system and method for identifying and linking users having matching confidential information

ABSTRACT

A system and method for identifying and linking users having matching confidential information, the system comprising: a database for storing user information in a manner such that one or more data fields representing at least a portion of the user information are associated with respective confidentiality levels; a matching engine for identifying matching information in the data fields; and a linking unit for linking two or more users associated with matching information identified by the matching engine.

FIELD OF INVENTION

The present invention relates to a system and method for identifying andlinking users having matching confidential information.

BACKGROUND

In the Internet, there are many websites for linking individual toindividual, individual to services, individual to products and toprovide information and search capabilities for information on theindividual, services and products. Many of these websites do not haveprotection for their subscribers from fake identities, cheats andswindlers. This affects true identities, genuine services and products,as they may also be deemed as untrustworthy.

As such, people are afraid to reveal confidential information andwithhold information to protect their own interests. With limited orwrong information, it is inherently difficult to find a good match towhat an individual is looking for, and similarly it is thus difficult,if not impossible to recommend good choices and advertise to theindividual what is needed at the right time. Indeed, many times peopleend up not getting what they truly require from such websites.

While there are also many trusted websites around, these trustedwebsites are dedicated to provide to a niche market only and do not havethe capability to provide services, products and to link individuals ata global level and to tap into other genuine resources.

Furthermore, though many websites are available to link individuals,there appears to be few or no websites with comprehensive facilitiescatering to or linking corporation to corporation, corporation toservices, corporation to products and to provide information and searchcapabilities for information on the corporation, services and products.

Furthermore, existing website fail to capture the “natural” flow oftransactions between persons, either as individuals or asrepresentatives of companies, organisations etc., in particular whenthose transactions relate to confidential information. As a result, formany scenarios, existing websites have not managed to replace or enhancethe conventional person-to-person transactions and negotiations.

A need therefore exists to provide a system and method for identifyingand linking users having matching confidential information thataddresses at least one of the above-mentioned problems.

SUMMARY

In accordance with one aspect of the present invention, there isprovided a system for identifying and linking users having matchingconfidential information, the system comprising: a database for storinguser information in a manner such that one or more data fieldsrepresenting at least a portion of the user information are associatedwith respective confidentiality levels; a matching engine foridentifying matching information in the data fields; and a linking unitfor linking two or more users associated with matching informationidentified by the matching engine.

The linking unit may alert the users associated with the matchinginformation by sending electronic messages to the users.

The system may further comprise a communication platform forfacilitating negotiation between the users.

The communication platform may comprise one or more of a groupconsisting of:

-   -   an email server;    -   a messaging application;    -   an Internet telephony application; and    -   a video conferencing application.

The database may further store data representing reference informationfor users.

The system may further comprise a referencing platform for displayingreference information of one user associated with the matchinginformation to another user associated with the matching information.

The reference platform may provide links to other reference informationassociated with the reference information displayed for establishing achain of references for authenticating trustworthiness of the respectiveusers.

The other reference information may comprise reference informationstored in the database of the system, reference information stored at anexternal source, or both.

The system may further comprise a search platform for user input ofsearch criteria, and the search platform is coupled to the matchingengine for identifying information in the data fields matching thesearch criteria.

In accordance with another aspect of the present invention, there isprovided a method for identifying and linking users having matchingconfidential information, the method comprising: storing userinformation in a database in a manner such that one or more data fieldsrepresenting at least a portion of user information are associated withrespective confidentiality levels; identifying matching information inthe data fields utilising a matching engine; and linking two or moreusers associated with matching information identified utilising alinking unit.

The method may further comprise alerting the users associated with thematching information by utilising the linking unit to send electronicmessages to the users.

The method may further comprise facilitating negotiation between theusers utilising a communication platform.

The communication platform may comprise one or more of a groupconsisting of:

-   -   an email server;    -   a messaging application;    -   an Internet telephony application; and    -   a video conferencing application.

The method may further comprise storing data representing referenceinformation for users in the database.

The method may further comprise displaying reference information of oneuser associated with the matching information to another user associatedwith the matching information utilising a reference platform.

The method may further comprise establishing a chain of referenceslinking to other reference information associated with the referenceinformation displayed for authenticating trustworthiness of therespective users utilising the reference platform.

The other reference information may comprise reference informationstored in the database of the system, reference information stored atexternal sources, or both.

The method may further comprise inputting search criteria; andidentifying information in the data fields matching the search criteriautilising the matching engine.

In accordance with yet another aspect of the present invention, there isprovided a data storage device containing computer readable code meansfor instructing a computer system to execute a method for identifyingand linking users having matching confidential information, the methodcomprising: storing user information in a database in a manner such thatone or more data fields representing at least a portion of userinformation are associated with respective confidentiality levels;identifying matching information in the data fields utilising a matchingengine; and linking two or more users associated with matchinginformation identified utilising a linking unit.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention will be better understood and readilyapparent to one of ordinary skill in the art from the following writtendescription, by way of examples only and in conjunction with thedrawings, in which:

FIG. 1 shows the system architecture of an example embodiment of thepresent invention.

FIG. 2 is a flowchart of the method according to an example embodimentof the present invention.

FIG. 3 illustrates two end users communicating according to an exampleembodiment of the present invention.

FIG. 4 is a web user interface according to an example embodiment of thepresent invention.

FIG. 5 illustrates a web user interface having cascading referencingwindows according to an example embodiment of the present invention.

FIG. 6 illustrates a schematic drawing of a computer system forimplementing the Intelligent Matching System according to the exampleembodiment.

DETAILED DESCRIPTION

The described embodiments provide an intelligent matching system andmethod which replicate or enhance the real life process of personswanting to transact with each other, in particular wanting to transactwith each other for exchange of products, services, or information.

