Enhancing existing social media network from data

ABSTRACT

The present disclosure is directed to a system and method to allow sellers of products to establish individual products in a multilevel marketing (MLM) commission system, where the product is offered and sold to a first purchaser—who then actively by requesting a code, or passively, through the purchase of the product, becomes a user of the commission system. This user is provided a code such that the code may be passed onto followers of the registered user. The registered user will be allowed to advertise the product to a second purchaser and the second purchaser will be allowed to purchase the product and provide advertisements to other purchasers. Commissions paid to respective downline purchasers for a single product may be limited by a preset number of defined levels. After a product is purchased, commissions are paid out to each respective purchaser according to the commission plan. The system may identify users that are connected within the system and who use the same social media site. The system may then suggest that these users connect on the social media site based on their existing connections within the system.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims the priority benefit of U.S. provisionalapplication No. 63/049,867 filed Jul. 9, 2020, the disclosure of whichis incorporated herein by reference.

BACKGROUND OF THE INVENTION Field of Invention

The present disclosure is generally related to multi-level commissionpayment systems and methods. More specifically the present disclosure isdirected to providing commissions, referral, and/or finder fees topurchases made by related users.

Description of the Related Art

A Multilevel marketing (MLM) commission payment system is a salesmethodology used by some direct sales companies, which may be used toencourage existing distributors to recruit new distributors who are paida percentage of their recruits' sales. The recruits are “downline” ofthe distributors. Distributors also make money through direct sales ofproducts to customers. Amway, which sells health, beauty, and home careproducts, is an example of a well-known direct sales company that usesmultilevel marketing.

Multilevel marketing (MLM) has been found to be a legitimate businesssales methodology if participants receive something of value for theirparticipation in an MLM organization. Even though Amway has a pyramidlike structure where sponsors may receive more benefits than newrecruits, Amway been judged to be a legitimate organization because allparticipants receive the benefit of purchasing products at a competitiveprice. One problem with some MLM organizations referred to as “pyramidschemes” is in instances where new recruits do not receive any benefitbased on just joining the MLM organization. One characteristic of an MLM“pyramid scheme” versus a legitimate MLM organization is that in a“pyramid scheme” participants receive benefits based primarily fromsigning up other new recruits. Thus, money received from the newrecruits only pays people above them or at the top of the organizationrather than new recruits or others who actually perform work (e.g., theselling of products). As such, a “pyramid scheme” is also characterizedby paying sponsors rather than individuals that perform the work. Thisis why “pyramid schemes” are illegal. These “pyramid schemes” involvetaking advantage of people by pretending to be engaged in legitimatemultilevel or network marketing activities when their greater focus ison recruitment rather than on product sales.

One issue in determining the legitimacy of a multilevel marketingcompany is whether it sells its products primarily to consumers or toits members who must recruit new members to buy their products. If it isthe former, the company is likely a legitimate multilevel marketer. Ifit is the latter, it could be an illegal pyramid scheme.

Each MLM company dictates its own specific financial compensation planfor the payout of any earnings to their respective Distributors.Compensation is exclusively in the form of commissions that require aparticipant to enter a contract, pledging exclusivity in participationto the MLM company paying the commissions. A new recruit by contract, isexpressly prohibited from joining, recruiting for another MLM, andoffering alternative goods or services from any other MLM Company.

MLM compensation plans theoretically pay out to participants only fromtwo primary possible revenue streams. The first is paid out fromcommissions of sales made by the participants directly to their ownretail customers. Retail customers are not tracked or known by the MLMcompany therefore MLM companies cannot substantiate either theirexistence or their sales volume individually or collectively. The secondis paid out from commissions based upon the wholesale purchases made byother distributors below the participant who have recruited those otherparticipants into the MLM; in the organizational hierarchy of MLMs,these participants are referred to as one's downline distributors.

MLM salespeople (distributors) are, therefore, expected to sell specificMLM company products directly to end-user retail consumers by means ofrelationship referrals and word of mouth marketing, but most importantlythey are incentivized to recruit others to join the company'sdistribution chain as fellow salespeople so that these can becomedownline distributors.

Currently, no large financially successful MLM salesperson (distributor)can earn commissions of any significance or take full advantage of acommission compensation plan without personally recruiting others intotheir downline.

All MLM compensation companies permanently place new recruits in a treestructure for calculating commissions. Once placed, all sales made bythat distributor from their personal purchases, or from new recruitsthey sponsor, generate commissions only for their sponsor and upline,regardless of all future products sold.

MLM companies offer goods or services offered specifically andexclusively by them. The large markups required for payment ofcommissions necessitate MLM companies to limit what products they canoffer such that they will be financially indifferent regarding whichproduct a distributor chooses to buy.

MLM companies currently require a “pay to play” requirement.Distributors are required to make monthly purchases, and/or meetdownline group sales volumes to qualify for commissions. Thus, the mode,median and average purchase size of a Distributor in MLMs is virtuallyequal to this minimum qualification requirement and no greater.

Distributors only qualify for commissions if they have purchased aminimum threshold of products offered exclusively by the MLM company asset forth by an MLM company's commission program rules.

Currently, in order to join an MLM organization, there is an initiationfee, which may be a barrier against those that just wish to refer asingle product offered by the MLM company. Current multi-level marketing(MLM) systems do not take full advantage of the internet and howconsumers can influence other consumers to make purchases. Also, currentMLM systems do not incorporate incentivizing users of a multilevelmarketing system by offering a dynamic commission tree. In addition,there is no current MLM system that utilizes the money or fundsdedicated to discounts or coupons to be reincorporated into a multilevelmarketing system to incentive consumers to make purchases and advertisethe product that they purchased.

Currently, a company that is not utilizing an MLM structure for payingcommissions for sales, cannot introduce one without developing acompensation plan specific for their company, following the methodologyoutlined above, and thus requiring them to become and subsequentlyadhere to applicable MLM law.

Thus, there is a need to provide any company an opportunity tocompensate consumers in the way of commissions, referral, and/or finderfees without being subject to MLM law.

Further, there is currently no systematic way for consumers to promoteany brand of preference outside the MLM industry and be paid in an MLMcommission methodology without subjecting themselves to a contractualsignup, initiation fees, minimum recurring purchases sales volumerequirements, recruiting, exclusivity and permanent tree placement(resulting in only upline Distributors earning commissions). Many MLMstake advantage of existing social networks to distribute products andgain recognition, but often this is not a mutually beneficialarrangement and many MLMs do nothing to grow or improve social networks.

BRIEF DESCRIPTIONS OF THE DRAWINGS

FIG. 1 illustrates a system for Multi-Level Marketing of products via aset of computing devices.

FIG. 2 illustrates a method that may be performed by a computer thatperforms functions consistent with the administration network computer110 of FIG. 1.

FIG. 3 illustrates a method that may be performed at a user device 140of FIG. 1 when operations of a multi-level-management system consistentwith the present disclosure are performed.

FIG. 4 illustrates a method that may be performed by a computer at thethird party network computer 160 of FIG. 1.

FIG. 5 illustrates a method that may be performed by the administrationnetwork computer 110 executing the set of connection programinstructions 135 of FIG. 1.

FIG. 6: Illustrates a computing system that may be used to implement anembodiment of the present invention.

