health, and uses blockchain to manage transactions according to systemised and auditable contracts (extending on direct permission models of security) created over each digital asset. As such it will work best where there are highly reliable identification processes in place and it requires or must maintain a globally accessible timing facility accessible by time reference blockchains enabling high quality timing for the purpose of coordination of streams as well as for global referential integrity of data involved in participating block chains managing transfers and valuations for audit and evidence related functionality. Such diverse assets and processes may be controlled or produced by diverse sources of expertise operating in diverse roles with configurable determinations supported by coordination tools with secure, configurable blockchains for rights protections, audit trails with directly coupled blockchain payment and resource management as well as access control systems.
If the regulatory system operating in the jurisdiction explicitly allows it, the platform could be set up as a monopoly. It is envisaged that in such circumstances and most likely others as well, a government enabling transaction bandwidth trading would also enact policy and legislation preventing, reducing or at least measuring exploitation of classes of users that may be at risk of exploitation. Specifically, youthful game players from lower socio-economic backgrounds have on occasions been found to be at risk of harmful addiction to game-playing. If government processes do not ensure adequate education of the risks, monitoring, protection and/or sufficient effective incentives to ensure children in particular participate effectively in education and experiences required to ensure normal healthy development. Because regulators not implementing a PEOPLE health-centred enterprise model as part of any profit-making opportunities are likely to be found wanting by voting constituents, the specification for this invention specifically includes linkages to health-enabling functionality. The FURTHER costs to a society in mental health and physical disease burden (obesity) where this continues to be not managed effectively should not be underestimated.
FlowMake
AUSTRALIA
Patents Act 1990
Description
REFERENCE TO RELATED APPLICATIONS PCMF : separate provisional patent#2020902071 TransPair :separate provisional patent#2020904630 AuthStack :separate provisional patent#2020904085 TickStack :separate provisional patent#2020903487 TickTrack :separate provisional patent#2020903375 BAC : separate innovations patent#2020902146 SafeEShare : separate innovations patent#2020100425 DetPat : separate divisional patent IP#XXXXXX DIagML : separate provisional patent#2020901672 AN ONLINE TOOL ALLOWING COMMERCIAL COLLABORATIONS...: separate innovations patent#2018100747
FIELD OF THE INVENTION
Embodiments of the present invention are in the field of business, financial management, infrastructure management, commodity and counter stock trade, government, travel, risk management, diplomacy, education and health, personal accounting and uses block chain to manage transactions according to systemised and auditable contracts (extending on direct permission models of security) created over economic and digital assets and
management of any distributed data-driven process requiring remote data capture, data processing, predictive modelling, performance production, organization and contracting of processes or performance of sub-tasks using blockchain contracts and protection and
use ofenhanced data including illustrative display of complex data relationships including storyboards, mapped designs, multidimensional correlations, patterns and predicted outcomes as well as electronic recording elements of investigative surveillance, process modelling, creative collaborative performances and processes being controlled by block chain contracts as an extension to passive direct permission models.
Outcomes include : enabled digital economy production processes as well as digital assets, designed agreements, processing protocols, operating systems, packages of evidence, predictions, opportunities for arbitrage, improved trade relations, products, programmes and packages of audio-visual or other types of instruction including Al-produced translations or other information that is transferrable to or from remote locations for use as downloadable, streamed or sent data packages to/from applications or users as : entertainment, aesthetic / cultural experiences, education or evidence of task performance, event involvement, resource engagement, instruction or supervision. The contract as blockchain control model is designed to allow negotiated national-interest cross-border cooperation of data processing and reporting as well as local users' needs.
BACKGROUND OF THE INVENTION
The statements in the background of the invention are provided to assist with understanding the invention and its applications and uses, and may not constitute prior art.
