Apparatus And Method For Generating Customizable Software Based Networking Platforms

ABSTRACT

The present invention is directed to a system and apparatus for generating a computer network for accessing and transmitting data of and between multiple users. In a particular implementation, the system comprises a computer network generator having at least one processor and configured by code executing therein to generate an updatable core network package and select from an array of network feature modules, a plurality of ancillary features and customizations for incorporation into the computer network.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/430,812 filed on Jun. 4, 2019, the contents of which are incorporatedherein by reference in their entirety.

This application is also a continuation of U.S. patent application Ser.No. 15/001,812 filed on Jan. 20, 2016, the contents of which areincorporated herein by reference in their entirety.

This application claims the benefit under 35 U.S.C. § 119(e) of U.S.Provisional Patent Application Ser. No. 62/248,038, filed Oct. 29, 2015,the contents of which are incorporated herein by reference in theirentirety.

FIELD OF THE INVENTION

The present invention describes systems and methods for generatingnative language or symbols based network infrastructure using a coreapplication and integratable components.

BACKGROUND

Just a few years ago, the idea of an online social network wasrevolutionary. While the Internet has always provided a way for peopleto make connections with each other, social-networking sites made iteasier than ever before to find old friends and make new ones. Today,its rare to find someone who hasn't heard of names of various popularsocial networks.

A major challenge exists in that although many use these social networksand applications, the majority users are young (e.g. under 60 yearsold). Technology has built a generation gap between younger, intuitiveusers of social networks and older users that find access complex andnon-intuitive. One reason for the apparent non-intuitive nature oftechnology in general and social network platforms in specific is thatolder users (e.g. above 60) find the syntax, workflow and language usedto convey functionality complex and hard to understand. The second majorreason is that most of the social networking sites are created inEnglish. While there are many examples of language localization insoftware platforms, very few are designed with non-native Englishspeakers in mind.

What the present art lacks is a mechanism for generating and deploying asocial network that has native language functionality or symbolsincorporated within the fundamental architecture of the system so as tonot suffer from errors in conversion from one language to other like(e.g. improper idioms and phrases). Often when existing social networkinterfaces are localized to a different language, the process often usesidioms or language that, while grammatically correct, lacks the subtitledistinctions inherent in local, regional or ethnic dialects and patois.As a result, even when a user interface is localized to a “native’language, many potential users, such as older users, will still havetrouble appreciating the functions and actions accessible to them.Moreover, what is needed is a system and apparatus for controlling thesocial network using speech, symbols and iconography based userinterface elements such that a reliance on pure text input is minimized.

Therefore, what is needed in the art is a system and apparatus thatallows users with little technical skill to create and deploy nativelanguage and icongraphically based social networks. Furthermore, what isneeded in the art is a system and method of allowing users to controland utilize the functionality of the native language social networkusing native and instinctive language and communication strategies.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other features of the present invention will be morereadily apparent from the following detailed description and drawings ofone or more exemplary embodiments of the invention in which:

FIG. 1 is an overview block diagram detailing the arrangement ofelements of the system described herein in accordance with oneembodiment of the invention.

FIG. 2 is a flow diagram detailing the steps of an embodiment of themethod as described herein.

FIG. 3 is a block diagram of an example system in accordance with anembodiment of the present invention.

SUMMARY

Provided herein is a network package that is specifically tailored for agroup of users with particular requirements. The network package isdeployed to the specific group of users. In accordance with one aspectthat can be implemented in one or more embodiments, the presentinvention is directed to a system and apparatus for generating acomputer network for accessing and transmitting data of and betweenmultiple users. In particular, the system comprises a computer networkgenerator having at least one processor and configured by code executingtherein to generate an updatable core network package and first modulearray of network feature modules from a module repository wherein eachelement of the first array is a reference to one or more modules. Theprocessor is further configured for receiving an initiating request togenerate a new social network application sent by a remote user computerdevice, wherein the request includes initialization data relating to theestimated size of the user base of the computer network and the estimatetechnical ability of the estimated user base; and transmitting, inresponse to an initiating user request, at least one visual indicationreferencing each element in the first array to the remote user computingdevice; selecting, using the remote user computing device, at least oneof the visual indications corresponding to a unique element in the firstarray modules. The configured processor also transmits to the computernetwork generator at least a reference to each selected module andassociates a core network application with each selected module. Afinalized network application is generated by the processor thatincludes reference to each of the selected modules and a user interfaceapplication customized to the technical ability of the estimated userbase. The generated application is deployed to a remote hostingcomputer; and a link is provided that allows users to access the userinterface application.

Another feature of the present invention is directed to an apparatus andsystem for creating and utilizing an adaptive user interface. The systemcomprises a user interface generator having at least one processor andconfigured by code executing therein to generate a plurality ofadaptable user interface elements; the adaptable user interface elementseach having a plurality of access levels. Each access level isconfigured to give a user an increasing level of control over thefunctionality controlled by the user interface. The access level of theadaptable user interface is set to an initial level by the userinterface generator. A usage monitor monitors the use of the userinterface components by a specific user and implements a change in theaccess level of the user interface element in response to user feedback.

These and other aspects, features and advantages of the presentinvention can be further appreciated from the following discussion ofparticular embodiments thereof.

DETAILED DESCRIPTION OF THE INVENTION

By way of overview and introduction, the present invention concerns anapparatus, system and method for creating, customizing and developing alanguage-specific, feature-selected social network software applicationand/or website and ancillary client device access applications.

Specifically, the present apparatus, system and method are directed togenerating and deploying an online networking service, platform, orwebsite which is focused on allowing user-to-user connectivity,community interaction and general informational submission. The presentinvention provides a system that allows users to easily generatesoftware based networking services (e.g. a social network) for use byInternet accessible client devices in a specified language and havingfeatures that are relevant and useful for the community that isdeploying the network. For example, the present invention allows for thegeneration of a customized social network in a users native language orsymbols, and provides features that allow for voice control services,native language user interface elements, telephone and location basedservices through a modular architecture.

