Social networking with depth and security factors

ABSTRACT

An online interactive communication and chatting system and method for providing information to a web site having different levels of user interactions, with the provided information being available to or shareable with registered users of the system at specific levels thereof. The provided information is keyed to the different levels of user interaction, with different Key Phrases being respectively linked to the different levels. The correct entry of a Key Phrase provides access to a linked level with communication, chatting and information available therein to registered users correctly entering the Key Phrase. Incorrect entry of a Key Phrase provides access to incorrect information generated by the system.

FIELD OF THE INVENTION

This invention relates to social networking systems and moreparticularly to social networking systems that enable, organize andprovide diverse types of relationships, as well as greater security andprivacy controls. The methods described here allow typical users tocommunicate and share relative information quickly, efficiently and mostimportantly securely, while allowing for an enjoyable experience. Theinvention also provides incentives, checks and balances for all itsusers, which includes members and sponsors. The invention also providesits clients, such as advertisers, various tools for identifying andtargeting customers, e.g., suitable viewers.

BACKGROUND OF THE INVENTION

No single social media company known today provides a platform for itsaverage user to manage different types of relationships each user mayhave, with specific individuals and with society in general. The presentinvention is configured to provide various facilities, instrumentalitiesand methods that existing platforms do not provide to theirmembers/users, and these include:

1. An environment where fluid relationships can evolve and grow deeperover time (referred to hereinafter as “the Depth Factor”). Most of thetime when two people meet, they start as acquaintances, which status maystay that way for many years. Alternatively, they may become friendsafter a few months and progress to becoming best of friends. Therelationship may deepen and they may get married and have children. On adifferent track, they may become involved in professional relationshipssuch as becoming co-workers, or one becoming an employee of or reportingto the other. In some instances they may decide to undertake a businessventure, e.g., together or with people of business, legal or medicalbackgrounds. One could become a patient or client of the other or onemight want to purchase goods or services from the other. They may becomevendors, lenders, customers, consultants, insurers, shareholders,directors, executives, staff members, etc., of each other. Businessestake similar paths with their vendors, lenders, customers, consultants,insurers, shareholders, directors, executives, staff members and soforth;

2. An environment that provides a greater sense of security and privacyof certain information, which users need before willing to sharesensitive information (hereinafter referred to as “the SecurityFactor”). Present social media companies store and, therefore, havecomplete control of their users' private content, i.e., emails, photos,chats, documents, and all confidential data, including financial data,medical data, resumes, user's contact data; clients/contacts contactdata, web searches, private content: credit report, DNA, text, photo,audio, video data, social media content, i.e., chats, web searches andshopping. At times, these contents may be too sensitive for any companyto store or have access to, regardless of the company's size or itspolicies. Furthermore, it is possible that a user's content may beaccessed without knowledge of the user by the social medial company orby one of its employees which, in general, diminishes or undermines userconfidence;

3. An environment where users can cooperate and act as a group bydeveloping a procurement list and so save money when buying goods orservices from suppliers. Or, users may utilize the list to get competingbids from suppliers or service/care providers (hereinafter referred toas “the Efficiency Factor”);

4. An environment that provides a better experience by using andproviding the most up to date, technologically developed facilities(hereinafter referred to as the “Enhanced User Experience Factor”);

5. An environment that includes checks and balances, involvingdisclosing to each other various credential information; as more fullyexplained below (hereinafter referred to as “the Checks and BalancesFactor”); and

6. An environment that better quantifies users' participation andactivities and which provides certain incentives, for example:

a. Users can collect incentives for the time spent online; and

b. Advertisers can make decisions on how to spend their dollarseffectively by profiling and targeting users for differentadvertisements (hereinafter referred to as “the User Dashboard Factor”).

SUMMARY OF THE INVENTION

Accordingly, it is an object of the present invention to provide asocial networking system or systems which provide one of or acombination of environments that have: the Depth Factor; the SecurityFactor; the Efficiency Factor; the Enhanced User Experience Factor; theChecks and Balances Factor; and/or the User Dashboard Factor.

These and other objectives are realized in a system having those variousmentioned factors which can be further characterized by the following.

1. The Depth Factor: Generally the present invention comprises anon-line relationship platform and method of interaction, which starts,for example, at the time of initial contact. As used herein, the term“relationship” includes any interaction between people or entities orboth, for example: (a) People such as two or more individuals, such asacquaintances, co-workers, peers, alumni, and the like; (b) Entitieswith people who act as Product/Service/Care providers and customers,employees and employers, and the like; and (c) Business to Businessrelationships (b2b), such as Vendor/Service/Care providers and businessentities, and the like.

Each type of relationship comprises different levels of depth orintensity. At the time of initial contact, there is an exchange of basicinformation between two individuals (or entities), as is typical betweenany two individuals and/or entities. Then, as time passes, therelationship evolves to greater levels. Thereby, more relevant and moreconfidential information is exchanged or shared.

