WO2014099819A2 - Web and mobile application based information identity curation - Google Patents

Web and mobile application based information identity curation Download PDF

Info

Publication number
WO2014099819A2
WO2014099819A2 PCT/US2013/075487 US2013075487W WO2014099819A2 WO 2014099819 A2 WO2014099819 A2 WO 2014099819A2 US 2013075487 W US2013075487 W US 2013075487W WO 2014099819 A2 WO2014099819 A2 WO 2014099819A2
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
curator
data
centralized
Prior art date
Application number
PCT/US2013/075487
Other languages
French (fr)
Other versions
WO2014099819A3 (en
Inventor
Gilbert R. ORTEGA
William LAVIN
Nas RAJA
Yasir FAROOQUI
Maria MCCOY
Original Assignee
Infinitude, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Infinitude, Inc. filed Critical Infinitude, Inc.
Publication of WO2014099819A2 publication Critical patent/WO2014099819A2/en
Publication of WO2014099819A3 publication Critical patent/WO2014099819A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/185Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with management of multicast group membership
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A web-based and mobile device application service that allows information curation with a file-sharing and unsharing platform is presented. The present invention allows information curation with the storage and dissemination of personal and business information. It enables users to participate in social-networking-style sharing and unsharing of photos, documents, and other media among selected individuals or groups, as well as make mobile payments, access vital information, and store electronic identification information. For businesses, the present invention offers online collaboration tools and secure, reliable data storage and file-sharing services. The invention works with multiple methods of access to the information curated in user accounts. All personal and business information is stored in a centralized location in firewall protected, managed and dedicated servers that are GLBA, HIPPA, PCI-CISP, PCI-DSS, and SOX compliant. The service can be accessed and curated from anywhere and seamlessly shared and unshared with anyone.