5.1 System Overview

Turning to FIG. 1, a block diagram of the overall system 100 isprovided. As shown, a network generator 102 has connections to a modulerepository 110, a remote computing device 104 and a social networkstorage and hosting apparatus 106. In one embodiment, the connectionsbetween the different devices are wired or wireless connectionsimplemented as a local area network (LAN). In an alternative embodiment,the connections between the various apparatus shown include Internetnetwork connections and can include various routing and other networkhardware, including but not limited to exchanges, servers, routers, hubsand other network infrastructure necessary or useful for allowingvarious devices to connect to the one another remotely.

For example, the remote user computing device 104, in one embodiment isconnected to the network generator 102 via the Internet or anothernetwork that allows for remote access to the computing resources of thenetwork generator 102. Likewise, in this configuration, the modulerepository 110 and the social network storage and hosting apparatus 106are remotely accessible to the network generator 102 and remotecomputing device 104.

In a particular arrangement of elements provided, the network generator102 is a computer equipped with a one or more processors, RAM and ROMmemory, network interface adaptors and one or more input or outputdevices. In a further embodiment, the network generator 104 is acomputer server or collection of computer servers, each serverconfigured to store, access, process, distribute or transmit databetween one another and other computers or devices accessible orconnectable therewith. In still a further embodiment, the networkgenerator 102 is a hosted server, virtual machine, or other collectionof software modules or programs that are interrelated and hosted in aremote accessible storage device (e.g. cloud storage and hostingimplementation) that allows for dynamically allocated additionalprocessors, hardware or other resources on an “as-need” or elastic needbasis. In a further embodiment, elastic load balancing algorithms areutilized to ensure that sufficient back-end capacity is present toenable the system to handle multiple concurrent connections andrequests.

In one embodiment, the network generator 102 is configured to generate,using code executing in the processor(s) a core social networkapplication that can be deployed alone or in conjunction with additionalfeatures or modules that enhance its functionality.

In order to obtain a list of available additional feature modules, thenetwork generator 102 establishes a connection with a module repository110. The module repository 110 is configured to store a plurality ofcomponents that can be added to the core social network application. Asdescribed in more detail below, the components stored in the modulerepository provide additional features and functionality to the coresocial network application generated by the network generator 102. Byway of non-limiting examples, the components stored by the modulerepository include instant text messages, voice calling facilities,recorded voice delivery functions, call recording features, conferencecalling features, presentation features, voice modulated self-portrait,symbols and cartoon character sending features, sticker attachmentfeatures, regional based multilingual text generation features,multilingual voice to text conversion features, map and location finderfeatures including regional language recorded speech guidelines andinstructions, known online and last seen summary data features, recordedremainder alert system features, home safety encrypted alert systemfunctionality, mobile security platform features, photo/status displaytimeline features, GIF based photos for profile and wall, like, comment,sharing with self animated character features, voice commenting featureon status or photos features, and official pages features.

Those possessing an ordinary level of skill in the art will appreciatethat in one embodiment the module repository 110 is a database, such asa NoSQL, SQL, or other flat, relational, object, or index type ofdatabase configured to store and provide access to data. Alternatively,the module repository 110 is a file or data storage device, such as aremote hard drive, or storage apparatus. Regardless of the storage ordatabase type, the module repository 110 also includes any necessaryprocessors, components, control systems, network interfaces or otherancillary software or hardware necessary to transmit data between themodule repository 110 and the network generator 102

The particular modules that are accessed and incorporated into the coresocial network application are selected by a user using a remote usercomputing device 104. In one embodiment, the remote user computingdevice is a standalone, or desktop, computer configured to directly, orvia the Internet, access and communicate data with the network generator102. In a particular embodiment, the remote user computing device 104 isa portable computing device such as an Apple Ipad/Iphone® or Android®device or other commercially available mobile electronic device. Inother embodiments, the remote user computer device 104 includes customor nonstandard hardware configurations. For instance, the remote usercomputer device 104 is a microcomputer or collection of micro-computingelements, computer-on-chip, prototyping devices or “hobby” computingelements.

The remote user computing device 104 is configured, through softwareexecuting in one or more processors, to enable the user to initiate anew network generation request. In one arrangement this networkgeneration request includes information about the size, language,technical sophistication, and preferred access devices of the intendeduser base. The remote user computing device is further configured topermit the user to select modules for incorporation into the socialnetwork generated by the network generator 102 and control theinstallation and deployment of the social network once the relevantfeatures have been incorporated.

The social network storage and hosting device 106 is configured topermit public or restricted access to the generated social network. Thesocial network storage and hosting apparatus 106, in one embodiment, isa database and web hosting server configured to accept connections fromclient devices 108 and transmit data relating to the computer network,such as text data and images. In an alternative arrangement the computernetwork storage and hosting apparatus is a virtual machine, a collectionof virtual machines, or other hosting solutions configurable to allowclient devices 108 to communicate with one another and access datastored by the computer network regarding user profiles and otherinformation.

5.2 Generating A Customized Social Network

FIG. 2 details particular work-flows in accordance with certain aspectsof the invention. The steps shown in FIG. 2 can be carried out by codeexecuting within the memory of one or more processors 102 found withinthe various hardware devices communicating with one another. The codemay be organized into one or more modules, or can comprise firmware orhard-wired circuitry as shown in FIG. 3. For simplicity of discussion,the code referenced in FIG. 3 is described in the form of modules thatare executed within a processor 105 of the network generation system 102and which are each organized to configure the processor 105 to performspecific functions. The block diagram of FIG. 3 provides exemplarydescriptions of the modules that cooperate with a memory and processor105 of the network generator 102 and cooperate to carry out the stepsoutlined in FIG. 2. Those possessing an ordinary level of skill in theart will appreciate that any processor of the network generator, remoteuser computing device, module repository, and social network storage andhosting devices can comprise a plurality of cores or discreteprocessors, each with a respective memory, which collectively implementthe functionality described below, together with associatedcommunication of data there between.

With reference now to FIGS. 2 and 3, the customized network (such as asocial network) is generated by initiating a request to generate a newsocial network using the initialization module 301 which comprises codeexecuting in the processor 107 of the remote user computing device.

