WO2009070885A1 - Procédé et système de réseautage social sécurisé - Google Patents

Procédé et système de réseautage social sécurisé Download PDF

Info

Publication number
WO2009070885A1
WO2009070885A1 PCT/CA2008/002123 CA2008002123W WO2009070885A1 WO 2009070885 A1 WO2009070885 A1 WO 2009070885A1 CA 2008002123 W CA2008002123 W CA 2008002123W WO 2009070885 A1 WO2009070885 A1 WO 2009070885A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
content
piece
rank
event
Prior art date
Application number
PCT/CA2008/002123
Other languages
English (en)
Inventor
Jeff Booth
Sanjay Maharaj
Christopher William Lake Nickerson Nickerson
Original Assignee
Sharemylife Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sharemylife Inc. filed Critical Sharemylife Inc.
Publication of WO2009070885A1 publication Critical patent/WO2009070885A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • This invention relates to methods and systems for sharing information, and more particularly for controlling the information shared with a content rating system and for creating a virtual message for delivery to the recipient(s) at a later date in a secure environment.
  • Social networking web sites allow users of the site to post content to the web site about themselves, such as images, text, videos, etc. for viewing by others.
  • content can be viewed or experienced by all visitors to the site, or may only be available to those who have been invited to access the material by the poster (often referred to as "friends").
  • a difficulty with these sites is that the access to a user's posted content tends to be very open, and the user therefore lacks privacy as their personal and private lives collide on the web.
  • the user is not able to keep content private that may result in a collision of their personal lives, for example, with their professional lives, potentially leading to a very wrong impression on either side.
  • the invention provides a means to control the disclosure of content by providing a scale whereby users can provide a ranking to other members of the community, and to content posted by the user to the site. Only members with a ranking equal to or greater than the content are permitted to access such material.
  • a solution to this problem provided by the invention is the use of a content rating system.
  • a user has the ability to assign each and every piece of content a rating, such as from “1” to "10” on a rating bar where "1" is closed and “10” is open. The user may than assign a rating to their friends and family members in their network.
  • a storage system accessible via a web site including a piece of content stored in a secure environment, accessible by a user providing a username and a password; an email address associated with the piece of content; an event associated with the piece of content; wherein when the event occurs, an email is sent to the email address, and the email includes a link to the piece of content, and the password, thereby allowing the recipient of the email to access the piece of content.
  • the event may be the passage of an amount of time selected by the user after storing the piece of content in the secure environment.
  • the event may be the death of the user, the death of a relative of said user, or the birth of a relative of the user.
  • a method of storing a piece of content in a server including: providing storage space to a user, the storage space accessible via a username and password; the piece of content placed, by the user, in the storage space; associating by the user, an event associated with the piece of content; associating, by the user, an email address with the piece of content; and on occurrence of the event, sending an email to the email address, the email including a link to the piece of content and the password, permitting access to the piece of content to a recipient of the email.
  • a method of a providing a user space to a community of users including: a) providing a designated user storage space on a web site hosted on a server, the space containing a piece of content uploaded by the designated user, the designated user associating a first rank with the piece of content; b) on permitting access to the user space by a member of the community of users, the designated user associating a second rank with the member; c) if the second rank equals or exceeds the first rank, allowing the member to access the piece of content at the user space; and d) if the second rank does not exceed the first rank, not displaying the piece of content when the member access the user space.
  • the first rank may be selected from a scale of 1 to 10, and the second rank is selected from a scale of 1 to 10.
  • the second rank is not disclosed to the member.
  • the user space may be associated with genealogy.
  • a system for providing a user space to a community of users including: a) a web site hosted on a server, the web site accessible by a designated user within the community of users; the web site containing a piece of content provided by the designated user within a storage space associated with the designated user; b) a first rank associated with the piece of content, the first rank provided by the designated user; c) a second rank associated with a member within the community of users, the member permitted to access the space; wherein if the second rank equals or exceeds the first rank associated with the piece of content, the member can access the piece of content at the space and if the second rank does not exceed the rank associated with the piece of content, not displaying the piece of content when the member access the space.
