Social Campaign Network and Method for Dynamic Content Delivery In Same

ABSTRACT

An engine, system and method for a domain social network that interconnects Internet users with at least domains owned by or of interest to those Internet users, and that may obtain and/or forward obtained dynamic data regarding those domains automatically, such as by web service or email service. The dynamic data may be used to filter and protect content and data of the respective domains, to protect users by identifying low quality web pages or malicious software or pages, to isolate or improve search results regarding the domain, and/or to improve Internet-based transaction flow, such as the creation of advertising.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claim priority to U.S. Provisional Patent ApplicationNo. 61/787,821, filed Mar. 15, 2013, entitled Social Campaign Networkand Method for Dynamic Content Delivery in Same, the entirety of whichis incorporated by reference herein as if set forth in the entirety.

FIELD OF THE INVENTION

The present invention relates to data tracked and provided in relationto

Internet browsing, and, more particularly, to an engine, system andmethod of providing a domain social network having business intelligencelogic.

BACKGROUND OF THE INVENTION

The term “Web 2.0” is commonly associated with web applications thatfacilitate interactive information sharing, interoperability,user-centered design, and collaboration on the World Wide Web (WWW, alsoreferred to hereinafter as the Internet or a network, further includesintranet, extranet, and the like). Web 2.0 thus necessarily includesaspects of connecting non-virtual identity to virtual identity on theWWW using a data feed comprised of data relationships and business anddata intelligence. As used hereinthroughout, and unless otherwise noted,the term “identity” is defined to include non-virtual and/or virtualaspects of a person interacting on, with, or with others on, the WWW.

In an example of a typical social network, Facebook® connects anidentity with other persons based on, for example, friendship. Further,persons using a social network platform such as the Facebook platformmay generate activities, events, and the like, as indicated from therespective Facebook account associated with each respective identity.Once generated, the Facebook platform may automatically feed friends'activities, events, and the like to third person friends of theidentity, such as when such activities or events are occurring or haveoccurred.

However, Facebook connects persons to persons, or persons/entities (suchas businesses) to person/entities. Facebook does not provide anyinterconnection for domains associated with those persons or entities.Thus, in typical social environments such as Facebook, persons/entitiesgenerate and receive the data. That is, the Facebook platform feeds datato and from the friends identified as being associated with eachidentity. Needless to say, data generated in this way, and absent datamonitoring regarding domain names associated with the persons/entitieson Facebook, severely limits the usefulness of the data generated bysuch typical social sites—particularly for advertising purposes, forexample.

Further, there are over 200 million domains as of 2010, and over 1.8billion web users. These users are running approximately 15 billion websearches a year, which leads each user to 2-3 unknown websites per day,on average. Such websites, if unknown to the user and without any wayfor the user to have a trusted party (such as a social network friend,or a trusted domain) that indicates the acceptability of the unknownsite, may pose a risk to users, such as an increased likelihood ofphishing or providing malware.

Thus, there is a need for a “domain social network” that interconnectsdata regarding identities (i.e., persons/entities) to data regardingdomains. More particularly, there is a need for an engine, system andmethod to generate domain data using, and that itself provides businessintelligence logic, wherein data is related, such as for sales,advertising or trustworthiness, purposes, to an identity's activity.

SUMMARY

The present invention provides an engine, system and method for a domainsocial network that interconnects Internet users with at least domainsowned by or of interest to those Internet users, and that may obtainand/or forward obtained dynamic data regarding those domainsautomatically, such as by web service or email service. The dynamic datamay be used to filter and protect content and data of the respectivedomains, to protect users by identifying low quality web pages ormalicious software or pages, to isolate or improve search resultsregarding the domain, and/or to improve Internet-based transaction flow,such as the creation of advertising.