SUMMARY OF THE CLAIMED INVENTION

A buyer purchases a product that is registered with an administrationnetwork. The buyer then automatically becomes a user (user A) of theadministration network. The administration network generates a code(code A) that is associated with user A. User A may provide informationto the administration network on which social media sites they areactive on. Another buyer purchases the same product, and in the processof making the purchase uses code A. The second buyer also automaticallybecomes a user (user B) of the administration network. Theadministration network generates different code (code B) that isassociated with user B and with code A. User B may provide informationto the administration network on which social media sites they areactive on. The user A is awarded commission because user B used code A.If user A and user B have any active social media sites in common, thenthe administration network suggests that they connect. Another buyerpurchases the same product using the code associated with user B. Thethird buyer also automatically becomes a user (user C) of theadministration network. The administration network generates differentcode (code C) that is associated with user C and code B. User C mayprovide information to the administration network on which social mediasites they are active on. Both user A and user B are awarded commissionbecause use C used code B, which is associated with code A. If user Aand user C or user B and user C have any active social media sites incommon, then the administration network suggests that they connect.

Alternatively, a computer that is part of an administration networkreceives a notification that a buyer has purchased a registered product.The computer then identifies the buyer as a user (user A). The computergenerates a code (code A) that is associated with user A. User A mayprovide the computer with social media sites they are active on. Thecomputer receives a notification that another buyer has purchased thesame product, and the notification includes code A. The computer thenidentifies the second buyer as a user (user B). The computer generates adifferent code (code B) that is associated with user B and code A. UserB may provide the computer with social media sites they are active on.The computer awards commission to user A because the notificationincluded code A. The computer detects if user A and user B have anactive social media site in common. If so, the computer notifies theusers and suggests they connect. The computer receives a notificationthat another buyer has purchased the same product, and the notificationincludes code B. The computer then identifies the third buyer as a user(user C). The computer generates a different code (code C) that isassociated with user C. User C may provide the computer with socialmedia sites they are active on. The computer awards commission to bothuser A and user B because the notification included code B, which isassociated with code A. The computer detects if user A and user C oruser B and user C have an active social media site in common. If so, thecomputer notifies the users and suggests they connect.

DETAILED DESCRIPTION

The present disclosure is directed to a system and method to allowsellers of products to enroll an individual product in a multilevelmarketing (MLM) type commission system [system], where a good or service[product] is offered by any vendor and sold to a first purchaser—who atthe time of the purchase becomes a system user. This user has a codetied to the specific product(s) offered by the participating vendor. Thecode is shared by this first user passively (by a purchase) or actively(by request) to the new buyer. The code share makes the new buyer a userof the system. The new user, like the first, will be allowed to purchasethe product and provide advertisements to other purchasers. Commissionspaid to respective downline purchasers for a single product may belimited by a preset number of defined levels. After a product ispurchased, commissions are paid out to each respective purchaseraccording to the defined commission levels.

An administration network computer, as shown in FIG. 1, identifies thata product has been purchased from a user(s) of the system [first user].The system may generate an embedded coded link that connects (links) thereferrer to the purchaser(s). This link may be shared automatically ormanually depending on the referrer's preference. The computer may thenautomatically pay remuneration, in the form of a commissions, referral,and/or finder fees, to the first user. Additionally, the purchaser(s)becomes a second user(s) of the system. Should a new individual buy thesame product from the second user(s), another embedded coded link mayconnect the first user to not only the second user but the newindividual(s) as well. Both the first and second user of the system areremunerated for the new individual(s) purchase. This wave of creatingand recreating users (1, 2, 3, etc.) based on purchases and linking themtogether may be indefinitely iterative. Remuneration on this specificproduct may be paid to all users linked together in the system, eachtime a purchase is made. The links may be unique and are fixed to eachgood or service being referred.

FIG. 1 illustrates a system 100 for Multi-Level Marketing of productsvia a set of computing devices. The system of FIG. 1 includes anadministration computer or “administration network” computer 110, a usercomputing device 140 (user device), and a third party network computer160. Each of the devices of FIG. 1, the administration network computer110, the third party network computer 160, and user device 140 maycommunicate with each other via the communications network 185 such asthe Internet or a cloud.

A memory, as shown in FIG. 5, at the administration network computer 110may store commission program instructions 120 executed by a computerprocessor, and an administration database 130. User device 140 of FIG. 1may be any user device such as a laptop, smartphone, tablet, computer,or smart speaker which may include a user device communication interface150 which may be a network interface as shown in FIG. 5. The third partynetwork computer 160 of FIG. 1 may include discount program instructions170 executed by a computer processor, a memory, and a communicationinterface 150 which may be a network interface.

Use of the system may be as follows. A user connects a user device 140to the communication network 185 via the user device communicationinterface 150. Through the communication network 185 the user device 140connects with the third party network computer 160 via the third partynetwork communication interface 170. A set of third party networkdiscount program instructions 180 allow the user to purchase a productfrom the third party network computer 160 and apply a discount to theproduct if a user has a code. Confirmation of the purchase and the codeare then sent from the third party network computer 160 to theadministration network computer 110. If the user did enter a code, a setof administration network commission program instructions 120 will paycommission to at least another user that is associated with the code. Anew code is then generated by the administration network 110 per theadministration network commission program instructions 120. The new codeis associated with the user of the user device 140. The commission andthe newly generated code are stored in the administration networkadministration database 130. Through the communication network 185 theuser device 140 connects with the administration network computer 110. Auser may sign-in to the administration network computer 110 usingcredentials from a social media site 190. The social media programinstructions 125 may validate the login with the social media site 190via the API 195. If two users are associated within the administrationnetwork computer 110 based on the use of codes to purchase products, theconnection program instructions 135 may determine if those two usershave any social media sites 190 in common. If so, the connection programdetermines if a connection should be suggested based on connection rulesfor the social media site 190. If the connection rules result in aconnection, the social media site 190 contact information of each useris sent to the user device 140 of the other user. The new connectionprogram instructions 155 then facilitate the creation of a newconnection on the social media site 190.

Program code instructions of the administration network computer 110 maybe organized as one or more software modules that include instructionsfor performing different functions. For example, a set of commissionprogram instructions 120 may include base program instructions,advertising program instructions, calculation program instructions, andvendor program instructions. the administration network computer 110 mayalso access one or more databases, such as a compensation database thatstores compensation data and a code database that stores program code orweb link data, for example. The administration network computer 110 mayaccept sellers (third parties), where a “single product tree”multi-level marketing method is formed, comprising the steps of,providing at least one product, providing an MLM system with a seller'scommission structure, and providing at least one seller of a productwith its associated commission structure. The term “single product tree”refers to a unique structure for associating distributors of an MLMorganization where products are used to identify relationships betweendistributors and commissions paid to related distributors. This “singleproduct tree” structure allows for a particular user to be considered asponsor or any other user based on that user sending promotions to otherusers to purchase a product that those other users were not previouslyassociated with.

The administration network computer 110 may also provide a plurality ofbuyers/distributors, allow the at least one first seller to enroll aproduct to the MLM system, and allow at least a first buyer/distributorto purchase the product. Other functions that may be performed by theadministration network computer 110 include allowing the at least thefirst buyer/distributor to advertise the product to other potentialbuyers/distributors and allowing at least a second buyer/distributor tobuy the advertised product. Here the seller may set a commissionstructure for a product, may enroll the product into the MLM system, mayallow the first, second and so on purchasers/distributors to purchaseand advertise the product.

Once products have been enrolled with a commission structure, theadministration network computer 110 may allow thepurchasers/distributors to receive a commission based upon the seller'sproduct commission structure. A distributor may refer to thenon-salaried workforce selling the company's products or services. Herethe earnings of the participants may be derived from a pyramid-shaped orbinary compensation commission system. The term product may refer toarticles or substances manufactured or refined for sale. Product mayrefer to an individual product, a line of products such as unique brandand model of drill, or a group of products such as all power tools. Aservice may refer to a system supplying a public need such as transport,communications, or utilities such as electricity or water.

