Trust in physical networks

ABSTRACT

A trust network has at least one transmission medium supporting transmission of data, wherein data transmitted is in at least some instances transmitted in discrete portions, two or more nodes terminating discrete legs in the transmission medium, and trust software executing from a machine-readable medium by a processor on one or more of the two or more nodes. The one or more nodes executing trust software apply trust logic to transmission of the discrete data portions.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is related to a prior U.S. patent applicationSer. No. 11/967,550, filed on Dec. 31, 2007, the disclosure of which isincorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention is in the field of digital communication, and pertainsmore particularly to systems, hardware and software for aidingparticipants in communication to decide whether, and to what extent totrust other participants in communication and interaction.

2. Description of Related Art

An object of the present invention is to apply and manage concepts oftrust in computerized processes. Trust, however, is not an attribute ofmachines such as computers, but a complicated and not completelyunderstood attribute of human cognition and emotion. People, ininteraction with other people, and also with other animals and machines,especially computerized machines, in order to function smoothly in theworld, are obliged to accomplish an almost continuous flow of decisions.Although in the flow of thought for a person, such decisions are notalways posed as distinct questions with distinct answers, for purposesof this discussion the decision process can be illustrated in that way.Consider two persons in conversation about almost any subject. In theback-and-forth flow of such conversation, each party has to be askinghimself/herself what should I tell this person? Can I answer thatquestion truthfully? What might be the consequences of telling thisperson this particular nugget of information? How well do I know thisperson? Has this person been truthful with me in the past? Has she keptmy confidence? Can I trust her?

Every question/answer, although typically not posed in the flow ofthought as a distinct question to be answered, is a step in the processof trust, and the exchange of information, or deal struck, will beshaped by the answers each person in the conversation makes to these,and other hypothetical questions. In an extreme case of distrust, oneperson might simply cut off the conversation, or, in another instance ofcomplete trust, divulge a large amount of very sensitive information.

Going beyond personal conversation between people in the same room, andnot employing special equipment, consider people in more remoteconversation, such as by telephone. Depending on the type of telephonesystem and equipment used, and also on the purposes of thecommunication, there may be a considerable variety of typicallycomputerized equipment involved. A person placing a call to another overa connection-oriented switched telephony (COST) system, which is a termin telecommunications art for what is also known as the “plain oldtelephone system” (POTS), will be using a telephone connected through alocal switch, which may be computer-telephony integration (CTI) enhanced(or not), and the call may be routed over trunk lines and intermediaryswitches, which may be enhanced with computer functionality, totelephony equipment at the recipient's end. The purpose of such atelephone call may be a conversation between friends, or it may be acall to a person offering something for sale, or a call to a toll-freenumber to reach, hopefully, and agent at a call center, to seek serviceor information in one matter or another.

At various termination points in such a call set up there may beopportunities to record all or part of the voice exchanges. There may beuncertainty about who the person at the other end says he is. There maybe questions about the competency or skill of an agent to whom one iseventually connected. There are trust issues in all of these situationsand examples, and more.

Very similar issues abound in other forms of communications andtransaction situations, such as email, chat sessions, Internet sales,on-line banking, remote investment management over all sorts ofnetworks, and much more.

An object of the present invention is to teach systems, methods andmeans by which trustworthy transaction may be encouraged, promoted andsecured, and by which untrustworthy transaction may be avoided. Meansare taught in various embodiments of this invention to use intelligenceat various points in networks and network apparatus to aid participantsin managing their personal trust issues in communication andtransaction, and to aid enterprises in managing their trust issues aswell. In addition, unique apparatus and methods directly associated withphysical networks are taught.

BRIEF SUMMARY OF THE INVENTION

The present inventors, having considered needs in networks for trust incommunication, have provided unique and novel methods and apparatus forimplementing trust in such networks. Accordingly a trust network isprovided, comprising at least one transmission medium supportingtransmission of data, wherein data transmitted is in at least someinstances transmitted in discrete portions, two or more nodesterminating discrete legs in the transmission medium, and trust softwareexecuting from a machine-readable medium by a processor on one or moreof the two or more nodes. The one or more nodes executing trust softwareapply trust logic to transmission of the discrete data portions.

In another aspect of the invention a method for trust treatment in anetwork is provided, comprising steps of (a) executing trust softwarefrom a machine-readable medium by a processor on one or more nodesterminating discrete legs in the network; and (b) applying trust logicby execution of the trust software to data transmitted in discreteportions in the network.

BRIEF DESCRIPTION OF THE DRAWING FIGURES

FIG. 1 is diagram illustrating a dynamic and integrated communicationnetwork through which trust issues may be managed.

FIG. 2 is a diagram illustrating a trust authority operating on behalfof an independent person in an embodiment of the invention.

FIG. 3 is a diagram indicating a trust authority operating on behalf ofan agent for an enterprise in an embodiment of the invention.

FIG. 4 is a diagram illustrating trust issues relating to an associativenetwork in an embodiment of the invention.

FIG. 5 is a diagram showing a workstation connected through the Internetin an embodiment of the invention.

FIG. 6 is a diagram illustrating a conference situation in an embodimentof the invention.

DETAILED DESCRIPTION OF THE INVENTION

The present invention relates in many important aspects to interactionsbetween persons who may be termed customers or clients, and businessesthat offer and provide products and services to the customer/clients.This is not the only arena in which trust, as defined and taught in thespecification, is useful or unique, but is a very important segment, sothe descriptions of customer to business relationships and communicationare not meant in any way to be limiting, but are used in manydescriptions of embodiments of the invention herein.

In most cases the business side of interactions will be handled byagents of a business enterprise, which agents may be computerizedagents, such as provided by an interactive voice response (IVR) system,or persons acting in some manner on behalf of one or more of theenterprises. The interaction may be by voice telephone, by texting, byemail, by Internet-enabled chat sessions, or in any other manner knownin the art that provides communication between customers and agents.

FIG. 1 is an architecture diagram of a network consisting ofinterconnected, specific networks, over which customer-to-businesscommunication might take place, as well as any sort of digitalcommunication between two or more persons, and is provided for referencein this specification to specific apparatus supporting communication indescriptions that follow. A public Switched Telephony Network 101 isindicated as a cloud within which line 116 represents all connectiontrunks and lines within the PSTN. A local switch LSW 113 is representedin the PSTN network to represent a plurality of switching apparatus insuch a network, through which PSTN calls may be connected and routed.

Also shown in FIG. 1 is a public land mobile network (PLMN) 136 which isa well-known wireless network supporting mobile communicationappliances, such as cellular telephones, which may be used by customerpersons and agent persons as well in some embodiments. The wirelessappliances used by persons connect by RF transmission to antennastations 130, 132 and 133 in this example, depending on the geographiclocation of the person making or receiving a transaction using awireless appliance. The antenna stations communicate with one anotherusing a network protocol, such as GSM (Global System for MobileCommunications) and one or more stations (station 130 in this example)in the network is typically enabled with a Base Station Controller(BSC), which manages location, network metrics and call placement, amongother functions. Reference is made for further detail to the EuropeanTelecommunications Standards Institute (ETSI), particularlyspecification TS 100 522 V7.1.0 (2000-01).

Stations 104(1-n) represent customer premises equipment used byindividuals, which may or may not be customers of certain enterprises.Each of these stations is shown as comprising a computer connectable toInternet 102 and a telephone device shown connected to PSTN 101. Thetelephone devices may, however, be communication appliances enabled topractice, either through the local computer connected to the Internet,or through separate Internet connection, voice over IP (VoIP) or what issometimes called Internet Protocol Network Telephony (IPNT). In otherembodiments telephone devices may be wireless appliances communicatingthrough a wireless network as indicated by base station 130.

A Web server 131 is shown connected to backbone 116 in the Internet, andrepresent the very large number of Internet-connected servers that mayserve Web pages to persons connected to the Internet through enableddevices, such as the computers at stations 104.

One enterprise communication center 103 is illustrated in FIG. 1 torepresent a very large number of such centers that provide productsales, information and services to customers through networkcommunication. These enterprises include such as insurance companies,maintenance and service centers for wireless telephone companies,service centers for companies selling digital products, and the like.Typically, many or most such enterprises will also maintain a webservice (such as 131) for customer communication and also for marketingand sales.

Center 103 has an Internet-connected server 109 connected by line 126for handling and managing IPNT telephony, and may be assumed to alsoroute such events. The call center also comprises a PSTN-capable switch124 for receiving, managing and routing PSTN calls, and in someinstances this switch may be CTI-controlled. There are also agentstations 121, 122 and 123 each having a computer connected on a LocalArea Network 111, with each also having a telephone device, shownPSTN-connected through server 124, but which also may be IPNT-connectedor wireless. There is a data repository 110 in the communication center,representing many such repositories either in or accessible to the callcenter, which may also store software executed from the repository byvarious computing devices and servers coupled in the communicationcenter. There is in addition an Interactive Voice Response (IVR) server107 for interactive voice response with callers.

Three remote agent stations 105(1-n) are illustrated, representing aplurality of stations used by persons who are agents for the hostenterprise, but who do not work at the physical location of thecommunication center. Each of these stations also has a computer and atelephone device, which may be, as described for other stations above,enabled through the PSTN, the Internet or wirelessly.

