Systems and methods for dynamic network pairings to enable end-to-end communications between electronic devices

ABSTRACT

A system and method for configuring network pairings enabling end-to-end communications between electronic devices is disclosed. The system receives a network pairing request from a requesting device to communicate with a target device. The system identifies historic data associated with the communication object and determines whether an affinity group associated with the requesting device is found. Further, the system determines whether the communication object has a valid permission token associated therewith. If a valid permission token is unavailable, the system checks whether a subscriber filter criteria is met by the requesting device. If the filter criteria is met, system calculates a subscriber access score (SAS) for the requesting device and compares the score to a threshold. When the SAS is greater than the predetermined threshold value, system creates a dynamic network pairing between the requesting device and the target device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of, and priority to U.S. provisionalapplication 63/082,335 titled, “SYSTEM AND METHOD FOR MULTIMODALCONCURRENT COMMUNICATIONS FOR A PLURALITY OF ANONYMOUS ENDPOINTS” filedon Sep. 23, 2020, the entire specification of which is incorporatedherein by reference.

BACKGROUND OF THE INVENTION Field of the Art

The disclosure relates to the field of communication network solutionsfor facilitating privacy and end-user control during end-to-endcommunication attempts between electronic communication devices.

Discussion of the State of the Art

Communication is fundamental to all human interactions. A vast number ofcommunications now take place through a variety of electronic channelsincluding email, chat, SMS (text messaging), AI-based chatbot, andsocial media with traditional mail, wireless, and landline telephone usedecreasing. These communications skip from channel to channel, with textmessages posted to social media, links in email opening into chatplatforms, a voice message is converted to text and emailed to therecipient. Once a person's contact information becomes known, anymarketer or scammer with the phone number, email address, or socialmedia account information can send any number of unwanted solicitationsmaking it challenging to distinguish wanted from unwantedcommunications. These open channels create issues for individualsconcerned about protecting their privacy and personal information astheir data is mined and sold to anyone willing to pay for their contactinformation.

What is needed in the art are systems and methods for dynamic andreal-time network pairings between electronic communication devices thatfacilitate complete user control and anonymity for the end-user.

SUMMARY OF THE INVENTION

Accordingly, the inventor has conceived and reduced to practice, in apreferred embodiment of the invention, a system and method ofstructuring a communication network that meets the need forcommunication devices to maintain a desired level of privacy withend-user control, real-time control over communication channels throughwhich communication devices are paired in a network pairing, as well ascomplete anonymity for the end-user. All other existing communicationnetworks focus on creating an interconnecting network that connectsendpoint addresses, so any endpoint address can access a network andconnect to any other endpoint address. They are entirely focused oncreating a complete, interconnected mesh of endpoints that leaves theindividual user and their personal information vulnerable to misuse andabuse. The methods and systems presented herein solve that problem byproviding a dynamic and risk averse mode of connecting communicationdevices.

According to a preferred embodiment, the systems and method disclosedherein may gather data associated with one or more communication devicessuch that the more data being gathered may result in increasedefficiency of the systems and methods to carry out the embodimentsdisclosed herein. For instance, especially, in scenarios whereininadequate or unreliable data between a first device and a second deviceis identified, and/or wherein a subscriber device may have a small ornon-existent affinity group, the systems and methods disclosed hereinmay aggregate data from other like subscriber devices along with thedirect and non-direct affinity groups in the hierarchy of othersubscribing devices, including but not limited to data available fromthe non-subscribing or requesting devices attempting to pair with anysubscriber device, as disclosed in the text that follows.

According to a preferred embodiment of the invention, a system forconfiguring network pairings enabling end-to-end communications betweenelectronic devices is disclosed, the system comprising anetwork-connected communication control computer comprising a memory anda processor and further comprising programmable instructions stored inthe memory and operating on the processor, the instructions whenexecuted by the processor, cause the processor to: receive, from a firstdevice, a communication object comprising at least a network pairingrequest to communicate with a second device; identify identificationinformation and historic data associated with the communication object;determine whether an affinity group associated with the first device isfound; in response to finding the affinity group associated with thefirst device, generate subscriber filter criteria for the second device;determine whether the communication object has a valid permission tokenassociated therewith; in response to a determination that thecommunication object does not have a valid permission token associatedtherewith, determine whether the subscriber filter criteria is met bythe first device; in response to a determination that the subscriberfilter criteria is met by the first device, calculate a subscriberaccess score (SAS) for the first device; determine whether the SAS isgreater than a predetermined threshold value; in response to adetermination that the SAS is greater than the predetermined thresholdvalue, determine handling criteria for the communication object; andtransmit, based at least on the determined handling criteria, thecommunication object to the second device by creating a dynamic networkpairing between the first device and the second device.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to in response to a determination that the validpermission token is associated with the communication object, transmitthe communication object to the second device by creating the dynamicnetwork pairing between the first device and the second device.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: in response to the determination that thecommunication object does not have the valid permission token associatedtherewith, create a temporary permission token for the communicationobject when the SAS for the first device is greater than thepredetermined threshold.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: in response to the determination that thecommunication object has a valid temporary permission token associatedtherewith, determine whether generation of a permanent permission tokenis required for the communication object; and generate the permanentpermission token for the communication object, in response to adetermination that the permanent permission token is required.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: in response to the determination that thecommunication object has the valid permission token associatedtherewith, determine whether the first device is authorized; and if thefirst device is authorized, forward communication object to be displayedon a graphical user interface, an audio user interface, or a combinationthereof of the second device, based at least on a type of communicationobject.

According to another preferred embodiment of the invention, the type ofcommunication object comprises one of a video call, a text message, anemail, a voice call, a multimedia message, an AI-based chatbot sessionor a combination thereof.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: if the first device is authorized, determine real-timeavailability of the second device; request a response objectcorresponding to the communication object from the second device; andtransmit the response object to be displayed on a graphical userinterface, an audio user interface, or a combination thereof on thefirst device.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: determine whether the communication object is acceptedby the second device; and in response to a determination that thecommunication object is not accepted by the second device, move thecommunication object to an unsolicited network pairing requestdirectory.

According to yet another preferred embodiment of the invention, a systemfor configuring network pairings enabling end-to-end communicationsbetween a subscriber device and an expert device is disclosed, thesystem comprising a network-connected communication control computercomprising a memory and a processor and further comprising programmableinstructions stored in the memory and operating on the processor, theinstructions when executed by the processor, cause the processor to:receive, from a subscriber device, a communication object comprising atleast a question object; determine a context of the question object;determine whether a corresponding response object is available for thereceived question object; in response to a determination that thecorresponding response object is unavailable, generate binary filtercriteria for the subscriber device; create a plurality of expertprofiles, each associated with an expert device from a plurality ofexpert devices, based at least on the binary filter criteria for thesubscriber device and the context of the question object; calculate aQuestion Attribute Score (QAS) for the question object; calculate anExpert Attribute Score (EAS) for each of the plurality of expertprofiles; rank a subset of expert profiles based on the QAS and the EAS;transmit the ranked subset of expert profiles for display on a graphicaluser interface of the subscriber device; receive a selection of anexpert profile, of the subset of expert profiles, from the subscriberdevice; determine whether a first expert device corresponding to theselected expert profile is available for a given period of time; and inresponse to a determination that the first expert device is availablefor the given period of time, create a network pairing between the firstexpert device and the subscriber device for the given period of time.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: determine whether the question object is an audio oraudio-video form; and in response to a determination that the questionobject is in the audio or audio-video form, initiate speech to textconversion to determine the context of the question object.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: in response to a determination that the correspondingresponse object is available, transmit the corresponding response objectto be displayed at a graphical user interface of the subscriber device.

According to another preferred embodiment of the invention, theprogramming instructions, when further executed by the processor causethe processor to: add the EAS and QAS to generate an Expert Score (ES);normalize the ES to analyze each expert profile of the subset of expertprofiles; and rank the subset of expert profiles based on the analysis.

According to yet another preferred embodiment of the invention, acomputer-implemented method for configuring network pairings, enablingend-to-end communications between electronic devices is disclosed, themethod comprising receiving, by a communication control computer from anetwork-connected first device, a communication object comprising atleast a network pairing request to communicate with a network-connectedsecond device; identifying, by the communication control computer,identification information and historic data associated with thecommunication object; determining, by the communication controlcomputer, whether an affinity group associated with the first device isfound; in response to finding, by the communication control computer,the affinity group associated with the first device generating, by thecommunication control computer, subscriber filter criteria for thesecond device; determining, by the communication control computer,whether the communication object has a valid permission token associatedtherewith; in response to determining, by that the communication controlcomputer, that the communication object does not have the validpermission token associated therewith, determining, by the communicationcontrol computer, whether the subscriber filter criteria is met by thefirst device; in response to determining, by the communication controlcomputer, that the subscriber filter criteria is met by the firstdevice, calculating, by the communication control computer, a subscriberaccess score (SAS) for the first device; determining, by thecommunication control computer, whether the SAS is greater than apredetermined threshold value; in response to determining, by thecommunication control computer, that the SAS is greater than thepredetermined threshold value, determining, by the communication controlcomputer, handling criteria for the communication object; andtransmitting, by the communication control computer, based at least onthe determined handling criteria, the communication object to the seconddevice by creating a dynamic network pairing between the first deviceand the second device.

According to another preferred embodiment of the invention, the methodfurther comprises, in response to determining, by the communicationcontrol computer, that the valid permission token is associated with thecommunication object, transmitting, by the communication controlcomputer, the communication object to the second device by creating thedynamic network pairing between the first device and the second device.

According to another preferred embodiment of the invention the methodfurther comprises, in response determining, by the communication controlcomputer, that the communication object does not have the validpermission token associated therewith, creating, by the communicationcontrol computer, a temporary permission token for the communicationobject when the SAS for the first device is greater than thepredetermined threshold.

According to another preferred embodiment of the invention the methodfurther comprises, in response determining, by the communication controlcomputer, that the communication object has a valid temporary permissiontoken associated therewith, determining, by the communication controlcomputer, whether generation of a permanent permission token is requiredfor the communication object; and generating, by the communicationcontrol computer, the permanent permission token for the communicationobject, in response to determining that the permanent permission tokenis required.

According to another preferred embodiment of the invention, the methodfurther comprises, in response to determining, by the communicationcontrol computer, that the communication object has the valid permissiontoken associated therewith, determining, by the communication controlcomputer, whether the first device is authorized; and if the firstdevice is authorized, forwarding, by the communication control computer,the communication object to be displayed on a graphical user interfaceof the second device, based at least on a type of communication object.

According to another preferred embodiment of the invention, the type ofcommunication object comprises one of a video call, text message, email,voice call, multimedia message, or a combination thereof.

According to another preferred embodiment of the invention, the methodfurther comprises, if the first device is authorized, determining, bythe communication control computer, real-time availability of the seconddevice; requesting, by the communication control computer, a responseobject corresponding to the communication object from the second device;and transmitting, by the communication control computer, the responseobject to be displayed on a graphical user interface of the firstdevice.

According to another preferred embodiment of the invention, the methodfurther comprises, determining, by the communication control computer,whether the communication object is accepted by the second device; andin response to determining, by the communication control computer, thatthe communication object is not accepted by the second device, moving,by the communication control computer, the communication object to anunsolicited network pairing request directory.

BRIEF DESCRIPTION OF THE DRAWING FIGURES

The accompanying drawings illustrate several embodiments of theinvention and, together with the description, serve to explain theprinciples of the invention according to the embodiments. It will beappreciated by one skilled in the art that the particular embodimentsillustrated in the drawings are merely exemplary and are not to beconsidered as limiting of the scope of the invention or the claimsherein in any way.

FIG. 1 is a block diagram illustrating an exemplary hardwarearchitecture of a computing device used in an embodiment of theinvention;

FIG. 2 is a block diagram illustrating an exemplary logical architecturefor a subscriber device 513, according to an embodiment of theinvention;

FIG. 3 is a block diagram showing an exemplary architectural arrangementof clients, servers, and external services, according to an embodimentof the invention;

FIG. 4 is another block diagram illustrating an exemplary hardwarearchitecture of a computing device used in various embodiments of theinvention;

FIG. 5 is a block diagram illustrating an exemplary system architecture,according to a preferred embodiment of the invention;

FIG. 6 illustrates an exemplary method for creating a dynamic networkpairing between a requesting device and a subscriber device, accordingto a preferred embodiment of the present invention;

FIGS. 7A-B illustrate an exemplary method for processing a communicationobject within a dynamic network pairing between requesting devices andsubscriber devices, according to a preferred embodiment of the presentinvention;

FIG. 8 illustrates an exemplary method for processing a communicationobject, comprising at least a question object, within a dynamic networkpairing between one or more expert devices and a subscriber device,according to a preferred embodiment of the present invention;

FIG. 9 illustrates an exemplary method for processing a communicationobject for creation of a dynamic network pairing between one or moreexpert devices and a subscriber device, according to a preferredembodiment of the present invention; and

FIG. 10 illustrates a block diagram for a relationship matrixconstruction comprising subscriber devices and expert devices, accordingto a preferred embodiment of the invention.