  • FIG. 1 is a block diagram showing the network environment of the system according to the invention.
  • Figure 2 is an embodiment of a home web page according to the invention.
  • Figure 3 is an embodiment of a registration page according to the invention.
  • Figure 4 is an embodiment of a storage selection screen according to the invention.
  • Figure 5 is an embodiment of a web page showing the authentication process to create a secure storage space
  • Figure 6 is an embodiment of a web page showing the introduction to a user about to create a secure storage space.
  • Figure 7 is an embodiment of a web page according to the invention, showing the use of a work space within the secure storage space;
  • Figure 8 is an embodiment of a web page according to the invention showing the work space in use
  • Figure 9 is an embodiment of a web page according to the invention allowing the association of content to an event
  • Figure 10 is an embodiment of a web page according to the invention allowing the association of emails to the content
  • Figure 11 is an embodiment of a web page according to the invention allowing the user to further secure the event driven storage space
  • Figure 12 is an embodiment of a web page showing the event driven storage spaces created by the user;
  • Figure 13 is a flow chart showing the steps in creating an even drive storage space according to the invention.
  • Figure 14 is flow chart showing the process by which content is ranked to control access by other users.
  • a computing system may be used as a server including one or more processing units, system memories, and system buses that couple various system components including system memory to a processing unit.
  • Computing system will at times be referred to in the singular herein, but this is not intended to limit the application to a single computing system since in typical embodiments, there will be more than one computing system or other device involved.
  • Other computing systems may be employed, such as conventional and personal computers, where the size or scale of the system allows.
  • the processing unit may be any logic processing unit, such as one or more central processing units (“CPUs”), digital signal processors ("DSPs”), application-specific integrated circuits ("ASICs”), etc. Unless described otherwise, the construction and operation of the various components are of conventional design.
  • the computing system includes a system bus that can employ any known bus structures or architectures, including a memory bus with memory controller, a peripheral bus, and a local bus.
  • the system also will have a memory which may include read-only memory (“ROM”) and random access memory (“RAM”).
  • ROM read-only memory
  • RAM random access memory
  • a basic input/output system (“BIOS”) which can form part of the ROM, contains basic routines that help transfer information between elements within the computing system, such as during startup.
  • the computing system also includes non-volatile memory.
  • the non-volatile memory may take a variety of forms, for example a hard disk drive for reading from and writing to a hard disk, and an optical disk drive and a magnetic disk drive for reading from and writing to removable optical disks and magnetic disks, respectively.
  • the optical disk can be a CD-ROM, while the magnetic disk can be a magnetic floppy disk or diskette.
  • the hard disk drive, optical disk drive and magnetic disk drive communicate with the processing unit via the system bus.
  • the hard disk drive, optical disk drive and magnetic disk drive may include appropriate interfaces or controllers coupled between such drives and the system bus, as is known by those skilled in the relevant art.
  • the drives, and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the computing system.
  • computing system may employ hard disks, optical disks and/or magnetic disks, those skilled in the relevant art will appreciate that other types of non-volatile computer-readable media that can store data accessible by a computer may be employed, such a magnetic cassettes, flash memory cards, digital video disks ("DVD"), Bernoulli cartridges, RAMs, ROMs, smart cards, etc.
  • system memory may store an operating system, end user application interfaces, server applications, and one or more application program interfaces ("APIs").
  • APIs application program interfaces
  • the system memory also includes one or more networking applications, for example a Web server application and/or Web client or browser application for permitting the computing system to exchange data with sources, such as clients operated by users and members via the Internet, corporate Intranets, or other networks as described below, as well as with other server applications on server computers such as those further discussed below.
  • the networking application in the preferred embodiment is markup language based, such as hypertext markup language (“HTML”), extensible markup language (“XML”) or wireless markup language (“WML”), and operates with markup languages that use syntactically delimited characters added to the data of a document to represent the structure of the document.