A service which may be an act of dealing with a customer in a store,restaurant, or hotel by taking their orders, showing, or selling themgoods. Additionally, a service which may be work that someone does ortime that someone spends working for an organization, or a business thatoffers a particular type of help or work. The system 100 of FIG. 1 maydistribute commissions according to an MLM tree or commission tree thatis a payment structure in which commissions are given out at differentpercentages at different levels of the MLM tree, for example. In such asystem distributor (users) that perform the sale or that are at a levelthat is “closer” to the distributor that performed the sale may receivelarger commissions than distributors that are “farther” from the sale.

In another example, a first MLM distributor that performs a sale mayreceive a higher percentage than a second distributor that sponsored thefirst distributor, and a third distributor that signed up the seconddistributor may receive a lower commission than the commission receivedby the second distributor for the sale. Distributors in an MLM tree maybe referred as “downline” or “upline” distributors depending on wheredifferent users rank on the MLM tree. For example, a first user thatsponsors a second user is “upline” from the second user and the seconduser is “downline” from the first user in the MLM tree. Furthermore, anyuser/distributor that the second user sponsored would be considereddownline from the second user and could be downline from the first useras well for a given MLM product tree. When a “single product tree”structure is used to identify commissions, users that are downline fromthe second user may not be downline from the first user based on thesecond user purchasing and advertising products not associated with thefirst user. When the first user purchases the product initiallyadvertised by the second user, the second user may be considered uplineof the first user after the first user for this product. Because ofthis, the second user is not relegated to always be downline from thefirst user just because the first user originally sponsored the seconduser to become an MLM distributor.

An MLM system which may be referred to as network marketing, may be abusiness model that depends on person-to-person sales by independentrepresentatives, who may work from their home. A network marketingbusiness may require the independent representatives to build a networkof business partners or salespeople to assist with lead generation andclosing sales. End of life of MLM tree may refer to the end of the MLMtree in which the commission tree may be restructured or eliminated. Forexample, further participants in the MLM may not receive a commission,the commission tree may “startup” (be reinitiated from a starting point)again, or the commission tree may be restructured in some other way. Anexisting MLM system may refer to currently existing or establishedcompanies that use the sales strategies to encourage existingdistributors to recruit new distributors who are paid a percentage oftheir recruits' sales.

The administration network computer 110 may perform data securityfunctions as well as functions associated with operation of an MLMalgorithm that may calculate user compensation. Administration networkcomputer 110 may be able to connect to a software application store,like the “Apple App Store,” where a program application can bedownloaded from. Data security may refer to the process of protectingdata from unauthorized access and data corruption throughout itslifecycle. Data security may include data encryption, tokenization, andkey management practices that protect data across all applications andplatforms. An MLM algorithm may refer to a calculation performed using acompensation decay rate to calculate the commissions for downlineparticipants.

The commission program instructions 120 of FIG. 1 may cause a computerprocessor in the administration network computer 110 to continuouslypoll for user data (e.g., data of a user who may be a product purchaseror product distributor) from another processor executing a set ofdiscount program instructions 180 at a third party network computer 160.Once the processor of the administration network computer 110 receivesthe user data, commissions may be calculated using the commissionprogram instructions 120 of FIG. 1. These commissions may be calculatedbased on data stored in an administration network compensation database.Downline and upline commissions for the other users (productpurchasers/distributors) within the MLM tree may be paid. Theadministration network compensation database may be included within theadministration database 130 of FIG. 1 or it may be a separate databaseaccessible by the administration network computer 110. Alternatively,instead of the administration network computer 110 polling a third partynetwork computer 160, the third party network computer 160 may send theuser data to the administration network computer 110 after a sale hasbeen made.

An upline may refer to the MLM distributors that recruits work for assalespeople to sell the products or services. A downline may refer tothe recruits the MLM distributors are able to secure as participants inthe MLM system. Downline MLM trees may go across country boundaries andcommissions may be paid out for an MLM tree even though the participantsin the MLM tree may not reside in the same country. The commissions maybe calculated for the appropriate exchange rate to ensure participantsare paid in their residing countries currency in the correct amount.

A processor executing the commission program instructions 120 of FIG. 1may continuously poll for user data from the third party networkcomputer 160. The administration network computer 110 may then receivethe user data from the third party network computer 160. Then theadministration network computer 110 may determine whether the userentered a code. If the user did enter a code, the processor at theadministration network computer 110 may extract the code and then accessthe administration network compensation database to identify one or moredifferent spheres of influence or potential productpurchasers/distributors levels. Such a code may have been received fromuser device 140 based on user inputs.

The processor at the administration network computer 110 may alsoassociate a code for each of the different spheres of influence. Theadministration network computer 110 may then extract a correspondingcommission for the code that was retrieved from in the administrationnetwork compensation database. The administration network computer 110may then send the commission to the user (purchaser/distributor). Theadministration network computer 110 may track profits and payments aswell as track taxes for users enrolled in the MLM system. The trackingof profits and payments may refer to the MLM system tracking the profitsof the MLM and tracking the payments or commissions paid out toparticipants. The tracking of taxes may refer to tracking thecommissions provided to participants for tax purposes. Then theadministration network computer 110 may also compare the extracted codeto data stored at an administration network code database a list ofusers and code sent to followers may be stored. This administrationnetwork code database may be the same database as the administrationdatabase 130 of FIG. 1 or it may be another database accessible by theadministration network computer 110. The administration network computer110 may extract a user ID and sphere of influence or potentialpurchaser/distributor by using the extracted code.

The administration network computer 110 may then compare the extractedsphere of influence or potential purchaser/distributor to data stored atthe administration network compensation database. The administrationnetwork computer 110 may then use the extracted sphere of influence datato extract a corresponding commission from the administration networkcompensation database. The administration network computer 110 may thensend the commission to an upline user. If the user did not enter a code,the administration network computer 110 may then initiate a set ofadministration network advertising program instructions.

The social media module 125 of FIG. 1 may allow a user to sign into to asocial media site 190. The social media module 125 then determines ifthe sign-in was valid by using the API 195 of the social media site 190.If the sign-in was valid then the credentials are stored in a databasesuch as a social media database or the administration database 130.

The administration database 130 may store data received from variousthird parties (various sellers) that are part of a set of MLM trees.This data may contain a product ID, description of the item, an originalcost of the item, a discount for the item, a cost of the product withthe discount, a compensation plan decay rate, and a link to the item. Anadvertising link may refer to a link that directs a consumer to aproduct, service or good.

TABLE 1 Administration Database Data third party Home Depot Home DepotFurniture Store ID 654123 789654 123789 Item Drill Table Saw CouchOriginal Cost $59.00 $tem119.00 $999.00 discount 15% 10% 10% discountCost $50.15 $107.10 $899.10 Compensation 50% 50% 30% Decay Rate LinkHDDrill654123 HDTSaw789654 FSC123789

Table 1 table displays data that may be stored at the administrationdatabase 130 of FIG. 1. When the administration network computer 110receives product data from third party network computer 160 it creates alink for the item, stores the received data in the administrationnetwork administration database 130, and sends the created link back tothe third party network computer 160. The administration networkadministration database 130 may be used to store data collected fromvarious third parties that enrolled in the multi-level marketing system100 of FIG. 1. The administration network administration database 130may store the name of the third party, the ID for an item, a descriptionof the item, the original cost of the item, the discount provided by thethird party, the cost of the product with the discount, the compensationdecay rate or how the downline commissions are calculated, and the linkto the item.