It is to be understood that both the foregoing general description andthe following detailed description are exemplary and explanatory, andare intended to provide further explanation of the invention asdiscussed hereinthroughout.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings are included to provide a furtherunderstanding of the disclosed embodiments. In the drawings:

FIG. 1 is a block diagram of an exemplary computing system for use inaccordance with herein described systems and methods;

FIG. 2 is a block diagram showing an exemplary networked computingenvironment for use in accordance with herein described systems andmethods;

FIG. 3 is an illustration of aspects of the present invention;

FIG. 4 is an illustration of aspects of the present invention;

FIG. 5 is an illustration of aspects of the present invention;

FIG. 6 is an illustration of aspects of the present invention;

FIG. 7 is an illustration of aspects of the present invention;

FIG. 8 is an illustration of aspects of the present invention;

FIG. 9 is an illustration of aspects of the present invention;

FIG. 10 is an illustration of aspects of the present invention;

FIG. 11 is an illustration of aspects of the present invention; and

FIG. 12 is an illustration of aspects of the present invention.

DETAILED DESCRIPTION

A computer-implemented platform and methods of use are disclosed thatprovide networked access to a plurality of types of digital content,including but not limited to video, audio, and document content, andthat track and deliver the accessed content. Described embodiments areintended to be exemplary and not limiting. As such, it is contemplatedthat the herein described systems and methods can be adapted to providemany types of users with access and delivery of many types of domaindata, and can be extended to provide enhancements and/or additions tothe exemplary services described. The invention is intended to includeall such extensions. Reference will now be made in detail to variousexemplary and illustrative embodiments of the present invention.

FIG. 1 depicts an exemplary computing system 100 that can be used inaccordance with herein described system and methods. Computing system100 is capable of executing software, such as an operating system (OS)and a variety of computing applications 190. The operation of exemplarycomputing system 100 is controlled primarily by computer readableinstructions, such as instructions stored in a computer readable storagemedium, such as hard disk drive (HDD) 115, optical disk (not shown) suchas a CD or DVD, solid state drive (not shown) such as a USB “thumbdrive,” or the like. Such instructions may be executed within centralprocessing unit (CPU) 110 to cause computing system 100 to performoperations. In many known computer servers, workstations, personalcomputers, and the like, CPU 110 is implemented in an integrated circuitcalled a processor.

It is appreciated that, although exemplary computing system 100 is shownto comprise a single CPU 110, such description is merely illustrative ascomputing system 100 may comprise a plurality of CPUs 110. Additionally,computing system 100 may exploit the resources of remote CPUs (notshown), for example, through communications network 170 or some otherdata communications means.

In operation, CPU 110 fetches, decodes, and executes instructions from acomputer readable storage medium such as HDD 115. Such instructions canbe included in software such as an operating system (OS), executableprograms, and the like. Information, such as computer instructions andother computer readable data, is transferred between components ofcomputing system 100 via the system's main data-transfer path. The maindata-transfer path may use a system bus architecture 105, although othercomputer architectures (not shown) can be used, such as architecturesusing serializers and deserializers and crossbar switches to communicatedata between devices over serial communication paths. System bus 105 caninclude data lines for sending data, address lines for sendingaddresses, and control lines for sending interrupts and for operatingthe system bus. Some busses provide bus arbitration that regulatesaccess to the bus by extension cards, controllers, and CPU 110. Devicesthat attach to the busses and arbitrate access to the bus are called busmasters. Bus master support also allows multiprocessor configurations ofthe busses to be created by the addition of bus master adapterscontaining processors and support chips.

Memory devices coupled to system bus 105 can include random accessmemory (RAM) 125 and read only memory (ROM) 130. Such memories includecircuitry that allows information to be stored and retrieved. ROMs 130generally contain stored data that cannot be modified. Data stored inRAM 125 can be read or changed by CPU 110 or other hardware devices.Access to RAM 125 and/or ROM 130 may be controlled by memory controller120. Memory controller 120 may provide an address translation functionthat translates virtual addresses into physical addresses asinstructions are executed. Memory controller 120 may also provide amemory protection function that isolates processes within the system andisolates system processes from user processes. Thus, a program runningin user mode can normally access only memory mapped by its own processvirtual address space; it cannot access memory within another process'virtual address space unless memory sharing between the processes hasbeen set up.

In addition, computing system 100 may contain peripheral controller 135responsible for communicating instructions using a peripheral bus fromCPU 110 to peripherals, such as printer 140, keyboard 145, and mouse150. An example of a peripheral bus is the Peripheral ComponentInterconnect (PCI) bus.

