Verified hypermedia communications

ABSTRACT

A verified method of high-value, person-to-person communication is provided. The method comprises creating a unique dynamic messaging link recognizable to a selected intended recipient; creating a transmissible personal hypermedia message to which the link is assigned; and storing the hypermedia message on a device accessible to a network. The link comprises a recognizable proprietary domain name and a random hash code. The individual is sent a direct message and the device is monitored for transmission thereto of the link, analyzing and storing accompanying metadata. The direct message contains an invitation to click on the link over the imprimatur of a person known to the recipient. The invitation contains descriptive material relating to the hypermedia message. Upon activation of the link, without redirection, the hypermedia message is transmitted to the recipient and the sender is notified. The sender is alerted if the link has not been activated within a predetermined period.

CLAIM FOR PRIORITY

This Non-Provisional patent application is based on U.S. ProvisionalPatent Application Ser. No. 62/299,517, filed on Feb. 24, 2016, thepriority of which is claimed, and the disclosure of which isincorporated by reference.

FIELD OF INVENTION

The purpose of this invention is to provide a superior messagingalternative to email for delivery of timely, high value person-to-personcommunications that can be complex and media-rich, yet still easy toreceive, consume, and interact with on mobile devices.

BACKGROUND OF THE INVENTION

Messaging by personal computer should be extremely simple, but it isn't.The relatively anonymous nature of electronic communication providesalmost innumerable opportunities for deception and abuse limited only bythe abundant creativity of thieves and the malicious. Accordinglyelectronic messaging systems are typically configured to detect spam,spoofs, malware, viruses, Trojan horses as well as a myriad of otherscams perpetrated in electronic messaging as the architects of theelectronic messaging systems may be able to keep up with. No matter howdiligent electronic messaging architects may be, they remain engaged ina constant struggle to stay one step ahead of the most creative of theshady operators. Accordingly, it should be no wonder that the protectivemeans built into electronic messaging systems are quite prone to falsepositives—blocking innocent content which is desired by the recipientbut trips safeguards built into the electronic messaging systems.

SUMMARY OF THE INVENTION

This invention relates to an assisted method for personal communicationfrom a trusted source, which obviates the need for countermeasures andthus makes computer messaging simple for the recipient, at least.Further, the method of the present invention makes it possible tocommunicate quite detailed and complex personal messages to users ofshort messaging and social media technologies with immediacy. Sinceusers of social media and short messaging technologies such as SMS,Twitter, Facebook and the like with smart phones often check theirpages, SMS and/or Twitter and other social media accounts veryfrequently, with many updates popping up automatically on the device asthey occur, the method of the present invention also enablescommunication with immediacy, in close to real time.

In practice, a person-to-person message can be composed for the intendedrecipient comprising the totality of the message to be communicated.Such messages will often be transmitted as hypermedia and often containcontent which may not pass through the countermeasures built into manyelectronic messaging systems without incident. To circumvent thislimitation, my invention stores the message on a server connected to anetwork, with the message being accessible through a correspondingshort-link URL comprised of an innocuous, recognizable domain name and aunique, non-sequential, preferably randomized, hash code. We term ahypermedia message so stored and accessible by clicking on acorresponding, recognizable short-link URL as a Dynamic Message.

Methods of retrieving files and/or URL's corresponding to short Linksare known from Megiddo et al.; Efficient Retrieval of Uniform ResourceLocators; U.S. Pat. No. 6,957,224, which is apparently directed toimpersonal advertising and has nothing to offer on person to personcommunication or the issue of how to get the recipient of aperson-to-person message to click on a short link. The key to achievingthe above-mentioned goals lies in the use of a direct message to thedesired recipient from a known or trusted sender who has permission tocommunicate with the recipient, wherein the direct message comprises adirect Dynamic Messaging link having a recognizable domain name trustedby the recipient as a source of communications of interest which arefree of the maladies common to anonymous email. In particular, theDynamic Messaging link is a direct link to the Dynamic Message, which isstored in a network accessible device that transmits the dynamic messageupon actuation of said dynamic messaging link and thus avoids the snaresattendant upon short links that redirect to another site, particularlythird party sites that may be dubious. While any method can be used totransmit the dynamic messaging link to the recipient, this is preferablydone electronically with the message bearing the imprimatur of anindividual known to, and trusted by, the recipient with an innocuousinvitation to click on the dynamic messaging link. In this context,“innocuous” should be understood to mean that the invitation and/orDynamic Messaging link, preferably both, are free of the types ofcontent known to frequently activate protective measures oncommunications networks—many of the better known short link sites areusually considered highly suspect due to their frequent use by scammersof all sorts. Thus many electronic communications systems willautomatically refuse to pass on messages containing redirecting shortlinks, regardless of where they ultimately point to.

