System and Method for Secure Record Management in a Virtual Space

ABSTRACT

Systems and methods for using a matching system in a virtual space to facilitate the exchange of protected information and protected content. Subscriber computing devices each operated by a subscriber are associated with a subscriber identifier. Each computing device is connected to the network. In an embodiment, the sharing of protected information and content by one party with another party is regulated through permissions that determine whether a sharing party is authorized to disclose the protected content, whether a potential receiving party is authorized to receive protected content, and whether the protected content meets conditions established by the potential disclosing party for review by the potential reviewing party. Matching instructions may reveal whether a potential recipient is qualified to view the protected information or content and whether the subscriber also possesses any required supplemental information.

RELATIONSHIP TO OTHER APPLICATIONS

This application is a continuation-in-part of U.S. application Ser. No.12/391,741 filed Feb. 24, 2009, which is a continuation of U.S.application Ser. No. 12/104,939 filed Apr. 17, 2008. The 12/391,741 and12/104,939 applications from which priority is claimed are incorporatedby reference for all purposes.

BACKGROUND

Conceptually, the world can be divided into those with needs and/ordesires and people with potential means of satisfying those needs and/ordesires. For example, a salesperson may be seeking potential clients. Asingle person may be seeking a dating partner. A guitar player may beseeking a drummer. A shopper may be looking for a particular item tobuy. The difficulty has been in bringing the seekers into proximity andin providing them sufficient information to allow them to decide iftheir interests coincide.

Solutions to this problem are sometimes referred to as matching systemsand involve varying mechanisms for assessing whether a profile of theproblem owner and a profile of a solution owner “match” sufficiently toprovide information to at least one of the parties about the other. Forexample, RFID, GPS, and Bluetooth technology have been proposed toidentify individuals with related interests when they are in proximityto each other. If the individuals are sufficiently close to each other,various systems have been combined with profile records to determine ifthe individuals have interests that “match” and, if so, to facilitatethe exchange of location information between the individuals. Ad hocwireless networks have also been described that facilitate such anexchange. Reference is made to U.S. Pat. Nos. 6,711,414 and 6,757,719 toLightman et al., U.S. Pat. No. 6,977,612 to Bennet, U.S. Pat. No.6,996,402 to Logan, U.S. Pat. No. 6,618,593 to Drutman, U.S. Pat. No.6,419,217 and U.S. Pat. No. 6,758,397 to Catan, U.S. Pat. No. 7,098,793and U.S. Pat. No. 6,961,000 both to Chung, U.S. Pat. No. 6,992,574 toAupperle, et al., and U.S. Pat. No. 7,092,002 to Ferren et al., U.S.Patent Application 2005/0174975 filed by Mgrdechian, et al., U.S. PatentApplication 2007/0030824 filed by Ribaudo et al., U.S. PatentApplication 2006/0256959 filed by Hymes, U.S. Patent Application2007/0096909 filed by Lally, and U.S. Patent Applications 2005/0177614and 2005/0272413 filed by Bourne, and U.S. Pat. No. 7,342,503 to Lightet al., all of which are incorporated herein by reference for allpurposes.

These solutions are generally directed to providing information toindividuals having matching profiles who are present in a physicalspace.

SUMMARY

Embodiments are directed to systems and methods for using a matchingsystem in a virtual space to facilitate the exchange of protectedinformation and protected content. In an embodiment, subscribercomputing devices each operated by a subscriber are associated with asubscriber identifier. Each computing device is connected to thenetwork. In an embodiment, the sharing of protected information andcontent by one party with another party is regulated through permissionsthat determine whether a sharing party is authorized to disclose theprotected content, whether a potential receiving party is authorized toreceive protected content, and whether the protected content meetsconditions established by the potential reviewing party for review bythe potential reviewing party. These permissions may be embodied in theprofiles of the sharing party and the potential reviewing party. In anembodiment, the profiles of the parties may also establish contractualand payment conditions for the disclosure and acceptance of theprotected content. The matching instructions may reveal whether apotential recipient is qualified to view the protected information orcontent and, if required by the owner of the protected information orcontent, whether the subscriber also possesses the requisitesupplemental information. Thus, if the owner of protected information orcontent wishes to share a record comprising protected information withanother person that is qualified to review the protected information,icons of the owner and the recipient can similarly be moved next to oneanother or links drawn from one icon to another that will indicate thatan owner has located a qualified recipient. The affinity between theowner the qualified receipt can be illustrated as a color change or someother graphical attribute described below.

DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates the logical elements of a virtual matching systemaccording to an embodiment hereof.

FIG. 2 illustrates a virtual meeting space according to an embodiment.

FIG. 3 illustrates a response to the selection of an attribute iconaccording to an embodiment.

FIG. 4 illustrates a matching process using a single set of matchingcriteria according to an embodiment.

FIGS. 5A and 5B illustrate a matching process in which differingmatching criteria are used according to an embodiment.

FIG. 6 illustrates a matching network 650 located within a bounded spaceaccording to an embodiment.

DETAILED DESCRIPTION

FIG. 1 illustrates the logical elements of a virtual matching systemaccording to an embodiment hereof. In an embodiment, a virtual meetingspace is established over a network in which subscribers may congregateand network for a variety of purposes. In this embodiment virtualmeeting space (VMS) server 100 comprises an information processor 114, asubscriber record datastore 120, a communications system 125, subscriberdisplay manager 130, subscriber input manager 135, subscriber loginmanager 140, and matching data manager 142.

A subscriber computing device 150 comprises subscriber client 155. Byway of illustration and not as a limitation, computing device 150 may bea standalone device such as a desktop computer or laptop computer, or itmay be a communications device such as a cellular phone, a pager, apersonal data assistant, a transponder, a radio, a walkie-talkie, orother mobile device that may communicate via network. Computing device150 interacts with client 155 via graphical user interface (GUI) 160. Byway of illustration and not as a limitation, the computing device mayutilize an input device (not illustrated) such as a touch screen, keypad, pointing device, thumbwheel, voice recognition system or similarinput mechanisms.

Subscriber client communicates via network 145 with VMS server 100.Network 145 may be the Internet or it may be a limited access networksuch as a cable network or wireless network. Subscriber client 155comprises GUI 160 and optional communication system 165.

Subscriber records datastore 120 comprises a subscriber profile for eachsubscriber associated with a subscriber identifier. By way ofillustration and not as a limitation, a subscriber profile comprisescharacteristic data and preference data. The characteristic data mayinclude age, marital status, physical size, physical limitations, andsimilar personal information. Preference data, for example, may includeinformation relevant to establishing a business relationship or a socialrelationship and information related to preferences in food, clothing,sports, entertainment, and music, and information that determines atleast in part how the subscriber interacts with other subscribers.

Subscriber profile data may be collected from a subscriber via acomputer, a telephone, or via a personal interview. In an embodiment, asubscriber is interviewed and the voice of the subscriber is processedby a voice pattern recognition algorithm to determine whether theanswers given by the subscriber are truthful. Detection of stress in avoice pattern algorithm may indicate that a subscriber is lying or thatthe particular response is a subject of stress for the subscriber thatrequires further exploration via questions or perhaps human interaction.Users that are not truthful or who may not be able to complete aquestionnaire without a stress reaction are not allowed into the system.As will be appreciated by those skilled in the art, other methods ofdetermining the truthfulness or stress of a subscriber may be used aswell.