  • HTML hypertext markup language
  • XML extensible markup language
  • WML wireless markup language
  • a number of Web server applications and Web client or browser applications are commercially available, such those available from Mozilla and Microsoft.
  • the operating system and various applications/modules and/or data can be stored on the hard disk of the hard disk drive, the optical disk of the optical disk drive and/or the magnetic disk of the magnetic disk drive.
  • a computing system can operate in a networked environment using logical connections to one or more client computing systems and/or one or more database systems, such as one or more remote computers or networks.
  • the computing system may be logically connected to one or more client computing systems and/or database systems under any known method of permitting computers to communicate, for example through a network such as a local area network ("LAN”) and/or a wide area network (“WAN”) including, for example, the Internet.
  • LAN local area network
  • WAN wide area network
  • Such networking environments are well known including wired and wireless enterprise-wide computer networks, intranets, extranets, and the Internet.
  • Other embodiments include other types of communication networks such as telecommunications networks, cellular networks, paging networks, and other mobile networks.
  • the information sent or received via the communications channel may, or may not be encrypted.
  • the computing system When used in a LAN networking environment, the computing system is connected to the LAN through an adapter or network interface card (communicatively linked to the system bus). When used in a WAN networking environment, the computing system may include an interface and modem (not shown) or other device, such as a network interface card, for establishing communications over the WAN/Internet.
  • an interface and modem not shown
  • other device such as a network interface card
  • program modules, application programs, or data, or portions thereof can be stored in the computing system for provision to the networked computers.
  • the computing system is communicatively linked through a network with TCP/IP middle layer network protocols; however, other similar network protocol layers are used in other embodiments, such as user datagram protocol ("UDP").
  • UDP user datagram protocol
  • Those skilled in the relevant art will readily recognize that these network connections are only some examples of establishing communications links between computers, and other links may be used, including wireless links.
  • an operator can enter commands and information into the computing system through an end user application interface including input devices, such as a keyboard, and a pointing device, such as a mouse.
  • Other input devices can include a microphone, joystick, scanner, etc.
  • These and other input devices are connected to the processing unit through the end user application interface, such as a serial port interface that couples to the system bus, although other interfaces, such as a parallel port, a game port, or a wireless interface, or a universal serial bus ("USB”) can be used.
  • a monitor or other display device is coupled to the bus via a video interface, such as a video adapter (not shown).
  • the computing system can include other output devices, such as speakers, printers, etc.
  • the system and method according to the invention are for use with a web site operated on a computing system, accessible over the Internet by users, who may post material on the web site and have a limited ability to view material posted on the web site by other users.
  • a web site is a collection of web pages, hosted on one or more servers.
  • Users access the web site hosted by a server using software such as a browser operating on a computing system.
  • links Users typically connect to web sites on the Internet using hyperlinks, also referred to as links. By clicking on a link, a user directs the browser to open a window on the monitor of the computing system showing the web site associated with the link.
  • the link may be text, or may be graphically represented in other terms, such as a button.
  • server 10 is accessible by clients 200 via network 100, which may be the Internet.
  • Server 10 includes web site 20, from which users may navigate and use the system.
  • Database 30 includes content provided by users, as well as the web site contents, and other information provide by users, for examples, passwords and usernames.
  • the home page of web site 20 is shown in Figure 2.
  • the home page includes an area for users to log into the site by providing a user name and password.
  • Also provided is a link to allow users to register with web site 20.
  • Other features on the home page include links to other social networking sites to allow integration with "Friends" and their equivalents at such sites, and a link to allow the user to send messages to their family and friends to encourage them to register.
  • FIG. 3 An embodiment of a registration page is shown in Figure 3.
  • the registration page includes personal information about the user, such as name, date of birth, and email address. Also, the user will need to provide a password and security questions and answers should the user need to obtain the password from the system at a later date.