It will be apparent to the skilled person that the interconnectednetworks shown in FIG. 1 may be connected and implemented in a varietyof other ways. For example, there may be a gateway between the Internetand the PSTN such that communication events originating in eithernetwork may be propagated to and routed through the other. FIG. 1 ismeant to represent the many and variant paths through whichnetwork-enabled persons might communicate all across the globe.

The present invention is about trust, trust metrics, and unique waysthat trust may be implemented and managed in network communication. Itmay be helpful to create at this point some context regarding trust innetwork communication. There are a variety of ways that trust ispresently used in the art. It will be familiar to the skilled artisanthat frequently, a person browsing the Internet may get a pop-up messageto the effect that a web site for which that person has asserted aUniversal Resource Locator in a browser application does not display aproper certificate. Such a message typically comes with aninterrogatory: “Do you wish to connect anyway?” This is an applicationof trust. In this case there is a trust authority, generally denoted TAhereinafter, the TA connected to the Internet and to which the person'sbrowser might subscribe, that issues registration for Internet sites(servers, web pages). Supposedly, if the person has subscribed to such aservice, that person believes they may “trust” sites that areregistered, and may practice more caution with sites that are notregistered. Such a trust authority may be considered to issue a trustcertificate to the site, and the site may “display” the certificate.

In another example familiar to many in the Internet world, there aremany social and business networking sites to which persons mayassociate. Typically a person may be invited to become a member of sucha site by a person that is already a member, or the person may navigateto an interactive interface for the site and “join”. As a member of sucha site one may associate with other members in a manner, for example, as“contacts”. The person joining by invitation will, for example, beassociated as a contact with the person inviting. The person invitingmay have a plurality of contacts already, so, as a member, a personalpage may be displayed showing the number of each of the person'scontacts (the inviter and the new person). The personal page for theperson who just joined would have 1 contact (assuming that person wasinvited), and the person who invited might show, say, twenty contacts.The person who just joined may see the inviter's number of contacts, butmay not be able to see them listed by name and profile. This is a trustissue.

Contacts that are listed for a person that is a contact for you, are notfirst order contacts for you, but second order contacts. That is, thereare definable degrees of separation. In an embodiment of the presentinvention, each, or at least individual ones of the members may haveaccess to an interactive configuration display where they may enterwhether a contact may view their other contacts, and there mayadditionally be configuration for “depth” of trust. So a member may, forexample, configure that all members may see my own contacts, or just myfirst order contacts, and so on.

Important to the present discussion is the matter of levels of trust,which is what is illustrated by the configuration facility describedabove, where a person may elect to display his/her contacts to theentire membership, to a network within the network of the membership, tojust first order contacts, or to no one. The inventors term thisfunctionality “trust propagation”.

Trust in a sense of human emotion is a social and biological matter. Inthe sense of trust in network communication, trust is a matter oftechnology. To manage trust in network communication it is necessarythat there be a trust authority, that is, a network connected facilityexecuting software, and with access to information, that is facts,relative to communicants, which data may be stored in a local datarepository.

FIG. 2 is a simple diagram representing two workstations 201 and 202,which may be used by two persons to communicate over PSTN and/orInternet networks 203 and 204, showing also a server 205 coupled to thenetwork acting as a trust authority. Communication between 201 and 202may be through either network, or both in some order, or through awireless network into or out of each of the other networks. FIG. 2 ismeant to represent any network connectivity between the two stations 201and 202. Trust authority 205 executes software 206 from amachine-readable medium 207, which is also a data repository.

In one aspect the communication between a person at station 201 andanother person at station 202 may be between two friends at theirrespective residences. In another it may be a customer of an enterpriseat 201 communicating with an agent of the enterprise at 202 (see FIG.1). In one aspect trust authority 205 may be hosted by the enterprise(not too much trust there for the caller), and in another, it may be anindependent authority perhaps subscribed to by both the enterprise andthe customer. In yet another embodiment trust authority 205 may be asocial trust network, which is described in more detail specificallybelow.

An important consideration is that trust is highly individual andindependent. It is in this specification considered a technical creatureof a human emotion. So the trust that issues that may be functional forthe person at 201 may be completely independent of the trust issuesfunctional for the person at 202. Each may subscribe to the same trustauthority, but more likely may subscribe to a separate and independenttrust authorities (here we have to consider the trust that one may havein a trust authority). So in this case there may be two trustauthorities 205 connected to the network, and in one aspect the trustauthority for the person/station 201 may be operable on station 201. Thesame might be true at station 202. In yet another aspect there may be atrust application executable at station 201 which cooperates with anindependent authority in the network, and the same (or not) at 202. Butin any case, to make use of trust as a technical metric, there needs tobe a trust authority operating on behalf of station/person 201 andanother perhaps operating on behalf of station/person 202. But it shouldbe noted that it is perfectly possible for just one (either one) of thestations to be enabled for trust functionality in communication with atrust authority.

As an example, consider that the independent person at station 201subscribes to a trust authority 205, and initiates a communication withan agent of an enterprise at 202. Trust may be many-faceted for theperson at 201, even in a single transaction session with an agent at202. For example, what might be the level of trust for the enterprisehosting the center at which station 202 is an agent station? What arethe trust metrics associated with the network itself, or differentportions of the network? A person may trust a PSTN connection morereadily than an Internet connection, for example, or vice-versa. Thenwhat is the trust level relative to the particular agent with which theperson is transacting? It actually goes further, for the person mayhave, or want to express different levels of trust depending on such asskill sets. The person may trust the agent for certain purposes if theagent is certified in certain skills by the trust authority, or by athird authority. For example, the person may be seeking help with afederal tax matter, and the agent may be a certified and licensed CPA ortax attorney (or not).

To deal with these and other issues the trust authority forperson/station 201 needs data and information about the enterprise andagents in the enterprise, and there needs to be a configurationinterface for the person to provide to the trust authority a set oftrust rules for the authority to follow for that person. So assume thatauthority 205 has, as an example, information about the enterprise, suchas opinions of trade organizations, perhaps ratings provided by tradeorganizations and others, opinions of persons who have dealt with theenterprise, and data, such as financial performance, stock marketperformance (if any), and agent data, such as a listing of agents whoare certified by the enterprise as agents for the enterprise, andassociated with each of these agents the authority has normalized dataabout the agents. Such data may comprise agent skills, such as languageskills, certifications, licenses, education level, length of service forthe enterprise, whether or not a full-time employee or a part-timeemployee, perhaps whether the agent is a remote agent as opposed to anin-house agent, and so forth.

Trust, as was mentioned above, is a personal issue. Some people are verytrusting, some are paranoid, and most fall somewhere between theextremes. So all of the facts about an enterprise, a network and agentsassociated with an enterprise, do not equate to a trust level for aperson at station 201. It is needed that the person apply his/her ownassessments to the data, which, in one embodiment of the invention maybe applied as a rule set. In one embodiment authority 205 provides aconfiguration interface 208 to station 201, useful for configuring, fora particular person, trust level to be applied in various circumstancesand relative to various entities (networks, enterprises, individualagents).

There are a broad variety of conditions and relative reactions that maybe offered and selected through interface 208, and only a few are shown.An assumption is made in this example that the person at 201 isinterested in configuring personal trust metrics in regard to a specificenterprise, and interactive interface 208 shown in FIG. 2 shows severaltabs for different subject matters, such as General, Network, Enterpriseand Agents. The Agent's tab is open. Typically interface 208 will beprovided on the person's computer at station 201, but this is notlimiting. Such an interface may be accessed and used on a cellulartelephone, a Personal Digital Assistant (PDA), or on any othernetwork-connectable appliance that has the I/O to interact with theinterface.

The Agents tab in interface 208 provides information for the person at201 about agents associated with the particular enterprise, such asskills, education, licenses, and the like. There may be much moreinformation available than that shown as an example in FIG. 2. There isalso shown a series of check boxes allowing the person to select toblacklist an agent (No Comm.), white list (Always comm.), or to provideconditions for communication with that agent. In one embodiment theremay be selections for agents in general with conditions, such as, forexample, “No communication if a part-timer” and the like.

Trust authority 205 may be an independent authority, perhapsInternet-connected and enabled, and may provide trust metrics relativeto a broad variety of enterprises, and here enterprises is meant in avery general sense. Authority 205 may collect and store information, andprovide configuration options, for government agencies, businessentities, specific call centers for business entities, social networks,even for other trust authorities. In one aspect much such informationmay be provided to authority 205 by subscription with enterprises, thatis from the enterprises voluntarily. Certain advantages may be offeredby the trust authority (itself an enterprise for purposes of thisspecification), such as referrals to individuals and other businesses,ranking as trusted sources for various purposes and the like. In thisaspect the trust authority may issue trust certificates, which areelectronic certificates providing essential information about theenterprise, and trust specific for the enterprise. So the person at 201,interested in contacting a specific enterprise, may request a trustcertificate for that enterprise, and if that certificate is lacking,choose to do business with an alternative enterprise. In someembodiments transaction may be made through the trust authority. Inothers, the trust authority may monitor the person's activity, andprovide trust information in reaction to the person's communicationactivity.