The administration database 130 may store data that the administrationnetwork computer 110 may access when communicating events with thedownlines and uplines, providing dynamic incentives or rewards for aproduct, distributing marketing materials, providing banking referrals,or distributing materials for suggestive selling, etc. Here,communicating events with downlines and uplines may refer to sendinginformation relating to advertising events to participants of an MLMsystem. Dynamic incentives and rewards for a product may refer toincentives or rewards that are continuously updated for a product.Marketing materials may refer to a means of marketing, advertising orpromotional materials developed by or for license (or subject tolicensee's approval) that promote the sale of the licensed product,including but not limited to, television, radio and online advertising,point of sale materials (e.g., posters, counter-cards), packagingadvertising, print media and all audio or video media. Banking referralsmay refer to a structured flow of collecting and organizing referralsfor banks. Businesses who have been unsuccessful in a credit applicationprocess with a bank may be asked for their permission to have theirfinancial information passed to designated finance platforms who cancontact the business in a regulated timeframe. Suggestive selling mayrefer to a sales technique where an employee asks a customer if theywould like to include an additional purchase or recommends a productwhich might suit the client.

The connection program instructions 135 of FIG. 1 may cause a computerprocessor in the administration network computer 110 to poll for a newsocial media credentials from a user. This data may be stored in asocial media database or the administration database 130. Each socialmedia site 190 may have its own specific set of connection rules. Theadministration network computer 110 selects the set of rules that applyto the new credentials and determines if there are any other users thatfall within the connection rules. For example, a rule may be to suggesta connection between any two users that are within three levels ofinfluence in the same product tree. If user D used the code of user C,who used the code of user B, who used the code of user A, then user Aand user D may be connected if they both are active on the same socialmedia site 190.

As mentioned above user device 140 may include a memory, a processor,and a communication interface 150. The processor of user device 140 mayexecute instructions out of the memory when a user of user device 140registers as a member of an MLM organization. Other tasks that a usermay perform on user device 140 could include, identifying or connectingwith other user devices (e.g., follower user devices), preparingadvertisement information to share with follower user devices, receivingadvertisement information prepared by other users, accessing productpromotions at the third party network computer 160, and purchasingproducts based on offerings received from the third party networkcomputer 160. Each of the tasks performed by user device 140 may includesending and receiving communications with the administration networkcomputer 110, the third party network computer 160, or other userdevices. Promotions prepared at a particular user device may be sharedwith other user device via administration network computer 110, thirdparty network computer 160, a social media network computer, or directlyfrom one user device to another. User devices may also be required todownload and install an application program from an application store,such as the “Apple App store” as part of a process for registering as amember of an MLM organization.

The user device communication interface 150 of FIG. 1 may send andreceive data via a communication network 185 which may be a wired and/ora wireless network.

As discussed above the third party network computer 160 of FIG. 1 mayinclude a computer processor a memory, and communication interface 170.This third party network computer 160 may be controlled by various thirdparties, such as retail stores (stores that sell product consumables,services, franchises, service networks, large box stores) or e-commercesites that allow e-commerce sales. Such e-commerce sites may include ane-commerce shopping cart, that offer items to users at a discount, suchas a product discount, in order to use the MLM system of FIG. 1. Afranchise may refer to an authorization granted by a government orcompany to an individual or group enabling them to carry out specifiedcommercial activities, e.g., providing a broadcasting service, or actingas an agent for a company's products. Product consumables may refer togoods by individuals and businesses that must be replaced regularlybecause they wear out or are used up. Service networks refer to acollection of people and information brought together on the internet toprovide a specific service or achieve a common business objective, suchas Angie's List. E-commerce sale may refer to sales of goods andservices where the business takes place over the internet, an extra-net,Electronic Data Interchange (EDI), or other online system.

Payment may or may not be made online. Business in this context may bedefined as an order placed by the buyer or price and terms of salenegotiated. E-commerce shopping cart may refer to a software used inE-commerce to assist visitors to make purchases online. Upon checkout,the software calculates the total of the order, including shipping andhandling, taxes and other parameters the owner of the site haspreviously set. Retailer may refer to a person or business that sellsgoods to the public in relatively small quantities for use orconsumption rather than for resale. Product discounts may refer to areduce price or something being sold at a price lower than that productis normally sold for. It is a reduction to a basic price for a good orservice. Large box stores may refer to a physically large retailestablishment, usually part of a chain of stores, offers a variety ofproducts to its customers. The term sometimes refers, by extension, tothe company that operates the store, and which may be referenced as asupercenter, superstore, megastore, etc. These stores achieve economiesof scale by focusing on large sales volumes. Because volume is high, theprofit margin for each product can be lowered, which results in verycompetitively priced goods. The term “big-box” is derived from thestore's physical appearance.

The third party network communication interface 170 of FIG. 1 may senddata and receive via a communication network 185 which may be a wiredand/or a wireless network.

The third party network discount program instructions 180 of FIG. 1 maybe executed by a computer processor after being initiated by a set ofthird party network base program instructions. These instructions maycause the processor at the third party network computer 160 to promptuser for a discount code and to compare a received code to data storedat a third party network third party database. When a code received froma user matches data stored at the databases, a discount for the selectedproduct may be applied and an order for a product may be processed.

The communications network 185 of FIG. 1 may be the Internet or a cloud.This communication network or any of the communication networkinterfaces 150 or 170 discussed herein may be a wired and/or a wirelessnetwork. Such a communication network, if wireless, which may beimplemented using communication techniques such as Visible LightCommunication (VLC), Worldwide Interoperability for Microwave Access(WiMAX), Long Term Evolution (LTE), Wireless Local Area Network (WLAN),Infrared (IR) communication, Public Switched Telephone Network (PSTN),Radio waves, and other communication techniques known in the art. Thecommunication network may allow ubiquitous access to shared pools ofconfigurable system resources and higher-level services that can berapidly provisioned with minimal management effort, often over Internetand relies on sharing of resources to achieve coherence and economies ofscale, like a public utility, while third-party clouds enableorganizations to focus on their core businesses instead of expendingresources on computer infrastructure and maintenance.

The social media site 190 of FIG. 1 may be a website that allows usersto create accounts which have credentials, usually a username andpassword, and which allows those users to interact with each other. Forexample, Facebook, Instagram, Twitter, Tumblr, Snapchat, etc. the socialmedia site may be an internally owned site, meaning the site is owned orcontrolled by the same party as the administration network computer 110.

The API 195 of FIG. 1 may be a set of functions and procedures allowingthe creation of applications that access the features or data of thesocial media site 190 which allows the MLM system modules to interactwith the social media site 190.

FIG. 2 illustrates steps 200 that may be performed by a computer thatperforms functions consistent with the administration network computer110 of FIG. 1. FIG. 2 begins at step 210 wherein the administrationnetwork computer 110 receives data from the third party network computer160 of FIG. 1. The received data may contain information on a purchasedproduct and the discount code applied to the purchase. This step may befacilitated by a set of administration network base program instructionsstored in memory and executed by a processor. The administration networkcomputer 110 may determine if the data received from the third partynetwork computer 160 contains a code, at step 220. If the data doescontain a code, the administration network computer 110 checks that boththe product and code match data stored in the administration networkadministration database 130 and/or other databases and are recognized asvalid, at step 230. If the code is valid, the computer at administrationnetwork computer 110 may calculate commissions due to each upline user,at step 230.