In an online platform this information is preferably grouped intorelationship level categories (referred to herein as “Corners”) andmaintained in one or more databases. In colleges, trade shows, etc.,like minded people or businesses tend to congregate in different“Corners”, hence the term “corner”. Each Corner is associated with a“Key Phrase”. Then, as the relationship deepens, relevant “Key Phrases”for progressing categories may be exchanged to provide for informationexchange on a higher, deeper and more intimate or confidential level.

The “Key Phrases” are preferably coined or made up by the platformusers, with each “Key Phrase” being associated with a particularcategory or Corner. Such “Key Phrases” are not limited in nature and maybe anything from a pet's name to a mother's maiden name, etc. dependingon the sensitivity of the Corner's category. Therefore, unique “KeyPhrases” will activate corresponding Corners (or Categories).

2. The Security Factor: Apart from the entry of a proper Key Phrase,another aspect of the system of the present invention involves threerequirements and aspects of security provisions for the system of theinvention.

Firstly, for user acceptance, the system of the present inventionpreferably does not own the user's data; does not hold or store theuser's data; and does not control the user's data.

Secondly, the actual holder of the user's data and the controller of theuser's data is preferably not a single entity, but rather multipleentities. By dividing the data into parts and delegating the storage ofdata in “parts” to a third party entities, such as to non-profitorganizations, the security concern is resolved. Non-profitorganizations are not privately owned, and typically controlled by afinancially more independent boards of directors. Preferably, a numberof each non-profit organization's board of directors, who are involvedin the storage and handling of data in the system of this invention, areassociated with media and/or press. This should further discouragemisuse of data, as doing so would more likely be reported to the public.This method and approach provides a safer, i.e., more secure, platformfor today's users.

Thirdly, when the inventive system senses improper attempts to accessinformation, it fills any data vacuum with disinformation. This fillingof the vacuum with misinformation is readily provided. Normally,whenever any access to secure data requires a password, the password, ineffect, provides an immediate response to the user. If the password iscorrect, access is granted and, if not, then access is denied. Inaccordance with an aspect of the present invention however, when apassword is entered, regardless of whether it is correct or not, accessis granted to the user. A correct password grants access to “CorrectData”. In contrast, an incorrect password directs the user to a wrongset of data, referred to herein as “Misinformation Data”. Correct Datais entered by the account/data owner. The Misinformation Data isgenerated by a set of servers of the system, which have been programmedwith algorithms to automatically fill the vacuum with the MisinformationData.

3. The Efficiency Factor: As one example, consumers can simply compile alist of basic items on a shopping list. In one example, items that havealready been consumed are scanned onto on-board chip of a storage door,i.e., “Smart Fridge” and/or as being disposed into “Smart Trash Bin” andor standalone plug-in/hardwire unit. Then the list is uploaded via WiFior LAN to the Cloud, and then the list is processed to find the lowestlocal and online prices, coupons, closest market, search coupons, itemson sale, closes shop, forecast, recommend complementary items, recommendways of acquiring quickest route or cheapest route, greenest route,local producers, healthiest, supplier ratings or hybrid, etc. The listcan be downloaded onto a smart phone or onto a smart shopping cart,which may be programmed to find the shortest route to the relevantmarket or within a market. The Smart Fridge or Smart Trash Bin are basicappliances equipped with Laser Scanners built in (or retrofitted into)the appliance doors. The scanner is similar to market scanners. Toaccomplish the foregoing, the consumer scans items as empty containersof food are being disposed at the Fridge or the Trash Bin, beforedisposal. As RFID technology is being implemented, similar scanningcould be implemented using RFID, cameras, standalone or located within aphone. The system can also monitor the consumer's usage based onfrequency of items being purchased and so evolve a simple forecast ofneeded items. Then the forecast generates a recommendation list for theconsumer at the time of shopping. At the time of shopping, the systemalso may suggest items that are not on the list, that complement theitems that are on the list, or it can suggest items that are currently“on sale” (i.e., offered at a lowest price within a 20 mile radius). Asan option, the Fridge console also can be utilized for checking offitems from the list, as newly purchased items are being placed into theStorage.

4. The Enhanced User Experience Factor: To enhance user experiences, theuser interface provides users the option of listening to chats, email orany data in text format. The audio is synthesized by software whichmimics the voice of the individual who has sent the message. For thesoftware to achieve this, first the user sending the message goesthrough some steps to familiarize the software with the user's voicetone and accent. Second, the software analyzes the user's vocals againststandard off the shelf speech software. It would use the off the shelfsoftware as a base line and make adjustments specific to the user'svoice according to the database accumulated for the user.

5. The Checks and Balances Factor: If a “User A” wants to see “User B”info, not only must User A have the correct “Key Phrase(s)” but alsomust have identical or better “Credentials,” verified at the time ofaccess.