The initialization module configures the processor 107 to send a requestto the social network generator according to step 201. In one particularembodiment, the initialization module 301 configures the processor 107to create a data object that includes basic or standard informationregarding the network to be generated. For example, a user selects ananticipated size of the user base of the intended network, the primaryaccess and connectivity details (e.g. mobile device, desktop, dial-up,broadband etc.) as well as the skill and educational level of theanticipated user base (novice computer users, literacy level). Theinitialization module 301 packages this data into a data object, such asa JSON file, and transmits the data object to the network generator 102.

Upon receipt of the data object containing the basic features of thenetwork as shown in step 202, the processor 105 is configured by therequest module 302 executing therein, to extract the information fromthe data object and build a profile of the network to be generated.

The processor 105 of the network generator is configured, through thetransmission module 304 to access the module repository and obtain alist of modules for potential inclusion into the social network, as instep 203. As will be discussed below, each of the modules in the modulerepository are configured to augment or enhance the features of thenetwork.

The list of modules obtained in step 203, are transmitted to the remoteuser computing device, such as by a processor configured by thetransmission module 304. The user selects from the list of modules,optionally presented as a collection of icons or other symbolic orpictographic depictions, the desired modules to incorporate into thesocial network as in step 205 and implemented by selection module 305.

Upon receiving the selection of modules for inclusion into the socialnetwork, as in step 206, the processor of the network generator 102 isconfigured by the generation module 306 to generate the network based onthe profile and the selected modules, as in step 207.

Those skilled in the art will appreciate that the code automaticallygenerated by the generation module can be in object, source or machinecode. For example, the generated social network can be written or codedin any available or suitable programming language or environments, suchas but not limited to, Java, Javascript, Node.js, C, C #, C++,Objective-C, Swift, Clojure, Swift, Docker, Python, PHP, Lua, R, F #,Ruby, Perl, Lisp, Erlang or any dialects etc. As one example, a socialnetwork application generated by the network generator 102 and themodules stored in the module repository 110 are written in Erlang, whichis a language built for writing scalable applications that are designedto withstand errors. It will be appreciated that Erlang uses abstractionconventions called the Actor model to implement concurrency principles.Instead of the more traditional shared memory approach, actorscommunicate by sending each other message. Actors unlike processing orcommunication threads are designed to be lightweight. Actors could be onthe same machine or on different machines and the message passingabstractions works for both. Thus, the generated social network can bedeployed to highly parallel computing machines consisting of hundreds orthousands of independent microprocessors, each with its own local memoryand communications processor, communicating via a high-performancecommunications network. In a further embodiment, the social network iscreated using Erlang with OTP.A to improve horizontal scalability.

In one embodiment of the generation module 306, a properly configuredprocessor implements a collection of code libraries representing thedifferent modules listed in the module repository. The collected codelibraries are referenced by the core social network application and theentire code base is packaged for installation or deployment as anapplication according to the deployment step 208.

Alternatively, the generation step 207 is implemented as providing thecore social network application with API access (application programminginterfaces) to each of the modules. In this arrangement, each of themodules operates as a separate and independently accessible coderepository that is accessible by users of the social network, but withfunctionality provided by the modules not directly incorporated into thecore application that is deployed.

In one embodiment, the core social network application includes aconfigured server with a accessible API, a database, file storage and auser client application. The file storage is configured to store filessuch as images, videos and documents and The client application can beeither a mobile or desktop web application or a native app that is builtusing the requisite code and libraries necessary to have the client beimplemented on a particular hardware platform. The API allows access tothe server (and each of the selected program features), database andfile storage directly from a customized client developed by thirdparties. The API further includes connections to a secondary server notaccessible to the client but which handles encryption of financialtransactions and communications.

Upon generation of the custom network application, the application isinstalled in a suitable hosting or server, such as Amazon EC3 or othercloud storage and hosting configuration as in step 208. In oneembodiment, the deployment module 308 automatically selects a preferredhosting environment based on the profile data provided during theinitialization step 201. For example, the deployment module 308 selectsa particular hosting configuration based on the anticipated number ofusers, a budget for the hosting the network and other considerations.Once the application (such as application module 312) is deployed at thehosting location, a domain or url is generated or associated with it andpermits client devices 108 to access the network via a communicationsnetwork.

In a further embodiment, the generation module 108 also generates aclient device application using a client user interface sub-module thatconfigures code executing in the processor of the network generator togenerate a client device application. The generated client deviceapplication allows a client device to connect to the social networkwithout using a browser or other generic software platforms. In aparticular embodiment, the client device application is a HTML5application that replicates or provides access to all the features auser of the generated network would have access to using a browser. Inanother embodiment, the client device application is generated in acompatible format for native execution on an IOS, Android, Amazon,Windows, OSX, Linux or other devices.

The user interface of the social network, either accessed through a URLor directly through a native client device application is customized toboth the language and the anticipated user knowledge level provided inthe initial request to generate the social network (as in step 201). Theuser interface is thus configured to provide a social network that iscustomized to a specific population and allows for greater socialinteraction among the users.

5.3 Adaptive Interface

Based on the size, language, technical sophistication, and preferredaccess devices of the intended user base provided in the initializationprocess, the user interface module implements an adaptive user interfaceas in step 210. As a non-limiting embodiment, where the initial requestindicates that the anticipated users of the social network will have lowtechnical experience, the user interface implements an adaptive userinterface to customize the provided access to a given proficiency level.Here, the user interface disables options or other features of thesocial network that more experienced users might find useful. Forexample, settings such as conversion protocols and file formats aremasked or removed and default or common settings are used without askingfor user input. Likewise, text or commonly used icons are replaced withpictograms or other information identifiers that provide context for thefunction of the various features. For instance, icons are replaced withthe text equivalent and vice versa. In these configurations, the userinterface or layout is expanded or modified to incorporate text insteadof icons. The social network is equipped with machine learningalgorithms that review user actions and determine when a user hassufficient comfort with the functionality of the social network toincrease access to features, such as sub-menus and additionalcustomizations. In this way users with low technological literacy can beguided to more specialized functions without overwhelming the user atfirst use.