The commissions may be calculated by using the discount on the productand providing 50% of the discount to the user who supplied a code andthen the remaining amount of the discount for the upline users at a 50%decay rate. For example, if the first user purchased a product that wasoriginally $59.00 discounted by 15%, then a second user makes a purchasewith the first user's code would receive $3.32 or 50% of the discount.Then any follower of the second user who uses the second user's codewould cause the second user to receive 50% of the discount and the firstuser to receive 50% of the remaining discount or 50% of $3.32, and thismay continue until there is only one cent left to pay out as acommission for the upline users. The threshold at which commission stopsmay be greater or less than one cent and may be set dynamically. Thisstep may be facilitated by administration network calculation programinstructions stored in memory and executed by a processor. Then, theadministration network computer 110 may distribute the commission to theupline users, at step 250. Commission may be paid directly to a user viathe user device 140 of FIG. 1. The data may be stored in a database, forexample, an administration network compensation database discussedabove. Whether or not a valid code was entered, the administrationnetwork computer 110 may generate a new code for the user such that theuser can give a code to followers and receive commission on theirpurchases, at step 260 of FIG. 2. This generated code may be stored inthe administration database 130 of FIG. 1 or another database, forexample an administration network code database.

A set of administration network base program instructions may instructthe administration network computer 110 to connect to the third partynetwork computer 160, initiate a set of vendor program instructions andinitiate a set of calculation program instructions.

A set of administration network calculation program instructions whichmay be initiated by operation of the administration network base programinstructions may instruct the administration network computer 110 toextract the discount received from the third party network computer 160as well as the compensation plan or commission plan (e.g. its decay rateor commission structure so that each downline gets less and lesscommission) in order to identify the commissions for the MLM(Multi-Level Marketing) tree. Once identified, this commission data maybe stored data in a database at the administration network computer 110of FIG. 1. A commission may refer to a payment to someone who sellsgoods that is directly related to the amount sold, or a system that usessuch payments. A compensation plan or a commission plan may refer to thedecay rate of the commissions provided to the MLM system from thediscount offered by the third party, the third party also selects thedecay rate to calculate the commissions offered to the first purchaseras well as the percentage offered to the downline participants.

Functioning of the calculation program instructions may be as follows.The process may begin with operations of the administration network baseprogram instructions initiating the administration network calculationprogram instructions. The administration network computer 110 may thenextract the discount from the administration network administrationdatabase 130, which may be received from the third party networkcomputer 160. Then the administration network computer 110 may extractthe compensation plan decay rate from the administration networkadministration database 130. The administration network computer 110 maythen determine the commissions available to the downline users, or thefollowers of the user that purchased the item.

The commissions may be calculated by using the discount on the productand providing 50% of the discount to the first participant and then theremaining amount of the discount for the downline users at a 50% decayrate. For example, if the first user purchased a product that wasoriginally $59.00 discounted by 15%, the first user to make the purchasewould receive $3.32 or 50% of the discount. Then any follower of theuser who made the initial purchase would receive 50% of the remainingdiscount or 50% of $3.32, and this may continue until there is only onecent left to pay out as a commission for the downline users. Then theadministration network computer 110 stores the data in theadministration network compensation database. The administration networkcomputer 110 sends a request to the user device purchase programinstructions for the data stored in the user device user database. Thenthe administration network computer 110 may receive the user device userdatabase data from the user device 140. The administration networkcomputer 110 may store the received data, as well as the code data, inthe administration network code database. The administration networkcomputer 110 may then return to executing the administration networkbase program instructions.

A set of administration network advertising program instructions, whichmay be initiated by operation of the administration network commissionprogram instructions 120, may determine the user's sphere of influenceor contact list in order to provide the user's potential downlinepurchasers/distributors with a link and a code for the potentialdownline purchasers/distributors to become part of the MLM TreeFunctioning of the advertising program instructions may be as follows.The process may begin with operation of the administration networkcommission program instructions 120 causing the administration networkcomputer 110 to initiate the administration network advertising programinstructions. The administration network computer 110 then determines ifthe user entered a code. If it is determined that the user entered acode the code is extracted. The administration network computer 110compares the extracted code to the administration network compensationdatabase.

The administration network computer 110 then may determine the user'ssphere of influence level. If it is determined that the user did notenter a code, then the administration network computer 110 sets the useras the “First Participant”. Then the administration network computer 110extracts the code for the next sphere of influence level or potentialpurchaser/distributor to provide the user's followers with a code thatwould allow them to join the multi-level marketing tree. Theadministration network computer 110 then may send the code and the linkto the product to the user device 140. A set of administration networkvendor (those selling products) program instructions, which may beinitiated by operation of the administration network base programinstructions, may result in data being received from the third partynetwork computer 160. The administration network computer 110 may thenstore the data in the administration network administration database130, create a link for the item, send the link back to the third partynetwork 160, and return to executing the administration network baseprogram instructions.

Functioning of a set of vendor program instructions may be as follows.The process may begin with operation of the administration network baseprogram instructions causing the administration network computer 110 toinitiate the administration network vendor program instructions. Theadministration network computer 110 may then receive data from the thirdparty network computer 160. This data may include a product to beenrolled in the MLM system, an original cost of the item, a discountprovided by the third party, a cost of the product with the discount, acompensation plan decay rate, etc. Then the administration networkcomputer 110 may create a link for the product for the third partynetwork computer 160. A vendor may be a seller of a product, such as aretailer. The administration network computer 110 may then store thereceived data and the created link in the administration networkadministration database 130. The administration network computer 110 maythen send the link to the third party network computer 160. Theadministration network computer 110 may then return to executing theadministration network base program instructions.

An administration network compensation database, which may be createdthrough operation of the administration network calculation programinstructions, may store various commissions for the different productpurchasers/distributors. Table 2 illustrates data that may be stored ata compensation database consistent with the present disclosure. Theadministration network computer 110 may extract discount information anda compensation plan decay rate to calculate the downline commissions foradditional users. This discount, decay rate information, and the sphereof influence levels may be stored in the administration networkcompensation database discussed above. The administration networkcompensation database may store information that cross-references athird party, a product ID, product description, the compensation plandecay rate, the various sphere of influence levels, a commission foreach sphere of influence level, and a code to be used by the user'sfollowers to enroll in the MLM system 100 of FIG. 1. The administrationnetwork compensation database may store a lottery structure for how thecommissions are paid to users or freelancers. This lottery structure mayrefer to a process or thing whose success or outcome is governed bychance. A means of raising money by selling number tickets and givingprizes to the holders of number drawn at random. Freelancers may referto a person who works as a writer, designer, performer, or the like,selling work or services by the hour, day, job, etc., rather thanworking on a regular salary basis for one employer.

TABLE 2 Compensation Database Data Home Home Home third party DepotDepot Depot ID 654123 654123 654123 Item Drill Drill Drill compensation50% 50% 50% Decay Rate Sphere of Influence First 2 3 Level ParticipantCommission $3.31 $1.66 $0.83 Code N/A 654123- 654123- SOI2 SOI3

Table 3 illustrates data that may be store at an administration networkcode database. This data may identify the codes given to the productpurchasers/distributors (users) for the product purchasers/distributors(user) to pass to their potential purchasers/distributors to advertiseor promote a product that a user has purchased. The administrationnetwork code may also cross-reference a user ID with a product ID, aproduct name, a sphere of influence (/potential purchaser/distributor),and a code that may be shared with followers.

TABLE 3 Code Database Data Sphere of Influence/ potential purchaser/code for user ID ID Item distributor Followers JS1234 654123 Drill FirstParticipant 654123-SOI2 HY8569 654123 Drill Second 654123-SOI3Participant TB4567 789654 Table First Participant 897456-SOI2 SawEL51346 789654 Table Second 897456-SOI3 Saw Participant

FIG. 3 illustrates operations 300 that may be performed at a user devicewhen operations of a multi-level marketing system 100 of FIG. 1 areperformed. First the user device 140 may allow a user to request topurchase a product from the third party network computer 160, at step310 of FIG. 3. This may involve directing the user to a web site or anonline store. A link stored in the administration network administrationdatabase 130 may be used to automatically generate a request to purchaseof a specific product. Then the user device 140 may then allow the userto enter a discount code, at step 320. A code may be enteredautomatically if the user selected a link received from theadministration network computer 110. The user may enter a discount codein a graphical user interface (GUI) element such as a text box or inputbox, either via a native application on the user device 140 or directlyvia the third party network computer 160 (for example, via a webbrowser). The user device 140 may then allow the user to finalize anorder, at step 330. This step may involve the transfer of paymentinformation from the user device 140 to the third party network computer160. Any or all these steps may be facilitated by user devicecommunication interface 150, user device purchase program instructionsstored in memory and executed by a processor, or a user device userdatabase stored in memory.