Some portions of the description which follows are explicitly orimplicitly presented in terms of algorithms and functional or symbolicrepresentations of operations on data within a computer memory. Thesealgorithmic descriptions and functional or symbolic representations arethe means used by those skilled in the data processing arts to conveymost effectively the substance of their work to others skilled in theart. An algorithm is here, and generally, conceived to be aself-consistent sequence of steps leading to a desired result. The stepsare those requiring physical manipulations of physical quantities, suchas electrical, magnetic or optical signals capable of being stored,transferred, combined, compared, and otherwise manipulated.

Unless specifically stated otherwise, and as apparent from thefollowing, it will be appreciated that throughout the presentspecification, discussions utilising terms such as “searching”,“matching”, “linking”, or the like, refer to the action and processes ofa computer system, or similar electronic device, that manipulates andtransforms data represented as physical quantities within the computersystem into other data similarly represented as physical quantitieswithin the computer system or other information storage, transmission ordisplay devices.

The present specification also discloses apparatuses for performing theoperations of the methods. Such apparatus may be specially constructedfor the required purposes, or may comprise a general purpose computer orother device selectively activated or reconfigured by a computer programstored in the computer. The algorithms and displays presented herein arenot inherently related to any particular computer or other apparatus.Various general purpose machines may be used with programs in accordancewith the teachings herein. Alternatively, the construction of morespecialized apparatus to perform the required method steps may beappropriate. The structure of a conventional general purpose computerwill appear from the description below.

In addition, the present specification also implicitly discloses acomputer program, in that it would be apparent to the person skilled inthe art that the individual steps of the method described herein may beput into effect by computer code. The computer program is not intendedto be limited to any particular programming language and implementationthereof. It will be appreciated that a variety of programming languagesand coding thereof may be used to implement the teachings of thedisclosure contained herein. Moreover, the computer program is notintended to be limited to any particular control flow. There are manyother variants of the computer program, which can use different controlflows without departing from the spirit or scope of the invention.

Furthermore, one or more of the steps of the computer program may beperformed in parallel rather than sequentially. Such a computer programmay be stored on any computer readable medium. The computer readablemedium may include storage devices such as magnetic or optical disks,memory chips, or other storage devices suitable for interfacing with ageneral purpose computer. The computer readable medium may also includea hard-wired medium such as exemplified in the Internet system, orwireless medium such as exemplified in the GSM mobile telephone system.The computer program when loaded and executed on such a general-purposecomputer effectively results in an apparatus that implements the stepsof the preferred method.

FIG. 1 shows the system architecture 100 of an example embodiment of thepresent invention.

An Intelligent Matching System (IMS) 108 is connected to the Internet104. The IMS 108 hosts a website which remote user computers 102 canaccess via the Internet. It is appreciated that the computer 102 may bea desktop computer, a server or a mobile device such as a personaldigital assistant (PDA), a laptop computer, a mobile phone or the like.The IMS 108 provides intelligent matching services to end users on theircomputers 102. The IMS 108 stores all data representing products,services, or information posted or entered by end users on the websiteas data fields in a database 110. References in the present patentspecification to saving or storing information in or at the IMS areunderstood to be information saved or stored at the database 110.Further, references in the present patent specification to clickablelinks, hyperlinks or the like are understood to be clickable through theuse of an electronic mouse pointer on a computer display.

In the example embodiment, users wanting to use the intelligent matchingservices provided by the IMS 108 open an online account through thewebsite. Subsequently, users login to the IMS 108 by entering the rightusername and password to gain access to their user account with the IMS108.

After opening an account with the IMS 108, users are able to postinformation on the website from the computer 102 via the website userinterface. Information to be posted is sent to the IMS 108 for storagein the database 110. The IMS 108 posts the information on the websiteaccording to the user settings, which the user sets through the websiteuser interface. All user settings and information posted or entered arestored at the database 110 by the IMS 108. In the example embodiment,users may refer to States and all types of government or privatecorporate organizations and not just restricted to individuals. Eachaccount entitles the user to a limited amount of data storage space inthe database for storing information posted by the user.

In the example embodiment, after a user logs into its account, the useris led to a main menu webpage. By clicking on a hyperlink in the mainmenu webpage, the user calls out a user settings webpage. The purpose ofthe user settings webpage is for the user to make preferred settings onthe features and services available to its account on the IMS 108. Forinstance, to select, disable or enable a particular feature or serviceavailable on IMS 108, the user checks or unchecks a checkbox in the usersettings webpage. In the example embodiment, user setting options are 1)type of classification system used for classifying information, 2) IMS108 recommended classification system, 3) most popular classificationsystem, 4) type of search/matching engine 112 used by IMS 108 to performsearching/matching, 5) use of an information matching percentage(details provided below) and 6) use of IMS automatic matching function(details provided below). An example of an information search/matchingengine 112 used by the IMS 108 is the IBC Engine by IBC Systems. Anexample of an information classification system used by the IMS 108 isthe Acyclic Graph Classification System by Elysium.

In the example embodiment, information is categorized or classified intodifferent categories and subcategories. Each category and sub-categoryof information has many associated attributes and the information isadvantageously classified into a plurality of confidentiality levels orstate of confidence, from the most confidential information e.g. level 5to the least confidential information e.g. level 0. Level 0 informationis information users wish to make available to the world at large.Information at other levels is not to be disclosed to any one unless theuser makes the setting to allow the information under the specificcategory and confidentiality level to be disclosed.

Advantageously, users have full control over the categorization andconfidentiality setting of the information they post. For theconvenience of users, the IMS 108 contains a list of predefinedcategories, sub-categories, attributes of the categories/sub-categoriesand confidentiality settings where users can choose to use and apply.

Examples of pre-defined categories, sub-categories and attributes ofinformation and the accompanying confidentiality levels set by the IMS108 are as follow.