Display 160, which is controlled by display controller 155, can be usedto display visual output generated by computing system 100. Such visualoutput may include text, graphics, animated graphics, and/or video, forexample. Display 160 may be implemented with a CRT-based video display,an LCD-based flat-panel display, gas plasma-based flat-panel display,touch-panel, or the like. Display controller 155 includes electroniccomponents required to generate a video signal that is sent to display160.

Further, computing system 100 may contain network adapter 165 which maybe used to couple computing system 100 to an external communicationnetwork 170, which may include or provide access to the Internet, andhence which may provide or include tracking of and access to the domaindata discussed herein. Communications network 170 may provide useraccess to computing system 100 with means of communicating andtransferring software and information electronically. For example, usersmay communicate with computing system 100 using communication means suchas email, direct data connection, virtual private network (VPN), Skypeor other online video conferencing services, or the like. Additionally,communications network 170 may provide for distributed processing, whichinvolves several computers and the sharing of workloads or cooperativeefforts in performing a task. It is appreciated that the networkconnections shown are exemplary and other means of establishingcommunications links between computing system 100 and remote users maybe used.

It is appreciated that exemplary computing system 100 is merelyillustrative of a computing environment in which the herein describedsystems and methods may operate and does not limit the implementation ofthe herein described systems and methods in computing environmentshaving differing components and configurations, as the inventiveconcepts described herein may be implemented in various computingenvironments using various components and configurations.

As shown in FIG. 2, computing system 100 can be deployed in networkedcomputing environment 200. In general, the above description forcomputing system 100 applies to server, client, and peer computersdeployed in a networked environment, for example, server 205, laptopcomputer 210, and desktop computer 230. FIG. 2 illustrates an exemplaryillustrative networked computing environment 200, with a server incommunication with client computing and/or communicating devices via acommunications network, in which the herein described apparatus andmethods may be employed.

As shown in FIG. 2, server 205 may be interconnected via acommunications network 240 (which may include any of, or any combinationof, a fixed-wire or wireless LAN, WAN, intranet, extranet, peer-to-peernetwork, virtual private network, the Internet, or other communicationsnetwork such as POTS, ISDN, VoIP, PSTN, etc.) with a number of clientcomputing/communication devices such as laptop computer 210, wirelessmobile telephone 215, wired telephone 220, personal digital assistant225, user desktop computer 230, and/or other communication enableddevices (not shown). Server 205 can comprise dedicated servers operableto process and communicate data such as digital content 250 to and fromclient devices 210, 215, 220, 225, 230, etc. using any of a number ofknown protocols, such as hypertext transfer protocol (HTTP), filetransfer protocol (FTP), simple object access protocol (SOAP), wirelessapplication protocol (WAP), or the like. Additionally, networkedcomputing environment 200 can utilize various data security protocolssuch as secured socket layer (SSL), pretty good privacy (PGP), virtualprivate network (VPN) security, or the like. Each client device 210,215, 220, 225, 230, etc. can be equipped with an operating systemoperable to support one or more computing and/or communicationapplications, such as a web browser (not shown), email (not shown), orthe like, to interact with server 205.

As used herein, the term “domain social network” is defined to includeany connecting of a non-virtual, or virtual, identity with an Internetdomain, such as based on ownership of or interests reflected on thedomain on a network 240. More particularly, a domain social network mayautomatically feed domain data regarding the domains followed by each ofthe afore-discussed identities, such as domain data regarding availablesocial media activities or events of likely interest to each of theidentities based on the followed domain(s), such as via web service oremail service, to the identities who follow those domains on a frontend, and to the domains that are followed on a back end. The domaininformation, social media activities and performance events related tothe domain(s) followed by a particular identity may further generatebusiness intelligence as to the interests of that identity.

An Internet domain typically represents an identity, such as of abusiness, as well as the branding and reputation of that business. Assuch, a domain name constitutes a business asset. In some cases,reliance or trust placed in the brand associated with the domain nameasset may be used maliciously, such as by hackers or others who use thattrust to spread spam or viruses on the Internet.

