WO2014110279A1 - Systems and methods for access-controlled interactions - Google Patents
Systems and methods for access-controlled interactions Download PDFInfo
- Publication number
- WO2014110279A1 WO2014110279A1 PCT/US2014/010905 US2014010905W WO2014110279A1 WO 2014110279 A1 WO2014110279 A1 WO 2014110279A1 US 2014010905 W US2014010905 W US 2014010905W WO 2014110279 A1 WO2014110279 A1 WO 2014110279A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- interaction
- user
- sender
- message
- access
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/1607—Details of the supervisory signal
- H04L1/1621—Group acknowledgement, i.e. the acknowledgement message defining a range of identifiers, e.g. of sequence numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/08—Annexed information, e.g. attachments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/088—Access security using filters or firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/30—Resource management for broadcast services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/90—Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
Definitions
- This disclosure relates to systems and methods for controlling access to and interaction with user resources.
- FIG. 1 is a schematic diagram of an interaction server configured to enable access-controlled interactions from senders.
- FIG. 2 is a flow diagram of a method for processing interactions received by the interaction server.
- FIG. 3 is a flow diagram of a method for processing interactions addressed to a child public identifier that is linked to a parent account.
- FIG. 4 is a flow diagram of a method for delivering an interaction to a user resource of a receiver using location-based interaction rules.
- FIG. 5 is a schematic diagram of a system configured to broadcast messages to a plurality of channel subscribers.
- FIG. 6 is a flow diagram for a method of admitting new subscribers to a channel.
- FIG. 7 is a schematic diagram of a system configured to broadcast messages to a channel subscriber.
- FIG. 8 is a schematic representation of escalation rules for a user.
- FIG. 9 is a schematic diagram of a system configured to broadcast a message to a dynamically segmented plurality of channel subscribers.
- FIG. 10 is a schematic diagram of a system configured to broadcast automatic messages to interested channel subscribers.
- FIG. 1 1 is a schematic diagram of a system for interaction among a plurality of channel subscribers.
- the present disclosure introduces, inter alia, new communication and interaction methods and technologies able to resolve a number of difficult problems for interpersonal, business, and group interactions and/or mass communications.
- personal, and otherwise private, information including personal identifiers, must be disclosed for one person to interact with another person or entity. This results in the forfeiting of control over that person, and otherwise private, information and the forfeiting of control over access to person, and otherwise private, resources.
- personal contact information such as an email address or phone number, must be disclosed for one person to contact another.
- unwanted communications such as spam or phone solicitations, may be received.
- "Privately public" interaction may allow a user to use one interaction address, such as a communication address, that does not need to be changed no matter how public it becomes, and for others to use that address to interact with the user with multiple methods — email, SMS, MMS, IM, voice, video, personal computer, and the like — without possessing any of the user's other contact information (phone numbers, email addresses, etc.).
- the user may prevent unapproved others from interacting with the user and/or accessing user reources even if they possess the user's interaction address, and the user may revoke anyone's abilities to interact with the user at any time without having to replace the interaction address.
- interactions directed to the one interaction address may be routed to the user via phone numbers, IM addresses, email addresses, social media addresses, and the like. Only the interaction address, and sometimes an access code, needs to be given out for any method of interaction to be conducted.
- the interaction server may control interactions, such as electronic or other communications, between and among users, non-users, and/or devices.
- the interaction server may be used for various methods of interaction including application to application, email, SMS/MMS messaging, telephone calls, faxes, audio/video conferencing, webinar/screen sharing, instant messaging, postal mail, social media messaging and posting, data verification, data transfer, validation, authentication, and/or any other method of interaction.
- the interaction server may receive an interaction, such as an interaction request, intended for a user from a sender who is a user or a non-user.
- the interaction request may be implicit.
- the sender may not know he or she is interacting with an interaction server, and may just be attempting to send a message using a conventional paradigm.
- the interaction request may be received at the interaction server via one or more of a plurality of methods, such as an application interface, email, SMS, phone calls, IM, web service, API, a request to process postal mail, and the like.
- the interaction server may route the interaction request, a notice of the request, physical mail, or the like to the intended user/receiver through one or more of a plurality of methods, such as an application, email, SMS, phone calls, IM, postal mail, and the like.
- the receiver may respond to the sender through the interaction server using the same or a different method.
- the receiver may respond to the sender in another way, without using the interaction server.
- a history of all messages and/or interaction requests may be recorded and stored locally or remotely.
- a message center may store a record of sent and/or received interaction requests and/or messages.
- the message center may store the interaction requests and/or messages even if copies of or links to the messages or requests have been routed elsewhere.