DETAILED DESCRIPTION

The inventor has conceived, and reduced to practice, a system and methodto configure dynamic network pairings between communication devices thatmay mitigate unsolicited network pairing attempts through unknown orunverified devices, thereby enabling complete end-user control andmaintaining anonymity for subscriber devices.

One or more different inventions may be described in the presentapplication. Further, for one or more of the inventions describedherein, numerous alternative embodiments may be described; it should beappreciated that these are presented for illustrative purposes only andare not limiting of the inventions contained herein or the claimspresented herein in any way. One or more of the inventions may be widelyapplicable to numerous embodiments, as may be readily apparent from thedisclosure. In general, embodiments are described in sufficient detailto enable those skilled in the art to practice one or more of theinventions, and it should be appreciated that other embodiments may beutilized and that structural, logical, software, electrical and otherchanges may be made without departing from the scope of the particularinventions. Accordingly, one skilled in the art will recognize that oneor more of the inventions may be practiced with various modificationsand alterations. Particular features of one or more of the inventionsdescribed herein may be described with reference to one or moreparticular embodiments or figures that form a part of the presentdisclosure, and in which are shown, by way of illustration, specificembodiments of one or more of the inventions. It should be appreciated,however, that such features are not limited to usage in the one or moreparticular embodiments or figures with reference to which they aredescribed. The present disclosure is neither a literal description ofall embodiments of one or more of the inventions nor a listing offeatures of one or more of the inventions that must be present in allembodiments.

Headings of sections provided in this patent application and the titleof this patent application are for convenience only and are not to betaken as limiting the disclosure in any way.

Devices that are in communication with each other need not be incontinuous communication with each other, unless expressly specifiedotherwise. In addition, devices that are in communication with eachother may communicate directly or indirectly through one or morecommunication means or intermediaries, logical or physical.

A description of an embodiment with several components in communicationwith each other does not imply that all such components are required. Tothe contrary, a variety of optional components may be described toillustrate a wide variety of possible embodiments of one or more of theinventions and to more fully illustrate one or more aspects of theinventions. Similarly, although process steps, method steps, algorithmsor the like may be described in a sequential order, such processes,methods, and algorithms may generally be configured to work in alternateorders, unless specifically stated to the contrary. In other words, anysequence or order of steps that may be described in this patentapplication does not, in and of itself, indicate a requirement that thesteps be performed in that order. The steps of described processes maybe performed in any order practical. Further, some steps may beperformed simultaneously despite being described or implied as occurringnon-simultaneously (e.g., because one step is described after the otherstep). Moreover, the illustration of a process by its depiction in adrawing does not imply that the illustrated process is exclusive ofother variations and modifications thereto, does not imply that theillustrated process or any of its steps are necessary to one or more ofthe invention(s), and does not imply that the illustrated process ispreferred. Also, steps are generally described once per embodiment, butthis does not mean they must occur once, or that they may only occuronce each time a process, method, or algorithm is carried out orexecuted. Some steps may be omitted in some embodiments or someoccurrences, or some steps may be executed more than once in a givenembodiment or occurrence.

When a single device or article is described herein, it will be readilyapparent that more than one device or article may be used in place of asingle device or article. Similarly, where more than one device orarticle is described herein, it will be readily apparent that a singledevice or article may be used in place of the more than one device orarticle.

The functionality or the features of a device may be alternativelyembodied by one or more other devices that are not explicitly describedas having such functionality or features. Thus, other embodiments of oneor more of the inventions need not include the device itself.

Techniques and mechanisms described or referenced herein will sometimesbe described in singular form for clarity. However, it should beappreciated that particular embodiments may include multiple iterationsof a technique or multiple instantiations of a mechanism unless notedotherwise. Process descriptions or blocks in figures should beunderstood as representing modules, segments, or portions of code whichinclude one or more executable instructions for implementing specificlogical functions or steps in the process. Alternate implementations areincluded within the scope of embodiments of the present invention inwhich, for example, functions may be executed out of order from thatshown or discussed, including substantially concurrently or in reverseorder, depending on the functionality involved, as would be understoodby those having ordinary skill in the art.

Hardware Architecture

Generally, the techniques disclosed herein may be implemented onhardware or a combination of software and hardware. For example, theymay be implemented in an operating system kernel, in a separate userprocess, in a library package bound into network applications, on aspecially constructed machine, on an application-specific integratedcircuit (ASIC), or on a network interface card.

Software/hardware hybrid implementations of at least some of theembodiments disclosed herein may be implemented on a programmablenetwork-resident machine (which should be understood to includeintermittently connected network-aware machines) selectively activatedor reconfigured by a computer program stored in memory. Such networkdevices may have multiple network interfaces that may be configured ordesigned to utilize different types of network communication protocols.A general architecture for some of these machines may be describedherein in order to illustrate one or more exemplary means by which agiven unit of functionality may be implemented. According to specificembodiments, at least some of the features or functionalities of thevarious embodiments disclosed herein may be implemented on one or moregeneral-purpose computers associated with one or more networks, such asfor example an end-user computer system, a client computer, a networkserver or other server system, a mobile computing device (e.g., tabletcomputing device, mobile phone, smartphone, laptop, or other appropriatecomputing device), a consumer electronic device, a music player, or anyother suitable electronic device, router, switch, or other suitabledevice, or any combination thereof. In at least some embodiments, atleast some of the features or functionalities of the various embodimentsdisclosed herein may be implemented in one or more virtualized computingenvironments (e.g., network computing clouds, virtual machines hosted onone or more physical computing machines, or other appropriate virtualenvironments).

Referring now to FIG. 1, there is shown a block diagram depicting anexemplary computing device 100 suitable for implementing at least aportion of the features or functionalities disclosed herein. Computingdevice 100 may be, for example, any one of the computing machines listedin the previous paragraph, or indeed any other electronic device capableof executing software- or hardware-based instructions according to oneor more programs stored in memory. Computing device 100 may be adaptedto communicate with a plurality of other computing devices, such asclients or servers, over communications networks such as a wide areanetwork a metropolitan area network, a local area network, a wirelessnetwork, the Internet, or any other network, using known protocols forsuch communication, whether wireless or wired.

In one embodiment, computing device 100 includes one or more centralprocessing units (CPU) 102, one or more interfaces 110, and one or morebusses 106 (such as a peripheral component interconnect (PCI) bus). Whenacting under the control of appropriate software or firmware, CPU 102may be responsible for implementing specific functions associated withthe functions of a specifically configured computing device or machine.For example, in at least one embodiment, a computing device 100 may beconfigured or designed to function as a server system utilizing CPU 102,local memory 101 and/or remote memory 120, and interface(s) 110. In atleast one embodiment, CPU 102 may be caused to perform one or more ofthe different types of functions and/or operations under the control ofsoftware modules or components, which for example, may include anoperating system and any appropriate applications software, drivers, andthe like.

CPU 102 may include one or more processors 103 such as, for example, aprocessor from one of the Intel, ARM, Qualcomm, and AMD families ofmicroprocessors. In some embodiments, processors 103 may includespecially designed hardware such as application-specific integratedcircuits (ASICs), electrically erasable programmable read-only memories(EEPROMs), field-programmable gate arrays (FPGAs), and so forth, forcontrolling operations of computing device 100. In a specificembodiment, a local memory 101 (such as non-volatile random-accessmemory (RAM) and/or read-only memory (ROM), including for example one ormore levels of cached memory) may also form part of CPU 102. However,there are many different ways in which memory may be coupled to system100. Memory 101 may be used for a variety of purposes such as, forexample, caching and/or storing data, programming instructions, and thelike. It should be further appreciated that CPU 102 may be one of avariety of system-on-a-chip (SOC) type hardware that may includeadditional hardware such as memory or graphics processing chips, such asa Qualcomm SNAPDRAGON™ or Samsung EXYNOS™ CPU as are becomingincreasingly common in the art, such as for use in mobile devices orintegrated devices.

As used herein, the term “processor” is not limited merely to thoseintegrated circuits referred to in the art as a processor, a mobileprocessor, or a microprocessor, but broadly refers to a microcontroller,a microcomputer, a programmable logic controller, anapplication-specific integrated circuit, and any other programmablecircuit.

In one embodiment, interfaces 110 are provided as network interfacecards (NICs). Generally, NICs control the sending and receiving of datapackets over a computer network; other types of interfaces 110 may forexample support other peripherals used with computing device 100. Amongthe interfaces that may be provided are Ethernet interfaces, frame relayinterfaces, cable interfaces, DSL interfaces, token ring interfaces,graphics interfaces, and the like. In addition, various types ofinterfaces may be provided such as, for example, universal serial bus(USB), Serial, Ethernet, FIREWIRE™, THUNDERBOLT™, PCI, parallel, radiofrequency (RF), BLUETOOTH™, near-field communications (e.g., usingnear-field magnetics), 802.11 (Wi-Fi), frame relay, TCP/IP, ISDN, fastEthernet interfaces, Gigabit Ethernet interfaces, Serial ATA (SATA) orexternal SATA (ESATA) interfaces, high-definition multimedia interface(HDMI), digital visual interface (DVI), analog or digital audiointerfaces, asynchronous transfer mode (ATM) interfaces, high-speedserial interface (HSSI) interfaces, Point of Sale (POS) interfaces,fiber data distributed interfaces (FDDIs), and the like. Generally, suchinterfaces 110 may include physical ports appropriate for communicationwith appropriate media. In some cases, they may also include anindependent processor (such as a dedicated audio or video processor, asis common in the art for high-fidelity A/V hardware interfaces) and, insome instances, volatile and/or non-volatile memory (e.g., RAM).

Although the system shown in FIG. 1 illustrates one specificarchitecture for a computing device 100 for implementing one or more ofthe inventions described herein, it is by no means the only devicearchitecture on which at least a portion of the features and techniquesdescribed herein may be implemented. For example, architectures havingone or any number of processors 103 may be used, and such processors 103may be present in a single device or distributed among any number ofdevices. In one embodiment, a single processor 103 handlescommunications as well as routing computations, while in otherembodiments a separate dedicated communications processor may beprovided. In various embodiments, different types of features orfunctionalities may be implemented in a system according to theinvention that includes a subscriber device 513 (such as a tablet deviceor smartphone running client software) and server systems (such as aserver system described in more detail below).

Regardless of network device configuration, the system of the presentinvention may employ one or more memories or memory modules (such as,for example, remote memory block 120 and local memory 101) configured tostore data, program instructions for the general-purpose networkoperations, or other information relating to the functionality of theembodiments described herein (or any combinations of the above). Programinstructions may control execution of or comprise an operating systemand/or one or more applications, for example. Memory 120 or memories101, 120 may also be configured to store data structures, configurationdata, encryption data, historical system operations information, or anyother specific or generic non-program information described herein.

Because such information and program instructions may be employed toimplement one or more systems or methods described herein, at least somenetwork device embodiments may include nontransitory machine-readablestorage media, which, for example, may be configured or designed tostore program instructions, state information, and the like forperforming various operations described herein. Examples of suchnontransitory machine-readable storage media include, but are notlimited to, magnetic media such as hard disks, floppy disks, andmagnetic tape; optical media such as CD-ROM disks; magneto-optical mediasuch as optical disks, and hardware devices that are speciallyconfigured to store and perform program instructions, such as read-onlymemory devices (ROM), flash memory (as is common in mobile devices andintegrated systems), solid state drives (SSD) and “hybrid SSD” storagedrives that may combine physical components of solid state and hard diskdrives in a single hardware device (as are becoming increasingly commonin the art with regard to personal computers), memristor memory, randomaccess memory (RAM), and the like. It should be appreciated that suchstorage means may be integral and non-removable (such as RAM hardwaremodules that may be soldered onto a motherboard or otherwise integratedinto an electronic device), or they may be removable such as swappableflash memory modules (such as “thumb drives” or other removable mediadesigned for rapidly exchanging physical storage devices),“hot-swappable” hard disk drives or solid state drives, removableoptical storage discs, or other such removable media, and that suchintegral and removable storage media may be utilized interchangeably.Examples of program instructions include both object code, such as maybe produced by a compiler, machine code, such as may be produced by anassembler or a linker, byte code, such as may be generated by forexample a Java™ compiler and may be executed using a Java virtualmachine or equivalent, or files containing higher level code that may beexecuted by the computer using an interpreter (for example, scriptswritten in Python, Perl, Ruby, Groovy, or any other scripting language).