Therefore, domain name owners need to protect and cultivate the use oftheir respective brands. In part, this cultivation necessitates thatdomain owners know the social media data and website performance dataregarding the owned domain(s), as well as that of competitive domains orrelated domains. It is highly desirable to know this social media dataand website performance data about domains of interest before making anyjudgment, or entering into any engagement, such as for advertising.Gaining this knowledge in advance regarding oneself, ones' competitors,and Internet third parties prior to entering into web-based engagements,is good Internet “citizenship,” at least in that learning about domainsand domain-related data before that data is used or shared with othershelps stem the spread of bad web pages, malicious software and viruses,spam, and the like, to users who have placed their respective trust inparticular domains.

Search engines and user-generated content platforms, such as Facebook orTwitter, could use domain-related data, if available, to value a domain,or an identity associated with a domain to filter and protect itscontent, data and users, such as in avoiding malicious or low qualitycontent, and for advertiser's purposes. However, prior to the advent ofthe present invention and its domain social network, search engines anduser-generated content platforms did not have access to such data.Rather, if such data was desired, one had to search for third party datatracking entities, and open one's site to allow such entity to track,piece-by-piece, the domain information desired. Thereafter, such datawould have to be manually searched in order to make use of it, and thismanual search would need to be repeated for each domain owned or inwhich there was interest.

The present invention provides an engine, system and method for a domainsocial network that interconnects Internet users with at least domainsowned or interested by those Internet users, and that may obtain and/orforward the dynamic data automatically, such as by web service or emailservice. The dynamic data may be used to filter and protect content anddata of the respective domains, to protect users by identifying lowquality web pages or malicious software or pages, to isolate or improvesearch results regarding the domain, and/or to improve Internet-baseddeal flow, such as advertising.

In order to provide this engine, system and method, the presentinvention may include a front end engine and a back end engine, asillustrated in FIG. 3. Each of the backend engine and the front endengine may be or include, as discussed hereinabove with respect to FIGS.1 and 2, at least one microprocessor, such as within a server, and atleast one access node to at least one network, such as the Internet.

The backend engine, which may take the exemplary format illustrated inFIG. 3, for example, may automatically crawl and collect publiclyavailable domain information, and may use that data to calculate adomain valuation (such as using a formula included in the aspects of thepresent invention) based on, for example, website traffic, number offollowers/favorites markers, searchable page numbers and domain age.

The backend may also, for example, analyze a domain's “adult attribute,”such as based on the domain link outs, keywords and the known adultattributes for certain domains. The backend may further compiledomain-competitor data. The accumulated domain information may begenerated, for example, as domain report data accessible to users. Theaccess to this domain report data may be exposed, for example, by abrowser bookmarklet, a browser add-on, or a domain social networkwebsite (hereinafter collectively “bookmarklet”) that may provide athin-client interface to reporting. Access may further include a vendorfeed, such as via an application programming interface (API).

The domain social network bookmarklet may thus be, graphically, afront-end feature that is an add-on to any web browser. As such, it maybe downloaded, or dragged and dropped or added via a favorites barwithout a software download. In short, the bookmarklet may allow for“social bookmarking,” that is, sharing of bookmarks with others, andindicating to domain owners whether a user has bookmarked the owneddomain (such as for marketing/sales purposes).

The bookmarklet may give the user peace of mind for an unknown website(such as by giving linkouts, keywords, and website physical location,for example), or may allow a user to follow a known domain (such as byindicating the domain, giving an option to follow, providing keywords,and providing competitors, for example), at the user's direction andupon production by the browser, for example. All such information may,of course, be accumulated by the back end for production by thebookmarklet front end.

Further, the providing of the bookmarklet may greatly enhance pageviews, and thus my contribute to, and allow the provider of thebookmarklet to obtain a share of, enhanced advertising revenue. Forexample, if the user requests the bookmarklet, such as by clicking“Track” on any given web page, the user may be enabled to “Check” thesite (to return or receive information from), “Like” the site (whichwill bring friends to the site), or “Share” the site (which will invitefriends to the site), based on the information provided in thebookmarklet. This increased traffic to the site will provide increasedad revenue correspondent thereto.

More particularly, and by way of non-limiting example, via thebookmarklet any Internet user may access the domain information from thebackend engine, such as by viewing any web page providing a “Check,” asdiscussed hereinthroughout. The Internet user may, by way ofnon-limiting example, indicate a “Like,” a “Share,” or a “Follow”action, such as to save any web page, share any web page to third party,and/or to follow the indicated domain in the domain social network.