FIG. 2 illustrates a virtual meeting space according to an embodiment.Referring to both FIG. 1 and FIG. 2, a subscriber logs in to VMS server100 via login manager 140. When a subscriber is logged in, thesubscriber is deemed to be “present” in VMS 230. The subscriber isidentified to VMS server 100 via the subscriber id associated with thesubscriber record stored in subscriber records datastore 120. Asubscriber A icon 240 is displayed within VMS 230 to computing device205 indicating that the subscriber using computing device 205 is presentin the space. A subscriber icon B 250 is displayed within VMS 230 tocomputing device 210 indicating that the subscriber using computingdevice 210 is present in the space. As will be described below, theplacement and movement of subscriber A icon 240 and subscriber B icon250 is in various embodiments under the control of the subscriberassociated with the particular icon. In an embodiment, subscriber A icon240 is visible to subscriber A but not to subscriber B and subscriber Bicon 250 is visible to subscriber B but not to subscriber A. In otherembodiments, the visibility of icons associated with other users isunder the control of the viewing subscriber. In these embodiments, theviewing subscriber may cause other icons to be visible, to be visible ina diminished way so as to indicate presence, or to be visible only whenthe other subscriber icons are “icons of interest” as described below.In still another embodiment, when a subscriber logs off or turns thecomputer off, the respective subscriber icon will disappear from thedisplay of other subscribers. Subscriber icons may appear as avatars,animals, or inanimate objects in order to add further interest to theVMS 230. Further these shapes may change based on the circumstances ofany meeting. Thus a subscriber may wish to change its avatar as ameeting progresses so that symbols and shapes can change as moreinformation is exchanged between subscribers.

In an embodiment, a subscriber may define the geographical boundaries ofthe virtual meeting space, either by establishing a preference insubscriber records datastore 120 or by providing geographical boundariesto subscriber input manager 135 via GUI 160. By way of illustration andnot as a limitation, a geographical boundary may be established usingcountry, county, or city names, by providing a zip or postal codes, byproviding a radial distance from a location point, or other means. In anembodiment, VMS server 100 reports the number of other subscribers inthe space chosen by the subscriber to allow the subscriber to expand orcontract the space size. In yet another embodiment, the subscriber mayselect a location point and request that the space size be adjusted fromthe location to point to include a preferred number of othersubscribers.

As illustrated in FIG. 2, the boundary of VMS 230 is arbitrary. However,this is not meant as a limitation. In other embodiments, the boundary ofVMS 230 may be defined and represented by a bounded space that isrelated to a real (non-virtual) space. In this embodiment, the shape ofVMS 230 may correspond to the shape of the bounded space or may beassociated with its real space analog by reference points in the realspace. For example, the boundary of VMS 230 may be a scaled map of astate, a city, a neighborhood or the like or it may provide location anddistance information to relate subscribers to each other or a subscriberto a physical location within the real space.

In an embodiment, a subscriber login manager 140 requests locationinformation from the subscriber. By way of illustration and not as alimitation, a subscriber may enter a zip or postal code, an address, mapcoordinates, or longitude and latitude values to identify a currentlocation of the subscriber.

In another embodiment, the subscriber is physically present in a realspace that is represented by a bounded space and the actual location ofa subscriber relative to the bounded space may be determined from dataprovided by the subscriber or by acquisition of location data byautomated means. FIG. 6 illustrates a matching network 650 locatedwithin a bounded space (not illustrated) according to an embodiment.Subscribers may be pre-registered with VMS server 614 or may register atregistration portal 610 before joining the matching network 650. In oneembodiment and as illustrated in FIG. 6, a subscriber may register usingregistration portal 610 via the Internet 612 use a registration server630 connected to VMS server 614 via matching network 650.

Subscriber A is associated with location device 634. Subscriber B isassociated with location device 636. By way of illustration and not as alimitation, location devices 634 and 636 may be Blue Tooth-baseddevices, WiFi-based devices, GPS-based devices, or RFID-based devices.Location devices may be permanently assigned to a subscriber or assignedwhen the subscriber arrives at the bounded space.

Location devices 634 and 636 are tracked within the real space that isrepresented by the bounded space by location detectors 630 and 632.Location information to VMS server 100. By way of illustration and notas a limitation, the location device utilized by the subscriber may bean RFID-enabled device, a Blue-Tooth-enabled device, a GPS-enableddevice, or similar device. While only two location detectors 630 and 632are illustrated, this is not meant as a limitation. It is anticipatedthat a real space that is represented by a bounded space will havenumber location detectors to detect both the location of a subscriberand a direction in which the subscriber/shopper may be moving over time.Various technologies, including signal strength measures andtriangulation may be used to determine the location of a subscriberrelative to the location detectors 630 and 632.

The VMS server 632 communicates with subscriber computing device 640 and642 via wireless network 620. As will be described below, in thisembodiment, the VMS server 632 uses the wireless network 620 to sendmatch alert signals to computing device 640 and 642.

Referring again to FIG. 1 and FIG. 2, the location of a subscriber icon(240, 250) may be depicted on a subscriber computing device relative toa graphical representation of a virtual meeting space. If the virtualmeeting space is a bounded space, the graphical representation of thebounded space may be representative of the shape of the bounded spaceand, optionally, drawn to scale. As will be described below, thesubscriber icons (240, 250) may be moved within the virtual meetingspace so as to facilitate an exchange of information.

In an embodiment, a subscriber may interact with a bounded space viasubscriber input manager 135 to zoom or pan the scaled depiction of thebounded space so as to place the subscriber icon in the bounded space ina location that is analogous to a location in a real space representedby the bounded space.

In another embodiment, the bounded space may be a building or a meetingroom. In this embodiment, VMS 230 may be further divided into sub-spaces260 such as landmarks, rooms, and cubicles.

The presence of a subscriber in VMS 230 allows the subscriber tointeract with VMS 230 and other subscribers. By way of example and notas a limitation, a subscriber A uses computing device 205 to login toVMS server 100. In this example, VMS 230 is described from theperspective of subscriber A. Other subscribers would experience similarinteractions with VMS 230. In this example, a subscriber B usescomputing device B 210 to login to VMS server 100. In this embodiment,subscriber A and B have each defined a VMS that at least encompasses VMS230. Subscriber A and B are each present in VMS 230 as indicated bysubscriber icons 240, 250.

In addition to the subscriber A icon 240, under conditions describedbelow subscriber display manager 130 causes a match indicator 242 to bedisplayed on the served web page sent to computing device A 205 and amatch indicator 252 to be displayed to on the served web page sent tocomputing device 210. In an embodiment, a match indicator is a graphicgenerated by subscriber display manager 130. Match indicators 242 and252 may take any form that conveniently indicates the status of a match.In an embodiment, the graphical representation of match indicators 242and 252 is user definable. As noted above, individual subscribers arefree to represent themselves as any avatar they desire and that avatarcan change its size and shape depending upon the match that is occurringand how the individual wants to be presented to another person.

Match indicator 242 associated with subscriber A comprises an attributesicon 244 and a profile data icon 246. Match indicator 252 associatedwith subscriber B comprises an attributes icon 254 and a profile dataicon 256. Attributes icon 244 as seen by subscriber A links toinformation of a subscriber that “matches” the profile informationprovided by subscriber A. For example, attributes icon 244 may link toinformation about subscriber B.

Attributes icon 254 as seen by subscriber B links to information of asubscriber that “matches” the profile information provided by subscriberB. For example, attributes icon 254 may link to information aboutsubscriber A.

Profile data icon 244 provides a link to information about anothersubscriber present in VMS 230 which may be subscriber B. Profile dataicon 254 provides a link to information about another subscriber presentin VMS 230 which may be subscriber A. Match indicator 242 is onlypresented to subscriber A. That is, subscriber B will also see amatching indicator (252) but the content conveyed by the matchingindicator 252 served to computing device B 210 will be different fromthe content of match indicator 242.

Referring again to FIG. 1, login manager 140 establishes the presence ofall subscribers in VMS 230. Login manager sends a presence signalcomprising a subscriber identifier of each present subscriber toinformation processor 114.

In an embodiment, information processor 114 comprises a set of “default”instructions that determine how the profile information of subscriber Aand subscriber B as reflected in subscriber records datastore 120 is tobe related or “matched” to other present subscribers. Using subscribersA and B as examples, the default matching instructions may require thata match will be determined only if the age difference between subscriberA and subscriber B is ten years or less.