In a further embodiment the generated network application includes acustomized, user interface and selected content layout. For example,when a user accesses the social network using a client device, aparticular content layout is provided. However, upon in the event thatthe adaptive interface changes text to icons, or adds additionalfeatures or functionality, the content layout of the network interfacefor that user is altered. Thus, the system provides allows for aregeneration or rearrangement of a particular user's user interface toincorporate the changes resulting the adaptive interface. For instance,the user interface presented to the user could be a simple collection oflarge text links indicating basic functionality. However, uponadaptation, the text is replaced with icons and additional, higher orderfunctionality. Thus, the content found in the user's user interface canchange depending on their technical proficiency level.

In a further embodiment, the customized layout generated by the userinterface module includes specific idiomatic phrases or symbols that arerelevant to the user base. For example, where general localizationschemes would replace an English word with a rough approximation of thesame word in a target language, here the user interface module looks up(in a database or lookup table) a user supplied table that maps specificEnglish (or another source development language) to a specific word,phrase, symbol, icon or other contextual identifier that has anappropriate meaning in the target language. In this way, functionalityis presented using idiomatic phrases or language having closest orclearest intended meaning. In a further embodiment the look up table isupdatable by the user community to as to provide constant refinement ofthe replacement text, symbols or icons used with the network.

5.4 Modules for Inclusion into the Generated Network

As provided, the social network is customizable to incorporate aplurality of additional features and functions beyond the core socialnetworking functions of posting, sharing and commenting on user content.In one particular embodiment, one or more of the following features areimplemented by accessible code modules or APIs defined in the modulerepository 110 and accessible to the network generator for inclusion inthe core social network package.

5.4.1 Instant Text Messages

The system so described is configured to integrate instant textmessaging functionality into the social network package. Text messagefunctionality allows the user to send instant messages with unlimitedcharacter, text, numbers, special characters, clipart and variousiconographic symbols given specific libraries accessible by the user.The text message functionality can also include encryption support toprotect messages from external hacking or access. In a non-limitingexample of such message protection, when a text message is sent from oneuser to another user, the message is stored in a message database (suchas one generated by the social network storage and hosting device) untilthe other user receives it. The stored text messages are thenautomatically deleted from the database. In a further embodiment, usermessage data is stored in the database for a set time period, such thatafter a maximum number of days the message is deleted.

Those possessing an ordinary level of skill in the art will appreciateother messaging applications rarely work on a peer to peer basis. Incontrast, the text message module incorporated into the text module doesnot cause a processor to open a connection (from a user device) torecipient's device. Instead the user's device connects to the socialnetwork storage and hosting device 106. The text messaging applicationincludes sub-modules that configure the processor to use TCP protocol orHTTP or XMPP protocols to communicate users' messages to the socialnetwork storage and hosting device (herein the SNSH 106) 106. The SNSH106 is configured to work in concert with the text messaging module todispatch messages stored in the SNSH 106 to another user.

In the event that there is an active connection between the recipientand the SNSH 106 at the time a message is sent, then the activeconnection will enable real or near real time communication. However, inthe event that the recipient is not actively connected to the SNSH 106(“offline”), then the text message module configures the SNSH 106 togenerate a push notification via an alternative communication channel.Each user/device is represented as an actor.

This actor is responsible for handling the inbox of the user, how itgets serialized to storage, the messages that the user sends and themessages that the user receives one after another.

By way of non-limiting example, the text messaging module confers on theusers of the generated social network the ability for User “A” tomessage User “B”. User “A”'s computing device establishes a connectionto the SNSH 106 and it is established that this connection is definitelyfrom User “A”'s mobile computing device, such as though the use of aplurality of submodules configured to establish connections andauthenticate users. User “A” sends via TCP protocol the followingmessage: “For User B Can you come home this evening?” The SNSH 106deserializes this message and delivers this message to the actor calledUser “A”.

User “A” has the option of serializing this message and storing it in astorage location accessible by the SNSH 106. Such as in a “User “A”'sSent Messages”, storage location. It should be appreciated that suchstorage is stored on a replicated file system to prevent data loss dueto unpredictable events. User “A” the actor then decides to forward thismessage to User “B” the actor by passing it a message “Msg1 from User“A”: “Can you come home this evening?”.

User “A” can retry with exponential back-off till User “B” the actoracknowledges receiving the message. User “B” the actor eventuallyreceives the message and decides to store this message in a file called“User “B”'s Inbox”. Once it has stored this message, User “B” actor willacknowledge receiving the message by sending User “A” actor a message ofits own saying “I received Message 1”. User “A” actor can now stop it'sretry efforts. User “B” actor then checks to see if User “B”'s phone hasan active connection to the server. Afterwards, User “B” is configuredto stream this message to the device via TCP.

User “B” sees this message and replies with “For User “A”: “Sure I willcome this evening.” This message is now received by User “B” actor asand then the same procedures follow back and forth.

5.4.2 Voice Calling Functionality

The system so described is additionally configured through the use ofoptional modules to integrate voice calling functionality into thenetwork. In one embodiment, the voice calling functionality isimplemented as one or more modules that configure the processor of theSNSH 106 and/or client device 108 to implement voice callingfunctionality using a XMPP (Extensible Messaging and Presence Protocol)protocol. Using such protocol VOIP (Voice over Internet Protocol)functionality converts analog voice recorded by a microphone to digitalsignals (bits). The bits are compressed in specific format fortransmission. The voice packets are inserted as data packets usingreal-time protocols like RTP over UDP over IP. Furthermore, the voicemodule is configured to implement a signaling protocol to call usersusing a protocol like ITU-T H323. At the receiver end of the voicecommunication, the module is configured to disassemble the encodedpackets, extract data in digital format, then convert the digital signalto analog voice signals and send them to an audio output device used bythe recipient. In a further embodiment, the device is a mobiletelephone. In yet a further embodiment, the transfer of voice data froma caller to a receiver is implemented in real or near-real time to avoiddelays.