In some embodiments, systems according to the present invention may beimplemented on a standalone computing system. Referring now to FIG. 2, ablock diagram depicting a typical exemplary architecture of one or moreembodiments or components thereof on a standalone computing system isshown. Computing device 200 includes processors 210 that may runsoftware that carry out one or more functions or applications ofembodiments of the invention, such as for example a client application230. Processors 210 may carry out computing instructions under controlof an operating system 220 such as, for example, a version ofMicrosoft's WINDOWS™ operating system, Apple's Mac OS/X or iOS operatingsystems, some variety of the Linux operating system, Google's ANDROID™operating system, or the like. In many cases, one or more sharedservices 225 may be operable in system 200 and may be useful forproviding common services to client applications 230. Services 225 mayfor example be WINDOWS™ services, user-space common services in a Linuxenvironment, or any other type of common service architecture used withoperating system 210. Input devices 270 may be of any type suitable forreceiving user input, including for example a keyboard, touchscreen,microphone (for example, for voice input), mouse, touchpad, trackball,or any combination thereof. Output devices 260 may be of any typesuitable for providing output to one or more users, whether remote orlocal to system 200, and may include for example one or more screens forvisual output, speakers, printers, or any combination thereof. Memory240 may be random-access memory having any structure and architectureknown in the art, for use by processors 210, for example to runsoftware. Storage devices 250 may be any magnetic, optical, mechanical,memristor, or electrical storage device for storage of data in digitalform (such as those described above, referring to FIG. 1). Examples ofstorage devices 250 include flash memory, magnetic hard drive, CD-ROM,and/or the like.

In some embodiments, systems of the present invention may be implementedon a distributed computing network, such as one having any number ofclients and/or servers. Referring now to FIG. 3, a block diagramdepicting an exemplary architecture 300 for implementing at least aportion of a system according to an embodiment of the invention on adistributed computing network is shown. According to the embodiment, anynumber of clients 330 may be provided. Each client 330 may run softwarefor implementing client-side portions of the present invention; clientsmay comprise a system 200 such as that illustrated in FIG. 2. Inaddition, any number of servers 320 may be provided for handlingrequests received from one or more clients 330. Clients 330 and servers320 may communicate with one another via one or more electronic networks310, which may be in various embodiments any of the Internet, a widearea network, a mobile telephony network (such as CDMA or GSM cellularnetworks), a wireless network (such as Wi-Fi, WiMAX, LTE, and so forth),or a local area network (or indeed any network topology known in theart; the invention does not prefer any one network topology over anyother). Networks 310 may be implemented using any known networkprotocols, including for example wired and/or wireless protocols.

In addition, in some embodiments, servers 320 may call external services370 when needed to receive additional information, or to refer toadditional data concerning a particular call. Communications withexternal services 370 may take place, for example, via one or morenetworks 310. In various embodiments, external services 370 may compriseweb-enabled services or functionality related to or installed on thehardware device itself. For example, in an embodiment where clientapplications 230 are implemented on a smartphone or other electronicdevice, client applications 230 may receive information stored in aserver system 320 in the cloud or on an external service 370 deployed onone or more of a particular enterprise's or user's premises.

In some embodiments of the invention, clients 330 or servers 320 (orboth) may make use of one or more specialized services or appliancesthat may be deployed locally or remotely across one or more networks310. For example, one or more databases 340 may be used or referred toby one or more embodiments of the invention. It should be understood byone having ordinary skill in the art that databases 340 may be arrangedin a wide variety of architectures and using a wide variety of dataaccess and manipulation means. For example, in various embodiments oneor more databases 340 may comprise a relational database system using astructured query language (SQL), while others may comprise analternative data storage technology such as those referred to in the artas “NoSQL” (for example, Hadoop Cassandra, Google Bigtable, and soforth). In some embodiments, variant database architectures such ascolumn-oriented databases, in-memory databases, clustered databases,distributed databases, or even flat file data repositories may be usedaccording to the invention. It will be appreciated by one havingordinary skill in the art that any combination of known or futuredatabase technologies may be used as appropriate, unless a specificdatabase technology or a specific arrangement of components is specifiedfor a particular embodiment herein. Moreover, it should be appreciatedthat the term “database” as used herein may refer to a physical databasemachine, a cluster of machines acting as a single database system, or alogical database within an overall database management system. Unless aspecific meaning is specified for a given use of the term “database”, itshould be construed to mean any of these senses of the word, all ofwhich are understood as a plain meaning of the term “database” by thosehaving ordinary skill in the art.

Similarly, most embodiments of the invention may make use of one or moresecurity systems 360 and configuration systems 350. Security andconfiguration management are common information technology (IT) and webfunctions, and some amount of each are generally associated with any ITor web systems. It should be understood by one having ordinary skill inthe art that any configuration or security subsystems known in the artnow or in the future may be used in conjunction with embodiments of theinvention without limitation, unless a specific security 360 orconfiguration system 350 or approach is specifically required by thedescription of any specific embodiment.

FIG. 4 shows an exemplary overview of a computer system 400 as may beused in any of the various locations throughout the system. It isexemplary of any computer that may execute code to process data. Variousmodifications and changes may be made to computer system 400 withoutdeparting from the broader spirit and scope of the system and methoddisclosed herein. CPU 401 is connected to bus 402, to which bus is alsoconnected memory 403, nonvolatile memory 404, display 407, I/O unit 408,and network interface card (NIC) 413. I/O unit 408 may, typically, beconnected to keyboard 409, pointing device 410, hard disk 412, andreal-time clock 411. NIC 413 connects to network 414, which may be theInternet or a local network, which local network may or may not haveconnections to the Internet. Also shown as part of system 400 is powersupply unit 405 connected, in this example, to ac supply 406. Not shownare batteries that could be present, and many other devices andmodifications that are well known but are not applicable to the specificnovel functions of the current system and method disclosed herein. Itshould be appreciated that some or all components illustrated may becombined, such as in various integrated applications (for example,Qualcomm or Samsung SOC-based devices), or whenever it may beappropriate to combine multiple capabilities or functions into a singlehardware device (for instance, in mobile devices such as smartphones,video game consoles, in-vehicle computer systems such as navigation ormultimedia systems in automobiles, or other integrated hardwaredevices).

In various embodiments, functionality for implementing systems ormethods of the present invention may be distributed among any number ofclient and/or server components. For example, various software modulesmay be implemented for performing various functions in connection withthe present invention, and such modules may be variously implemented torun on server and/or client components.

Conceptual Architecture

FIG. 5 is a block diagram of an exemplary system architecture 500 foroperating communication control computer 501, according to a preferredembodiment of the invention. According to the embodiment, communicationcontrol computer 501, in communication with a plurality of subscriberdevices 513, may comprise a plurality of programming instructions storedin a memory and operating on a processor of a network-connectedcomputing device, and may be configured to communicate via network 310such as the Internet or other data communication network. For example,communication control computer 501 may be configured to communicate viaa cloud-based protocol to receive interactions from a plurality ofsubscriber devices 513, such as to enable one or more users to interactwith communication control computer 501 via a web browser, anothersoftware application, or a specially programmed user computer. Forexample, communication control computer 501 may utilize network 310 forcreation of a dynamic network pairings (such as that between asubscriber device 513 and one or more requesting devices 510), or tocommunicate with external databases such as expert profile database 515,subscriber database 518, and the like, via a local network connectionsuch as a LAN operated by a user, or an internal data network operatingon subscriber device 513.

In some embodiments, communication control computer 501 may furthercomprise device interface 525; project controller 502; communicationmanagement engine 503; contact management engine 504; token manager 505;and matrix generator 520. Further, communication control computer 501may comprise of contact database 506; token database 507, CRM database508, FAQ database 514 and matrix database 509.

In an embodiment, device interface 525 may manage input/outputcommunications to one or more of subscriber devices 513, requestingdevices 510, and/or expert devices 516, and in some embodiments, toexpert profile database 515, external database 517, and/or subscriberdatabase 518 over network 310.

Further, project controller 502 may create a plurality of networkpairings based on one or more communication objects received at leastfrom requesting devices 510. In the embodiment, communication managementengine 503 may receive the one or more communication objects from arequesting device 510, each comprising a network pairing request, suchas a request to set up a network pairing between the requesting device510 and a subscriber device 513. The communication objects may beanalyzed by project controller 502 to extract data such as context forpairing requests, included question objects and response objects,permission tokens associated with requesting device 510, and the like.

In one embodiment, the extracted data may be further processed bycommunication management engine 503 to generate dynamic and real-timenetwork pairings between the requesting device 510 and the subscriberdevice 513, based on factors such as validity of a permission tokenattached to the communication object, type of request as determinedthrough context, subscriber device 513 preferences, requesting device510 subscriber access scores (SAS), and the like.

In an embodiment, permission tokens may be created and associated with agiven requesting device 510, by project controller 502, such that eachpermission token may be indicative of whether the given requestingdevice 510 is allowed to link-up with a subscriber device 513 (for whichthe permission token is created), for all current and future networkpairing requests received from requesting device 510 aimed at thesubscriber device 513. The permission tokens may be utilized bycommunication management engine 503 to authorize new network pairingrequests as well as annotate new network pairing requests received fromrequesting devices 510. The creation of permission tokens for eachrequesting device 510, whenever permission tokens are not alreadyavailable, may advantageously enable subscriber device 513 to havecomplete control over which requesting devices 510 may communicate withthem over preferred communication channels at specified times. Further,project controller 502 may also create and revoke the permission tokenfor requesting device 510 based on one or more real-time scenarios, suchas a creation or revocation request received from subscriber device 513;unavailability of subscriber device 513 at a time of receiving a networkpairing request; and/or comparison of one or more scores calculated forrequesting device 510, to predetermined thresholds (as described indetail with regards to FIG. 6).

According to an embodiment, communication control computer 501 mayenable preauthorization of communication objects before they aretransmitted to subscriber device 513. In the embodiment, contactmanagement engine 503 may scrutinize identification and historic dataassociated with the requesting devices 510, as received within thecommunication object, and based on said scrutiny of identification andhistoric data, communication management engine 503 may generateauthorized network pairings to initiate connections between therequesting device 510 and subscriber device 513 (as described in FIGS.7A-B). In other words, contact management engine 503 may establish aplurality of contact categories, each of which would then be associatedwith permissions by project controller 502, wherein the permissions maygovern the requesting device's 510 ability to connect with thesubscriber device 513, depending upon data extracted from thecommunication object. In another embodiment, communication controlcomputer 501 may request reauthorizations for already transmittedcommunication objects, from subscriber devices 513. The reauthorizationmay enable end-user control over created network pairings and anymodifications in the reauthorized communication object may be stored bycommunication control computer 501 in CRM database 508.

In a further embodiment, communication control computer 501 mayfacilitate for protection of identity of subscriber devices 513 using anarray of information, including but not limiting to, permission tokenstatus, voiceprint (voice recognition biometrics), location information,context of communication objects, and the like. Systems and methods ofthe present invention may ensure that subscriber device 513 anonymityand end-user control are enabled using one or more permission tokensthat may be generated by communication control computer 501, to allow orrevoke communication authorization for any requesting device 510 at anytime. This may in turn safeguard end-user control, in that,communication processes and information revealed to the requestingdevice 510 are performed in such a manner that identity of subscriberdevice 513 is always hidden from the requesting device 510. Further,permission tokens may be rule-based and may be created or revoked bycommunication control computer 501, in real-time when a communicationobject is received from a requesting device 510, based on analysis ofsubscriber filter criteria for the subscriber device 513 at that givenmoment. That is, communication control computer 501 may ensure that thenetwork pairing between a requesting device 510 and a subscriber device513 is created dynamically such that communication control always lieswith the subscriber device 513 (as described in FIG. 8).

In a preferred embodiment, communication control computer 501 mayprovide subscriber devices 513 control over network pairings based oncontext of the communication object as well as one or more communicationchannels over which such network pairings may be allowed to beinitiated. In an embodiment, wherein the subscriber device 513 is amobile device in sleep mode or do not disturb mode, communicationcontrol computer 501 may allocate different permission tokens todifferent type of communication objects based on the type of requestingdevice 510, the owner of the requesting device 510, subscriber device513 location, current time, and the like. For example, communicationcontrol computer 501 may perform location-based analysis of requestingdevice 510 and subscriber device 513, content and context of thetransmitted communication object, subscriber device 513 preferences,etc., and based on such analysis either the communication object may betransmitted to subscriber device 513 or a request decline notificationmay be transmitted back to requesting device 510.

Analysis of the aforementioned dynamic variables, that are continuouslychanging or unpredictable, may be done by communication control computer501 using steps described in FIGS. 6, 7A and 7B. Further, a set ofpriority access permission levels of relationship between subscriberdevices 513 and requesting devices 510 may be established bycommunication control computer 501 for each unique communication object.

According to an embodiment, in an exemplary scenario of dynamic networkpairing, communication control computer 501 may receive a communicationobject comprising one or more question objects, from a subscriber device513. In the embodiment, communication control computer 501 may provideresponse objects associated with each question object based onfrequently received question objects and corresponding response objectsstored within FAQ database 514. However, in case of question objects forwhich corresponding response objects are unavailable, project controller502 may first determine context information associated with the questionobject including, but not limited to, location of the subscriber device513, contact ID for the subscriber device 513, search historycorresponding to the subscriber device 513, and the like stored incontact database 506. Further, based on the determined context,communication control computer 501 may identify a plurality of expertprofiles each recognizing an expert device 516 from which responseobjects may be obtained (as described in FIG. 8).