Description

PATENT COOPERATION TREATY
filed in the
UNITED STATES PATENT AND TRADEMARK OFFICE as
RECEIVING OFFICE
Invention: Web and Mobile Application Based Information Identity Curation
l PRIORITY
This application claims the priority of US Patent Application number
13/725,1 39 filed December 21 , 2012, which application is incorporated herein in its entirety.
I. Technical Field
The present invention relates to web-based personal and business information storage and transfer systems and, more particularly, to a web-based and computing device personal and business information storage, curation, and sharing and unsharing method and system.
II. Background of the Invention and Prior Art
The ubiquity of the Internet and the digitization of content and media have forever changed the way we communicate. While presenting new information storage and dissemination and business revenue opportunities, it also presents new sets of data conversion, delivery, and storage challenges. Whereas paper-based data was once personally exchanged or sent in the mail, it now must be sent digitally. And as the World becomes ever more reliant on the Internet for the storage and transfer of information, the need to locate, coordinate, send, and receive that information quickly but securely is becoming increasingly important. It is further becoming important that sent information can be withdrawn or retrieved by a sender.
Moreover, the "cloud" has emerged as a revolutionary way to store and share information, with a nearly unlimited capacity via linked, remote servers. Cloud computing has also facilitated a large and growing market for Software as a Service (SaaS), where companies provide services via any web-enabled device. SaaS, for example, allows companies to scale their business offerings exponentially over the web, from providing services like online tax-return filing to media streaming, mobile banking, and online payment platforms. SaaS - a $21 .2 billion market globally in 201 1 - will reach an estimated $92.8 billion by 2016 and $132.6 billion in 2020.
As briefly described above, there are many current ways to share files and media across the internet, but they are found through disparate websites and apps. Attempts to centralize information storage and dissemination have been made but they are not without their shortcomings. For instance, these attempts have focused on remote request authority of a packet of user (throughout, "user" refers to the information owner or sender) data (e.g., US patent application publication
201 1 /0137817). Other prior art attempts have focused on a decentralized system that focus on the sending of information at the request of other entities (e.g., US patent number 7,966,647). While the prior art advances the ability to store personal information of various types, it does so with significant shortcomings. An initial shortcoming is that the prior art limits the control of the individual whose information is stored has over the sending of the information. The prior art uses a "pull" type system wherein the user authorizes the requesting entity to obtain information stored within the users data base. While useful in some cases, this system decreases the security of the user's information by enabling access to the user's data by other. It may also run afoul of the law if certain information, such as health information, is released in violation of state and federal law, such as the Health Insurance and Portability and Accountability Act (HIPPA).
Another significant shortcoming of the prior art is that it relies on the aggregation of information, i.e., it searches for and collects related information requested by the user without reference to relevance. The prior art does not allow for the remote, centralized storage of information that can be curated, i.e., collecting the most relevant information among the various pieces of available information ("filter") and organizing it around a specific theme, by the user from among any number of information types, including but not limited to, written and audio-visual information, and dissemination of the information to other web applications and sources, thereby providing the best content that is relevant to share the selected receiver or group. In other words, the prior art does not enable the sifting, sorting, arranging, and publishing information. Another related significant shortcoming of the prior art is that it does not provide for the integration of social media-like platforms.
There is need, therefore, for a web based system that enables a user to "push" remotely stored, customized packets of information to an intended receiver of that information, the information being curated by the user (sender) from previously stored information. The present invention provides such a solution.
III. Objects of the Invention
The following represent some of the objects of the invention.
It is an object of the present invention to provide a system for digitally curating user information.
It is a further object of the present invention to provide a system for seamlessly sharing and unsharing information with others. It is yet another object of the present invention to provide a system for enabling social network style sharing and unsharing of information from a single point managed and dedicated server.
It is yet another object of the present invention to provide a method for accomplishing the foregoing system objects.
IV. Brief Description of the Drawings
Fig. 1 is a flow chart depicting a general overview of the process in using the system.
Fig. 1 a is a flow chart depicting a simplified general overview of the process in using the system.
Fig. 1 b is a flow chart depicting a general overview of the process in using the system.
Fig. 2 illustrates a screen shot of a smartphone based application login page. Fig. 3A illustrates a screen shot of a smartphone based application Register page.
Fig. 3B illustrates a screen shot of a smartphone based application Register acceptance page.
Fig. 4 illustrates a screen shot of a smartphone based application Welcome page.
Fig. 5 illustrates a screen shot of a smartphone based application Forgot
Password page.
Fig. 6 illustrates a screen shot of a smartphone based application password change instruction page.
Fig. 7 illustrates a screen shot of a smartphone based application password change page.
Fig. 8 illustrates a screen shot of a smartphone based application My Data page.
Fig. 9 illustrates a screen shot of a smartphone based application empty Employment Info page.
Fig. 9a illustrates a screen shot of a smartphone based application
Employment Info page with employers added.
Fig. 10 illustrates a screen shot of a smartphone based application employment information data page. Fig. 12 illustrates a screen shot of a smartphone based application Login page.
Fig. 13 illustrates a screen shot of a smartphone based application information download page.
Fig. 14 illustrates a screen shot of a smartphone based application download status page.
Fig. 15 illustrates a screen shot of a smartphone based application
Employment Info page depicting employers.
Fig. 16 illustrates a screen shot of a smartphone based application User data page.
Fig. 17 illustrates a screen shot of a smartphone based application data share confirmation page.
Fig. 18 illustrates a screen shot of a smartphone based application employer specific information and history page.
Fig. 19 illustrates a screen shot of a smartphone based application information unsharing confirmation page.
Fig. 20 illustrates a screen shot of a smartphone based application information unsharing acknowledgement page.
Fig. 21 is a flow chart depicting a general overview of the process for registering government related information.
Fig. 22 is a flow chart depicting a general overview of the process for registering vehicle and insurance related information.
Fig. 23 is a flow chart depicting a general overview of the process for registering product and warranty related information.
Fig. 24 is a flow chart depicting a general overview of the process for registering social media related information.
Fig. 25 illustrates a screen shot of a smartphone based application Settings page.
Fig. 26 illustrates a screen shot of a smartphone based application information unshared on social media acknowledgement page.
Fig. 27 illustrates a screen shot of a smartphone based application social media login page wherein the inventive system is used for access.
Fig. 28 illustrates a screen shot of a smartphone based application search for contacts for data sharing page. Fig. 29 illustrates a screen shot of a smartphone based application contact page including tabs for information that was shared by user or received from contact.
Fig. 30 illustrates a screen shot of a smartphone based application contacts page illustrating information shared by and shared with user.
V. Detailed Description of the Invention
Before explaining the preferred embodiment of the present invention in detail, it is to be understood that the present invention is not limited in its application to the details of arrangements of the components set forth in the following description. As will be appreciated by those skilled in the arts, the present invention is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting. It is also to be understood that where ranges are provided for various aspects of the invention and for examples, they are approximate ranges and are not to be limiting except where noted otherwise.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Moreover, the singular forms "a", "an", and "the" include plural referents unless the context clearly dictates otherwise.
As those skilled in the arts will understand, the flowcharts referenced to herein are for illustration purposes only. They are meant to serve as an aid in describing the embodiments of the present invention, but are not meant to constrain
implementation thereof to any particular hardware or software embodiments. In the drawings, the same reference letters are employed for designating the same elements throughout the several figures.
Information curation (IC) enables a user to collect, store, organize, and control information. This can be done on a personal or business level. Generally speaking, the user obtains personal information that is found locally or is controlled by separate entities (e.g., health care providers, credit reporting agencies, financial institutions and merchants) and stores the information in manners that have been selected by the user. In a significant departure from information aggregators, instead of the user controlling access to the stored information by authorizing access by other entities, the present invention is a curator that sends, or shares, information to others by "pushing" it to intended recipients. Also, unlike an aggregator which limits access to information by blocking authorization, the present invention "deauthorizes" shared information by unsharing, or pulling, it from use. Thus, the present invention provides a user which greater control and security by not allowing others access to their system (which may encourage hacking or virus insertion) but instead releases information and withdraws it as the user desires without the user ever giving up control of their system or the information.
The information stored in the IC may encompass a broad array of information about a person's life, social interactions, health and healthcare, consumer behavior including consumer purchases, entertainment consumption and habits, travel, financial, employment, education, hobbies, demographics, financial, employment, health, insurance, credit card information, personal identification information, social networking site preferences, purchased products/warranty information, likes/dislikes, recommendations/nonrecommendations, and whatever else a user can think of sharing that can be reduced in any way to data.
On a business level, the IC allows multiple authorized to contribute, update and delete stored information, and, further, share and unshare the information with selected third parties.
Using the concepts of the present invention, individuals or business entities create and curate their own content and share the most relevant information pertaining to a given situation. Importantly, the present invention enables a user to unshare information at any time by pulling the information back. Thus, the user maintains the utmost control over stored information.