It should be understood that current technology allows for theconversion of audio into digital with a 16 bit band of 22050 Hz (forsampling it you need a frequency of 44100 Hz according to the NyquistPrinciple) obtaining a throughput of 2 bytes*44100 (samples per second)or 88200 Bytes/s, 176.4 Kbytes/s for stereo stream. However, the VoIPimplemented by the voice calling modules does not require suchthroughput. The current implementation only requires 176 kBytes/s tosend voice packet. Furthermore, using pulse code modulation (PCM),Standard ITU-T G.711 with a Voice bandwidth of 4 kHz, the module of thepresent invention is configured with a sampling bandwidth of 8 kHz (forNyquist). The voice calling module represents each sample with 8 bit(having like 256 possible values). Thus, the throughput is 8000 Hz*8 bitor 64 kbit/s, is typical for a digital phone line.

Additionally, in real time applications, ADPCM, Adaptive differentialPCM, Standard ITU-T G.726 are used. Thus, the voice calling moduleallows for the conversion of only the difference between the actual andthe previous voice packet requiring 32 kbps. LD-CELP, Standard ITU-TG.728, CS-ACELP, Standard ITU-T G.729 and G.729a, MP-MLQ, Standard ITU-TG.723.1, 6.3 kbps, Truespeech, ACELP, Standard ITU-T G.723.1, 5.3 kbps,Truespeech and LPC-10, able to reach 2.5 kbps. These protocols are, inone embodiment, incorporated and used by the voice module because theycan guarantee a very low minimal band using source coding; also G.723.1codecs have a very high MOS (Mean Opinion Score, used to measure voicefidelity) but performance required by them is roughly up to 26 MIPS.

In a further embodiment, RTP Real Time Transport Protocol is used toencapsulate the voice data into TCP/IP stack such that VoIP data packetsare encapsulated into RTP which inturn is encapsulated in UDP, IPpackets and then I, II layers

Alternatively, the voice calling module uses RSVP, which manages Qualityof Service (QoS). RSVP is a signaling protocol that requests a certainamount of bandwidth and latency in every network hop that supports it.Quality of Service (QoS) as VoIP applications require a real-time datastreaming because it allows for a highly interactive data voiceexchange.

The voice module can further incorporate TOS fields in IP protocol (IPheader) to describe type of service, such that high values indicate lowurgency while lower values indicate increased urgency. CongestionAvoidance, like RED (Random Early Detection) is also implemented by oneor more sub-modules of the voice calling module.

The voice module utilizes, in one embodiment, h323 as a signalingprotocol that allows a variety of elements talking one another includingbut not limited to Terminals, Gatekeepers, Address translation service,Admission control. h323 not only allows VoIP but also allows video anddata communications. h323 can carry audio codecs G.711, G.722, G.723,G.728 and G.729 while for video it supports h261 and h263.

Thus, though the protocols and implementations described, the voicecalling module provides the social network with enhanced communicationfunctionality.

5.4.3 Recorded Voice and Video Functionality

The system so described includes a library for integrating datarecording functionality into the social network. In one embodiment, thedata recording functionality is implemented as one or more modules thatconfigure one or more processor of the SNSH 106 or client device 108 toreceive streaming voice data or a recorded audio file from a clientdevice. In one embodiment, the voice recording is provided in.wav/mp3/mp4 formats with a maximum recording time of 15 minutes.

In a further arrangement, the voice recording module includes asub-module for providing auto clean up functionality in which messagesor audio recordings are deleted automatically from a user's profileaccounts stored on the SNSH 106 or client device in the event of atriggering event.

In a further embodiment, the data recording module is configured toprovide the deployed application or the client device with a videorecording. In a particular embodiment, the video is recorded in MP4format and is changed to 3GP format in order to allow for more efficienttransmission of the video data. In further embodiments, the duration orquality of the video is determined by the user, or by the capabilitiesand hardware limitations of the client device or the deployed socialnetwork application.

5.4.4 Call Recording Feature

The system so described is additionally configured to integrate callrecording and conference call functionality into the social network. Inone embodiment, the call recording and conference call functionality isimplemented as one or more modules that configure one or more processorof the SNSH 106 or client device to enable users to record all incomingand outgoing calls, and make copies thereof. In a particular embodiment,the call recording and conference call module records all of the voicecalls which are made from a specific client device (i.e, a Smartphone).The collection of call data is then organized in a time based order andis associated with call metadata (e.g. time of call, duration of call,even other person's location in latitude, longitude and altitude (X,Y,Z)if the other user allows the access to this feature on the other user'sphone through the application) and provided to the user for searchingand review.

5.4.5 Video and Audio Conference Call and Recording Functionality

Additionally, the generated network is extendable to integrate callrecording and conference call functionality. In one embodiment, the callrecording and conference call functionality is implemented as one ormore modules that configure one or more processor of the SNSH 106 orclient device 108 to enable users to set-up, maintain and record thecommunications exchanged during a conference call or a teleconference.By recording these calls, a teleconference can serve two purposes, bothas a real-time communication tool as well as an archival record of suchevents as press conferences, corporate earnings reports, stockholdermeetings, legal depositions, journalist interviews, podcast interviewsfor broadcast online, client meetings, teaching group discussions,scientific research discussions, company meeting from different branchesaround the world. In one embodiment, the recorded conference calls isconverted to .mp3 or .wav or .mp4 format and stored on to the clientdevice or user's storage location accessible by the SNSH 106.

In one embodiment, the conference call modules configure the processoror the SNSH 106 to implement a conference call with a maximum number ofpeople in a audio only mode and a maximum of people in a video callmode. Those possessing the requisite level of skill in the art willappreciate that the maximum number of concurrent users of a conferenceor video call is dependent on the hardware and software capabilities ofthe client devices and the social network.