Once the recipient clicks on the Dynamic Messaging link, the associatedDynamic Message is transmitted to the recipient anon—presently; so thatthe recipient can view the message promptly. While establishing thedynamic qualities of the messaging is important, much hinges on theassist—the dynamic messaging link—as communication is completed onlywhen the link is clicked.

In today's world where a single misstep can render a computer useless,the key question is how to get the recipient to click on the link?Preferably, a combination of several factors combine to reassure therecipient that clicking on the link is safe. First is personalrecognition. Ideally, the dynamic messaging link is transmitted from anindividual known to and trusted by the recipient or, at least over thattrusted individual's imprimatur, and the domain name of the DynamicMessaging link is known to and recognizable by the intended recipient asthe source of messages of interest to the recipient from the trustedindividual. Second, in most cases, the invitation will be sent by anelectronic method requiring at least the recipient's implied permission,as in the case of SMS where the recipient's cell phone number must beknown or in the case of Twitter where, at least until recently,permission had to be explicit—i.e., the intended recipient was“following” the sender's tweets. Thus since the recipient willpreferably recognize both the sender and the domain name as trustedsources of information of interest to the recipient and since therecipient realizes that he has given permission for that person to sendhim Dynamic Messaging links, he will recognize that clicking on the linkis safe and will provide him with uncontaminated information ofinterest. Further, as this method is concerned with person-to-personcommunication wherein the viewing of each dynamic message by itsintended recipients is considered important, it is quite significantthat the sender can readily determine whether the recipient has clickedon the link to view the message; and, if not, corrective measures can betaken. In preferred embodiments, the sender will be able to determineother significant details concerning viewing of the Dynamic Message frommetadata accompanying the recipient's click.

A particular problem with email is that many potential recipients,particularly those of younger generations, view it as antiquated, slow,and almost useless as a means of regular communication with peers, sothey check infrequently, if at all, with the result that even if amessage gets past the email system, considerable time may lapse beforethe message is viewed, if it is viewed at all. We address thesedifficulties by providing a high credibility format for person-to-personcommunication in which communication is maintained using social mediaand direct messaging containing branded unique short-links directly tounique person-to-person Dynamic Messages. In this format, the prospectwould from time to time receive instant messages, usually 140 charactersor less, with a short invitation and some context to click on a uniquebranded short-link included within. In preferred embodiments, theinstant message will be personalized to the recipient and may have apersonalized enticement inviting the recipient to click. For example, ifcoaches at Mega State are recruiting football players, the personalizedenticement to click might read: “click this link to see behind thescenes at Mega State.” Alternatively, if the recipient is a left tackle,it could say: “click here to see how line men from Mega State have faredin the NFL.” It can be appreciated that a whole host of personalizedclick enticements might be appropriate depending upon the particularathletic program and prospect; but that these would differ from thetypes of enticements used in connection with advertising and similarbroadcast communications. Further, because the domain name is brandedand proprietary, it can avoid triggering protective measures designed tobar link shortening methodologies available to all comers, particularlythose associated with web-sites often considered dubious or potentiallyunsafe. As is well known, many of the free, publicly available linkshortening methodologies and services have acquired unsavory reputationswith the consequence that many electronic communication systems willreject their shortened links; so that in many cases, the host of thelink shortening methodology must cease operations, rendering theshortened links useless.

The method of the present invention can thus bypass email altogether,leveraging the currently popular forms of conversational, short-formdirect messaging, text messaging and social media to initiate onlineconversation which will actually get viewed by the intended recipientwithout languishing in an inbox for several days until the recipient canactually check his email. A particular advantage of bypassing emailstems from the ubiquity of spam which is a curse upon this form ofcommunication that has never been perfectly addressed as, while networkoperators try to devise and implement spam filters, the spammers areeven more diligently attempting to devise methods of circumventing thespam filters leading to a Devil's dilemma in which, if the spam filteris too aggressive, desired non-spam messages may be filtered out asfalse positives and never show up in the inbox; while, if the filter isless aggressive, desired messages may be obscured in a blizzard of spammaking it quite difficult to quickly and easily separate the wheat fromthe chaff and find messages of real interest to the reader/recipient.Or, even worse, malware may slip through disabling the recipient'sdevice. Further, spam filters also can affect what types of content willbe viewable. For example, one form of reader might filter out videocontent, while another might let it pass but remove links based uponparticular domain names. This can be extremely detrimental as one of thebest ways of ensuring that a message has a good chance of being viewedis to reference and include media, images, audio, and/or video contentwhich are very popular with today's younger generations, many of whomhave little patience for wading through the inbox and searching foremails. In contrast, in the practice of the present invention, web copymessages load more correctly, completely and reliably than email, withadvanced form content more easily incorporated within the web copy ascurrent web browsers are far more open to advanced forms of content thanemail browsers. Further, many email readers, particularly inprofessional and institutional settings do not have the capability torender many popular forms of embedded media and content.

