WO2010056208A1 - Communication system - Google Patents

Communication system Download PDF

Info

Publication number
WO2010056208A1
WO2010056208A1 PCT/SG2009/000424 SG2009000424W WO2010056208A1 WO 2010056208 A1 WO2010056208 A1 WO 2010056208A1 SG 2009000424 W SG2009000424 W SG 2009000424W WO 2010056208 A1 WO2010056208 A1 WO 2010056208A1
Authority
WO
WIPO (PCT)
Prior art keywords
party
key
communication facility
keys
communication
Prior art date
Application number
PCT/SG2009/000424
Other languages
French (fr)
Inventor
Michael Charles Cooke
Original Assignee
Twoki Holdings Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2008905867A external-priority patent/AU2008905867A0/en
Application filed by Twoki Holdings Limited filed Critical Twoki Holdings Limited
Publication of WO2010056208A1 publication Critical patent/WO2010056208A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates broadly to a communication system and to a method of maintaining a communication system.
  • the invention relates to a system which facilitates such communication via electronic means, such as computer, mobile telephones, PDAs, and so on.
  • the invention has particular application in relation to facilitating dating and social networking. However, as will be apparent from the following discussion, it is not limited to this field.
  • a method of maintaining a communication system comprising the steps of, in a database, associating a plurality of keys into a key set; thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; on a device, providing an interface for enabling a party to input a key; interrogating the database to verify that the key belongs to the key set; and enabling access to the communication facility upon verification.
  • the method may further comprise in the database, storing information associated with the communication facility in a manner such that the information is indexed by the key set.
  • the information may include one or more of a group consisting of content provided via the communication facility, personal data entered by a party using one of the plurality of keys, payment data entered by a party using one of the plurality of keys, and personalization data entered by a party using one of the plurality of keys.
  • the method may further comprise reproducing at least one of the plurality of keys in the key set on a token for distribution to a party, or distributing at least one of the plurality of keys in the key set in digital form.
  • the token may comprise at least part of one or more of a group consisting of a sticker, a paper business card or calling card, a wristband, a packaging of a consumer product, and a printed advertisement.
  • The may further comprise designating a first of the plurality of keys as a primary key and at least one second key as a secondary key.
  • the method may further comprise determining whether a party has input the primary key, and allowing access to the communication facility only if it is determined that the primary key has been input.
  • the method may further comprise providing a plurality of control functions to parties to the communication facility.
  • control functions associated with different ones of the keys in the key set may be different.
  • the control functions may include one or more of a group consisting of generating a communication-specific user interface screen for display to parties using the communication facility, controlling the appearance of the communication-specific user interface screen, generating a party-specific user interface screen for display to that party when using the communication facility, controlling the appearance of the party-specific user interface screen, allowing a party to input a username or other data for identifying himself to other parties to the communication facility, allowing a party to input personal identification information relating to himself, allowing a party to input payment information for effecting payment for a product or service, a function for allowing a party to purchase key sets, allowing a party to associate a further key set with the communication facility, allowing a party to associate a further key with the key set, a withdraw function for allowing a party to terminate Ms participation in the communication facility, a cancel function for allowing a party to terminate the communication facility.
  • the withdraw function may trigger the step of making any submission made by that party to the electronic communication facility inaccessible by the parties.
  • the records of submissions made by that party may be deleted from the server.
  • the cancel function may trigger the step of making the communication facility inaccessible by the parties.
  • the communication facility may be deleted from the server.
  • the method may further comprise making the communication facility inaccessible when predetermined conditions are satisfied.
  • the predetermined conditions may include that a predetermined time period has elapsed since the communication facility was established.
  • the method may further comprise allowing a party to increase the predetermined time period.
  • the primary key may define a one-to-all keys communication node of said communication facility, and each secondary key defines a on-to-primary key communication node of said communication facility.
  • the primary key and the secondary keys may each define a one-to-all keys communication node of said communication facility.
  • the keys associated into the key set may be provided to a stand-alone electronic device.
  • the electronic device may comprise a digital camera device or a vending machine.
  • the digital camera may output the keys to a user of the digital camera.
  • the vending machine may generate business cards incorporating the keys.
  • the control function may comprise allowing a party to import an electronic identity associated with said party into the communication facility.
  • the communication facility may comprise means for selectively linking the communication node defined by said party's key to said imported electronic identity.
  • a system of maintaining a communication system comprising a database, associating a plurality of keys into a key set; means for thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; a computing device for providing an interface for enabling a party to input a key; means for interrogating the database to verify that the key belongs to the key set; and means for enabling access to the communication facility upon verification.
  • a A data storage medium having stored thereon computer code means for instructing a computing device to execute a method of maintaining a communication system, the method comprising the steps of in a database, associating a plurality of keys into a key set; thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; on a computing device, providing an interface for enabling a party to input a key; interrogating the database to verify that the key belongs to the key set; and enabling access to the communication facility upon verification.
  • Figure 1 is a schematic overview of a system for facilitating anonymous communication
  • Figure 2 is a screenshot of an access page for a system as shown in Figure 1 ;
  • Figure 3 is a screenshot of a user-interface page for a system as shown in Figure l;
  • Figure 4 shows a token including a key set having two keys; and Figure 5 shows a further screenshot of a user-interface page.
  • Figure 6 shows a schematic screen shot illustrating an example interface layout for
  • Figure 7 shows a flow chart illustrating a method of maintaining a communication system according to an example embodiment.
  • Figure 8 is a schematic drawing illustrating a computer system for implementing a communication system and a method of maintaining a communication system of an example embodiment.
  • References in this specification to communication being facilitated should be taken to imply that communication by a plurality of parties is being facilitated by an entity which is not party to the communication.
  • Anonymous communication should be taken to mean communication effected between the parties without the parties being required to disclose to any other party or the facilitating entity information identifying themselves, including but not limited to name, address, telephone number, email address, social security number, tax file number, national insurance number, credit/debit card number, and so on.
  • electronic communication facility should be taken to mean a machine-implemented communication forum, such as a computer implemented communication platform, where computer can include servers, personal computers, laptops and other computing devices such as mobile phones,or radiotelegraphy implemented communication platform, in which parties may converse, submit, receive, or exchange information.
  • a machine-implemented communication forum such as a computer implemented communication platform
  • computer can include servers, personal computers, laptops and other computing devices such as mobile phones,or radiotelegraphy implemented communication platform, in which parties may converse, submit, receive, or exchange information.
  • page is intended to imply a form of presentation of information to a party.
  • the term includes web pages (e.g. html pages, rendered xml, php, and so on), dedicated client applications, flash applets, and the like.
  • the term also includes forms of presentation of information intended for mobile communications devices, such as telephones and PDAs, as well as including physical/hard copy output from devices used in the communication facility.
  • the present specification also discloses apparatus for performing the operations of the methods.
  • Such apparatus may be specially constructed for the required purposes, or may comprise a general purpose computer or other device selectively activated or reconfigured by a computer program stored in the computer.
  • the algorithms and displays presented herein are not inherently related to any particular computer or other apparatus.
  • Various general purpose machines may be used with programs in accordance with the teachings herein.
  • the construction of more specialized apparatus to perform the required method steps may be appropriate.
  • the structure of a conventional general purpose computer will appear from the description below.
  • the present specification also implicitly discloses a computer program, in that it would be apparent to the person skilled in the art that the individual steps of the method described herein may be put into effect by computer code.
  • the computer program is not intended to be limited to any particular programming language and implementation thereof. It will be appreciated that a variety of programming languages and coding thereof may be used to implement the teachings of the disclosure contained herein.
  • the computer program is not intended to be limited to any particular control flow. There are many other variants of the computer program, which can use different control flows without departing from the spirit or scope of the invention.
  • Such a computer program may be stored on any computer readable medium.
  • the computer readable medium may include storage devices such as magnetic or optical disks, memory chips, or other storage devices suitable for interfacing with a general purpose computer.
  • the computer readable medium may also include a hard- wired medium such as exemplified in the Internet system, or wireless medium such as exemplified in the GSM mobile telephone system.
  • the computer program when loaded and executed on such a general-purpose computer effectively results in an apparatus that implements the steps of the preferred method.
  • the invention may also be implemented as hardware modules. More particular, in the hardware sense, a module is a functional hardware unit designed for use with other components or modules. For example, a module may be implemented using discrete electronic components, or it can form a portion of an entire electronic circuit such as an Application Specific Integrated Circuit (ASIC). Numerous other possibilities exist. Those skilled in the art will appreciate that the system can also be implemented as a combination of hardware and software modules.
  • ASIC Application Specific Integrated Circuit
  • Figure 1 shows a system 2 according to one example embodiment for facilitating anonymous communication between two parties.
  • the system includes a server 4 in communication with two client computers 6, 8.
  • communication between the server 4 and the client computers 6, 8 occurs via the internet 10.
  • the communication may be effected on other networks, such as intranets, mobile telecommunications networks, and so on.
  • the server 4 is adapted to maintain a database 12 including data representative of a plurality of. electronic communication facilities.
  • the database includes records of key sets which may be used to access electronic communication facilities.
  • Each key set includes a plurality of keys which, in one embodiment, are alphanumeric sequences. Each key uniquely identifies the key set to which it belongs.
