Method and system of privacy enablement in a family networking computing platform

ABSTRACT

In one aspect, a method of a managing privacy in an online social network comprising: providing an online social network, wherein the online social network comprises a set of nodes, wherein each node represents a user and a set of relationships between each node; identifying a set of users that are members of the same family; identifying each node of the set of users that are members of the same family; when a member of the set of users interacts with another member of the set of users; determine an interaction; determine a family-relationship status between the member and the other member; and score the interaction; generating a family bonding index based on the family relationship status of the member and the other member and the score the interaction; updating the set of relationships of the online social network based on the family bonding index; providing an online social-networking messenger service, wherein the online social-networking messenger service enables the member and the other member to interact via a chat protocol, wherein the chat protocol comprises private chat messages between the member and the other member that are not visible to any other user of the online social-networking messenger service; and wherein the user can implement a privacy mode that means that the user is not visible or searchable by any other users of the family networking-computing platform online social network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a claims priority from U.S. Provisional PatentApplication No. 62/322,794, filed on 15 Apr. 2016. This application ishereby incorporated by reference in its entirety.

This application is a continuation in part of U.S. patent applicationSer. No. 15/342,362, filed on 3 Nov. 2016. This application is herebyincorporated by reference in its entirety. U.S. patent application Ser.No. 15/342,362, filed on 3 Nov. 2016 claims priority to U.S. ProvisionalPatent Application No. 62/322,794, filed on 15 Apr. 2016.

FIELD OF THE INVENTION

The invention is in the field of online social networks and morespecifically to a method, system and apparatus of privacy enablement ina family networking computing platform.

DESCRIPTION OF THE RELATED ART

Online social networks can be a social networking service implemented bya computing platform. Online social networks can be accessible viauser's various computing devices (e.g. via a web browser in a mobiledevice, etc.). Online social networks can be analyzed using Socialnetwork analysis (SNA). SNA can be used to identify the typesrelationships between users of the online social network. Specific typesof relationships can lead to various insights into the nature of theonline social network. In this way, the online social network can beupdated based on changes to user relationships. Various types of userscan be aggregated together as well. Families form a basic unit of humansocial living. Family members can use online social networking servicesto interact with each other. Accordingly, improvements to managingonline social networking services for family members are desired.

BRIEF SUMMARY OF THE INVENTION

In one aspect, a method of a managing privacy in an online socialnetwork comprising: providing an online social network, wherein theonline social network comprises a set of nodes, wherein each noderepresents a user and a set of relationships between each node;identifying a set of users that are members of the same family;identifying each node of the set of users that are members of the samefamily; when a member of the set of users interacts with another memberof the set of users; determine an interaction; determine afamily-relationship status between the member and the other member; andscore the interaction; generating a family bonding index based on thefamily relationship status of the member and the other member and thescore the interaction; updating the set of relationships of the onlinesocial network based on the family bonding index; providing an onlinesocial-networking messenger service, wherein the onlinesocial-networking messenger service enables the member and the othermember to interact via a chat protocol, wherein the chat protocolcomprises private chat messages between the member and the other memberthat are not visible to any other user of the online social-networkingmessenger service; and wherein the user can implement a privacy modethat means that the user is not visible or searchable by any other usersof the family networking-computing platform online social network.

BRIEF DESCRIPTION OF THE DRAWINGS

The present application can be best understood by reference to thefollowing description taken in conjunction with the accompanyingfigures, in which like parts may be referred to by like numerals.

FIG. 1 illustrates an example system for implementing familynetworking-computing platform, according to some embodiments.

FIG. 2 illustrates an example family networking-computing platformserver(s), according to some embodiments.

FIG. 3 illustrates an example process for implementing an unsafegeographic area for a family in a family networking-computing platform,according to some embodiments.

FIG. 4 illustrates an example process for implementing a family-bondingindex, according to some embodiments.

FIG. 5 is a block diagram of a sample-computing environment that can beutilized to implement some embodiments.

FIG. 6 depicts an exemplary computing system that can be configured toperform any one of the processes provided herein.

FIG. 7 illustrates an example process for managing an online socialnetwork, according to some embodiments.

FIG. 8 illustrates an example process of managing private messages,according to some embodiments.

FIG. 9 illustrates an example process of managing private messages,according to some embodiments.

FIG. 10 illustrates an example screenshot of a chat/post landing page ofa Family networking messaging service.

FIGS. 11 A-C illustrate an example screenshot for initiatingchats/posting in a Family networking messaging service.

FIG. 12 illustrates an example screenshot of group chat/post pages of aFamily networking messaging service.

FIGS. 13 A-B illustrate an example screenshot inside an active chatsession of a Family networking messaging service.

FIG. 14 illustrates an example screenshot of inside an active Group Chatof a Family networking messaging service.

FIG. 15 illustrates an example screenshot inside an active post sessionof a Family networking messaging service.

FIG. 16 illustrates an example screenshot of a private reply of a Familynetworking messaging service.

FIGS. 17 A-B illustrate an example screenshot for creating a one-to-onechat out of a group discussion of a Family networking messaging service.

FIG. 18 illustrates an example screenshot for creating a pop-outone-to-one chat out of a group discussion in a Family networkingmessaging service.

FIG. 19 illustrates an example screenshot of another group chat in aFamily networking messaging service.

FIG. 20 illustrates an example screenshot of a reply in a group chat ina Family networking messaging service.