The need to adapt or control human experiences, environments and habits is becoming more urgent as populations increase, resources remain limited and humans become more interconnected more quickly. While the opportunity for using technology to more positively contribute to well-being has grown at a fast pace and continues to grow, there is plenty of opportunity to improve the reliability of relationships required to fund, operate and regulate the necessary infrastructure and services in a manner encouraging high quality ongoing decision making and operation that supports outcomes and high quality data sustaining higher quality, equitable economies.
Where economies are successful in this. incentives to explore new efficiencies and discover, improve or make operations fairer and safer will emerge. Al will likely be applied to a whole range of unexpected problems and situations and will likely come up with a whole range of system perturbations with increasingly less obvious control characteristics and inter-relationships - way beyond the level of 'mere mortal' detection and understanding.
The Al learning space is becoming increasingly perceived as carrying undesirable risks, not least in privacy, and exploitation as the general population grows to better understand the risks and results of lax or inadequate data protection. Mass data users (including government) need to demonstrate they are being responsible with data and deserving of the trust they require to access opportunities for greater efficiency of limited resources including use of "dangerous" technologies like Al and massively integrated systems. They understand that systems must be carefully designed to make it as easy as possible to explore complexity, especially in showing indirect relationships. Block chain platform standardisation (including development processes, models, references, interlocking and interfaces) presents governments with an opportunity to improve accessibility to system transparency without compromising data privacy unnecessarily because they know it will increase reliability and safety while ensuring more standardization and efficiencies can continue to occur.
Tools for shedding light on hidden relationships will reduce the likelihood of large unexpected shocks in the systems that are being controlled and will better ensure unsafe, unfair or undesirable forces can be mitigated by law or risk abatement.
The enforced isolation of the COVID-19 epidemic has increased public acceptance for remote interaction. Increases in networking over the last few years as well as near universal access to personal communications technology (mobile phones) suggest the time is right to help more-creative-less-technical people broach people- and economy- connection barriers with more timely, efficient, safe and therefore more effective solutions for cultural and economic development, mental health improvement and social disengagement in circumstances complicated by isolation. Al presents the most realistic possibility of processing the growing number, nature and diversity of available sources of data to protect both people and assets. It would be an advancement in the state of the art to provide systems and methods for more easily embracing the opportunities presented by these technologies with due regard to safety, rights, privacy, equity and accountability to ensure the rewards of an advancing society and international trade are enjoyed equitably.
BRIEF SUMMARY OF THE INVENTION
Disclosed are systems of devices, architectures and methods for facilitating processes supporting sustainable global digital economy on multiple distributed devices across diverse jurisdictions and using diverse platforms by : marketing of transaction bandwidth packages servicing reliable, secure and sustainable digital enterprise by diverse public users, including private enterprise, and where necessary purchasing and selling access packages to/from other digital economic platform systems ensuring an ongoing efficient reliable, secure contractable service by the platform's users with regulators able to monitor operation of the platform, ensure the sustainable health of the infrastructure, digital economies and society it is resourcing.
Security data is assumed available via legal technology-imposed parameters-of-use contracts (ie blockchain) either at the device or in some interposed gateway device implemented with assumed national or international loT standardization. It is assumed that relevant state and territory regulatory authorities check and authorize import and installation of IoT and gateway devices that provide access according to their own laws, possibly in combination with Access Control Devices, and that those same authorities only authorize OEMs supplying their IoT products to operate with firmware/software appropriately standardised to allow only legally authorized access via such methods agreed with the regulator and also controlling additional secured accesses implemented by the individual participants, businesses and or organisations owning and or installing such security devices according to their own needs and in accordance with law. Facility for blockchain control of records generated will allow chain of custody controls to be asserted for audit purposes.