This is accomplished in a closed system web-based and mobile device application system employing a file-sharing platform and mobile app for the storage and dissemination and recall of personal and business information.
With reference to Fig. 1 - Fig. 1 b, a general overview of the inventive system 100 is depicted wherein user 102 accesses 103 the inventive network 104 to create a user account 106. Access to the network can be done through a desktop computer, laptop, tablet, smartphone, or other electronic device having Internet capabilities. For purposes of the description herein, reference is made to a smartphone. However, this is not meant to limit the invention to such use as those skilled in the arts will understand. For purposes of the invention, certain activities described throughout may be better performed on a particular type of electronic equipment. For non-limiting example, a desktop or laptop computer may be better suited for reviewing and curating photographs while a tablet or smartphone may be better suited for sharing social media information while the user is on the go or, alternatively, a smartphone might be better suited in a particular situation to share a recent photograph while a desktop computer might be better suited to unshared information. As should be understood, the electronic equipment used is not critical to the inventions principles; it is the access to the Internet and the desires of the users that are important.
Moreover, Internet access through an Internet Service Provider (ISP) might be used for sending and receiving data. In this embodiment, the ISP might provide access to the Internet as a dial-up service, or through a higher-speed technology such as broadband or DSL. Since the Internet can expose the data being sent and received to unauthorized persons and systems, the data feeds, in this embodiment, might be encrypted, e.g., by using the HTTPS protocol, or by implementing a virtual private network (VPN) between the IC and the sources and receivers of the data feeds.
In some embodiments, it may be desirable (or required) for a recipient of an IC's output data to validate the integrity of the data. For example, an entity receiving credit-related information from a user's IC might want an assurance that the information was valid and had been unaltered by the user or anyone else. Those skilled in the art will recognize that there are various well-known technologies that might be used to provide this assurance; some examples include the use of public and private keys, digital signatures and hashcodes.
With reference to Fig. 2, once the user accesses the network through a web address specific to the network 104 or mobile application icon specific to the network 104, the user enters the IC network and is directed to a login screen 108. The login screen, as are all the screens of the inventive device (including the mobile application icon), is of a graphical user interface variety (GUI), and more particularly WIMP and post-WIMP interfaces. Post-WIMP interfaces are particularly suited to those aspects of the inventive system that pertain to music playback, banking on tablets and smartphones. Many desktop and laptop devices continue to rely on WIMP interfaces, which also work with the present invention, but as these devices transition to post-WIMP interfaces they will be able to take advantage of the present invention also. Other interfaces may also be used in the inventive system including, without limitation, zooming interfaces, tangible interfaces, voice interfaces, and gesture (or pointing) interfaces. The flexibility of the inventive system accommodates virtually any interface as one principle of the inventive system is to collect disparate information for curation from unlimited electronic and digital sources. Moreover, the flexibility of the present invention is not affected by technology advances, and the inventors anticipate advances in technology will provide new opportunity for data collection, storage, and sharing under the principles of the invention.
Additionally, those skilled in the art will recognize that the program instructions for software applications implementing all or a portion of one or more embodiment(s) of the present invention may be written in a programming language such as, but not limited to, Java or C++, and that the database may be implemented with a database package such as Microsoft Access. TM, or a database management system (DBMS) such as Microsoft SQL Server.TM., Microsoft SQL Server CE.TM., IBM DB2.TM., mySQL or postgreSQL.
Turning again to Fig. 2, the login screen, here depicted on smartphone, includes register button 1 10 for use by the user to set up an account. Activating register button 1 10 takes the user to the register page (seen in Fig. 3) on which page the user enters first name 109, last name 1 1 1 , an email address 1 12, and a password 1 14, confirms the password 1 14a, and enters to register the account by pressing confirm registration 1 16.
User 102 is then directed to a welcome screen 108b (depicted in Fig. 4) where the user is provided with a welcome message 1 18. The user, if he so chooses, responds positively and activates the proceed button 120, the account is created and the user is now a registered user. The user may also be notified, in certain embodiments, that certain WIMP interfaces are pixel usage heavy.
Depending on the electronic device, and having nothing to do with the inventive system, certain results may have affected results.
Moreover, the registration process described above relies on an email address. As those skilled in the arts will understand, other registration and login methods can be used, such as a user name. The use of an email address, however, is preferred and provides access to certain notification features of the invention described below. In an embodiment wherein another login scheme is used, the system will ask for an email address if the user desires to take advantage of certain invention features. The user has the further option of changing login password at any time. As depicted in Fig. 7, the user can access the change password screen 108d wherein the option to change the password is provided. To do so, the user inputs the existing password 1 14, then enters the new desired password 132, confirms the desired new password selection 132a, and activates the change password button 134.
Once a user is registered, to access the user account, at the login screen the email address 1 12 and password 1 14 are entered and the login button 122 is then activated. The user is then directed to the user's account 106. If a user forgets the password, the user presses the "Forgot Password" button 124 and is directed to the "Forgot Password" screen 108c (Fig. 5) wherein the user account email 1 12 is entered and the retrieve password button 126 is pressed. The user is then informed that a message will be sent to the user's email address on file with further
instructions 1 1 . The user then confirms the notice 1 19. The message is then sent to the user's email account with further instructions for gaining access to user account 106 (Fig. 6).
Returning to Fig. 1 , once user 102 sets up a user account 106, the user can then collect and import 128 desired information 130. Information can be of any nature and may include, but is not limited to, employment info, resumes, medical history, credit card information, credit history, automobile registry, government ID registry (e.g., driver's license and passport), insurance, vehicle, restaurants, product information, and home information. Business may include information such as but not limited to demographic information, individual customer preferences (restaurants, for example, preset menu orders, payment information, menus, etc.), customer payment information. Virtually any information a user wishes to store for possible sharing with others.
In addition to the above information, businesses may use the principles of the present invention to collect data including. Examples for representative businesses include, but not limited to: Banks Hotels - Check In o Bank account setup
o Demographic info
(Checking, Savings, CDs,
o Credit card info
Bonds)
o Credit card applications
o Loan Applications
(Automobile, Motorcycle,
Boat, Mortgage)
Physician offices Restaurants
o Registration of Allows user to have demographic specific individual order information requests: examples: o Registration of all ordering fast food, health information coffee, etc. with o Medical implant registry individual order and
■ Total hip and knee joint credit card transaction replacements Fast food orders
■ Dental implants (Includes food to be
■ Breast augmentation ordered, direct link to implants credit or debit card for
■ Other immediate payment)
Restaurant to go orders (Includes food to be ordered, direct link to credit or debit card for immediate payment) Store and Online purchase Retail and commercial o Register favorites for o Product purchase common orders from history websites o Warranty registry o Click on app in
Government
business website to
o DMV
share information for
o Passport
delivery and payment
o Fingerprints o Criminal records
With reference to Fig. 8, the user is directed to the data screen 108e. Here the user has the option to scroll through the various data selections or search 136 for the desired data account 138a-138g. The data account 13a-138g is for example purposes only. Any number of data accounts may be used or created by the user. For non-limiting example, data accounts may include personal information, contact information, financial, employment, health records, general document storage, product warranty registration, e-commerce site hosting and payments, social network accounts, restaurant, travel. The foregoing are but a small sample of data account that may be set up by a user.
Moreover, and as will be appreciated by those skilled in the arts, information may located in many locations such as local hard drives, media formats, web located data storage accounts, social media accounts, servers, and intranet systems be found in various formats. Further, information data may be various formats such as media formats for video including, but are not limited to, DVD, CD, MP3, MP4, tapes, DVR, VCD, AFI, ASF, ASX, DivX, MPEG, MPG, MPE, SVCD, WMV, MOV, OGG, QT, RM, WMA, XVCD, XSVCD, AAC LD, HE-AAC, AAC ELD, AMR, RA, RAM, VOB, AIFF, AIF, MKV, FLV, JPEG, MPEG, and FLAC.
The invention further contemplates multiple methods of access to the information stored in user account 106, including but limited to Intranet sharing via hardwired systems or Wi-Fi, individual hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers that are GLBA, H!PPA, PC!-CISP, PCI-DSS, and SOX compliant within a Cloud-based network.
Returning to Fig. 1 , it can be seen that user 102 can pull information from multiple source in user account 106. For example, may be information contained on the users local hard drivel 30a, such as photographs, videos, documents, and other items found on a hard drive. Users may enter all personal information concerning demographics, financial, employment, health, insurance, credit card information, personal identification information, social networking sites, purchased
products/warranty information, likes/dislikes,
recommendations/nonrecommendations, and whatever else our users can think of sharing.
For example, a user may wish to store employment history information. With reference to Fig. 8 through Fig. 20, on the My Data screen 108e, the user selects employment info 138d and is directed to the employment info screen. Here, the user can enter employer and employment information that may be chosen by the user to be included, which can include employer name 140, start date 142, end date 144, salary history 148, or letters of recommendation 148. The user is able to access the information input area by using the 'My Account' tab found within the website as well as the mobile application. From the 'My Account' tab, the user is able to curate any data information into any chosen data field. These are but examples of information; the user may also include any other information such as resumes, job descriptions, supervisor names and contact information, department, projects, e-mail address, phone extension, and benefit package, and other related information. By using the 'My Account' function, the user is again able to curate a limitless amount of data entry concerning his/her employment or other data information. Here, the user has input information, including that for employment at Microsoft 150. The user activates the Microsoft button and is directed to the employment info page for that employer. On the Microsoft employment page 108g information for that employer can be entered or reviewed and shared. Here, the user has input a start date 142, noted in the end date 144 section that it is current employment 144a, and what the user's annual salary 146, 146a. Further, if a user has set up an account but not yet entered any data into it, the user will be notified by both a message on the page143 and by a general list notification, here, in this example, with a red exclamation point 141 .