A set of instructions referred to as user device purchase programinstructions may allow a user device to connect to the third partynetwork computer 160, allow a purchaser/distributor to select a productand an associated link. This process may include, determining if thepurchaser/distributor entered a code, and sending the link and code, ifavailable, to the third party network computer 160.

A set of instructions referred to as purchase program instructions maycause the user device 140 to continuously poll for a request from theadministration network computer 110 for user device user database data.The user device 140 may then receive a request from the administrationnetwork computer 110 for the user device user database data. Then theuser device 140 may send the user device user database data to theadministration network computer 110. The user device 140 may thenconnect to the third party network computer 160. Then the user mayselect a product from the third party network computer 160. The user mayselect a link from the third party network computer 160. Then the userdevice 140 may determine if the user entered a code. If it is determinedthe user entered a code the user device 140 sends the code to the thirdparty network computer 160. The user device 140 sends the user data tothe third party network computer 160. The user data may be data topurchase the product such as name, address, billing information, etc.The user data sent to the third party network computer 160 may includeinformation from a credit card system. A credit card system may refer toa system that allows cardholders to borrow funds with which to pay forgoods and services with the condition that the cardholders pay back theborrowed funds, plus interest, as well as any additional agreed-uponcharges.

A user device user database which may contain the user's (productpurchasers/distributors) followers (sphere of influence) as well as thefollowers contact information for them to receive commissions on theirpurchases. A distributor contact list or followers may refer to therecruits or followers on social media that a distributor has secured toparticipate in their downline. The user device user database may includeratings and recommendations from the users. Rating and recommendationmodules may refer to modules in which a company, entity, or personprovides ratings and/or recommendations for products, goods, orservices.

Table 4 displays data that may be stored at a user device user database.The data of table 4 cross-references user information with user followerinformation. The user device user database stores the user's ID, thefollowers user ID, codes provided to the followers, the follower'se-mail address, the follower's phone number, and the follower's address.The user device user database may store the follower's social mediainformation such as user social media account information (Twitter,Instagram, Facebook, etc.). The user database may contain social mediaplug-ins for enhanced marketing or social media aggregators. Socialmedia plug ins for enhanced marketing may refer to sharing content withother people through social media platforms, for example a share or likebutton. The user device user database may contain payment informationsuch as bank accounts, credit card information, PayPal, Venmo, etc. Auser ID or ID Enrollment may refer to a participant enrolling in an MLMproduct tree through an ID, which may be unique to each participant inthe MLM system. Social media aggregators may refer to a tool that allowsa person to collate posts and updates from many different social mediafeeds. It creates an organized view of social posts on a specific topicand are often used to display user-generated content on live socialwalls.

TABLE 4 User Database Data user ID JS1234 JS1234 JS1234 Follower IDHY8569 IT8527 RW4569 code for Followers 654123-SOI2 654123-SOI2654123-SOI2 Follower E-mail HY8569@gmail.com IT8527@yahoo.comRW4569@gmail.com Follower Phone 781-654-8972 231-456-7891 654-987-3217Follower 123 Main Street, 58 Elm Street, 96 2nd Ave, Salt AddressBoston, MA Burlington, VT Lake City, UT

Operation of user device downline program instructions may cause theuser device 140 to continuously poll to receive the code and link fromthe administration network computer 110 to allow thepurchaser/distributor to pass the code and link to the user's followersstored in the user device user database. Functioning of the downlineprogram instructions may be as follows. The process begins with the userdevice 140 continuously polling for the code and the link from theadministration network computer 110. The user device 140 receives thecode and the link from the administration network computer 110. The userdevice 140 provides a selection of the first follower in the user deviceuser database. The user device 140 extracts the followers contactinformation stored in the user device user database. Then the userdevice 140 sends the code and link to the follower's contactinformation. The code and link may be shared on social media sites, suchas Twitter, Instagram, Facebook, etc. This may allow the user'sfollowers to receive the code and link based on communications that useone or more of these social media accounts. The user device 140 may thendetermine if there are more followers remaining in the user device userdatabase. If it is determined that there are more followers stored inthe user device user database, the user device 140 selects the next userstored in the user device user database. If the user device 140determines that there are no more followers remaining in the user deviceuser database, then the process ends.

FIG. 4 illustrates steps 400 that may be performed by a computer at thethird party network computer 160 of FIG. 1. FIG. 4 begins with step 410wherein the third party network computer 160 receives a request from auser device 140 to purchase a product. This request may be facilitatedby a public facing webpage, for example, an online store page for thethird party retailer that controls the third party network computer 160.The third party network computer 160 then may identify if the userentered a code, at step 420. Here, the code may be entered prior to arequest for purchase. For example, before checking out using an onlineshopping cart the user may be able to enter discount codes. If a codewas entered, the third party network computer 160 may identify whetherthe code is recognized as a valid code for receiving a discount, at step430 of FIG. 4.

The code may be retrieved from the administration network computer 110via the third party network communication interface 170. Codes may bestored locally on the third party network computer 160 or in a thirdparty network third party database accessible by the third party networkcomputer. If the code is valid, the third party network computer 160applies a discount to the product, at step 440. An amount associatedwith this discount may be retrieved by the administration networkcomputer 110 via the third party network communication network interface170. Discount amounts may be stored locally at a third party networkdatabase. The third party network computer 160 may then allow the userto finish placing the order for the product, at step 450 of FIG. 4. Thethird party network computer 160 may then send some or all the data onthe purchase, including the discount code provided, to theadministration network computer 110, at step 460. Any or all these stepsmay also be facilitated by execution of different sets of programinstructions that may include: third party network base programinstructions and third party network administration programinstructions.

A third party network computer 160 may execute administration programinstructions to cause the third party network computer to connect to theadministration network computer 110, send the data for the items to bepurchased, receive a link from the administration network computer 110,store the link in a third party network database, and return toexecuting a set of base program instructions. The process may begin withthe third party network computer 160 administration program instructionsbeing initiated by the third party network base program instructions.The third party network 160 may connect to the administration networkcomputer 110 and then the third party network computer 160 may sendthird party network database data to the administration network computer110. Then the third party network computer 160 may store the link in thethird party network third party database.

Operation of a third party network discount program instructions 180 mayinclude extracting a link sent by the user device 140 and comparing itto data stored at the third party network third party database. This mayresult in the identification of a corresponding discount for a selecteditem. This process may include identifying whether a user entered a codeor not, after which a discount is applied, and the order is processed.

The process of applying a discount may begin by extracting the linkreceived from the user. Then the third party network computer 160 maycompare data included in the extracted link to data stored at the thirdparty network database. The third party network computer 160 may thenextract a corresponding discount from the third party network thirdparty database. Then the third party network computer 160 may apply theextracted discount to the user's order. The third party network computer160 may then determine if the user entered a code. If it is determinedthat the user did not enter a code the third party network computer 160sends the user data to the administration network computer 110 without acode. If it is determined that the user entered a code the third partynetwork computer 160 sends the code and the user data to theadministration network computer 110. Next the third party networkcomputer 160 may process the user's order.