The data model reflects the system's operation as a purchase facility, facility provider and clearing house for pairings of the multiple currencies and associated transaction bandwidths required by its users internally (being a clearing house - essentially but not necessarily only where there is shortfall or oversupply) as well as externally across the multiple platforms and jurisdictions with which the FlowMake system engages. It entails all functionality supporting provision of a reliably stable service where the service is both technical (network) and financial (banking authority, banking services, foreign exchange services) as well as fulfilling legal requirements of the regulatory system and agencies involved. Functionality will therefore specifically include: audit of users interactions with the system as well as modelling environments for both service users as well as system operators predicting shortfalls for rectification and/or designing pricing packages, as well as seeking, authorizing and making provision for and/or proactively connecting with new exchange sources offered by other jurisdiction-currency platforms. It will also include A-enhanced client/service seeking, using existing usage profiles to identify business development opportunities.
The platform compliments the regulatory environment of 'AuthStack' and supports the functionality of any block chain using function and therefore has productive application in business, commodity and counter stock trade, government, arts, advertising, sports broadcast, travel, risk management, diplomacy, education and health, and uses blockchain to manage transactions according to systemised and auditable contracts (extending on direct permission models of security) created over each digital asset. As such it will work best where there are highly reliable identification processes in place and it requires or must maintain a globally accessible timing facility accessible by time reference blockchains enabling high quality timing for the purpose of coordination of streams as well as for global referential integrity of data involved in participating block chains managing transfers and valuations for audit and evidence related functionality. Such diverse assets and processes may be controlled or produced by diverse sources of expertise operating in diverse roles with configurable determinations supported by coordination tools with secure, configurable blockchains for rights protections, audit trails with directly coupled blockchain payment and resource management as well as access control systems.
If the regulatory system operating in the jurisdiction explicitly allows it, the platform could be set up as a monopoly. It is envisaged that in such circumstances and most likely others as well, a government enabling transaction bandwidth trading would also enact policy and legislation preventing, reducing or at least measuring exploitation of classes of users that may be at risk of exploitation. Specifically, youthful game players from lower socio-economic backgrounds have on occasions been found to be at risk of harmful addiction to game-playing. If government processes do not ensure adequate education of the risks, monitoring, protection and/or sufficient effective incentives to ensure children in particular participate effectively in education and experiences required to ensure normal healthy development. Because regulators not implementing a PEOPLE health-centred enterprise model as part of any profit-making opportunities are likely to be found wanting by voting constituents, the specification for this invention specifically includes linkages to health-enabling functionality. The FURTHER costs to a society in mental health and physical disease burden (obesity) where this continues to be not managed effectively should not be underestimated.
The present invention relates to methods and systems facilitating processes that support sustainable global digital economy on multiple distributed devices in diverse jurisdictions and using diverse platforms by : marketing of transaction bandwidth packages for the purpose of servicing and/or conducting reliable, secure and sustainable digital enterprises for the public, for public and private enterprise with regulators able to monitor operation of the platform, the digital economies it is resourcing and the sustainable operation of the economic systems it supports, and by purchasing and selling access packages to/from other digital economic platform systems ensuring a reliable, secure contractable service by the platform's users.