6. The User Dashboard Factor: A user console is provided to track usageand activity based on the following and other criteria:

a. Invitations: A Database is created for each user, as the user sendsinvitations to new or other users (invitees) and then accepted. The listgrows as new invitees accept. The total number of invitees is thenlinked to a type of incentive.

b. Viewed Ads: Another Database is created for each user to track eachuser's activity which can be measured as time spent viewing ads. Thetotal number of ads seen is then linked to a type of incentive.

c. Advertiser and user needs. The advertiser/client can select, from theuser's console, which demographic it wants to target. After publication,the advertisers can view, from their account, how many ads wereinserted, hovered over, and links clicked by the users, in a summaryformat or a drill down to activity by data range. A general demographicdata of the users is also supplied to the advertiser to determinewhether it likes to keep its ad campaign as is, or make improvements byeither changing the ad itself or its targeted audience. Within the ad,the users are asked whether they are interested in being contacted bythe advertiser. If yes, then the user's contact info is also provided tothe advertiser's console or “dashboard”.

d. As users input personal content, the content has relevant informationwhich is useful to the advertisers. Such information as gender, race,age, current location, addresses, medical data, financial data,employment data, scope of work, shopping list, service/care list andetc. The information gathered on the users can be utilized by theadvertisers to place their ads in front of select audience, withoutrevealing the identity of the viewer to the advertiser, unlesspermission is granted. The ad contents is merged with the user content(from independent servers) and fed the viewer. The viewer, viewing thecontents of the users could be looking at correct data or incorrect datadepending which key phrase has been entered, regardless of which, the adcontent is correct content. At no time is the user content or the viewercontent stored on our servers. The Advertising Server does store adcontent, ad count (# of views by what type of viewer: gender, age,location, etc., i.e., 50 men, 60 women, 10 in NY, 50 LA, 8 ages 20-30,100 ages 30-40, etc.).

The above features of the invention will be more readily apparent fromthe description of the preferred embodiments thereof taken inconjunction with the accompanying drawings and appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flow chart showing initial registration to the system of thepresent invention;

FIG. 2 is a continuation of the flow chart of FIG. 1 showingregistration entry processes with information entry into a typical Level1 relationship and a Level 2 relationship, with a friend and a personalbusiness lending relationship respectively;

FIGS. 3A and 3B are a flow chart of web pages progressing through log-onto the system, to entry of “Key Phrases” to access Corners or categoriesof personal relationship and opening of a contact console page;

FIGS. 4A and 4B are flow charts, which depict respective operationalsecurity scenarios and routes, including providing misinformation incertain situations;

FIG. 5 is a scanner embodiment for providing shareable information for apersonal vault in another level corner.

FIG. 6 is a system block diagram showing certain aspects of the systemof the present invention.

DETAILED DESCRIPTION OF THE INVENTION

Generally the present invention comprises an online interactivecommunication, contents sharing and chatting (including emails) systemconfigured for providing information to a web site having differentlevels of user interactions. The provided information is available to orshareable with registered users of the system at specific, user definedor chosen levels thereof. The provided information is keyed to differentlevels of interaction with different Key Phrases being linked to thedifferent levels, the correct entry of which provides access to thelinked levels of communication and information available therein byregistered users. In a preferred embodiment, the system is configuredsuch that incorrect entry of a Key Phrase provides a pseudo entry into alevel with Misinformation Data generated by the system.

The method of the present invention comprises the steps of:

a) setting up an online communication system configured for the storageor sharing of entered information;

b) configuring the system with multiple levels of interactiverelationships with concomitant information being entered into respectivelevels according to the nature of the level; and

c) setting the access to information in the respective levels andinteractive communication therewithin, based on the correct entry ofpreset Key Phrases respectively linked to different levels.

Referring to FIG. 6, as with typical online interactive communicationsystems, the present system 100 can comprise a generic data center 110which typically includes a processing center 120 and a user interface111. These hardware/software components can be located, as well known,at a single location or distributed geographically throughout the UnitedStates, or even the world. Inherent in such prior systems is a datastorage facility 122, which, again, can be physically located at asingle location or distributed throughout the world.

Users 116, who can number in the millions, utilize personalcommunication devices 112 . . . 114 to communicate via the Internet 118,or through non-Internet communication systems, such a cable systems,telephone systems, direct wireless systems, with the data center 110through the user interface 111, all in well known fashion. Users canregister with the data center 100, and upon being qualified, becomeparticipants in the online interactive sessions that the data centerprovides, which allows for the interchanges of various personal andnon-personal content, live chatting or written communications theplaying of audio and video content and the like.

As with all data centers, internal software controls various subsystems130, including in the example shown, first subsystem 132 and an Nthsubsystem 134. These subsystems 130 can have various software modules inwell known fashion, which can control various functions, including,respectively, registering new users, billing and accounting functions,handling security, providing search facilities, policing permissiblecontent only to be listed, overseeing compliance with regulatoryrequirements, and many similar functions which are well known in theart, including such well known functions encountered in the existingsocial networks such as Facebook, Twitter, Linked-In, and similarcommercial networks that provide vending systems such as Amazon, Google,Ebay and many others.