  • each key Within a key set is also unique.
  • 'keys' refers to identifiers or codes for distinct / unique / identifiable / addressable etc. defining nodal points (nodes) in the communication facility such as, but not limited to, Internet Protocol addresses in one embodiment.
  • a key set may include two keys where communication between two parties is desired.
  • key sets have greater than two keys.
  • a party wishing to generate a key set may specify at the time of generation the number of keys it is to have, as well as specifying specific characteristics of the individual keys themselves (eg. string / code length, string / code format, allowable functions of the keys etc.
  • the string at least in part, may specify something meaningful like a name etc., or permissible uses, privileges etc. within the communication system / platform may be specified.
  • keys may be added to a key set at a later stage.
  • a subset of the keys in a key set are designated in the database 12 as primary keys; the other keys are designated secondary keys.
  • primary keys may be distinguished from secondary keys by their form: for example, a primary key may have seven alphanumeric characters, while a secondary key has nine.
  • parties who input primary keys are herein referred to as primary parties
  • parties who enter secondary keys are referred to as secondary parties.
  • the keys can also have parity and essentially be fully equivalent in terms of functionality.
  • the keys could be identical to begin with but then obtain their primary or secondary status, for example based on when and in what order the users input the keys into the system etc.
  • the server 4 is adapted to generate an access page 14 (see Figure 2), including a text box 16 and submit button 18 for allowing a party to input a key.
  • the server validates it by interrogating the database. If the key is found to belong to a key set, the server updates the database to indicate that the key set is in use. That party, and any other party entering a key belonging to the key set, is permitted to access the electronic communication facility as now discussed with reference to Figure 3.
  • the server 4 Once a party has obtained access to an electronic communication facility by inputting one of the plurality of keys associated with the facility, the server 4 generates a user interface screen 20 (in Figure 3) for display to the party that entered the key via their client computer 6.
  • the screen 20 includes a communication history box 22 which shows the submissions made by the parties to the facility: in this case, textual communication.
  • the screen further includes an input textbox 24 for allowing the party to input text or any other data allowed for by the user interface screen 20, and a submit button 26 for allowing the party to submit that text or data to the facility.
  • the server 4 stores the submitted text in the database 12, associated with the key input by the party who submitted the text or data.
  • the screen 20 also includes media attachment buttons 27 which a party may click to submit an image, video, sound recording file, multimedia, hyperlinks, status-updates, meta-data or user generated content to the facility.
  • Such files are also stored in the database 12, associated with the key input by the party that submitted the file.
  • submissions Collectively, text and image, video, sound recording file, multimedia, hyperlinks, status-updates, meta-data or user generated content submitted to a facility are herein referred to as submissions .
  • Statements in this specification that a party is permitted to access an electronic communication facility are intended to indicate that that party is able to retrieve submissions made by the parties to the facility, for example by viewing the user interface screen 20.
  • the text in the textbox 24 at that time will become visible to the parties to the facility in the history boxes 22 of their respective screens 20.
  • Non-textual submissions may be presented automatically to the parties, or they may be given an option to open them. This presentation of submissions to the parties may occur, for example, using known mechanisms for pushing data to the client computer 6, 8 or by the client computer updating the screen 20 by periodically pulling data from the server 4.
  • the server 4 is adapted to provide a plurality of control functions to parties.
  • the server is adapted to provide a primary subset of the control functions to the primary party and a secondary subset of the control functions to the secondary party, wherein the primary and secondary subsets are not coterminous. That is to say, while the subsets may have certain functions in common, the primary subset may include functions not included in the secondary subset, or vice versa. Examples of this will be provided below. . Specific systems will now be disclosed in greater -detail, by way of example.
  • the system is used to facilitate anonymous communication between two parties.
  • Such communication may be desired, for example, following a meeting in a social situation where either or both parties wish to continue a communication, but are reluctant yet to provide or identify personal contact details.
  • the keys are distinct, alphanumeric codes having seven and nine characters.
  • the key set includes two keys only, which are printed on a token in the form of a paper ticket 28 (in Figure 4).
  • the ticket 28 has a first portion 30 and a second portion 32.
  • On the first and second portions 30, 32 are printed primary and secondary keys 34, 36, respectively.
  • a scored line 38 facilitates the separation of the portions 30, 32 from one another.
  • the token may be a sticker or a wristband, at least a portion of which bearing the second key may be removed by the holder and given to another person.
  • a first party hoping to initiate a communication with a second party may separate the two portions of the ticket, purchased in anticipation of such an eventuality. He or she may then give the second portion 32 to the second party while retaining the first portion 30.
  • each may use a web browser to navigate to the access page 14 by using a URL printed, along with any other necessary instructions, on the reverse side of the ticket 28.
  • the server 4 responds by creating an electronic communication facility. That is to say, the server 4 updates the database 12 to show that the set of keys is in use and/or active.
  • the electronic communication facility is not generated, or is not accessible, until the primary key 34 has been entered.
  • the primary party may be given the option by the server of establishing additional access criteria.
  • the primary party may require that the secondary party correctly answer a question after entering the secondary key. Examples include questions relating to either party (the colour of clothing, hair, or the like), the circumstances in which the secondary party was given the secondary key (the date, the location, or the like). If the secondary key is entered first, the party entering that key may be provided with a message indicating that they should try entering the key later.
  • the server Associated with each key, and hence for each party, the server is adapted to generate a user interface screen 20 which is specific to that party and that key, and using which, the party accesses the electronic communication facility.
  • the server 4 generates the user interface screens with reference to preference data stored in the database associated with the keys. For example, a party may desire a particular colour scheme, typeface, arrangement of elements, and so on.
  • the server is adapted to generate a preferences page for allowing a party to enter the preferences and to click on a submit button.
  • the function enabling the parties to control the appearance of their interface screen is common to the primary and secondary subsets of functions.
  • the server is adapted to allow a party to input a username or nickname for identifying himself to other parties to the communication facility.
  • the server is also adapted to allow a party to input, at their option, additional identification information into a profile, which may include a photograph, name, address, telephone number, and a login or user name and password. This information may also include credit card information or other payment information for effecting payment for a product or service.
  • a profile which may include a photograph, name, address, telephone number, and a login or user name and password.
  • This information may also include credit card information or other payment information for effecting payment for a product or service.
  • These functions are also common to the primary and secondary subsets of functions.
  • the server is adapted, at the owner's preference, to allow other parties access to a profile page including such of the information that the owner chooses.
  • the server is also adapted to provide a function for allowing the party to purchase additional sets of keys.
  • the user interface screen includes links 40 (see Figure 5) for allowing the party to navigate between their active sessions.
  • the server is adapted to prevent access to the electronic communication facility in predetermined circumstances.
  • a predetermined time period e.g. 28 days
  • the server is adapted to prevent further access to it.
  • the server is adapted to extend the period by a predetermined extension period upon payment of a predetermined fee. In one embodiment, the period is extended in perpetuity upon payment of a predetermined fee.
  • the functions provided by the server also include a withdraw function for allowing a party to terminate participation in the electronic communication facility.
  • the user interface screen 20 generated by the server includes a button 42 which a party may click.
  • the server makes any submission made by that party to the electronic communication facility inaccessible by at least the other the party.
  • all record of the submissions by that party are simply deleted from the database.
  • the timing of the submissions is retained, but the content deleted, so that the other party is able to see the structure of the communication, but not the content of the other party's submissions.
  • the content of the submissions is retained, but the server updates the database to indicate that the other party is not to be allowed access to that content.
  • the party triggering the withdraw function may still review the content of their own submissions.
  • the system is used to facilitate anonymous communication between multiple parties.
  • the keys are distinct, alphanumeric codes which are given on printed tokens by the primary party to the secondary parties.
  • the electronic communication facility is established as discussed above. Furthermore, in this embodiment, the server allows users to input profile data, including payment information. However, the server additionally provides, via a page linked from the party's user interface 20, a function for allowing a party to purchase additional key sets, or to purchase additional secondary keys which are associated with the existing key set. In this way, while the key set may initially have included, say, four keys, additional parties may be allowed access to the electronic communication facility.
  • the function for associating additional. keys is in the primary subset of. functions, but absent from the secondary subset. That is to say, the function is available only to the primary party.
  • the system is used to facilitate a primary party providing promotional material or information to a plurality of (consumers) secondary parties.
  • the secondary keys are provided to the secondary parties by being printed for example in newspaper or magazine advertisements, on the packaging of food items or drinks, or on gift items such as wristbands.
  • the electronic communication facility is not established until the primary key has been input/activated.
  • a communication-specific user interface screen is generated. That is to say, all parties (or at least all secondary parties) accessing the facility are presented with the same screen.
  • different screens may be provided, e.g. based on the location of the party, where and when the secondary key was inputted etc. This can allow for automatically customized promotions based on the heuristics associated with the keys and their end users (but without necessarily identifying them etc.).
  • an advertiser can place the same (e.g. printed) advert and promotion across a number of different media publications but utilizes the unique nature of the keys themselves (ie. contained within each advert or promotion) to collect and analyze the uptake of the promotion from the different media publications etc.
  • the server provides functions for controlling the appearance of the communication-specific user interface screen.
  • the primary party may specify aspects of the presentation of the screen, including colour scheme, typeface, logos, multimedia presentations, and so on.