A Patent is thought deserving on the strength of bringing these elements things together in an innovative manner as follows 1. Data Model extending financial and network systems by explicitly connecting economically meaningful activities across diverse concepts of value, borders and cultures in order to most efficiently service needs possibly separated in space, time and nature via transparent economic linkages and governance, enabling and therefore hopefully encouraging processes catering to the self-determined needs (including health and education) of individuals and democracies. The value placed on procured blockchain contract-controlled infrastructure as a commodity useful to a diverse market of automation users, information users, game players and manufacturing producers can be used to efficiently distribute the costs of the system providing the infrastructure. FlowMake could be the basis of a self- service model implementing user-oriented processes, triggers and paths with object-orientation techniques where : • Individuals have devices for purchase of saleable assets and monitoring of the market and their own needs for blockchain contract-controlled infrastructure (eg transaction bandwith packages); and • Interfaces and architectures of these devices and others involved are standardized on • Mobile devices' (eg mobile phones) ability to present and secure information * IoT communications in both directions appropriate to security and operation requirements • User interactions including accesses controlled by specific but flexible and determinate block chain contracts; and • Resources managed with block chains; • Security as required, selected, purchased and configured for the particular device and application as linked to the purchase account; and • Where networked data enabling the operation of automation/games/downloads of information is not already automatically available (by virtue of sufficiently timely network availability and traffic already spreading the needed data, the device contract self-operates to ensure the device operation performs as required, consuming purchased transaction bandwidth from the purchased account, and upon hitting a lower limit, the app on that device either creates a user message alerting to a possiblely imminent shortfall or automatically purchases according to the configuration of the user's transaction bandwidth account. 2. A market is created for transaction bandwidth packages and possibly also security implementations. Profits from this market can be attributed to information infrastructure and to social programs managing risks associated with the technologies and processes implemented over the platform. 3. Assets will be controlled according to configurable block chains matching systemized and auditable CONTRACTS applying to each commercialized asset and managed via API's dealing with IN and OUT data as well as parameter checks and using configuration structures that automatically encourage full determination (eg DetPat separate divisional patent IP#XXXXXX) in order to safely extend the range of economic interactions and application of Al as efficiently and safely as possible. 4. A set of devices producing a high resolution global timecode with redundancy implemented within an architecture producing controlled and measured copies with programmed calibration protocols made available on connected networking as required by availability and required accuracy to sustain sufficiently high resolution referential integrity for platform managed applications and users needing it.
5. A protocol for confirming location resolution to measure and sustain sufficiently high resolution referential integrity for platform managed applications and users needing it.
6. A platform allowing performance contracts to be shared by subcontracting parties (eg AN ONLINE TOOL ALLOWING COMMERCIAL COLLABORATIONS...: separate innovation patent#2018100747)
Data Model : The processes producing economic outcomes with digital assets may also be used to bring about non-commercial outcomes ie better health of individuals or populations. As such the data model is orientated towards sub-processes common to both types of outcomes ie activitiesthat will therefore be catered for in the data model to manage the transformation of various THINGS throughout the process and duration of the system's management of it and for which other data representations will also be included in the model D identifying or describingthat THING or characteristics about that THING; E planningfor that THING, E implementing that THING, D conflating that THING, E calculatingthat THING, D categorizingthat THING, E calculatingtiming referenceforthat THING (to another or different thing), E calculatingtiming offsetfor that THING (to another or different thing), E contractingaccess to that THING, E authorizingthat THING, ] updating that THING, E operatingthat THING, D waitingfor that THING (trigger, notification), L seeking that THING (demand to other systems), E exploring that THING (demand to Al systems and other systems), D replaying that THING, D rehearsingthat THING, E monitoringthe execution or condition of that THING, E repairingthat THING, D reportingabout that THING, E destroying that THING.
THINGS will include: Counters (anything of tradable value including different bitcoins), contracts, transfer, number, platform type, platform policy, protocol, transaction bandwidth units, transaction bandwidth specification, bank account, price, balances, currency, tax, profit, Identification, approval, approving process, authorization, authorizing process, performance, investigation, document, evidence, event, booking, discussion, timeline, script, inset, venue, map, pinning, location, location data, constraint, performance, rehearsal, draft, recording, image, programme, campaign, publishing, subscription, subscriber, participant, contract, visit, interaction, treatment, health context, schedule, stage, planning, rolling out, identifying, nominating, subscribing, survey, measure, profile, description, assessment, process description, code module, process, process preparation, scheduled process, delay, correlation, tag, variable, flag, report, prediction, display dimension, conditional process, trigger, alerting, reminding, evidence provision, supervisor, surveillance, localization.
Potential Data Contributors and Data Users
This will expand as systemizations increase and technology improves to allow more data to be collected more efficiently. At this present time the following categorizations for contributors and users include :
Critical: platform developers (leader), financial services industry, telecommunications providers, regulators, cryptologists, mobile device manufacturers, information managers, mass-produced personal device manufacturers, security device manufacturers, police, medical device manufacturers, game developers, big data, advertising providers, travel agents, banks, teachers, parents/guardians, state education departments, volunteers.