A novel aspect of the present invention comprises the use of auxiliary,independent data centers 150 comprising a plurality of independent datacenters, including first data center 152 and an Nth data center 154,each operating independently and each having its own respective datastorage center 160, which includes a first data storage center 162 andan Nth data center 164.

In the description below, reference is made to five such auxiliary,independent data centers 150. A key consideration of these auxiliarydata centers 150 is that they communicate with the primary data center110 over a communication line 170, and serve to store user content whichhas been dissected in such fashion that no single entity can actuallyhave access to analyze and obtain for itself the contents of individualusers 116. This is because the data of the user is subdivided and storedin different and totally independent data storage servers, which areaccessible only by their respective data centers.

The data center 100 described herein contains the software drivensubsystem modules that allow and effectuate the following, as well asso-called factors.

1. The Depth Factor: The following Example is an illustrative scenarioof a relationship development and communication, as embodied in thesystem of the present invention, after both participants have registeredwith the system.

As an example, Jack and Jane have just met and decide to keep in touchas friends, so they exchange email addresses and Key Phrases, “Wags” and“Scooter”, the names of their respective pets. In order to communicate,as shown in FIG. 3A (having already gone through the registration andinformation entry phase of FIGS. 1 and 2). They do so by entering theother's email address to find the other's information and chat page, asindicated by the web screen pages 20-22. They then respectively enterthe preselected “Key phrase” on each other's Contact Console Page, toreveal the most basic information of their counterpart, e.g., cell phonenumber, work number, emails, and a few photos. As time passes, Jack andJane decide to engage in a lender and borrower relationship. At thispoint, the borrower furnishes the borrower's mother's maiden name (forexample) as a Key Phrase to the lender, which permits the lender toaccess typical information relevant to a loan, and the transaction ismore readily effected.

FIG. 3B shows a Contact Console Web Screen 23. The screen 23 showstypical levels, and as used with the system of the present invention,the levels are associated with Key Phrases for categories or Corners andtypical levels of communication. The contact page or screen 24 listsactivates available on the system of the invention. The levels 1-7include different content, reachable at level 0, 1, and so on, asfollows:

Level 0 (Acquaintance): By providing just an email address, only a photoof the user is available to be revealed.

Level 1 (Friends): Providing the correct Key Phrase for the Level 1(friends) allows the user to gain access to the detail information as inLevel 0, plus more information, such as full name, addresses, phonenumbers and limited distribution (or personal) photos and videos.Collective chatting can be conducted among the Level 1 friends, bothprivately and securely.

Level 2 (Family): In this level, by providing the correct “Key Phrase”,family members have access to private family information such as mattersrelating to the family members or significant others and which may bevery personal and confidential. Entering this level can be used torestrict a “chat” forum to only family members.

Level 3 (Colleagues): Entry of a “Key Phrase” at this level revealsinformation of Level 0, plus, full names, addresses, phone numbers andlimited distribution type photos and videos and is similar to Level 1for friends, with secure chatting among “colleagues”.

Level 4 (Profession): A job seeker, by providing the correct “KeyPhrase” is able to provide targeted information related to workexperience, resume and references to a potential employer and they canchat privately and securely, on a one to one basis.

Level 5 (Medical): This level provides for private doctor-patientcommunication by which entry of the correct “Key Phrase” makes availableto a physician's office the typical registration information asked forduring a first physician visit. Patient's information can be privatelyand securely directly downloaded to a physician's MIS, thereby savingtime for both patient and receptionist/record keeper. Discussion ofsensitive medical matters can also be effected, both privately andsecurely. Furthermore, a Patient's Form can be pre-printed withPatient's information, including allergies, previous procedures,emergency contact and etc. All patients forms which need to signed, canbe signed in an instant at the doctor's office.

Level 6 (Dental or any other product/service/care providers): This issimilar to the Level 5 medical corner, with this level providingrelevant information to a dentist's office or any otherproduct/service/care provider by entering the correct “Key Phrase”.

Level 7 (Lender): Entry of the correct “Key Phrase” provides relevantinformation on-line to a lender or a lender's agent, in an effort tosave time and paper with the ability to conduct private and secureconversations or chatting that is limited to the lending/borrowingtransaction.

Level 8 (Personal Vault): This is used primarily as an InformationVault. Personal and sensitive information can be stored securely, withpiece of mind, including emails, documents, photos, web searches andsites visited, receipts, task list, itineraries, locker combinations,credit card numbers, social security numbers, calendars, address books,contacts, medical records, transcripts, notes, diary entries, songs,videos, play lists, resume details, etc. The information vault isavailable for private or designated shared use on the web on a 24/7basis and anywhere online access is available.

Level 9 (Work/Shopping List): Entering a correct “Key Phrase” revealsrelevant information to, for example, a contractor if one is doing aremodeling job. A shopping list can be provided to a housekeeper, or anyindividual who does the household shopping.