In another aspect trust authority may be enabled to perform trustauditing. By this is meant investigation of an enterprise, collectinginformation regarding the enterprise from the enterprise itself and fromother sources, comparing information, and rendering specific abouttrustworthiness of the enterprise. The auditing process may be a part ofthe maintenance of information about enterprises, and agents associatedwith enterprises, that the authority might use at other times with otherfunctionality.

In another aspect a person, such as a person at station 201, throughsubscription to authority 205, may be provided services for buildingtrust metrics (which includes distrust) through regular interaction.Such a service provided by authority 205 might track some or all of aperson's communications, note the enterprises and other persons withwhich the person connects, build a history, and provide interactivityfor the person to configure trust metrics associated with past contactsfor future purposes. There may be in the configuration process abilityfor the subscribing person to “flesh out” details about persons andenterprises in the history, and the authority may provide standard andnormalized formats for such interaction and information building, andfor uses for the information.

As an example of interactivity described just above, the trust authoritymight provide a “communication life” environment for a person'scommunication activities. The trust authority in this embodimentmonitors all of the person's communication activity, or at least thatpart authorized by the person, and builds a history. The authority knowshow many time you spoke to Grandma in the past month, and also how manytimes you were contacted by spam communications. It provides an inputinterface for the person to elaborate on specific communication events,as well. And provides, most importantly, and input for the person toeasily rank communications for trust. The input might be a pop-up on thedisplay of the communication appliance, and might be as simple atdisconnect as Trust? Distrust? Or it might provide a more graded input,such as an ascending trust score. Then every time the personcommunicates with that communicant again the old score may be displayed,which can be easily edited (or ignored).

One input that is important in the present discussion, and operablethrough the trust authority, is propagation of trust. The notion ofcontacts, somewhat as described above relative to a network likeLinkedIn, is important here. As a person, monitored by trust authority205, transacts with communicants, these communicants may be tagged asContacts for the person. Other persons and agents in enterprises mayalso have tagged contacts. Propagation may be implemented as to whatlevel trust may be extended. For example, if a trust one of my contactsimplicitly, a very high trust score, than I may input that I will also,at least immediately, trust first-order contacts of that person. Maybeeven second-order contacts, and so on. The same is true of very lowtrust scores. If I highly distrust a contact, then I may want todistrust all contacts of that person as well.

It has been described several times above that trust is a highlypersonal thing. There are some actions, gates and the like that may bemanaged automatically by computerized functionality for a person inresponse to recorded trust metrics. For example, white-listing orblack-listing, but in a larger sense, a person in real-timecommunication is going to be making serial decisions, such as “I want toorder one, but do I trust this source enough to order six?” So animportant functionality of trust authority 205 will be to communicate tothe person at station 201 what is the instant trust level in near realtime. This metric may be determined in a variety of ways, and may becommunicated to the subscriber in a number of ways as well.

It was described above that all of this interactivity with trustauthority 205 may be related to the person placing a call or initiatinganother sort of communication (email, IM and the like), but the trustfunctionality is not limited to the person being the caller. The same orsimilar functionality may accrue for incoming communications as well.For example, when a voice call comes in there will be ring tones, and insome cases voice mail if the person is temporarily unavailable. Therewill be some delay in answering the call or other message for the personat station 201. During this time trust authority 205 may ascertain aninitial trustworthiness indication for the caller, and this may bedisplayed for the person, much as caller ID is accomplished. In oneembodiment the ping to a trust authority and the caller ID may beintegrated, and may be a function of a public or private network. Soyou, dear reader, receiving a call from an agent at an enterprise, say astock broker, will get an initial indication of whether this caller islegit, or this is a spam call.

The indication that the trust authority provides for incoming calls maybe a trust certificate, or a simple icon or meter bar, perhaps in greenfor OK and red for not OK. Such an indicator is discussed more fullybelow. Similar functionality may pertain to text messaging of all sorts,so an incoming message might be paired with a trust certificate or othertrust indicator. Emails ditto. In some cases the trust functionality maybe integrated with an email client, a text messaging client, apeer-to-peer telephony system, and the like. In one embodiment an emailclient is provided, comprising software stored on a machinereadable-medium and executing on a network-connected computerizedappliance having a display, the software, in response to userinitiation, providing a composition window in the appliance display forcomposing an email, including a “To” field indicating a destination forthe email. Upon a user entering an address in the “To” field, thecomputerized appliance is caused to interact through the network with aserver acting as a trust authority, to ascertain trustworthiness of anenterprise or agent associated with the “to” address entered.

Similarly many other sorts of communication software operable at auser's computer, such as station 201 in FIG. 2, may be integrated withfunctionality to interact over a network, such as the Internet network,with a trust authority, which is enabled to return information about anenterprise, an agent or another person, relative to whether thatenterprise or person may be trustworthy. Some such software modules thataid persons in communication include email clients, as described above,Short Message Service (SMS) software, and other software enablingtexting communication, such as for cellular telephones, peer-to-peertelephony software, such as Skype™. In some embodiments there may be asoftware module at the computer in a station such as station 201 thatworks in concert with a telephone system, either wireless, IPNT orconventional switched land-line systems, such that the user making orreceiving a call will activate the software module to interact with aremote trust authority to provide information about enterprises andpersons associated with numbers dialed. To accomplish this functionalityin some cases a landline telephone may be coupled to the computerappliance, so the computer appliance has the prerequisite information torespond. In the case of a wireless telephone, used at or near a computerappliance, the computer appliance may have a module for monitoring thewireless frequency to scrape the necessary information, such as numbercalled.

In one embodiment a communication software module executing on acomputerized appliance from a machine-readable medium is provided,comprising functionality enabling a user to direct a communication eventto a particular destination by an address of the destination,functionality for transmitting the destination address to a remote trustauthority, functionality for initiating the communication event, andfunctionality for receiving trust information from the remote rustauthority, the trust information associated with an enterprise or aperson associated with the destination address. The module may be one ofan email client, and the destination address is entered into a “to”field in a window for preparing an email to send, a texting moduleproviding an interactive interface for a user to indicate an addresseeand text to send to the addressee, a peer-to-peer telephony moduleproviding an interactive interface for a user to enter a destinationaddress and to initiate a data network telephony event, or a module thattracks user input into a telephone apparatus separate from but coupledto the computerized appliance, the user input asserting a telephonenumber.

In one embodiment a method for indicating trust in communication isprovided, comprising steps of (a) executing a communication softwaremodule from a machine-readable medium on a computerized alliance, themodule enabling a user to direct a communication event to a particulardestination by an address of the destination, and to initiate thecommunication event; (b) transmitting the destination address to aremote trust authority; and (c) receiving from the remote trustauthority trust information about an enterprise or a person associatedwith the destination address.

In the sense of the trust authority determining the instant trust state,assume the subscriber has initiated a voice call with a call center, andthe call is in a queue at the center to be distributed to an agent. Thetrust authority may have determined at this point that the enterprisehosting the call center is who they say they are, and is also is areputable enterprise. The authority may have also determined that thenetwork is reliable, and there are no “funny” connections, or listeningdevices. So these aspects are OK and trust is OK. The authority mayprovide, in the case of the subscriber communicating from her computer,a green indicator (trust thermometer) that says, and is understood bythe subscriber “everything in this transaction is trustworthy”. Such anindicator is indicated relative to the subscriber's computer in FIG. 2as indicator 209. At some point the event in queue gets routed to anagent, and the authority identifies the agent, which happens to be anagent marginally trusted. The indicator turns yellow (Caution). Or theagent is identified as an untrusted agent (as defined by the personherself). The indicator turns red. The person has now a real-timeindicator to help her in her ongoing string of decisions during thecommunication.

In another aspect the person may be using the telephone at theworkstation. The indicator may still be applied to the computer display.In another aspect there may be an indicator in a display of thetelephone, assuming the telephone has a display, and most do now. If nodisplay, there may be an audio alert, for example a low hum, or anypredisposed audio alert that the authority and the subscriber haveagreed to in advance, that the subscriber can recognize as a trust-levelindicator.

In another aspect of the invention, still related to the independentperson at station 201 trust authority 205 may be a social trust network.In this case a plurality of persons, hopefully a relatively largenumber, may all be subscribers to authority 205, and the authority mayprovide an interface for the members to rate enterprises and agents ofenterprises, such as immediately after ending a communication. In oneembodiment the interface, or an offer of the interface, would be made bythe authority each time the member disconnects from a voice call, ends achat session, responds to an email, and so on. The authority in thisembodiment builds its database in useful interaction with its members.

In many cases trust authority functionality will be provided using adistributed approach, wherein a version of the trust authority softwaremay be resident on the member's computer, and execute from amachine-readable medium accessible to the person's computer, which localversion is compatible with and interacts with software executing at thetrust authority from a machine-readable medium accessible to the trustauthority.

The descriptions above for embodiments of the invention pertainprimarily to trust in digital communication as it pertains toindependent individuals, such as persons using equipment in their homes,who might be, for example, be communicating with other individuals, orwith agents of a call center hosted by an enterprise, or with otherpersons acting as agents of an enterprise. In another aspect trust maybe managed for a person acting as an agent for an enterprise. FIG. 3illustrates a trust authority acting on behalf of an agent of anenterprise, who in one embodiment may be occupying and using aworkstation station in a communication center, such as, for example,station 121 of FIG. 1.