Likely: a national digital health department (leader), state health departments, medical professionals (including mental health), other government departments, economists, gymnasiums, manufacturers, household device manufacturers.
Possible: medical researchers.
Architectural Design
Due to the highly diverse app functionality comprising the major part this invention, the consumer mobile platform is an essential component.
Main modules and what they would do 1 eg Client and Market model (including risk) activities. Main modules and what they would do 2 eg Regulatory interface scope Main modules and what they would do 3 eg Platform Exchange and Network interfaces Main modules and what they would do 4 eg Design strategy and architecture
Main modules and what they would do 5 eg Audit System Main modules and what they would do 6 eg Client Service Management App/Device
The majority of the coordination functionality to be served from the platform including access to data, access to process steps and packages of data for those steps, and coordination to local functionality including input into block chain controlled payment and access functionalities configured using something that already is or may become a mass-produced device conforming to security (something you know and something you have) that may for various reasons NOT be a moile phone. In maintaining public acceptability of what is already a pervasive social force for the benefit of society but also requiring exercise of social responsibility, it may necessarily include extra functionality relating to democratically popular services (news, streaming services, health monitoring) and needs (privacy).
Therefore, apart from the data model accomplishing the clearing house functionality the method of this invention includes design of its enablement with such provisions as follows :
A platform device manufacturer wanting to offer this functionality would need to be able to • deliver the secure and reliable set of devices that can : o produce transaction bandwidth specifications o produce shortfall identification and projected shortfall balances o model demand and bandwidth use o maintain price models o identify and purchase offers from competing platforms matching projected shortfalls o store and manage a depository of user account balances of purchased transaction bandwidths o produce/access a high resolution global timecode with redundancy implemented within an architecture producing controlled and measured copies with programmed calibration protocols made available on connected networking as required by availability and required accuracy to sustain sufficiently high resolution referential integrity for all applications and users needing it. * provide auditable APIs for establishing and operating network access * provide auditable APIs for establishing and storing high quality audit trails * provide auditable APIs for identification and assuming of authority roles that integrate with and therefore can be confirmed against business registries eg ACNC, ASIC * provide auditable APIs for operating bank accounts via auditable blockchain control
* provide auditable APIs for creating contracts in blockchains with appropriate public interest and national interest safeguards as required by law in the jurisdictions in which it operates * Provide auditable APIs for IoT devices required for data sources, integrated properly into the contract based access system and timecode access system.
A security device manufacturer wanting to sell devices might be selected by the platform developer due to the device manufacturer's ability to provide devices that allow users to : * run software that maintains or references a global time track for and records sound and/or vision with the time track accessible to curators, editors and processing on the platform * run software that checks and calibrates location information provided by devices so that corrections are accessible to curators, editors and processing on the platform * includes auditable code of security mechanisms protecting access to security data as required by public interest and by law in the jurisdictions in which it operates.
A personal device manufacturer wanting to sell devices might be selected by the platform developer due to the device manufacturer's ability to provide devices that allow users to : • place local advertising to be placed directly into playbacks of digital assets communicated by the platform (eg picture in picture) * run software that maintains a time track for and records sound and/or vision with a time track accessible to curators, editors and processing on the platform * run software that checks and calibrates location information provided by devices so that corrections are accessible to curators, editors and processing on the platform * includes a security mechanism encouraging users to protect personal data by disaggregating or otherwise protecting access to communicated personal data as required by public interest and by law in the jurisdictions in which it operates.
A personal or other measurement device manufacturer wanting to sell more devices (eg micro cameras, fitness bracelets) might be selected by the government department leading a preventative mental health or obesity busting program due to its ability to offer appropriate device architectures and software packages with API's capable of producing apps for: • interoperating with other devices (eg security/tracking/regulatory applications) * micro-location recordings, * integration with particular timing tracks, * able to be set with a sticky-bit for curation purposes, * able to provide or engage in protocols to confirm location data via acceptable protocols, configuring the personal measurement device so users can link the device to a specified mobile phone for bundling, collecting and storing personal data on that mobile phone with privacy according to agreed functions and structures protecting the data (eg SafeEShare : separate innovations patent#2020100425) or some other security mechanism that encourages users to protect personal data as required by public interest and by law in the jurisdictions in which the device is operated.