  • the functions form part of the primary subset of functions, but not the secondary subset. That is to say, they are available only to the primary party.
  • the server provides a cancel function for allowing a party to terminate the electronic communication facility. Upon triggering of this function, the server is adapted to make the electronic communication facility inaccessible by the -parties, for example by deleting the records relating to the facility from the database, as discussed above.
  • a "two way” communication in a promotional type application can be provided. That is, such embodiments would allow the consumers to interact with the "brand” in a safe and “anonymous” fashion which may be more likely to get the consumers to provide their feedback etc. as now they are not having to input personal details or email addresses (for fear of being spammed etc.).
  • the system is adapted to provide real-time chat functionality.
  • the user interface screen 20 includes information 44 (see Figure 5) indicating the status, and activities / actions of the parties (e.g. "typing.").
  • the server is adapted to facilitate communication in multiple threads by generating interface screens or utilizing the existing user interface screen with links allowing parties to move between threads.
  • the server is also adapted to facilitate both synchronous and asynchronous communications such that the users can chat in both real time and also retrospectively.
  • information associated with the communication facility is . stored in a database in a manner such that the information is indexed by the respective key sets. It has been recognized by the inventors that this information, which may be regarded as defining or reflecting the linkages between any two or more keys in the respective key sets, can provide commercially useful information about a particular group of parties in each communication facility, and preferably without compromising the privacy of the respective parties. Only personal data knowingly entered by a party may form part of the information, i.e. as default, the identity of the parties remains "hidden" or obfuscated behind the keys.
  • Examples of information associated with the communication facility include, but are not limited to: the relationship that exists between any two (or more) 'keys' (which in turn is related to the relationship that exists between the parties associated with those keys).
  • the context in which this relationship exists ie. where, when, how, by who the 'keys' where shared or distributed etc.) the content and nature of any communications (ie. data) which may be stored, shared, linked, accessed or distributed via the 'keys' the metadata (ie. user generated "data about the data") which the users can associate with the 'keys' or may apply to those 'keys'.
  • the other distributed secondary keys may or may not have equal / reciprocal rights in terms of two way communication and connectivity.
  • the owner of the primary key may decide to simply set up a "common" landing page or view for each of the secondary keys but to not allow any interaction whatsoever between the individual secondary keys etc.
  • the owner may allow parity amongst all the keys (including the primary and secondary keys) such that every participant may have equal rights in terms of communications, publishing, viewing and access to the communication stream.
  • every user may have equal rights in terms of communications, publishing, viewing and access to the communication stream and any information shared or inputted by the other users.
  • a distributing party and one or more receiving parties who have not previously met may exchange a physical or digital 'key' to allow the parties to connect and communicate via an online platform.
  • the exchange medium may take the form of a traditional business card / name card onto which only certain / selected information (company's name, branding, employee's name and details etc.) might be printed / pre-printed.
  • This 'business card' might then also contain a removable / detachable label or sticker which, when removed, exposes the unique 'key' thereby allowing the second party/parties to connect and communicate via an online platform with the owner/business that has distributed the keys.
  • This example may also provide for users registering on a website whereby they could pre-order, purchase the custom business cards (ie. provide whatever particulars they chose, upload corporate logos etc.) and then have them delivered directly to the address of their choosing.
  • exchange of a physical or digital 'key' allows each party to connect and communicate via an online platform.
  • One party the "distributor" would purchase / obtain a number of 'keys' which, as an example only, could take the form of a small booklet in which individual 'keys' could be removed and distributed to multiple parties.
  • the booklet itself may contain one 'master key' which would be linked to each distributed 'key' and vice versa.
  • Any party receiving one of the distributed 'keys' and including the owner / distributing party would then be able to connect and communicate via an online platform with each other party (or alternatively, at the owner's discretion, only be able to connect with selected other parties or possibly just the owner etc.).
  • a vending machine can be utilized whereby the distributing party could either enter their details into a terminal (ie. on the vending machine) and have the custom business cards printed and generated on the spot (for example, at a large convention centre or trade fair etc.) or alternatively the distributing party could enter their existing business card into the vending machine which would then scan (utilizing known OCR techniques etc.) the card and capture the available identifying or contact particulars which the user could then selectively choose for incorporating onto the final custom business card before having the final business card printed / produced on the spot.
  • the distributing party could either enter their details into a terminal (ie. on the vending machine) and have the custom business cards printed and generated on the spot (for example, at a large convention centre or trade fair etc.) or alternatively the distributing party could enter their existing business card into the vending machine which would then scan (utilizing known OCR techniques etc.) the card and capture the available identifying or contact particulars which the user could then selectively choose for incorporating onto the final custom business card before having the final business card
  • users would be able to both create, aggregate and manage their various (and oftentimes disparate) social network and online identities.
  • a 'key' (be it a primary or a secondary key), which could be obtained, for example, by being given a simple, pre-printed sticker which would direct them to the site's address and then by inputting this key into the system, the user can then either translate this into a new online identity / profile within the system or additionally or alternatively link or assign this 'key' to one or more existing identities / profiles that the user may have already inputted into the system under a different 'key'. Additionally, or alternatively, the user can also link or assign this 'key' to one or more existing identities with other social (or business) network identities external to the communication facility, provided that the relevant information is available for sharing, e.g. through an appropriate Application Programming Interface (API).
  • API Application Programming Interface
  • Figure 6 shows a schematic screen shot 600 illustrating an example interface layout for Online Identity Management according to an example embodiment.
  • identities 601 to 604 are linked to the user's key, and displayed for selection/management in an "identities" field 606.
  • Such a system can provide an efficient, easy to use online platform (accessible via the web and mobile devices etc.) which allows users to have a single portal from which they can view and interact with all their disparate (or as many as possible / workable) social networks, online profiles and websites with which they are associated (or have an active profile / identity / account etc.)
  • an owner / distributing party has a compatible / supported digital camera or mobile phone with a camera function and takes a photo, or captures an audio / video sequence of one or more secondary parties whereby the parties have not previously met (or exchanged any form of identifying or contact particulars).
  • the camera software / firmware will generate a unique 'key' which it will assign to the picture (or audio / video sequence) of the second party via known techniques such as, but not limited to; facial recognition for example, such that the owner can then share this unique 'key' with the second party and thereby facilitate the sharing and/or exchange of this digital picture (or audio / video sequence) and create a communication channel between the two parties.
  • the second party will then be able to access (at the discretion of the distributor) the photo (or audio / video sequence) and/or communicate bi-directionally with the distributor via an online platform.
  • Original Equipment Manufacturer e.g. camera and/or mobile
  • integration can be used whereby the keys / key pairs etc. (or batches thereof) can be downloaded from the system for integration into a custom firmware and/or firmware update for distribution to end users / customers (ie. either preinstalled on the cameras / phones themselves or just made available via online update etc.)
  • end users could download an application directly from the system which would provide a 'batch' of keys / key pairs.
  • the 'device' e.g. camera, mobile etc
  • the 'device' itself may be assigned either a single primary key (and then each photo is assigned) or given a secondary key.
  • the device could then display the secondary key in the preview display of the photo such that it could simply be read off the screen and/or distributed (verbally, visually, via SMS, bluetooth etc.) to the appropriate subjects (eg. people within the photo itself ) and thereby allow them to access that specific photo via a communication facility according to an example embodiment.
  • each photo is assigned the primary key and then individuals within the photo (via facial recognition etc.) are assigned respective secondary codes. This is a more 'granular' approach allowing the photographer to provide and control individual access to the photo without affecting the other individuals' access to the photo.
  • a primary party may transfer secondary keys to secondary parties using functionality of the mobile devices, such as infra-red transfer, SMS, bluetooth, and the like.
  • Figure 7 shows a flow chart 700 illustrating a method of maintaining a communication system according to an example embodiment.
  • a plurality of keys are associated into a key set.
  • a communication facility for the key set is established such that each key of the key set defines a communication node in the communication facility.
  • an interface for enabling a party to input a key is provided.
  • the database is interrogated to verify that the key belongs to the key set.
  • access to the communication facility is enabled upon verification.
  • the communication system and method of maintaining a communication system of the example embodiments can be implemented on a computer system 800, schematically shown in Figure 8. It may be implemented as software, such as a computer program being executed within the computer system 800, and instructing the computer system 800 to conduct the method of the example embodiment.
  • the computer system 800 comprises a computer module 802, input modules such as a keyboard 804 and mouse 806 and a plurality of output devices such as a display 808, and printer 810.
  • the computer module 802 is connected to a computer network 812 via a suitable transceiver device 814, to enable access to e.g. the Internet or other network systems such as Local Area Network (LAN) or Wide Area Network (WAN).
  • LAN Local Area Network
  • WAN Wide Area Network
  • the computer module 802 in the example includes a processor 818, a Random Access Memory (RAM) 820 and a Read Only Memory (ROM) 822.
  • the computer module 802 also includes a number of Input/Output (I/O) interfaces, for example I/O interface 824 to the display 808, and I/O interface 826 to the keyboard 804.
  • I/O Input/Output
  • the components of the computer module 802 typically communicate via an interconnected bus 828 and in a manner known to the person skilled in the relevant art.
  • the application program is typically supplied to the user of the computer system 800 encoded on a data storage medium such as a CD-ROM or flash memory carrier and read utilising a corresponding data storage medium drive of a data storage device 830.
  • the application program is read and controlled in its execution by the processor 818.
  • Intermediate storage of program data maybe accomplished using RAM 820.