In the case of a call center agent the trust issues are considerablydifferent from those of an independent person acting on his/her ownbehalf. This is because the agent is not acting on her own behalf, buton behalf of an enterprise, and the agent's purposes in communicationare the purposes of the enterprise. For this reason, in one embodimentof the invention as shown in FIG. 3 an agent operates from a workstation121 through a communication center infrastructure 303, which representsthe communication center 103 of FIG. 1. Line 308 is in one aspect LAN111 of FIG. 1. Trust authority 305 is connected in the sameinfrastructure, and may be in this embodiment also connected on LAN 111.In this case the trust authority need not be a third-party independentauthority, because the trust issues for the agent may in most cases bemanaged within the enterprise.

For practical purposes the agent in the case illustrated by FIG. 3 isthe enterprise. Communication between a person 302 and an enterpriseagent 301 may be initiated by person 302, such as a customer of theenterprise, and in that case person 302 is likely seeking a service orseeking to buy a product offered by the enterprise. As an example,assume the enterprise is an insurance agency, and person 302 is seekinga policy for liability on an automobile. The agent's job is to determinethe circumstances, and to determine whether or not to offer a policy onbehalf of the enterprise, and if a policy is offered, at what price.

Of note before proceeding is that, if there is a configuration interfacefor the agent to configure interaction with the trust authority, theconfiguration will likely be simpler than that described above withreference to FIG. 2.

The negotiation between the agent and the person seeking liabilityinsurance coverage will, of necessity, be multi-faceted. Firstly theagent needs to know what the person is seeking, and we have alreadyassumed in this example that he is seeking liability insurance coverageon an automobile. Next the agent needs to elicit the person's identityand the identity (make, model, license number, etc.) of the vehicle forwhich insurance protection is sought. At this point trust issues emerge.When the agent gets the call, or even before, when the call registers atthe communication center, a determination may be made by trust authority305 as to initial trust level for the agent relative to the caller.Trust authority 305 is connected in the communication centerinfrastructure 303, which may have an extensive database (see element110, FIG. 1) of existing customers, with profiles and history. Sucharchives are often called Statistics servers (StatServer).

Following this example the Trust Authority uses some identityinformation, such as elicited from the caller prior to his beingconnected to the agent, perhaps by an Interactive Voice Response (IVR)unit, or Automatic Number Identification (ANI) to cross-reference withthe database and pull out, if available, a first look at thetrustworthiness of the caller. Let us assume in a first instance thatthe database returns that the caller is not a current customer, but wasa customer three years ago, and had not paid his premiums on time, andhad tried twice to make false claims against a policy. The trustauthority would return a “no trust” verdict. The trust authority in thiscase, or the database under management of other rules, may have madethis determination in advance, and the trust authority need onlyretrieve the verdict, rather than do any calculation or reasoning. Inthis case the agent's display may have an indicator 309 similar toindicator 209 described in the embodiment referencing FIG. 2. In thisexample the indicator may be a red bar and of significant magnitude. Inthe case of a very bad trust indication, the agent may just quickly, butpolitely, end the contact, and go on to the next call.

Another situation may be that the trust authority, in response to theidentity established, may return that this is a current customer withthree policies, no near-term or outstanding claims, and fully paid up inpremiums, and has never missed a premium payment. Big green bar forindicator 309, and the agent may proceed without trust issues.

In another instance, the trust authority may determine that the personcalling is, or has been a client in the past, and the relationship,although not exemplary from the enterprise's viewpoint, is not all thatbad, either. For example, there may have been a claim with a payout, butthe indications were that the person was not really at fault, and theperson has paid premiums faithfully, and has been cooperative inadjustment dealings. Indicator for first trust may be a short, greenbar. In another instance the person may not have been all that great aclient, but not bad, just at a balance point that the system cannotdetermine a red or a green, so a caution flag is displayed.

In every one of the above instances the agent may have access to asummary of the reasons for the initial trust indication. In one instancethe person may not be found in the database. That is, this callingperson is unknown to the system, therefore the trust authority is at aloss to assign a first trust indicator. In this instance the trustauthority may make a quick check of available outside data sources. Forthis purpose trust authority 305 has an Internet connection 308 toaccess one or more sources for indicators, such sources indicated byserver 310 in the Internet cloud. There may be a variety of sources thatmay be contacted, such as, for example, the California DMV or a similaragency in another state which is derived from the ANI telephone numberidentification for the person.

A complete determination through outside sources for a trustworthinessindication for a caller having no history with the enterprise may take awhile, so, for a first indication an in-depth inquiry may not be maderight away. The “first look” may check the DMV, for example, and perhapsan on-line database maintained on an industry cooperative basis to shareclient experience amongst a group of insurance companies. The trustauthority may make to the two-spot check and return a first indicator,and then continue in the background with a more thorough search, withperhaps periodic update to the agent as long as the agent is engagedwith the caller. Even if the agent finishes with the caller, or thecaller disconnects, the trust authority might continue a more in-depthcheck, and then cause that to be stored and cross-referenced in thestat-server or other storage to be available if the same person callsagain, and perhaps is queued to a different agent, which would likely bethe case.

Let is continue now past the first indicator, and functionality thetrust authority may provide. Suppose, for example, the trust authorityreturns an ambiguous first trust indicator. The agent continues inback-and-forth with the potential client. For example, the agent, afterthe client is tentatively identified, and the automobile is identified,may investigate other avenues by queries to the caller. For example, theagent may inquire where the automobile is currently insured. If thecaller answers it isn't insured, the agent is justified in asking whynot, and the answer may be something that can be checked. The person maysay he just purchased the vehicle, for example, and the agent maytrigger the trust authority to check for transfer of tile. If there wasno recent transfer of title, the agent has good cause to query further,and the trust authority may lower the trust score. There are a myriadsuch avenues a negotiation might take, and trust requires cooperativeand truthful answers. An important function for the trust authority isto check the veracity of the caller's answers, and in some cases tosuggest questions to the agent to further establish trust.

As negotiation continues, the trust authority may adjust the trustindicator, and at some threshold may determine (a) the person is quitetrustworthy, and fix the bar at Big Green; or (b) the trust score fallsbelow a threshold, and the indicator goes Big Red, and the agent isjustified in declining representation.

There are a very large number of such examples that may be discussed foran in-house trust authority for aiding an agent in dealing with acaller. It is not necessary that the agent be an agent in a call-centeror communication center. The same or a similar server and SW andcircumstance may attain for an attorney interviewing a new, or retuningclient, for example, or any professional representing an enterprise innegotiating with a caller on behalf of the enterprise. In just about allsuch cases an important function and feature of a trust authority willbe providing a first-look trust indicator and then continuing orperiodic update while negotiation with a caller continues.

In another aspect of a trust authority operating as a part of anenterprise, and perhaps aiding agents of that enterprise, the trustauthority may have positive functionality for promoting trust for theenterprise from the viewpoint of callers to the enterprise. Thus farabove in the context of trust from the viewpoint of an agent of anenterprise, the descriptions have concentrated on whether or not, and atwhat level, an agent (that is, the enterprise) may trust the caller. Theinventors are aware as well that there may be positive functionalitythat could promote trust from the caller. For example, consider issuesof visibility (alone) and visibility plus control. An enterprise mightdo a number of things beneficial to a caller, without the caller beingat all aware of what is being done. For example, the enterprise maydetermine that the caller is an especially good customer, and thereforedetermine to advance the customer in queue (waiting), so the customerwon't be exposed to a long wait time in queue, and this may be doneentirely without the caller's knowledge.

In one embodiment trust authority 305 may determine that a caller mayhave reason to have some level of distrust, or may be a first-timecaller, and there is good reason to engender or encourage a trust levelfor the customer. For example, if the trust authority, monitoringinteractions of agents and calls, detects that a caller is, in fact, afirst time caller, in the sense that first impressions are veryimportant, may accelerate the caller for special service. Not allcallers may be so treated, because available resources do not permit it,but a caller who is has a good first experience with the enterprise islikely to develop a higher trust level for the enterprise, or agentsacting on behalf of the enterprise.

In the case of a customer who has lodged a complaint in the past, oreven one whom the enterprise itself has discovered may have been poorlyserviced, a service acceleration can have beneficial effects for theenterprise. In some embodiments this may be completely transparent tothe customer.

In another case the trust authority may extend some special service orbenefit, and may make that visible to the customer. The purpose is toencourage a higher level of trust by the customer for the enterprise.The trust authority may, therefore, upon discovering the customer is afirst time caller, cause the client to be routed right away to a specialagent, and may announce this fact to the customer: “We are routing youimmediately to our best agent for . . . ”

In another case the trust authority may extend a special service, maymake that visible to the customer, and may also give the caller somelevel of control. For example, the authority may offer to connect thecaller to either agent X or agent Y, and there may be some obviousdifference in the two agents (skill level, gender, etc.) and the calleris given some control: “We can connect you immediately with anagent-in-training, or, if you prefer, we can connect you with a moreexperienced agent in just under two minutes. Please indicate yourpleasure (an interactive response mechanism is provided.)