The user has also downloaded two letters of recommendation 152. The user is able to download a file by direct download via the website through common file downloading or via the mobile application. To view the letters of recommendation by the user or by anyone with whom the user has shared the employment information, the viewer (user in this example) would activate a letter of recommendation button 152 (here, letter 1 ) and is directed to the letter 1 page 108h. Information regarding the date of the letter 152 and its author 154 are, in this example, have been included. In other embodiments this information may be not included or more information, such as author's title and relationship to the user may be included. To view the
attachment, the view attachment 156 link is activated and the user is directed a confirm login page 108i where the user is asked to confirm access to the
downloadable letter of recommendation. This step is not critical to the principles of the invention but the inventors have determined that this extra step provides extra security to the user's information. By sharing the curated information with another individual and/or business that is registered with the system, the user authorizes the sharing by clicking on the share button with the registered individual and/or business. By clicking on the share button and by using the individual's and/or business registered email address the info is authorized to be shared. The process is repeated amongst any user to share or unshare. The process can be initiated whether or not the recipient is a user of the system. Sharing is in the user's control since only email addresses registered in the user's account will be authorized to receive shared information.
Once the email and password have been confirmed and it is determined that the person attempting to access the letter of recommendation is authorized to do so, the user is then directed to a download page 108j. Once the document is
downloaded 158 at download page 108k, the user clicks on the status bar 160 to retrieve and view the document (not shown).
To share information, the user curates an information packet of information to be shared with others. The packet of information be include an entire category of material, for non-limiting example, all past and present employers, including all sub folders (e.g., letters of recommendation, salary history, supervisor information, etc.); all information for a single employer; certain information for all employers (e.g., salary histories for all previous jobs); or, selected information from a single employer (e.g., a single letter of recommendation). The information shared by a user is flexible and totally within the control of the user. The curated data is saved and stored on firewall protected servers that registered users can access via the website and/or mobile application at anytime. For this example, the user has decided to share employment information regarding Microsoft. The user clicks on the contact button 162 to retrieve a contact or group of contract with who the information is to be shared. The user then selects the contact or contacts by highlighting their names, selects the information packet to be shared with the contact or contacts, matches them to one another (contacts and information packet) and selects to share the information. The user is asked to confirm that the information is to be shared from user account 106 (Fig. 1 ) and, if so, the information is pushed 168 to the recipients, either as an individual 164 (Fig. 1 ) or as a group 166a - 166d.
After an information packet has been shared, the user may decide that he may no longer want a particular individual or group to have access to the
information. In that case, the user returns to the employment info page 108f where unshared button 170 now appears on the page to indicate the information has been shared. The user activates unshared button 170 and is directed to a contacts shared with page 108t where the user selects the contacts who he no longer wishes to share the information packet and is directed to the contact screen 108u for that contact where the user is asked to confirm that the user wishes to unshared the data packet 172.; confirms that the data is to be unshared by clicking on the OK button174; and, the information is then unshared by the network 104. Once the information is unshared, a confirmation 176 is sent to the user. The user then clicks OK 178 to acknowledge the unshared of information.
In the case that a user has changed his mind regarding the unsharing of information, the user can cancel the unshare by clicking cancel 180 on the unshare data confirmation page 174. In this event, the user will have the option to start the unshare process over or circumvent the process by not activating the unshare program.
The example given above for employment information is not meant to be limiting. The inventive system can be used to collect, curate, share and unshare any type of information or data in a similar fashion. For another example, and as illustrated in Fig. 21 , the user may wish to store, curate, and share government identification information. In this example, the user may wish to store and share a digital driver's license 184 and passport through a government registration or store and share a digital driver's license 184 and state information196 directly with selected contacts (end users) 164, 168.
In a further example, and with reference to Fig. 22, the user may want to store and share Insurance and vehicle information or Product and Warranty information.
A further advantage of the present invention is that the user may also store and share social media information. With reference to Fig. 24 -Fig. 27, user 102 accesses the setting screen 1081 to share info on a social media site, here
Facebook. Through the inventive system, a user has access to control the user's preferences to the social media site, such as, as shown here, changing site password 202, logging out 204, and site specific activities such as "liking" 206 a particular post. The user, in a dialog box 208, enters the information (e.g., text, photos, videos) to be shared in dialog box 209 and sends to the social media site by clicking a send button 210. Once the post is successfully shared, an alert box 212 appears confirming the posting was successful
While an example using Facebook is shown here, those skilled in the arts will understand that the principles of the present invention will accommodate any social media site or application, including, but not limited to, Twitter, Linkedln, Google+, Path, MySpace, and Pinterest.
Those skilled in the art will also recognize that there are many possible configurations of data feeds for the IC. Raw feeds, composite feeds, derived feeds and filtered feeds can be combined in a multitude of ways by the user to suit his needs. In addition, the configuration of data feeds can be modified by the user, so that the user can adjust the configuration according to changes in his personal situation or other changing needs. For example, and with reference to Fig. 1 , health care information 130f may contain records and test results from multiple or product warranty information 130d may be from more than manufacturer or for more than one product.
The information stored by the IC may reside in data structures that are implemented as tables in a relational database management system (DBMS) and that can be accessed by the IC's application program.
Within each information category, in addition to multiple sources of information, there may be multiple types of information. For example, purchase information may include type of product or service, quantity purchased, name of product or service, brand name of product or service, model number of product or service, serial number of product or service, store or merchant name, retail location, time and date, price, discounts, and warranty information. The curated data can be entered in multiple data spots depending on the users' discretion as to where to have the data entered.
In another example, entertainment Information may include type of entertainment, price and discounts, location, companions, and an enjoyment rating by the user and additional comments by the user.
Healthcare Information includes date of birth, height and weight, name of primary care physician, insurance account information (e.g., carrier and account number), date of last physical exam, physiological measurements (e.g., resting heart rate, blood pressure and cholesterol level), laboratory test results, prescriptions (e.g., for medications, tests or procedures), diagnosed illnesses and conditions, smoking status, level of alcohol consumption, family medical history and past medical history. Additional
In yet another example, healthcare information might include: demographic information, information on diet and exercise, nutrition information, medical examination findings, surgical history, obstetric history, medical allergies, social history, habits, immunization history, growth chart, referrals information, education materials provided to the user, future plans for care, instructions for self-care, implant registration, and return visits information.
Further examples of how healthcare information might be used include, a healthcare provider can use the information shared by the user in the process of delivering healthcare. In one example of using a user's healthcare information, a physician has shared with her a user's healthcare information in order to treat the user's fractured hip. The user may at any time during the treatment unshare the information with the physician. Further, the user may not want the physician treating his fracture to have access to all of his healthcare information; instead the user may want to provide access only to information that will be relevant to the treatment of the fracture. At the first office visit, the user shares with the physician only that information pertinent to the treating of the fracture, such: all prescription medicines and over-the-counter supplements that the user is taking; x-rays of previous fractures, lab test results, and prior diagnoses and treatments. Any of the information can be further filter. For example, information may be limited in terms of years or scope (e.g., surgeries in the last five years).
In another example of using a user's healthcare information, a user may share with a pharmacy selected healthcare information in order to detect and alert the user if a prescribed medication might result in an adverse reaction due to another prescribed medication or the user's medical condition.
In yet another healthcare example, the present invention enables medical and dental implant companies to register their implants/products with the service. The companies are provided with a code, for example a QR code that is unique to each implant whether it may be an orthopaedic joint replacement metal implant, dental implant, cardiac implant, cosmetic implant or any other implant. On the day of implantation into a patient, the code is scanned into the service via the mobile application's use of scanning at which time a record is created for the company for data input, but also to have a copy of the implant stored into the service for the patient registered with the service. By storing the implant information with the service, both the companies and registered patients will have the implant information in case of recalls, future required surgeries, and/or for any other health related reason.
In a further example of information sharing by the user, travel Information may include travel history, such as destination city, event, reason for travel, names of travel companions, departure and return dates hotel Information (e.g., name, nights spent, rate per night, etc.), Flight Information (e.g., airline, flight number, source and destination airports, flight duration, and seating and meal preferences) and rental car information (e.g., rental company, days kept, make, model and year of the car, daily cost and electronic toll transactions .