FIG. 21 illustrates an example process for implementing a specifiedchat/post functionality in a family networking-computing platform,according to some embodiments.

FIG. 22 illustrates an example screenshot for implementing chat/postfunctionality in a family networking-computing platform, according tosome embodiments.

FIG. 23 illustrates an example process for providing an invisible useraccount in a family networking-computing platform, according to someembodiments.

FIGS. 24 and 25 depict additional screen shots for implementing someembodiments.

The Figures described above are a representative set, and are not anexhaustive with respect to embodying the invention.

DETAILED DESCRIPTION

Disclosed are a system, method, and article of manufacture of privacyenablement in a family networking computing platform. The followingdescription is presented to enable a person of ordinary skill in the artto make and use the various embodiments. Descriptions of specificdevices, techniques, and applications are provided only as examples.Various modifications to the examples described herein will be readilyapparent to those of ordinary skill in the art, and the generalprinciples defined herein may be applied to other examples andapplications without departing from the spirit and scope of the variousembodiments.

Reference throughout this specification to “one embodiment,” “anembodiment,” “one example,” or similar language means that a particularfeature, structure, or characteristic described in connection with theembodiment is included in at least one embodiment of the presentinvention. Thus, appearances of the phrases “in one embodiment,” “in anembodiment,” and similar language throughout this specification may, butdo not necessarily, all refer to the same embodiment.

Furthermore, the described features, structures, or characteristics ofthe invention may be combined in any suitable manner in one or moreembodiments. In the following description, numerous specific details areprovided, such as examples of programming, software modules, userselections, network transactions, database queries, database structures,hardware modules, hardware circuits, hardware chips, etc., to provide athorough understanding of embodiments of the invention. One skilled inthe relevant art can recognize, however, that the invention may bepracticed without one or more of the specific details, or with othermethods, components, materials, and so forth. In other instances,well-known structures, materials, or operations are not shown ordescribed in detail to avoid obscuring aspects of the invention.

The schematic flow chart diagrams included herein are generally setforth as logical flow chart diagrams. As such, the depicted order andlabeled steps are indicative of one embodiment of the presented method.Other steps and methods may be conceived that are equivalent infunction, logic, or effect to one or more steps, or portions thereof, ofthe illustrated method. Additionally, the format and symbols employedare provided to explain the logical steps of the method and areunderstood not to limit the scope of the method. Although various arrowtypes and line types may be employed in the flow chart diagrams, andthey are understood not to limit the scope of the corresponding method.Indeed, some arrows or other connectors may be used to indicate only thelogical flow of the method. For instance, an arrow may indicate awaiting or monitoring period of unspecified duration between enumeratedsteps of the depicted method. Additionally, the order in which aparticular method occurs may or may not strictly adhere to the order ofthe corresponding steps shown.

Definitions

The following are example definitions that can be utilized to implementsome embodiments.

Backtesting can refer to testing a predictive model using existinghistoric data. Backtesting is a kind of retrodiction, and a special typeof cross-validation applied to time series data.

Behavioral analytics is a subset of business analytics that focuses onhow and why a user of a specified application behaves.

Bootstrap aggregating (‘bagging’) can be a machine learning ensemblemeta-algorithm designed to improve the stability and accuracy of machinelearning algorithms used in statistical classification and regression.

Chatbot can be a computer program which conducts a conversation viaauditory and/or textual methods.

Cluster analysis or clustering is the task of grouping a set of objectsin such a way that objects in the same group (called a cluster) are moresimilar (in some sense or another) to each other than to those in othergroups (clusters).

Computing platform can be a framework on which applications may be run.It can include various hardware architecture, operating systems (OS),and/or runtime libraries

Data aggregator can be an organization involved in compiling informationfrom detailed databases on individuals and providing that information toothers.

Database management system (DBMS) can be a computer program (or moretypically, a suite of them) designed to manage a database, a large setof structured data, and run operations on the data requested by numeroususers, processes, etc.

Ensemble learning can use multiple learning algorithms to obtain betterpredictive performance than could be obtained from any of theconstituent learning algorithms.

Instant messaging (IM) can be a type of online chat that offersreal-time text transmission over the Internet. Short messages aretypically transmitted bi-directionally between two parties, when eachuser chooses to complete a thought and select ‘send’.

Logistic regression can include, inter alia, measuring the relationshipbetween the categorical dependent variable and one or more independentvariables, which are usually (but not necessarily) continuous, by usingprobability scores as the predicted values of the dependent variable.

Machine learning can include various methods of enabling computerprocesses to make and improve predictions or behaviors based on testdata. Machine learning can include the construction and study of systemsthat can learn from data. Example machine learning techniques that canbe used herein include, inter alia: decision tree learning, associationrule learning, artificial neural networks, inductive logic programming,support vector machines, clustering, Bayesian networks, reinforcementlearning, representation learning, similarity and metric learning,and/or sparse dictionary learning.

Mobile device can include a handheld computing device that includes anoperating system (OS), and can run various types of applicationsoftware, known as apps. Example handheld devices can also be equippedwith various context sensors (e.g. biosensors, physical environmentalsensors, etc.), digital cameras, Wi-Fi, Bluetooth, and/or GPScapabilities. Mobile devices can allow connections to the Internetand/or other Bluetooth-capable devices, such as an automobile, awearable computing system and/or a microphone headset. Exemplary mobiledevices can include smart phones, tablet computers, optical head-mounteddisplay (OHMD), virtual reality head-mounted display, smart watches,other wearable computing systems, etc.