5.4.6 Image and Multimedia Exchange:

The system so described is configured to integrate multimedia creationand exchange functionality into the social network. In one embodiment,the multimedia creation and exchange functionality is implemented as oneor more modules that configure one or more processor of the SNSH 106 orthe client device connected thereto, to access a library of illustratedcharacters, greeting card templates, party invitations, weddinginvitations, marriage proposal templates, collage templates, videopresentations and illustrations and select one or more for transmissionto other users. Furthermore, such media presentations can be customizedby recording an audio note and attaching it to form a multimediapresentation.

In a particular arrangement, through the operation of one or moresub-modules, the facial (or other anatomical features) expressions,movement, actions of illustrations or art assets are animated inresponse to the tone, pitch and inclination of the recorded message. Asan additional feature, implemented by one or more modules that configurethe processor of the SNSH 106 or client device, an image of the user isacquired and modified and juxtaposed with an illustrated character. Forexample, an image of the user's head is modified such that the image isplaced upon the body of the illustrated character.

5.4.7 Profile and Landing Page Customizations

The social network generated according to the foregoing is in one ormore embodiments, configured to incorporate customizable profilegeneration functionality. In one embodiment, the generated socialnetwork application incorporates a module that configures one or moreprocessors to enable a user to make one or more public or privateprofiles and to join one or more public or private groups orassociations. As an example, groups can be created by sending a text ormultimedia message to a plurality of recipients. Each of thoserecipients is now in a group messaging environment where all messagesexchanged in response to the original message are shared to each memberof the group.

5.4.8 Localized Language Sticker Generation

The system so described is configured to integrate localized languagesticker generation functionality into the social network. In oneembodiment, the localized language sticker generation functionality isimplemented as one or more modules that configure one or more processorof the SNSH 106 or the client device to provide to the user a pluralityof native based stickers generated from images or text typed. Forexample, a user in France types ‘Good Morning’ or ‘Bonjour’ into a textbox or field. This data is sent to the SNSH 106 and a related stickerlibrary is search or a new sticker is generated that can be sent as animage.

5.4.9 Multilingual Voice to Text Converter Feature

The system so described is configured to integrate voice to texttranslation functionality into the social network. In one embodiment,the localized text generation functionality is implemented as one ormore modules that configure one or more processor of the SNSH 106 or theclient device 108 to provide a conversion of the recorded voice or textinput into a destination language. As a non-limited example, a userspeaks in Hindi and the user's voice is recorded. This voice istranscribed into a text transcript and converted into English fortransmission to an English language speaker. Upon receiving thetranscript, a text-to-speech sub-module converts the transcript back tospoken language in the language of the user's choice. In one embodiment,both the voice and text processing utilize digital signal processingtechniques coupled to grammatical libraries in order to providegrammatically correct translations.

In another embodiment using the multilingual voice to text conversionmodules, a user of the generated network is enabled to execute a searchof the social network or 3rd party Internet search engines using theirrespective native language. In this implementation, a user initiates asearch in their native language; the native speech is converted tonative text format, translated to English, and searched using a searchengine. The results are again translated to native text and speech andprovided back to the user.

5.4.10 Map Finder Feature with Regional Language Recorded SpeechGuideline/Instruction

The system so described is configured to integrate mapping and locationbased functionality into the social network. In one embodiment, themapping and location based functionality is implemented as one or moremodules that configure one or more processor of the SNSH 106 or theclient device 108 to provide to a user a voice based interface to accesstransit maps and other transportation data. In one embodiment, a usergenerated data, such as speech to text or directed text input,identifies a desired destination. The mapping and location moduleconfigures processor of the SNSH 106 or the client device to generate aroute that makes use of preferred transportation modes and providesdirectional guidance in the user's native language.

5.4.11 Know Online Last Seen Summary

The social network generated according to the foregoing is in one ormore embodiments, configured to incorporate personal locatorfunctionality. In a particular configuration, the personal locatorfunction allows the user to view the last recorded location of contactsand to determine the last time such contacts established an activeconnection to the social network. In a particular configuration, thepersonal locator uses a connection to a GPS or other device that isaccessible and authorized by each user's client device to providecoordinate locations. In a further embodiment, the personal locatormodule uses IP address data to determine the general proximity of theuser the last time they established a connection with the socialnetwork.

5.4.12 Recorded Remainder Alert System

The social network generated according to the foregoing is in one ormore embodiments, configured to incorporate recorded reminder alerts. Inone embodiment, recorded reminder alerts functionality provides atime-based reminder system that reminds the user of events likemeetings, parties, and travel alerts. The system is further configuredto upload schedules or other appointment data from 3rd party schedulingproviders so as to set remainders based on schedules and parameters init.

5.4.13 Home Automation and Safety Encrypted Alert System

The social network generated according to the foregoing is in one ormore embodiments, configured to incorporate remote automation andsecurity device interconnectivity functionality. In one embodiment thegenerated network application incorporates a module that configures oneor more processors to enable a user to connect to Internet accessibledevices connected to the generated network or Internet, such as homeautomation and security systems. In this arrangement, external sensorsystems and other locker facility provided are integrated into thesocial network and can upload and exchange data with the social networksuch that security systems and connected locking devices arecontrollable or monitored via commands or posts made to the social mediasystem.

In a further embodiment, the user has access to Internet connectedappliances from anywhere in the world, such as monitoring HVAC equipmentand other devices. In one embodiment, the appliances and securityhardware connect to the Internet or through gateway routers viaBluetooth or Wi-Fi.

5.4.14 Mobile Security Platform Functionality

The social network generated according to the foregoing is in one ormore embodiments, configured to incorporate mobile device securityfunctionality. In one embodiment the generated social networkapplication incorporates a module that configures one or more processorsto enable a mobile device recovery option through IMEI (InternationalMobile Station Equipment Identity) number and provides recovery optionsfor a lost or stolen mobile device. In the event that a mobile device,such as a smartphone or tablet is lost or stolen, 3rd parties might haveaccess to sensitive photos, email, social network status, personalnotes, contacts, text messages etc. Thus, the mobile security moduleconfigures one or more processors of the SNSH 106 or client device 108to deny data requests from a client device 108 that has been reportedlost or stolen. Likewise, the next time the misplaced client device 108utilizes a network connection, an access denial module checks against anetwork status key provided by the generated network. In the event thatthe misplaced device is indicated on the generated network as missing,the access denial module locks access to the features of the device andgenerates a message for display on the device indicating that the deviceis lost and providing contact details. Additionally, through asubmodule, the mobile device security module access location data andprovides specific and general location data regarding the location ofthe lost or stolen device.