Other more complex matches are within the scope of the variousembodiments and may be multi-dimensional in nature leading to a “score”related to compatibility of the match. That is, a “match” between theprofiles of subscriber A and subscriber B is quantitatively determined.In this embodiment, the default matching instructions produce a totalmatching score by assigning values to specific matching criteria. Asdescribed below, the default matching criteria and the weight assignedto a specific criterion may be modified by the subscriber inestablishing the subscriber records datastore 120.

In an embodiment, when a determination is made that matching scores ofsubscribers A and B are within an acceptable range or exceed apredetermined threshold, a match alert signal is sent from theinformation processor 114 to subscriber display manager 130. The matchalert signal may comprise audio information, video information, textualinformation, and graphical information. Additionally, the match alertsignal may provide location information of a subscriber where a “match”is present or provide directions to the location of a subscriber withwhom a “match” exists. Matching data manager 142 keeps track of matchingdata for each subscriber.

Again describing the process from the perspective of subscriber A, in anembodiment, the match alert signal is passed by subscriber displaymanager 130 to match indicator 242. The match alert signal affects thebehavior of the subscriber icons 240 and 250. In an embodiment, thesubscriber B icon 250 becomes visible to subscriber A, as will the iconsof other subscribers that have been identified as meeting the thresholdcriteria for a match (herein, “subscribers of interest”). In anotherembodiment, the display of the matching subscriber icons is indicativeof the match score. For example, the highest scores may flash, be largerin size, be displayed with a color or hue or intensity, or anycombination of such indicators. Additionally, a subscriber icon maydisplay a number indicative of the score associated with the subscriberby the information processor 114.

Again from the perspective of subscriber A, when information processor114 determines that the profiles of subscriber A and B “match,” thematch indicator 242 is visible to subscriber A. In an embodiment, thematch indicator becomes visible to subscriber A when subscriber A movessubscriber A icon 240 into proximity to subscriber B icon 250.Alternatively, match indicator 242 is visible to subscriber A whensubscriber A moves a cursor to the subscriber B icon 250.

Match indicator 242 responds by presenting attributes icon 244 andprofile data icon 246 to subscriber A. Attributes icon 244 is linked tomatching data manager 142. When selected by subscriber A, attributesicon presents a brief summary of the attributes of subscriber B,subscriber B's matching score, and other general information. In anembodiment, the detail presented when the attributes icon is selectedmay be conditioned on permissions granted by subscribers whoseinformation is being requested. Thus, a subscriber may allow aphotograph to be displayed and the matching score. Alternatively, asubscriber may allow only non-identifying information to be disclosed.In yet another embodiment, subscriber A may establish preferences as towhen attributes icons are displayed. Thus, the attributes icon may beautomatically selected when the match indicator 242 is displayed.

When profile data icon 246 is selected by subscriber A, a request forprofile data of subscriber B is conveyed to VMS server 100. In anembodiment, the presentation of profile data of one subscriber toanother subscriber is conditioned on permissions granted by subscriberswhose information is being requested. For example, subscriber B mayelect to withhold all profile information from other subscribers,provide a limit set of profile information if the matching score exceedsa subscriber-defined threshold, or provide all profile informationwithout restriction.

In an embodiment, the selection of profile data icon by subscriber Acauses information processor 114 to send a request message to subscriberB for release of profile information to subscriber A. The message may beconveyed to GUI 160 (FIG. 1) residing on subscriber computing device 210(FIG. 2) as a text or audio message, an instant message, or a messageproduced using other network protocols.

Alternatively, the request message may be relayed through communicationssystem 125 (FIG. 1) via network 145 (FIG. 1) to communications system165 (FIG. 1) operating on client 155 (FIG. 1) of subscriber computingdevice 210 (FIG. 2) or to an external communications device (notillustrated) selected by subscriber B. By way of illustration and not asa limitation, communications system may utilize VoIP, SMS, or e-mail.The message may be sent to computing device 210 or an external devicesuch as a cell phone, a PDA, or similar communications device.

Subscriber B may decline the request message. If this occurs,information processor 114 causes a decline message to be sent tosubscriber A as previously described in the context of the communicationof the request message to subscriber B. Additionally, subscriber displaymanager 130 changes the appearance of subscriber B icon 250 to indicatea lack of interest on the part of subscriber B.

Subscriber B may accept the request message and release the subscriber Bprofile data to subscriber A. Concurrently, subscriber B receives theprofile data of subscriber A. The transfer of profile data also promptsinformation processor 114 to send a contact invitation to bothsubscriber A and subscriber B. In an embodiment, both subscriber A andsubscriber B must accept the contact invitation before the contactinformation is shared. The contact invitation may also include an offerto establish communications using communications system 125 aspreviously described in the context of the communication of the requestmessage to subscriber B.

In an embodiment, communications system 125 causes a chat screen to openup allowing the individual users to chat with one another. If the chatsession appears to be one that shows further affinity between theindividuals, each individual can permit their picture to be displayed inassociation with the chat that is occurring. In this sense, theindividual uses control at the level of personal information that isexchanged between one another assuming that an appropriate match levelis achieved.

At another level, if an appropriate match level is achieved, an audiolink can be opened between two individuals allowing those individuals toverbally chat with one another and exchange additional information. Partof any such audio chat can be a voice stress analyzer that can displayfor either user any stress in speech patterns that would be indicativeof lying on the part of the speaker. The voice stress analysis can berun by the server, thereby providing a visual indication to theindividual users when one or the other is not telling the truth. Thisaudio link can be facilitated over any number of channels. If both usersregister as having, for example, a Skype connection, the voice channelcan be open between the two individuals using the Skype system.Similarly any other audio system capability that might exist between thetwo computers can be registered and then utilized for voicecommunication.

In an embodiment, subscriber A may place a contact invitation on “hold”for a fixed period of time to allow subscriber A to determine whetherother subscribers are of equal or greater interest to subscriber A thansubscriber B.

The default matching instructions may be modified by a preferencesetting in a subscriber profile stored in the subscriber recordsdatastore 120. For example, if subscriber A's profile requires that theage difference not exceed two years, the default matching instructionswill be modified to use the age criterion of subscriber A's profile.

FIG. 3 illustrates a response to the selection of an attribute iconaccording to an embodiment.

In another embodiment, when attributes icon 244 is selected bysubscriber A, subscriber display manager 130 causes a subscriber ofinterest profile summary 310 as previously described and action list 320to appear on a web page 300 being served to subscriber A. Action list320 comprises selection icons that may be selected by subscriber A. Ifaction icon 320A is selected, a profile request is sent to informationprocessor 114 as previously described. If action icon 320B is selected,subscriber A may request that subscribers of interest be furtherfiltered using a set of “auxiliary” matching criteria stored insubscriber A's profile record. By also selection of action icon D1 orD2, subscriber A may request that the auxiliary criteria be only appliedto the current subscriber of interest (320D1) or to all subscribers ofinterest (320D2).

Subscriber A may also select action icon 320C1. Action icon 320C1comprises a list of selectable matching criteria that can beindividually selected and to sent to information processor 114 bysubscriber A. By also selection of action icon D1 or D2, subscriber Amay request that the auxiliary criteria be only applied to the currentsubscriber of interest (320D1) or to all subscribers of interest(320D2).

In circumstances where the default matching instructions have beenmodified by a subscriber, the matching attribute values may be differentfor subscribers A and B depending on whether one or both of the users'profiles has matching instructions or if either or both users determinethe matching value at their respective match indicators. Thus subscriberA's match indicator may inform subscriber B that subscriber A is a match(color) but qualitatively low in terms of scoring (hue and saturation).Subscriber B's match indicator may inform subscriber A that subscriber Bis a qualitatively good match.

FIG. 4 illustrates a matching process using a single set of matchingcriteria according to an embodiment. For ease of discussion and not as alimitation, the description that follows applies the matching process toa subscriber A and a subscriber B.