A sound producing device manufacturer wanting to sell more devices (eg speakers, headphones) might be selected by the platform device manufacturer due to its ability to offer an appropriate device configuration architecture and software packages with API's capable of producing apps for: • measuring room response with a user's pre-characterized or nominated microphone/s * tuning a performance playback according to required sound experiences * displaying data graphically, filtering etc.
For contextualizing of performances, program activities, self-servicing, assistance, stored recommended exercise or test equipment setups or educational advice, all activities linked into this system must be profiled into special determinate data structures pertinent to the participating components of the system and the style of device being set up. This is as per DetPat : separate divisional patent IP#XXXXXX.
More specifically, in various embodiments, the present invention is a template of activities and relationships, a data model, an architectural framework and a suite of devices, computer-implemented programmes and API's for.............................................(encompassing minimum list = claims incl at least one device that is novelly applied in this way or is novel in itself)
In an embodiment,...........(extra to claim 1)
In an embodiment,...........(extra to claim 1)
In an embodiment,...........(extra to claim 1)
In various embodiments, a system is described, including a memory that stores computer-executable components; a hardware processor, operably coupled to the memory, and that executes the computer executable components stored in the memory, wherein the computer-executable components may include a components communicatively coupled with the processor that execute the aforementioned steps.
In another embodiment, the present invention is a non-transitory, computer-readable storage medium storing executable instructions, which when executed by a processor, causes the processor to perform a process for generating measurements, the instructions causing the processor to perform the aforementioned steps.
In another embodiment, the present invention is a system for ......... (clarification of any of claims steps in other parts of the architecture)
In yet another embodiment, the present invention is a computerized server comprising at least one processor, memory, and a plurality of computer codes embodied on said memory, said plurality of computer codes which when executed causes said processor to execute a process comprising the aforementioned steps.
Other aspects and embodiments of the present invention include the methods, processes, and algorithms comprising the steps described herein, and also include the processes and modes of operation of the systems and servers described herein.
Yet other aspects and embodiments of the present invention will become apparent from the detailed description of the invention when read in conjunction with the attached drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF THE INVENTION
Overview
With reference to the figures provided, embodiments of the present invention are now described in detail. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention can be practiced without these specific details. In other instances, structures, devices, activities, and methods are shown using schematics, use cases, and/or flow diagrams in order to avoid obscuring the invention. Although the following description contains many specifics for the purposes of illustration, anyone skilled in the art will appreciate that many variations and/or alterations to suggested details are within the scope of the present invention. Similarly, although many of the features of the present invention are described in terms of each other, or in conjunction with each other, one skilled in the art will appreciate that many of these features can be provided independently of other features. Accordingly, this description of the invention is set forth without any loss of generality to, and without imposing limitations upon, the invention.
Data Model Embodiments
Some embodiments of the present invention include a computer-implemented method comprising receiving one or more user parameters from a user device; receiving one or more user parameters from a remote device; method step 1, method step 2, etc........Accordingly, other embodiments of the present invention include a computer system, comprising a memory that stores computer-executable components; a processor, operably coupled to the memory, and that executes the computer-executable components stored in the memory, wherein the computer-executable components comprise a data collection component communicatively coupled with the processor that receives user parameters from the user or a user device and receives one or more user parameters from other devices; method step a, method step b,....
Hardware, Software, and Cloud Implementation of the Present Invention
As discussed, the data (e.g., photos, textual descriptions, and the like) described throughout the disclosure can include data that is stored on a database stored or hosted on a cloud computing platform. It is to be understood that although this disclosure includes a detailed description on cloud computing, below, implementation of the teachings recited herein are not limited to a cloud computing environment. Rather, embodiments of the present invention are capable of being implemented in conjunction with any other type of computing environment now known or later developed.