In an embodiment, communication control computer 501 may match eachexpert profile against a set of binary qualifying filters generatedbased on subscriber device 513 preferences and including attributes suchas location, demographic information, language, availability, and thelike. Once the expert profiles are screened based on the binary filtercriteria, by communication control computer 501, one or more expertdevices 516 may be disregarded by communication control computer 501.Further, communication control computer 501 may generate QuestionAttribute Score (QAS) for the question object and Experience AttributeScores (EAS) for each of the remaining expert devices 516, such thatexpert profiles may be matched with the question object based on thecomparison of QAS and EAS (as described in detail with reference to FIG.8).

In another embodiment, project controller 502 may further determinewhether a communication object received from a requesting device 510comprises a response object that relates to a previously receivedquestion object from a subscriber device 513. In response to adetermination that the communication object relates to the previouslyreceived question object, project controller 502 may calculate the EASfor the requesting device 510 and the communication object may betransmitted by communications management engine 503 by creating anetwork pairing between the requesting device 510 and subscriber device513, when the EAS is greater than or equal to a predetermined threshold(as described in FIG. 9).

In yet another embodiment, matrix generator 520 may generate arelationship matrix between expert devices 516 and subscriber devices513 at least based on the dynamic network pairings created betweendifferent expert devices 516, and subscriber devices 513. Such arelationship matrix, paired with the EAS for the expert devices 516 maygovern how a network pairing is created between a given expert device516 and subscriber device 513 (as described in FIG. 10). Further, thecreated matrices may be stored within the matrix database 509.

The aforementioned functions of communication control computer 501,along with other preferred embodiments of the present invention, aredescribed in greater detail below, in conjunction with FIGS. 6-10.

Detailed Description of Exemplary Embodiments

FIG. 6 illustrates an exemplary method for creating a dynamic networkpairing between a requesting device 510 and a subscriber device 513,according to a preferred embodiment of the present invention.

The method may start at step 601, wherein communication control computer501 may obtain a communication object from requesting device 510. In anembodiment, the communication object may be obtained when requestingdevice 510 attempts to communicate with subscriber device 513, usingnetwork 310. In the embodiment, project controller 502 may receive thecommunication object and in a next step 602, project controller 502 maydetermine identification information and historic stored informationassociated with the communication object.

The identification information, in an embodiment, may comprise theidentification of the requesting device 510, from which thecommunication object is received, such as caller ID, device type, devicelocation information gleaned from GPS data, device owner information,and the like. Further, historic information may include data pertainingto previous network pairing attempts and associated network pairingattempt outcomes for the requesting device 510. In an example,identification data and historic data may be extracted by projectcontroller 502 from contact database 506. In another embodiment,different types of communication objects may include voice messages,text messages, email messages, video calls, AI-based chat bot sessions,etc.

In a next step 603, project controller 502 may determine, based on thehistoric information and identification information, whether requestingdevice 510 is a part of one or more direct or indirect affinity groupscorresponding to subscriber device 513. In an embodiment, affinitygroups for each subscriber device 513 may be created by communicationcontrol computer based on a plurality of communication devices relatedto a given subscriber device 513 through one or more direct or indirectassociation means, e.g., communication devices frequently in contactwith the subscriber device 513, communication devices explicitly markedas “family devices” for the subscriber device 513, communication devicesidentified from personal and/or professional devices, social mediaidentities, etc., associated with the subscriber device 513, and thelike. In the embodiment, identification of communication devices for agiven subscriber device 513 may be performed by communication controlcomputer 501 using analysis of email domains associated with the givensubscriber device 513, natural language processing (NLP) analysis ofdata associated with the given subscriber device 513, and/or extractionof data from datastores (e.g., subscriber database 518) and applicationsassociated with the given subscriber device 513. Further, direct andindirect affinity groups may be created by communication controlcomputer 501 based at least on communication devices that have anindirect association with subscriber device 513, as described inconjunction with FIG. 10.

In a next step 604, in response to a determination by project controller502 that requesting device 510 does not exist within the affinity groupfor subscriber device 513, the method may continue to step 608 whereinthe communication object may be further evaluated by project controller502 as comprising an unsolicited network pairing request not connectedwith an affinity group and without a valid permission token.

Otherwise, in response to a determination by project controller 502 thatrequesting device exists within the affinity group for subscriber device513, in a next step 605, communication management engine 503 may gatherstored information pertaining to subscriber device 513, including butnot limited to subscriber device 513 connection preferences as well astime zone, location, and configuration data associated with subscriberdevice 513. In an embodiment, communication management engine 503 mayextract passive information related to subscriber user device 513, suchas connection preferences, from one or more external databases, such asexternal database 517. Further, communication management engine 503 maydetermine dynamic information such as location and time zone data, byactively pinging subscriber device 513 in real-time, whenever a networkpairing request is obtained from requesting device 510.

Referring again to FIG. 6, in a next step 606, communication managementengine 503 may generate subscriber filter criteria for subscriber device513. In an embodiment, the subscriber filter criteria may be generatedby communication management engine 503 in order to determine handlingcriteria for the communication object, based on the type ofcommunication object received from requesting device 510. For instance,communication control computer 501 may handle each communication objectdifferently based on the type of communication object received. Whilesome of the communication objects may directly be transmitted bycommunication management engine 503 to subscriber device 513, others mayundergo one or more scrutinization steps before such transmission. Inseveral embodiments, subscriber filter criteria may be generated bycommunication management engine 503 based on type of communicationobject, day and time of receipt of communication object, affinity groupassociated with subscriber device 513, current location of subscriberdevice 513, and the like. For instance, in one embodiment, thesubscriber filter criteria may include day and time based filters, e.g.,forwarding of communication objects between 11 PM and 7 AM may bedisallowed. Similarly, all communication objects may be blocked exceptfor the ones labeled as ‘emergency.’

Referring again to FIG. 6, in a next step 607, project controller 502may determine whether a valid permission token is attached to thecommunication object obtained from requesting device 510. If it isdetermined, by project controller 502, that a valid permission token isattached to the communication object, the method may continue to step615, wherein communication management engine 503 may transmit thecommunication object to the subscriber device 513. Otherwise, inresponse to a determination by project controller 502, that a validpermission token is not attached with the communication object, in anext step 608, communication management engine 503 may apply thegenerated subscriber filter criteria to a plurality of characteristicsof the communication object. In an embodiment, the plurality ofcharacteristics of the communication object may include type ofcommunication object, time of obtaining communication object,originating location of the communication object, mode of transmissionof the communication object, keywords associated with the communicationobject, and the like.

In an embodiment, communication management engine 503 may compare theaforementioned filter criteria to the plurality of characteristics ofthe communication object.

Further, based on the comparison, in a next step 609, communicationmanagement engine 503 may determine whether the subscriber filtercriteria are met by the communication object. In response to adetermination, by communication management engine 503 that thesubscriber filter criteria has not been met, in a next step 610, projectcontroller 502 may move the communication object to unsolicited networkpairing request datastore or directory (not shown) associated withsubscriber device 513, e.g., voicemail, unsolicited email folder, orother automatic disposition that may be internal or external tosubscriber device 513.

Otherwise, in a next step 611, project controller 502 may calculate asubscriber access score (SAS) for the requesting device 510 from whichthe communication object is received. In an embodiment, projectcontroller 502 may determine the SAS based on the following exemplarysequence:

${SAS} = \frac{\begin{matrix}{{sum}\left\{ {i = {1\mspace{14mu}{to}\mspace{14mu} n}} \right\}\left\{ \left( {{{{contactwt}(i)}*{{Ncontacts}(i)}} +} \right. \right.} \\{\left. {{{DurationWt}(i)}*{{ContactDuration}(i)}} \right)*} \\\left. {{AffinityGroupWt}(i)} \right\}\end{matrix}}{NF}$

Wherein NF denotes normalization factor, and contactwt(i) is theweighting given to the number of contacts for the ‘ith’ affinity group,Ncontacts(i) is the number of contacts within the ‘ith’ affinity group,DurationWt(i) is the duration weighting for the ‘ith’ affinity group,ContactDuration(i) is the total duration of the contacts within the‘ith’ affinity group, and AffinityGroupWt(i) is the weighting assignedto the ‘ith’ affinity group.

In a preferred embodiment, the systems and methods disclosed herein maycomprise of assigning, by communication control computer 501, eachsubscriber device 513, e.g., a cellular phone, a designated number andan online messaging address. According to the embodiment, this maymitigate issues surrounding unsolicited attempts to communicate withsubscriber device 513 PSTN phone number. This may also be applicable tounsolicited email communications. In one embodiment, communicationcontrol computer 501 may associate a system generated phone numberand/or messaging address with subscriber device's 513 direct affinitygroups as well communication devices associated with affinity groups ofthose direct affinity groups. Thereby, project controller 502 maygenerate the SAS for a requesting device 510, when a network pairingrequest is received.

In an embodiment, the SAS may be calculated for requesting device 510 byproject controller 502 based at least on how recent, duration and numberof network pairing requests, and/or accumulated time, and the like inboth the direct and indirect affinity groups for the targeted subscriberdevice 513.

Referring again to FIG. 6, In a next step 612, project controller 502may determine whether the value of SAS for the requesting device 510 isgreater than or equal to a predetermined threshold value. In anembodiment, the threshold value may be calculated based on a set ofparameters such as time of day, day of week, subscriber device 513location, subscriber device 513 status, calendar content associated withsubscriber device 513, etc. In case of a determination, by projectcontroller 502, that the SAS value for requesting device 510 is notgreater than or equal to the predetermined threshold, the method maycontinue to step 610, wherein communication management engine 503 maymove the communication object to an unsolicited network pairing requestdatastore. Otherwise, in response to a determination by projectcontroller 502 that the value of SAS for requesting device 510 isgreater or equal to the predetermined threshold, in a next step 613,communication management engine 503 may determine the handling criteriaassociated with the communication object. In an embodiment, where thecommunication object comprises of a voicemail, the handling criteria mayinclude allowing voicemail to be transmitted to subscriber device 513 ata certain time period, holding voicemail transmission to subscriberdevice 513 till a given time period, moving voicemail to a message queueand/or marked datastore at the subscriber device 513, and the like.

In a preferred embodiment, the threshold value for SAS may bedynamically adjusted by project controller 502 based on continuousfeedback learnt by communication control computer 501 throughinvestigating a pattern of responses by subscriber device 513 to aparticular type of communication object that was successfullytransmitted to subscriber device 513. For example, if subscriber device513 responds to more than 50% of the communication objects of aparticular type, project controller 502 may lower the threshold value agiven percentage until the response rate drops below 50%.

Referring again to FIG. 6, in a next step 614, token manager 505 maycreate a temporary permission token for the communication objectreceived from requesting device 510. In an embodiment, the temporarypermission token may be created based on the type of communicationobject and content contained within the communication object. Further,in another embodiment, the temporary permission token may also becreated automatically for communication objects that are either receivedfrom a requesting device 510 that has no previous history of networkpairing requests with the subscriber device 513 and/or for certain typesof communication objects that have not been previously received from arequesting device 510.

In a next step 615, project controller 502 may transmit thecommunication object to subscriber device 513. In an embodiment, projectcontroller 502 may transmit the communication object to subscriberdevice 513 along with details of requesting device 510, including butnot limited to, device type, voice print (voice recognition biometrics),device location, device owner, device time-zone, and the like. Accordingto the embodiment, token manager 505, in a next step 616, may furthersend a request to subscriber device 513 to determine whether a permanentpermission token should be created for the communication object obtainedfrom the given requesting device 510. In reply to a response from thesubscriber device 513, that a permanent permission token be created,token manager 505, in a next step 617, may create the permanentpermission token and store the permanent permission token in tokendatabase 507. The method may then terminate. In several embodiments,permanent permission tokens may be generated by token manager 505 for agiven requesting device 510, only when a response from a subscriberdevice 513 indicates that the given requesting device 510 is a trusteddevice for the subscriber device 513, and that future communications maybe solicited from requesting device 510 by the subscriber device 513. Insome embodiments, with furtherance to creation of the permanentpermission token for the given requesting device 510, project controller502 may also add the requesting device 510 to an affinity group of thesubscriber device 513.

Otherwise, in case it is determined by token manager 505, based on theresponse received from subscriber device 513, that creation of thepermanent permission token is not required, the method may end.

FIGS. 7A-B illustrate an exemplary method for processing a communicationobject for creation of a dynamic network pairing between requestingdevice 510 and subscriber device 513, according to a preferredembodiment of the present invention.

According to the embodiment, the method may start at step 701, whereinproject controller 502 may receive a communication object from arequesting device 510. In the embodiment, the communication object mayinclude one or more of an advertisement object, a connection requestobject, and the like. In a next step 702, project controller 502 maydetermine a type of communication object received as well as the type ofrequesting device 510. For instance, in several embodiments, the type ofrequesting device 510 may be one of agent device (not shown), expertdevice 516, or any other electronic device.