Example of information that is entered by a job seeker:

-   Category: People    -   Sub-category: Occupation    -   Sub-category: Field    -   Sub-category: Information Technology        -   Sub-category: Job Openings—Sub-category of Occupation:            Software Engineer            -   Attributes of Software Engineer:                -   Level 0: Name                -   Level 1: qualifications, awards                -   Level 2: past working experience, character                -   Level 3: values, interests                -   Level 4: friends, relatives                -   Level 5: Medical History, ideal working                    requirements, ideal pay

Example of information that is entered by a corporation wanting toemploy a software engineer:

-   Category: Corporation    -   Sub-category: Type of business    -   Sub-category: Information Technology    -   Sub-category: Job Openings        -   Sub-category of Job openings: Software Engineer            -   Attributes of Software Engineer:                -   Level 0: qualifications, awards, character, job                    scope                -   Level 1: values, interests                -   Level 2: preferred company previously worked for                -   Level 3: Ideal pay

Example of information that is entered by a person wanting to buy aparticular type of handbag:

-   -   Category: Product        -   Sub-category: Buying products        -   Sub-category: Handbag            -   Attributes of Handbag:                -   Level 0: dimensions, strap type, design                -   Level 1: quality assurance, colour, brand, reviews                -   Level 2: who owns one, who reviewed                -   Level 4: price

Example of information that is entered by a person wanting to sell aparticular type of handbag:

-   -   Category: Product        -   Sub-category: Selling products        -   Sub-category: Handbag            -   Attributes of Handbag:                -   Level 0: dimensions, strap type, design, user                    reviews                -   Level 1: quality assurance, colour, brand                -   Level 2: who owns one                -   Level 4: price

Example of information that is entered by a corporation offering aparticular type of Laundry Service:

-   -   Category: Service        -   Sub-category: Service Offered        -   Sub-category: Laundry service            -   Attributes of Laundry service:                -   Level 0: time to deliver, benefits of service,                    company name                -   Level 1: methodology, costs, depth of service                -   Level 2: quality, past customers                -   Level 4: reviews                -   Level 5: company financials

Example of information that is entered by a person seeking a particulartype of Laundry Service:

-   -   Category: Service        -   Sub-category: Service Sought        -   Sub-category: Laundry service            -   Attributes of Laundry service:                -   Level 0: time to deliver, benefits of service,                    company name                -   Level 1: methodology, costs, depth of service                -   Level 2: quality, past customers                -   Level 4: reviews                -   Level 5: company financials

Information posted by users in all confidentiality levels is accessibleby the IMS 108. In the example embodiment, if a user checks the checkboxfor enabling the IMS automatic matching function, the IMS 108 is set toautomatically search and match information of all user postedinformation in all confidentiality levels stored in the database 110including information available in external Internet sources. Forinstance, if a first user posts a piece of information in its accountand a second user have already posted or at a later stage posts a pieceof information in its account that matches the piece of informationposted by the first user, the IMS 108 automatically informs the user ofa match.

In the example embodiment, the matching process performed by the IMS 108is based on the category, sub-category and attributes. For instance, ina first step, the IMS 108 proceeds to match the categories classified bythe first user and second user. Once a match in words, text or numbersis found in the categories, the IMS 108 proceeds to match the words,text or numbers in the sub-categories classified by the first user andsecond user in a second step. Once a match in words is found in thesub-categories, the IMS 108 proceeds to match the words used to describethe attributes entered by the first user and second user in a thirdstep. It is appreciated that the matching of words is not restricted tomatching word for word e.g. a category named ‘People’ in the first useraccount is matched to the same category named ‘People’ in the seconduser account. Matching of words also involves matching related words andphrases and considers the language used by the users and their motivese.g. the sub-category of a corporation employing ‘Type of business’ ismatched with the sub-category of a job seeker ‘Field’. It is alsoappreciated that besides text, the category, sub-categories andinformation in the attributes may be extended to include pictures,videos and sound clips where the IMS 108 uses the appropriate matchingtechnologies for matching the pictures, videos and/or sound clips.

Besides the automatic matching function, the IMS 108 comprises a searchplatform where users can choose to use a manual search function byrequesting via the website for the IMS 108 to search on any userprovided keywords and phrases, i.e. search parameters, that matches theinformation accessible to the IMS 108. Users of the manual searchfunction may be non-account holders, or existing account holders of theIMS 108 that need to conduct a search on certain information not alreadyposted in their account. The search results returned may be immediate ordelayed depending on the availability of the information required, theextent of the search involved and depending on the time frame forconducting the search so set by the user to capture the latestinformation being released, i.e. being released from confidentiality orbeing published in external Internet sources. The search parameters usedby the user may be saved by the IMS 108, be given or be set with aconfidentiality level, and made searchable by the IMS 108. It isappreciated that besides text, search parameters may be extended toinclude pictures, videos and sound clips where the IMS 108 uses theappropriate matching technologies for the pictures, videos and/or soundclips.

In both the automatic matching function and the manual search function,if a match occurs, a linking unit 114 of the IMS 108 will alert the userthrough online messaging applications (e.g. a chat program), pop upmessages/advertisements, emails, Short Messaging Service (SMS),Multimedia Messaging Service (MMS) or the like. It is appreciated thatan email server is connected to the IMS 108 for controlling the sendingand receiving of emails.

If a match is found in external Internet sources and if the informationis already available to the public domain, the IMS 108 will return awebpage containing the information to the user initiating the search orthe user who has posted information in the case of automatic matchingfunction in operation.

If the information is not available to the public domain or requiresregistration, payment to access or authorization to access, the IMS 108will return a webpage linked to the external trusted Internet source forregistration, payment or authorization to the user.

If a match in the keywords or phrase is found in another user account ata particular category and confidentiality level, the confidentialinformation relating to the match will be returned only if the otheruser has allowed access to the confidential information. If the otheruser disallows access to the confidential information, the IMS 108 willreturn a webpage at least showing information relating to thecredibility of the other user (as much as the other user allowedrevealing), brief description of the confidential information containingthe matched information that is yet to be revealed and its level ofconfidentiality, and having at least the options for further negotiationto reveal confidential information, payment sought for accessinginformation (if so required), registration for accessing information (ifso require), or authorization means to gain access to the confidentialinformation (if so require) to the user seeking the information. Anexample of authorization means would be entering the authorized usernameand password to gain access.