Other aspects and advantages of the present invention are described inthe detailed description below and in the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention is described in detail below with reference to theappended drawings, wherein like numerals designate similar parts. In theFigures:

FIG. 1 schematically illustrates the components of a computercommunications systems suited for carrying out verified hypermediacommunications.

FIG. 2 illustrates information storage as well as information flow fromthe user/sender to the recipient in verified hypermedia communications.

FIG. 2A illustrates storage of information and messages in verifiedhypermedia communications.

FIG. 3 is a flow chart which illustrates composition of a message forverified hypermedia communications.

FIG. 4 is a flow chart which illustrates transmission of a message forverified hypermedia communications in response to a recipienttransmitting—clicking on—a dynamic messaging link.

FIG. 5 is a schematic of a screen shot which illustrates transmission ofa dynamic messaging link for verified hypermedia communications totransmit a dynamic messaging link to a recipient enabling that recipientto receive a message by transmitting—clicking on—the dynamic messaginghyperlink to receive a message.

FIG. 6 is a schematic of a screen shot which illustrates display of amessage in response to a recipient clicking on a dynamic messaging linkfor verified hypermedia communications.

FIG. 7 is a schematic of a screen shot schematically displayingtransmission of multiple individualized dynamic messages forwarding adynamic messaging link to a recipient therefor.

FIG. 8 illustrates how imprimatur by a renowned individual enablesefficient division of labor in a large organization to achieve efficientwidespread distribution of messages using verified hypermediacommunications.

FIG. 9 illustrates how imprimatur by a renowned individual can beleveraged to spread imprimatur to another person—introduce—in thatorganization which further enables even more efficient division of laborin a large organization to achieve efficient widespread distribution ofmessages using verified hypermedia communications.

FIG. 10 illustrates how message links act not only as an assistmechanism for Dynamic Messaging but also work further to extend thereach of Dynamic Messages.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

The invention is described in detail below with reference to severalembodiments and numerous examples. Such discussion is for purposes ofillustration only. Modifications to particular examples within thespirit and scope of the present invention, set forth in the appendedclaims, will be readily apparent to one of skill in the art. Terminologyused herein is given its ordinary meaning consistent with the exemplarydefinitions set forth immediately below.

The present invention is a messaging and communications system designedto generate and deliver person-to-person messages comprised of contentand feature-rich hypermedia, linked to by shortened, branded URL's thatare easily distributed by means of direct messaging and social media, orto a lesser extent by email, and provide verification when messageshave, or have not, been delivered. Unlike email messages, verifiedhypermedia messages are not actually sent, but rather the branded,shortened URL links that point back to corresponding verified hypermediamessages, or Dynamic Messages, are distributed instead.

In many cases, by an appropriate choice of branding and subsequentrecognition of the domain name within the dynamic messaging link, itwill be possible to greatly enhance the attractiveness of actuallyclicking on the link to the recipient. In other cases, by appropriatechoice of the sender listed on the direct or instant message, thechances the dynamic messaging link will be clicked upon can be greatlyfurther enhanced.

Suitable Dynamic Messaging links will comprise two parts: the domainname and the hash code. While the domain name will be registered,proprietary and custom branded for recognition, like the fictitiousuniversity: “http://megasta.te”, the hash code is random and unique toeach specific person-to-person message, for example:“http://megasta.te/rANd0m”. A particular advantage flowing from the useof the Dynamic Messaging format of the present invention is that DynamicMessaging links are private, and can remain private, and not subject topublic abuse and misuse or inherent delivery problems which saddle manyfree short link services. If six places are used with sixty-twoalphanumeric characters, including all numbers and upper and lower caseletters, over fifty-six billion combinations are possible so randomcracking would be reasonably close to impossible. When clicked, theassociated Dynamic Message opens in the recipient's default web browseron virtually all mobile, and non-mobile, computing platforms. Anotherimportant advantage is that, as mentioned, Dynamic Messages circumventspam filtering, and the strictures placed upon email while providing farmore power and flexibility with respect to content than can beaccommodated in most email systems. Further, because the intendedrecipient presumably knows the sender of the direct message thatcontains the Dynamic Messaging link, there is little danger that theDynamic Message accessible through the Dynamic Messaging link will turnout to be spam or malware, thus greatly alleviating any hesitancy therecipient might have to click on it. And of course, being transmitted byinstant messaging, delay is greatly reduced—particularly with youngadult millennials and generation Z kids, aka “screenagers” who checktheir personal devices, messages and social media frequently throughoutthe day, seemingly from the moment they wake up until the point offalling asleep at night.