Abstract

A method of maintaining a communication system and a communication system. The method comprises the steps of in a database, associating a plurality of keys into a key set; thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; on a device, providing an interface for enabling a party to input a key; interrogating the database to verify that the key belongs to the key set; and enabling access to the communication facility upon verification.

Description

COMMUNICATION SYSTEM
The present invention relates broadly to a communication system and to a method of maintaining a communication system. In particular, the invention relates to a system which facilitates such communication via electronic means, such as computer, mobile telephones, PDAs, and so on. The invention has particular application in relation to facilitating dating and social networking. However, as will be apparent from the following discussion, it is not limited to this field.
BACKGROUND
The discussion of the prior art within this specification is to assist the addressee to understand the invention and is not an admission of the extent of the common general knowledge in the field of the invention and is included without prejudice.
To assist with the process of communication, in a general sense, for example, in a social context, facilitating meeting people, various online dating services exist, which aim to put individuals in contact with one another where information provided by them suggests that there is a reasonable likelihood of compatibility between them. However, such services typically require their users to provide significant amounts of personal information, at least some of which becomes available to other parties before they have met in person. For this reason, such systems do not accurately reflect the way in which people typically become acquainted: by face-to-face contact, whereby both parties can have control over the interaction and how much personal information they choose to disclose or communicate etc.. Furthermore, some individuals are reluctant to provide the administrators of such services with their personal information for fear of abuse, for example by third parties obtaining illicit access to the user information.
To assist another process of communication in a general sense, for example, in a business context, facilitating forming and attracting potential business partners or customers, most companies these days would maintain a web-site providing general information/advertising on the internet, thus potentially tapping into a virtually unlimited customer reach. However, it is exactly because of that unlimited customer reached, that information contained on web-sites will have to be tailored to a general audience, and thus currently such web-sites provide little or no opportunity to tailor to specific groups within the audience and to "push" targeted information to such groups. As with all advertising, the more such advertising depends on user input/selection, the higher the likelihood that the user cannot be bothered to make the required selections/inputs, thus effectively inhibiting the targeted pushing of information to the target group.
It is an object of the present invention to overcome, or at least substantially ameliorate, one or more of the disadvantages of the prior art or at least to provide a useful alternative.
SUMMARY OF THE INVENTION
In accordance with a first aspect of the present invention, there is provided a method of maintaining a communication system, the method comprising the steps of, in a database, associating a plurality of keys into a key set; thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; on a device, providing an interface for enabling a party to input a key; interrogating the database to verify that the key belongs to the key set; and enabling access to the communication facility upon verification.
The method may further comprise in the database, storing information associated with the communication facility in a manner such that the information is indexed by the key set.
The information may include one or more of a group consisting of content provided via the communication facility, personal data entered by a party using one of the plurality of keys, payment data entered by a party using one of the plurality of keys, and personalization data entered by a party using one of the plurality of keys.
The method may further comprise reproducing at least one of the plurality of keys in the key set on a token for distribution to a party, or distributing at least one of the plurality of keys in the key set in digital form. The token may comprise at least part of one or more of a group consisting of a sticker, a paper business card or calling card, a wristband, a packaging of a consumer product, and a printed advertisement.
The may further comprise designating a first of the plurality of keys as a primary key and at least one second key as a secondary key.
The method may further comprise determining whether a party has input the primary key, and allowing access to the communication facility only if it is determined that the primary key has been input.
The method may further comprise providing a plurality of control functions to parties to the communication facility.
The control functions associated with different ones of the keys in the key set may be different.
The control functions may include one or more of a group consisting of generating a communication-specific user interface screen for display to parties using the communication facility, controlling the appearance of the communication-specific user interface screen, generating a party-specific user interface screen for display to that party when using the communication facility, controlling the appearance of the party-specific user interface screen, allowing a party to input a username or other data for identifying himself to other parties to the communication facility, allowing a party to input personal identification information relating to himself, allowing a party to input payment information for effecting payment for a product or service, a function for allowing a party to purchase key sets, allowing a party to associate a further key set with the communication facility, allowing a party to associate a further key with the key set, a withdraw function for allowing a party to terminate Ms participation in the communication facility, a cancel function for allowing a party to terminate the communication facility.
The withdraw function may trigger the step of making any submission made by that party to the electronic communication facility inaccessible by the parties. The records of submissions made by that party may be deleted from the server.
The cancel function may trigger the step of making the communication facility inaccessible by the parties.
The communication facility may be deleted from the server.
The method may further comprise making the communication facility inaccessible when predetermined conditions are satisfied.
The predetermined conditions may include that a predetermined time period has elapsed since the communication facility was established.
The method may further comprise allowing a party to increase the predetermined time period.
The primary key may define a one-to-all keys communication node of said communication facility, and each secondary key defines a on-to-primary key communication node of said communication facility.
The primary key and the secondary keys may each define a one-to-all keys communication node of said communication facility.
The keys associated into the key set may be provided to a stand-alone electronic device.
The electronic device may comprise a digital camera device or a vending machine.
The digital camera may output the keys to a user of the digital camera.
The vending machine may generate business cards incorporating the keys. The control function may comprise allowing a party to import an electronic identity associated with said party into the communication facility.
The communication facility may comprise means for selectively linking the communication node defined by said party's key to said imported electronic identity.
In accordance with a second aspect of the present invention, there is provided a system of maintaining a communication system, the system comprising a database, associating a plurality of keys into a key set; means for thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; a computing device for providing an interface for enabling a party to input a key; means for interrogating the database to verify that the key belongs to the key set; and means for enabling access to the communication facility upon verification.
In accordance with a third aspect of the present invention, there is provided a A data storage medium having stored thereon computer code means for instructing a computing device to execute a method of maintaining a communication system, the method comprising the steps of in a database, associating a plurality of keys into a key set; thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; on a computing device, providing an interface for enabling a party to input a key; interrogating the database to verify that the key belongs to the key set; and enabling access to the communication facility upon verification.
BRIEF DESCRIPTION OF THE DRAWINGS
Preferred embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
Figure 1 is a schematic overview of a system for facilitating anonymous communication;
Figure 2 is a screenshot of an access page for a system as shown in Figure 1 ; Figure 3 is a screenshot of a user-interface page for a system as shown in Figure l;
Figure 4 shows a token including a key set having two keys; and Figure 5 shows a further screenshot of a user-interface page. Figure 6 shows a schematic screen shot illustrating an example interface layout for
Online Identity Management according to an example embodiment.
Figure 7 shows a flow chart illustrating a method of maintaining a communication system according to an example embodiment.
Figure 8 is a schematic drawing illustrating a computer system for implementing a communication system and a method of maintaining a communication system of an example embodiment.
DETAILED DESCRIPTION
References in this specification to communication being facilitated should be taken to imply that communication by a plurality of parties is being facilitated by an entity which is not party to the communication. Anonymous communication should be taken to mean communication effected between the parties without the parties being required to disclose to any other party or the facilitating entity information identifying themselves, including but not limited to name, address, telephone number, email address, social security number, tax file number, national insurance number, credit/debit card number, and so on.
As used in this specification, electronic communication facility should be taken to mean a machine-implemented communication forum, such as a computer implemented communication platform, where computer can include servers, personal computers, laptops and other computing devices such as mobile phones,or radiotelegraphy implemented communication platform, in which parties may converse, submit, receive, or exchange information.