Cloud computing can refer to a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. This cloud model can include at least five characteristics, at least three service models, and at least four deployment models.
Characteristics may include one or more of the following. On-demand self-service: a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider. Broad network access: capabilities are available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs). Resource pooling: the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but can be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Rapid elasticity: capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. Measured service: cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
In another embodiment, Service Models may include the one or more of the following. Software as a Service (SaaS): the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based e-mail). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS): the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
Infrastructure as a Service (IaaS): the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Deployment Models may include one or more of the following. Private cloud: the cloud infrastructure is operated solely for an organization. It can be managed by the organization or a third party and can exist on premises or off-premises.
Community cloud: the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It can be managed by the organizations or a third party and can exist on-premises or off premises.
Public cloud: the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Hybrid cloud: the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
A cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability. At the heart of cloud computing is an infrastructure that includes a network of interconnected nodes.
The cloud computing environment may include one or more cloud computing nodes with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) or cellular telephone, desktop computer, laptop computer, and/or automobile computer system can communicate. Nodes can communicate with one another. They can be group physically or virtually, in one or more networks, such as Private, Community, Public, or Hybrid clouds as described hereinabove, or a combination thereof. This allows cloud computing environment to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device. It is understood that the types of computing devices are intended to be exemplary only and that computing nodes and cloud computing environment can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser).
The present invention may be implemented using server-based hardware and software.
For interface with a user, the hardware may include one or more user input devices (e.g., a keyboard, a mouse, a scanner, a microphone, a web camera, etc.) and a display (e.g., a Liquid Crystal Display (LCD) panel). For additional storage, the hardware my also include one or more mass storage devices, e.g., a floppy or other removable disk drive, a hard disk drive, a Direct Access Storage Device (DASD), an optical drive (e.g. a Compact Disk (CD) drive, a Digital Versatile Disk (DVD) drive, etc.) and/or a tape drive, among others. Furthermore, the hardware may include an interface one or more external SQL databases, as well as one or more networks (e.g., a local area network (LAN), a wide area network (WAN), a wireless network, and/or the
Internet among others) to permit the communication of information with other computers coupled to the networks. It should be appreciated that the hardware typically includes suitable analog and/or digital interfaces to communicate with each other. The hardware operates under the control of an operating system, and executes various computer software applications, components, programs, codes, libraries, objects, modules, etc. indicated collectively by reference numerals to perform the methods, processes, and techniques described above.
The present invention may be implemented in a client server environment. In some embodiments of the present invention, the entire system can be implemented and offered to the end-users and operators over the Internet, in a so-called cloud implementation. No local installation of software or hardware would be needed, and the end users and operators would be allowed access to the systems of the present invention directly over the Internet, using either a web browser or similar software on a client, which client could be a desktop, laptop, mobile device, and so on. This eliminates any need for custom software installation on the client side and increases the flexibility of delivery of the service (software-as-a-service), and increases user satisfaction and ease of use. Various business models, revenue models, and delivery mechanisms for the present invention are envisioned, and are all to be considered within the scope of the present invention.
In general, the method executed to implement the embodiments of the invention, may be implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions referred to as "computer program(s)" or "computer code(s)." The computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, cause the computer to perform operations necessary to execute elements involving the various aspects of the invention. Moreover, while the invention has been described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments of the invention are capable of being distributed as a program product in a variety of forms, and that the invention applies equally regardless of the particular type of machine or computer-readable media used to actually effect the distribution. Examples of computer-readable media include but are not limited to recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks, (DVDs), etc.), and digital and analog communication media.