The presence of subscribers A and B is detected in the VMS 400. Defaultmatching instructions are loaded into an information processor 405. Thesubscriber ids of subscriber A and B are used to retrieve the profilesof subscribers A and B are retrieved 410. A determination is madewhether the profile of a subscriber comprises matching criteria 415. Ifno subscriber matching criteria are found, the default matchinginstructions are applied 425 to the subscriber profiles of subscribers Aand B. If one or more of the subscriber profiles comprises auxiliarymatching criteria, the default matching instructions are modified usingthe most restrictive of the auxiliary matching instructions 420.

A determination is made whether the profiles of subscriber A and B“match” 430 according to the matching instructions. If a match is found,match alert signals as described above are sent to the subscribers'match indicators 440. Subscriber display manager 130 causes subscriber Bicon to be displayed on the web page served to subscriber A andsubscriber A icon to be displayed on the web page served to subscriberB. If no match is found, the process returns to detecting the presenceof subscribers in the VMS 400.

FIGS. 5A and 5B illustrate a matching process in which differingmatching criteria are used according to an embodiment. For ease ofdiscussion and not as a limitation, the description that follows appliesthe matching process to a subscriber A and a subscriber B.

Referring to FIG. 5A, the presence of subscribers A and B is detected inthe VMS 500. Default matching instructions are loaded into aninformation processor 505. The subscriber ids of subscriber A and B areused to retrieve the profiles of subscribers A and B 510. Adetermination is made whether the profile of subscriber A comprisesauxiliary matching instructions 516. If so, the default matchinginstructions are modified 520. The default matching instructions or thematching instructions as modified by the auxiliary matching instructionsare applied to the profile information of subscribers A and B 524.

A determination is made whether the profile of subscriber B comprisesauxiliary matching instructions 518. If so, the default matchinginstructions are modified 522. The default matching instructions or thematching instructions as modified by the auxiliary matching instructionsare applied to the profile information of subscriber B 526.

A determination is made whether the profiles “match” according to thematching instructions applied by both subscriber A and subscriber B 530.If both do not match, the process returns to detecting the presence ofsubscribers in the VMS 500. If both match, subscriber display manager130 causes subscriber B icon to be displayed on the web page served tosubscriber A and subscriber A icon to be displayed on the web pageserved to subscriber B.

In an embodiment, a matching system is implemented at an event, such asa trade show, in which a large number of attendees pre-register. Duringthe registration process, profile information is acquired from potentialattendees. This profile information may be used to provide the potentialattendee an initial indication of whether persons or vendors of interestwill be in attendance at the event. Following registration but prior tothe commencement of the event, the registered attendees may bepre-matched according to default matching instructions. Upon thecommencement of the event, the presence of the registered attendees isdetermined.

In another embodiment, the location of attendees is determined usinglocation devices previously described. The relative location of matchingattendees is then reflected in the graphical depiction of the trade showvenue on the subscriber's computing device. As attendees with matchingprofiles come into proximity with one another, match alert signals areprovided as appropriate to the computing devices operated by theattendees.

In another embodiment, a determination is made whether a pre-registeredattendee has modified his or her profile information since registering.If the profile has been modified, the matching process is re-run usingthe updated information. Additionally, the matching process is run onattendees who did not pre-register.

The behavior of the matching elements may vary depending on whether theprofile information is associated with an individual representing apersonal interest or an individual representing a commercial interest.For example, in the case of an event in which the primary objective isto introduce individuals for social purposes, it might be desirable toprovide an individual control over the disclosure of their personalinformation, location, and contact information. In this application, anacknowledgement of a match alert signal by both of the match users maybe desirable prior to initiation of the exchange of information.

In the case where the objective is to match an individual with a productor product information, such as a booth at a trade show, the matchingdata may be sent to the subscriber's computing device in real timewithout the need for a profile request. For example, a subscriber'scomputing device may be alerted when the subscriber arrives at the tradeshow venue and alerted again when the subscriber is in proximity to adisplay booth that matches the subscriber's profile.

The applications to which a matching system incorporating a matchingindicator may be directed are numerous. The distinction between themlies primarily in the types of data provided in the profile/preferencedata associated with the subscriber clients and used to perform thematching process and the way in which the matching information isconveyed to users. The examples that follow assume that users arepresent within the virtual meeting space (VMS).

In an application, a matching system operates in a shopping mall.Referring again to FIGS. 1, 2 and 6, a subscriber/shopper creates aprofile on the information processor 114 that is stored in subscriberrecords datastore 120. The subscriber/shopper may create his or herprofile before arriving at the mall using a registration portal 610, orthe subscriber/shopper may utilize a registration server 630 operatingat the mall. The subscriber's profile comprises a shopping list of itemsthat the subscriber/shopper is interested in purchasing. In thisapplication, subscriber records 120 include a record for each merchantidentifying items that a merchant located within the mall desires tosell. For example, the merchant record may include items that merchantshave on special or the entire inventory of one or more merchants.Information processor 114 operates matching instructions that determineif there is a match between the shopping list of the subscriber/shopperand the items identified by the merchants within the mall.

The location of the subscriber/shopper within the mall is detected by alocation detector 130. If a match has been determined, a match alertsignal is sent to the subscriber computing device 150 indicating thatitems of interest to the shopper may be located at a list of merchants.The match alert signal may, for example, identify the items on theshopping list of subscriber/shopper that match the inventories ofvarious merchants within the mall. The subscriber's computing devicewould also illustrate the shopper's location within the mall and thelocation of the merchants having items of interest. The shopper proceedsto a merchant identified in the match alert signal.

Referring again to FIG. 6, the location of the subscriber/shopper withinthe mall is determined by reference to the location of the locationdetector 630 that has detected the presence of subscriber A locationdevice 634 that is associated with subscriber A computing device 640.

While only two location detectors 630 and 632 are illustrated, this isnot meant as a limitation. It is anticipated that a bounded space willhave a number of location detectors to detect both the location of asubscriber and a direction in which the subscriber/shopper may be movingover time.

In an embodiment, a match alert signal may be sent to a computing deviceof a subscriber/merchant when the subscriber/shopper is in proximity toan item on the shopper's list. The computing device of the subscribermerchant may act on the match alert signal to enhance the shoppingexperience of the subscriber/shopper and to increase the chances thatsubscriber/shopper will make a purchase. By way of illustration, thecomputing device of the subscriber/merchant may cause a message to bedisplayed on the computing device of the subscriber/shopper offering aparticular item, offering a coupon, or offering a sales price. Thecomputing device of the subscriber/merchant may additionally oralternatively cause a physical display device to provide a message tothe subscriber/shopper.

In an embodiment, the messaging of the subscriber/shopper by thesubscriber/merchant may be affected by the preferences of the subscribershopper. The preferences of the subscriber/shopper may block anymessages from a subscriber/merchant, may allow messages to the computingdevice of the subscriber/shopper but not to a physical display, and mayallow only a shopper's nickname to be provided to thesubscriber/merchant in the event of a match and for display on aphysical device.

In another implementation, a matching system is operated in a socialclub in which individuals desiring to meet other individuals congregate.

Referring again to FIGS. 1, 2 and 6, subscribers A and B create profileson information processor 114 that is stored in subscriber recordsdatastore 120. The subscriber may create his or her profile beforearriving at the social club using a registration portal 610, or thesubscriber/shopper may utilize a registration server 630 operating atthe social club. As previously described, the subscribers' profiles arestored in subscriber records 120. Information processor 114 operatesmatching instructions that determine if there is a match between theprofiles of subscriber A and subscriber B as previously described.