The Check process may also trigger the backend engine to performbusiness intelligence social discovery and performance discovery, asdiscussed hereinthroughout. An increase in the number of users maythereby generate more discovery data and more domain information, thusincreasing the safety, knowledge, and hence enjoyment of all Internetusers, while additionally improving web-based economic transactions,such as advertising. Yet more particularly, the backend may generatesocial discovery data and performance data based on a data request, suchas, by way of non-limiting example, by way of a “Discover.”

A user may, such as via the front end, join the domain social network,and such joinder may include definition of the relationship with ownedor interested domains. This may, by way of non-limiting example, betermed a “Follow.” Further, to increase the convenience of a “Follow,” agroup name or tag may be assigned to followed domains.

As more particularly illustrated in FIG. 4, the backend system maygenerate domain information which may include valuation data and adultattribute data, and provide such information to the frontend. Thisinformation may be accessible by the user through the use of, forexample, the aforementioned browser add-on, bookmarklet, websiteservice, email service or phone service, such as by allowing certainaspects of the domain information to be presented to the user. A usermay also become a member of the domain social network so as to followparticular domains of interest, for example.

Thus, in a manner similar to that discussed herein for tracked sites,the front end bookmarklet may provide, either to a surfing user or adomain owner, critical information regarding the health of the domain.Users employing this feature may allow registered users to follow anydomain for its website information, ranking, competitive analysis, andperformance tracking, as well as for social discoveries about itsdomains. Again, information regarding these factors is accumulated bythe backend of the present invention, and provided to the front end.

As further illustrated in FIG. 4, the user may thereby be presented withmetrics relevant to the URL being visited or to be potentially viewed.In addition to tagging the URL in accordance with specific userpreferences, the user may be provided information regarding the title ofthe website, the amount of traffic to the website in a given period oftime, a summary correspondent to the content of the website, related orcompetitive websites to the one of interest, a listing of websites whicha referenced or “link out” from the site of interest, and the websiteorigination location, for example.

The backend system further has discovery capabilities, such as forsocial discovery and performance discovery. Accumulated domaininformation and discovery data may feed to domain social network membersautomatically, such as by web service, email service or phone service.Domain information data may further feed to third parties by API.

The backend may collect each domain's identity information, trafficinformation, link outs, link ins, following or favorites marking, andadult attribute data, and may therefrom calculate domain valuation basedon traffic data, searchable page data and domain age data. For example,domain age (based on year number) may be a weighted factor in thevaluation. Domain age of less than one year may be weighted at less than1.0, wherein a lower valuation represents a lower popularity. Forexample, a domain age of less than a certain period, such as threemonths, may be particularly risky for Internet users. As such, a websitehaving a lower valuation that requests user information may pose aparticular risk to the user. If that web page provides a majority of itslinkouts to a targeted website, then the risk to the user that the pageis a phishing or scam page for the target website is even higher. Whensuch high risk web pages are detected, the alert data of that high riskmay be sent to the domain owner of the targeted website if it joinsdomain social network. Likewise, individual users may be informed of thehigh risk of the web page.

A user may login to the domain social network to check the alert data atanytime, for example. Alternatively, the alert data may be batchupdated, such as daily. The user may check alert data for a specificdomain, or may group several domains together and check alert data forthat group. For example, a web message (such as a Tweet®) may include aweb page link to a domain having a very new domain age, or an adult tag,or a low domain valuation, this data indicated by the performancediscovery, and/or indicated by an alert, may preclude addition of thisdomain to search engine results, such as to avoid mass spread of apotentially harmful web page across Internet users.

This “performance discovery” may be executed from at least one cloudcomputing platform, such as in multiple regions. Periodically, such asonce an hour, the backends from multiple regions may read the mostpopular pages from a domain to calculate its loading time and page size.The down time of specific web pages may also be calculated. For example,in an embodiment of performance discovery, web page size data may beread, and if it is similar to a previous checkup, a quick loading timecalculation may indicate acceptable performance without reading the fullweb page data. This may significantly reduce bandwidth usage butnevertheless maintain reliable checkups. In another embodiment ofperformance discovery, if a domain report has not been used by any usersfor a period of time (thus indicating that the domain is not popular),the loading time checkup may continuously use the aforementioned quickloading time checkup, such as by reading only the header data of the webpage and calculating loading time or down time.