2. The Security Factor: Turning to security, a primary reason behindusers lack of confidence in the social media services is that theproviders of those services exercise and retain full control over users'private data, which data is kept on systems of and/or owned by thesocial media companies.

To avoid this lack of confidence and unease, the system of the presentinvention preferably acts purely as a data processing center, with nodata storage operability.

The present system exemplified by reference to the drawings shows in theflow chart of FIG. 1, an initial registration page or screen 1 common toonline systems, wherein a prospective user of the system enters basicname, e-mail and password information. Entry of the information providesthe user with an email inbox 2 and verification of the registrationscreen 3.

Referring to FIG. 2, a Registration Level 1 (TAB 1) window 4 for Friendsis shown being opened for entry of information to be provided at thislevel, including: A photo, Key Phrase for access to the information,Full name, Cellular phone number, Physical address, email addresses(work and home) and Authorization action check boxes for sharing items.

A separate chat, status, and general posting box 4 a is also provided.

The successive screens 10 at FIG. 1 include the registration page 1,email inbox setup box 2 and email verification page 3. In FIG. 2, Tabs 1and 5 are respectively opened by addressing and filling of screens 12,including page 4 for a Friends Level 1 (involving entry of friendrelated information). The TAB 5 page, which is screen 5, is opened forlender transaction information, with entry line at 13 for the Key Phrasefor this level in addition to the information for the first level in thescreens 1-3 of FIG. 1. Business information such as social securitynumber, date of birth, spouse information is enterable, as indicatedwith check boxes for authorization of information regarding profit andloss, asset listing and employment as relevant information for a loantransaction. Other Tabs are provided for different corners or levels, aspreviously described.

After registration, with completion of information entry in screens 4and 5 and any other level pages desired, opening of the system accountand entry of relevant information for each of the levels selected, andaccess to screens 20 to the information, by registered participants forthe particular levels, is shown in FIG. 3A. A sign-in welcome page orscreen 21 calls for a commonly used entry of email address and passwordto arrive at a home page 22 and with an option to search for aparticular person. The contact console page 23 (at FIG. 3B) providesvarious level corners or categories, with entry into selected contactpages 24 being enabled with the entry of the appropriate Key Phrase, forinformation sharing and chatting.

FIGS. 4A and 4B depict operational Routes 1 and 2 for contact datahandling, via flow charts 30 and 40 respectively. These flow chartsconcern interactions between the system users and system servers overinternet connections. These flow charts map the process features ofsecurity misinformation software containing servers 31 (FIG. 4A) and 41(FIG. 4B).

In the Route 1 process of FIG. 4A, as the initial encrypted EmailVerification page is submitted to the system servers, the email andpassword contents are dissected into several parts by data dissectionserver 33 (FIG. 4A) or 43 (FIG. 4B), equal to the total number ofNon-Profit Entities (aka “Key Keeper” Servers 34 a-e and 44 a-e). FIGS.4A and 4B assume and show five such servers, but use of more or fewerservers is, of course possible. Each dissected data part is transmittedto one of the five Key Keeper Servers (34 a-e, 44 a-e) and then, each ofthe five servers responds with a confirmation that the registration iscomplete.

Next, the new user starts entering “Key Phrases” for each level alongwith the corresponding contents. Note that just the “Key Phrase” byitself is also subjected to being dissected into five parts, whichdissected parts are then transmitted to respective ones of the five KeyKeepers with the user waiting to receive recorded confirmations. The“Key Phrases” along with rest of the content are merged and sent to“Public Server” 35 (FIG. 4A) and to servers 45 a-e (FIG. 4B).

These “Public Servers” (35, 45 a-e) are separate servers, different fromthe servers of the five Key Keepers (34 a-e, 44 a-e), and they have anindependent Non-Profit entity presiding over and controlling them.However the function of the Public Server is very different from that ofthe other servers. The storage capacity of the Public Server is muchgreater since it stores all the contents of what is known to be truedata, generated from the users, as well as all the false data generatedby the Misinformation Software (31, 41).

Recording and accurately storing the email addresses along with theirpasswords and their Key Phrases contents on the Key Keeper servers (34a-e, 44 a-e) is highly preferred. This is because, as data from theMisinformation Software is being generated and streamed in, the KeyKeepers function and serve to filter out the recorded Key Phrases, sothat false changes are not made to the user's account, as indicated bydata flow arrow 39.

After the filtration process is completed, the filtered data is sentback to the processing servers and merged with User's Data and sent tothe public servers.

The operation, as indicated by Route 1, requires large capacity servers,which are not practical even today (on the order of 10,000 TB/user).Accordingly, the operation shown via Route 2 (FIG. 4B) addresses thisissue by generating the misinformation data at the time of inquiry. Withthe operation according to Route 2, after email verification, andcompletion of the registration by the account holder, for every inquirygenerated from the user, misinformation data is generated for the sameKey Phrase and sent to the Key Keepers. If the Key Phrase is correct, asgiven from the user, then the Key Keepers reject the misinformation data(which is purged) and correct information is recalled and fed back tothe user. However, if the Key Phrase is incorrect, then misinformationdata is recorded and stored in the Public Server (45 a-e) and is alsofed to the user. Feedback to the account holder advises the accountholder that a user has tried to improperly obtain information and hasfailed. As a further safeguard it is highly preferred that allcommunications, between all the servers and the users are highlyencrypted under both Route operations.