An additional benefit is that the sender retains the ability to benotified and/or determine if the message has been received. Thiscapability is particularly important as the present invention isdesigned to be well suited for, inter alia, recruiting use, high valueperson-to-person communications rather than mass or broadcastcommunication, advertising and marketing. In the case of high-valuecommunications where the message is not received or viewed, considerablevalue flows to the sender having knowledge that the message was neverreceived so that any necessary remedial action can be taken.

In most cases, the short domain name will be registered and associatedwith the sender of the Dynamic Message so that redirection is notrequired, although in some cases it may be desirable to allow use of alink that redirects to the servers storing the Dynamic Message.Similarly, the hash code for the Dynamic Message will be unique to thatperson-to-person Dynamic Message and to that recipient so that theprivilege of communicating with the recipient in this fashion is notabused. By suitable choice of the hash code format, preferably at least6 case-sensitive alphanumeric characters, the privacy of the personalDynamic Message can be suitably assured, although with simpler hashcodes, there is a miniscule chance the Dynamic Message could be happenedupon; while ensuring that there is always a trail as the communicationsengine used to resolve incoming dynamic links and serve subsequentoutgoing Dynamic Messages automatically captures and records allmessaging transactions. Additionally, the ability to expire and deleteDynamic Messages after corresponding links have been sent and evenclicked further protects against the highly unlikely event of accidentalclickthrough by an unintended message recipient. It is important to notethat even if email is used to transmit the invitation containing theDynamic Messaging link, important advantages are still obtained as thestrictures imposed by the recipient's email system are no longer ofsignificant consequence as the recipient will open the Dynamic Messagewith a browser, bypassing the email system altogether. Additionally, themessage can be updated and even deleted, even after the message has beenread, if so desired. Of course a richer, much broader scoped message canbe communicated in hypermedia by Dynamic Messaging's obviation of thenumerical limitation of characters inherent in short, conversationalforms of instant messaging. Additionally, because preferred forms ofconversational messaging and social media often come up front and centerand get priority treatment on mobile devices, Dynamic Messages willtypically be delivered before email is checked.

The invention is particularly well suited for use in situations wherethere is a need to continuously communicate with a large number ofpeople on behalf of a team or organization and develop relationshipsbearing on the past, present and future of the program.

-   -   Past—Reunion efforts to reassemble groups of people who have had        past, possibly dormant, relationships and may have been out of        contact for some time.    -   Present—Retention efforts to stay current and relevant with        existing employees and clients, to further those relationships.    -   Future—Recruiting time and resource consuming relationship        development activities are required for competitive and often        non-competitive amateur and professional programs.

Consider the athletic department at your local university. To win on thefield coaches must communicate convincingly with kids and parents andoften recruit competitively for players. To grow off the field, athleticadministrators and coaches must communicate frequently and well withalumni, community, and present supporters.

Successful recruiting in college athletics means competing in annualcycles. Therefore, to build strong incoming classes, coaches mustcontinuously establish and develop relationships with new prospectiveathletes, their families, and others within their circle of influence.With four years of eligibility, just one poor recruiting class canimpact the program for a number of years. Naturally, the most recognizedcoaches and key influencers on campus are often afforded the leastamount of time to spend communicating and continuously developing newrelationships. Most prospective athletes are naturally eager tocommunicate with the head coach who is almost always recognized andcarries influence with recruits, so it is usually not difficult toacquire permission from athletes to send them messages that canlogically bear the imprimatur of the head coach, even though actuallyprepared by assistant coaches and/or staff under his supervision. Thistechnique works twofold, both saving the time and extending the reach ofbusy key influencers.

Alternatively, imprimatur can also be further used as a means ofpersonal introduction and for warm transfers such as “Click on the linkand Sally will help coordinate your visit.” In this case, a known personcan send a direct link to a dynamic message facilitating theintroduction of another correspondent while simultaneously imparting theknown person's imprimatur to the new correspondent. Similarly, thedomain name in the Dynamic Messaging link can be chosen, and branded, toreflect the name and/or nickname of the athletic program involved. Bothof these factors will greatly increase the probability that therecipient will trust the Dynamic Messaging link and click to view themessage. Further the direct message may be composed to entice therecipient to click on the dynamic link. Providing specific context orbriefly explaining what the recipient of the direct message will receiveby clicking on the short link, for instance, “Click on the link for avideo message from Coach” can greatly increase the chance that thedynamic messaging link will be clicked on.