Additionally, the security module provides for the implementation ofpasskey login that enables a secure connection between the client deviceand any downloaded data. Thus, in the event of a lost or stolen clientdevice, the data stored therein is protected.

5.4.15 Police and Emergency Services

The social network generated according to the foregoing is in one ormore embodiments, configured to provide police and emergency servicesalerts, dispatching and communication functionality. In one or moreembodiments of the generated social network, the client applicationprovides an emergency messaging function that generates a message oralarm and transmits the message to local authorities. For example, theclient device, based on user selection of an icon or text, generates amessage that includes the coordinates of the user (as obtained from GPS,IP address information or other means) and some information as to thenature of the emergency (fire, medical attention, criminal activity) tothe relevant authorities. In a further embodiment, the alert messagegenerated and sent by the client application also calculates theshortest route to the user's location from the nearest police, fire oremergency facility.

In a further embodiment, the client application is configured togenerate an emergency alert and send it to individuals pre-selected fromthe user's contact list. Alternatively, the client application isconfigured to apply context based rules to generate a preferred contactperson given location, time of day and activity.

5.4.16 3rd Party Pates

The social network generated according to the foregoing is in one ormore embodiments, configured to incorporate 3rd party contentintegration functionality. In one embodiment the generated socialnetwork application incorporates a module that configures one or moreprocessors to enable the social network to host and display officialpages utilizing content and data not hosted in the SNSH 106. Forexample, pages can be made that highlight information regardingentrepreneurial businesses, place/tourism, company organizations,educational institutions, hospitals, research labs, brand or products,artists, band or public figures, entertainment venues, cause orcommunity events, maintenance and service announcements and othercontent distributed by linking to those 3rd party content providers.Additionally, government announcements, police information and requestscan be distributed or accessed using the 3rd party pages module.

5.4.17 Content Manipulation Features

The social network generated according to the foregoing is in one ormore embodiments, configured to incorporate content modificationfunctionality. In one embodiment, the generated social networkapplication incorporates a module that configures one or more processorsto enable a video sharing and size reduction (e.g. 3gp conversion) ofvideo prior to posting to the user's profile or transmitting to otherusers. Additionally, the content manipulation module allows for theselections of multiple photos to send from the client device to otherusers of social network. In one arrangement, the images or contentselected for sharing are transferred directly between client devices.However, in an alternative configuration, the content is first sent to aholding queue at the SNHS 106 prior to being sent to the intendrecipient(s).

The content modification module includes submodules that provide sortingtechniques that allow for a search of attachments to messages orcommunications without having to review the content of the messagesthemselves. For example, if User A sends a photo to User B and User C. Auser can find the desired content without sorting the overall instantmessages by searching for the content of the pictures rather searchfriends name. In one arrangement, this search feature is implemented bymachine learning algorithms that classify and categorize the content ofthe images stored in the user's mailbox or message repository.

In a further embodiment, the content modification configures theprocessor(s) to remove or hide some content based on key words or othercriteria. For example, to delete certain references in a communication,the content modification module executes a search for reference. Theuser is then able to hide or permanently delete all mentions of thisreference from the content on the client device or the user's profilespace on the SNHS.

5.4.18 Emailing Feature

The generated network, in one embodiment is modified by modules tosupport standard IMAP and SMTP protocols. In this arrangement, actual orvirtual IMAP and SMTP servers are extended to support authorization viathe industry-standard OAuth 2.0 protocol.

5.4.19 Business Pages

A further module includes functionality to set up a call center orcustomer service application that allows for users of the social networkto access a business line and route multiple calls to pre-arranged callcenter numbers or routing systems.

5.4.20 Food, Cab, Movie Ticket, Ordering and Gifting Feature

An additional module includes functionality to book food, taxies, and/ormovie tickets. In one embodiment, the client application working inconjunction with the server application allows for the selection ofdigital and physical good for gifting to other users. In one example,the client app allows user to book restaurants or food delivery, rideshare services, movie tickets and other items and send them to a contactin their contact list.

In one or more additional embodiments, the generated social networkincludes a geographic location information (such as by accessing dataprovided in a NOSQL Database system with Metadata accessible by theserver application) to provide locations of nearby cinemas, restaurants,and gift shops using the location of a requesting client device. Forexample, the generated social network updates the display of the clientdevice with selectable elements such as icons, check boxes or textelements that provide a link or other interfaces that correspond to thenearby establishments. Based on the language settings used to generatethe client application, the locations are represented either by text,icons, characters or other lexigraphic elements that denote the functionor purpose of a given establishment. For example, icons representingnearby restaurants or shops are displayed using culturally orlinguistically relevant indications such services.

In a further embodiment, the generated system includes links to a 3rdparty payment and ordering systems that allow the client to purchasefood, tickets, goods and services from nearby locations and have suchitems delivered to a user designated location.

5.4.21 Phone Transfer

An additional module includes the ability to access the local contactand information stored on a telephone and transfer that information to anew mobile or client device. For example, all data from one mobiledevice (e.g. smartphone) is transferable to another device by using thegenerated system. In this embodiment, the user data stored in the clientis mirrored or synchronized to a user master record stored by theserver. Thus, when a new device is used with the client application allof the user data contacts and other data is synchronized to the newdevice. For instance, in one embodiment the generated client device isbased on a HTML5-based user interface system designed to make responsiveweb sites and apps. The client application is then portable to otherhardware platforms suitable for implementing the client device code. Inan alternative embodiment, the client application is written in alanguage that allows low level interface with the hardware of the clientdevice, such as Java to enable a native Android client application.