  • the registration page also asks users to provide a string of numbers and letters for use as an additional security measure, as explained below. Finally the user is asked to type some text (to prevent bots and the like from registering) and indicate they would like to sign up for the secure electronic storage system according to the invention, referred to in the Figures as a "Virtual Lockbox".
  • Figure 4 displays a storage selection screen according to the invention.
  • users are entitled to a certain amount of storage space at no charge, but if they wish for more space, they must pay an annual fee, increasing as the amount of storage increases. If the user elects to pay, they may do so through credit card or other conventional means.
  • the provision of space to the user is represented as step 1300 in Figure 13. If a user tries to exceed their allotted storage capacity they are prompted to purchase additional storage.
  • Figure 5 displays a web site providing additional security to access a secure web storage space.
  • the user besides providing their email address and password, must also complete the text string. A portion of the text string is provided to the user, so that only a few characters need to be entered by the user (two characters in the embodiment shown in Figure 5).
  • Figure 6 displays a web page presented when the user is about to begin adding content to the secure web storage space.
  • Several navigation tools are present to a user.
  • Work space 600 is prominently displayed to allow a user a location to read messages, and download and manipulate content.
  • Menu 610 allows users to determine information about their account.
  • First navigation tool 620 allows a user to create a new secure storage space
  • second navigation tool 630 allows a user to view an already existing secure storage space. If the user has been granted access to content within other user's secure storage sites, this will be indicated in second navigation tool 630.
  • the addition of content is represented as step 1310 in Figure 13.
  • Figure 7 displays a user selecting a secure storage space (named "Graduation 2008") to manipulate.
  • the contents of the Graduation 2008 space are represented in work space 600.
  • Figure 8 displays a selected image 800 from work space 600 enlarged to its normal size.
  • Figure 9 displays a window showing a first step by which a user associates selected content with an event.
  • the event may be date driven, i.e. on a certain date the event is deemed to occur, for example a graduation date, or a birthday; or may be based on the passage of time, e.g. one week or one month. Alternatively, the event may be based on an unpredictable (in terms of timing) event, such as a divorce, or a death.
  • the user could encode access to the contents within a document, such as a will, in a code, which when executed, delivers the email to the intended recipients.
  • a document such as a will, in a code, which when executed, delivers the email to the intended recipients.
  • the main page of the web site may include an area in which the executor of the will can enter a code, which will inform the system that the event has occurred and that email messages can be sent to the appropriate recipients.
  • the association of an event with the content is represented in step 1320 of Figure 13.
  • Figure 10 shows a second step in which users may associate a list of email addresses to the content.
  • the email addresses may have a separate activation date, so that if the event occurs prior to the activation date, no email is sent to email addresses not yet activated.
  • the association of email addresses with the content is represented as step 1320 in Figure 13.
  • Figure 11 is a further step in the creation of the secure storage space in which the user provides an event driven password to secure the content with the associations with email addresses and the event.
  • Figure 12 shows a number of event driven storage spaces, represented by an icon 1200, for selection by a user. The user may change the appearance of each icon.
  • the event driven storage space is moved out of "wait” mode (step 1350 of Figure 13), and email messages are sent to the email addresses associated with the content and the event.
  • email addresses include both a link and the corresponding password for the particular storage space.
  • the link when selected, links the user to the content associated with the email address and the event.
  • the content is available to the recipient of the email address after the link has been selected and the password entered.
  • the content may be one or more pieces or files of video, audio, images or documents.
  • the user may send an email to the recipier ⁇ t(s) indicating that the content has been stored and explaining how the recipient should obtain or expect to receive the password on the occurrence of the event.
  • the recipient may reply to the email to indicate they are aware of the event driven secure storage space.
  • a report is generated and may be printed and stored, for example in a safe, by the user.
  • This report may include information on how to access the event driven storage space, and hence should be stored in a location unlikely to be accessed until after the event occurs (for example attached to a will).