In a next step 703, token manager 505 may determine whether a validpermission token is attached to the communication object. In anembodiment, a valid permission token may be attached to a specificcommunication object, originating from a specific requesting device 510,when the specific requesting device 510 requests a first network pairingfrom the communication control computer 501. In the embodiment, for eachsubsequent network pairing request, received from the same specificrequesting device 510 for the same type of communication object, tokenmanager 505 may automatically identify the associated permission token.Otherwise, in case of a different communication object type or forcommunication object types received from a requesting device 510, havingno historical data of previous network pairing requests available withinthe token database 507, the token manager 505 may identify suchcommunication objects as not having any permission tokens attachedtherewith.

In a preferred embodiment of the invention, the identification ofwhether relevant permission tokens are associated with eachcommunication object, received from a requesting device 510, may greatlyreduce spam network communications being transmitted to subscriberdevices 513. Further, such an arrangement using communication controlcomputer 501 protocols, may also provide end-user control to subscriberdevices 513, since the entire control of which requesting devices 510are allowed to communicate with the subscriber devices 513, based atleast on the type of communication objects and requesting devices 510,may be solely routed through the network pairings created dynamically bycommunication management engine 503, each time a network pairing requestis received.

Referring again to FIG. 7A, in response to a determination by tokenmanager 505 that a valid permission token is not attached to thecommunication object, in a next step 706, project controller 502 maydetermine one or more configuration parameters for the subscriber device513. In an embodiment, the one or more configuration parameters mayinclude configurations for different types of communication objects. Forinstance, in some embodiments, communication objects comprising emailmessages received from requesting devices 510 having SAS above apredetermined threshold value may be routed by communication managementengine 503 to a specific directory, e.g., a ‘potentially interesting’folder within subscriber device 513 memory. Similarly, for communicationobjects including a voice call from requesting device 510 having SASabove the predetermined threshold, project controller 502 may performspeech to text and NLP analysis to identify a name of owner of therequesting device 510 as well as designate a purpose of said voice call.Based on such analysis, communication management engine 503 may eithersave the communication object to a specific directory on the memory ofsubscriber device 513, e.g., a ‘potentially interesting’ voicemailfolder or forward the communication object to subscriber device 513 forfurther review. The method may then continue to step 705. In anembodiment, in case it is determined by project controller 502, in step703, that there are no valid permission tokens available, in a next step704, project controller 502 may further determine whether the requestingdevice 510 is authorized. In an embodiment, project controller 502 maydetermine whether requesting device 510 is authorized by, for example,determining whether a valid permission token is associated withrequesting device 510, and/or by using NLP to analyze the communicationobject content to determine whether requesting device 510 has elicitedsufficient known interest to subscriber device 513 to warrant presentingthe communication object to subscriber device 513 for review.

In response to a determination by project controller 502 that therequesting device is not authorized, in the step 705, project controller502 may create a notification object for subscriber device 510, whereinthe notification object may be indicative of a lack of authorization ofthe requesting device 510. Otherwise, in response to a determinationthat the requesting device 510 is authorized, the method may continue tostep 707.

In step 707, communication management engine 503 may forward thecommunication object to subscriber device 513 based on a type ofcommunication object. In the embodiment, based on a communication objecttype 510, communication management engine 503 may create dynamic andtime bound network pairings between the requesting device 510 andsubscriber device 513, preferably only lasting for a cumulative durationof transmission of the communication object from requesting device 510and receiving a corresponding response object from subscriber device513.

Referring again to FIG. 7A, in a next step 708, based on analysis of acombination of factors, e.g., state of subscriber device 513, loginstatus of a particular application executing at subscriber device 513,geolocation of subscriber device 513, current day/time of networkpairing request, etc., the project controller 502 may determinereal-time availability for subscriber device 513.

Further, in a next step 709, communication management engine 503 mayrequest a response object corresponding to the communication object,from subscriber device 513. In an embodiment, response objects may be ofdifferent types including, but not limited to, ‘Accept’, ‘Respond’,‘Send to Folder by communication object type’, ‘Reject,’ etc. Further,each different response object type may be handled by communicationcontrol computer 501 differently, as described in greater detail withreference to FIG. 7B.

In an embodiment, after requesting the response object from subscriberdevice 513 by communication management engine 503, the method may thencontinue to FIG. 7B, detailing processing of the response object bycommunication control computer 501 based on response object type.Finally, in step 711, the response object may be transmitted torequesting device 510.

FIG. 7B illustrates a method for processing one or more types ofresponse objects by communication control computer 501, in accordancewith a preferred embodiment of the present invention.

According to the embodiment, the method may continue from step 709 asdescribed above in FIG. 7A. As stated, in step 709, communicationmanagement engine 503 may request the response object corresponding tothe communication object, from subscriber device 513. For eachcommunication object received with an attached permission token, one ormore components of communication control computer 501 may perform steps712-716. In step 712, project controller 502 may determine whether thecommunication object is accepted by the subscriber device 513.

In an embodiment, wherein communication control computer 501 runs as anapplication on subscriber device 513, at the time of downloading andinitial registration of subscriber device 513 to communication controlcomputer 501, subscriber device 513 may be provided a plurality ofselectable options each indicative of a different manner in whichsubscriber device 513 may process incoming communication objects, once adynamic network pairing between the requesting device 510 and subscriberdevice 513 is created by communication management engine 503. Further,the plurality of selectable options may differ for communication objectshaving an attached permission token and for communication objects havingno permission tokens attached to them. In several embodiments, theplurality of selectable options may comprise choices for subscriberdevice 513, including but not limited to, create, and send a responseobject such as: accept the communication object, reject communicationobject, forward communication object to a particular datastore, deferresponse object transmission to a predefined time, create a customresponse object, select a standard response object, and the like.

Referring again to FIG. 7B, in response to a determination by projectcontroller 502 that the communication object has been rejected bysubscriber device 513, in a next step 715, project controller 502 mayprocess communication object as described in the aforementioned, e.g.,forward communication object to a dedicated unsolicited network pairingrequest directory stored in the memory of subscriber device 513 when novalid permission token is associated with the communication object.Otherwise, in a next step 713, project controller 502 may determine atype of response object received from subscriber device 513. Further, ina next step 714, project controller 502 may generate a response objectID for the received response object. In an embodiment, each differenttype of response object may be associated with a unique response objectID by project controller 502. Further, for every new response objecttype created by subscriber device 513, that have not been previouslyrecorded by communication control computer 501, project controller 502may automatically create corresponding response object IDs and storethem in contact database 506. In an embodiment, project controller 502may provide a conversational interactive voice response (IVR) to therequesting device 510 in response to a determination that thecommunication object comprises a voice interaction. In the embodiment,project controller 502 may capture a dialog as a response to theconversational IVR from the requesting device 510 and convert thereceived dialog using speech to text to process the dialog using naturallanguage processing (NLP) to determine identification information andcontext associated with the communication object.

In a next step 716, project controller 502 may create response objectcontent, based at least on the type of response object received fromsubscriber device 513. In an embodiment, wherein the communicationobject is a marketing email, and the response object type is “reject,”project controller 502 may create a response email stating that theservices advertised in the marketing email are not required at thistime. Similarly, in another embodiment, wherein the communication objectis a message comprising invitation to a certain event and the responseobject is “accept,” project controller 502 may create the responseobject content as stating, “thank you for the invitation, we will bethere.” In each of these embodiments, project controller 502 may usevarious techniques such as context determination, NLP analysis, wordprofiling, etc. to create automatic response object contents in messageor email form as well as in voice form, based on instructions receivedfrom subscriber device 513. Once the response object content is createdby project controller 502, the method may continue to step 711, whereinthe response object may be transmitted to the requesting device 510 bycommunication management engine 503.

In an embodiment, for each communication object, wherein no permissiontokens are attached, one or more components of communication controlcomputer 501 may perform steps 717-725. In step 717, project controller502 may again determine whether the communication object has beenaccepted by subscriber device 513. As described in the foregoing, anacceptance or rejection of the communication object by subscriberdevices may be identified based on a selection of one of the pluralityof selectable options by subscriber device 513. In response to adetermination by project controller 502 that the communication objecthas been rejected by subscriber device 513, in a next step 721, projectcontroller may, forward the communication object to a given external orinternal datastore (e.g., unsolicited network pairing request datastore)associated with subscriber device 513, when a valid permission tokendoesn't exist for the communication object. Otherwise, in a next step718, token manager 505 may create a permission token for thecommunication object. Further, in a next step 719, token manager 505 maystore the created permission token for the communication object in tokendatabase 507.

In a next step 720, project controller 502 may determine the type ofresponse object received from subscriber device 513 corresponding to thecommunication object. The various types of response objects are asdescribed in the foregoing. Further, in a next step 724, projectcontroller 502 may generate response object ID based on the type ofresponse ID determined. In an embodiment, based on the response objectID, project controller 502 may generate content for the response object.The method may continue to step 711, wherein the response object alongwith the created content may be transmitted to the requesting device 510by communication management engine 503.

FIG. 8 illustrates an exemplary method for processing a communicationobject, comprising at least a question object, for creation of a dynamicnetwork pairing between one or more expert devices 516 and a subscriberdevice 513, according to a preferred embodiment of the presentinvention.

According to the embodiment, the method may begin at step 801, whereinproject controller 502 may receive a question object from subscriberdevice. In the embodiment, the question object may comprise of one ormore information or data requests from subscriber device 513, includingbut not limited to, information about specific locations, demographics,subject matter, and any combinations thereof. In a particularembodiment, the question objects may be data requests solicitinginformation about a given domain being served, e.g., real estate,finance, legal, etc. For instance, the question object may includequeries regarding safety and drug usage levels in a given geolocation,scholarship information for universities in a given state, value of realestate in a given time period for a given zip code, or risks associatedwith government bonds, municipal bonds, or commercial bonds compared toindex stocks, and the like. A person skilled in the art would appreciatethat the above scenarios are exemplary, and many other data orinformation requests may be comprised within the question object.

Referring again to FIG. 8, in a next step 802, project controller 502may determine a context of the question object. In an embodiment,project controller 502 may determine the context of the question objectby analyzing information about an owner of subscriber device 513 andprevious interactions of subscriber device 513 with communicationcontrol computer 501. In an embodiment, information about an owner ofsubscriber device 513 may include demographic information such as, e.g.,marital status, family information, geolocation, annual income, and thelike. Further, previous interactions of subscriber device 513 withcommunication control computer 501 may include question objectspreviously received from subscriber device 513 soliciting informationon, e.g., school districts, real estate, and the like for a desired zipcode or geolocation.

In a next step 803, project controller 502 may determine whether thequestion object is received in an audio or audio-video form. In anembodiment, communication control computer 501 may be configured toprocess communication objects from subscriber device 513, expert device516, and/or requesting device 510, in one or more media types, includingbut not limiting to, voice, text, multimedia message, audio-video, or acombination thereof. In response to a determination by projectcontroller 502 that the question object is not received in an audio oraudio-video type, the method may continue to step 805. Otherwise, in anext step 804, project controller 502 may initiate a speech to textconversion process for the question object. Once the question objectcontent is converted to text by project controller 502, in a next step805, project controller 502 may perform natural language processing(NLP) on the question object content text by analyzing the questionobject against data from one or more previously received questionobjects and corresponding response objects stored in, e.g., FAQ database514 as well as correlated information stored in, e.g., subscriberdatabase 518 that may be related to the previously received questionobjects and corresponding response objects, given a context of thecurrent question object.

In a next step 806, project controller 502 may determine whether acorresponding answer object is available for the received questionobject. In an embodiment, project controller 502 may query the FAQdatabase 514 to determine whether there are one or more answer objectsthat correspond to the received question object. In the embodiment, theidentification of corresponding response objects may be done based atleast on previously received question objects and their respectiveanswer object pairings stored by communication control computer 501 inFAQ database 514. For instance, communication control computer 501 maymap one or more answer object to each question object received, oncesaid one or more answer objects are transmitted to subscriber devices513. Such mappings may then be stored in FAQ database 514 and queriedeach time a communication object comprising a question object isreceived from subscriber device 513 (or in some embodiments fromrequesting device 510).

In response to a determination by project controller 502 that acorresponding answer object for the question object is available, in anext step 818, project controller 502 may present the answer object tosubscriber device 513. The method may then continue to step 801, whereinanother question object may be received by project controller 502 fromsubscriber device 513. Otherwise, in response to a determination byproject controller 502 that no corresponding answer object is available,in a next step 807, project controller 502 may further determine whetherbinary filter criteria for subscriber device 513 is available.

In an embodiment, the binary filter criteria for a given subscriberdevice 513 may be indicative of one or more criteria that may govern thetype of response object that may be required by subscriber device 513for any question object received by communication control computer 501.In one embodiment, wherein the question object relates to requisition ofinformation on real estate, the binary filter criteria for subscriberdevice 513 may include geographical location, demographic informationfor expert profiles, translation requirements, subject matter expertiserequirements, and the like. In response to a determination by projectcontroller 502 that the binary filter criteria are unavailable, in anext step 808, project controller 502 may create the binary filtercriteria for the subscriber device 513. In an embodiment, the binaryfilter criteria for subscriber device 513 may be created by projectcontroller 502, at least based on preference information received fromsubscriber device 513 at the time of initial registration of subscriberdevice 513 with communication control computer 501.