Another aspect of trust in digital communication is in interactivity ofan individual with an established network of persons. At times in aspecification such as the present specification the word network is usedto mean a physical structure, architecture or system, such as theInternet network, a telephony network, or a local area network. There isanother meaning and understanding that must also be used in thisspecification. This is regarding groups of persons that are associatedwith one another, usually managed by software, such as social networks.LinkedIn was discussed briefly above, and this is a network ofassociated persons. This meaning of network is also incorporated in thenotion of a group of agents operating on behalf of an enterprise. Inthat case a network of agents (associates) cooperate over a physicalnetwork, such as a local area network (physical), and sometimes over awide area network (physical). The words are such natural and constantlyused words of the art in telecommunications and all sorts of digitalcommunications that it is not easy to avoid the use of the word in onecontext or the other; but the present inventors believe the context willresolve each use in this specification. If the authors believe someconfusion might result, extra care will be taken to more fully explain.

FIG. 4 is a diagram illustrating interaction by an individual at astation 401 with a network 411 of persons associated with one another bysome associative criteria. Such associative networks include a verylarge and growing number of social networks, such as, for example,FaceBook, enterprise networks, some of which may be associated likesocial networks, professional associations like LinkedIn, and many, manyothers.

In some cases association is simply by contacts. Consider, for example,Skype, the well-known peer-to-peer telephony network. Skype allows usersto set up contacts with either other Skype users or with other personsby cellular or land-line telephone. In the case of Skype-to-Skype, acontact of one person may very well have a plurality of Skype contactsas well. Consider that you are a user of Skype, and you have severalSkype contacts. Those contacts may be considered your first-ordercontacts. The contacts of one of your contacts may be consideredsecond-order associations, and there is a way that you may see thosecontacts, in some cases, with permission of other users. Thisrelationship is displayed in associative Network 411, where member 1 hastwo contacts (or associates) 2 and 3. Member 2 has three associates 6, 7and 8, and so on.

First we discuss the case where a user at 401 is a member of associativenetwork 411, perhaps member 7, with associates 9, 10 and 11. Assumemember 7 initiates digital communication with user 3. First orderassociations for 7 are 2, 6, 8, 9, 10 and 11. But the issue here is theinstant communication that is initiated by 7 with 3. In this example atrust authority 405, executing trust SW 406 and coupled to datarepository 497 is connected to associative network 411, which is managedby server 410 in the Internet physical network. In this case the personat 401 initiating contact into the social network is a member of thesocial network, and the trust authority is a creature of the socialnetwork as well. This can work in those situations where the socialnetwork has a stake in workable trust management between its ownmembers.

In another aspect of the invention a trust authority may act as a brokerto guide a member to trusted service providers. In this embodiment aperson seeking, for example, to find a good tax person to help withpreparing and filing a tax return. The trust authority may, as describedto some extent above, have an extensive database of information aboutagents of all sorts, and professionals who offer their services for manythings, such as tax preparation in our example. In this embodiment theperson accesses the trust authority, identifies and authenticateshimself, and responds to queries or menus in some fashion to make hisneed known: I need a trusted tax preparer. The interaction may be a bitdeeper, with the authority asking some questions such as Business orPersonal? Do you want a CPA, or do you prefer a tax attorney? What isthe complexity level (further detailed questions)? Price range might bediscussed as well. In the end the authority sorts and provides personswith a trust history (credentials and certificates may be shown). Thenthe person may contact the recommended person, and the trust authoritycontinues to track, and may update it records about the professionalchosen.

In another embodiment a trust authority may be a clearing house forpersons offering services, and the trust authority may set standards forthe service enterprises or persons who want to be members and offertheir services through the authority.

In another aspect a trust authority acting on behalf of an individual,in addition to providing an ongoing trust indication, may offersuggestions and scripting to an individual, to guide the individual indealing with agents and others. In this embodiment, as in some othersdescribed, the trust authority is listening in on the side of theindividual subscriber. The trust authority provides certificates, ifavailable, and initial trust indication, and continuing dynamic trustindication as a session continues, but in this new embodiment theauthority takes into account the nature of the negotiation, and providesat least some scripting or suggestion to the person. For example, thetrust authority may recognize an upsell or a bait and switch, or a rushsituation, and may caution the person accordingly. This service is akinto the trust and behavior a person needs to place in his attorney in adeposition. The agent may ask: How much do you think you can afford? Andthe authority may trigger a flashing of the person's screen, or even atemporary muting of the person's response. In the case of a textingresponse (chat, IM), a delay in the transmission of the person's textresponse may occur. This may be paired with a suggested response, suchas “None of you business”.

In another embodiment the trust authority provides pre-planning for theindividual subscriber. For example, the individual may contact the trustauthority, which will typically be through a web page and a securelog-in, and indicate to the trust authority a particular goal, forexample: “I want to find someone to prepare my tax returns for lastyear.” The trust authority in this embodiment has a Tax Program, andknowledge of professionals certified and licensed in tax matters. Thereare, of course, a variety of such persons of various sorts, such asaccountants, attorneys and the like, and the authority provides aninteractive interface where the subscriber can provide preferences. Thetrust authority then makes a best match to stored profiles, or providesa list of professionals that fit the profile input by the subscriber.The returns by the authority may include trust certificates, experiencelevels, and skills possessed by the professionals suggested. In oneembodiment the trust authority provides in this regard an interfacewhere a subscriber may provide feedback concerning that subscriber'sexperience with a professional suggested by the trust authority. Thisinformation (trust scores of other subscribers) may be made availablewhen a subscriber negotiates for a professional for a particularservice.

In another aspect of the invention a trust authority exerts gatewaycontrol over documents under certain circumstances. FIG. 5 is a diagramsimilar to FIG. 2, showing a workstation 501 used by a individual indigital communication. The workstation may be enabled by a variety ofcommunication appliances as discussed above for station 201 of FIG. 2,and the person using the workstation may communicate or transmit overany one, or a combination of the appliances, including a personalcomputer connected to a wide area network, like the well-known Internetnetwork, telephones of various sorts over the Internet or othernetworks, and so forth.

Persons engaged in digital communication under a wide variety ofcircumstances are willing to share certain information with trustedcommunicants, which information may be shared by transmission of digitalfiles. The files may be text documents or audio files. Examples arefinancial information (tax documents), medical information (diagnoses,X-rays), and many more. Such digital files are typically transmittedover a data packet network, like the Internet, in a (relatively) longstring of data packets. A person using station 501 in this example is asubscriber to services at Trust Authority 205.

Referring to FIG. 5, station 501 is connected to the Internet through anInternet Service Provider ((ISP). ISP has become a broad term in theart, because the ways a computer may access the Internet have expandedin the near term, that is, there are many more ways of accessing theInternet than was true just a few years ago. But in a general sense theconnection from the user's computer still typically passes through someintelligent apparatus and service which may be considered an ISP. Forexample, many cellular telephones now are capable of Internet access.But they cannot directly access the Internet. Connection to the Internetmust be provided by the wireless service provider.

Once the computer at station 501 is connected to the Internet throughISP 508, data packets representing transmission of informationoriginating at station 501 to some addressed destination (assume forsake of discussion station 502, which represents in this example anydestination), must pass through a series of Internet packet routers,such as node 503, which may be what is known in the art an edge router,and node 504, which may be what is known in the art a core router.

The computer at station 501 is a machine-intelligent device executingmachine-intelligent software stored in a machine-readable mediumaccessible to a processor in the computer. The same is true of ISP 508,which may be a system of several computerized servers. The same is trueof edge router 503 and core router 504, as well as Trust Authority 505and computerized appliances at destinations 502. A file transmitted tostation 501 to a destination 502 will pass, typically as a more-or-lessserial string of data packets, through a series of intelligent devices.

In the present aspect of the invention individual ones of themachine-intelligent devices may cooperate with Trust Authority 505 toprovide services to a person using station 501. Trust authority 505executes a software suite termed SW 506 in this example, stored in amachine-readable medium, which may be repository 507. Station acomputerized appliance at station 501 executes SW 506′, which providesfunctionality in concert with the Trust Authority. ISP 508 may subscribeto Trust Authority 505, and may execute software 506″, which providesfunctionality in concert with functionality of the Trust Authority.Similarly, edge router 503 may cooperate with the Trust Authoritythrough SW 506′″, core router 504 through SW 506″″, and destination 502through SW 506′″″.

In one embodiment of the invention, if a person at station 501 composesan email and addresses same to destination 502, and attaches a file tothe email, under certain circumstances the attached file may be taggedas a high-security file. The attachment may be, as discussed above,sensitive financial information. In one embodiment the person at station501 may tag such files by placing them in a folder controlled by SW506′, or such files may be tagged as sensitive information in some othermanner. In any case, such files are tagged in a format known to, andcontrolled by Trust Authority 505. The tag may be considered a TrustCertificate.

So the person at station 501, a subscriber to Authority 505, composes anemail to his tax attorney at destination 502. The attachment istrust-tagged by SW 506′. This may mean that every packet prepared andtransmitted is tagged as well, using one or more data-packet fields,either existing or created for this purpose. SW 506′ cooperates withAuthority 505, at the time the email is sent, or leading up to its beingsent, to check that the addressee is actually the tax attorney to whichthe subscriber at station 501 contacts.