A third party network third party database may store information aboutthe items that may be purchased. This the third party network databasemay include local media for the product or service, where this localmedia may refer to the various types of media, such as photos, videos,text, sounds, haptics, online product descriptions, etc. for enhancedmarketing.

Table 5 illustrates data that may be stored at a third party database.This data may include information about the items enrolled in the MLMsystem as well as a link created by execution of the administrationnetwork vendor program instructions. The third party network databasemay cross-reference a product ID, a product description, an originalcost of the product, a discount provided by the third party for theitem, a cost of the product with the discount, a compensation plan decayrate which the third party enters, and a link received from theadministration network computer. The third party network third partydatabase may include the rates of exchange for product returns,marketing materials, airline sky miles, etc. Product returns may referto a process in which a customer or consumer takes previously purchasedproduct, merchandise, or goods back to the retailer, and in turn receivea refund in the original form of payment, exchange for another product(identical or different), or a store credit.

The information about the product or service which may be advertisementsto the network, or as seen on TV sales. Advertisements to the networkmay refer to the advertisement provided to the MLM system from the thirdparty offering a product, good or service. These as seen on TV sales mayrefer to a generic nameplate for products advertised on television inthe United States for direct response mail-order through a toll-freetelephone number. Marketing materials may refer to a means of marketing,advertising or promotional materials developed by or for license (orsubject to licensee's approval) that promote the sale of the licensedproduct, including but not limited to, television, radio, and onlineadvertising, point of sale materials (e.g., posters, counter-cards),packaging advertising, print media and all audio or video media. Airlinesky miles may refer to a loyalty program offered by airlines and/orcredit cards. Typically, consumers accumulate a set amount of milesbased on how much is spent on a ticket or a credit card and are alsoknown as frequent flyer miles or travel points.

TABLE 5 Third Party Database Data ID 654123 Item Drill Original Cost$59.00 Discount 15% Discount Cost $50.15 Compensation 50% Decay RateLink HDDrill654123

FIG. 5 illustrates steps 500 that may be performed by the administrationnetwork computer 110 following a set of connection program instructions135. FIG. 5 may begin with step 510 wherein the administration networkcomputer 110 polls for new credentials for a social media site 190 froma user. New data may refer to a new entry or an old entry that has beenedited. This data may correspond to the sign-up of a user or to a useradding a new social media site 190 to their existing account. Socialmedia site 190 credentials may be required for login to theadministration network computer 110 by a user. Login using credentialsor adding a social media site 190 to an existing account may be handledby the social media program instructions 125 of FIG. 1. This data may bestored in a social media database. The social media database may be apart of the administration database 130 or a separate database.

The administration network computer 110 may then extract, at step 520,the connection rule that corresponds to the social media site 190. Eachsocial media site may have a separate connection rule or rulesassociated with it. These rules may be stored in a connection rulesdatabase. The connection rules database may be a part of theadministration database 130 or a separate database. The administrationnetwork computer 110 may search, at step 530, for users that match therule. For example, the rule may call for connections between any twousers that are immediately upline or downline of one another. In whichcase the administration network computer 110 will search the codedatabase for any users that either used a code of the user associatedwith the new entry or provided a code to the user associated with thenew entry. The administration network computer 110 may check if any ofthe matching users also have credentials for the same social media site190.

The administration network computer 110 may determine, at step 540, ifany users match the search based on the connection rule. If there are nomatching users, then the administration network computer 110 may returnto polling for new social media credentials. If there is at least onematching user, the administration network computer 110 may notify, atstep 550, both the matching user and the user associated with the newsocial media credentials. The notification may include a suggestion toconnect via the social media site 190. This may be facilitated by thenew connection program instructions 155 of FIG. 1.

The functioning of the social media program instructions 125 may be asfollows. The social media program instructions 125 may cause theadministration network computer 110 to poll for a connection from theuser device 140. The administration network computer 110 may prompt theuser to sign-in or sign-up. If the user is already signed-up they maysign-in. Once the user is signed-in they may choose to add a socialmedia site 190. If the user chooses to sign-up or chooses to add asocial media site once signed-in, the administration network computer110 prompts the user to select a social media site 190. The user may beable to select from a list of social media sites 190. Then theadministration network computer prompts the user for their credentialsfor the selected social media site 190. The credentials are thenverified with the social media site 190 through the API 195. If thecredentials are valid, they are stored in the social media database andassociated with the user. The user may then be able to login to theadministration network computer 110 using those credentials.

The functioning of the new connections program instructions 155 may beas follows. The new connections program instructions may cause the userdevice 140 to poll for a new connection suggestion from theadministration network computer 110. The user device 140 then checks ifthe suggested connection is already a connection on the social mediasite 190. If the user is not already signed into the social media site190, the user device may prompt the user to login. If the user is notalready connected with the suggested connection the user device 140 mayprompt the user to connect. The user device 140 may initiate theconnection through the API 195.

Table 6 illustrates data that may be stored at a social media database.The social media database contains user IDs, and the user's social mediacredentials for a social media site 190. The credentials allow the userto log into their account of the social media site.

TABLE 6 Social Media Database Data User ID FB Username FB Password . . .IG Username IG Password JS1234 jsmith@gmail.com ***** . . . — — BG2357bg_on_fb ************** . . . bg_on_ig ********* FM3847 freddy1989********** . . . freddy1989 ***********

Table 7 illustrates data that may be stored at a connection rulesdatabase. The connection rules database contains rules on when tosuggest a connection between two users on a social media site 190. Theserules may be complex and require information from the API 195 tofunction properly and therefore are likely to be data files orexecutable files. The rule descriptions in the figure are for clarityand may not be present in the database.

TABLE 7 Connection Rules Database Data Social Media Site Rule RuleDescription Facebook fb.dat Suggest users that are within 2 levels ofeach other in any tree become friends Twitter tw.dat Suggest downlineusers follow immediate upline users Instagram ig.dat Suggest users thatare within 4 levels of each other in at least 4 different trees connect

FIG. 6 illustrates a computing system that may be used to implement anembodiment of the present invention. The computing system 600 of FIG. 6includes one or more processors 610 and main memory 620. Main memory 620stores, in part, instructions and data for execution by processor 610.Main memory 620 can store the executable code when in operation. Thesystem 600 of FIG. 6 further includes a mass storage device 630,portable storage medium drive(s) 640, output devices 650, user inputdevices 660, a graphics display 670, peripheral devices 680, and networkinterface 695.

The components shown in FIG. 6 are depicted as being connected via asingle bus 690. However, the components may be connected through one ormore data transport means. For example, processor unit 610 and mainmemory 620 may be connected via a local microprocessor bus, and the massstorage device 630, peripheral device(s) 680, portable storage device640, and display system 670 may be connected via one or moreinput/output (I/O) buses.

Mass storage device 630, which may be implemented with a magnetic diskdrive or an optical disk drive, is a non-volatile storage device forstoring data and instructions for use by processor unit 610. Massstorage device 630 can store the system software for implementingembodiments of the present invention for purposes of loading thatsoftware into main memory 620.

Portable storage device 640 operates in conjunction with a portablenon-volatile storage medium, such as a FLASH memory, compact disk orDigital video disc, to input and output data and code to and from thecomputer system 600 of FIG. 6. The system software for implementingembodiments of the present invention may be stored on such a portablemedium and input to the computer system 600 via the portable storagedevice 640.

Input devices 660 provide a portion of a user interface. Input devices660 may include an alpha-numeric keypad, such as a keyboard, forinputting alpha-numeric and other information, or a pointing device,such as a mouse, a trackball, stylus, or cursor direction keys.Additionally, the system 600 as shown in FIG. 6 includes output devices650. Examples of suitable output devices include speakers, printers,network interfaces, and monitors.