The term page is intended to imply a form of presentation of information to a party. In particular, the term includes web pages (e.g. html pages, rendered xml, php, and so on), dedicated client applications, flash applets, and the like. The term also includes forms of presentation of information intended for mobile communications devices, such as telephones and PDAs, as well as including physical/hard copy output from devices used in the communication facility. Some portions of the description which follow are explicitly or implicitly presented in terms of algorithms and functional or symbolic representations of operations on data within a computer memory. These algorithmic descriptions and functional or symbolic representations are the means used by those skilled in the data processing arts to convey most effectively the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities, such as electrical, magnetic or optical signals capable of being stored, transferred, combined, compared, and otherwise manipulated. Unless specifically stated otherwise, and as apparent from the following, it will be appreciated that throughout the present specification, discussions utilizing terms such as "calculating", "determining", "generating", "initializing", "outputting", or the like, refer to the action and processes of a computer system, or similar electronic device, that manipulates and transforms data represented as physical quantities within the computer system into other data similarly represented as physical quantities within the computer system or other information storage, transmission or display devices.
The present specification also discloses apparatus for performing the operations of the methods. Such apparatus may be specially constructed for the required purposes, or may comprise a general purpose computer or other device selectively activated or reconfigured by a computer program stored in the computer. The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose machines may be used with programs in accordance with the teachings herein. Alternatively, the construction of more specialized apparatus to perform the required method steps may be appropriate. The structure of a conventional general purpose computer will appear from the description below.
In addition, the present specification also implicitly discloses a computer program, in that it would be apparent to the person skilled in the art that the individual steps of the method described herein may be put into effect by computer code. The computer program is not intended to be limited to any particular programming language and implementation thereof. It will be appreciated that a variety of programming languages and coding thereof may be used to implement the teachings of the disclosure contained herein. Moreover, the computer program is not intended to be limited to any particular control flow. There are many other variants of the computer program, which can use different control flows without departing from the spirit or scope of the invention.
Furthermore, one or more of the steps of the computer program may be performed in parallel rather than sequentially. Such a computer program may be stored on any computer readable medium. The computer readable medium may include storage devices such as magnetic or optical disks, memory chips, or other storage devices suitable for interfacing with a general purpose computer. The computer readable medium may also include a hard- wired medium such as exemplified in the Internet system, or wireless medium such as exemplified in the GSM mobile telephone system. The computer program when loaded and executed on such a general-purpose computer effectively results in an apparatus that implements the steps of the preferred method.
The invention may also be implemented as hardware modules. More particular, in the hardware sense, a module is a functional hardware unit designed for use with other components or modules. For example, a module may be implemented using discrete electronic components, or it can form a portion of an entire electronic circuit such as an Application Specific Integrated Circuit (ASIC). Numerous other possibilities exist. Those skilled in the art will appreciate that the system can also be implemented as a combination of hardware and software modules.
Figure 1 shows a system 2 according to one example embodiment for facilitating anonymous communication between two parties. The system includes a server 4 in communication with two client computers 6, 8. In this embodiment, communication between the server 4 and the client computers 6, 8 occurs via the internet 10. In other embodiments, the communication may be effected on other networks, such as intranets, mobile telecommunications networks, and so on. The server 4 is adapted to maintain a database 12 including data representative of a plurality of. electronic communication facilities. The database includes records of key sets which may be used to access electronic communication facilities. Each key set includes a plurality of keys which, in one embodiment, are alphanumeric sequences. Each key uniquely identifies the key set to which it belongs. Furthermore, in one embodiment, each key Within a key set is also unique.
The notion .of the 'keys' as used herein does not have to be tied to the idea of having to comprise of a string of characters or digits (whether digital or physical). Rather, 'keys' as used herein refers to identifiers or codes for distinct / unique / identifiable / addressable etc. defining nodal points (nodes) in the communication facility such as, but not limited to, Internet Protocol addresses in one embodiment.
As described in greater detail below, a key set may include two keys where communication between two parties is desired. In other embodiments, key sets have greater than two keys. In particular, in some embodiments, a party wishing to generate a key set may specify at the time of generation the number of keys it is to have, as well as specifying specific characteristics of the individual keys themselves (eg. string / code length, string / code format, allowable functions of the keys etc. For example, the string, at least in part, may specify something meaningful like a name etc., or permissible uses, privileges etc. within the communication system / platform may be specified.
Alternatively, in some embodiments, keys may be added to a key set at a later stage.
In one embodiment, a subset of the keys in a key set are designated in the database 12 as primary keys; the other keys are designated secondary keys. In the systems described in greater detail below, it will be seen that the functionality of the system accessible by a party is dependent upon whether the party inputs a primary key or a secondary key. In some embodiments, primary keys may be distinguished from secondary keys by their form: for example, a primary key may have seven alphanumeric characters, while a secondary key has nine. For convenience, parties who input primary keys are herein referred to as primary parties , while parties who enter secondary keys are referred to as secondary parties. It is noted that in some embodiments the keys can also have parity and essentially be fully equivalent in terms of functionality. Also, the keys could be identical to begin with but then obtain their primary or secondary status, for example based on when and in what order the users input the keys into the system etc.
The server 4 is adapted to generate an access page 14 (see Figure 2), including a text box 16 and submit button 18 for allowing a party to input a key. When a key is input in this way, the server validates it by interrogating the database. If the key is found to belong to a key set, the server updates the database to indicate that the key set is in use. That party, and any other party entering a key belonging to the key set, is permitted to access the electronic communication facility as now discussed with reference to Figure 3. Once a party has obtained access to an electronic communication facility by inputting one of the plurality of keys associated with the facility, the server 4 generates a user interface screen 20 (in Figure 3) for display to the party that entered the key via their client computer 6. The screen 20 includes a communication history box 22 which shows the submissions made by the parties to the facility: in this case, textual communication. The screen further includes an input textbox 24 for allowing the party to input text or any other data allowed for by the user interface screen 20, and a submit button 26 for allowing the party to submit that text or data to the facility. When this occurs, the server 4 stores the submitted text in the database 12, associated with the key input by the party who submitted the text or data. The screen 20 also includes media attachment buttons 27 which a party may click to submit an image, video, sound recording file, multimedia, hyperlinks, status-updates, meta-data or user generated content to the facility. Such files are also stored in the database 12, associated with the key input by the party that submitted the file. Collectively, text and image, video, sound recording file, multimedia, hyperlinks, status-updates, meta-data or user generated content submitted to a facility are herein referred to as submissions . Statements in this specification that a party is permitted to access an electronic communication facility are intended to indicate that that party is able to retrieve submissions made by the parties to the facility, for example by viewing the user interface screen 20.
Accordingly, in one embodiment, once the submit button 26 has been clicked by the party, the text in the textbox 24 at that time will become visible to the parties to the facility in the history boxes 22 of their respective screens 20. Non-textual submissions may be presented automatically to the parties, or they may be given an option to open them. This presentation of submissions to the parties may occur, for example, using known mechanisms for pushing data to the client computer 6, 8 or by the client computer updating the screen 20 by periodically pulling data from the server 4.
In addition to providing access to the submissions, the server 4 is adapted to provide a plurality of control functions to parties. In one embodiment, the server is adapted to provide a primary subset of the control functions to the primary party and a secondary subset of the control functions to the secondary party, wherein the primary and secondary subsets are not coterminous. That is to say, while the subsets may have certain functions in common, the primary subset may include functions not included in the secondary subset, or vice versa. Examples of this will be provided below. . Specific systems will now be disclosed in greater -detail, by way of example.
Where a feature is described in connection with one of the systems but is absent from another, this should not be taken to mean that that feature cannot be provided in connection with the latter system. Each feature of any of the systems described may be provided with any of the other systems, unless the contrary is indicated.
In one embodiment for facilitating a two-party chat, the system is used to facilitate anonymous communication between two parties. Such communication may be desired, for example, following a meeting in a social situation where either or both parties wish to continue a communication, but are reluctant yet to provide or identify personal contact details.
In this embodiment, the keys are distinct, alphanumeric codes having seven and nine characters. The key set includes two keys only, which are printed on a token in the form of a paper ticket 28 (in Figure 4). The ticket 28 has a first portion 30 and a second portion 32. On the first and second portions 30, 32 are printed primary and secondary keys 34, 36, respectively. A scored line 38 facilitates the separation of the portions 30, 32 from one another.
In alternative embodiments, the token may be a sticker or a wristband, at least a portion of which bearing the second key may be removed by the holder and given to another person. A first party hoping to initiate a communication with a second party may separate the two portions of the ticket, purchased in anticipation of such an eventuality. He or she may then give the second portion 32 to the second party while retaining the first portion 30.