Where there are multiple matches or hits, the IMS 108 will return in awebpage a list of the matching candidates and their links to the webpages mentioned in the above scenarios to the user initiating thesearch. The IMS 108 has the ability to sort the list of matchingcandidates in the order of most trustworthy and most relevant to thesearch parameters or user entered information in the case of automaticmatching function in operation to the least relevant to the searchparameters or user entered information and least trustworthy. Relevancyof information is gauged based on the information matching percentage.For example, a word for word match is 100%. Details on determination oftrustworthiness are described below.

In case the user does not get any search/matching results for a searchor automatic matching by IMS 108 due to over demanding criteria orsearch parameters, mechanisms are provided by the IMS 108 for the userto lower the information matching percentage so that less relevantsearch/matching results fulfilling some but not all the criteria willappear.

Negotiation to reveal confidential information may be carried outthrough the web platform of the IMS 108. In the example embodiment, thiscan be achieved through communication means such as a built-in messagingand/or email application on the web platform of the IMS 108, wheremessages and/or emails only for the attention of the other user can besent. The history of the messages and emails may be stored by the IMS108 into the database 110 and be made searchable. Similar toconfidential information posted by any user, the parties involved in thenegotiation can categorize the contents of the messages and emails andset the confidentiality level of the contents of the messages andemails. If a match is found in the contents of the messages and emailsof the negotiation, the parties involved in the negotiation will show upas matching candidates. It is appreciated that the built-in messagingapplication enabling online chat may incorporate SMS and/or MMSmessaging features to communicate with the parties involved via a mobiletelecommunication network.

It is appreciated that the exchanges in the emails and messaginginterfaces in a negotiation can be offline where each party checks eachother's emails or messages at their own convenience, or in real time ifboth parties are logged in to the IMS 108 at the same time.

It is appreciated that besides email and messages, the IMS 108 canprovide other communication means for online meeting between the partiesthrough Internet telephony or video conferencing in a negotiation.

Such negotiations to reveal information may lead to a transaction orinteraction taking place between the parties. Examples of transactionsand interactions are the purchase and sale of items, employment ofstaff, engaging certain services, and establishing personalrelationships. If involving more than one party, transactions andinteractions can also mean hosting an online private auction withselected users allowed to view information relating to the auction,attending an online seminar/meeting/lecture or the like. The IMS 108provides the appropriate user interface to aid the carrying out of suchtransactions. For example, providing electronic payment means forpurchase and sale of items, providing electronic file transfer means,provide means for setting up blogs or information disclosure platforms,and providing video conferencing, text/voice messaging and email meansfor establishing personal relationship and for communication between therelevant parties. It is appreciated that each piece of informationdisclosed can be set by the user to be accessible only to selected usersand the extent of information revealed can vary for each selected user.

The IMS 108 determines whether negotiation is successful based onwhether the users reveal their confidential information in higherconfidentiality levels and whether the users have initiated for atransaction or interaction to take place. Successes can be logged andsuccess rates of users in negotiation can be calculated for use in, forexample, assigning a trustworthiness rating, indicate ease of doingbusiness etc.

Besides posting information about one's desires and preferences, userscan post information such as accolades, accreditations, credentials andreferrals to establish their credibility to other users. Based on theposting of such information and the user setting on how much to reveal,the IMS 108 reveals information relating to the user's credibility toother users accordingly. This advantageously establishes trust betweenusers.

To further establish trust in case the accolades, accreditations,credentials and referrals are unfamiliar to the user seeking informationon another user, in the IMS 108, clickable references or links to theaccolades, accreditations, credentials and referrals of users areprovided (subject to the users permission to reveal) in the website toopen up windows of web pages relating to the accolades, accreditations,credentials and referrals. The links of the accolades, accreditations,credentials and referrals may be web pages of other user accounts or webpages of external Internet sources, which in turn contains more links toaccolades, accreditations, credentials and referrals. This chain ofreferencing and opening of cascading webpages will carry on as the userseeking information continues to open up more links until the user findsthe accolades, accreditations, credentials and referrals that it isfamiliar with and comfortable for the user to trust the unknown user andunknown user's revealed information. This process effectively accreditsunknown users to other users.

To ensure the search results returned are genuine, the IMS 108advantageously provides options for users to select through the websiteto return only matched information that has been authenticated byrecognized and reputable external parties or recognized and reputableusers having an account with the IMS 108 such as politicians, banks,universities and institutions etc. In this regard, the IMS 108 alsoprovides options for users to authenticate the truth of other user'sinformation and statuses.

To provide further proof for user integrity and user information, theIMS 108 includes online features for users to execute online or torequest for execution and the publication of scanned original copies ofstatutory declaration, affidavits, certified documents, notarizeddocuments, legalized documents or other legal tools, which areauthenticated by authorized and trustworthy personnel or organizations.This can be done at the time the user opens an account with IMS 108.

The IMS 108 can advantageously make use of the number of successfultransactions, the number of authentications by reputed parties or usersof the IMS 108 to genuine information posted by a user and the user'sintegrity, the search parameters used by users, the information postedby users and stored by the IMS 108 in the database 110, and thenegotiation contents, to determine what exactly a user requires andautomatically recommend a link up i.e. if the automatic matchingfunction is enabled to trusted online resources or other recognizedusers, advertise genuine products and services based on the user'sposted information on its desires, interests and preferences, and returntrustworthy search/matching results to the user accordingly. Based onthe above information, the IMS 108 can terminate user accounts ofuntrustworthy users and provide a trustworthiness rating for each useraccount and the posted information by the IMS 108 accordingly.

The IMS 108 employs appropriate network security technologies, such asfirewalls, user authentication techniques, data encryption, anti-spywaresoftware, anti-virus software or the like to protection the confidentialinformation from being leaked into the Internet or retrieved byunauthorized personnel.

FIG. 2 is a flowchart of the method employed by the IMS (108 in FIG. 1).

At step 200, a user using the manual search function inputs searchparameters to look for information in the IMS 108 that matches thesearch parameters.