In this implementation, subscriber A is associated with subscriber Acomputing device 640 and subscriber A location device 634. Subscriber Bis associated with subscriber B computing device 642 and subscriber Blocation device 636. Matching instructions are applied to the subscriberprofiles of subscriber A and subscriber B and a match is found. Thematch alert signal is passed by VMS server 632 to subscriber A computingdevice 640 and subscriber B computing device 642. The computing devicesdisplay the location of subscriber A icon (FIG. 2, 240) and the locationof subscriber B icon (FIG. 2, 250) relative to the bounded space aspreviously described. Match indicators A and B (FIG. 2, 242 and 254respectively) are also displayed. In an embodiment, when subscriber A isin proximity to two potential matches, only the subscriber icon of the“best” match will be displayed.

In yet another implementation, the bounded space is a trade show.Referring again to FIGS. 1, 2 and 6, a subscriber/attendee creates aprofile on the information processor 114 that is stored in subscriberrecords datastore 120 that indicates areas of interest of the attendee.For example, an attendee may be interested in information about aproduct, a company, or a person associated with a company. Thesubscriber/attendee may create his or her profile before arriving at themall using a registration portal 610 or the subscriber/attendee mayutilize a registration server 630 operating at the mall. In thisapplication, subscriber records 120 include a record for each presenteridentifying information about products, services, technology and thelike that a presenter located within the trade show is offering.Information processor 114 (see FIG. 1) operates matching instructionsthat determine if there is a match between the interests of thesubscriber/attendee and the information offered by the presenters at thetrade show.

If a match between the profile of a subscriber/attendee and asubscriber/presenter has been determined, a match alert signal is sentto the subscriber computing device 150 (FIG. 1) indicating that items ofinterest to the attendee may be located at a list of presenters. Thematch alert signal may, for example, identify the items on the interestlist of subscriber/attendee that match the products, services, orinformation content of the presenters. The subscriber's computing devicewould also illustrate the attendee's location within the trade showvenue and the locations of the presenters having items of interest. Thelocation of an attendee of a trade show within the trade show isdetermined by reference to the location of the location detector 630that has detected the presence of subscriber/attendee A location device634 and is associated with subscriber A computing device 640. Apresenter is associated with computing device B 642.

While only two location detectors 630 and 632 are illustrated, this isnot meant as a limitation. It is anticipated that a bounded space willhave a number location detectors to detect both the location of asubscriber and a direction in which the subscriber/attendee may bemoving over time.

In an embodiment, a match alert signal may be sent to a computing deviceof a subscriber/presenter when the subscriber/attendee is in proximityto the display area of the subscriber/presenter. The computing device ofthe subscriber/presenter may act on the match alert signal to enhancethe experience of the subscriber/attendee and to increase the chancesthat subscriber/attendee will make contact. By way of illustration, thecomputing device of the subscriber/presenter may cause a message to bedisplayed on the computing device of the subscriber/attendee offering apresentation, a product sample or a gift. The computing device of thesubscriber/presenter may additionally or alternatively cause a physicaldisplay device to provide a message to the subscriber/attendee.

In an embodiment, the messaging of the subscriber/attendee by thesubscriber/presenter may be affected by the preferences of thesubscriber attendee. The preferences of the subscriber/attendee mayblock any messages from a subscriber/presenter, may allow messages tothe computing device of the subscriber/attendee but not to a physicaldisplay, and may allow only a attendee's nickname to be provided to thesubscriber/presenter in the event of a match and for display on aphysical device.

In another implementation, a matching system is operated in a secureenvironment. In such an environment, it is very important forindividuals who work in a classified environment to understand and haveknowledge of the clearance level of those they may wish to discussdifferent matters. It is axiomatic in the classified world that onecannot discuss classified matter with another, unless there is aspecific need to know. That need to know is reflected by differentsecurity clearance levels. There is also the case that there may be manyhundreds of individuals who have appropriate clearances that match oneanother, yet those individuals will not personally know one another andtherefore will not be able to discuss any classified matters. In theembodiment, the bounded space is represented as a secured meeting roomin which individuals may establish secured communication links betweenone another in the event that there is an attribute match.

In an embodiment, a match indicator is used to facilitate a securitysystem. A security clearance is a status granted to individuals allowingthem access to classified information, for example, state and corporatesecrets. The term “security clearance” as used herein is a formalprocess to vet employees for access to sensitive information. Aclearance by itself is normally not sufficient to gain access. Theorganization must determine that the cleared individual has a “need toknow” for the information. No one is supposed to be granted access toclassified information solely because of rank, position, or a securityclearance.

A security clearance is generally granted to a particular level ofclearance. For example, a security system may establish a rankedclassification system (from least sensitive to most sensitive) ofconfidential, secret, top secret, and sensitive compartmentedinformation. At higher level clearances “compartments” represent groupsof information that are necessarily separated from each other in contentand possibly organizationally as well (although not necessarily so).Thus an individual with access to one compartment of information willnot necessarily have a “need-to know” and hence access to anothercompartment of information. Each compartment may include its ownadditional clearance process. Such compartmentalized clearances may beexpressed as “John has a TS/SCI TK/Q clearance”, where all clearancedescriptors are spelled out verbally. Certain government departments mayalso establish special access programs (SAP) when the risk of lossassociated with certain information is exceptionally grave.

Therefore, in this embodiment, the profile information of a subscribermay, for example, comprise a security clearance level, such asconfidential, secret, and top secret, and may further comprise andcompartments as described above.

Referring again to FIGS. 1 and 2, subscribers A and B create profiles oninformation processor 114 that are stored in subscriber recordsdatastore 120. By way of illustration and not as a limitation, asubscriber profile comprises a security clearance level and securitycompartment. The compartment may be project specific and is indicativeof a need to know information about a particular classified matter.

As previously described, the subscribers' profiles are stored insubscriber records 120. When a subscriber logs in to VMS server 100 vialogin manager 140, the subscriber is deemed to be “present” in VMS 230.The subscriber is identified to VMS server 100 via the subscriber idassociated with the subscriber record stored in subscriber recordsdatastore 120. A subscriber A icon 240 is displayed within VMS 230 tocomputing device 205 indicating that the subscriber using computingdevice 205 is present in the space. A subscriber icon B 250 is displayedwithin VMS 230 to computing device 210 indicating that the subscriberusing computing device 210 is present in the space. In this embodimentnetwork 145 may be a wired network, a wireless network, a fiber network,a secure wired network, a secured wireless, and a secured fiber network.

The placement and movement of subscriber A icon 240 and subscriber Bicon 250 is as previously described. In an embodiment, subscriber A icon240 is visible to subscriber A but not to subscriber B and subscriber Bicon 250 is visible to subscriber B but not to subscriber A. In otherembodiments, the visibility of icons associated with other users isunder the control of the viewing subscriber. In these embodiments, theviewing subscriber may cause other icons to be visible, to be visible ina diminished way so as to indicate presence, or to be visible only whenthe other subscriber icons are “icons of interest” as described below.Information processor 114 operates matching instructions that determineif there is a match between the profiles of subscriber A and subscriberB as previously described.

In this implementation, the attribute match does not necessarily revealany personal information, but simply reveals organizational andclearance level information. Thus, if an individual wishes to chat abouthis or her specific project with another person of the same securityclearance level, icons can similarly be moved next to one another orlinks drawn from one icon to another that will show the affinity betweenthose two icons. That affinity can be illustrated as a color change orsome other graphical indication as previously described.

In this security clearance instance, when two icons have attributes thatmatch in such a way that communication is permitted in accordance withsecurity clearance regulations, links can be established over classifiedcommunications capabilities, such that individuals can chat with oneanother, establish audio links, or visual links assuming that theappropriate security clearance attributes are present. Additionally, theattributes associated with the security clearance, can allowcommunications links that are appropriate to that clearance level to beopened. In this fashion individuals who are in a meeting room that isassociated with a classified project can be assured that theircommunication is over an appropriate communication link that is managedby a security server, thereby avoiding the compromise of classifiedinformation. In addition, information processor 114 may cause a log ofall interactions in the “meeting room” to be stored in subscriberrecords datastore 120.