Mean squared error (MSE) of an estimator can measure the average of thesquares of the “errors”, that is, the difference between the estimatorand what is estimated.

Online chat can utilize communication over the Internet that offers areal-time transmission of text messages from sender to receiver. In someembodiments, online chat can include any direct text-based orvideo-based (e.g. with webcams), one-on-one chat or one-to-many groupchat (formally also known as synchronous conferencing), using tools suchas instant messengers, Internet Relay Chat (IRC), etc.

Random forest can be an ensemble learning method for classification,regression and other tasks, that operate by constructing a multitude ofdecision trees at training time and outputting the class that is themode of the classes (e.g. classification) or mean prediction (e.g.regression) of the individual trees. Random forests can correct fordecision trees' habit of overfitting to their training set. As anensemble method, random Forest can combine one or more ‘weak’machine-learning methods together. Random forest can be used insupervised learning (e.g. classification and regression), as well asunsupervised learning (e.g. clustering).

Recommendation system can be a type of information filtering system thatpredicts the rating and/or preference that a user would give to an item(e.g. a family activity, vacation destination, gift, etc.).

Social networking service can be an online platform that is used bypeople to build social networks or social relations with other peoplewho share similar personal or career interests, activities, backgroundsor real-life connections.

Test data set can be a set of data used in various areas of informationscience to assess the strength and utility of a predictive relationship.

Training set can be a set of data used in various areas of informationscience to discover potentially predictive relationships. Training setscan be used in artificial intelligence, machine learning, geneticprogramming, intelligent systems, and statistics.

Exemplary Systems

FIG. 1 illustrates an example system 100 for implementing familynetworking-computing platform, according to some embodiments. System 100can include a plurality of family members 102. In one example, a familycan include a group of people affiliated by consanguinity (e.g. byrecognized birth), affinity (e.g. by marriage), co-residence, legaldefinitions, etc. Family members 102 can utilize one or moreuser-computing devices 104 to access computer network(s) (e.g. theInternet, etc.). In some embodiments, user-computing devices 104 caninclude client-side applications for implementing user-sidefunctionalities related to a family networking-computing platform. Thefamily networking-computing platform can be implemented on one or morefamily networking-computing platform server(s) 108. It is noted, that insome examples, a user can have more than one mobile device and/or usemore than one type of mobile device (e.g. a mobile phone and a wearablesmart watch).

Example functionalities of family networking-computing platformserver(s) 108 are provided infra in FIG. 2. In some embodiments, familynetworking-computing platform server(s) 108 can implement a socialnetworking platform for families. Family networking-computing platformserver(s) 108 can obtain family member profiles and/or preferences.These can be obtained from explicit user-provided information.

These can also be constructed from implicit profiles created byanalyzing family member behavior (e.g. ‘likes’, sharing actions, mediaaccessed, news items accessed, other online social networking behavior,etc.). Family networking-computing platform server(s) 108 can makevarious recommendations (e.g. family activities, inviting members,suggested gifts, etc.) for families. For examples, parses big data aboutusers using machine-learning algorithms. Explicit family member profileinformation can include, inter alia: birthdays, demographic data, onlinesocial networking profiles, hobbies, favorites books, favorite movies,favorite music, favorite sports teams, education, career information,pet information, aspirational activities, etc.

For example, family networking-computing platform server(s) 108 cancollects data from user's social profiles, in-application behavior,mobile phone information (e.g. GPS data, time stamps, etc.). Based onthis information, family networking-computing platform server(s) 108 cangenerate a user profile of interests (e.g. a set of topics that eachfamily member cares about in terms of possible activities, gifts,vacation destinations, etc.). Family networking-computing platformserver(s) 108 can then utilize various online social networking servicesto communicate this information to family members at appropriate times(e.g. via in-application push notifications, text messages, emails, andthe like). Family networking-computing platform server(s) 108 can sharethis information with other members. Information can be abstracted suchthat the sharing of family member preferences is comfortable for allfamily members. Family networking-computing platform server(s) 108 cansuggest common family interests for vacation, can suggest gifts of ahusband for his wife, etc. It is noted that a family can have anextended form as well. Like two users are member of a family if there isany family-related connection (e.g. through another family relation)between them.

Family networking-computing platform server(s) 108 can provide a websiteto host the online social network for families. Familynetworking-computing platform server(s) 108 can provide a homepage. Thehomepage can provide user updates through a personalized feed (e.g.based on a user's explicit or implicit likes, etc.). Familynetworking-computing platform server(s) 108 can use machine-learning torefine a user's feed based on news the user is reading and not readingas this behavior can further imply user interests. Also, thisinformation can be used to make newsfeed more accurate to user'sinterests. Data used by family networking-computing platform server(s)108 can be stored in data store 110. Family networking-computingplatform server(s) 108 can also obtain data from third-party servicesserver(s) 112 (e.g. GPS data, mapping services, other social networkingAPI's, analytics services, newsfeed sources, vacation/travel services,e-commerce companies, etc.). This information can be posted to theonline social network.

FIG. 2 illustrates an example family networking-computing platformserver(s) 108, according to some embodiments. Familynetworking-computing platform server(s) 108 can include onlinesocial-networking platform 200. Online social-networking platform 200can implement the online social-networking functionalities (e.g.newsfeeds, image sharing, messaging, status updates, etc.). The socialnetworking service can include a platform to build social networks orsocial relations among people who share similar interests, activities,backgrounds or real-life connections.