Step 216 is another scenario that may cause the use of the method. Inthis case, a user having an account with the IMS (108 in FIG. 1) enablesthe automatic matching function.

At step 202, the IMS (108 in FIG. 1) performs the search and matches thesearch parameters or information posted on the user's desires, interestsand preferences with the stored information in the database (110 in FIG.1).

On finding a match, the IMS (108 in FIG. 1) automatically alerts theuser at step 204. As mentioned previously, alerting the user can bethrough online messaging applications, pop up messages/advertisements,emails, Short Messaging Service (SMS), Multimedia Messaging Service(MMS) or the like.

At step 206, the user filters through the search/matching resultsreceived through the alerting means in step 204 and sorted in order ofmost trustworthy rating and most relevant based on the informationmatching percentage to least trustworthy rating and least relevant. Eachsearch result is a link to either the matched information (if so allowedby other users to be viewed), external Internet resources or other useraccounts containing the matched information. If the automatic matchingfunction is enabled, the link to the matched information will indicatewhat in the user's posted information triggered the IMS to automaticallyfind a match. Each search/matching result contains a list of accolades,accreditations, credentials and referrals as much as is disclosed by theuser and a trustworthiness rating by the IMS (108 in Figure). If theuser does not trust the trustworthiness rating and finds the accolades,accreditations, credentials and referrals unfamiliar, the user may gothrough the chain of referencing by opening cascading webpages throughclicking hyperlinks until the user is satisfied that the link istrustworthy.

Next, the IMS (108 in FIG. 1) checks whether the user can access theinformation in the search/matching results at step 212.

If the search/matching results are not confidential and accessible tothe user, disclosure of information takes place at step 208.

If the search/matching result leads to undisclosed information of otherusers, which is inaccessible to the user, negotiation between the userrequesting for the confidential information and the user who posted theundisclosed information will take place. The IMS system then determineswhether negotiation is successful at step 214 based on whether the usersreveals their confidential information in higher confidentiality levelsand whether the users have initiated for a transaction or interaction totake place.

If negotiation is successful, disclosure of information takes place atstep 208.

If negotiation is unsuccessful, further negotiation can be initiated.The success of the negotiation is tested again at step 214.

After disclosure of information, a transaction or interaction may occurbetween both parties at step 210. A transaction or interaction mayinclude, as mentioned previously, for instance, the purchase and sale ofitems, employment of staff, engaging certain services, and establishingpersonal relationships.

FIG. 3 illustrates two end users communicating according to an exampleembodiment of the present invention.

FIG. 3 shows a system architecture 300 that is similar to the systemarchitecture (100 in FIG. 1) in FIG. 1 except that the systemarchitecture 300 shows two users 302, 304 to each another communicatingvia IMS 108 after login to their respective user accounts with IMS 108.

User 302 previously entered confidential information into its accountand saved them through the IMS web interface into database 110.Similarly, User 304 previously entered confidential information into itsaccount and saved them through the IMS web interface into database 110.

User 302 has enabled the automatic matching function of the IMS 108. Inthis example, the information in the account of User 304 containsmatched information corresponding to the confidential informationpreviously entered by User 302.

FIG. 4 shows an example of a web user interface hosted by the IMS 108 asviewed on the computer display of user 302. It is appreciated thatcorresponding windows will be displayed on the computer display of User304.

In the example embodiment, there is a computer display 400 having threewindows, a negotiation window 402, a User 304 information disclosurewindow 404 for displaying information entered by User 304 and a User 302information disclosure window 406 for displaying information entered byUser 302.

The negotiation window 402 is part of a communication platform of theIMS that displays emails and messages revealed to users selected by User302. In this example, User 302 selects only User 304 to see its emailsand messages. It is appreciated that the negotiation window 402 maycontain a list of unexpanded emails and messages, which are expandableto reveal details of the emails and messages upon clicking acorresponding hyperlink or icon (Not shown in FIG. 4).

The User 304 information disclosure window 404 displays informationreleased for disclosure by User 304, based on selected confidentialitylevel(s). Additionally, a brief summary of information not yet fullyreleased for disclosure by User 304 may be displayed, again based onselected confidentiality level(s). Matched information previouslyidentified by the IMS may be displayed in a different colour from thenormal text colour. It is appreciated that other highlighting means maybe used, e.g. setting different colour background, different fonts etc.

The User 302 information disclosure window 406 provides an interface forthe User 302 to manage display of its information to User 304 based onthe confidentiality levels. It will be appreciated that the informationreleased by User 302 for display to User 304 is displayed by the IMS ina corresponding User 302 information disclosure window on User 304'scomputer display. Matched information can again be displayed in adifferent colour from the normal text colour. It is appreciated thatother highlighting means may be used, e.g. setting different colourbackground, different fonts etc.

The User 304 information disclosure window 404 may display referencesrevealed by User 304 to User 302. This IMS in the example implementationprovides users with a reference platform with the ability to review achain of references, to satisfy themselves of the trustworthiness of theother party. More particular, if the User 302 clicks on a hyperlinkrepresenting the revealed reference for User 304, further windows 404 a,404 b relating to cross-references on the revealed reference such asaccolades, accreditations, credentials and referrals existing in the IMSwill show up to further authenticate trustworthiness, as shown in FIG.5. The cascading windows 404 a, 404 b may comprise windows populatedfrom data in the IMS or web pages from external Internet sources. User302 may open as many windows relating to cross-references until User 302sees a familiar reference and sufficient trust on User 304 isestablished, or alternatively, if the chain ends without User 302 havingconfirmed the trustworthiness of User 302, this may lead to User 302terminating the negotiation with User 304.

FIG. 6 shows another example of a web user interface hosted by the IMS108 as viewed on the computer display of User 302. It is appreciatedthat corresponding windows will be displayed on the computer display ofUser 304.

In the example embodiment, there is a computer display 600 comprisingten windows, two negotiation windows 602 and 606, a personnel selectionwindow 604, a User 302 data edit window 608, a User 302 informationdisclosure window 610, a User 304 information disclosure window 616, aUser 302 reference window 622, a User 302 product/service referencewindow 624, a User 304 reference window 626 and a User 304product/service reference window 628.