Following the encounter, when the first and second parties have access to respective computers able to serve as client computers 6, 8, each may use a web browser to navigate to the access page 14 by using a URL printed, along with any other necessary instructions, on the reverse side of the ticket 28. When either of the keys 34, 36 are input and submitted, the server 4 responds by creating an electronic communication facility. That is to say, the server 4 updates the database 12 to show that the set of keys is in use and/or active.
In one embodiment, the electronic communication facility is not generated, or is not accessible, until the primary key 34 has been entered. In such a case, the primary party may be given the option by the server of establishing additional access criteria. For example, the primary party may require that the secondary party correctly answer a question after entering the secondary key. Examples include questions relating to either party (the colour of clothing, hair, or the like), the circumstances in which the secondary party was given the secondary key (the date, the location, or the like). If the secondary key is entered first, the party entering that key may be provided with a message indicating that they should try entering the key later.
It is important to note that, setting aside any access question set by the primary party, access to the system as a whole, or to the electronic communication facility, is not contingent upon either party registering or providing profile data such as their name, address, email address, telephone number, credit card details, or the like. Thus, communication using the system is anonymous as between the parties themselves and between the parties and the system.
Non limiting examples of the functions provided by the server in such systems will now be described. Associated with each key, and hence for each party, the server is adapted to generate a user interface screen 20 which is specific to that party and that key, and using which, the party accesses the electronic communication facility. The server 4 generates the user interface screens with reference to preference data stored in the database associated with the keys. For example, a party may desire a particular colour scheme, typeface, arrangement of elements, and so on. To allow a party to input these preferences, the server is adapted to generate a preferences page for allowing a party to enter the preferences and to click on a submit button. In this embodiment, the function enabling the parties to control the appearance of their interface screen is common to the primary and secondary subsets of functions. In a similar way, the server is adapted to allow a party to input a username or nickname for identifying himself to other parties to the communication facility. Indeed, notwithstanding the anonymity discussed above, the server is also adapted to allow a party to input, at their option, additional identification information into a profile, which may include a photograph, name, address, telephone number, and a login or user name and password. This information may also include credit card information or other payment information for effecting payment for a product or service. These functions are also common to the primary and secondary subsets of functions. Where a party has entered profile information of this sort, the server is adapted, at the owner's preference, to allow other parties access to a profile page including such of the information that the owner chooses.
For parties that have entered profile and payment information, the server is also adapted to provide a function for allowing the party to purchase additional sets of keys. In such cases, the user interface screen includes links 40 (see Figure 5) for allowing the party to navigate between their active sessions.
The server is adapted to prevent access to the electronic communication facility in predetermined circumstances. In particular, once a predetermined time period (e.g. 28 days) has elapsed since a facility was generated, the server is adapted to prevent further access to it. However, for parties that have entered payment information, the server is adapted to extend the period by a predetermined extension period upon payment of a predetermined fee. In one embodiment, the period is extended in perpetuity upon payment of a predetermined fee.
The functions provided by the server also include a withdraw function for allowing a party to terminate participation in the electronic communication facility. To trigger this function, the user interface screen 20 generated by the server includes a button 42 which a party may click. When this function is triggered, the server makes any submission made by that party to the electronic communication facility inaccessible by at least the other the party. In one embodiment, all record of the submissions by that party are simply deleted from the database. In another embodiment, the timing of the submissions is retained, but the content deleted, so that the other party is able to see the structure of the communication, but not the content of the other party's submissions. In yet another embodiment, the content of the submissions is retained, but the server updates the database to indicate that the other party is not to be allowed access to that content. In such embodiments, the party triggering the withdraw function may still review the content of their own submissions.
In an embodiment for facilitating a multi-party chat, the system is used to facilitate anonymous communication between multiple parties. As with the system described above, the keys are distinct, alphanumeric codes which are given on printed tokens by the primary party to the secondary parties.
The electronic communication facility is established as discussed above. Furthermore, in this embodiment, the server allows users to input profile data, including payment information. However, the server additionally provides, via a page linked from the party's user interface 20, a function for allowing a party to purchase additional key sets, or to purchase additional secondary keys which are associated with the existing key set. In this way, while the key set may initially have included, say, four keys, additional parties may be allowed access to the electronic communication facility. In one embodiment, the function for associating additional. keys is in the primary subset of. functions, but absent from the secondary subset. That is to say, the function is available only to the primary party.
In this system-, the withdraw function operates as discussed above.
In an embodiment for facilitating a promotional facility, the system is used to facilitate a primary party providing promotional material or information to a plurality of (consumers) secondary parties. In such cases, the secondary keys are provided to the secondary parties by being printed for example in newspaper or magazine advertisements, on the packaging of food items or drinks, or on gift items such as wristbands.
In this embodiment, the electronic communication facility is not established until the primary key has been input/activated. Furthermore, rather than the party-specific user interface screens 20 generated in relation to the systems discussed above, a communication-specific user interface screen is generated. That is to say, all parties (or at least all secondary parties) accessing the facility are presented with the same screen. However, in some embodiments, different screens may be provided, e.g. based on the location of the party, where and when the secondary key was inputted etc. This can allow for automatically customized promotions based on the heuristics associated with the keys and their end users (but without necessarily identifying them etc.).
In one example, an advertiser can place the same (e.g. printed) advert and promotion across a number of different media publications but utilizes the unique nature of the keys themselves (ie. contained within each advert or promotion) to collect and analyze the uptake of the promotion from the different media publications etc.
As with the user-specific screen discussed above, in this system, the server provides functions for controlling the appearance of the communication-specific user interface screen. Using these functions, the primary party may specify aspects of the presentation of the screen, including colour scheme, typeface, logos, multimedia presentations, and so on. In this system the functions form part of the primary subset of functions, but not the secondary subset. That is to say, they are available only to the primary party. In addition, to enable the primary party to terminate the promotion, the server provides a cancel function for allowing a party to terminate the electronic communication facility. Upon triggering of this function, the server is adapted to make the electronic communication facility inaccessible by the -parties, for example by deleting the records relating to the facility from the database, as discussed above.
In addition to the features and functionality discussed above, other features are provided in certain embodiments. These features and functionality are discussed below.
In some embodiments, a "two way" communication in a promotional type application can be provided. That is, such embodiments would allow the consumers to interact with the "brand" in a safe and "anonymous" fashion which may be more likely to get the consumers to provide their feedback etc. as now they are not having to input personal details or email addresses (for fear of being spammed etc.).
In some embodiments, where the submissions are pushed to the parties, the system is adapted to provide real-time chat functionality. In particular, the user interface screen 20 includes information 44 (see Figure 5) indicating the status, and activities / actions of the parties (e.g. "typing...").
In some embodiments, particularly those facilitating communication between more than two parties, the server is adapted to facilitate communication in multiple threads by generating interface screens or utilizing the existing user interface screen with links allowing parties to move between threads. The server is also adapted to facilitate both synchronous and asynchronous communications such that the users can chat in both real time and also retrospectively.
In some embodiments, information associated with the communication facility is . stored in a database in a manner such that the information is indexed by the respective key sets. It has been recognized by the inventors that this information, which may be regarded as defining or reflecting the linkages between any two or more keys in the respective key sets, can provide commercially useful information about a particular group of parties in each communication facility, and preferably without compromising the privacy of the respective parties. Only personal data knowingly entered by a party may form part of the information, i.e. as default, the identity of the parties remains "hidden" or obfuscated behind the keys. Examples of information associated with the communication facility include, but are not limited to: the relationship that exists between any two (or more) 'keys' (which in turn is related to the relationship that exists between the parties associated with those keys). the context in which this relationship exists (ie. where, when, how, by who the 'keys' where shared or distributed etc.) the content and nature of any communications (ie. data) which may be stored, shared, linked, accessed or distributed via the 'keys' the metadata (ie. user generated "data about the data") which the users can associate with the 'keys' or may apply to those 'keys'. In some embodiments, there may be a single primary key which is linked to a number of secondary keys. At the discretion of the owner / purchaser of the primary key, the other distributed secondary keys may or may not have equal / reciprocal rights in terms of two way communication and connectivity. For example, the owner of the primary key may decide to simply set up a "common" landing page or view for each of the secondary keys but to not allow any interaction whatsoever between the individual secondary keys etc.