An example of misinformation being fed to a user who has enteredincorrect data is shown below:

-   Command: Randomly initiated to Update chat for the account    lmn@xyz.com with the abc@efg.com user in the Colleague's corner, as    follows:    -   March 12, 10:24 abc@efg.com: “Happy Birthday!!!”    -   March 12, 11:25 lmn@xyz.com: “Thank you”    -   March 12, 14:05 abc@efg.com: “Any big plans?”    -   March 12, 16:20 lmn@xyz.com: “Dinner with family.”

It is noted that an authorized user would recognize the incorrect natureof data obtained with a mis-keyed password, whereby a correct one willbe subsequently entered.

The data dissection servers 33 and 43, referred to above, containsoftware designed to dissect data as follows, assuming, for example,there are 5 Key Keeper Servers and 9 levels. Each server records andstores the data (known as the Registration Process) as illustratedbelow.

Key Keeper Servers: 1 2 3 4 5 Email: abc@def.com aeo bem cf @ dcPassword: glaceau118 ga lu a1 c1 e8 Key Phrase 1: Scooter se cr o o tKey Phrase 2: Tammy t a m m y Key Phrase 3: adam a d a m Key Phrase 4:Mr. Lee me re . Key Phrase 5: Dr. Gold do rl .d g Key Phrase 6: Dr.Stein dt re .i n s Key Phrase 7: Seth s e t h Key Phrase 8: Vegas v e ga s Key Phrase 9: Shop s h o p Note: Key Keeper 1 may or may notnecessarily record the 1st, 6th, 11^(th), etc., character. Thedissection pattern could be randomized.

The Key Keeper Servers analyze the stream data (Key Phrases only, withthe rest of the contents being passed to the Processor Server 36 (FIG.4A) or 46 (FIG. 4B), and idles until the result from the Key Keepers isreturned under Route 1 from the user, or misinformation software, underRoute 1, with tag Status. Results then follow as Valid or Invalid,depending on the Response, with the following exemplary scenarios:

Scenario 1: Key Keeper Servers: 1 2 3 4 5 Response Status Email:abc@def.com aeo bem cf @. dc 00000 Valid Password: glaceau118 ga lu alc1 e8 00000 Valid Key Phrase 3 adam a d a m 00000 Valid

Result: If all 15 fields are valid, then=valid

Scenario 2: Key Keeper Servers: 1 2 3 4 5 Response Status Email:abc@def.com aeo bem cf @. de 00000 Valid Password: glaeau118 ga lu a1 c1e8 00000 Valid Key Phrase 3: alec a l e c 0181181 Invalid.

Result: If one or more of the 15 are invalid, then=Invalid

In accordance with Route 1, data is then sent to the “Processor Server”(36), based on results. If the results are “Valid”, then the record ispurged of all its contents. If the results are “Invalid” then theinformation is merged with users info and sent to the “Public Servers”(35) and stored.

In accordance with Route 2, if the results are “Valid”, then themisinformation data is rejected from the Public Servers (45 a-e) andthen purged. Stored correct data (from the registered account holder) isretrieved from the Public Server and fed to the user. If the results are“Invalid”, then the misinformation data is accepted, and stored on thePublic Server and fed to the user.

The Verification Server 37 (FIG. 4A) or 47 (FIG. 4B) plays a role insecurity as well with respect to credential verification such as withsteps taken to verify email address and for example the following:

Cell Phone: Text with a verification number.

Land Line: Call made to the user with a verification number.

Fax Line: Send fax with a verification number.

Address: Mailing a postcard to the user with a verification number.

Bank Account: By transferring a few cents to the user account and askingfor the amount for verification.

Credit Cards: Making a charge for a few cents to the users account andasking for the amount for verification.

Businesses Credentials: Doctor, dentists, lenders, etc., are manuallyverified. The verification process is applied to security, such as if aUser “A” wants to see User “B” info, not only must user “A” have thecorrect “Key Phrase” but also must have identical or better verified“Credentials” at the time of access.

3. The Efficiency Factor: To facilitate shopping for the householditems, the list can be compiled by utilizing a scanner affixed onkitchen or restaurant appliances or office supply storage doors. Emptyconsumed containers are scanned before disposal. Details and configuredresults of the scanning are then directed to be downloaded, asappropriate lists, in an appropriate level.