Otherwise, in response to a determination by project controller 502 thatbinary filter criteria for subscriber device 513 is available, in a nextstep 809, project controller 502 may create a plurality of expertprofiles, each identifying an expert device 516, based at least on thebinary filter criteria and a determined context of the question object.In an embodiment, the context of the question object may be determinedby project controller 502 as described in the foregoing. In theembodiment, based on the determined context, project controller 502 mayidentify the plurality of expert profiles best suited to provide acorresponding answer object for the question object obtained fromsubscriber device 513. For instance, in an embodiment wherein thequestion object pertains to real estate queries, project controller 502may query matrix database 509 and/or external database 517 to identifythe plurality of expert profiles that are associated to expert realestate agents, market experts, and real estate businesses based onsubscriber device 513 preferences. In one embodiment, matrix database509 may have stored therein expert profiles previously identified bycommunication control computer 501. These expert profiles, in severalembodiments, may have been identified based on creation of one or morerelationship matrices comprising multiple expert devices 516 eachcorresponding to a specific expert profile and connected to one anotherin a hierarchal manner. Such a relationship matrix is further disclosedwith reference to FIG. 10. Further, each relationship matrix may bedynamically updated based on opportunity scores associated with eachexpert device 516 as calculated and modified by communication controlcomputer 501 (described in detail with reference to FIG. 10).

Referring again to FIG. 8, in a next step 810, project controller 502may generate a standardized question object and associated context forthe question object. In an embodiment, project controller 502 mayperform NLP to determine a particular context for the question objectbased at least on the available response objects stored, e.g., in FAQdatabase 514, under a given domain. For example, one or more availableresponse objects may be labeled under domains including, but notlimiting to, ‘home,’ ‘finance,’ ‘school,’ and the like. Further, in apreferred embodiment, project controller 502 may determine the contextfor the question object regardless of a plurality of specific wordsincluded within the question object received from subscriber device 513.Thus, project controller 502 may preferably create a standardized formatfor the question object and match the standardized question object withits associated context. For instance, in an embodiment wherein thequestion object content comprises of a request for data on a specifictourist location, the standardized question object may be created suchthat it is indicative of type of information (general information),specialization (tourism), expertise level (beginner, intermediate, oradvanced), previously requested (yes or no), etc. for the questionobject. Further, project controller 502 may associate the standardizedquestion object with the determined context, to create a mapping andstore the same in FAQ database 514. Such a pairing may enablecommunication control computer 501 to dynamically identify a context andstandardization for future question objects substantially similar to thequestion object being currently processed. In an embodiment, the mappingof standardized question object and context may include“tourism—general,” “real estate—school district,” “healthcare—drugintake,” and the like.

Referring back to FIG. 8, in a next step 811, project controller 502 maycreate a plurality of scoring attributes for the question object. In anembodiment wherein the question object pertains to real estate market,the scoring attributes for the question object may include factors suchas local market expertise for a certain zip code, price range, qualityof real estate, safety data, and the like. In the embodiment, eachscoring attribute may be assigned a number from 1 to n, such that theremay be a total of n scoring attributes, wherein n may be anypredetermined number. In a next step 812, project controller 502 maydetermine a question attribute score (QAS) for the question object. Inan embodiment, project controller 502 may calculate the QAS based on thefollowing exemplary sequence:

QAS=(Sum(1−m):(QuestionAttributeWeight(i)*QuestionAttributeScore(i)))

wherein, QuestionAttributeWeight may be a predetermined value assignedto a given attribute of the question object; and QuestionAttributeScoremay be a score of each such attribute.

In an embodiment, when the question object is related to ‘real estate,’attributes may include published statistics, e.g., median home price,population, as well as researchable information, e.g., number ofstudents accepted by universities, local knowledge, e.g., runningtrails, places for food supplies, veterinarian services, and the like.

Further, in a next step 813, project controller 502 may calculate anexpert attribute score (EAS) for each expert device 516 associated withthe plurality of expert profiles. In an embodiment, the EAS for anexpert device 516 may be indicative of a quantified likelihood of theexpert device 516 of possessing a response object tailored to thequestion object and may be calculated by project controller 502 usingthe following exemplary sequence:

EAS={(Sum(1−n):(ExperienceWeight(i)*ExperienceAttribute(j)))}

wherein, ExperienceWeight may be a predetermined value assigned to agiven attribute corresponding to an expert device 516; andExperienceAttribute may be a score of each such attribute.

In an embodiment, experience attributes may include years of experience,certifications, years in the community, annual volume of sales, averageprice range of properties handled, membership in one or more affinitygroups associated with subscriber device 513, and the like for a givenexpert device 516.

In another embodiment, for each of a K qualified expert profiles anexpert score (ES) may be calculated by project controller 502 based onthe following exemplary sequence:

${ES} = \frac{{QAS} + {EAS}}{NormalizationFactor}$

According to the embodiment, ES may result in a set of K normalizedexpert profiles that may be ranked by project controller 502, e.g., inan ascending order. The highest score may represent expert profileshaving the highest quantified probability of having a response objectcorresponding to the question object, having met the binary filtercriteria of subscriber device 513.

In a next step 814, project controller 502 may match the obtainedquestion object with selected top n expert profiles from the pluralityof expert profiles. In one embodiment, the top n expert profiles may beselected based on their respective EAS, and the question object may bematched to each individual expert profile of the top n expert profiles.In the embodiment, such a match may enable communication controlcomputer 501 to associate expert profiles, already stored within, e.g.,CRM database 508, or extracted from one or more external databases tothe question object, such that a targeted database of question objectsand associated experts may be created within the communication controlcomputer 501 for each such request from subscriber device 513. Further,such a matching of expert profiles with question objects bycommunication control computer 501 may allow for easy and directedrecognition of expert devices 516, such that dynamic network pairingsbetween such expert devices 516 and subscriber device 513 may beautomatically created by communication management engine 503, withoutthe need of a user to manually search for professionals within theircontacts and/or on the world wide web, for one or more of theirrequirements. This may further advantageously provide the user completecontrol over their device privacy and ensure anonymity, since there maybe no requirements for the user to share their personal information atany step of the method.

Referring again to FIG. 8, in a next step 815, communication managementengine 503 may transmit the top n expert profiles to subscriber device513 for display. In an embodiment, the top n expert profiles may betransmitted along with information including but not limited to expertname, location, age, gender, language expertise, subject matterexpertise, and any combinations thereof. Further, in a next step 816,project controller 502 may receive a selection of one of the top nexpert profiles from subscriber device 513.

In a next step 817, project controller 502 may determine whether anappointment with expert device 516 associated with the selected expertprofile is available. In an embodiment, project controller 502 maydetermine availability of the expert device 516 by querying a calendarapplication of the expert device 516 that is associated with theselected expert profile. In the embodiment, project controller 502 maycompare entries in the calendar application of the expert device 513 toone or more entries in a calendar application associated with subscriberdevice 513. In another embodiment, project controller 502 may also senda notification object to subscriber device querying for one or moreavailable time spans in which the subscriber device 513 is available.Once an available appointment is identified project controller 502 maycommunicate the availability to subscriber device 513 and, in a nextstep 818, receive confirmation from subscriber device 513. Based on thereceived confirmation, in a next step 819, project controller 502 maycreate an appointment schedule and transmit said appointment schedule toboth subscriber device 513 and expert device 516. In case a confirmationfrom subscriber device 513 is not received by project controller 502,one or more alternative appointment schedules may be transmitted tosubscriber device 513 by project controller 502.

In some embodiments, once project controller 502 receives confirmationfrom subscriber device 513 regarding an appointment schedule with expertdevice 516, communication management engine 503 may create a networkpairing between subscriber device 513 and expert device 516 for the timeperiod of the appointment, by methods as described in FIG. 6. In theembodiment, the initial network pairing may be created by communicationmanagement engine 503 by creation of a temporary permission token forthe expert device 516. Further, once the communication betweensubscriber device 513 and expert device 516 terminates, communicationmanagement engine 503 may query subscriber device 513 regarding creationof a permanent permission token for said expert device 516. Based on aresponse from subscriber device 513, token manager 505 may then createthe permanent permission token for the expert device 516 and store thepermission token in the token database 507.

FIG. 9 illustrates another exemplary method for processing acommunication object for creation of a dynamic network pairing betweenone or more expert devices 516 and a subscriber device 513, according toa preferred embodiment of the present invention.

According to the embodiment, the method may begin at step 901, whereinproject controller 502 may receive a communication object from arequesting device 510. In an embodiment, the communication object maycomprise a question object, a response object, etc., as described in theforegoing, and may be sent by requesting device 510 to create a networkpairing with a subscriber device 513.

In a next step 902, token manager 505 may determine whether a validpermission token is associated with the communication object. Tokenmanager 505, in one embodiment, may determine association of a validpermission token with the communication object, by querying the tokendatabase 507 for previously stored permission tokens that were linked tothe specific communication object type of the received communicationobject by token manager 505, for the given requesting device 510.

In case it is determined by token manager 505 that a valid permissiontoken is associated with the communication object, the method maycontinue to step 906. Otherwise, in a next step 903, project controller502 may apply subscriber filter criteria, associated with the subscriberdevice 513, to one or more characteristics of the communication object.In an embodiment, the one or more characteristics of the communicationobject may include type of communication object, time of obtainingcommunication object, originating location of the communication object,mode of transmission of the communication object, keywords associatedwith the communication object, and the like.

In a next step 904, project controller 502 may determine whether thesubscriber filter criteria for the subscriber device 513 is met by thecommunication object. In response to a determination by projectcontroller 502 that the subscriber filter criteria is not met, in a nextstep 905, the communication object may be moved by project controller502 to an unsolicited network pairing request folder, since a validpermission token doesn't exist for the communication object. In anembodiment, wherein communication object includes a voice call, email,or text message, project controller 502 may send rejected voice calls toan unsolicited voicemail folder, rejected emails to an unsolicited emailfolder, or rejected text messages to an unsolicited text folder.

Otherwise, in step 906, project controller 502 may calculate asubscriber access score (SAS) for the subscriber device 513. In anembodiment, project controller 502 may calculate the SAS for thesubscriber device 513, as described above with reference to FIG. 6.Further, in a next step 907, project controller 502 may determinewhether the calculated value of SAS is greater than or equal to apredetermined threshold value. In response to a determination by projectcontroller 502 that the value of SAS is not greater than equal to thepredetermined threshold value, the method may continue to step 905.

Otherwise, in a next step 908, project controller 502 may determine atype of communication object. In an embodiment, project controller 502may determine whether the communication object comprises a messageobject, a response object, a question object, a marketing email, or anycombination thereof. Based on the determination of the communicationobject type, in a next step 909, project controller may determinewhether the received communication object relates to a question objectpreviously received from the subscriber device 513. In an embodiment,such a determination may be made by project controller 502 as describedwith respect to steps 609 and 611 in FIG. 6, i.e., by analyzing contentsof the communication object against previously received question objectsthe subscriber device 513, e.g., during time-period N, wherein N may bea given number of months or years. In an embodiment, such an analysismay result in a weighted score quantifying a probability of thecommunication object to be related to a previous question objectreceived from the subscriber device 513. In another embodiment, theweighted score is included in the SAS.

In response to a determination by project controller 502 that thecommunication object does not relate to a previously received questionobject, the method may continue to step 913. Otherwise, in a next step910, project controller may calculate the QAS for the previouslyreceived question object. In an embodiment, project controller 502, maycalculate the QAS for the question object as detailed in FIG. 8.

Further, in a next step 911, project controller 502 may calculate theEAS for the requesting device 510. In an embodiment, project controller502, may calculate the EAS for the requesting device 510 as detailed inFIG. 8. In a next step 912, project controller 502 may determine whetherthe EAS is greater than equal to a predetermined threshold. In responseto a determination, by project controller 502, that the EAS is greaterthan or equal to the predetermined threshold, in step 913, communicationmanagement engine 503 may transmit the communication object to thesubscriber device 513. In several embodiments, the communication objectmay be transmitted to the subscriber device by communication managementengine 503 by creating a dynamic network pairing between the requestingdevice 510 and subscriber device 513, as detailed in FIGS. 6 and 7.

However, in response to a determination, by project controller 502, thatthe EAS is not greater than or equal to the predetermined threshold, ina next step 914, project controller 502 may present an option to thesubscriber device 513 to schedule an appointment with the requestingdevice 510. In an embodiment, presentation of the option for schedulingan appointment by project controller 502 to the subscriber device 513,may preferably provide the subscriber device 513 control overcommunication with the requesting device 510, even when the EAS for therequesting device 510 does not meet the predetermined threshold for EAS.In an embodiment, wherein the communication object from the requestingdevice 510 does relate to the question object previously received fromthe subscriber device 513, the subscriber device 513 may still beprovided with an option to request a network pairing with the requestingdevice 510, even when the EAS for the requesting device 510 fails tomeet the threshold. Such an arrangement may offer the subscriber device513 ultimate end-user control over whether a network pairing is soughtwith the requesting device 510 or not.