Family networking-computing platform server(s) 108 can include analyticsand recommendation engine 202. Analytics and recommendation engine 202can analyze user behavior (e.g. social networking graphs, userrecommendations/likes/shares, microblog posts, status updates, profiles,media accessed, contacts, web browser history, e-commerce relatedbehavior, etc.). Analytics and recommendation engine 202 can include arecommendation system for making family-related recommendations (e.g.vacations, gifts, activities, etc.) based on said user behavior.Analytics and recommendation engine 202 can implement machine-learningalgorithms. For example, analytics and recommendation engine 202 canlearn from previous user behavior. This can be used to increase theaccuracies of later interactions with the user. For example, analyticsand recommendation engine 202 can use machine learning to learn fromuser behavior vis-à-vis past recommendation and modify the attributes oflater recommendation results based on the user's subsequent behaviorpatterns. Analytics and recommendation engine 202 can rankrecommendations based on various factors (e.g. past user behavior, userdemographics, user incomes, user profiles, behaviors of other familymember connections, etc.). It is noted that recommendations can be basedon users' past behaviors but also on their availability that can befound from the organizer module 206.

Safety module 204 can be used to implement a geographic-zone safetyfeature in the family-network computing platform. For example, a user(e.g. a parent, etc.) can define one or more unsafe zones for family andself. For example, the user can drop points on a map to define an unsafezone. In one example, the user can drop three (3) or more pins that thencan define the unsafe zone in its borders (e.g. using a mappingservice). This area/region in points is defined as unsafe. Safety module204 can then track family member's mobile devices. When a family memberenters an unsafe zone, he can receive an update that he has entered theunsafe zone (e.g. via a text message, in application message, etc.).Safety module 204 can also provide an ‘SOS’ virtual button. When the‘SOS’ virtual button is pressed, safety module 204 can send a message toa curated list of safe people (e.g. parents, uncle, grandparent, oldersiblings, civil authorities, teachers, law enforcement, etc.). In someembodiments, Safety module 204 can implement various geo-fencing (e.g.uses global positioning (GPS) or radio frequency identification (RFID)to define a geographic boundary. Then, once this “virtual barrier” isestablished, an administrator can set up triggers that send a textmessage, email alert, or app notification when a mobile device enters(or exits) the specified area) techniques and methods. Process 300,infra, illustrates an example process that can be implemented by safetymodule 204. In one example, the system can notify local police (or suchauthorities) when the SOS button is pressed. The hone number of thelocal police can be picked up based on the geo location of the user. Itis noted that shared unsafe locations and other data are re-shareable.

Organizer module 206 can manage various organizing applications. Forexample, organizer module 206 can include a calendar application thatcan be populated with important family dates. (e.g. birthdays, kid'sgames, practice times, etc.). Organizer module 206 can include atask-manager application. This can be used to add tasks/events tocalendar for a user and family members. Organizer module 206 can sendmessages/reminders to relevant family members. Organizer module 206 canimplement/manage both a time-management web application and mobileapplication in a user's mobile device.

Store module 208 can manage various e-commerce functionalities of thefamily networking-computing platform. As used herein, e-commerce caninclude the trading and/or facilitation of trading in products orservices using computer networks, such as the Internet. In one example,store module 208 can manage an online retail store that is curated foritems that can be gifted to family members, family member health careservices, etc. Store module 208 can manage electronic payments as well.

Bonding index engine 210 can calculate a family-bonding index. In someembodiments, a family-bonding index can a quantitative measure of afamily's relationships (e.g. family closeness, etc.). Bonding indexengine 210 can provide graphical view of family closeness. This can beused to show how the family networking-computing platform has increasedfamily bonding. The family-bonding index can be based on variousfactors. For example, if it is detected that a family attends a movietogether, then the family-bonding index increases. Process 400, infra,provides an example of a process for calculating a family-bonding index.The bonding index can be available for every connected pair of user(e.g. for every recorded relation, etc.).

In some embodiments, family networking-computing platform server(s) 108can be implemented in a cloud-computing platform. It is noted thatfamily networking-computing platform server(s) 108 can includeadditionally systems, not shown, such as, inter alia: database managers,search engines, natural-language processing systems, search engines, webservers, geo-fencing systems, mobile-device tracking systems, chatservices, API's, electronic payment systems, etc.

In some embodiments, system 200 can enable a user can post status updatevisible only to family members. User can check how you are connected toanother person in the world. Users can see their links (when it exists)with other users through chain of family members. Users get relevantsuggestions to add other users as family members or as “close”. Userscan mark a region as unsafe and share that with other users (in theirconnection). The other users can re-share the same with theirconnections. The system counts the number of users who accepts theunsafe location. Based on the number of acceptance, a measure ofseverity is attached to that unsafe location. System 200 can enableorganizers/calendar functionalities. User creates an event, and sharewith his/her connections. The recipient users can accept, and re-sharethe event further. The system identifies common free time within familymembers and recommend useful events for the entire family. Users canpost digital items like pictures and texts for other users in theirconnections (e.g. their family members or any other user in connectionlist. Posts can be re-shared by the recipients. All the objects createdby user (e.g. unsafe regions, event posts, etc.) can also be crossposted in other social media platforms. To add a phone number to thelist of emergency phone numbers, users need to request the owner of aphone number. If the owner of the phone number is already a member, thenthe owner gets a notification. And on approval, the number gets added touser's list of emergency numbers. In case the owner of the number is nota member, then the owner receives a message on the mobile number todownload and authorize the user to use the phone number as an emergencyphone number. Based on the location, local emergency phone numbers(police, ambulance) gets added to the list of emergency phone number.

