database, one or more keywords to each category; searching by the server controller the social network database using the one or more keywords for one or more companies or groups having criteria matching a specific requirement; further searching by the server controller the social network database to identify one or more contacts, in the social network database, associated with the companies or groups found in a search result, wherein the one or more contacts are associated with the searcher; creating, by the server controller, a hierarchical chain between a searcher and each contact found during the search; assigning, by the server controller, a multibridge linking code to each link in the hierarchical chain between the searcher and each contact found during the search that has criteria matching the specific data requirement; creating, by the server controller, a key comprising all of the multibridge linking codes that have been assigned during the search; passing, by the server controller, the key to a computing device of at least one of the contacts in the hierarchical chain; determining, by a controller of the computing device of the at least one contact, whether to forward the key to a computing device of a next sequential contact in the hierarchical chain based on an indication to forward the key by the controller of the computing device from the contact; and forwarding, by the controller, the key to the computing device of the next sequential contact in the hierarchical chain based on the determination to forward the key. 3. The method of claim 1, wherein each contact in the hierarchical chain conveys or denies access to their information by not providing an indication to forward the key to contact a subsequent contact. 4. The method of claim 1, wherein the key is time-bound. 5. The method of claim 1, wherein the key is at least one of alphanumeric, symbols and icons. 6. The method of claim 1, wherein the key is randomly assigned. 7. The method of claim 2, wherein the multibridge linking code is assigned to each contact found during the search that has criteria matching the specific data requirement. 8. The method of claim 2, wherein each contact in the hierarchical chain conveys access to the information of the subsequent contact by providing the indication to forward the key or denies access to the information by not providing an indication to forward the key to contact a subsequent contact. 9. The method of claim 2, wherein the key is time-bound. 10. The method of claim 2, wherein the key is at least one of alphanumeric, symbols and icons. 11. The method of claim 2, wherein the key is randomly assigned.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.