Email accounts are typically handled by an ISP, but emails andattachments to emails pass through, as described above, a series ofnodes, or stations on their way from a source to a destination. As atrust measure, sensitive information sent as files can be tracked andtreated theoretically at any station along the route, if that station isenabled to do so, such as by software provided by and working in concertwith Authority 505. So, if one or several intelligent stations along apath can check, in this example, an email for source and destination,and also for certification of attachments, then a number of trustservices may be performed.

In this example there is a relationship between the sender, the intendedrecipient and the attachment. This relationship is set up before theemail is composed and sent, by intent of the sender through SW 506′. Sothe email may be tracked along the way, and any diversion stopped orreported, or any anomaly may be reported back to the sender, who may bequeried for further instruction. Anomalies might include discovery of anemail with the attachment, but to a different intended recipient. Thesender may have mistakenly marked the email to be copied to anotherperson other than the planned recipient; and the system of gatewayscreated by Authority 505 working with any one of the intelligent nodesalong the way may correct the error by parking rather than forwardingthe email, deleting the email, or some other corrective measure.

In a further embodiment packet-routing nodes, such as edge router 503and core router 504 may take other action on behalf of the subscriber.Such packet routers typically are connected to a plurality of adjacentrouters, and there is typically a plurality of paths that data packetsmay follow from a source to a destination. Selection of the next hop forany packet at a node in the network is made according to a rule set,such as Shortest Path. Propagated information about the present state ofthe network is also used, so if one channel to an adjacent node along apossible path is down, an alternative path may be selected, and thepacket will be routed by the alternative path.

In an embodiment of the present invention Authority 505 storedinformation about trusted paths, those paths upon which fewest faultsand problems exist, and those paths that are least subject to variousinsecurities that may be practiced in the network. It may be, forexample, that certain paths in the network are through jurisdictions inwhich government policy causes insecurity or minimum trust. Certainpaths may be over a wireless jump or a satellite link. Authority 505 mayexert at least gross gateway authority at certain points in the networkto cause the packet router to forward packets for transmissions fromsubscribers to the Authority over preferred paths, if those paths areavailable, or to delay a transmission at some point and ask the senderfor a decision about continuing. In this aspect of the invention thetrust authority may maintain a continuing interactive relationship witha number of network routing nodes, and may keep a frequently updated mapof network active topology, and may also keep at various levelsinformation about trust levels for various paths, not just from node tonode, but for frequent sender to recipient gross paths associated withindividual subscribers, and may exercise the authority and influencedescribed above for individual transmission of subscribers.

Knowledge of trusted paths is not restricted to the Internet, althoughthe Internet is used in examples above, but may be determined andstored, and also frequently updated for various networks, and associatedwith individual subscribers. Such as, for example, a particularsubscriber may make telephone calls to a particular enterprise that hasa network of call centers. Such calls frequently go to a toll-freedestination (like an 800 number), which is often termed in the art aservice control point (SCP). The SCP then routed the incoming calls toone or another of the call centers, bases typically on Enterprise rulesor preferences. In this embodiment trust authority of the sort describedin many embodiments in the disclosure may maintain an interactiverelationship with SCPs, and may therefore influence, for example, whichto call center calls incoming from particular subscribers may be routed.This relationship and functionality is not restricted to just certainsorts of networks.

So in one embodiment of the invention the trust authority (505) exertsinfluence over transmissions in the network. The Internet transmittingan email was used above as an example, but this is certainly not theonly example that might be described. As another example, a subscribingperson may open a texting session and prepare and send an Instantmessage, a voice file, or any other sort of transmission. The subscribermay set the session to be Trust Protected, and versions of SW 506 alongtransmission routed will then exert influence over the communication,transmission and/or attachments, monitor for unwanted anomalies orpiracy of any sort, and take corrective action, and exert influence overchoices of transmission paths.

In the instance described above of tagging files, the tags need not besingle level tags. The tag, or trust certificate, may be a dynamic tag,such that levels of trust are established by the certificate. Personswho may have access to such tagged files in this embodiment may have tohave a clearance certificate to be able to read or hear the document.Medical information may be shared with a doctor at a medicalinstitution, but the tags may prevent non-medical persons at thatinstitute from reading (viewing) or hearing the file or files. Inanother embodiment portions of information in a single file may havedifferent trust levels, and those portions become understandable topersons depending on their trust certification. Documents areautomatically redacted differently for different persons, of voice filesmay be muted at certain portions differently for different persons.

Trust in Conference:

An important area concerning trust in digital communication is in thearea of conferencing, such as video and audio conferencing. FIG. 6 is adiagram of a conference situation in which four persons are engaged.Cloud 609 simply indicates the joining of the four persons in conferencethrough their respective equipment, and the variety of connectionsthrough which transmissions may pass through a variety of networks toaccomplish such a conference.

Stations 602, 603 and 608 are stations including both a computer and atelephone device, and each is connected to a conference authority 601through an ISP 608. The telephone device at these stations is shownconnected to the computer, and is meant to represent any sort of voicecommunication ability that may be implemented, along with datacapability through the computer. In some cases the telephone may beconnected to the conference authority through a wireless network such asa GSM network, to a PSTN, or by VoIP. There are many possibilities, allknown to the skilled artisan, and the representations made are intendedto encompass all such connectivity and coupling known in the art.Station 604 is a telephone station, and the person using that station islimited to voice communication with other participants. This telephonemay be of any wireless or land-line sort.

Conference authority 601 represents an intelligent conferencing facilityoften termed a bridge in the art, which is a grouping of serversexecuting software from machine-readable media, and having connectivityto all of the networks that may be used by conference participants.Conference authority 601 is in many cases quite complex, but suchconferencing authorities as they exist in the present art are known tothe skilled artisan.

For the purpose of the present example assume that four persons usingthe stations illustrated have joined in a conference concerning healthissues regarding one of the persons, that person engaged in theconference using the telephone-only station 604. The other threeparticipants, using stations 602, 603 and 608 are medical professionals,one (602) the general care physician for the person at 604, another(603) an oncology specialist invited by the physician at station 602,and the third (608) a radiologist.

A unique departure from conventional technology in the present exampleis association of trust authority 605 with conference authority 601. Inone embodiment trust authority 605 may be an integral part of conferenceauthority 601, that is these two authorities may be hosted and a part ofthe same enterprise. The hosting enterprise might be one of thewell-known Internet service providers, or one of the large andwell-known telephony network providers, or a joint venture of more thanone such host. In another embodiment the trust authority may be athird-party enterprise to which the conference authority subscribes, andto which individual ones, or all of the conference participants maysubscribe as well.

The conventional operation of authority 601 is that participants may allhear one another in the conference via voice capabilities of theappliances through which they are connected to the conference, thosewith computer equipment connected to the conference, depending on theirsoftware and functionality of the conference facility may be able toview and exchange information via computer display, and those havingvideo equipment and software compatible with the conference equipmentand software may be able to see as well as hear one another. Thisfunctionality is the principle purpose of conventional conferencingfunctionality.

In the present unique example trust authority 605 provides a range oftrust functionality not available in conventional conferencingfunctionality. For the sake of the present example, which is but oneexample of many that might be described, assume that trust authority 605through SW 606 and instances of SW 606 executing on various processorsin equipment at the conference authority and at the stations used byparticipants, establishes a rule set for the conference. The trustauthority might have a variety of useful rule sets applicable todifferent sorts of conferences, and the person who sets up theconference might select one of these, or at least indicate certainpreferences to the trust authority, which might then determine whichrule set to use.

The present exemplary conference is a medical conference, and thesubject of the conference is a person at station 604, whose familyphysician is using station 602. More particularly the conference isabout diagnosis of an abdominal tumor found in the person at station604. A particular purpose of the conference is to determine diagnosis,that is, is the tumor malignant? And another purpose is to discuss, andat least present alternative treatment options.

All of the participants have logged into the conference. In some rulesets that may be imposed there are special reasons for being sure thatthe participants are who they say they are. So there may be specialcodes beyond the log-in, or Q&A sessions at log-in to be sure theparticipants are in fact trustworthy to the extent that they are whothey represent themselves to be. In the rule set imposed for thisconference functionality is provided that recognizes trust scores forindividuals, and makes it possible that the usual functionality of allthe participants being able to interact (see, hear, share) with all theothers, at least to the extent of their equipment, may be altered, suchthat there may be side communication between two or three participantsthat is not available to one or two or three of the other participants.

It was described before that trust is often a one-way street. This meansthat one of the participants may trust another at a very high level, butthat the other of that pair may not have exactly the same trust levelfor the first. As an example, the person with the tumor at 604 may trusthis family doctor at station 602 completely; on a scale of 1-10, a 10.This means that the person at 603 is willing to share any and allinformation, opinions, fears, expressions, and so on with the doctor at602. But the doctor at 602 may have had some difficulty with the patientin the past, the nature of that difficulty is not terribly important tothe example, and may want to be a bit circumspect with the patient undercertain circumstances. The doctor's trust score for the patient is 8.

Similarly, each person in the conference may have a trust level for eachother person in the conference, which translates to twelve trust scoresfor the four participants. Moreover, the trust scores each person hasfor another may be topical. That is, the doctor may trust the patientcompletely (10) for fiscal issues (the patient always pays and iswell-insured), but not so much for the patient's ability to providetruthful and thoughtful indices of health (the person may be a bit of ahypochondriac). So the trust level between persons in a conference maybe more complicated and not static, as it may be issue-related, forexample. Further, trust level between participants may not be static,but may be changeable during a conference.