Exemplary Methods

FIG. 3 illustrates an example process 300 for implementing an unsafegeographic area for a family in a family networking-computing platform,according to some embodiments. Process 300 can receive an unsafegeographic region from a user in step 302. Process 300 can generate aset of family members in step 304. Process 300 can periodicallydetermine location of set of family members in step 306. Process 300 candetermine when family member enters unsafe geographic region in step308. Process 300 can communicate message warning family member to familymember's mobile device in step 310.

FIG. 4 illustrates an example process 400 for implementing afamily-bonding index, according to some embodiments. In step 402,process 400 can obtain a set of inter-engagement metrics for a family.In step 404, process 400 can generate and maintain a family bondingindex. In some examples, process 400 can generate a bonding index for afamily. Process 400 can also generate a bonding index between any pairof user within a family. In other words, a bonding index can be computedbetween any relation that is being set by the users.

It is noted, that users can connect with other users with a relation.For example, if user? connects user2 as a father and user? connectsuser3 as mother, then the system can recommend user2 and user3 to addeach other as spouse.

Exemplary Environment and Architecture

FIG. 5 is a block diagram of a sample-computing environment 500 that canbe utilized to implement some embodiments. The system 500 furtherillustrates a system that includes one or more client(s) 502. Theclient(s) 502 can be hardware and/or software (e.g., threads, processes,computing devices). The system 500 also includes one or more server(s)504. The server(s) 504 can also be hardware and/or software (e.g.,threads, processes, computing devices). One possible communicationbetween a client 502 and a server 504 may be in the form of a datapacket adapted to be transmitted between two or more computer processes.The system 500 includes a communication framework 510 that can beemployed to facilitate communications between the client(s) 502 and theserver(s) 504. The client(s) 502 are connected to one or more clientdata store(s) 506 that can be employed to store information local to theclient(s) 502. Similarly, the server(s) 504 are connected to one or moreserver data store(s) 508 that can be employed to store information localto the server(s) 504.

In some embodiments, system 500 can be include and/or be utilized by thevarious systems and/or methods described herein to implement processes300, 400 as well as other processes. Processes 300 and/or 400 can bestored in databases 506 and/or 508.

FIG. 6 depicts an exemplary computing system 600 that can be configuredto perform any one of the processes provided herein. In this context,computing system 600 may include, for example, a processor, memory,storage, and I/O devices (e.g., monitor, keyboard, disk drive, Internetconnection, etc.). However, computing system 600 may include circuitryor other specialized hardware for carrying out some or all aspects ofthe processes. In some operational settings, computing system 600 may beconfigured as a system that includes one or more units, each of which isconfigured to carry out some aspects of the processes either insoftware, hardware, or some combination thereof.

FIG. 6 depicts computing system 600 with a number of components that maybe used to perform any of the processes described herein. The mainsystem 602 includes a motherboard 604 having an I/O section 606, one ormore central processing units (CPU) 608, and a memory section 610, whichmay have a flash memory card 612 related to it. The I/O section 606 canbe connected to a display 614, a keyboard and/or other user input (notshown), a disk storage unit 616, and a media drive unit 618. The mediadrive unit 618 can read/write a computer-readable medium 620, which cancontain programs 622 and/or data. Computing system 600 can include a webbrowser. Moreover, it is noted that computing system 600 can beconfigured to include additional systems in order to fulfill variousfunctionalities. In another example, computing system 600 can beconfigured as a mobile device and include such systems as may betypically included in a mobile device such as GPS systems, gyroscope,accelerometers, cameras, augmented-reality systems, etc.

In one example, the systems of FIG. 6 can be utilized to implementprocesses the systems and processes of FIGS. 1-4 and Appendix A of U.S.Provisional Patent Application No. 62/322,794, filed on 15 Apr. 2016 andincorporated herein by reference. It is noted that databases describedherein can be automatically sampled by the statistical algorithm. Thereare several methods which may be used to select a proper sample sizeand/or use a given sample to make statements (within a range of accuracydetermined by the sample size) about a specified population. Thesemethods may include, for example:

-   1. Classical Statistics as, for example, in “Probability and    Statistics for Engineers and Scientists” by R. E. Walpole and R. H.    Myers, Prentice-Hall 1993; Chapter 8 and Chapter 9, where estimates    of the mean and variance of the population are derived.-   2. Bayesian Analysis as, for example, in “Bayesian Data Analysis” by    A Gelman, 1. B. Carlin, H. S. Stern and D. B. Rubin, Chapman and    Hall 1995; Chapter 7, where several sampling designs are discussed.-   3. Artificial Intelligence techniques, or other such techniques as    Expert Systems or Neural Networks as, for example, in “Expert    Systems: Principles and Programming” by Giarratano and G. Riley, PWS    Publishing 1994; Chapter 4, or “Practical Neural Networks Recipes in    C++” by T. Masters, Academic Press 1993; Chapters 15, 16, 19 and 20,    where population models are developed from acquired data samples.-   4. Latent Dirichlet Allocation, Journal of Machine Learning Research    3 (2003) 993-1022, by David M. Blei, Computer Science Division,    University of California, Berkeley, Calif. 94720, USA, Andrew Y. Ng,    Computer Science Department, Stanford University, Stanford, Calif.    94305, USA

It is noted that these statistical and probabilistic methodologies arefor exemplary purposes and other statistical methodologies can beutilized and/or combined in various embodiments. These statisticalmethodologies can be utilized in whole or in part as well.