Display system 670 may include a liquid crystal display (LCD), a plasmadisplay, an organic light-emitting diode (OLED) display, an electronicink display, a projector-based display, a holographic display, oranother suitable display device. Display system 670 receives textual andgraphical information and processes the information for output to thedisplay device. The display system 670 may include multiple-touchtouchscreen input capabilities, such as capacitive touch detection,resistive touch detection, surface acoustic wave touch detection, orinfrared touch detection. Such touchscreen input capabilities may or maynot allow for variable pressure or force detection.

Peripherals 680 may include any type of computer support device to addadditional functionality to the computer system. For example, peripheraldevice(s) 680 may include a modem or a router.

Network interface 695 may include any form of computer interface of acomputer, whether that be a wired network or a wireless interface. Assuch, network interface 695 may be an Ethernet network interface, aBlueTooth™ wireless interface, an 802.11 interface, or a cellular phoneinterface.

The components contained in the computer system 600 of FIG. 6 are thosetypically found in computer systems that may be suitable for use withembodiments of the present invention and are intended to represent abroad category of such computer components that are well known in theart. Thus, the computer system 600 of FIG. 6 can be a personal computer,a hand held computing device, a telephone (“smart” or otherwise), amobile computing device, a workstation, a server (on a server rack orotherwise), a minicomputer, a mainframe computer, a tablet computingdevice, a wearable device (such as a watch, a ring, a pair of glasses,or another type of jewelry/clothing/accessory), a video game console(portable or otherwise), an e-book reader, a media player device(portable or otherwise), a vehicle-based computer, some combinationthereof, or any other computing device. The computer can also includedifferent bus configurations, networked platforms, multi-processorplatforms, etc. The computer system 600 may in some cases be a virtualcomputer system executed by another computer system. Various operatingsystems can be used including Unix, Linux, Windows, Macintosh OS, PalmOS, Android, iOS, and other suitable operating systems.

The present invention may be implemented in an application that may beoperable using a variety of devices. Non-transitory computer-readablestorage media refer to any medium or media that participate in providinginstructions to a central processing unit (CPU) for execution. Suchmedia can take many forms, including, but not limited to, non-volatileand volatile media such as optical or magnetic disks and dynamic memory,respectively. Common forms of non-transitory computer-readable mediainclude, for example, a FLASH memory/disk, a hard disk, magnetic tape,any other magnetic medium, a CD-ROM disk, digital video disk (DVD), anyother optical medium, RAM, PROM, EPROM, a FLASH EPROM, and any othermemory chip or cartridge.

While various flow diagrams provided and described above may show aparticular order of operations performed by certain embodiments of theinvention, it should be understood that such order is exemplary (e.g.,alternative embodiments can perform the operations in a different order,combine certain operations, overlap certain operations, etc.).

The functions performed in the processes and methods which may beimplemented in differing order. Furthermore, the outlined steps andoperations are only provided as examples, and some of the steps andoperations which may be optional, combined into fewer steps andoperations, or expanded into additional steps and operations withoutdetracting from the essence of the disclosed embodiments.

What is claimed is:
 1. A method for distributing products, the methodcomprising: receiving information at a computer that identifies arecipient of a product, a first product purchase confirmation, and afirst follower code, wherein the first follower code, the product, and afirst user are associated with a commission schedule, and wherein therecipient is a second user; associating a social media website with thefirst user; distributing a first set of commissions for receipt by thefirst user according to the commission schedule, the first set ofcommissions distributed following both receipt of first product purchaseconfirmation and receipt of the purchased product by the recipient;associating a second follower code with the second user, the product,and the commission schedule, wherein the second follower code isgenerated at the computer based on information associated with the firstuser, and wherein a second purchase confirmation is received thatidentifies the second follower code; associating the social mediawebsite with the second user, notifying the first user of the sharedassociation with the second user and the social media website; anddistributing a second set of commissions for receipt by the first userand the second user according to the commission schedule, the second setof commissions distributed following both receipt of the second purchaseconfirmation and receipt of the purchase product by a third user.
 2. Themethod of claim 1, wherein in the first set of commissions are madeavailable to the first user following association of the social mediawebsite with the first user.
 3. The method of claim 1, furthercomprising associating the first user with a set of login credentials ofthe social media website.
 4. The method of claim 3, further comprisingvalidating that the credentials allow login to the social media website5. The method of claim 3, wherein the credentials can be used to loginto the computer.
 6. The method of claim 1, wherein the first user andsecond user are further associated with a second product and whereincommissions have been distributed to one user for the purchase of thesecond product by the other user.
 7. The method of claim 1, furthercomprising notifying the second user of the of the shared associationwith the second user and the social media website facilitating theconnection of the first user and second user on the social mediawebsite.
 8. The method of claim 7, wherein facilitation of theconnection follows confirmation that the first user and second user arenot already connected on the social media site.
 9. The method of claim1, further comprising receiving information at a computer thatidentifies a recipient of a product, a third product purchaseconfirmation, and a first follower code, wherein the first followercode, the product, and a first user are associated with a commissionschedule, and wherein the recipient is a fourth user; associating thesocial media website with the fourth user; and notifying the fourth andsecond user of the shared association with the social media website. 10.A non-transitory computer readable storage medium having embodiedthereon a program executable by a processor to perform a method fordistributing products, the method comprising: receiving information at acomputer that identifies a recipient of a product, a first productpurchase confirmation, and a first follower code, wherein the firstfollower code, the product, and a first user are associated with acommission schedule, and wherein the recipient is a second user;associating a social media website with the first user; distributing afirst set of commissions for receipt by the first user according to thecommission schedule, the first set of commissions distributed followingboth receipt of first product purchase confirmation and receipt of thepurchased product by the recipient; associating a second follower codewith the second user, the product, and the commission schedule, whereinthe second follower code is generated at the computer based oninformation associated with the first user, and wherein a secondpurchase confirmation is received that identifies the second followercode; associating the social media website with the second user,notifying the first user of the shared association with the second userand the social media website; and distributing a second set ofcommissions for receipt by the first user and the second user accordingto the commission schedule, the second set of commissions distributedfollowing both receipt of the second purchase confirmation and receiptof the purchase product by a third user.
 11. The non-transitory computerreadable storage medium of claim 10, wherein in the first set ofcommissions are made available to the first user following associationof the social media website with the first user.
 12. The non-transitorycomputer readable storage medium of claim 10, further comprisingassociating the first user with a set of login credentials of the socialmedia website.
 13. The non-transitory computer readable storage mediumof claim 12, further comprising validating that the credentials allowlogin to the social media website
 14. The non transitory computerreadable storage medium of claim 12, wherein the credentials can be usedto login to the computer.
 15. The non-transitory computer readablestorage medium of claim 10, wherein the first user and second user arefurther associated with a second product and wherein commissions havebeen distributed to one user for the purchase of the second product bythe other user.
 16. The non-transitory computer readable storage mediumof claim 10, further comprising notifying the second user of the of theshared association with the second user and the social media websitefacilitating the connection of the first user and second user on thesocial media website.
 17. The non-transitory computer readable storagemedium of claim 16, wherein facilitation of the connection followsconfirmation that the first user and second user are not alreadyconnected on the social media site.
 18. The non-transitory computerreadable storage medium of claim 10, further comprising receivinginformation at a computer that identifies a recipient of a product, athird product purchase confirmation, and a first follower code, whereinthe first follower code, the product, and a first user are associatedwith a commission schedule, and wherein the recipient is a fourth user;associating the social media website with the fourth user; and notifyingthe fourth and second user of the shared association with the socialmedia website.