It is important that trust level in the sense being here described isnot a feeling or opinion of one about another, although it may berelated to that feeling or opinion. It is rather a score associated withthe other person by any one of the participants. In some cases there mayhave been prior interaction between the participants, and both may besubscribers to, or at least known to the trust authority. “Known to”means the trust authority has information about a person, and is capableof associating a trust score with that person. In this circumstance thetrust score one participant associates with another may be already knownand applied by the trust authority. In another circumstance one of theparticipants may be new to the trust authority, and the trust authoritymay apply a default score on behalf of a subscriber, based on the otherparticipant's log-in authenticity, medical specialty (in this case), orsome other information that may be quickly ascertained from perhaps anexternal (to the trust authority) source. The trust authority may, forexample, at the beginning or early on in the conference, check whetherthe radiologist at station 608 is registered with another authority thatranks such professionals, and what that ranking might be.

So it is seen that trust scores may be established and assigned in avariety of ways for purposes of managing interaction in the conference.These trust scores may be pre-assigned, created by default, or createdby conference participants in a back-channel to thrust authority 605,and scores may be altered during the conference by the trust authorityand participants who have access to functionality to change such scores.The scores are used by the trust authority in managing functionality inthe conference.

Assume now that three of the four participants in FIG. 6 have loggedinto the conference, as invited, and have authenticated themselves, andthe three are the person with the tumor at station 604, the familydoctor at station 602 and the oncologist at station 603, who was invitedby the family doctor. The family doctor at 602 was the initiator of theconference. The radiologist is not in the conference when it begins, butwill be invited later.

One functionality enforced by the rule set imposed is that a certainminimum trust score is required to participate. If a trust score doesnot measure up, that person may be blocked by the conference, dropped,that is, with all communication with and through the conferenceauthority removed. If a participant with an initially passable trustscore has a score changed, that participant may be dropped. Assume, forexample, that the conference starts, and the oncologist at station 603has an initial trust score that passes, but that the trust authoritysoon discovers that person is not registered at a particular site, buthad indicated she was, the trust score is lowered and the oncologist isdropped. This may end the conference, but it may not. The family doctormight invite another oncologist to join, who may prove to be availableand have adequate trust scores that hold up on further checking by thetrust authority, and the conference may continue.

Assume now the oncologist is replaced, and the family doctor, in nominalcontrol of the conference has digital files of MRI scans of the tumorarea of the patient, and proposes to share one or more of the files withthe newly arrived oncologist. Firstly, the MRI files in this instancehave been pre-registered with the trust authority, and the files have atrust certificate. If the family doctor posts the files to theconference the trust authority checks the trust certificate, and thetrust level of the oncologist. If there is a discrepancy, the files maybe blocked in transmission, or parked (cached), and a query posted tothe family doctor. The family doctor may have authority to over-ride theblock, if the personal trust relationship between the doctor and thepatient is high enough, otherwise not. Assume in this case that theblocking problem was caused by the fact of the second oncologist beingnew to the conference, replacing the first one, and his trustcertification has not yet been thoroughly checked. The authority maypost to the family doctor the fact of the block, and a time estimate forchecking out the oncologist. The family doctor informs the patient of aslight delay, and in a minute the trust authority upgrades theoncologist's score to above the threshold, the block is lifted, and thefamily doctor is informed.

Now the oncologist may load and view the MRI files, which may also bevisible to the family doctor on her computer display, but the patient,of course, being connected only by telephone, cannot see the MRI files(and likely need not see them). The family doctor has an interactivecontrol window posted by the trust authority (no other participant hassuch a display window), through which she may quickly initiateside-channel communication. Other participants may have a similarinteractive window through which they may request such side-channelcommunication, but they may not initiate and block such communication.

In this example the oncologist, having looked at the MRI scans for atime, may request through his query window a side-channel with thefamily doctor, who grants it, and the oncologist says to the familydoctor that he has an opinion, but there is a particular radiologist hewould like to consult about one issue before rendering that opinion. Heprovides what contact info he can for the radiologist. The family doctorcontacts the radiologist, who logs into the conference at station 608,and passes the usual drills imposed by the trust authority. Theradiologist has communication with just the oncologist in this case, notthe family doctor or the patient. Also the radiologist has noinformation at all about the identity of the patient, and has accessonly to certain parts of the MRI needed to answer the particularquestion in the uncertainty area of the oncologist. In this case imagingthat the question has to do with a particular shape of the tumor, inwhich the radiologist happens to be a world-class expert.

After the radiologist renders his opinion, he is disconnected from theconference. Now the oncologist signals to the family doctor that he isready to render his opinion, the family doctor enables a side-channel,and the oncologist informs the family doctor he strongly believes thetumor is, in fact, malignant. In the side channel discussion the familydoctor inquires if he has opinions about treatment, and if he would beso kind as to share with the patient. He says he will, so the familydoctor enables three way sharing, and leads the discussion with thepatient, informing of the findings, treatment options, and the like.

This, as described above, is but one of a very large number of examplesthat might be described, but should be sufficient to explainfunctionality of the trust authority aspects of conferencing inembodiments of the present invention. Trust scores and certificates maybe used in some aspects to provide motivation to participants, who maymake decisions based on the scores. Such as, for example, if the secondoncologist had a marginal trust score, the family doctor may have chosennot to invite him to speak directly to the patient. Such scores andcertificates operate in other instances to enable or block certaincommunication automatically. The radiologist must have a sufficienttrust score, his standing with the trust authority in this case, to evensee the portions of the MRI files.

Various additional functionality may be provided in conferences by thetrust authority, as well, such as an ability for one participant to havea back-channel communication with another while the conference isongoing. As an example, assume in the medical conference described thatthe oncologist has accepted the family doctor's invitation to speakdirectly with the patient, and the three-way voice communication hasstarted, but the family doctor (controlling party) is suddenly shockedby what the oncologist is saying, or about to say. The family doctor mayhave an ability to signal the oncologist without just blocking hisvoice, which might be upsetting to the patient. Such a signal might be aSTOP icon, a phrase prominently displayed, such as “get off that”, orthe family doctor may establish a whisper back-channel to be able tospeak to the oncologist, even while the oncologist is talking, andwithout the patient hearing the whispered message. The family doctormight say “Please don't talk about dying to this patient, leave that tome. The oncologist should be able to catch the message and adjust hismonologue without missing a beat.

Also, as described above, trust certificates may be applied to files anddocuments, and the nature of the certificates might filter contents sothat only portions may be heard or become visible, depending on trustlevel of potential viewers, or other circumstances.

Further to the above, trust levels may be transitive; that is, thepatient might set a trust metric with the trust authority that he willtrust anyone she trusts, and even anyone the a person she trusts alsotrusts, and so on. The transitivity may also be made conditional, inthat the patient might choose to trust associates of the family doctorin a fully transitive way, based on the single condition that the trustauthority does not have a reason to veto that trust. There are othersorts of conditions that might apply as well. It also should be notedthat trust is seldom symmetric; that is, the trust of a firstparticipant for a second may be quite different than the trust of thesecond person for the first.

Referring again to FIG. 6, some of the participants are subscribers totrust authority 605, and may execute versions of software 606 as shownusing computerized appliances executing the software frommachine-readable media. In this case some participants may store and usetrust scores at their own computers, and execute some trustfunctionality from their own computers as well.

Participants in a conference, such as described above with reference toFIG. 6, may, as mentioned above, be subscribers to the trust authorityassociated with the conference. Other participants may not. In any case,the trust authority in some embodiments may extend an interactiveconfiguration interface to such participants as may be equipped todisplay and use the interface, and certain options may be provided. Forexample, there may be one or more participants who do not wish to betrusted, that is, they may not care to be responsible for knowledge ofinformation that might otherwise be transmitted to them. These personsmay select in such an interactive interface to block sensitive incomingdocuments or other transmissions, and may also select to have a recordmade that they did not receive such sensitive or proprietaryinformation.

Control over incoming information as described just above for conferenceparticipants may also be extended to individuals communicating through anetwork (or a mixture of networks) with one or more other persons, andsuch functionality may be provided through, for example, configurationinterface 208.

In another aspect of the invention there may be situations wherein aparticipant may want or need to override a decision of the trustauthority. For example, the radiologist invited to participate in theconference at station 609 may be assessed by the trust authority to falla bit short of the level of trust expected to participate under theparticular rule set in place for the conference. It may be, however,that this radiologist is the only one available, and there is a direneed to complete the purpose of the conference. In this circumstancethere may be facility for the chairperson of the conference, in thiscase the family doctor, to override the decision of the trust authority.This functionality may be in an interactive interface available to thechairperson of the conference. In some cases the chairperson mayconsult, on a side channel, with the patient at station 604 forauthority to do so. In some cases the override may be visible tocommunicants, and in other cases not.

In some embodiments a trust authority like TA 205 of FIG. 2, may take ona risk/liability business model. For example, in the case of the TAproviding a brokerage for professionals to market their skills, there isa certain risk, and assumed liability by the trust authority. The trustauthority must, in this case exert a great effort to be sure that peoplethey manage and recommend are in fact, very trustworthy. In the case ofthis business model the trust authority may issue an agreement to besigned by persons who seek to enlist the services of representedprofessionals, the agreement spelling out risks and liabilities.