It is noted online social networks can be analyzed using Social networkanalysis (SNA). SNA is the process of investigating social structuresthrough the use of network and graph theories. It characterizesnetworked structures in terms of nodes (individual actors, people, orthings within the network) and the ties, edges, or links (relationshipsor interactions) that connect them. Examples of social structurescommonly visualized through social network analysis include social medianetworks, friendship and acquaintance networks, collaboration graphs,kinship, disease transmission, and sexual relationships. These networksare often visualized through sociograms in which nodes are representedas points and ties are represented as lines.

FIG. 7 illustrates an example process for managing an online socialnetwork, according to some embodiments. In step 702, process 700 canprovide an online social network. The online social network comprises aset of nodes. Each node represents a user and a set of relationshipsbetween each node. In step 704, process 700 can identify a set of usersthat are members of the same family. In step 706, process 700 canidentify each node of the set of users that are members of the samefamily. In step 708, when a member of the set of users interacts withanother member of the set of users, process 700 can determine aninteraction; determine a family-relationship status between the memberand the other member; and score the interaction. In step 710, process700 can generate a family bonding index based on the family relationshipstatus of the member and the other member and the score the interaction.In step 712, process 700 can update the set of relationships of theonline social network based on the family bonding index.

Methods and Systems of Private Messaging in a Family NetworkingComputing Platform

Various family networking-computing platform embodiments can providefamily networking messaging service. Family networking messaging servicecan include an instant messaging service and an instant-messagingservice software application which provides text (e.g. via shortmessages, etc.) and voice communication.

Instant-messaging service application can be integrated with a familynetworking-computing web-based Chat feature (e.g. can be built on anopen publish-subscribe-based lightweight messaging protocol for use ontop of the TCP/IP protocol such as an MQ Telemetry Transport (MQTT)protocol, etc.).

Family networking messaging service can enable family networking serviceusers to chat with friends both on via a mobile-device applicationand/or on a main family networking messaging service website. Familynetworking messaging service can support chatbots.

Family networking messaging service can enable users to use a variety ofprivacy chat options. Family networking messaging service can enableprivate replies. For example, while in a group chat and/or in a post, auser can privately reply to another participant in that groupdiscussion. The private reply can be shown only to the two usersincluded in the private reply. The private reply can remain hidden fromany other participant of the group chat or visitors of the post. A replyprovided to a private message can remain private.

A user can use an invisibility message (e.g. chat message, post, etc.)feature as well. The invisibility message feature can enable the usercan have a close relation (e.g. a definition of a relationship amongeight (8) defined relationships, including: Mother, Father, Spouse,Daughter, Son, Sister, Brother and Close) invisible in their network.For example, when another user reviews the users' public profile on thesocial network, the other users are not able to see any enumeratedinvisible connections of the user. Only the user can see his/her closerelation connections

It is noted that the following communication states can be implementedby the Family networking messaging service based on a user's selection.If a user selects as the recipient only one user, then it is a privatechat is implemented. If more than one user is selected then a group chatis implemented. If an entire online social networking community isselected, then a post is implemented.

Family networking messaging service can provide spinoff chats from agroup chat (e.g. an online chat, etc.). Spinoff chats can includeprivate replies. If the private reply continues to a certain extent,and/or if any one of the participants in the private thread of the groupchat wishes, then the two participants of the private chat spin off fromthe group chat as one-to-one chat.

Family networking messaging service can provide private comments inbetween public posts and/or group chat messages.

A user can set a lifetime that private comments, private comments,and/or any other communications are available for others to access. Forexample, when a user is sending a message, the user can add a life timeof five (5) minutes. Accordingly, after five (5) minutes of receivingthe message, the message can vanish from the recipient's screen. It isnoted that the new spin off chat window can have a reference link to themain chat. User can press the reference link to get back to the parentgroup chat.

The counting of life time can begin from the time the message is sent,or form the time the message is received. This is an option can beprovided to the users sending the message.

Family networking messaging service can provide invisible connections. Auser can identify some connections with other users to be invisible. Inthis way, said connection (e.g. friends, following, likes, shares, etc.)do not appear in the user's list of connections. In one example, theuser cannot bring any of my invisible connections to a group chat.Family networking messaging service can provide a mix of privatemessaging and public content, including brand networks, publications,and live events such as sports and music.

FIG. 8 illustrates an example process 800 of managing private messages,according to some embodiments. In step 802, process 800 can integrate amessaging service application with a family networking computingweb-based chat feature. In step 804, process 800 can enable users to usea variety of privacy chat options. In step 806, process 800 can providethat a private reply remains hidden from any other participant of thegroup chat or visitors of the post.

FIG. 9 illustrates an example process 900 of managing private messages,according to some embodiments. In step 902, process 900 can integrate amessaging service application with a family networking-computingweb-based chat feature. In step 904, process 900 can enable users to usea variety of chat options. In step 906, process 900 can provide that aprivate chat/post can be set to disappear after a set time period.