In yet a further example, education Information may include names and addresses of institutions, teacher/professors names, grades, grade point averages, majors, minors, degrees, honors, tuition paid, scholarships received, letters of recommendation, and other related information.
In yet another example, a restaurant and individual user agree to be shared partners. The restaurant can then send the user any updates, specials, special events, etc. Using this feature of the inventive system, the user is supplied a unique code, preferably an individualized QR code (other codes can also be used, such as but not limited to UPC, SKU, PostNet, 128, 39, and 93), that can be distributed to users who have become shared partners with the restaurant. The code, when presented by the user, is then scanned by the restaurant's system application, the user is confirmed by the shared partner, and the premium (or whatever is offered by the restaurant) is then credited to the user. One use for this system is that the user receives, perhaps, a meal discount and for the restaurant, traffic is increased.
Further, the incentive may also include an increasing premium wherein the user shares the code with other user contacts, resulting in both the individual and contacts then receiving a premium. For instance, a user receives a code from restaurant. The user then shares the code with the user's contacts. The restaurant then provides a discount to the user, for example 10% off a meal price and also provides 10% off for each individual that visits the restaurant. The restaurant may choose what percentage end point it wants for the discount (i.e., no more than 50% off or up to 100% off depending on number of referrals). The user that gained the code through a share from a system contact can also request a new code from the restaurant, so they themselves may share with their contacts. In other words, the system continues the incentive for each individual not just the first person that received the original code. The restaurant is also able to fix the time period that they want individuals to be able to cash in on the discount. For instance, the restaurant may find Tuesdays to be slow so they send out codes to system share partners stating the they have only Tuesday to use the code or the restaurant may choose to say the users only has 24-48 hours to use and also have their RM! contacts use.
While the foregoing example focuses on a restaurant, the same scenarios can easily apply to other business, such oil change, gyms, clothing stores, etc.
The above represents merely small example information that may be stored, curated, and shared/unshared. Those skilled in the art will recognize that there are many types of personal information that can be stored in the IC. The type and quantity of information is limitless and depends solely on the needs and desires of the user.
In addition to sharing information with recipients over the Internet, the user may also use the information locally. For example, when visiting a doctor or dentist's office, there are often out multiple forms to be filled out. The present invention enables a user to have prefilled in information that may have been gathered from multiple locations and may include test and examination results not often carried by patients to an appointment at their fingertips. In another embodiment of the invention, a user may permit use of personally identifiable information shared with selected vendors to inform the user of other available products or services available from a vendor. When authorized contact can be withdrawn at any time by unsharing with the vendor the information request.
It should also be noted but obvious to those skilled in the arts that the screen layout and design of the data structures used to store the information can vary greatly, depending on various factors such as the design requirements for the IC and the selected platforms used to implement the IC (e.g., DBMS, operating system, etc.). Further, the use of page headings, such as "My Account," "Contacts,"
"Employment Info," etc. are for illustration purposes only. As those skilled in the arts will understand, the page heading identifiers can be labeled anything and do not impact the function of the device or its principles of use.
In some embodiments, the user uses the IC's GUI in order to provide the IC with the mapping between output data feeds and those to whom the information is to be shared. Depending on the embodiment, the IC's GUI may be presented on the screen of a personal computer or handheld device or on some other suitable display. Depending upon the particular embodiment, may present user interface displays to the user for managing the user's personal information. In one
embodiment, the user interface (Ul), which may be a GUI or a text-based interface, may be presented on a computer display screen. Alternatively, the user interface may be presented on the display of an IC appliance, or on a smaller screen contained within a handheld device associated with the IC.
Alternatively, information regarding the mappings for the data feeds of the IC may be located in a configuration file. The configuration file may reside on a personal computer or server in a network (local or Internet). The IC accesses the configuration file over the network and configures itself according to the mapping information contained with the configuration file.
Returning to Fig. 1 and Fig.1 b, information may be shared with a single receiver 164 or to more than one receiver 166. In one embodiment, an output data feed may be mapped to a community, such as an organization, association or club (as depicted by 166 in Fig. 1 ). In another embodiment, information may be shared with selected individuals (as depicted by 164 in Fig.1 )
The principles of the invention, with respect to sharing and unsharing of information, are focused on the control the user has over the information. Unlike an information aggregator, which allows third party access to a user's information for various purposes, the present invention keeps the information in control of the user by "sending" or pushing the information to selected recipients. Likewise, user control is enhanced by limiting the information to only that information that is shared and also by enabling the user to unshare the information by pulling it back from the recipient.
For example, the user may share selected travel information with the user's family members. Once the trip is over, or if the user no longer wishes to share the information, the user unshares the information and the recipient (here, family members) no longer have access to the information. Yet, the information is not lost to the user as it remains in the particular data set until deleted by the user.
The present invention may also be used to generate notifications to recipients based on the user's shared information. Examples of events that might be contained in the user's itinerary are concerts, theater performances, dance performances, movie screenings, exhibitions, conferences, social gatherings and business gatherings. The information can be compiled from input data feeds from a variety of sources, for example, Microsoft Outlook.TM. or an automated location system, such as a GPS receiver.
In another embodiment, a user's information may be a source of gathered information for generating personalized recommendations by businesses. For example, a user's past consumption habits and feedback that the user has shared regarding certain content, products, etc., may be available to vendors, e.g., restaurants and stores, from previously shared user information. The vendor, a restaurant for example, may make meal recommendations or notify the user of specials on meals the user is known to like from information previously shared by the user.
The present invention further contemplates further recommendation methods. A user may elect to share information with a hosting network. The hosting network, based upon the shared information, may in turn use that information to recommend services and products of affiliates or marketing partners. There are a number of different types of recommendation engines, and each type might be useful for introducing information about content to a user. For example, a non-personalized recommendation engine might recommend a content item due to its averaged popularity with multiple users, without regard to the demographic profiles of the users. As another example, a collaborative recommendation engine might recommend a content item to a particular demographic group due to the content item's popularity with users with the same, or similar, demographic profiles. The outputs of the recommendation engines in these examples, as well as the output of other types of recommendation engines, e.g., item-to-item, attribute-based or content-based, may be used to select content for introduction to a content filtering system. Recommendation engines that employ attribute-based and collaborative filtering methods are generally known in the art, and a description thereof is omitted here for convenience only and should not be considered limiting.
Typical examples of recommendation engine types that might be used by the host include: attribute-based and collaborative filtering. When used by the user, an attribute-based recommendation engine uses content attributes to identify content items that might be suitable for a particular user based on his or her demographic profile, and uses adoption statistics to select the most popular content for recommendation to the user.
In another embodiment, the present invention enables a user to manage contacts 162. With reference to Fig. 28 - Fig. 31 , user 106 can access search screen 108o to enter an email address 212 and activate search button 214. The system then searches for the contact by reference to the email address entered. In another embodiment, a contact can be search by name. The user is then directed to the contact.
In another embodiment, the user can directly access a contact list by activating contact button 216. The user then scrolls to the desired contact name (here Adrian 218). Contacts can be listed by contact type: individual or group (e.g., family, friends, co-workers, business associates, etc.).
For each of the listed contact types, the user is provided with buttons that enable him to add or edit the contact type. The user then has two selections: shared with me tab 220 and shared by me tab 222. By selecting shared with me tab 220, the user is directed to a data screen 224 that has a list of categories of information 226a-226e that may contain information shared by the contact 218 with the user. By selecting the shared by me tab 222, the user is directed to a similar list of data sets 226a-226e that may contain information shared with the selected contact 218. The user is protected by being able to keep track of what information is shared with the user's various contacts. Both the user and contact have the advantage of knowing potentially important information is available to the user or contact, depending on the situation, if a need for it, e.g., an emergency, arises.
At any time, the user and contact may unshare the information with the other.
As will also be understood by those skilled in the arts, the order of the steps of the method described above is not critical. The spirit of the invention and the method for employing it are found in the individual features of the invention and their use, not the order in which they are used or presented herein.
The preceding merely illustrates the principles of the invention. It will be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the invention and are included within its spirit and scope. Furthermore, all examples and conditional language recited herein are principally intended to aid the reader in understanding the principles of the invention and the concepts contributed by the inventors to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and aspects of the invention as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents and equivalents developed in the future, i.e., any elements developed that perform the same function, regardless of structure. The scope of the present invention, therefore, is not intended to be limited to the exemplary aspects shown and described herein. Rather, the scope and spirit of present invention is embodied by the appended claims.