In an embodiment, the “meeting room” is bounded space that is related toa real (non-virtual) space. In this embodiment, the bounded space may bea building, a series of “sensitive compartmented information facility”(SCIF), a military base, a nuclear facility, a contractor's facility inwhich classified information is maintained, and a research facility, andany other location at which classified information may be located and/ordiscussed.

In another embodiment, a matching system is operated to authorize thesharing of information such as information maintained in files,documents and records that is considered by at least one party to beprivate and/or confidential (herein sometimes referred to as “protectedinformation.”) By way of illustration and not by way of limitation,protected information may be found in business records, health records,medical records, employment records, financial records, tax records,police records, juvenile justice records, military records, securitiesrelated records (e.g. investments, stocks and bonds offerings, mergers,acquisitions), litigation records (attorney client privilege,confidentiality, documents under seal, protective orders)and customsrecords.

In an embodiment, the sharing of protected information by one party withanother party is regulated through permissions that determine whether asharing party is authorized to disclose the protected information,whether a potential receiving party is authorized to receive protectedinformation, and whether the protected information meets conditionsestablished by the potential reviewing party for review by the potentialreviewing party. These permissions may be embodied in the profiles ofthe sharing party and the potential reviewing party. In an embodiment,the profiles of the parties may also establish contractual and paymentconditions for the disclosure and acceptance of the protectedinformation.

By way of illustration and not by way of limitation, a match indicatoris used to facilitate a health records exchange system. In thisembodiment, the term “health record” refers broadly to information thatrelates to the physical, mental, genetic and emotional health of anindividual or a group of individuals. Records relating to storedembryos, sperm donors, and egg donors are also within the scope of theterm “health record.” Additionally, genetic profiles of individuals andgroups of individuals are also within the term “health record.” A healthrecord may be in electronic form or in a physical form, or a combinationof both.

Sharing of protected information may occur in a virtual space during asharing session. The establishment of a sharing session may beconditioned on particular permissions associated with the protectedinformation, as well as on the content of the records that are proposedto be shared. The grant of permissions of the parties may be establishedin advance of the sharing session or as a process within theestablishment of the sharing session.

In an embodiment, a potential receiving party receives electroniccredentials from an authorizing agency. By way of illustration and notby way of limitation, the authorizing agency may authenticate a party asa licensed healthcare provider, as a law enforcement officer, or as aguardian of an individual. The electronic credentials may be valid for aparticular period of time. Authentication of individuals is well knownin the art and will not be discussed in further detail. The electroniccredentials may be included in the profile information of a potentialreceiving party.

In addition to requiring information establishing the qualifications ofa potential receiving party (as, for example a licensed healthprofessional or a law enforcement officer), the permissions required topermit sharing of protected information may require supplementaryinformation. For example, the required supplementary information may beinformation indicating that a healthcare provider be licensed in aparticular state, have a minimum number of years in a specialty, andhave an affiliation to a particular hospital or insurance provider.

In another embodiment, in addition to credentials of the party with whominformation is to be shared (the recipient), the recipient may haverequirements as well for information that it believes are mandatory inorder for services and advice to be rendered. As noted below and not byway of limitation, a physician (for example) may require a number ofspecific medical records in order for that physician to render qualityservices. The permissions of this potential receiving party may requireaccess to these records as a condition to receipt of the protectedinformation.

Referring again to FIGS. 1 and 2, subscribers A and B create profiles oninformation processor 114 that are stored in subscriber recordsdatastore 120. By way of illustration and not as a limitation, asubscriber profile of the owner of the protected information maycomprise a set of qualifications or a set of qualifications and a set ofsupplementary qualifications. The qualification information and thesupplementary information may be required to be authenticated or it maybe acceptable without authentication. The profile of a potentialrecipient of the protected information may comprise qualificationinformation and, optionally, supplementary information. The profile mayalso include authentication of the qualification information and thesupplementary information.

As previously described, the subscribers' profiles are stored insubscriber records 120. When a subscriber logs in to VMS server 100 vialogin manager 140, the subscriber is deemed to be “present” in VMS 230.The subscriber is identified to VMS server 100 via the subscriber idassociated with the subscriber record stored in subscriber recordsdatastore 120. A subscriber A icon 240 is displayed within VMS 230 tocomputing device 205 indicating that the subscriber using computingdevice 205 is present in the space. A subscriber icon B 250 is displayedwithin VMS 230 to computing device 210 indicating that the subscriberusing computing device 210 is present in the space. In this embodimentnetwork 145 may be a wired network, a wireless network, a fiber network,a secure wired network, a secured wireless, and a secured fiber network.

The placement and movement of subscriber A icon 240 and subscriber Bicon 250 is as previously described. In an embodiment, subscriber A icon240 is visible to subscriber A but not to subscriber B and subscriber Bicon 250 is visible to subscriber B but not to subscriber A. In otherembodiments, the visibility of icons associated with other users isunder the control of the viewing subscriber. In these embodiments, theviewing subscriber may cause other icons to be visible, to be visible ina diminished way so as to indicate presence, or to be visible only whenthe other subscriber icons are “icons of interest” as described below.Information processor 114 operates matching instructions that determineif there is a match between the profiles of subscriber A and subscriberB as previously described.

In this implementation, the matching instructions may reveal whether asubscriber (the potential recipient) is qualified to view the protectedinformation and, if required by the owner of the protected information,whether the subscriber also possesses the requisite supplementalinformation. Thus, if the owner of protected information wishes to sharea record comprising protected information with another person that isqualified to review the protected information, icons of the owner andthe recipient can similarly be moved next to one another or links drawnfrom one icon to another that will indicate that an owner has located aqualified recipient. The affinity between the owner the qualifiedreceipt can be illustrated as a color change or some other graphicalattribute as previously described.

Alternatively, the owner of the protected information may require amatch of both the qualification information and the supplementalinformation in order for the profiles to be identified as “matching.” Inthis embodiment, the icons may be associated with attributes thatindicate that a potential recipient is qualified and possesses thenecessary supplemental information or is qualified but has not providedthe supplemental qualification information. The owner of the protectedinformation may either withdraw the requirement for the supplementalinformation or provide the potential recipient an opportunity to beprovided with the supplemental in a manner acceptable to the informationowner.

In yet another alternate embodiment, the owner of the qualifiedinformation may require a match of both the qualification informationand the supplemental information before an icon is visible.

Additionally, the owner of the protected information may require thatthe potential recipient be authenticated as to the identity,qualification information and supplemental information.

The potential recipient may also impose conditions on the exchange ofprotected information. By way of illustration and not by way oflimitation, the potential recipient may require information from theprovider of the protected information that establishes the right of theprovider to share the protected information. Thus, the potentialrecipient may require supplemental information from the provider of theprotected information and/or authentication of the provider of theprotected information. The potential recipient may additionally requireparticular additional content be provided with the protectedinformation.

In an embodiment, the exchange of protected information may involve morethan two parties. Multiple parties may be involved in circumstanceswhere the discloser of the protected information does not possess theadditional content required by a potential recipient of the protectedinformation and in circumstances where a consultation is desired. In amultiparty exchange, icons of the multiple parties will display matchingicons.

In an embodiment, when two icons have attributes that match in such away that sharing of protected information is permitted, links can beestablished over communications facilities such that the owner of theprotected information may share that protected information with therecipient. In an embodiment, the owner and the recipient may can chatwith one another, establish audio links, or visual links. Theinformation processor 114 may cause a log of all interactions in the“meeting room” to be stored in subscriber records datastore 120. Theowner of the protected information may require that the communicationlinks are secure.