FIGS. 10-20 illustrate example screen shots 1000-2000 of messagesimplemented with a Family networking messaging service, according tosome embodiments. More specifically, FIG. 10 illustrates an examplescreenshot 1000 of a chat/post landing page of a Family networkingmessaging service. FIGS. 11 A-C illustrate an example screenshot 1100for initiating chats/posting in a Family networking messaging service.FIG. 12 illustrates an example screenshot 1200 of group chat/post pagesof a Family networking messaging service. FIGS. 13 A-B illustrate anexample screenshot 1300 inside an active chat session of a Familynetworking messaging service. FIG. 14 illustrates an example screenshot1400 of inside an active Group Chat of a Family networking messagingservice. FIG. 15 illustrates an example screenshot 1500 inside an activepost session of a Family networking messaging service. FIG. 16illustrates an example screenshot 1600 of a private reply of a Familynetworking messaging service. FIGS. 17 A-B illustrate an examplescreenshot 1700 for creating a one-to-one chat out of a group discussionof a Family networking messaging service. FIG. 18 illustrates an examplescreenshot 1800 for creating a pop-out one-to-one chat out of a groupdiscussion in a Family networking messaging service. FIG. 19 illustratesan example screenshot 1900 of another group chat in a Family networkingmessaging service. FIG. 20 illustrates an example screenshot 2000 of areply in a group chat in a Family networking messaging service.

Additional Functionalities

FIG. 21 illustrates an example process 2100 for implementing a specifiedchat/post functionality in a family networking-computing platform,according to some embodiments. Family networking-computing platform canbe family networking-computing platform 108. The feature can beimplemented in a family networking-computing platform 108. The chat/postfunctionality can be categorized in three sub categories (e.g. singlechat, group chat and post in single chat) by process 2100.

More specifically, in step 2102, process 2100 can implement a singlechat functionality. In step 2104, process 2100 can implement a groupchat functionality. In step 2106, process 2100 can implement postfunctionalities.

In one example of process 2100, in a single chat functionality 2102, twousers can communicate, using the chat/post functionality, betweenthemselves by writing text messages or sharing pictures, location, etc.As noted supra, a disappearing message feature can be provided. With thedisappearing message feature, the electronic message can disappear fromthe in-application chat box GUI element of both the users once thereceiver of the disappearing message reads that message.

In a group chat functionality 2104, a group of users can communicatebetween them by writing text messages or sharing pictures, location,etc. Process 2100 can provide a private comment option. In the privatecomment option, any user can comment privately in the group chat. Theprivate comment is viewable only to the initiator of the comment and towhom the comment has been made.

Process 2100 can use the post functionality 2106 to publish a post to auser's timeline. While creating the post, process 2100 can provide anoption of whether the post is to be shared with the entire familynetworking-computing platform community; with the particular network ofuser; or with the family members only. Process 2100 can provide theoption of making private comments in posts as well. In this option, ifany user makes any private comment, that comment can be seen only bythat user and the initiator of the post.

FIG. 22 illustrates an example screenshot 2200 for implementingchat/post functionality in a family networking-computing platform,according to some embodiments. More specifically, screenshot 2200depicts the ease of selecting the nature of the feature ‘Chat & Post’ bytapping an icon beside the copy ‘Share’ icon.

FIG. 23 illustrates an example process 2300 for providing an invisibleuser account in a family networking-computing platform, according tosome embodiments. Family networking-computing platform can be a familynetworking-computing platform 108. In step 2302, process 2300 canprovide a user's account in a family networking-computing platform. Instep 2304, process 2300 can receive an instruction from the user toplace the account in a private mode. In step 2306, process 2300 providethe user's account a unique identifier. In step 2308, can set the user'saccount in private mode unviewable and unsearchable by other usersunless the unique identifier is provided.

In one example, a user can use process 2300 to place an account in aprivate mode. Accordingly, the user's profile cannot be visible orsearchable by any other user, unless the invisible user shares itsunique identifier to any other user. In this way, the user's privatemode profile can only be searched under that unique identifier. Process2300 can also provide an option to connect with the user via sending aconnection request tapping connect tab in the user's profile. Whensending connection request, a family networking-computing platformengine can request the nature of the connection as either: ‘close’ or‘likeminded’. Once connected, an invisible user can remain connected asa ‘close private’ state or a ‘likeminded’ state. Accordingly, in thefamily networking-computing platform online social network, any user cankeep itself as invisible and only visible to other users of the user'schoice.

In one example, a user can be private in the family networking-computingplatform online social network. Privacy can mean that the user is notvisible or searchable by any other users of the familynetworking-computing platform online social network. The invisible usercan share his/her unique identifier to other users, however. The usercan be searched by other users using the unique identifier. In this way,other users can view the profile of the invisible user. The private usercan have an option to connect with the user via sending a connectionrequest. The connection request can be sent by tapping a ‘connect tab’in the invisible user's profile. When sending connection request, aconnection engine can request the nature of connection as either ‘close’or ‘likeminded’. Once connected, an invisible/private user can remainconnected as a ‘close private’ or ‘likeminded private’ with the user'sconnections. In this way, a user can maintain himself/herself asinvisible and only become visible to other users of his/her choice.

FIGS. 24 and 25 depict additional screen shots for implementing someembodiments. It is noted that networking among likeminded connectionsand the same family networking methodology can be used for likemindedconnections.