There may be, in some instances, some confusion between competence andhonesty in determining trust scores and certificates. Competence in thisinstance is more related to skills. That is, can we expect (trust) theperson to exercise represented skills. It is perfectly conceivable thata person may be skilled in a certain area, but may not alwayscompetently exercise those skills. Honesty is a bit different. A personmay be skilled, and competent, but dishonest. Dishonesty may beselective or general.

Several instances of determining and assigning trust scores have beendescribed above. In various embodiments of the present invention thereare a number of novel ways in which trust scores may be established.Firstly for example, in the case of physical networks, it is well knownthat a path through a physical network from a source to a destination istypically over a series of hops. These hops may all be in one network,like the Internet, for example, but may in many instances be a series ofhops in one network followed by a series of hops in another, and thenperhaps in yet another. For example, a person may initiate a voice callfrom a cellular telephone to a person at a computer connected to theInternet, and enabled to handle Internet Protocol Network Telephony(IPNT) calls. The call goes on a wireless network to a base station (onehop), from the base station to a wireless central facility (second hop),perhaps through a PSTN to a bridge, and then from the bridge into theInternet as a IPNT all terminated finally at the destination computer.

Based in a variety of information available to a trust authority, andfollowing a variety of possible protocols and rationale, trust scoresmay be assigned to individual hops; some of which may be more secure andmore trusted than others. Based on the trust scores determined for theindividual hops (or legs) of a transaction may be assigned a compositescore.

An interesting and unique aspect of trust scoring relates to use offilters. Referring again to FIG. 2, a person using station 201 maysubscribe to a trust authority 205, and that trust authority might storeinformation, as described above, for a plurality of persons that may, atleast in one instance, be agents of one or another enterprise. In oneinstance, the trust authority may provide an interface for subscribersto input opinions and ratings regarding other persons. Any subscribermay then have access at the trust authority to ratings and scoresassociated with these other persons.

In an additional functionality the trust authority might also associateeach input rating a person with identity, or at least a profile, of theperson providing the rating. So the rating provided will then beassociated not only with the person rated, but with the person providingthe rating. Now consider that a subscriber may configure a filter fortreating, that is filtering, the ratings at the trust authority, insteadof just accepting the composite rating that may be made from the varietyof people who contributed. The filter may, for example, specify that thesubscriber wants a composite rating for someone, but also wants anycontribution made to that rating by a particular third party to beexcluded. The subscriber may be aware, for example, of certain peoplewho rate others quite higher than the individual subscriber would rate.

In this embodiment a composite rating may be available for a particularperson, but in the event of a filter application I place for aparticular subscriber, the trust authority will recalculate based on thefilter.

Filters might be quite more complicated than the example just provided.For example, the filter might provide a screening that excludes anyagent that has worked for a particular enterprise, and any rating inputfrom any agent that has worked, or currently works for a particularenterprise. The filter might specify in some manner that I want ratingsmade buy people like me, and in this case the trust authority may have avariety of sample profiles for “like me”.

In some aspects persons may be unwilling to make specific ratingsexplicitly, but may be willing to indicate a level of satisfaction, orother indication of an experience with an agent or with an enterprise.In such cases a trust authority may have a software agent that relatesthe experience indicators to trust scores, that is, the trust authoritynormalizes the input into a digital representation. In some otheraspects there may be machine intelligence created and used to assigntrust metrics on a passive basis of observation. This may take the formof a software agent executing on station 201 (FIG. 2) for example. Thesoftware agent might be programmed in the case of voice communicationsto observe and make record of indications, such as length of sentencesused by a communicant, inflection in utterances, volume compared tocontent, and other indications in speech of the attitude and sincerityof the speaker. The records made may then be used by the software agentto assign trust scores to persons engaged in voice communications.

In the case of text a similar software agent may analyze sentencestructure and the like to also assess a trust metric. In the case oftext, certain phrases and sentences used by a communicant might indicatea trust metric. Such sentences and phrases might be mined from text usedby persons known to be not trustworthy.

A variety of examples and embodiments have been described above, andthese are exemplary only. It will be apparent that there are many otheraspects, not explicitly described, but which are suggested by theexamples, and fall within the scope of the invention. Further, many ofthe embodiments describe functionality provided by software, and it isnoted that in every case of software functionality described in thisspecification, the software is executed by a processor in a computerizedappliance, such as a personal computer, an Internet-connected hardwareserver, or a hand-held device, and the software is executed form storagein a machine readable physical medium.

The invention is limited only by the scope of the claims that follow.

The invention claimed is:
 1. A trust network, comprising: at least onetransmission medium supporting transmission of a data file from a callerinitiating the transmission at a first communication device connected tothe network to a receiver of the transmission at a second communicationdevice at a final destination, wherein the data file is in at least someinstances transmitted in discrete portions; wherein two or more nodesare coupled to the transmission medium, the two or more nodesterminating discrete legs in the transmission medium including theentire transmission from the first communication device to the secondcommunication device; and a processor; and a machine-readable mediumcoupled to the processor and storing trust software therein, the trustsoftware including instructions that, when executed by the processor,cause the processor to: apply trust logic to transmission of thediscrete data portions and the trust logic is related to storedinformation associated with the caller and/or receiver of the data file,the caller and receiver being at least an enterprise or a person,determine whether or not a tag is associated with the data file forindicating that the data file is a high-security data file; and inresponse to determining the tag is associated with the electronic datafile, transmit a signal to a trusted node in the trust network totransmit the electronic data file only through another trusted node fordisplay of the electronic data file by the second communication device.2. The network of claim 1 wherein the at least one transmission mediumis one or more of wireless electromagnetic radiation or transmissionover a land line with hardwired connections to nodes.
 3. The network ofclaim 1 wherein the trust network includes one or more wireless networksand one or more land-line connected networks.
 4. The network of claim 1wherein the discrete data portions are data packets transmitted in apacket data protocol (PDP), and at least one of the nodes is a packetrouting node in the Internet.
 5. The network of claim 4 wherein thetrust logic is used in determination of a receiver at a next node towhich to transmit a data packet.
 6. The network of claim 1 wherein thediscrete data portions are telephony events between the caller andreceiver, one of the nodes includes routing functionality for telephonyevents, and the trust logic is used in determining a receiver at adestination to which to route the telephony event.
 7. The network ofclaim 6 wherein the node with routing functionality is a switch in acontact center with the routing functionality provided by a separateserver connected to, and monitoring and controlling the switch.
 8. Thenetwork of claim 6 wherein the node with routing functionality is apacket router in a data packet network, the node routing a packetizedtelephone event, and wherein the trust logic is used in determiningcommon routing for all packets associated with the telephone event. 9.The network of claim 1 wherein the discrete portion is an email message,and the trust logic is used in determining a receiver of the email. 10.The network of claim 9 wherein one or more attachments are associatedwith the email, and the trust logic is used in determining whether toforward the email with or without the one or more attachments.
 11. Amethod for trust treatment in a network, the method comprising:receiving, by a processor, a signal indicating an electronic data fileis to be transmitted from a first communication device to a secondcommunication device; executing trust software from a machine-readablemedium by the processor on one or more nodes terminating discrete legsin the network; applying, by the processor, trust logic by execution ofthe trust software to data transmitted from a caller in discreteportions in the network, the caller initiating the data transmissionfrom a communication device connected to the network to a receiver ofthe data transmission at a communication device connected to the networkat a final destination, the trust logic related to stored informationassociated with the caller and/or receiver of the electronic data file,the caller and receiver being at least an enterprise or a person;determining, by the processor via the trust software applying trustlogic, whether or not a tag is associated with the electronic data filefor indicating that the electronic data file is a high-security datafile; and in response to determining the tag is associated with theelectronic data file, transmitting, by the processor, a signal to atrusted node in the trust network to transmit the electronic data fileonly through another trusted node for display of the electronic datafile by the second communication device.
 12. The method of claim 11wherein the network comprises one or more wireless networks and one ormore land-line connected networks.
 13. The method of claim 11 whereinthe discrete data portions are data packets transmitted in a packet dataprotocol (PDP), and at least one of the nodes is a packet routing nodein the Internet.
 14. The method of claim 13 wherein the trust logic isused in determination of a receiver to which to transmit a data packet.15. The method of claim 11 wherein the discrete data portions aretelephony events, one of the nodes includes routing functionality fortelephony events, and the trust logic is used in determining a receiverto which to route the telephony event.
 16. The method of claim 15wherein the node with routing functionality is a switch in a contactcenter with the routing functionality provided by a separate serverconnected to, and monitoring and controlling the switch.
 17. The methodof claim 15 wherein the node with routing functionality is a packetrouter in a data packet network, the node routing a packetized telephoneevent, and wherein the trust logic is used in determining common routingfor all packets associated with the telephone event.
 18. The method ofclaim 11 wherein the discrete portion is an email message, and the trustlogic is used in determining a receiver of the email.
 19. The method ofclaim 18 wherein one or more attachments are associated with the email,and the trust logic is used in determining whether to forward the emailwith or without the one or more attachments.