By sending the conversational, short-form instant message under theimprimatur of the head coach, or as a trusted introduction to (“personalnote from”) the head coach, the chances that the student athlete willclick on the link inside the message can be greatly increased. Whencombined with an appropriate domain name, the recognized sender and aninnocuous invitation to click on the Dynamic Messaging link, it ispossible to greatly increase the likelihood of successful, timelycommunication which benefits from the recipient's prompt attention, i.e.is actually viewed by the recipient with interest while it is stillrelevant.

Since short direct or instant messages can most often only betransmitted to a recipient with the recipient's permission, it can befar easier to obtain that permission for messages from more recognizablefigures such as the head coach, and each message sent under his or herimprimatur can work to reinforce the relationship being built with thestudent athlete prospect. Whoever it is, after the first person in theprogram establishes contact with a prospect and begins developing arelationship, they can begin introducing other key contacts and sendingpersonal messages from them or on their behalf. Of course, the utilityof this system of communication is greatly enhanced when the messagessent are actually meaningful person-to-person messages specificallycomposed for the intended recipient and not simply just bulk orimpersonal mass messaging designed to appeal to some percentage of anaudience rather than an audience of one.

Description of System Components

FIG. 1: Network includes a diagram of example network 100, whereembodiments may be implemented via service platforms 102, 104, and 106.

Dynamic Messaging system users and recipients interact with serviceplatforms 102, 104, and 106 via any combination of smart phones 120 andnetworked handheld or embedded devices, tablet 126 computers, desktop122 and laptop 124 computers that offer Direct Messaging and webbrowsing capabilities as well as analogous digital mobile or wirelessdevices that may be used today and in the future, including embeddedmessaging devices, wrist worn devices, virtual reality devices, smartglasses, and any similar device providing digital communication. It isexpected that much of the system interaction will be with mobilecomputing devices.

Dynamic Messaging system service platforms 102, 104, and 106 (servers)support three distinct core interactive functions, each represented inthe diagram by individual servers 102, 104, and 106; comprisingApplication Server 102, Web Server 104, and Notification Server 106.Users interact with Network 100 via Application Server 102 to compose,verify, and manage messaging operations. For proactive messageverification, Notification Server 106 sends system users a variety ofdirect message and report formats to notify users at periodic intervalsand, upon request, alert users when priority messages are served. WhenMessage Links are clicked by Recipients, requests are fielded andassociated hypermedia messages are returned from Web Server 104.

To support enhanced data security, personal privacy, and system loadrequirements, and in an effort to alleviate both process and trafficbottlenecks, associated data stores, media and file systems, andsoftware code may be redistributed to and run from locally networkedauxiliary servers within the platform environment. Additionally, thesystem can be securely updated both periodically and in real time withdata maintained elsewhere in off-site stores.

Network 100 may comprise any topology of servers, clients, Internetservice providers, and communication media. A system according toembodiments may have a static or dynamic topology. Network 100 mayinclude a secure network such as an enterprise network, an unsecurenetwork such as a wireless open network, or the Internet. Network 100may also comprise a plurality of distinct networks. Network 100 providescommunication between the nodes described herein. By way of example, andnot limitation, Network 100 may include wireless media such as acoustic,RF, infrared and other wireless media, particularly those employing someportion or portions of the electromagnetic spectrum.

Many other configurations of computing devices, applications, datasources, and data distribution systems may be employed to implementDynamic Messaging System. Furthermore, the networked environmentsdiscussed in FIG. 1 are for illustration purposes only. Embodiments arenot limited to the example applications, modules, or processes.

FIG. 2: System is a high-level diagram that illustrates the threeprinciple software engines that provide verified hypermedia messaging,how they fit together, plus each of the core system components necessaryfor User 200 to compose and Recipient 202 to request and receiveverified hypermedia, or Dynamic Messages, as discussed in further detailbelow.

FIG. 2A: Sample Data features data tables to highlight datarelationships, provide context, and support subsequent diagrams. Forpurposes of example, sample system Users 200A, 200B, 200C . . . aredefined in table 280 with intended Recipients 202A, 202B, 202C . . . ofDynamic Messages defined in table 282, Additional tables 284 and 286provide a sample data foundation for Dynamic Messaging examples 606,706, 806, and 906 featured in FIGS. 6, 7, 8, and 9 respectively.

People 230 engine is used to manage information surrounding system Users(message composers) and Recipients. Person information stored withindata store 232 is used to manage contact and context data for eachsystem User 200 and message Recipient 202, populate personalizationvariables within Dynamic Messages, enable filtered search capabilities,and build distribution lists. Although Recipient data can be managed bysystem users via Front End 208 application, person data is most oftenmanaged elsewhere off-site and imported/updated into Network 100 eitherby periodic secure file transfers, or in real time via API. Reports 234module within People 230 engine provides many forms of information onpersonal communications with each recipient, including all relatedmessage postings, click requests and interactions. Advanced analyticswork to provide further personal insights into each Recipient'sinterests, user agent devices, communication patterns and behaviors,based on how they consume and interact with Dynamic Messages over time.