Negotiation windows 602, 606 are part of the communication platform ofthe IMS that displays past and present emails and/or messages of User302 and User 304 respectively. The negotiation windows 602, 606 containa list of unexpanded emails and messages sorted in chronological orderor in other orders. The unexpanded emails and messages are expandable toreveal details of the emails and messages by clicking on thecorresponding hyperlink or icon (Not shown in FIG. 6) of the unexpandedemails and messages. In the example embodiment, negotiation window 602contains individual emails or messages, or blocks of emails or messagesof past and present emails and/or messages of User 302, which User 302has allowed User 304 to view. The negotiation window 606 contains pastand present emails and/or messages belonging to User 304, which User 304has allowed User 302 to view. Each email or message, or block of emailsor messages is given a confidentiality level. User 302 reveals the emailor message, or block of emails or messages to User 304 based on theselected confidentiality level(s).

The personnel selection window 604 contains a list of personnel andauthorities, which User 302 previously entered into the IMS, whom User302 wants to be linked up with. For example, the User 302 may enter orselect from the interface in the personnel selection window 604 allpersonnel having a specific person or authority as referral, belongingto or come from a particular institution, having a particularskill/occupation/hobby/interest, living in a particular area, visited aparticular website, . . . , etc. This narrows the scope of search formatching information by the IMS when the automatic matching function isenabled.

The User 302 data edit window 608 is for User 302 to add or editinformation already entered and saved in the IMS. Information entered byUser 302 is not restricted to any topic. For illustration purposes,information entered by User 302 may be products sold by User 302,products User 302 is seeking to purchase, services offered by User 302,services User 302 is seeking, and personal information of User 302including preferences, desires, interests, personality, . . . , etc. Inthe example embodiment, each word, phrase or statement, each picture,each video recording or each voice recording of the information enteredinto the IMS are given a confidentiality level and this facilitates therevealing of information in a structured manner.

User 302 can add, swap, append or edit categories, sub-categories andattributes to define a structure of how he or she wishes to presentcertain information. It is appreciated that unclassified information canalso be entered into window 608 without being classified under anycategory, sub-category and/or as an attribute if User 302 so desires. Inthe example embodiment, each attribute is a clickable hyperlink, whichwhen clicked by a mouse pointer 630 reveals user-entered informationsuch as text, pictures, voice recordings, video recordings, hyperlinksto information or any suitable means for representing information. Suchuser-entered information may be displayed in the window containing theattribute that is clicked on or in a separate window. For convenience,User 302 may use pre-determined category, sub-category and attributesprovided by the IMS.

Matched information is displayed in a different colour from the normaltext colour. It is appreciated that other highlighting means may beused, e.g. setting different colour background, different fonts etc. Ifthe matched information is located in an unexpanded category,sub-category and attribute, the category, sub-category and attribute maybe highlighted to indicate that the match information is classifiedunder it.

In the example embodiment, when the User 302 data edit window 608 isopened, it displays selectable hyperlinks of unexpanded categoriesand/or attributes, which are pre-stored in the IMS for convenient use byusers or created by User 302. The arrangement of the categories andattributes may be prearranged by the IMS or determined by the User 302.When the hyperlinks to the categories are clicked on, the categoryexpands to reveal more attributes relating to the category, and/orunexpanded sub-categories relating to the category. The unexpandedsub-categories can be further expanded to display more unexpandedsub-categories relating to the unexpanded sub-categories, or moreattributes relating to the expanded sub-category. It is appreciated thatexpanding a category or sub-category may mean revealing furthersub-categories or attributes in the same window 608 or open up morewindows containing sub-categories or attributes relating to the categoryor sub-categories. It is further appreciated that a sub-category may bea previously displayed sub-category if the information between thesub-categories are so linked. Each category, sub-category and attributemay be given a confidentiality level by User 302.

The User 302 information disclosure window 610 provides an interface forUser 302 to manage display of information to User 304 based onconfidentiality levels. In the example embodiment, the User 302information disclosure window 610 is split into two parts. A first part612 displays information released by User 302 for display to User 304. Asecond part 614 displays information, which User 302 has not revealed toUser 304. Information in the first and second parts 612, 614 arearranged in the similar manner as the User 302 data edit window 608,i.e. unclassified information and unexpanded categories are firstdisplayed and the unexpanded categories can be expanded to displaysub-categories and attributes.

If the first part 612 is empty, which means no information is revealedby User 302 to User 304, the second part 614 will contain exactly thesame information as the User 302 data edit window 608. During operation,if User 302 selects information in a particular category with up to aselected confidentiality level to be revealed to User 304, all theinformation in the particular category with confidentiality level lowerthan the selected confidentiality level will be displayed in the firstpart 612. The just revealed information will disappear from the secondpart 614.

Matched information in both parts 612, 614 determined by the IMS will bedisplayed in a different colour from the normal text colour. It isappreciated that other highlighting means may be used, e.g. settingdifferent colour background, different fonts etc. If the matchedinformation is located in an unexpanded category, sub-category andattribute, the category, sub-category and attribute may be highlightedto indicate that the match information is classified under it.

In the example embodiment, both User 302 and User 304 have full controlover the information to be revealed and displayed to one another.However, the name or alias of User 302 and User 304 is the onlyinformation that is uncontrollable by the Users and has to be revealedfor purposes of identification. The IMS can provide for the alias to bechangeable so that a user may keep his or her identity anonymous.

The User 304 information disclosure window 616 displays informationreleased to User 304 by User 302 based on selected confidentialitylevel(s). Additionally, a brief summary of information not yet fullyreleased for disclosure by User 304 may be displayed, again based onselected confidentiality level(s). In the example embodiment, the User304 information disclosure window 616 is split into two parts. A firstpart 618 displays information released by User 304 for display to User302. A second part 620 displays a brief summary of information not yetfully released for disclosure by User 304. The brief summary maycomprise category, sub-category or attribute headers. Information in thefirst and second parts 618, 620 are arranged in the similar manner asthe User 302 data edit window 608, i.e. unclassified information andunexpanded categories are first displayed and the unexpanded categoriescan be expanded to display sub-categories and attributes.