In yet another embodiment, the owner of the protected information mayidentify portions of the totality of the protected information that maybe shared. In this manner, the match that is determined will be a matchfor specific areas of the total record that the owner of the protectedinformation wishes to share. From the recipient's point of view, theremay be specific areas of a record that are desired to be viewed andwhich can be specified as a requirement by the recipient. For example, amedical care provider may require not only access to MRI's and othertests relating to the condition of a potential patient (the owner of theprotected information) but may also require access to information onprescription medication that has been prescribed to the owner of theprotected information. If such permission is not granted, the recipientwill not be deemed a “match” to the owner of the protected information.In this manner, not only is protected information of the ownerconsidered, but so will be the needs of the medical professional whowould potentially treat the owner of the protected data. Thus the systemand method of the various embodiments can also be used to point outdeficiencies in data records so that the owner of the protected data canbe advised of shortcomings in any data that is to be shared.

In another embodiment, the matching system may be used to negotiatelegal and financial matters before protected information is actuallyshared. Contractual conditions to disclosure (e.g., a non-disclosureagreement) and financial conditions (e.g., fee, fee payment) may bearranged prior to the actual disclosure of the protected information.

In another embodiment, the matching system can be used to negotiate thesharing of information in a litigation context. For example and withoutlimitation, certain expert opinions may only be shared with certaincounsel during the development of those opinions. Certain documents mayonly be shared among selected counsel. The terms of a protective ordermay dictate what documents may be shred and when during the course oflitigation. Attorney client privilege can be maintained more effectivelywith permissions being implemented so that not all members of a clientare authorized to receive communication and comments from the attorneyrepresenting the client.

In the context of securities transactions, matching system may be usedto negotiate sharing of due diligence document among those who are partyto the transactions thereby maintaining confidentiality before anymarketing efforts occur. Thus accountability and security of offeringdocuments can be maintained until such time as any offering is publiclyannounced.

In an embodiment, a matching system is operated to authorize the sharingof content such as written, audio and video content maintained invarious media in written or digital form and items in physical form. Inthis embodiment, the content may be considered by at least one party tobe valuable (herein sometimes referred to as “protected content.”) Byway of illustration and not by way of limitation, protected content mayinclude books, collections, videos, photographs, sound recordings,historical documents, historical artifacts or treasures, fossils,research records, and other similar content. The content may bemaintained by an individual, such as a collector, or by an institution,such as a library, a museum, a laboratory or a business enterprise.

In an embodiment, the sharing of protected content by one party withanother party is regulated through permissions that determine whether asharing party is authorized to disclose the protected content, whether apotential receiving party is authorized to receive protected content,and whether the protected content meets conditions established by thepotential reviewing party for review by the potential reviewing party.These permissions may be embodied in the profiles of the sharing partyand the potential reviewing party. In an embodiment, the profiles of theparties may also establish contractual and payment conditions for thedisclosure and acceptance of the protected content.

By way of illustration and not by way of limitation, a match indicatoris used to facilitate a content exchange system between a library andpatron. The content may be in electronic form or in a physical form, ora combination of both. A “library” may be operated for the benefit ofthe public or may be operated as a business. Thus, a public library anda video store may be considered “libraries” for this discussion.

Sharing of protected content may occur in a virtual space during asharing session. The establishment of a sharing session may beconditioned on particular permissions associated with the protectedcontent, as well as on the content that is proposed to be shared. Thegrant of permissions of the parties may be established in advance of thesharing session or as a process within the establishment of the sharingsession.

In an embodiment, a potential receiving party receives electroniccredentials from an authorizing agency. By way of illustration and notby way of limitation, the authorizing agency may be the entity operatingthe library or a third party authorized by the operating entity. Theelectronic credentials may be valid for a particular period of time.Authentication of individuals is well known in the art and will not bediscussed in further detail. The electronic credentials may be includedin the profile content of a potential receiving party.

In addition to requiring information establishing the authentication ofthe receiving party, the permissions required to permit sharing ofprotected content may require supplementary content. For example, therequired supplementary content may be content indicating that apotential recipient in compliance with the terms of a sharingarrangement with respect to previously shared content.

In another embodiment, in addition to credentials of the party with whomcontent is to be shared (the recipient), the recipient may haverequirements as well for content that it believes are mandatory in orderfor the content to be shared. For example, the receiving party mayrequire that the content be shared for a particular length of time, thatthe sharing be exclusive for a period of time, and that the sharing ofthe content be maintained in confidence.

Referring again to FIGS. 1 and 2, subscribers A and B create profiles oncontent processor 114 that are stored in subscriber records datastore120. By way of illustration and not as a limitation, a subscriberprofile of the party in possession of the protected content may comprisea set of qualifications or a set of qualifications and a set ofsupplementary qualifications. The qualification content and thesupplementary content may be required to be authenticated or it may beacceptable without authentication. The profile of a potential recipientof the protected content may comprise qualification information and,optionally, supplementary information. The profile may also includeauthentication of the qualification information and the supplementaryinformation.

As previously described, the subscribers' profiles are stored insubscriber records 120. When a subscriber logs in to VMS server 100 vialogin manager 140, the subscriber is deemed to be “present” in VMS 230.The subscriber is identified to VMS server 100 via the subscriber idassociated with the subscriber record stored in subscriber recordsdatastore 120. A subscriber A icon 240 is displayed within VMS 230 tocomputing device 205 indicating that the subscriber using computingdevice 205 is present in the space. A subscriber icon B 250 is displayedwithin VMS 230 to computing device 210 indicating that the subscriberusing computing device 210 is present in the space. In this embodimentnetwork 145 may be a wired network, a wireless network, a fiber network,a secure wired network, a secured wireless, and a secured fiber network.

The placement and movement of subscriber A icon 240 and subscriber Bicon 250 is as previously described. In an embodiment, subscriber A icon240 is visible to subscriber A but not to subscriber B and subscriber Bicon 250 is visible to subscriber B but not to subscriber A. In otherembodiments, the visibility of icons associated with other users isunder the control of the viewing subscriber. In these embodiments, theviewing subscriber may cause other icons to be visible, to be visible ina diminished way so as to indicate presence, or to be visible only whenthe other subscriber icons are “icons of interest” as described below.Information processor 114 operates matching instructions that determineif there is a match between the profiles of subscriber A and subscriberB as previously described.

In this implementation, the matching instructions may reveal whether asubscriber (the potential recipient) is qualified to view the protectedcontent and, if required by the party in possession of the protectedcontent, whether the subscriber also possesses the requisitesupplemental information. Thus, if the owner of protected content wishesto share a record comprising protected content with another person thatis qualified to review the protected content, icons of the owner and therecipient can similarly be moved next to one another or links drawn fromone icon to another that will indicate that an owner has located aqualified recipient. The affinity between the owner the qualifiedreceipt can be illustrated as a color change or some other graphicalattribute as previously described.

Alternatively, the party in possession of the protected content mayrequire a match of both the qualification information and thesupplemental information in order for the profiles to be identified as“matching.” In this embodiment, the icons may be associated withattributes that indicate that a potential recipient is qualified andpossesses the necessary supplemental information or is qualified but hasnot provided the supplemental qualification information. The owner ofthe protected content may either withdraw the requirement for thesupplemental information or provide the potential recipient anopportunity to be provided with the supplemental information in a manneracceptable to the party in possession of the protected content.

In yet another alternate embodiment, party in possession of theprotected content may require a match of both the qualificationinformation and the supplemental information before an icon is visible.

Additionally, party in possession of the protected content may requirethat the potential recipient be authenticated as to the identity,qualification information and supplemental information.

The potential recipient may also impose conditions on the exchange ofprotected content. By way of illustration and not by way of limitation,the potential recipient may require information from the party inpossession of the protected content that establishes the right of theprovider to share the protected content. Thus, the potential recipientmay require supplemental information from the provider of the protectedcontent and/or authentication of the provider of the protected content.The potential recipient may additionally require particular additionalinformation be provided with the protected content.

In an embodiment, the exchange of protected content may involve morethan two parties. Multiple parties may be involved in circumstanceswhere the discloser of the protected content does not possess theadditional content required by a potential recipient of the protectedcontent and in circumstances where a consultation is desired. In amultiparty exchange, icons of the multiple parties will display matchingicons.