  • Additional features may include:
  • the web site also allows registered users to contribute content for public viewing to a portion of the web site dedicated to the user, herein referred to as the "user space" (step 1400 of Figure 14). Visitors to the user space will not have access to event driven secure storage areas unless via an email sent by the system.
  • the user may contribute content to his user space for access by other users.
  • that user may indicate a rank for such content (step 1410).
  • the ranks may be a scale from 1 to 10, a letter grade, or the like.
  • the rank indicates a level of accessibility for the content, for example a ranking of 10 may mean that the material is accessible and open to all to view in the user's "user group” and a ranking of 1 means that the material is closed to all users and not viewable by any user except the creator/owner of that user space.
  • the rank could be reversed so that a rank of "10" is closed to all but the contributing user, whereas a rank of "1" means any of the user's "friends" may access the content.
  • Other users of the web site may be invited into a user's "user group” (step 1420), and on acceptance, become “members” of the user group and are permitted access to at least some content on the user space.
  • the user provides a ranking for the new member (step 1440), if they are not previously ranked (step 1430).
  • the ratings available for members correspond to the ratings for content, for example if the content is rated from 1 to 10, then members are also given a rating from 1 to 10.
  • a default rating may be provided by the system.
  • Such a default is typically an "average” value, for example a “5" in a scale of "1” through “10”, but alternatively, an extreme value, for example “1” or “10” in such a scale may be used.
  • a rating of "1” means that the content is closed to all and only viewable by the user and a rating of "10” will mean that the content is open and viewable to all the members.
  • a particular piece of content such as audio, video, image or document
  • a rating of for example, "4"
  • members assigned with a rating of "4" or less will be able to view that particular piece of content.
  • a member with a rating of "6” will not be able to view content with a "4" rating, but will only be able to view content which has a rating of "6" or higher.
  • a user John Smith, creates content, namely, a story under a "Story of My Life” module on his recent life experience trip to Europe. John uploads three videos and six photos (images) from his trip and rates them as follows:
  • Tom will be able to observe videos 1 and 3 and all the images from 1 to 6, since Tom is rated at a "2" which means that he will be able to see any content with a rating of "2" and above. Rick will only be able to see image 5, Tim will only be able to see images 1 to 4, Bob will be able to see all content except video 2, Joe will only be able to see images 5 and 6 and Jack will be able to see all content except video 2.
  • the web site may be related to genealogy, although the invention is not limited to such a use, and may, for example provide member groups within a single family.
  • a family tree may be used to show both group members and non-members that are part of the same family (as presumably, not all family members will be users of the web site).
  • Each user that is also a member may contribute material about themselves in their user space, accessible via the family tree.
  • each user space may show the family tree from their viewpoint.
  • a wiki space may be arranged for such family members, in which active users who are family members may contribute material to the wiki space.
  • Such an embodiment allows for example, children and grandchildren to provide material in a wiki space devoted to a deceased parent or grandparent.
  • Such material may be ranked as described above, by the contributing member.
  • an administrator may have to select a rank for each family member, perhaps using a neutral formula, for example age, or distance of relation.
  • the present methods, systems and articles also may be implemented as a computer program product that comprises a computer program mechanism embedded in a computer readable storage medium.
  • the computer program product could contain program modules. These program modules may be stored on CD- ROM, DVD, magnetic disk storage product, flash media or any other computer readable data or program storage product.
  • the software modules in the computer program product may also be distributed electronically, via the Internet or otherwise, by transmission of a data signal (in which the software modules are embedded) such as embodied in a carrier wave.
  • signal bearing media include, but are not limited to, the following: recordable type media such as floppy disks, hard disk drives, CD ROMs, digital tape, flash drives and computer memory; and transmission type media such as digital and analog communication links using TDM or IP based communication links (e.g., packet links).
  • the various acts may be performed in a different order than that illustrated and described. Additionally, the methods can omit some acts, and/or employ additional acts.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Signal Processing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