Matched information in both parts 618, 620 determined by the IMS will bedisplayed in a different colour from the normal text colour. It isappreciated that other highlighting means may be used, e.g. settingdifferent colour background, different fonts etc. Similarly, if thematched information is located in an unexpanded category, sub-categoryand attribute, the category, sub-category and attribute may behighlighted to indicate that the match information is classified underit.

The User 302 reference window 622, the User 302 product/servicereference window 624, the User 304 reference window 626, and the User304 product/service reference window 628, are parts of the referenceplatform of the IMS.

The User 302 reference window 622 contains details or a list of all thereferences entered by User 302 for authenticating purposes. User 302 hascontrol over whether to reveal one or more of the references in the listto User 304 based on confidentiality level(s). In the exampleembodiment, each reference or a block of references are given aconfidentiality level and User 302 can select the revealing of allreferences corresponding to a common confidentiality level to User 304.Where the references are hyperlinks, User 302 can call out a chain ofcascading windows containing cross-references relating to User 302 byclicking on the hyperlinks starting from reference window 622. Theinformation in the cascading windows may be populated from data in theIMS or web pages from external Internet sources associated with thereferences entered in the User 302 reference window 622 or entered byUser 302.

The User 302 product/service reference window 624 contains details or alist of all the references entered by User 302 for proving theauthenticity of the products and/or service User 302 possesses or isproviding. Similarly, User 302 has control over whether to reveal one ormore of the references in the list to User 304 based on confidentialitylevel(s). Similar to the User 302 reference window 622, each referenceor a block of references are given a confidentiality level and User 302can select the revealing of all references corresponding to a commonconfidentiality level to User 304. Where the references are hyperlinks,User 302 can call out a chain of cascading windows containingcross-references relating to the products and/or services User 302possesses or is providing by clicking on the hyperlinks starting fromreference window 622. The information in the cascading windows may bepopulated from data in the IMS or web pages from external Internetsources associated with the references entered in the User 302 referencewindow 622 or entered by User 302.

The User 304 reference window 626 contains details and/or a list of allthe references revealed by User 304 to User 302 for proving theauthenticity of User 304. Where the references are hyperlinks, User 302can call out a chain of cascading windows containing cross-referencesrelating to the User 304 or previous reference by clicking on thehyperlinks in each reference window starting from reference window 626.The information in the cascading windows may be entered by User 304 orpopulated from data in the IMS or web pages from external Internetsources associated with the references entered in a correspondingreference window that is similar to the User 302 reference window 622appearing on the computer display of User 304.

The User 304 product/service reference window 628 contains detailsand/or a list of all the references revealed by User 304 to User 302 forproving the authenticity of the products and/or service User 304 isproviding. User 302 can call out a chain of cascading windows byclicking on the hyperlinks in each reference window containingcross-references relating to the products and/or service User 304possesses or is providing. The information in the cascading windows maybe entered by User 304 or populated from data in the IMS or web pagesfrom external Internet sources associated with the references entered ina corresponding reference window that is similar to the User 302reference window 624 appearing on the computer display of User 304.

The IMS (108 in FIG. 1) may be employed in the following examplescenarios.

Scenario 1

A seller cum designer of handbag has information consisting of picturesand description of a handbag product, which contains special features.She has a user account with the IMS. One reason not to place informationof the handbag in the public is that she is afraid that others willstart copying the design, which she has not acquired intellectualproperty protection for. She also only wants someone who has thespecific needs for the special feature of her handbag to purchase it.Hence, she enters and saves the information of the handbag in IMS undera suitable confidentiality level selected by her and enables theautomatic link-up feature of the IMS.

The buyer of the handbag on the other hand does not have time to lookfor a handbag with the special features, which the seller's handbag has.She is also afraid that she might buy a counterfeit handbag or beswarmed by irrelevant sellers after broadcasting her intention to buy ahandbag with such features. Hence, the buyer, who also has a useraccount with the IMS, enters and saves her intention of buying a handbagwith the special feature in IMS under a suitable confidentiality levelselected by her.

The IMS automatically notices a match in the information and alerts theseller to the buyer and vice versa on the next instance the seller orbuyer logins to the IMS to link both parties up. To ensure the seller isnot a cheat, the buyer reviews the seller's revealedcredentials/accreditation (e.g. window 306 in FIG. 3) and thetrustworthiness rating of the seller and the seller's posted informationthat is appended by the IMS. The seller similarly can check the buyer'strustworthiness through the same means. Negotiation on the sale of theproduct is through email and messaging interfaces (e.g. windows 304, 310in FIG. 3), which is provided by the IMS at the seller and buyer end.

Scenario 2

An individual is looking for an ideal job. She is very senior in hercurrent job and does not want many people to know that she is lookingaround. She also does not want to end up having a job not fulfilling herrequirements. Hence, the individual having a user account with the IMSenters and saves her job criteria in IMS under a suitableconfidentiality level selected by her. As she understands that hercriteria may be a too demanding, she also sets the information matchingpercentage for her job criteria to 80%. Therefore so long the otherparty can offer 80% of what she seeks, she will want to consider theother party's offer. She then enables the automatic link up feature ofthe IMS.

A company is looking for a highly qualified senior person and knows thatthe headhunters tend to only specialise in certain sectors. Putting anadvertisement in the papers at large has not been effective and iscostly. Also, as the corporation is world renown, each advertisementattracts enormous amounts of candidates and it is very costly to screenthe candidates one by one. Hence, the corporation having a user accountwith the IMS uses the search function of the IMS to search for the idealcandidate by entering the description of the ideal candidate as searchparameters. No search results turned up initially until a month laterwhen the above-mentioned individual logins to enter her job criteria.