In an embodiment, when two icons have attributes that match in such away that sharing of protected content is permitted, links can beestablished over communications facilities such that the owner of theprotected content may share that protected content with the recipient.In an embodiment, the owner and the recipient may chat with one another,establish audio links, or visual links. The information processor 114may cause a log of all interactions in the “meeting room” to be storedin subscriber records datastore 120. The party in possession of theprotected content may require that the communication links are secure.

In another embodiment, the matching system may be used to negotiatelegal and financial matters before protected content is actually shared.Contractual conditions to disclosure (e.g., a non-disclosure agreement)and financial conditions (e.g., fee, fee payment) may be arranged priorto the actual disclosure of the protected content.

In another embodiment, the matching system may be used to consummate atransaction. In this embodiment, the sharing of protected content orprotected information is extended to an actual exchange of title to theinformation or content.

It will also be understood that the invention may be embodied in otherspecific forms without departing from the scope of the inventiondisclosed and that the examples and embodiments described herein are inall respects illustrative and not restrictive. Those skilled in the artof the present invention will recognize that other embodiments using theconcepts described herein are also possible. Further, any reference toclaim elements in the singular, for example, using the articles “a,”“an,” or “the” is not to be construed as limiting the element to thesingular.

1. A system for secure record sharing in a virtual space comprising: anetwork; subscriber computing devices, wherein each subscriber computingdevice is associated with a subscriber identifier and wherein eachsubscriber computing device is connected to the network; a profiledatastore, wherein the profile datastore comprises a subscriber recordsharing profile comprising conditions for the exchange of protectedinformation established by the subscriber and wherein the subscriberrecord sharing profile is associated with the subscriber's subscriberidentifier; an information processor connected to the network, whereinthe information processor comprises instructions for: monitoringsubscriber identifiers associated with the subscriber devices that arelogged into a website, wherein the website defines a virtual space andthe logged-in subscriber devices are characterized as present in thevirtual space; serving web pages to the computing devices of the presentsubscribers via the network, wherein a web page of a present subscribercomprises a subscriber icon associated with the present subscriber andsubscriber icons of other present subscribers; determining whether asubscriber record sharing profile associated with the present subscribermatches the subscriber record sharing profiles associated with the otherpresent subscribers according to record sharing matching criteria(herein, the “record matching determination”); in response to the recordmatching determination, linking the icon of the present subscriber tothe icons associated with other present subscribers having recordsharing profiles that match the record sharing profile of the subscriberaccording to the security matching criteria and assigning a matchingattribute to the icons associated with the other present subscribershaving record sharing profiles that match the record sharing profile ofthe present subscriber according to security matching criteria; andproviding selected record sharing profile information to the presentsubscriber of a selected one of any of the other present matchingsubscribers.
 2. The system of claim 1, wherein the subscriber computingdevices are selected from the group consisting of a desktop computer, alaptop computer, a PDA, a cellphone, and a smartphone.
 3. The system ofclaim 1, wherein the network is selected from the group consisting of awired network, a wireless network, a fiber network, a secure wirednetwork, a secured wireless, and a secured fiber network.
 4. The systemof claim 1 wherein the icon of the present subscriber and the icons ofthe other present subscribers are selected from the group consisting ofa geometric shape, an avatar, a shape of an animal, and a shape of anobject.
 5. The system of claim 1, wherein the protected information iscontained in a record selected from the group consisting of a businessrecord, a health record, an employment record, a financial record, a taxrecord, a police record, a juvenile justice record, a military personnelrecord, a customs record, a legal record, and a securities record. 6.The system of claim 5, wherein the health record is selected from thegroup consisting of a physical health record, a mental health record, agenetic profile, a record of embryo storage, a sperm donor record, and aegg donor record.
 7. The system of claim 1, wherein the conditions forexchange of profile information comprises information selected from thegroup consisting of the qualifications of a receiving subscriber, thequalifications of a providing subscriber, an authentication of areceiving subscriber, and an authentication of a providing subscriber.8. The system of claim 1, wherein the matching attribute is selectedfrom the group consisting of a color, a hue, a size, a shape, a sound,flashing, and a periodic change from one attribute to another attribute.9. The system of claim 1, wherein the virtual space is representative ofa real space and wherein the web page comprises a graphical depiction ofthe virtual space.
 10. The system of claim 9, wherein the informationprocessor further comprises instructions for determining a location ofthe subscriber computing devices relative to the real space and whereinthe icon of the present subscriber and icons of the other presentsubscribers are displayed relative to their locations in the real space.11. The system of claim 7, wherein computing devices are wirelessdevices, the network is a wireless network, and the present subscriberand the other present subscribers are physically located in the realspace.
 12. A method for secure networking in a virtual space over anetwork comprising: associating subscriber computing devices withsubscriber identifiers, wherein each computing device is connected tothe network; creating a subscriber record sharing profile in a profiledatastore, wherein the subscriber record sharing profile comprisesinformation indicative of a security status of a subscriber and whereinthe subscriber record sharing profile is associated with thesubscriber's subscriber identifier; monitoring subscriber identifiersassociated with the subscriber devices that are logged in to a website,wherein the website defines a virtual space and the logged-in subscriberdevices are characterized as present in the virtual space; serving webpages to the computing devices of the present subscribers via thenetwork, wherein a web page of a present subscriber comprises asubscriber icon associated with the present subscriber and subscribericons of other present subscribers; determining whether a record sharingprofile associated with the present subscriber matches the subscriberrecord sharing profiles associated with the other present subscribersaccording to security matching criteria (herein, the “record matchingdetermination”); in response to the record matching determination,linking the icon of the present subscriber to the icons associated withother present subscribers having record sharing profiles that match therecord sharing profile of the subscriber according to the securitymatching criteria and assigning a matching attribute to the icons of theother present subscribers having record sharing profiles that match therecord sharing profile of the present subscriber according to securitymatching criteria; and providing selected record sharing profileinformation to the present subscriber of a selected one of any of theother present matching subscribers.
 13. The method of claim 12, whereinthe subscriber computing devices are selected from the group consistingof a desktop computer, a laptop computer, a PDA, a cellphone, and asmartphone.
 14. The method of claim 12, wherein the network is selectedfrom the group consisting of a wired network, a wireless network, afiber network, a secure wired network, a secured wireless, and a securedfiber network.
 15. The method of claim 12, wherein the icon of thepresent subscriber and the icons of the other present subscribers areselected from the group consisting of a geometric shape, an avatar, ashape of an animal, and a shape of an object
 16. The method of claim 12,wherein the protected information is contained in a record selected fromthe group consisting of a business record, a health record, anemployment record, a financial record, a tax record, a police record, ajuvenile justice record, a military personnel record, a customs record,a legal record, and a securities record.
 17. The method of claim 16,wherein the health record is selected from the group consisting of aphysical health record, a mental health record, a genetic profile, arecord of embryo storage, a sperm donor record, and a egg donor record.18. The method of claim 12, wherein the conditions for exchange ofprofile information comprises information selected from the groupconsisting of the qualifications of a receiving subscriber, thequalifications of a providing subscriber, an authentication of areceiving subscriber, and an authentication of a providing subscriber.19. The method of claim 12, wherein the attribute is selected from thegroup consisting of a color, a hue, a size, a shape, a sound, flashing,and a periodic change from one attribute to another attribute.
 20. Themethod of claim 12, wherein the virtual space is representative of areal space and wherein the web page comprises a graphical depiction ofthe virtual space.
 21. The method of claim 20 further comprising:determining a location of the subscriber computing devices relative tothe real space; and displaying the icon of the present subscriber andthe icons of the other present subscribers relative to their locationsin the real space.
 22. The method of claim 17, wherein computing devicesare wireless devices, the network is a wireless network, and the presentsubscriber and the other present subscribers are physically located inthe real space.