FIG. 5 depicts an embodiment which utilizes accessed corners or levelsas a personal vault for storage of information for sharing or personaluse (as described with Levels 8 and 9, above). Consumers can compile alist of basic items, or create a shopping list where items that arealready consumed are scanned onto an on-board chip 55 a (FIG. 5) of anappliance storage door 51 a of a system 50, including a refrigerator 51.The list is transferred to the vault level, i.e., “SmartFridge” and/orentered into a “Smart Trash Bin” 52. The list is uploaded via WiFi orLAN to the Cloud 53. The list can also be processed for lowest local andonline prices, available coupons, closest market, etc. The list may bedownloaded onto a smart phone 60, or smart shopping cart 70 (in order tonavigate the shortest route to the market). The Smart Fridge or SmartTrash Bin are basic appliances equipped with Laser Scanners 55 a and 55b (built in (or retrofitted with the laser scanners) to their doors withthe scanner being similar to available scanners. The consumer scansitems as empty containers of food are being disposed at the Smart Fridgeor disposed at the Trash Bin, before disposal. As RFID technology isbeing implemented and improved, scanning can be realized with RFIDtechnology and communication. As a less costly method, a camera could beutilized, instead of scanner, for a similar scanning function.Consumer's usage may also be monitored, based on frequency of itemsbeing scanned and entered as being purchased to provide a simpleforecast.

A forecast then generates a recommendation list for the consumer at thetime of shopping. It also may be programmed to suggest items that arenot on the list but which may complement items that are on the list, orsuggest items that are on sale (i.e., with indications of lowest priceitems within a 20 mile radius). As an option, the Smart Fridge consolealso can be utilized for checking off items from the list, as newlypurchased items are being placed into Storage. Suggested items mayinclude one or more of: search coupons, items on sale, closes shop,forecast, recommend complementary items, recommend ways of acquiring:quickest route, cheapest route, greenest route, local producers,healthiest, supplier ratings, or hybrid.

Also, in accordance with a similar embodiment, a database can beutilized for accumulating or generating lists such as the scope of workfor suppliers, contractors or service/care providers for a biddingprocess.

4. The Enhanced User Experience Factor: In another embodiment of theinvention, a speaking user interface is used to enhance the userexperience. The user interface provides users with the option oflistening to chats, email or any data in text format. The audio issynthesized using software which mimics the voice of the individual whohas sent the message. For the software to achieve this, first the usersending the message must prepare the system to familiarize the softwarewith user's voice tone and accent. Secondly, the software is configuredto analyze the user's vocals against standard off the shelf speechsoftware using the off the shelf software as a base line and makingcorrection adjustments to the voice, according to the databaseaccumulated from user input.

5. The Check and Balance Factor: If a″ user A″ want to see “User B”info, not only must he or she have the correct “Key Phrase” but alsomust have identical or better “Credentials” verified, at the time ofaccess.

6. The Dashboard Factor: In yet another embodiment of the invention, theuser's activity and tracing function can embody functions as follows:

a. In one embodiment, a database is created for each user as theinvitations are sent out to new users (invitees) and invitations areaccepted by completing the registration. The list grows as new inviteesaccept, with the invitations having links to the Registration Page, viaan inviter's page site. Depending on number of invitees, each user couldreceive different amount of incentive.

b. Also, in an embodiment, a database is created for each user for atotal number of ads viewed, hovered over, or clicked a link to access anadvertiser's site. Each could provide users different type or amount ofincentive.

c. A further enhancement of the system of the present inventioncomprises “Viewer Advertisement Exposure” wherein there is a countingand totaling, related to a Holder's account, of how many ads the accountholder has viewed, hovered over, or clicked a link to access anadvertiser's site.

d. As part of this Dashboard Factor, when a user logs into an account,and starts viewing the contents, the user interface begins adding thenumber of ads viewed, hovered over and links clicked on, during the timethe account holder was logged on. This information is directly stored onthe account holder's database with the account holder being able to viewthe totals on each item, at a “Personal Corner” in a summery format. Thesummary can be drilled down, so the account holder can view them indifferent formats such as on a daily, weekly, monthly or annual basis.

e. An advertiser can select, from the user's dashboard, whichdemographic it wants to target. After publication, the advertisers canview, from their account, how many ads were inserted or opened, hoveredover, and links clicked by the users, in a summary format or drill downto activity by data range. A general demographic data of the user isalso supplied to the advertiser to determine whether the advertiserwants to keep its campaign as is, or to make improvements by eitherchanging the ad itself or its targeted audience. Within the ad, theusers are asked whether if they are interested to be contacted by theadvertiser? If yes, then the user's contact info is also provided to anadvertiser's dashboard.

f. As users input personal content, the content has relevant informationwhich is useful to the advertisers. Such information as gender, race,age, current location, addresses, medical data, financial data,employment data, scope of work, shopping list, service/care list andetc. The information gathered on the users can be utilized by theadvertisers to place their ads in front of select audience, withoutrevealing the identity of the viewer to the advertiser, unlesspermission is granted. The ad contents is merged with the user content(from independent servers) and fed the viewer. The viewer, viewing thecontents of the users could be looking at correct data or incorrect datadepending which key phrase has been entered, regardless of which, the adcontent is correct content. At no time is the user content or the viewercontent stored on our servers. The Advertising Server does store adcontent, ad count (# of views by what type of viewer: gender, age,location, etc., i.e., 50 men, 60 women, 10 in NY, 50 LA, 8 ages 20-30,100 ages 30-40, etc.).