When the match in job criteria has occurred, the IMS alerts bothparties. The name of both parties need not be revealed if they havedecided to keep that confidential. The only indication is thehighlighting of the matched information at both parties' end and ahyperlink for the parties to link to each other.

After linking up, both the individual and the corporation verifies andassesses the authenticity of each other's identities through thereference revealed by both parties. Once the basic trust is established,confidential information can be revealed level by level by both partiesby expressing each other's request through the negotiation platform ofthe IMS. Negotiation to employment can be done through the email andmessaging interfaces (e.g. windows 304, 310 in FIG. 3), which isprovided by the IMS at the individual and corporation end. The exchangesin the emails and messaging interfaces can be offline where each partychecks each other's emails or messages at their own leisure time, or inreal time if both parties are login to the IMS at the same time.

It is appreciated that besides email and messages, the IMS can providemeans for an online meeting between the corporation/seller and theindividual/buyer in the above scenarios through Internet telephony orvideo conferencing.

The IMS described in the example embodiment is a computer system 600,schematically shown in FIG. 7.

The procedures executed by the IMS may be implemented as software, suchas a computer program being executed within the computer system (whichcan be a palmtop, mobile phone, desktop computer, laptop or the like)700, and instructing the computer system 700 to conduct the method ofthe example embodiment.

The computer system 700 comprises a computer module 702, input modulessuch as a keyboard 704 and mouse 706 and a plurality of output devicessuch as a display 708, and printer 710.

The computer module 702 is connected to a computer network 712 via asuitable transceiver device 714, to enable access to e.g. the Internetor other network systems such as Local Area Network (LAN) or Wide AreaNetwork (WAN).

The computer module 702 in the example includes a processor 718, aRandom Access Memory (RAM) 720 and a Read Only Memory (ROM) 722. Thecomputer module 702 also includes a number of Input/Output (I/O)interfaces, for example I/O interface 724 to the display 708 (or wherethe display is located at a remote location), and I/O interface 726 tothe keyboard 704.

The components of the computer module 702 typically communicate via aninterconnected bus 728 and in a manner known to the person skilled inthe relevant art.

The application program is typically supplied to the user of thecomputer system 700 encoded on a data storage medium such as a CD-ROM orflash memory device and read utilising a corresponding data storagemedium drive of a data storage device 730. The application program isread and controlled in its execution by the processor 718. Intermediatestorage of program data maybe accomplished using RAM 720.

Many modifications and other embodiments can be made to the system andits methods by those skilled in the art having the understanding of theabove described disclosure together with the drawings. Therefore, it isto be understood that the system and its utility is not to be limited tothe above description contained herein only, and that possiblemodifications are to be included in the claims of the disclosure.

1. A system for identifying and linking users having matchingconfidential information, the system comprising: a database for storinguser information and data representing reference information for users,the database stores the user information in a manner such that one ormore data fields representing at least a portion of the user informationare associated with respective confidentiality levels; a matching enginefor identifying matching information in the data fields; a linking unitfor linking two or more users associated with matching informationidentified by the matching engine; and a referencing platform fordisplaying reference information of one user associated with thematching information to another user associated with the matchinginformation, wherein the reference platform provides links to otherreference information associated with the reference informationdisplayed for establishing a chain of references for authenticatingtrustworthiness of the respective users.
 2. The system as claimed inclaim 1, wherein the linking unit alerts the users associated with thematching information by sending electronic messages to the users.
 3. Thesystem as claimed in claim 1, wherein the system further comprises acommunication platform for facilitating negotiation between the users.4. The system as claimed in claim 3, wherein the communication platformcomprises one or more of a group consisting of: an email server; amessaging application; an Internet telephony application; and a videoconferencing application.
 5. The system as claimed in claim 4, whereinthe other reference information comprises reference information storedin the database of the system, reference information stored at anexternal source, or both.
 6. The system as claimed in claim 1, whereinthe system further comprises a search platform for user input of searchcriteria, and the search platform is coupled to the matching engine foridentifying information in the data fields matching the search criteria.7. A method for identifying and linking users having matchingconfidential information, the method comprising: storing userinformation in a database in a manner such that one or more data fieldsrepresenting at least a portion of user information are associated withrespective confidentiality levels; storing data representing referenceinformation for users in the database; identifying matching informationin the data fields utilising a matching engine; and linking two or moreusers associated with matching information identified utilising alinking unit; displaying in a referencing platform reference informationof one user associated with the matching information to another userassociated with the matching information; and establishing a chain ofreferences linking to other reference information associated with thereference information displayed for authenticating trustworthiness ofthe respective users utilising the reference platform.
 8. The method asclaimed in claim 7, wherein the method further comprises alerting theusers associated with the matching information by utilising the linkingunit to send electronic messages to the users.
 9. The method as claimedin claim 7, wherein the method further comprises facilitatingnegotiation between the users utilising a communication platform. 10.The method as claimed in claim 9, wherein the communication platformcomprises one or more of a group consisting of: an email server; amessaging application; an Internet telephony application; and a videoconferencing application.
 11. The method as claimed claim 7, wherein theother reference information comprises reference information stored inthe database of the system, reference information stored at externalsources, or both.
 12. The method as claimed in claim 7, wherein themethod further comprising: inputting search criteria; and identifyinginformation in the data fields matching the search criteria utilisingthe matching engine.
 13. A data storage device containing computerreadable code means for instructing a computer system to execute amethod for identifying and linking users having matching confidentialinformation, the method comprising: storing user information in adatabase in a manner such that one or more data fields representing atleast a portion of user information are associated with respectiveconfidentiality levels; storing data representing reference informationfor users in the database; identifying matching information in the datafields utilising a matching engine; and linking two or more usersassociated with matching information identified utilising a linkingunit; displaying in a referencing platform reference information of oneuser associated with the matching information to another user associatedwith the matching information; and establishing a chain of referenceslinking to other reference information associated with the referenceinformation displayed for authenticating trustworthiness of therespective users utilising the reference platform.