Referring back to FIG. 9, in a next step 915, project controller 502 maydetermine whether an appointment confirmation is received from thesubscriber device 513, for the requesting device 510. In response to adetermination, by project controller 502, that such an appointmentconfirmation is received from subscriber device 513, in a next step 916,project controller 502 may create the appointment schedule between thesubscriber device 513 and requesting device 510. Further, projectcontroller 502 may transmit the created appointment schedule to thesubscriber device 513 as well as the requesting device 510. In someembodiments, once project controller 502 receives confirmation fromsubscriber device 513 regarding an appointment schedule with expertdevice 516, communication management engine 503 may create a networkpairing between subscriber device 513 and expert device 516 for the timeperiod of the appointment, by methods as described in FIG. 6. In otherembodiments, project controller 502 may also include the subscriberdevice 513 to the relationship matrix constructed by matrix generator520 for the requesting device 510 (as described in FIG. 10).

FIG. 10 illustrates a block diagram for a relationship matrixconstruction comprising subscriber devices 513 and expert devices 516,according to a preferred embodiment of the invention. According to theembodiment, FIG. 10 depicts a construction of a relationship matrix bycommunication control computer 501 forming, for example, a hierarchicaltree-like structure in which expert devices 516 are top-level nodes(referenced by numeral 1201), followed by direct subscriber device 513(referenced by numeral 1202) nodes followed by one or more indirectsubscriber device 513 nodes (referenced by numerals 1203-1206).

A top-level node of a plurality of top-level nodes, may be generated bymatrix generator 520 in step 1001 by assigning a unique ID and taggingthem with a unique ID (for example, an “R”) indicating they are at thetop-level. In this case, 1201 is the unique ID of this top-level node inthe matrix.

A direct level node may be generated by matrix generator 520 in step1002 and assigned a unique ID (for example, a “D”) indicating it is adirect level node. A link may be then placed in the direct nodeindicating that its parent is a top-level node 1201. In this case, 1202is a direct node in the matrix.

Two Indirect nodes may be generated by matrix generator 520 in step 1003and assigned numerals 1203 and 1204 and tagged with a unique ID (forexample, an “I”) indicating an indirect node. A link may then be placedin each indirect node indicating that its parent is direct node 1202.

This may indicate two direct nodes being added to the top-level node.They may be generated by matrix generator 520 in step 1004 and assigned1205 and 1206 and tagged with a unique ID (for example, “D”) indicatingthey are direct nodes in the matrix. A link may be placed in each directnode to indicate that its parent is the top-level node 1201.

In some embodiments, the above process may be repeated in the course ofconstructing the matrix such that a plurality of nodes will beconfigured in the matrix. In some embodiments, once the matrix nodes areconstructed and linked, their relationship are read-only and may not bedestroyed.

Accordingly, the outlined systems and methods disclosed herein willoffer significant improvements for location-based services with localexpert devices 516 associated to a specific geolocation arecommunicatively connected to provide services to subscriber devices 513.For example, organization in a specific location may want interactionsto be routed to and handled by expert devices 516 in that location.

Embodiments of the present invention disclose systems and methods forproviding expert device 516 designation and dynamic network pairingswith one or more subscriber devices 513. The systems and methods providefor computed designation and network pairing of one or more subscriberdevices 516 to one or more expert devices 516 with device ancestry basedon a type of communication object and requirement involved in thetransaction and/or preferences of the one or more subscriber devices513.

First, a pool of expert devices 516 that are in the common areas may beidentified. A designation and routing algorithm may match up the one ormore expert devices 516 that match the one or more subscriber device 513preferences and remote expert device 516 with attribute preferences. Thematching attributes may include, but not limited to, a baselineattributes of quality (cumulative usage), quantity (cumulative number ofregistrations) location, and the like. In some embodiments a pluralityof eligible expert devices 516 may be identified. The plurality ofeligible expert devices 516 may be determined by project controller 502by computing a match between the subscriber device 513 requirements andcredentials associated to one or more expert device 516. Anotherimportant aspect is a simultaneously gathering of data and browsingactivity associated with the ancestry in the lineage of the devices inthe matrix. Devices may be scored simultaneously and dynamically.

When the matrix is formed, a minimum number of devices may be isolated(for example, three devices are isolated). For example, (i) anoriginating or referring device (e.g., an expert device 516), (ii) asubscriber device 513 and (iii) a remote device (subscriber device 513or expert device 516). In some embodiments, many devices may be includedin the ancestry of devices in the relationship matrix.

Although numerous algorithms are possible, in a preferred embodiment, amethod by which subscriber device 513 preferences (for example,initially set up in the initial registration) match one or more expertdevice 516 abilities and skill sets. A major emphasis of the scoring maybe focused, for example, on rewarding expert devices 516 associated witha best network outside of their configured location.

A method of scoring devices in a relationship matrix may also includetracking of data in a lineage and hierarchy of devices of eachsubscriber device 513 in the matrix. When a relationship matrix isformed, a snapshot of data and browsing activities associated with aplurality of devices in the ancestry and hierarchy of all linked devicesmay be stored in matrix database 509. The relationship matrix may beformed or completed when activity or a request is received from asubscriber device 513. Simultaneously, at least a portion of browsingdata and/or user data may be collected throughout an entire ancestry ofdevices that make up the relationship matrix.

Device types to score may include:

-   -   Score registered users via a native mobile app or AI embedded        app    -   Score registered users via a unique website URL associated    -   Score registered users via a URL associated with an AI chatbot    -   Score registered users using a voice activated communication end        point (for example, Amazon™ Alexa™)    -   Score registered user using a computing device    -   Score registered users using an electronic assistant application        and/or device (for example, Google™ Personal Assistant)    -   Devices may include entry via a native app, a blog post, a        website, or any place a user may register. Devices may be scored        regardless of its point of entry.

When action is received by a subscriber device 513, methods describedherein may be selected depending on an act by the subscriber device 513.Further, a relationship may be formed and complete identities of all thedevices may be established. A snapshot of browsing activity may takeplace and then the subscriber device 513 may be communicably enabled.

In some embodiments, building, forming, and completing a relationshipmatrix may comprise a plurality of steps, for example:

A matrix may be built, by matrix generator 520, comprising a multi-levelorganizational structure. Capturing and registering a device, mayfunction with a multilevel organizational structure. A multi-levelstructure comprising a relationship matrix may be built, by matrixgenerator, and accommodate:

-   -   A first expert device 516 may designate an unlimited number of        associated other expert devices 516;    -   An expert device 516 may sponsor a first subscriber device 513        (for example, a direct subscriber device 513 associated to the        expert device 516);    -   A first subscriber device 513, of a plurality of subscriber        devices 513, may sponsor others subscriber device 513 (for        example, and indirect subscriber device 513 associated to the        subscriber device 513); and/or    -   A second subscriber device 513 (for example, and indirect        subscriber device 513), of the plurality of subscriber devices        513, associated to the expert device 516 may sponsor other        subscriber devices 513 (for example, and indirect subscriber        device 513 associated to expert device 516).

Action received from subscriber device 513 may be displayed in a displaydevice, or displayed via a template on an AI chatbot or by instruction(for example, by voice instruction) by subscriber device 513, asselected by the subscriber device 513, but not limited to, the followingtypes of acts: a voice call, text message, chat session, ask the expert,email message, meeting request, acceptance via an electronic calendar,impromptu and immediate meeting request, such as the a schedule request,or vis' a vis' a chat box experience—data may be integrated withchatbot. Further, in some embodiments, a closing message from chatbotmay display a template of several options, such as (i) a request toestablish communication, (ii) type of communication, (iii) need to setup a calendar event, and the like. Subscriber device 513 may be anorphan and has gotten an invite to the system via a social media post orfrom directly loaded from an app store (Apple™, Android™) associated tosubscriber device 513.

Devices may be scored, by one or more scorers comprised in projectcontroller 502 and methods described herein may be employed and appliedand may be dependent on the action received from the subscriber device513.

One or methods described herein may be executed for different actionsreceived from subscriber device 513 depending on an action received fromsubscriber device 513 comprising any matching preference requirements ormatches between the plurality of subscriber devices 513, subscriberdevice 513 and/or expert device 516. In some embodiments, methodsexecuted may be based on, for example, an amount of time a specificpiece of information was reviewed by a subscriber device 513. In thisregard, a usage variable may be broken down from total usage to usagereviewing properties.

Assignment of device or devices: Systems described herein maycommunicably couple a subscriber device 513 to an action received froman expert device 516 and ultimately to the device or devices. In thecase of a question object received from the subscriber device 513, aplurality of expert devices 516 may be selected by matrix generator 520.In some embodiments, methods described herein may be executed toprovide, for example, a first expert device 516, 70% of interactions, asecond expert device 516, 20%, and 10% on a third device expert device516, and so on.

In some embodiments, there may be a plurality of relationship matricesformed between a subscriber device 513 and a plurality of expert devices516. For certain requests, where computer 501 may select, for example,three expert devices 516; there may be, for example, threesimultaneously created relationship matrices.

In some embodiments, a subscriber device 513 may primarily determine anevent and a time that a relationship matrix may be formed by matrixgenerator 520. In some embodiments, scoring of devices may be based on asubscriber device 513 request and the relationship matrix may becompleted, by matrix generator 520, after or simultaneously whiledevices have been communicably connected.

Parameters considered by methods described herein may include, but notlimited to, voice recognition biometrics, time of day, time, location, alocation-based geographic distance between devices, number of devicesregistered and cumulative interaction time in each device. Each of thesevariables may increase or decrease dynamically and/or simultaneously.These activities all occur dynamically either larger or smaller andsimultaneously. And each of the relationship matrix(s) may be formeddynamically and/or simultaneously. In some embodiments, a use ofpresence management, by presence manager, may be implemented.

Methods described herein may utilize a plurality of dynamic attributessuch as quality (cumulative usages of registered subscriber devices513), quantities (number of registered subscriber devices 513 eachexpert device 516 may have registered), location, and the like.

In some embodiments, for example, if a certain type of request (forexample, question object) is received from a subscriber device 513 is,then methods described herein may also factor in credentials and yearsof experience associated to the expert device 516 owner.

In some embodiments, if a certain type of request is received (forexample, for a scheduling event), then methods described herein mayfactor in a proximity of devices closest to the subscriber device 513(for example, based on location information received from the device) aswell as presence management. For example, see impromptu appointmentbelow.

In some embodiment, if a request to establish a communication withanother device based on skill (for example, language) is received fromsubscriber device 513, then the processor may include a languagevariable. See method for language preference below.

In some embodiments, matrix generator may capture, track and extractdata points and browsing history associated with a lineage of eachsubscriber device 513 comprised within the matrix; from the referringdevice (its origin including location, product and browsing history,etc.).

Methods described herein may be used for a plurality of devicesassociated to clients and agents in a referral network, for example, areal estate vertical.

In some embodiments, a number of registrations and other data may bereceived from one or more subscriber devices 513 who may be in a similargeographic location as an expert device 516. An amount of interactiontime may be recorded, by project controller 502, that tracks whether theinteraction is from an (ancestral lineage) direct or indirect subscriberdevice, or other device with respect to device 513 of the user.

A value of the relationship matrix formed based on interactions may bethat a regional or national organization may instantly obtain a commonancestry of at least a portion of devices in an associated relationshipmatrix (comprising expert devices 516 and subscriber devices 513).

In some embodiments, key devices in a relationship matrix may include anoriginating or referring device, one or more subscriber devices 513(direct and indirect), and an expert device 516.

Devices that may be scored, by project controller 502, in a relationshipmatrix may comprise user devices and subscriber devices 513.

In some embodiments, project controller 502 may score a device based ona score associated to user devices in a relationship matrix and may beused to identify devices who are designated as most qualified to answerquestions originating from a subscriber device 513.

An objective of project controller 502 may be to score devices tocomplete a relationship matrix in a referral network environment.Accordingly, devices may be scored to isolate a device with a highnumber of successful interactions, or transactions, or are associated toa particular skill set. For example, in a referral network (or arelationship matrix), a completion or formation of a relationship matrixmay be desired. In some embodiments, a completion of a relationshipmatrix may be formed between devices when action is received fromsubscriber device in order to automatically create a set of affinitygroups 513.

The following may be events that may cause a subscriber device 513 toact; thus, requiring the scoring of devices previously to assigning atransaction. For example:

-   -   A request is received, at communication management engine 503,        from a subscriber device 513 requesting a voice communication        with an expert device 516;    -   A request is received, at communication management engine 503,        from a subscriber device 513 requesting a chat session with an        expert device 516;    -   When a request is received, at communication management engine        503, from a subscriber device 513, for example, an “ask the        expert” comprised within an email message;    -   When a calendar request is received, at communication management        engine 503, from a subscriber device 513, at communication        management engine 503 may automatically calendar an appointment;    -   When a request is received, at communication management engine        503, from subscriber device 513 requesting to establish an        electronic communication;    -   An interaction is received, at communication management engine        503, from an AI-based chatbot session.