A user who joins the domain social network of the present invention mayuse an email address for identification and for completing thevalidation process. User IDs may also be incorporated from other socialnetworks approved by the user and/or associated with the identifiedemail address, for example. As would be known to those skilled in theart, third party social network platforms already associated with theuser, and in particular with the user's email address, for example, maybe queried and associated with the user of the present invention.

Once associated with the present invention, a registered user may followany number of selected domain names. The user may also receive reportsproviding information about the followed web site(s), which may furtherinclude information about related websites and the interactions betweenthird party users and the related websites. Similarly, a user may followusers within the system and may be provided information about that andother users' internet activity.

As illustrated in FIG. 4, for example, a user who is following at leastone additional user may be provided information related to what website(s) were visited, the duration of each visit, the content accessed,the relation between the visited websites (and to the bookmarked websites of the following or followed user), and/or the content availableor bookmarked from the internet. A user may refine such information bylimiting the presented information to various keywords matches, forexample.

A user may also claim ownership of a domain through a validation processadministered through the present invention, and may thereby gain accessto a data or additional data related thereto. For example, domain ownersmay provide trademark and/or keyword data related to branding forinclusion with a user's alert data. However, some alert data may only beprovided to the domain owner.

As described previously herein, a social bookmarklet or browser add-onmay allow a user to reach a marked web page from any web browser in anyweb device (computer, tablet, smart phone, etc). The present inventionmay, for example, cause a popup window to display information having atleast basic domain information related to a current web page. The samewindow may also provide information related to the Like, Share, and/orFollow features discussed herein, and may trigger social discovery datafrom a current web page, such as via the backend engine through to otherusers. As such, the present invention may provide a portable aspect,such as a widget, that may provide the data and inventive elements forusers as discussed herein. Further, a unification of followed page datamay be thereby provided.

As illustrated in FIG. 5, social discovery from a web page may befacilitated through the filtering of web page content and/or with theuse of business intelligence logic to connect the web page informationto the related domain. For example, the social discovery functionalityof the present invention may allow a web page to contain a web linkwhose display text has the domain name and link to such domain, whichmay be provided to the user as related to the user's metrics whethersuch metrics are inputted by the user or calculated by the presentinvention based on the user's internet activity.

Social discovery data for domains may be represented using keywordsindicating business intelligence rules. For example, a user may follow akeyword instead of a domain name, and in such a case the presentinvention may use domain information data to get the most matched domainlist for that keyword. By way of example, the keyword “spyware” may belinked to one set of domains that have the most high valuation with“spyware” in their respective domain information data (i.e., in theirrespective domain name, title, description, keywords, etc.). The socialdiscovery data for such keyword may then be converted to obtainingsocial discovery for the indicated domain list.

In a further exemplary embodiment illustrated in FIG. 6, a user maycompile a certain subset of Check gathered information to determinewhether a particular website meets the criteria the user has set, suchas, for example, the website's popularity or overall access safety. Suchinformation may include, for example, the topics covered by the website,the name of the website, the ranking provided by correlating third partyusage, the number or ranking with respect to followers or favoritemarkers, a latest news posting, a social network posting related to thewebsite, and/or the time between visits to the website by the user or athird party associated with the user, such as in the user's socialnetwork. Having such information available to the user may allow theuser to make a determination as to the fitness and utility of the targetwebsite. Such information may also allow a user to qualify theusefulness of a website without ever having actually landed on or beenavailed to the direct content of the particular website.

A user may also allow certain third party posts about particularwebsites to be displayed in the user's access panel. Such posts mayprovide a social network wherein the user may access opinion and contentoffered by the poster about the website of interest. Although suchinformation may be included in the overall ranking associated with thewebsite of interest, third party posts may include more detailedinformation and may allow the user to make a more refined decision as tothe quality of the web site.