Messaging 210 engine is where the tangible elements of each DynamicMessage come together, and includes data store 212, Link managementmodule 216, Content management module 218, intended Recipientsmanagement module 214, as well as associated receipt management moduleand proactive Alert notification management module 220. When composing aDynamic Message, content is provided by User 200 through Front End 208via onboard WYSIWYG web editor and/or can be constructed elsewhere andimported into Content management module 218 via any convenient fileupload mechanism. Distribution lists are created and managed withinRecipients management module 214 and are comprised of individualRecipients 202, 202A, 202B, 202C . . . stored within People 230 engine.Distribution lists can also be imported from outside sources whencomposing a message and for each new intended Recipient 202, 202A, 202B,202C . . . added to the system, an associated Recipient profile isautomatically recorded in People 230 engine. A separate, uniquemessaging link is then automatically assigned to each individualRecipient 202, 202A, 202B, 202C . . . within the distribution list byLinks management module 216 when a Dynamic Message is saved to thesystem. Appropriate alert notification form and timing is then assignedon a per Recipient basis via Alerts notification management module 220based on default verification actions defined in the Recipient profilewithin People 230 engine data store 232 often by being entered manuallyby User 200 via Front End 208 application. Unlike previously describedReports 234 module that provides a micro level accounting and analysisof messages per recipient, Reports 222 module within Messaging 210engine provides a higher, macro level view of Recipients 202, 202A,202B, 202C . . . per message.

Communications 250 engine is where Dynamic Messaging activity is handledand recorded in corresponding data store 252. When Recipient 202 clickson message link 204, it is Requests module 254 that fields the requestfor the associated message, resolves the incoming link to message,assembles the hypertext document and content infused with appropriatepersonal data, and then returns the runtime-constructed hypermediamessage 206 back to Recipient 202 via Service module 256. Finally, allcorresponding alerts of message receipt verification are then sent toUser and/or other registered parties through Notification DistributionModule 258 by way of preferred direct messaging, usually SMS or email.

FIG. 3: Compose Message illustrates the process of composing a singleperson-to-person hypermedia message.

First step 300 in the process of composing a Dynamic Message isselecting Recipient(s) 202, 202A, 202B, 202C . . . . The following step302 determines whether or not a Recipient has been selected, however asit is not required that a particular Recipient be associated to aparticular Dynamic Message (non-personal message to be posted to socialmedia for example), as both yes and no avenues end up at same next step304, Edit/Upload Message Content.

From there, User 200 can either Set Message Alert notifications in step306 or proceed directly to Save Message in step 308. If the message isempty in next step 310, User 200 is sent back in the process to step302, otherwise a unique Message Link is assigned in link assignment step312 and all data surrounding Message Recipients, Content, Links, andAlerts is recorded to Communications Storage 252 in final step 314.

FIG. 4: Message Request illustrates the process of servicing an incomingDynamic Message request.

After webserver 104 fields the initial page request, the incoming URL isfurther parsed in Link Resolution step 400 to identify the correspondinglinked message. If the URL proves not to be valid in Link Validationstep 402, a subsequent “page not found” message is returned in MessageNot Found step 404, otherwise, content for the corresponding message isassembled in Message Assembly step 406. Recipient Verification step 408looks to see if the message has an associated Recipient, and if so,selected personal data is then merged into message content in step 410.Alert Status Determination step 412 determines if any receiptverification alerts have been set and if so, alert notifications aresent out in Send Notification step 414. After information surroundingthe message request (including data from webserver transaction log towebserver 104 and requesting agent) is recorded to system in followingCommunications Request Data Record step 416, the fully constructedDynamic Message is returned in Dynamic Message Transmission step 418.

FIG. 5: Hypermedia Message illustrates an example of a simple form ofnetworked hypermedia messaging.

Proximate top of commercial HTML email 502 is link 504 that, whenclicked by recipient, opens up hypermedia copy 508 of that email insidea web browser. Although video 506 is embedded within both messages, itdoes not load in HTML email 502. Because the hypermedia copy 508 is notemail at all, it is not subject to the same rigorous spam filtering andcontent restrictions enforced between email server and reader programs.As a result, where embedded video 506 is filtered out of HTML email 502,embedded video 506 loads and runs normally in hypermedia copy 508.Often, hypermedia copy messages not only load more correctly,completely, and reliably than their email counterparts, in many cases,advanced forms of media and content can be incorporated into thehypermedia messages which far exceed the capabilities many emailprograms can allow, particularly in commonly encountered commercial andinstitutional settings.