In a preferred embodiment, multiple simultaneously created relationshipmatrices may be formed with a single subscriber device 513 associated tomultiple expert devices 516.

In some embodiments, project controller 502 may optimize a matrix suchthat a device with a high number of successful interactions/transactionsis identified and thus is assigned, by project controller 502, asubscriber device 513 opportunity.

In some embodiments, at communication management engine 503 may bringtogether expert device 516 and subscriber device 513 at a time aninteraction is received from subscriber device 513.

A scoring system may be used that allows subscriber devices 513 to askquestions and reward the expert device 516 who are most qualified toanswer the questions, positioning them as the expert device 516 thatpotentially gets business transactions associated to the subscriberdevices 513.

The communication control computer 501 may simultaneously compute devicescores (as described in FIGS. 8-9), to form or complete a relationshipmatrix, and enable communication between devices at the time thesubscriber device 513 has acted.

In the ask the expert scenario; a complex arrangement may be processedby completing a plurality of scores simultaneously.

In some embodiments, question objects may be received from subscriberdevices 513, whereby computer 501 may direct the questions to expertdevice 516 whose profile indicate that they are most qualified; further,computer 501 may store associated response objects into FAQ database 514so that the next time that question is asked a similar response patternmay be employed. In this regard, the expert device 516 who supplied theresponse object as well offer the winning expert device 516 the questionobject; provided the question object belongs to the market area of theexpert device 516.

Some bots known in the art may have difficulty in automaticallyresponding to the question objects accurately, accordingly, the questionobjects may be directed to an expert device 516 to provide a supervisedresponse in real-time. In this regard, the computer 501 determines thecontext of the question object being asked. The algorithm variable inthis case is a question object being asked and thus detected.

Another example would be questions that had to do with, for example,mortgage financing where the algorithm includes a device with skills inmortgage, or another example where we would have a legal person, a titleperson, and so on. In this case, we have a computer algorithm built thatmay include professionals in associated verticals.

The scoring of devices may occur when a subscriber device 513 wants toact. Further, the scoring of devices may factor and associate the typeof activity of the subscriber device 513 request.

The first scoring methodology by communication control computer 501 usesa computer algorithm to complete a relationship matrix with the mostqualified expert device 516. The relationship matrix is created viaregistered devices that are dynamically linked.

In some embodiments, the initial variables may include a total number ofdevices registered, average usage of each device and location ofdevices. Dynamic subscriber device 513 growth and system usage averagesas well location may be unpredictable and may happen simultaneously.Subscriber devices 513 may have total control over algorithms beingperformed. Ultimately when a change in scoring takes place, the changesare realized through the methods described herein.

Other variables may be included in the scoring methodology. For example:

Cumulative time used by each subscriber device 513 in application usages(along with the cumulative time in the hierarchy of the subscriberdevice which includes both direct and indirect devices of the subscriberdevice);

A total number of subscriber devices 513 registered (both direct andindirect devices);

Device location;

Weighting; for example, a direct subscriber device 513 is weightedhigher than indirect subscriber devices 513.

With additional variables, scoring may be adapted between devices toprovide a higher variance. Algorithm variables may include years ofexperience and or enhanced credentials such as, in a real-estateembodiment, a broker in real estate. Another location variable may bethe amount of time a device was reviewing a product (for example, a homein the case of real estate embodiment), in a particular, geolocationsuch as zip code or neighborhood. Another variable would be the pricerange of a home or a home-style (for example, Victorian, Tudor, loft,etc.) whereas one device is reviewing properties in a certain pricerange or reviewing properties with a particular home style. Thesevariables are available for selection at the time of registration.

A second scoring system aka “ask the expert” may provide a subscriberdevice 513 an opportunity to ask questions and to have them answered bythe most qualified as well the highest EAS scoring expert device 516 intheir market area. In the ask the expert scenario, a plurality ofrelationship matrices may be simultaneously created. In this regard,several variables may be added to the algorithm such as credentials(i.e., a broker) and length of time in the business.

In some embodiments, scoring subscriber devices 513 to reward subscriberdevices 513 for participating may be employed.

In some embodiments, predictive analytics for the likelihood of acommunication attempt by a subscriber device 513 may be employed.

In some embodiments, identifying and weighing the devices differentlythat are “gaming the system.”

In some embodiments, an AI chatbot where the chatbot places a templatein front of the user with several acts may be employed.

The skilled person will be aware of a range of possible modifications ofthe various embodiments described above. Accordingly, the presentinvention is defined by the claims and their equivalents.

What is claimed is:
 1. A system for configuring network pairingsenabling end-to-end communications between electronic devices, thesystem comprising: a network-connected communication control computercomprising a memory and a processor and further comprising programmableinstructions stored in the memory and operating on the processor, theinstructions when executed by the processor, cause the processor to:receive, from a first device, a communication object comprising at leasta network pairing request to communicate with a second device; identifyidentification information and historic data associated with thecommunication object; determine whether an affinity group associatedwith the first device is found; in response to finding the affinitygroup associated with the first device generate subscriber filtercriteria for the second device; determine whether the communicationobject has a valid permission token associated therewith; in response toa determination that the communication object does not have a validpermission token associated therewith, determine whether the subscriberfilter criteria is met by the first device; in response to adetermination that the subscriber filter criteria is met by the firstdevice, calculate a subscriber access score (SAS) for the first device;determine whether the SAS is greater than a predetermined thresholdvalue; in response to a determination that the SAS is greater than thepredetermined threshold value, determine handling criteria for thecommunication object; and transmit, based at least on the determinedhandling criteria, the communication object to the second device bycreating a dynamic network pairing between the first device and thesecond device.
 2. The system of claim 1, wherein the programminginstructions when further executed by the processor, cause the processorto: in response to a determination that the valid permission token isassociated with the communication object, transmit the communicationobject to the second device by creating the dynamic network pairingbetween the first device and the second device.
 3. The system of claim1, wherein the programming instructions when further executed by theprocessor, cause the processor to: in response to the determination thatthe communication object does not have the valid permission tokenassociated therewith, create a temporary permission token for thecommunication object when the SAS for the first device is greater thanthe predetermined threshold.
 4. The system of claim 1, wherein thecommunication object comprises of at least one voice interaction, andwherein the programming instructions when further executed by theprocessor, cause the processor to: provide a conversational interactivevoice response (IVR) to the first device; capture a dialog as a responseto the conversational IVR from the first device; convert the receiveddialog using speech to text; and process the dialog using naturallanguage processing (NLP) to determine identification information andcontext associated with the communication object.
 5. The system of claim1, wherein the programming instructions when further executed by theprocessor, cause the processor to: in response to the determination thatthe communication object has a valid temporary permission tokenassociated therewith, determine whether generation of a permanentpermission token is required for the communication object; and generatethe permanent permission token for the communication object, in responseto a determination that the permanent permission token is required. 6.The system of claim 1, wherein the programming instructions when furtherexecuted by the processor, cause the processor to: in response to thedetermination that the communication object has the valid permissiontoken associated therewith, determine whether the first device isauthorized; and if the first device is authorized, forward communicationobject to be displayed on a graphical user interface and/or audiointerface of the second device, based at least on a type ofcommunication object.
 7. The system of claim 6, wherein the type ofcommunication object comprises one of a video call, a text message, anemail, a voice call, a multimedia message, or a combination thereof. 8.The system of claim 6, wherein the programming instructions when furtherexecuted by the processor, cause the processor to: if the first deviceis authorized, determine real-time availability of the second device;request a response object corresponding to the communication object fromthe second device; and transmit the response object to be displayed on agraphical user interface of the first device.
 9. The system of claim 1,wherein the programming instructions when further executed by theprocessor, cause the processor to: determine whether the communicationobject is accepted by the second device; and in response to adetermination that the communication object is not accepted by thesecond device, move the communication object to an unsolicited networkpairing request directory.
 10. A system for configuring network pairingsenabling end-to-end communications between a subscriber device and anexpert device, the system comprising: a network-connected communicationcontrol computer comprising a memory and a processor and furthercomprising programmable instructions stored in the memory and operatingon the processor, the instructions when executed by the processor, causethe processor to: receive, from a subscriber device, a communicationobject comprising at least a question object; determine a context of thequestion object; determine whether a corresponding response object isavailable for the received question object; in response to adetermination that the corresponding response object is unavailable,generate binary filter criteria for the subscriber device; create aplurality of expert profiles, each associated with an expert device froma plurality of expert devices, based at least on the binary filtercriteria for the subscriber device and the context of the questionobject; calculate a Question Attribute Score (QAS) for the questionobject; calculate an Expert Attribute Score (EAS) for each of theplurality of expert profiles; rank a subset of expert profiles based onthe QAS and the EAS; transmit the ranked subset of expert profiles fordisplay on a graphical user interface of the subscriber device; receivea selection of an expert profile, of the subset of expert profiles, fromthe subscriber device; determine whether a first expert devicecorresponding to the selected expert profile is available for a givenperiod of time; and in response to a determination that the first expertdevice is available for the given period of time, create a networkpairing between the first expert device and the subscriber device forthe given period of time.
 11. The system of claim 10, wherein theprogramming instructions when further executed by the processor, causethe processor to: determine whether the question object is an audio oraudio-video form; and in response to a determination that the questionobject is in the audio or audio-video form, initiate speech to textconversion with optional NLP processing to determine the context of thequestion object.
 12. The system of claim 10, wherein the programminginstructions when further executed by the processor, cause the processorto: in response to a determination that the corresponding responseobject is available, transmit the corresponding response object to bedisplayed at a graphical user interface of the subscriber device. 13.The system of claim 10, wherein the programming instructions whenfurther executed by the processor, cause the processor to: add the EASand QAS to generate an Expert Score (ES); normalize the ES to analyzeeach expert profile of the subset of expert profiles; and rank thesubset of expert profiles based on the analysis.
 14. Acomputer-implemented method for configuring network pairings, enablingend-to-end communications between electronic devices, the methodcomprising: receiving, by a communication control computer from anetwork-connected first device, a communication object comprising atleast a network pairing request to communicate with a network-connectedsecond device; identifying, by the communication control computer,identification information and historic data associated with thecommunication object; determining, by the communication controlcomputer, whether an affinity group associated with the first device isfound; in response to finding, by the communication control computer,the affinity group associated with the first device generating, by thecommunication control computer, subscriber filter criteria for thesecond device; determining, by the communication control computer,whether the communication object has a valid permission token associatedtherewith; in response to determining, by that the communication controlcomputer, that the communication object does not have the validpermission token associated therewith, determining, by the communicationcontrol computer, whether the subscriber filter criteria is met by thefirst device; in response to determining, by the communication controlcomputer, that the subscriber filter criteria is met by the firstdevice, calculating, by the communication control computer, a subscriberaccess score (SAS) for the first device; determining, by thecommunication control computer, whether the SAS is greater than apredetermined threshold value; in response to determining, by thecommunication control computer, that the SAS is greater than thepredetermined threshold value, determining, by the communication controlcomputer, handling criteria for the communication object; andtransmitting, by the communication control computer, based at least onthe determined handling criteria, the communication object to the seconddevice by creating a dynamic network pairing between the first deviceand the second device.
 15. The method of claim 14, further comprising,in response to determining, by the communication control computer, thatthe valid permission token is associated with the communication object,transmitting, by the communication control computer, the communicationobject to the second device by creating the dynamic network pairingbetween the first device and the second device.
 16. The method of claim14, further comprising, in response determining, by the communicationcontrol computer, that the communication object does not have the validpermission token associated therewith, creating, by the communicationcontrol computer, a temporary permission token for the communicationobject when the SAS for the first device is greater than thepredetermined threshold.
 17. The method of claim 14, further comprising:in response determining, by the communication control computer, that thecommunication object has a valid temporary permission token associatedtherewith, determining, by the communication control computer, whethergeneration of a permanent permission token is required for thecommunication object; and generating, by the communication controlcomputer, the permanent permission token for the communication object,in response to determining that the permanent permission token isrequired.
 18. The method of claim 14, further comprising: in response todetermining, by the communication control computer, that thecommunication object has the valid permission token associatedtherewith, determining, by the communication control computer, whetherthe first device is authorized; and if the first device is authorized,forwarding, by the communication control computer, the communicationobject to be displayed on a graphical user interface of the seconddevice, based at least on a type of communication object.
 19. The methodof claim 18, wherein the type of communication object comprises one of avideo call, text message, email, voice call, multimedia message, or acombination thereof.
 20. The method of claim 18, further comprising: ifthe first device is authorized, determining, by the communicationcontrol computer, real-time availability of the second device;requesting, by the communication control computer, a response objectcorresponding to the communication object from the second device; andtransmitting, by the communication control computer, the response objectto be displayed on a graphical user interface of the first device. 21.The method of claim 14, further comprising: determining, by thecommunication control computer, whether the communication object isaccepted by the second device; and in response to determining, by thecommunication control computer, that the communication object is notaccepted by the second device, moving, by the communication controlcomputer, the communication object to an unsolicited network pairingrequest directory.