5.4.22 Free App Market

Furthermore, an additional feature of the customized social network isthe inclusion of an application/video game database with which users caninstall any other app or games in a user's application (native orbrowser based). Additionally, the application market supports back-endsupport for various games and contents that enable score retention andmulti-user networking. In one further embodiment, the generated socialnetwork is configured to accept file upload (such as an .APK file). Suchuploaded files are used to generate applications that are used inconjunction with the generated social media network. For instance, auser developed application is packaged and uploaded to the generatedsocial network. The server is configured to use the uploaded file, andany associated metadata or configuration information also sent by theuser to generate an application that is listed and is accessible toother users of the generated social network.

5.4.23 Pay Transfer Facility

A further module provides functionality to allow a user to store cardinformation in a client device rather than server, and access that datafrom the mobile device at the time of payment. In one embodiment, theclient application allows the user to store bank or credit card accountinformation locally on the client device, as opposed to the server. In afurther embodiment, the financial information is stored locally in anencrypted format. According to one configuration of the clientapplication, the user is presented with a transfer icon that indicatesthat money (in local or designated currency depending on the currency)is available for transfer to a 3rd party. A user may then open up a chatdialog or direct transfer application and select the amount of money totransfer to the intended recipient. In one embodiment, the moneytransferred is in the form of digital currencies or non-standardcurrencies. For example, the user is able to transfer Bitcoins, Litecoinor other digital currencies from digital wallets stored and/orsynchronized between the server and the client application.

In a further embodiment, the financial transactions are encrypted on theclient device using a secure pin number, code, icon, or QR code. Byproviding secure encryption at the client application level, the riskthat a breech of data at the server or database will exposetransactional information is reduced. However, in certain embodiments,the server application is used to encrypt financial and personalinformation. For example, customized hardware and/or software is used toenable multiple layer security for protecting user data on the server.

When users receive money, they input banking data into the clientapplication and authorize the access of that account by the client orserver application. In one embodiment, authorization takes place byproviding a PIN number or finger print (where the client device isequipped with a fingerprint scanner). In a further embodiment, the useris able to access a one time pad (OTP) to further encrypt accountinformation or other data. Once a transaction is authorized, the moneyis deposited with the designated financial institution.

5.4.24 Mobile Teaching Facility

An additional module permits teachers and students to exchangeinformation and to access prepared tests and other evaluations. In oneembodiment of the generated social network, the server applicationprovides to the client application one or more activity pages orinstructional applications where a teacher registers school informationand creates a virtual class room where the teacher provides audio/visualexplanations of educational materials, notes, links and feedback tostudents. Information pertaining to a particular student is synchronizedto the client device so that the information is stored these informationare stored in our free database which we provide.

While this specification contains many specific embodiment details,these should not be construed as limitations on the scope of anyembodiment or of what can be claimed, but rather as descriptions offeatures that can be specific to particular embodiments of particularembodiments. Certain features that are described in this specificationin the context of separate embodiments can also be implemented incombination in a single embodiment. Conversely, various features thatare described in the context of a single embodiment can also beimplemented in multiple embodiments separately or in any suitablesub-combination. Moreover, although features can be described above asacting in certain combinations and even initially claimed as such, oneor more features from a claimed combination can in some cases be excisedfrom the combination, and the claimed combination can be directed to asub-combination or variation of a sub-combination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multitasking and parallel processingcan be advantageous. Moreover, the separation of various systemcomponents in the embodiments described above should not be understoodas requiring such separation in all embodiments, and it should beunderstood that the described program components and systems cangenerally be integrated together in a single software product orpackaged into multiple software products.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising”, when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

It should be noted that use of ordinal terms such as “first,” “second,”“third,” etc., in the claims to modify a claim element does not byitself connote any priority, precedence, or order of one claim elementover another or the temporal order in which acts of a method areperformed, but are used merely as labels to distinguish one claimelement having a certain name from another element having a same name(but for use of the ordinal term) to distinguish the claim elements.

Also, the phraseology and terminology used herein is for the purpose ofdescription and should not be regarded as limiting. The use of“including,” “comprising,” or “having,” “containing,” “involving,” andvariations thereof herein, is meant to encompass the items listedthereafter and equivalents thereof as well as additional items.

Particular embodiments of the subject matter described in thisspecification have been described. Other embodiments are within thescope of the following claims. For example, the actions recited in theclaims can be performed in a different order and still achieve desirableresults. As one example, the processes depicted in the accompanyingfigures do not necessarily require the particular order shown, orsequential order, to achieve desirable results. In certain embodiments,multitasking and parallel processing can be advantageous.

Publications and references to known registered marks representingvarious systems are cited throughout this application, the disclosuresof which are incorporated herein by reference. Citation of the abovepublications or documents is not intended as an admission that any ofthe foregoing is pertinent prior art, nor does it constitute anyadmission as to the contents or date of these publications or documents.All references cited herein are incorporated by reference to the sameextent as if each individual publication and references werespecifically and individually indicated to be incorporated by reference.

While the invention has been particularly shown and described withreference to a preferred embodiment thereof, it will be understood bythose skilled in the art that various changes in form and details may bemade therein without departing from the spirit and scope of theinvention.

What is claimed is:
 1. A system for generating a computer network for accessing and transmitting data from multiple users, the system comprising: a) a computer having at least one processor and configured by code executing therein to generate an adaptive user interface generator, wherein the adaptive user interface generator is configured to generate at least one adaptable user interface component; b) the adaptable user interface component comprising a plurality of access levels configured to allow the user to access different levels of functionality governing the operation of the user interface component; c) setting the access levels of the user interface components according to user feedback; d) monitoring use of the user interface components by a specific user; and e) changing the access level of the user interface in response to user feedback.
 2. The system of claim 1, wherein the changing of the access level includes altering the visual display of a user interface component.
 3. The system of claim 2, wherein altering the visual display of a user interface component includes replacing a textual identifier with an icon.
 4. The system of claim 1, wherein regenerating all of the user interface components in response to user feed back.
 5. The system of claim 1, wherein the monitoring step include evaluating the use of the user interface components with a machine learning algorithm and generating a threshold action for changing the access level of one or more user interface components. 