FIG. 6: Dynamic Message is a simple example of verified hypermediamessaging. In it, Renowned Individual, User 200A sends text message 602to Recipient 202A who is aware of User 200A's renown with brandedDynamic Messaging link 604 that points to associated personalizedhypermedia message 606.

To load and view hypermedia message 606, Recipient 202A simply clicks onshort link 604 inside text message 602. As per data table 286 in FIG.2A, Renowned Individual, User 200A is then notified immediately.

FIG. 7: In Plurality exemplifies multiple personalized Dynamic Messages.In it, Renowned Individual, User 200A sends out three text messages 702,702A and 702B to Recipients 202A, 202B, 202C respectively, each enabledwith Dynamic Messaging links 704, 704A and 704B, that each point tocorresponding hypermedia messages 706, 706A and 706B based ondistribution lists that can be manually selected or driven by data whileeach Recipient's Dynamic Messaging link 704, 704A and 704B, is separateand unique to ensure that each corresponding Dynamic Message 706, 706Aand 706B is infused with appropriate data, personalization, andbranding, as in FIG. 7.

As per data table 286 in FIG. 2A, User 200A has chosen to be notifiedimmediately only when Recipient 202A clicks and requests Dynamic Message706, but not when 202B or 202C click through.

FIG. 8: Imprimatur illustrates an example of distribution of labor indynamic messaging. In it, Renowned Individual 200A's assistant 200Csends text message 802 to Recipient 202A, on behalf of RenownedIndividual 200A, with dynamic messaging link 804 which points tocorresponding hypermedia message 806, personalized to Recipient 202A,from Renowned Individual 200A. In this example, Renowned Individual200A's assistant 200C is transparent in the process to Recipient 202Awho is aware of 200A's renown, sees and reacts to messaging as ifRenowned Individual 200A had sent it himself.

As per data table 286 in FIG. 2A, both User 200C and Renowned Individual200A will be notified immediately when Recipient 202A clicks andrequests Dynamic Message 806.

FIG. 9: Double Imprimatur exemplifies one person using dynamic messagingto leverage the recognition and influence of another to facilitate thepersonal introduction of a third person. In it, Renowned Individual200A's assistant 200C sends text message 902 to Recipient 202A who isaware of 200A's renown, on behalf of Renowned Individual 200A,containing dynamic messaging link 904 which points to correspondinghypermedia message 906, also personalized to Recipient 202A, but fromyet another Renowned Individual 200B.

As per data table 286 in FIG. 2A, both User 200C and introducedIndividual 200B, but not Renowned Individual 200A, will be notifiedimmediately when Recipient 202A clicks and requests Dynamic Message 906.

FIG. 10: Message Power illustrates how message links act not only as anassist mechanism for Dynamic Messaging but also works further to extendthe reach of Dynamic Messages.

Similar to FIG. 7, links 704, 704A, and 704B to Dynamic Message 706 aresent via text message to three Recipients 202A, 202B, and 202Crespectively while a fourth link to 706 is posted to social media as aTweet 1000. Additionally, Recipient 202B copies the link from textmessage 704A and posts it to Facebook 1002. Sending short links tocomplex messages instead of the messages themselves provides an easy,portable means of distributing messages via direct messaging and socialmedia alike. As a result, the reach of Dynamic Messaging is not simplylimited to the number of direct link recipients (plus forwarding), butis further potentiated by the number of friends and followers withaccess to social media posts containing Dynamic Messaging links and howthey further interact with the link and associated Dynamic Message.

While the invention has been described in detail, modifications withinthe spirit and scope of the invention will be readily apparent to thoseof skill in the art. In view of the foregoing discussion, relevantknowledge in the art and references discussed above in connection withthe Background and Detailed Description, the disclosures of which areall incorporated herein by reference, further description is deemedunnecessary. In addition, it should be understood that aspects of theinvention and portions of various embodiments may be combined orinterchanged either in whole or in part. Furthermore, those of ordinaryskill in the art will appreciate that the foregoing description is byway of example only, and is not intended to limit the invention.