CONCLUSION

Although the present embodiments have been described with reference tospecific example embodiments, various modifications and changes can bemade to these embodiments without departing from the broader spirit andscope of the various embodiments. For example, the various devices,modules, etc. described herein can be enabled and operated usinghardware circuitry, firmware, software or any combination of hardware,firmware, and software (e.g., embodied in a machine-readable medium).

In addition, it will be appreciated that the various operations,processes, and methods disclosed herein can be embodied in amachine-readable medium and/or a machine accessible medium compatiblewith a data processing system (e.g., a computer system), and can beperformed in any order (e.g., including using means for achieving thevarious operations). Accordingly, the specification and drawings are tobe regarded in an illustrative rather than a restrictive sense. In someembodiments, the machine-readable medium can be a non-transitory form ofmachine-readable medium.

What is claimed as new and desired to be protected by Letters Patent ofthe United States is:
 1. A method of a managing an online social networkcomprising: providing an online social network, wherein the onlinesocial network comprises a set of nodes, wherein each node represents auser and a set of relationships between each node; identifying a set ofusers that are members of the same family; identifying each node of theset of users that are members of the same family; when a member of theset of users interacts with another member of the set of users;determine an interaction; determine a family-relationship status betweenthe member and the other member; and score the interaction; generating afamily bonding index based on the family relationship status of themember and the other member and the score the interaction; updating theset of relationships of the online social network based on the familybonding index; providing an online social-networking messenger service,wherein the online social-networking messenger service enables themember and the other member to interact via a chat protocol, wherein thechat protocol comprises private chat messages between the member and theother member that are not visible to any other user of the onlinesocial-networking messenger service; and wherein the user can implementa privacy mode that means that the user is not visible or searchable byany other users of the family networking-computing platform onlinesocial network.
 2. The method of claim 1, wherein the chat protocolcomprises a private reply option, wherein the private reply is shownonly to a user included in the private reply.
 3. The method of claim 2,wherein another private reply in response to the private reply is hiddenfrom any other participant of the group chat, and wherein the privatereply is shown only to users that are connected in the online socialnetwork.
 4. The method of claim 3, wherein the chat protocol comprises aprivate online social networking status post that is visible only to aspecified subset of the set of users that are members of the samefamily.
 5. The method of claim 3, wherein the chat protocol comprisesthe private online social networking status post that is visible onlyother users selected by the user that posted the private online socialnetworking status post.
 6. The method of claim 1, wherein the chatprotocol generates a spinoff chats from a group chat, and wherein thespinoff chat generates the private replies, and wherein the spinoff chatcomprises a virtual reference button that return the user to a maingroup chat.
 7. The method of claim 5, wherein the chat protocol providesan option for a user to post a private comment in between public postsand a set of group chat messages.
 8. The method of claim 1, wherein thefamily relationship status of the member and the other member comprisesa parent and child relationship.
 9. The method of claim 1, wherein thefamily relationship status of the member and the other member comprisesa spousal relationship.
 10. The method of claim 1, wherein the familyrelationship status of the member and the other member comprises agrandparent and grandchild relationship.
 11. The method of claim 1further comprising: aggregating the interaction scores for all themembers of the family for a specified period.
 12. The method of claim 5further comprising: generating an aggregated family bonding index fromthe aggregated interaction scores for all the members of the family fora specified period.
 13. The method of claim 6 further comprising:updating the set of relationships of the online social network based onthe aggregated family bonding index.
 14. A mobile-device system formanaging an online social network comprising: a processor; a memorycontaining instructions when executed on the processor, causes theprocessor to perform operations that: provide an online social network,wherein the online social network comprises a set of nodes, wherein eachnode represents a user and a set of relationships between each node;identify a set of users that are members of the same family; identifyeach node of the set of users that are members of the same family; whena member of the set of users interacts with another member of the set ofusers; determine an interaction; determine a family-relationship statusbetween the member and the other member; and score the interaction;generate a family bonding index based on the family relationship statusof the member and the other member and the score the interaction; updatethe set of relationships of the online social network based on thefamily bonding index; and provide an online social-networking messengerservice, wherein the online social-networking messenger service enablesthe member and the other member to interact via a chat protocol, whereinthe chat protocol comprises private chat messages between the member andthe other member that are not visible to any other user of the onlinesocial-networking messenger service, wherein the user can implement aprivacy mode that means that the user is not visible or searchable byany other users of the family networking-computing platform onlinesocial network.
 15. The mobile-device system of claim 13, wherein thefamily relationship status of the member and the other member comprisesa parent and child relationship.
 16. The mobile-device system of claim13, wherein the family relationship status of the member and the othermember comprises a close member that is not a direct family member. 17.The mobile-device system of claim 16, wherein the chat protocolcomprises a private reply option, wherein the private reply is shownonly to a user included in the private reply.
 18. The mobile-devicesystem of claim 17, wherein another private reply in response to theprivate reply is hidden from any other participant of the group chat.19. The mobile-device system of claim 18, wherein the chat protocolcomprises a private online social networking status post that is visibleonly to a specified subset of the set of users that are members of thesame family, wherein the chat protocol provides an option for a user topost a private comment in between public posts and a set of group chatmessages, and wherein the user can set a time-based lifespan of aprivate comment such that the private comment is no longer visible afterthe time-based lifespan has elapsed.
 20. The mobile-device system ofclaim 19, wherein a subset of the set of relationships of the onlinesocial network based on the family bonding index are designated as aninvisible connection, wherein the user identifies the subset ofinvisible connections, and wherein the subset of invisible connectionsis not visible to with other users of the online social network.