For example, a commenting user may provide a link to the web site beingcommented upon an may include a statement form original authorship orcopy and paste some prior created content—whether directly from the website being commented on or related content from a third party source. Inany event, the present invention may also associate with the postinformation related to the web site, such as, for example, the rankingof the web site and an indication of when the post was created.

As further illustrated in FIG. 6, an alert may be based on user groupeddomains to present the latest down time data and latest social discoverydata. Similarly, an alert may send an email once a day to a domain userfor latest social discovery data based on user followed domains and maysend instant communications to a domain user when detected down timebased on used followed domains.

Finally, FIG. 7 is an illustration of the following of a domain(symantec.com in this case), and the obtaining of social discovery dataand domain information related thereto. This information may be shared,in accordance with the present invention, such as by email, with otherusers who may read the social discovery data and elect to also followthe domain. Thereby, the present invention provides viral marketing ofthe domain. Further, in this exemplary embodiment, the social discoverydata may reveal the discovery by the domain of a security flaw and dataleak by a third party website, and multiple media websites with a linkto the domain. Thus, the story may be cached by the backend and linkedto the domain.

The present invention, as discussed herein, may also provide for socialnetwork stream discovery by providing a means for accessing streamingdata from social networks. For example, each day, about 200 M tweetsoccur and the company holding the data associated with those tweets maynot release data associated therewith and/or may release very little,such as about 1% streaming data (2 M per) to anyone, for example. Toaccess more information, for example, permission must be obtained fromthe company (such as Twitter). The present invention reads such socialstream (such as Twitter's streaming data) and mines for data onlyassociated with a web link. This allows for a filtered and controlledamount of data collected. For example, about 15% of Tweets have linkembedded, e.g., photos, web page, etc.

Data collected in this way may result in, for example, 300,000 tweetshaving a weblink. Although usually a shorten version of the pagespecific address, by obtaining a sufficient portion of the URL, thepresent invention may determine the domain associated with the link.Such information may be added to a library associated with the presentinvention, such a social domain discovery database. The gatheredinformation may be rich in information and may allow the presentinvention to determine, for example, the number of Tweets having embedYouTube links. Similarly, the information may allow a user to determinethe popularity of certain Tweets, e.g., how many followers. In a similarfashion, certain activities may be tracked and measured. For example, ifa celebrity, such as Kim Kardashian, for example, tweets a specific URL,a measurable change to that the URL may be detected.

To prevent the collection of too much information and/or to make theusefulness of the collected information more useful, at least one filtermay be employed to retain a certain level of links in a defined timerange. For example, the 100 “most popular” Tweet links, by follower, forexample, may be retained every 24 hours (i.e. if someone with 1 Mfollowers Tweets, that is more imported than someone with 100followers). Popularity may also be based on other social network feeds,such as, for example, Facebook, and may be supported, at least in part,by metrics from providers such as Google.

As described above, the monitoring of social media streams may allow thepresent invention to detect spam or other suspicious and/or maliciousweb links. Such monitoring may occur in any of the media streamsdiscussed herein such as, for example, a photo social network, amessaging social network based, at least in part, on event basedoccurrences, and social campaign networks, where advertising may beprovided by an event model to a channel for dynamic ads contents anddirectory. A channel may be associated with an event (profile event orother events) and may be assigned to multiple channels.

For example, type XI or

, that's different channel name assign to same event, may besearched/used by a user. It will be same as website with domains, in ourplatform user will apply Channel (with time expiration).www.cybeye.com/channel or search channel in apps or website tofind/promote specific events. Event is not really traditional meaning oftime based. It could be associated time and/or no time limit at all. Anevent may consist of at least one of a title, location, time, followers,type and contents, for example. A special type of event may be called a“profile event,” which may be the same as a current social network userbased profile data.

Additionally, as illustrated from FIG. 9, the present invention mayprovide at least one event which may include a type (profile, mobiledevice, link, domain, and/or user data), time, a location, and/orcontent (photo(s), communications, map(s)). An event may be on aone-to-one relationship with a channel and/or another event. An eventprofile, however, may be associated with a plurality of channels and orother events. As noted herein, a channel may be time-dependent and mayexpire and/or become inaccessible by at least one user after a definedperiod of time has passed.