Claims

CLAIMS We claim:
1 . A method for a web-based system of curating, sharing, and unsharing information comprising:
(a) Providing a remote, centralized web-based digital information curator;
(b) contacting the remote, centralized web-based digital information curator via a web-enabled computing device;
(c) utilizing a user controlled secure access point to access the remote, centralized web-based digital information curator;
(d) identifying the user on the remote, centralized web-based digital information curator via a unique user identifier, wherein the unique user identifier is stored in the remote, centralized web-based digital information curator and is under the control of the user;
(e) inputting information into the centralized web-based digital information curator;
(f) selecting, at the time of input or at a later time, information from the inputted information; and,
(g) sharing the selected information with selected recipients.
2. The method of claim 1 wherein the remote computing device is selected singly or in combination from the group comprising desktop computers, tablet style computers, and smartphones.
3. The method of claim 1 wherein the centralized digital information curator is contacted through the group comprising an app, Intranet sharing via hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers within a Cloud-based network.
4. The method of claim 1 , wherein the unique user identifier is a combination of an email address and a personalized password.
5. The method of claim 1 wherein the information is personal selected singly or in combination from the group comprising bank information, credit card information, employment information, resume, medical history, credit history, expenses, budgets, automobile information, driver's license, passport, insurance information, restaurant ordering and payment information, product purchase information, online payment information, product and warranty information, personal information, home related information, photographs, videos, audio recordings, and social media information.
6. The social media information of claim 5 wherein the social media is selected singly or in combination from the group comprising Facebook, Twitter, Linkedln, Google+, Path, MySpace, and Pinterest.
7. The method of claim 1 wherein the information is business information selected singly or in combination from the group comprising demographic
information, health information of patients or customers, service provider information, product information, inventory information, credit card information, customer application information, order information, sale information, delivery information, testing information, checklists, marketing material, videos, photographs, audio recordings, warranty information, and purchase history information.
8. The method of claim 1 including the further step of unsharing the selected information with the selected recipients.
9. The method of claim 1 including the further step of deleting input information from the centralized digital information curator.
10. A method for curating information in a centralized curator, the method comprising:
(a) using a remote computing device to contact a web-based, centralized digital information curator, wherein a user is in control of the remote computing device and the centralized information curator;
(b) accessing the user's account on the centralized information curator using a unique identifying password;
(c) inputting information into the user's account in the centralized digital information curator;
(d) selecting, at the time of input or at a later time, desired information from the information input into the user's account on the centralized information curator to selected recipients; and,
(e) sharing the selected information with the selected recipients.
1 1 . The method of claim 10 wherein the remote computing device is selected singly or in combination from the group comprising desktop computers, tablet style computers, and smartphones.
12. The method of claim 10 wherein the centralized digital information curator is contacted through the group comprising an app, Intranet sharing via hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers within a Cloud-based network.
13. The method of claim 10, wherein the unique identifying password is a combination of an email address and a personalized password.
14. The method of claim 10 wherein the information is personal selected singly or in combination from the group comprising bank information, credit card information, employment information, resume, medical history, credit history, expenses, budgets, automobile information, driver's license, passport, insurance information, restaurant ordering and payment information, product purchase information, online payment information, product and warranty information, personal information, home related information, photographs, videos, audio recordings, and social media information.
15. The social media information of claim 14 wherein the social media is selected singly or in combination from the group comprising Facebook, Twitter, Linkedln, Google+, Path, and Pinterest.
16. The method of claim 10 wherein the information is business information selected singly or in combination from the group comprising demographic
information, health information of patients or customers, service provider information, product information, inventory information, credit card information, customer application information, order information, sale information, delivery information, testing information, checklists, marketing material, videos, photographs, audio recordings, warranty information, and purchase history information.
17. The method of claim 10 including the further step of unsharing the selected information with the selected recipients.
18. The method of claim 10 including the further step of deleting input information from the centralized digital information curator.
19. A method for curating information in a centralized digital information curator, the method comprising:
(a) accessing a remote centralized digital information curator using a web- enabled computing device wherein the user logs into the user's account with a secure identifier;
(b) reviewing information input into the user's account to add to, update, modify, delete, or select information;
(c) selecting information from the user's account to combine into a unique file of information;
(d) sharing the unique file with selected recipients.
20. The method of claim 19 wherein the remote computing device is selected singly or in combination from the group comprising desktop computers, tablet style computers, and smartphones.
21 . The method of claim 19 wherein the centralized digital information curator is contacted through the group comprising an app, Intranet sharing via hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers within a Cloud-based network.
22. The method of claim 19 wherein the secure identifier is a combination of an email address and a personalized password.
23. The method of claim 19 wherein the information is personal selected singly or in combination from the group comprising bank information, credit card information, employment information, resume, medical history, credit history, expenses, budgets, automobile information, driver's license, passport, insurance information, restaurant ordering and payment information, product purchase information, online payment information, product and warranty information, personal information, home related information, photographs, videos, audio recordings, and social media information.
24. The social media information of claim 23 wherein the social media is selected singly or in combination from the group comprising Facebook, Twitter, Linkedln, Google+, Path, and Pinterest.
25. The method of claim 19 wherein the information is business information selected singly or in combination from the group comprising demographic
information, health information of patients or customers, service provider information, product information, inventory information, credit card information, customer application information, order information, sale information, delivery information, testing information, checklists, marketing material, videos, photographs, audio recordings, warranty information, and purchase history information.
26. The method of claim 19 including the further step of unsharing the unique file, in whole or in part, with the selected recipients.
27. The method of claim 19 wherein the unique file can be sent to recipients, either singly or in combination, selected from the group comprising at least one individual, employers, potential employers, healthcare providers, government authorities, account holders on social media forums such as Facebook, Twitter, Linkedln, Google+, Path, MySpace, Pinterest, and businesses.
28. The method of claim 19 including the further step of deleting input information from the centralized digital information curator.
29. A method for sharing information from a centralized information curator comprising the steps of:
(a) accessing a remote centralized digital information curator using a web- enabled computing device wherein the user logs into the user's account with a secure identifier further comprising an email address and a password;
(b) reviewing information input into the user's account to add to, update, modify, delete, or select information, the information singly or in combination from the group comprising bank information, credit card information, employment information, resume, medical history, credit history, expenses, budgets, automobile information, driver's license, passport, insurance information, restaurant ordering and payment information, product purchase information, online payment information, product and warranty information, personal information, home related information, photographs, videos, audio recordings, and social media information such as Facebook, Twitter, Linkedln, Google+, Path, MySpace, and Pinterest, demographic information, health information of patients or customers, service provider information, product information, inventory information, credit card information, customer application information, order information, sale information, delivery information, testing information, checklists, marketing material, videos, photographs, audio recordings, warranty information, and purchase history information.;
(c) selecting information from the user's account to combine into a unique file of information further comprising the step of creating a new unique file in which to store the selected information, identifying information to be shared with recipients, copying selected information to the file wherein selected information may be culled from information; and,
(d) sharing, at the time of unique file creation or at a later time, the unique file with selected recipients.
30. The method of claim 29 wherein the remote computing device is selected singly or in combination from the group comprising desktop computers, tablet style computers, and smartphones.
31 . The method of claim 29 wherein the centralized digital information curator is contacted through the group comprising an app, Intranet sharing via hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers within a Cloud-based network.
32. The method of claim 29 including the further step of unsharing the unique file, in whole or in part, with the selected recipients.