La présente invention concerne un site Web de réseautage social où un utilisateur peut contrôler le contenu sur son site Web en attribuant une notation pour le contenu placé sur le site par l'utilisateur. L'utilisateur notera également les autres membres du site de réseautage social de sorte que ces membres ne pourront visualiser que le contenu ayant une notation inférieure à celle du membre. Une caractéristique supplémentaire est que l'utilisateur peut placer du contenu dans une zone de stockage guidé par l'événement, dans laquelle le contenu sera inaccessible tant que l'événement se produit, entraînant l'envoi aux destinataires désignés de courriers électroniques contenant le lien au contenu.
PCT/CA2008/002123 2007-12-05 2008-12-05 Procédé et système de réseautage social sécurisé WO2009070885A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US99259007P 2007-12-05 2007-12-05
US60/992,590 2007-12-05

Publications (1)

Publication Number Publication Date
WO2009070885A1 true WO2009070885A1 (fr) 2009-06-11

Family

ID=40717232

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2008/002123 WO2009070885A1 (fr) 2007-12-05 2008-12-05 Procédé et système de réseautage social sécurisé

Country Status (1)

Country Link
WO (1) WO2009070885A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9442467B1 (en) * 2012-01-31 2016-09-13 Taher G Behbehani Event triggered data lockbox capable of anonymous revelation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6336105B1 (en) * 1998-11-16 2002-01-01 Trade Access Inc. System and method for representing data and providing electronic non-repudiation in a negotiations system
US7149893B1 (en) * 1999-09-07 2006-12-12 Poofaway.Com, Inc. System and method for enabling the originator of an electronic mail message to preset an expiration time, date, and/or event, and to control processing or handling by a recipient
US20080040674A1 (en) * 2006-08-09 2008-02-14 Puneet K Gupta Folksonomy-Enhanced Enterprise-Centric Collaboration and Knowledge Management System

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6336105B1 (en) * 1998-11-16 2002-01-01 Trade Access Inc. System and method for representing data and providing electronic non-repudiation in a negotiations system
US7149893B1 (en) * 1999-09-07 2006-12-12 Poofaway.Com, Inc. System and method for enabling the originator of an electronic mail message to preset an expiration time, date, and/or event, and to control processing or handling by a recipient
US20080040674A1 (en) * 2006-08-09 2008-02-14 Puneet K Gupta Folksonomy-Enhanced Enterprise-Centric Collaboration and Knowledge Management System

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9442467B1 (en) * 2012-01-31 2016-09-13 Taher G Behbehani Event triggered data lockbox capable of anonymous revelation

Similar Documents

Publication Publication Date Title
US7599935B2 (en) Control for enabling a user to preview display of selected content based on another user's authorization level
CN103282937B (zh) 用于在社交网络中共享内容的内容共享接口
US20030046134A1 (en) Web-based project management system
US20030154116A1 (en) System and method for scheduling events on an internet based calendar
US20100281313A1 (en) Dynamically generated web surveys for use with census activities, and assocated methods
US8401871B2 (en) Healthcare notification method and system including a healthcare website
CN102841930A (zh) 电子文档的集成共享
US20140067418A1 (en) Method and system for facilitating communication between a patient and a care provider
US20080052113A1 (en) System, method, and article of manufacture for managing a health and human services regional network
US20070050203A1 (en) Computer system for electronic cards and the like
US20160277410A1 (en) Method and apparatus for transmission and reception of secure ephemeral media
US20100217880A1 (en) Information request and access
US20090007245A1 (en) System and method for controlled content access on mobile devices
CN104380654A (zh) 用于控制互联网应用用户界面的隐私设定的系统和方法
JP6540118B2 (ja) メッセージ表示プログラム、メッセージ表示方法、および情報処理装置
US11057477B2 (en) Method for providing web service, recording medium recording program for providing web service, and server apparatus
JP6451617B2 (ja) コミュニケーションアシストシステム、コミュニケーションアシスト方法およびプログラム
US10305915B2 (en) Peer-to-peer social network
CN110011906A (zh) 自订讯息传送排程的方法、实时通讯装置及计算机程序产品
JP6242469B1 (ja) 個人医療情報管理方法、個人医療情報管理サーバおよびプログラム
US10572630B1 (en) Refill prescription by calendar reminder
WO2009154635A1 (fr) Système et procédé pour un accès régulé au contenu sur des dispositifs mobiles
WO2009070885A1 (fr) Procédé et système de réseautage social sécurisé
US20080263045A1 (en) Multi-tiered secured information hub
GB2444380A (en) Remote storage of information

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08858381

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11/08/2010)

122 Ep: pct application non-entry in european phase

Ref document number: 08858381

Country of ref document: EP

Kind code of ref document: A1