Alternatively the owner may allow parity amongst all the keys (including the primary and secondary keys) such that every participant may have equal rights in terms of communications, publishing, viewing and access to the communication stream. For example, in this scenario every user may have equal rights in terms of communications, publishing, viewing and access to the communication stream and any information shared or inputted by the other users.
In some embodiments, such as in a commercial/business context, a distributing party and one or more receiving parties who have not previously met (or exchanged any form of identifying or contact particulars) may exchange a physical or digital 'key' to allow the parties to connect and communicate via an online platform.
The exchange medium may take the form of a traditional business card / name card onto which only certain / selected information (company's name, branding, employee's name and details etc.) might be printed / pre-printed. This 'business card' might then also contain a removable / detachable label or sticker which, when removed, exposes the unique 'key' thereby allowing the second party/parties to connect and communicate via an online platform with the owner/business that has distributed the keys. This example may also provide for users registering on a website whereby they could pre-order, purchase the custom business cards (ie. provide whatever particulars they chose, upload corporate logos etc.) and then have them delivered directly to the address of their choosing. In some embodiments for facilitating multiple parties communications (in a social context) comprising of a distributing party and a second, third etc. receiving party who have not previously met (or exchanged any form of identifying or contact particulars), exchange of a physical or digital 'key' allows each party to connect and communicate via an online platform. One party (the "distributor") would purchase / obtain a number of 'keys' which, as an example only, could take the form of a small booklet in which individual 'keys' could be removed and distributed to multiple parties. In this example, the booklet itself may contain one 'master key' which would be linked to each distributed 'key' and vice versa.
Any party receiving one of the distributed 'keys' and including the owner / distributing party would then be able to connect and communicate via an online platform with each other party (or alternatively, at the owner's discretion, only be able to connect with selected other parties or possibly just the owner etc.).
In some embodiments, a vending machine can be utilized whereby the distributing party could either enter their details into a terminal (ie. on the vending machine) and have the custom business cards printed and generated on the spot (for example, at a large convention centre or trade fair etc.) or alternatively the distributing party could enter their existing business card into the vending machine which would then scan (utilizing known OCR techniques etc.) the card and capture the available identifying or contact particulars which the user could then selectively choose for incorporating onto the final custom business card before having the final business card printed / produced on the spot.
In some embodiments for facilitating Online Identity Management, users would be able to both create, aggregate and manage their various (and oftentimes disparate) social network and online identities.
Users of such embodiments of the system could begin with just a 'key' (be it a primary or a secondary key), which could be obtained, for example, by being given a simple, pre-printed sticker which would direct them to the site's address and then by inputting this key into the system, the user can then either translate this into a new online identity / profile within the system or additionally or alternatively link or assign this 'key' to one or more existing identities / profiles that the user may have already inputted into the system under a different 'key'. Additionally, or alternatively, the user can also link or assign this 'key' to one or more existing identities with other social (or business) network identities external to the communication facility, provided that the relevant information is available for sharing, e.g. through an appropriate Application Programming Interface (API).
Figure 6 shows a schematic screen shot 600 illustrating an example interface layout for Online Identity Management according to an example embodiment. Several identities 601 to 604 are linked to the user's key, and displayed for selection/management in an "identities" field 606. A "contacts" field 608 for display/management of the other nodes of the communication facility, contacts 611 to 614, is provided, as well as an "objects" field 616 for managing and exchanging communications on the communication facility.
Such a system can provide an efficient, easy to use online platform (accessible via the web and mobile devices etc.) which allows users to have a single portal from which they can view and interact with all their disparate (or as many as possible / workable) social networks, online profiles and websites with which they are associated (or have an active profile / identity / account etc.)
In some embodiments for facilitating sharing of digital photos, an owner / distributing party has a compatible / supported digital camera or mobile phone with a camera function and takes a photo, or captures an audio / video sequence of one or more secondary parties whereby the parties have not previously met (or exchanged any form of identifying or contact particulars). After the photo (or audio / video sequence) is captured the camera software / firmware will generate a unique 'key' which it will assign to the picture (or audio / video sequence) of the second party via known techniques such as, but not limited to; facial recognition for example, such that the owner can then share this unique 'key' with the second party and thereby facilitate the sharing and/or exchange of this digital picture (or audio / video sequence) and create a communication channel between the two parties. The second party will then be able to access (at the discretion of the distributor) the photo (or audio / video sequence) and/or communicate bi-directionally with the distributor via an online platform. In one implementation, Original Equipment Manufacturer (e.g. camera and/or mobile) integration can be used whereby the keys / key pairs etc. (or batches thereof) can be downloaded from the system for integration into a custom firmware and/or firmware update for distribution to end users / customers (ie. either preinstalled on the cameras / phones themselves or just made available via online update etc.)
In another implementation, end users could download an application directly from the system which would provide a 'batch' of keys / key pairs.
In such embodiments the 'device' (e.g. camera, mobile etc) itself may be assigned either a single primary key (and then each photo is assigned) or given a secondary key. The device could then display the secondary key in the preview display of the photo such that it could simply be read off the screen and/or distributed (verbally, visually, via SMS, bluetooth etc.) to the appropriate subjects (eg. people within the photo itself ) and thereby allow them to access that specific photo via a communication facility according to an example embodiment. In such embodiments, the participants / subjects within the photo as well as the photographer can become "instant" members of a "premade" social network in which participants can remain anonymous if desired (other than having their image tied to a 'key') as this is purely facilitated via the use of the keys and the communication system according to an example embodiment. In another embodiment, each photo is assigned the primary key and then individuals within the photo (via facial recognition etc.) are assigned respective secondary codes. This is a more 'granular' approach allowing the photographer to provide and control individual access to the photo without affecting the other individuals' access to the photo. The embodiments discussed above have been described primarily with reference to the parties using computers as clients. It will be appreciated, however, that other devices such as mobile telephones and PDAs may also serve as clients and have equal access to functionality as static clients. Furthermore, a primary party may transfer secondary keys to secondary parties using functionality of the mobile devices, such as infra-red transfer, SMS, bluetooth, and the like.
Figure 7 shows a flow chart 700 illustrating a method of maintaining a communication system according to an example embodiment. At step 702, in a database, a plurality of keys are associated into a key set. Thereafter, at step 704, a communication facility for the key set is established such that each key of the key set defines a communication node in the communication facility. At step 706, on a device, an interface for enabling a party to input a key is provided. At step 708, the database is interrogated to verify that the key belongs to the key set. At step 710, access to the communication facility is enabled upon verification.
The communication system and method of maintaining a communication system of the example embodiments can be implemented on a computer system 800, schematically shown in Figure 8. It may be implemented as software, such as a computer program being executed within the computer system 800, and instructing the computer system 800 to conduct the method of the example embodiment.
The computer system 800 comprises a computer module 802, input modules such as a keyboard 804 and mouse 806 and a plurality of output devices such as a display 808, and printer 810.
The computer module 802 is connected to a computer network 812 via a suitable transceiver device 814, to enable access to e.g. the Internet or other network systems such as Local Area Network (LAN) or Wide Area Network (WAN).
The computer module 802 in the example includes a processor 818, a Random Access Memory (RAM) 820 and a Read Only Memory (ROM) 822. The computer module 802 also includes a number of Input/Output (I/O) interfaces, for example I/O interface 824 to the display 808, and I/O interface 826 to the keyboard 804.
The components of the computer module 802 typically communicate via an interconnected bus 828 and in a manner known to the person skilled in the relevant art.
The application program is typically supplied to the user of the computer system 800 encoded on a data storage medium such as a CD-ROM or flash memory carrier and read utilising a corresponding data storage medium drive of a data storage device 830. The application program is read and controlled in its execution by the processor 818. Intermediate storage of program data maybe accomplished using RAM 820. Although the invention has been described with reference to specific examples, it will be appreciated by those skilled in the art that it may be embodied in many other forms, hi particular features of any one of the various described examples may be provided in any combination in any of the other described examples.