Events may provide the ability to add data to a channel, for example,while off line, and may have the ability to associate third partyplatforms when an internet connection is resumed. Tagging of eventassociated data may allow for the autofeeding of information to achannel recipient. Tagged content may allow for the matching of tags fordelivery confirmation and may allow a user to keyword search contentwithin the system. Tagging of an event, for example, may automaticallytag all information associated with the event. As illustrated in FIGS.9-12, a user may create and assign channel usage and may allow for thedistribution of certain content within the system.

Those of skill in the art will appreciate that the herein describedsystems and methods are susceptible to various modifications andalternative constructions. There is no intention to limit the scope ofthe invention to the specific constructions described herein. Rather,the herein described systems and methods are intended to cover allmodifications, alternative constructions, and equivalents falling withinthe scope and spirit of the invention and its equivalents.

1-7. (canceled)
 8. A non-transitory computer readable medium comprisinga plurality of instructions that when executed by a hardware processorcause a computer to perform the method of: interconnecting Internet nodepoints with at least first domains owned by ones of the Internet nodepoints; interconnecting others of the Internet node points with at leastsecond domains of interest to the others of the Internet node points;obtaining dynamic data regarding at least the first and second domains;and receiving, by a portable front end, the dynamic data; wherein thedynamic data indicates filtering data to protect data of the first andsecond domains and protect at least the others of the Internet nodepoints users by identifying low quality or malicious data of the firstand second domains.
 9. The non-transitory computer readable medium ofclaim 8, wherein the dynamic data is filtered based on the identifiedlow quality or malicious data of the first and second domains.
 10. Thenon-transitory computer readable medium of claim 8, wherein the portablefront end is configured to display the filtered dynamic data of thefirst and second domains to a non-virtual entity via the portable frontend on an output display device.
 11. The non-transitory computerreadable medium of claim 8, wherein the portable front end is furtherconfigured to receive data entry from the non-virtual entity.
 12. Thenon-transitory computer readable medium of claim 11, wherein the dataentry comprises at least one or more of the following: follow a domain,check a domain, and like a domain.
 13. The non-transitory computerreadable medium of claim 8, wherein the web service comprises at leastone social media service.
 14. The non-transitory computer readablemedium of claim 8, wherein the non-virtual entity is provided at leastone web page comprising at least one URL link comprising at least apartial display of text having the domain name of the at least one URL.15. The non-transitory computer readable medium of claim 8, wherein thedynamic data is selectively added to at least one database.
 16. Thenon-transitory computer readable medium of claim 8, wherein the dynamicdata comprises information associated with the number of URLs located inat least one communications stream.
 17. The non-transitory computerreadable medium of claim 8, wherein at least one frequency score relatedto the number of URLs is calculated.
 18. A method for providing a domainsocial network, the method comprising: interconnecting Internet nodepoints with at least first domains owned by ones of the Internet nodepoints; interconnecting others of the Internet node points with at leastsecond domains of interest to the others of the Internet node points;obtaining dynamic data regarding at least the first and second domains;and receiving, by a portable front end, the dynamic data; wherein thedynamic data indicates filtering data to protect data of the first andsecond domains and protect at least the others of the Internet nodepoints users by identifying low quality or malicious data of the firstand second domains.
 19. The method of claim 18, wherein the dynamic datais filtered based on the identified low quality or malicious data of thefirst and second domains.
 20. The method of claim 18, wherein theportable front end is configured to display the filtered dynamic data ofthe first and second domains to a non-virtual entity via the portablefront end on an output display device.
 21. The method of claim 18,wherein the portable front end is further configured to receive dataentry from the non-virtual entity.
 22. The method of claim 21, whereinthe data entry comprises at least one or more of the following: follow adomain, check a domain, and like a domain.
 23. The method of claim 18,wherein the web service comprises at least one social media service. 24.The method of claim 18, wherein the non-virtual entity is provided atleast one web page comprising at least one URL link comprising at leasta partial display of text having the domain name of the at least oneURL.
 25. The method of claim 8, wherein the dynamic data is selectivelyadded to at least one database.
 26. The method of claim 18, wherein thedynamic data comprises information associated with the number of URLslocated in at least one communications stream.
 27. The method of claim18, wherein at least one frequency score related to the number of URLsis calculated.