33. The method of claim 29 wherein the unique file can be sent to recipients, either singly or in combination, selected from the group comprising at least one individual, employers, potential employers, healthcare providers, government authorities, account holders on social media forums such as Facebook, Twitter, Linkedln, Google+, Path , Pinterest, MySpace, and businesses.
34. The method of claim 29 including the further step of deleting input information from the centralized digital information curator.
35. A method for sending data to and storing data on a web based centralized information curator comprising the steps of:
(a) accessing a user's account on a web located centralized information curator using a web enabled computing device wherein access to the user's account on the centralized information curator is accomplished using a user unique access code; (b) locating, before or after accessing the centralized information curator, data to be sent to the centralized information curator; and,
(c) transferring the located data to the centralized information curator, the transferred information placed in one or more locations in the user's account on the centralized information curator.
36. The method of claim 35 wherein the web enabled computing device is selected singly or in combination from the group comprising desktop computers, tablet style computers, and smartphones.
37. The method of claim 35 wherein the centralized digital information curator is contacted through the group comprising an app, Intranet sharing via hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers within a Cloud-based network.
38. The method of claim 35 wherein the user unique access code is a combination of an email address and a personalized password.
39. The method of claim 35 wherein the data is personal data selected singly or in combination from the group comprising bank information, credit card information, employment information, resume, medical history, credit history, expenses, budgets, automobile information, driver's license, passport, insurance information, restaurant ordering and payment information, product purchase information, online payment information, product and warranty information, personal information, home related information, photographs, videos, audio recordings, and social media information.
40. The social media information of claim 39 wherein the social media is selected singly or in combination from the group comprising Facebook, Twitter, Linkedln, Google+, Path, MySpace, and Pinterest.
41 . The method of claim 35 wherein the information is business information selected singly or in combination from the group comprising demographic
information, health information of patients or customers, service provider information, product information, inventory information, credit card information, customer application information, order information, sale information, delivery information, testing information, checklists, marketing material, videos, photographs, audio recordings, warranty information, and purchase history information.
42. The method of claim 35 including the further step of creating a unique file within the user's account of the web based centralized information curator, the unique file to hold user selected data that has been transferred to the web based centralized information curator for immediate or later sharing with recipients.
43. The selected data of claim 42 being taken in or whole or in part from transferred data.
44. The unique file of claim 42 further being sent to recipients, either singly or in combination, selected from the group comprising at least one individual, employers, potential employers, healthcare providers, government authorities, account holders on social media forums such as Facebook, Twitter, Linkedln, , Google+, Path, MySpace, Pinterest, and businesses.
45. The method of claim 35 including the further step of deleting data from the centralized digital information curator.
46. The unique file of claim 42 including the further step of deleting data from the unique file.
47. The unique file of claim 42 including the further step of adding data from the unique file.
48. The unique file of claim 42 including the further step of modifying data in the unique file.
49. The method of claim 35 wherein the data to be transferred to the centralized information curator may be located on sources selected from the group local hard drives, media formats, web located data storage accounts, social media accounts, servers, and intranet systems.
50. The media formats of claim 49 selected, singly or in combination, from the group comprising DVD, CD, MP3, MP4, tapes, DVR, VCD, AFI, ASF, ASX, DivX, MPEG, MPG, MPE, SVCD, WMV, MOV, OGG, QT, RM, WMA, XVCD, XSVCD, AAC LD, HE-AAC, AAC ELD, AMR, RA, RAM, VOB, AIFF, AIF, MKV, FLV, JPEG, MPEG, and FLAC.
51 . A web based system for collecting, storing, curating, and sharing information comprising a web enabled computing device, a centralized web based data curator, an interface between the computing device and the data curator, data files, and at least one unique file for sharing with recipients.
52. The system of claim 51 wherein the web enabled computing device is selected singly or in combination from the group comprising desktop computers, tablet style computers, and smartphones.
53. The system of claim 51 wherein the interface is selected from the group comprising an app, Intranet sharing via hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers within a Cloud-based network.
54. The method of claim 51 , further including a unique user access identifier.
55. The unique user access identifier of claim 54 further comprising a combination of an email address and a personalized password.
56. The system of claim 51 wherein the data files comprise personal data selected singly or in combination from the group comprising bank information, credit card information, employment information, resume, medical history, credit history, expenses, budgets, automobile information, driver's license, passport, insurance information, restaurant ordering and payment information, product purchase information, online payment information, product and warranty information, personal information, home related information, photographs, videos, audio recordings, and social media information.
57. The social media information of claim 56 wherein the social media is selected singly or in combination from the group comprising Facebook, Twitter, Linkedln, Google+, Path, MySpace, Pinterest.
58. The system of claim 51 wherein the data files comprise business data files selected singly or in combination from the group comprising demographic information, health information of patients or customers, service provider information, product information, inventory information, credit card information, customer application information, order information, sale information, delivery information, testing information, checklists, marketing material, videos, photographs, audio recordings, warranty information, and purchase history information.
59. A method for using a web based centralized data curator to collect, store, curate, and share data comprising the steps of: (a) Providing a web based centralized data curator for the storage, organization, curating, and sharing of user data, the web based centralized data curator comprising files and sub-files controlled by the user and into which user data may be transferred, organized, stored, and retrieved by the user;
(b) Accessing the web based centralized data curator with a web enabled computing device wherein access is permitted to a user's account on the web based centralized data curator through the use of a user unique access code; and,
(c) Initially transferring data to the user's account on the web based centralized data curator.
60. The method of claim 59 including the further step of periodically reviewing data transferred in the user's account on the web based centralized data curator for purposes of adding to the data, modifying data, deleting data, and/or selecting data for sharing.
61 . The method of claim 59 including the further step of creating at least one unique file.
62. The step of claim 61 including the further step of selecting data from the user's account, in whole or in part, for inclusion in the unique file.
63. The method of claim 61 including the further step of sharing the unique file with selected recipients.
64. The method of claim 62 including the additional step of unsharing the unique file.
65. The method of claim 59 wherein the web enabled computing device is selected singly or in combination from the group comprising desktop computers, tablet style computers, and smartphones.
66. The method of claim 59 wherein the web based centralized data curator is accessed through the group comprising an app, Intranet sharing via hardwired systems, Wi-Fi, QR code scanning uplink, near field communication, and firewall protected, managed and dedicated servers that are GLBA, HIPPA, PCI-CISP, PCI- DSS, and SOX compliant within a Cloud-based network.
67. The method of claim 59 wherein the user unique access code is a combination of an email address and a personalized password.
68. The method of claim 59 wherein the transferred data is personal data selected singly or in combination from the group comprising bank information, credit card information, employment information, resume, medical history, credit history, expenses, budgets, automobile information, driver's license, passport, insurance information, restaurant ordering and payment information, product purchase information, online payment information, product and warranty information, personal information, home related information, photographs, videos, audio recordings, and social media information.
69. The social media information of claim 68 wherein the social media is selected singly or in combination from the group comprising Facebook, Twitter, Linkedln, Google+, Path, MySpace, and Pinterest.
70. The method of claim 59 wherein the transferred data is business data selected singly or in combination from the group comprising demographic
information, health information of patients or customers, service provider information, product information, inventory information, credit card information, customer application information, order information, sale information, delivery information, testing information, checklists, marketing material, videos, photographs, audio recordings, warranty information, and purchase history information.
71 . The unique file of claim 63 being sent to recipients, either singly or in combination, selected from the group comprising at least one individual, employers, potential employers, healthcare providers, government authorities, account holders on social media forums such as Facebook, Twitter, Linkedln, MySpace, Pinterest, and businesses.
72. The method of claim 59 wherein the data to be transferred to the centralized information curator may be located on sources selected from the group local hard drives, media formats, web located data storage accounts, social media accounts, servers, and intranet systems.
73. The media formats of claim 72 selected, singly or in combination, from the group comprising DVD, CD, MP3, MP4, tapes, DVR, VCD, AFI, ASF, ASX, DivX, MPEG, MPG, MPE, SVCD, WMV, MOV, OGG, QT, RM, WMA, XVCD, XSVCD, AAC LD, HE-AAC, AAC ELD, AMR, RA, RAM, VOB, AIFF, AIF, MKV, FLV, JPEG, MPEG, and FLAC.
PCT/US2013/075487 2012-12-21 2013-12-16 Web and mobile application based information identity curation WO2014099819A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201213725139A 2012-12-21 2012-12-21
US13/725,139 2012-12-21