As my invention, I claim:
 1. A verified method of high-value,person-to-person communication, comprising the steps of: a. selecting asan intended recipient an individual with whom at least implicitpermission for person-to-person communication exists; b. creating aunique dynamic messaging link selected to be recognizable to theintended recipient of said person-to-person communication comprising aproprietary domain name which is selected to be recognizable as it isassociated with a person known to said intended recipient and furthercomprising a random hash code appended thereto; c. creating atransmissible personal hypermedia message and assigning said uniquedynamic messaging link leading directly thereto and storing saidtransmissible personal hypermedia message on a device accessible to anetwork upon actuation of said unique dynamic messaging link withoutredirection; d. sending said individual a direct message containing saidunique dynamic messaging link over the imprimatur of the person known tosaid intended recipient and an invitation to click on said uniquedynamic messaging link, said invitation containing descriptive materialrelating to said transmissible personal hypermedia message; e.monitoring said device accessible to said network for transmissionthereto of said unique dynamic messaging link, analyzing and storingmetadata accompanying transmission of said unique dynamic messaginglink; f. transmitting said transmissible personal hypermedia message tosaid intended recipient upon activation of said unique dynamic messaginglink; g. notifying a sender of said direct message of activation of saidunique dynamic messaging link upon receipt thereof; and h. alerting thesender of said direct message if said unique dynamic messaging link hasnot been activated within a predetermined period.
 2. The verified methodof high-value, person-to-person communication of claim 1, wherein eachsaid unique dynamic messaging link is provided to the intended recipientvia instant messaging.
 3. The verified method of high-value,person-to-person communication of claim 1, wherein each said uniquedynamic messaging link is provided to the intended recipient via MMS orSMS text messaging.
 4. The verified method of high-value,person-to-person communication of claim 1, wherein each said uniquedynamic messaging link is provided to the intended recipient by socialmedia.
 5. A method of personal communication comprising the steps of: a.obtaining permission to send personal messages to a recipient from aknown individual; b. composing a personal transmittable dynamichypermedia message; assigning a unique dynamic messaging link leadingdirectly thereto and storing said personal transmittable dynamichypermedia message on a device accessible to a network upon actuation ofsaid unique dynamic messaging link; c. sending said recipient anelectronic message listing said known individual as the sender, saidelectronic message having said unique dynamic messaging link embeddedtherein, accompanied by an invitation to click on said unique dynamicmessaging link, wherein said unique dynamic messaging link includesprimarily a domain name selected to be recognizable to said recipient asit is associated with said known individual already known to saidrecipient plus a unique hash code individualized for each personaltransmittable dynamic hypermedia message sent to said recipient; d.monitoring said device to determine whether said unique dynamicmessaging link has been actuated; and e. transmitting said personaltransmittable dynamic hypermedia message to said recipient in responseto actuation of said unique dynamic messaging link.
 6. The method ofpersonal communication of claim 5, wherein each said unique dynamicmessaging link is provided to the recipient via instant messaging. 7.The method of personal communication of claim 5, wherein each saidunique dynamic messaging link is provided to the recipient via MMS orSMS text messaging.
 8. The method of personal communication of claim 5,wherein each said unique dynamic messaging link is provided to therecipient by social media.
 9. A verified method of high-value,sustainable, person-to-person communication, comprising the steps of: a.establishing a plurality of relationships wherein intended recipientsgrant at least implicit permission to a person known to said intendedrecipients to send electronic messages to them: b. thereafter, selectingan individual intended recipient from said intended recipients; c.creating a unique dynamic messaging link selected to be recognizable tothe individual intended recipient of said person-to-person communicationcomprising a recognizable proprietary domain name associated with saidperson known to said individual intended recipient and a random hashcode appended thereto, wherein said recognizable proprietary domain nameis chosen to be sufficiently recognizable to said individual intendedrecipient to increase a likelihood of the individual intended recipientclicking on the unique dynamic messaging link given its association witha known sender; d. creating a transmissible personal hypermedia messageand assigning said unique dynamic messaging link leading directlythereto and storing said transmissible personal hypermedia message on adevice accessible to a network upon actuation of said unique dynamicmessaging link without any form of redirection; e. sending saidindividual intended recipient the direct message containing said uniquedynamic messaging link over an accurate imprimatur of the person knownto said individual intended recipient and an invitation to click on saidunique dynamic messaging link, said invitation containing descriptivematerial relating to said transmissible personal hypermedia message; f.monitoring said device accessible to said network for transmissionthereto of said unique dynamic messaging link, analyzing and storingmetadata accompanying transmission of said unique dynamic messaginglink; g. transmitting said transmissible personal hypermedia message tosaid individual intended recipient upon activation of said uniquedynamic messaging link; h. notifying the known sender of said directmessage of activation of said unique dynamic messaging link upon receiptthereof; and i. alerting the known sender of said direct message if saidlink has not been activated within a predetermined period.
 10. Theverified method of high-value, sustainable, person-to-personcommunication of claim 9, wherein each said unique dynamic messaginglink is provided to the individual intended recipient via instantmessaging.
 11. The verified method of high-value, sustainable,person-to-person communication of claim 9, wherein each said uniquedynamic messaging link is provided to the individual intended recipientvia MMS or SMS text messaging.
 12. The verified method of high-value,sustainable, person-to-person communication of claim 9, wherein eachsaid unique dynamic messaging link is provided to the individualintended recipient by social media.