Although the present invention has been described in relation toparticular embodiments thereof, many other variations and modificationsand other uses will become apparent to those skilled in the art. It ispreferred, therefore, that the present invention be limited not by thespecific disclosure herein, but only by the appended claims.

What is claimed is:
 1. An online, interactive system configured to allowa plurality of users to upload content and selectively share theircontent online and interactively with other users, the systemcomprising: a data center including a user interface configured to allowthe plurality of users to register with the system; a first subsystemmodule configured to enable users to assign to their contents specificcategories which designate different levels of user interaction andaccessibility; and a second subsystem module that is configured to allowgenerating key phrases, with each key phrase corresponding andconfigured to activate a corresponding category of information and somake it available to other users, as determined by the user who hascreated his or her data categories.
 2. The system of claim 1, whereinthe categories are keyed to detect levels of accessibility, which varyfrom a lowest accessibility level to a highest accessibility level andthe first subsystem module is configured such that the grant ofaccessibility at given level includes accessibility to all of the lowerlevels of accessibility.
 3. The system of claim 2, wherein theaccessibility levels include at least two or more accessibility levelsincluding a Friends category; a Family category; a Colleagues category;a Profession category; a Medical category; a Dental category; a Lenderscategory; an E-mail and Personal Data category; and an Shopping Listcategory.
 4. The system of claim 1, wherein the first subsystem moduleis configured to allow individual users to choose and customize thenumber of categories applicable to their content.
 5. The system of claim1, including a credentials subsystem module configured to require acredential level that is identical or higher than one that is assignedto a specific category of data, so that access to a specific category ofcontent requires both a correct key phrase and an identical or bettercredential to be verified at a time of access of the data.
 6. The systemof claim 1, including a misinformation subsystem module, configured toprovide to a user, who attempts to access a category of data with anincorrect key phrase, misinformation data which is different from theuser content that was attempted to be accessed.
 7. The system of claim1, wherein the user data includes one or more of photos, chatinformation, contact information and personal data.
 8. An online,interactive system configured to allow a plurality of users to uploadcontent and selectively share their content online, interactively, withother users, the system comprising: a data center including a userinterface configured to allow the plurality of users to register withthe system; a data dissection subsystem module configured to receiveinformation from users and to dissect the information into a pluralityof data portions; a plurality of auxiliary data storage systems that areindependent from another; and a data communication system configured toreceive the dissected data portions and to transmit for storage eachdissection portion into different ones of said auxiliary data storagesystems, whereby a user's content is rendered unavailable to any one toinspect, analyze or study it in its entirety.
 9. The system of claim 8,wherein the data dissection subsystem module is operable by a pluralityof key keeper servers.
 10. The system of claim 9, wherein the datadissection subsystem module also comprises a plurality of corners. 11.The system of claim 8, wherein the key keeper servers are configured toanalyze data streams associated with key phrases and to pass non-keyphrase user content as valid or invalid content, depending on theanalysis of the key keepers.
 12. The system of claim 8, including asubsystem module configured to enable users to assign to their contentsspecific categories which designate different levels of user interactionand accessibility.
 13. The system of claim 1, including a thirdsubsystem module configured to allow users an option of listening tochats, e-mail or any data and text format.
 14. The system of claim 13,including a voice synthesizing subsystem module which is configured tomimic actual author voices of messages or content.
 15. The system ofclaim 1, including a database configured to track invitations sent outto new users and to track accepted invitations.
 16. The system of claim1, including a further subsystem module configured to keep track of howmany advertisements and which advertisements have been viewed, hoveredover, and/or clicked upon by users.
 17. The system of claim 1, includinga subsystem module configured to enable an advertiser to utilize a userdashboard to obtain information as to how many ads were inserted,hovered over, or links clicked by different users, in summary and/ordrill down to activity formats.
 18. The system of claim 1, wherein thefirst subsystem module is also configured to provide a category thatproduces a work/shopping list and including at least one scanner deviceat a user's site which is in communication with the system andconfigured to provide information about the usage of items at a user'slocation, the first subsystem being configured to produce lists of itemsthat have been consumed and/or items that need to be purchased.
 19. Thesystem of claim 18, wherein the system is configured to upload ashopping list to a cloud for downloading to an electronic mobile device.20. An inventory and shopping system operable in conjunction with anonline, interactive system configured to allow a plurality of users toupload content and selectively share their content online interactivelywith other users, the inventory and shopping system comprising: one ormore scanning devices; and software modules operable with the onlineinteractive system and configured to track items that have been consumedor disposed of and for generating a list of items that need to berequired.
 21. The inventory and shopping system of claim 21, wherein thescanning device is implemented in the form of one or more of a laserscanner, a camera, and an RFID device.