Claims

CLAIMS:
1. A method of maintaining a communication system, the method comprising the steps of: in a database, associating a plurality of keys into a key set; thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; on a device, providing an interface for enabling a party to input a key; interrogating the database to verify that the key belongs to the key set; and enabling access to the communication facility upon verification.
2. The method according to claim 1, further comprising in the database, storing information associated with the communication facility in a manner such that the information is indexed by the key set.
3. The method according to claim 2, wherein the information includes one or more of a group consisting of content provided via the communication facility, personal data entered by a party using one of the plurality of keys, payment data entered by a party using one of the plurality of keys, and personalization data entered by a party using one of the plurality of keys.
4. The method according to any one of the preceding claims, further comprising reproducing at least one of the plurality of keys in the key set on a token for distribution to a party, or distributing at least one of the plurality of keys in digital format.
5. The method according to claim 4, wherein the token comprises at least part of one or more of a group consisting of a sticker, a paper business card or calling card, a wristband, a packaging of a consumer product, and a printed advertisement.
6. The method according to any one of the preceding claims, further comprising designating a first of the plurality of keys as a primary key and at least one second key as a secondary key.
7. The method according to claim 6, further comprising determining whether a party has input the primary key, and allowing access to the communication facility only if it is determined that the primary key has been input.
8. The method according to any one of the preceding claims, further comprising providing a plurality of control functions to parties to the communication facility.
9. The method according to claim 8, wherein the control functions associated with different keys in the key set are different.
10. The method according to claims 8 or 9, wherein the control functions include one or more of a group consisting of generating a communication-specific user interface screen for display to parties using the communication facility, controlling the appearance of the communication-specific user interface screen, generating a party- specific user interface screen for display to that party when using the communication facility, controlling the appearance of the party-specific user interface screen, allowing a party to input a username or other data for identifying himself to other parties to the communication facility, allowing a party to input personal identification information relating to himself, allowing a party to input payment information for effecting payment for a product or service, a function for allowing a party to purchase key sets, allowing a party to associate a further key set with the communication facility, allowing a party to associate a further key with the key set, a withdraw function for allowing a party to terminate his participation in the communication facility, a cancel function for allowing a party to terminate the communication facility.
11. The method according to claim 10, wherein the withdraw function triggers the step of making any submission made by that party to the electronic communication facility inaccessible by the parties.
12. The method according to claim 11, wherein the records of submissions made by that party are deleted from the server.
13. The method according to claim 10, wherein the cancel function triggers the step of making the communication facility inaccessible by the parties.
14. The method according to claim 13, wherein the communication facility is deleted from the server.
15. The method according to any one of the preceding claims, further comprising making the communication facility inaccessible when predetermined conditions are satisfied.
16. The method according to claim 15, wherein the predetermined conditions include that a predetermined time period has elapsed since the communication facility was established.
17. The method according to claim 16, further comprising allowing a party to increase the predetermined time period.
18. The method according to claim 6, wherein the primary key defines a one- to-all keys communication node of said communication facility, and each secondary key defines a on-to-primary key communication node of said communication facility.
19. The method according to claim 6, wherein the primary key and the secondary keys each define a one-to-all keys communication node of said communication facility.
20. The method according to any one of the preceding claims, wherein the keys associated into the key set are provided to a stand-alone electronic device.
21. The method according to claim 20, wherein the electronic device comprises a digital camera device or a vending machine.
22. The method according to claim 21, wherein the digital camera outputs the keys to a user of the digital camera.
23. The method according to claim 21 , wherein the vending machine generates business cards incorporating the keys.
24. The method according to claim 8, wherein the control function comprises allowing a party to import an electronic identity associated with said party into the communication facility.
25. The method according to claim 24, wherein the communication facility comprises means for selectively linking the communication node defined by said party's key to said imported electronic identity.
26. A system of maintaining a communication system, the system comprising: a database, associating a plurality of keys into a key set; means for thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; a device for providing an interface for enabling a party to input a key; means for interrogating the database to verify that the key belongs to the key set; and means for enabling access to the communication facility upon verification.
27. The system according to claim 26, wherein in the database information associated with the communication facility is stored in a manner such that the information is indexed by the key set.
28. The system according to claim 27, wherein the information includes one or more of a group consisting of content provided via the communication facility, personal data entered by a party using one of the plurality of keys, payment data entered by a party using one of the plurality of keys, and personalization data entered by a party using one of the plurality of keys.
29. The system according to any one of claims 26 to 28, further comprising means for reproducing at least one of the plurality of keys in the key set on a token for distribution to a party, or means for distributing at least one of the plurality of keys in digital format.
30. The system according to claim 29, wherein the token comprises at least part of one or more of a group consisting of a sticker, a paper business card or calling card, a wristband, a packaging of a consumer product, and a printed advertisement.
31. The system according to any one of claims 26 to 30, further comprising means for designating a first of the plurality of keys as a primary key and at least one second key as a secondary key.
32. The system according to claim 31, further comprising means for determining whether a party has input the primary key, and allowing access to the communication facility only if it is determined that the primary key has been input.
33. The system according to any one of claims 26 to 32, further comprising means for providing a plurality of control functions to parties to the communication facility.
34. The system according to claim 33, wherein the control functions associated with different keys of the key set are different.
35. The system according to claims 33 or 34, wherein the control functions include one or more of a group consisting of generating a communication-specific user interface screen for display to parties using the communication facility, controlling the appearance of the communication-specific user interface screen, generating a party- specific user interface screen for display to that party when using the communication facility, controlling the appearance of the party-specific user interface screen, allowing a party to input a username or other data for identifying himself to other parties to the communication facility, allowing a party to input personal identification information relating to himself, allowing a party to input payment information for effecting payment for a product or service, a function for allowing a party to purchase key sets, allowing a party to associate a further key set with the communication facility, allowing a party to associate a further key with the key set, a withdraw function for allowing a party to terminate his participation in the communication facility, a cancel function for allowing a party to terminate the communication facility.
36. The system according to claim 35, wherein the withdraw function triggers the step of making any submission made by that party to the electronic communication facility inaccessible by the parties.
37. The system according to claim 36, wherein the records of submissions made by that party are deleted from the server.
38. The system according to claim 35, wherein the "cancel function triggers the step of making the communication facility inaccessible by the parties.
39. The system according to claim 38, wherein the communication facility is deleted from the server.
40. The system according to any one of claims 26 to 39, further comprising means for making the communication facility inaccessible when predetermined conditions are satisfied.
41. The system according to claim 40, wherein the predetermined conditions include that a predetermined time period has elapsed since the communication facility was established.
42. The system according to claim 41, further comprising means for allowing a party to increase the predetermined time period.
43. The system according to claim 31, wherein the primary key defines a one- to-all keys communication node of said communication facility, and each secondary key defines a on-to-primary key communication node of said communication facility.
44. The system according to claim 31 , wherein the primary key and the secondary keys each define a one-to-all keys communication node of said communication facility.
45. The system according to any one of claims 26 to 44, wherein the keys associated into the key set are provided by the system to a stand-alone electronic device.
46. The system according to claim 45, wherein the electronic device comprises a digital camera device or a vending machine.
47. The system according to claim 46, wherein the digital camera outputs the keys to a user of the digital camera.
48. The system according to claim 46, wherein the vending machine generates business cards incorporating the keys.
49. The system according to claim 33, wherein the control function comprises allowing a party to import an electronic identity associated with said party into the communication facility.
50. The system according to claim 49, wherein the communication facility comprises means for selectively linking the communication node defined by said
- party's key to said imported electronic identity.
51. A data storage medium having stored thereon computer code means for instructing a computing device to execute a method of maintaining a communication system, the method comprising the steps of: in a database, associating a plurality of keys into a key set; thereafter establishing a communication facility for the key set such that each key of the key set defines a communication node in the communication facility; on a device, providing an interface for enabling a party to input a key; interrogating the database to verify that the key belongs to the key set; and enabling access to the communication facility upon verification.
PCT/SG2009/000424 2008-11-13 2009-11-13 Communication system WO2010056208A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2008905867 2008-11-13
AU2008905867A AU2008905867A0 (en) 2008-11-13 System and method for facilitating anonymous communication

Publications (1)

Publication Number Publication Date
WO2010056208A1 true WO2010056208A1 (en) 2010-05-20

Family

ID=42170168

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2009/000424 WO2010056208A1 (en) 2008-11-13 2009-11-13 Communication system

Country Status (1)

Country Link
WO (1) WO2010056208A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020007453A1 (en) * 2000-05-23 2002-01-17 Nemovicher C. Kerry Secured electronic mail system and method
US20020095569A1 (en) * 2001-01-17 2002-07-18 Jerdonek Robert A. Apparatus for pre-authentication of users using one-time passwords
US20040117650A1 (en) * 2002-12-11 2004-06-17 Jeyhan Karaoguz Secure media peripheral association in a media exchange network
US20070258594A1 (en) * 2006-05-05 2007-11-08 Tricipher, Inc. Secure login using a multifactor split asymmetric crypto-key with persistent key security
WO2007128134A1 (en) * 2006-05-09 2007-11-15 Travelnet Technologies Inc. Secure wireless guest access
GB2444339A (en) * 2006-12-01 2008-06-04 David Irvine Shared access to private files in a distributed network
US20090086974A1 (en) * 2007-10-02 2009-04-02 Masana Murase Support for Multiple Security Policies on a Unified Authentication Architecture

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020007453A1 (en) * 2000-05-23 2002-01-17 Nemovicher C. Kerry Secured electronic mail system and method
US20020095569A1 (en) * 2001-01-17 2002-07-18 Jerdonek Robert A. Apparatus for pre-authentication of users using one-time passwords
US20040117650A1 (en) * 2002-12-11 2004-06-17 Jeyhan Karaoguz Secure media peripheral association in a media exchange network
US20070258594A1 (en) * 2006-05-05 2007-11-08 Tricipher, Inc. Secure login using a multifactor split asymmetric crypto-key with persistent key security
WO2007128134A1 (en) * 2006-05-09 2007-11-15 Travelnet Technologies Inc. Secure wireless guest access
GB2444339A (en) * 2006-12-01 2008-06-04 David Irvine Shared access to private files in a distributed network
US20090086974A1 (en) * 2007-10-02 2009-04-02 Masana Murase Support for Multiple Security Policies on a Unified Authentication Architecture

Similar Documents

Publication Publication Date Title
CA3006899C (en) Systems and methods for an advanced moderated online event
US9787617B2 (en) Method and system for establishing a communication between mobile computing devices
US20130132230A1 (en) System, method and computer program for signing and dedicating informaton objects
US20080195699A1 (en) System and Method for Providing Avatar with Variable Appearance
US20080104496A1 (en) Method and system for facilitating social payment or commercial transactions
EP3523931B1 (en) Method and system for establishing a communication between mobile computing devices
US20090177975A1 (en) Image design system
WO2022090841A1 (en) A platform for enabling users for short video creation, publication and advertisement
US20160335681A1 (en) Selectively Shared and Custom-Branded/Re-branded Online Subscription Merchandising
US20230252540A1 (en) User applications store and connecting, registering, following with and synchronizing or accessing user data of user applications from/to parent application and other user applications
EP2728838A1 (en) Device, method, and program for message exchange and conversation via network
US20090328081A1 (en) Method and system for secure content hosting and distribution
KR100456487B1 (en) personal icon providing system and method thereof
US20210150587A1 (en) Engagement analytics on mixed digital/physical platforms
KR102275291B1 (en) System for artificial intelligence matching using media platform and method thereof
JP2008077521A (en) Campaign execution system
US20080162654A1 (en) Anonymous network communication system and methods of doing business
US11017438B2 (en) Method and systems for automatic management of sponsorship of a user's contact information
JP2013544405A (en) System and method for providing social networking service
WO2010056208A1 (en) Communication system
US20130024514A1 (en) Method and system for creating online connectivity among businesses and individuals while preserving an individual's anonymity
CN114244791B (en) Data processing method, device and readable storage medium
KR100855568B1 (en) System and Method for Processing Information for Entertainer Brand Company Establishment and Stocks Dividend, Devices and Recording Medium
Rachmat et al. SOCIAL MEDIA, APPLICATIONS AND UNDERSTANDING IN THE COMMUNITY (EXPOLATORY STUDY: SOCIAL MEDIA LITERATION IN CITIZENS
KR100708059B1 (en) Method of constructing and managing the homepage of legal entity and the system thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09826384

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 060911

122 Ep: pct application non-entry in european phase

Ref document number: 09826384

Country of ref document: EP

Kind code of ref document: A1