basic method D Agreement by financial industry and sovereign regulatory authorities to transition or adopt standard typing and interfaces plus maintenance processes for a distributed digital exchange clearing house architecture for interfacing system users with other users in multiple jurisdictions and multiple technical environments including <; scope, list name functions and entities standardised>
Id Designed mandatory policy measuring/reducing/preventing exploitation of user populations if private monopoly increases profitability of opportunities to include : <; integrated profit and human health model, privacy profiles, user groupings, classes of activity, imposed user profiles, profit trigger points >
E Agreement by financial industry and sovereign regulatory authorities on high quality maintained identification as part of a sovereignty-wide regulatory model and identification, account, protocols and transaction reporting interfaces for regulators o <; list key entities> o <; list key functions>
o Obligatory use of all-jurisdiction-wide standard typing and listings in reporting of <; list name the base reported entities> E Agreement by network services system participants, financial industry and sovereign regulatory authorities on reliability standards and service development protocols
D Agreement by network services system participants on identification, account, trading protocols and transaction reporting interfaces and interface maintenance protocol
E Designed functionally complete block chain implementations of reports updating traces using component system maintained information <; list name functions and entities standardised>
E Access to complete block chain implementation of authorizing identification transactions by use of an identification authority device that includes one or more of : <; list of authorizing functions eg facial recognition,voice recognition,., state processing of personal device>
E Designed functionally complete block chain implementation of transactions coordinated to update audit and/or traces of transaction bandwidth transactions by use of a portable and or wearable personal device that include <; list of user functions including auth cycle>
E Designed functionally complete block chain implementations for standardized transactions allowing distributed devices to access transaction bandwidth accounts that include : <; list of vendor functions that includes transfer, auth check and re-auth>
E Designed functionally complete block chain implementations for standardized transactions allowing distributed devices to access transaction bandwidth accounts that include : <; list of vendor functions that includes transfer, auth check and re-auth>
M Access to at least one global time reference confirmation device
I Access to at least one global GPS / triangulation system E Designed functionally complete block chain implementations and/or access to block chain seeking/interpretation functions to include : <; list of operational functions for examining account balances, monitoring accounts, monitoring sales and purchases, monitoring prices, monitoring platform traffic, monitoring exchange activities, modelling traffic >
K Designed functionally complete block chain implementations and/or access to block chain seeking/interpretation functions to include : <; list of regulatory and forensic functions for examining account balances, monitoring accounts, monitoring sales and purchases, monitoring prices, monitoring platform traffic, monitoring exchange activities, modelling traffic > sub methods of method 1 : ?Claims of global time reference confirmation device: ?Claims of global GPS /triangulation system: ? Any Sub-claims that need more detail transaction purchasing and monitoring device :
[d includes time calibration by automatic communication with IoT network devices
0 transactions to "charge-up" systems via a FlowMake account L configuration of automatic account access by an operating device D transactions to set up monitoring of transactions empowered by a FlowMake account D transactions to audit a device empowered by a FlowMake account
one or more non essential method variations or additions: d Modelling environment
one or more non essential method variations or additions to transaction purchasing and monitoring device
[l communication protocols to manage data privacy on the device; or
D participation protocols to setup other personal device/s to manage data privacy as well as notifications on the device or on other identified devices; or
D participation in remote device operating or remote data recording on other devices according to block chain access controls set up for the identified wearer; or
D transactions for bio/voice confirmed-a uthenticity block chain recording and maintaining of an authorized wearer identification by automatic communication with identification devices E processing with an inbuilt sensor for continuity of the living wearer signal; or E participation in transactions citing lack-of-confirmed-continuity of an identified wearer of a device as acceptable identification for operating an account; or
I transactions for maintaining a system-wide heartbeat that times out of bio/voice confirmed authenticity block chain recording and maintaining of an authorized wearer identification by automatic communication with available sovereignty-authorised automatic identification devices for processing with an inbuilt sensor for continuity of the living wearer signal; participation in transactions citing lack-of-confirmed-continuity of an identified wearer of a device as acceptable identification for operating an account; or M transactions that will allow later reporting of locations of transfers or the identified wearer.