Publications (2)

Publication Number Publication Date
WO2014099819A2 true WO2014099819A2 (en) 2014-06-26
WO2014099819A3 WO2014099819A3 (en) 2015-02-12

Family

ID=50979381

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/075487 WO2014099819A2 (en) 2012-12-21 2013-12-16 Web and mobile application based information identity curation

Country Status (1)

Country Link
WO (1) WO2014099819A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9785781B2 (en) 2014-12-08 2017-10-10 Dotalign, Inc. Method, apparatus, and computer-readable medium for data exchange
GB2560671B (en) * 2015-08-05 2019-06-12 Intralinks Inc Systems and methods of secure data exchange

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050091327A1 (en) * 2000-11-10 2005-04-28 Koch Robert A. Setting and display of communication receipt preferences by users of multiple communication devices
US20120290950A1 (en) * 2011-05-12 2012-11-15 Jeffrey A. Rapaport Social-topical adaptive networking (stan) system allowing for group based contextual transaction offers and acceptances and hot topic watchdogging

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050091327A1 (en) * 2000-11-10 2005-04-28 Koch Robert A. Setting and display of communication receipt preferences by users of multiple communication devices
US20120290950A1 (en) * 2011-05-12 2012-11-15 Jeffrey A. Rapaport Social-topical adaptive networking (stan) system allowing for group based contextual transaction offers and acceptances and hot topic watchdogging

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9785781B2 (en) 2014-12-08 2017-10-10 Dotalign, Inc. Method, apparatus, and computer-readable medium for data exchange
US10417434B2 (en) 2014-12-08 2019-09-17 Dotalign, Inc. Method, apparatus, and computer-readable medium for data exchange
GB2560671B (en) * 2015-08-05 2019-06-12 Intralinks Inc Systems and methods of secure data exchange

Also Published As

Publication number Publication date
WO2014099819A3 (en) 2015-02-12

Similar Documents

Publication Publication Date Title
US20190214116A1 (en) Digital health platform for chronic disease management, secure messaging, prescription management, and integrated e-commerce curation
US9959385B2 (en) Messaging within a multi-access health care provider portal
TWI374396B (en) Method and computer program products with message integration for data exchange, collection, monitoring and/or alerting
JP4292199B2 (en) Verified personal information database
US20140039911A1 (en) System and method of comparing healthcare costs, finding providers, and managing prescribed treatments
US20170185715A9 (en) Federated Collaborative Medical Records System Utilizing Cloud Computing Network and Methods
US11455597B2 (en) Remotely diagnosing conditions and providing prescriptions using a multi-access health care provider portal
US20230252553A1 (en) Systems and methods for managing lists using an information storage and communication system
US10818388B2 (en) Systems and methods for administration of prescription drug benefits
US20070088713A1 (en) Method of secure online targeted marketing
US20140289033A1 (en) Methods and Systems for Uploading, Trading and Exchanging Loyalty Points on Social Media Websites
US11710132B2 (en) User controlled event record system
WO2008141307A1 (en) System and method for providing services via a network in an emergency context
WO2014004837A1 (en) Integrated medical evaluation and record keeping system
US20080312962A1 (en) System and method for providing services via a network in an emergency context
US20090099921A1 (en) System and method for advertising and deliverig media in conjunction with an electronic medical records management, imaging and sharing system
US11722304B2 (en) Secure digital information infrastructure
WO2011106464A1 (en) System and method for managing personal information
US20240089109A1 (en) Secure digital information infrastructure
US20230223126A1 (en) Digital Health Platform with Prescription Management and Integrated E-Commerce Curation
US20160342741A1 (en) Service-oriented, integrative networking platform, system and method
US20110166886A1 (en) Bariatric Treatment Management System and Method
WO2014099819A2 (en) Web and mobile application based information identity curation
US20140236612A1 (en) Multi-access health care provider portal
US20060036539A1 (en) System and method for anonymous gifting

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13864910

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 13864910

Country of ref document: EP

Kind code of ref document: A2