- the message center may include one or more data structures, such as a database, list, stack, queue, or the like, to store the messages.
- a user may log in to the message center to view the messages.
- the message center may be displayed to the user as one or more mailboxes, folders, directories, lists, etc. The user may be able to interact with the messages accessed through the message center including forwarding, replying, and/or the like.
- a user may register a public address with the interaction server.
- the address may be in a variety of forms, such as a string including numbers, letters, and/or other symbols or characters.
- the user may use the public address as a single, unique public identifier to which multiple types of interaction— email, SMS, IM, phone, postal mail, etc.— are addressed.
- the interaction server may receive interaction requests, such as communication requests, and route them to user resources, such as client devices or physical addresses designated by the users (the case of physical postal mail is described below).
- the client devices/locations may be identified by private addresses and/or users running proprietary applications.
- the private addresses may include information not visible to the sender of the interaction, such as email addresses, telephone numbers, screen names, postal addresses, social media addresses, and the like.
- the public address may be modified and/or diverted so as to successfully deliver interaction requests to the interaction server via different methods.
- interaction requests may be addressed to SUPERMAN123@example.com and sent to the interaction server via email.
- Interaction requests sent via SMS to SUPERMAN123@example.com may also be received by the interaction server.
- Phone calls may be sent through a calling application compatible with directly dialing SUPERMAN123, sent by dialing a general number where the caller is prompted to provide SUPERMAN123, sent by dialing a specific number associated with SUPERMAN123, or the like. This process may be automated by using an app on a smartphone that facilitates the process.
- the user may simply select SUPERMAN123 and indicate that a voice interaction is desired.
- IMs may be redirected to the interaction server, may be re-directed to a service compatible with the interaction server, or a proprietary IM service may be used.
- Users may specify interaction rules that determine how incoming interactions are routed.
- the interaction rules may be general or customized for certain senders or groups, categories, or types of senders, such as non-users, new users, users in a directory or a group within a directory, and the like.
- the rules may be general or customized by the type of interaction request received, such as voice, text, request, and the like.
- the rules may include if, how, and/or where to deliver voice, text, or physical mail communications; acknowledgement preferences; the location of the user; allowed or preferred private addresses (phone numbers, email addresses, etc.); allowed, blocked, or preferred senders; rules for handling and/or escalating urgent or emergency messages; blackout periods in which all or some interaction requests may be blocked or held until the end of the blackout period; the duration for which access is granted; when each method of interaction is permitted (e.g., time of day, day of week, etc.); whether personal contact information or other data is visible to other users and/or non-users; if and/or how to display the sender in a directory of contacts; and the like. Users may be permitted to change the interaction rules at will.
- An interaction request may specify the type of interaction requested.
- the type of interaction requested may be a generic method of communication, such as written message, voice message, live voice, and the like; a specific method of communication that is desired, such as email or a phone call; or the like.
- the interaction server may evaluate the rules to transmit the interaction request to one or more client devices designated by the user. For example, the interaction server may forward a written message to an e-mail address, route a phone call or fax to the appropriate telephone number, or the like.
- the interaction server may evaluate the interaction rules to determine if and/or how client devices may receive the interaction request.
- Exemplary client devices may include a phone, pager, computer, server, smartphone, tablet, personal digital assistant, and/or the like.
- a written message may be transmitted to a user as an IM if the user is at work or a text message if the user is not at work, for example.
- the user's location may be determined from GPS data, login status, time of day, cascading through devices, or the like.
- Client devices may be running an application to send and/or receive interactions.
- a "caller” might instead simply request a voice interaction using an app through the interaction server. If the recipient is available, he or she may accept the interaction and a voice chat or phone call may ensue. If the recipient is not available, the recipient may respond with a time or duration when he or she would be available, or simply not respond at all. When the recipient becomes available, he or she can simply respond to the original interaction request and the voice chat or phone call may ensue. If the original requester is unavailable by the time the recipient is available, the original requester may respond similarly indicating when he or she might be available. In this manner, the interaction server may facilitate efficient interaction, solving the problems associated with traditional "phone tag".
- a user may indicate their level of availability, which can be used for escalation and/or routing communication to or through various communication mechanisms or devices.
- the user may also choose to publish their level of availability to all users and/or to trusted other users in order to help set expectations of individuals who wish to interact with the user. Interaction escalation and routing may be affected by a receiver's level of availability, the receiver's level of trust of the sender, and/or the sender's stated urgency.
- a first person may attempt to interact with a second person through a regular private address, such as a regular phone number or email address.
- the second person may prefer interacting using the interaction server and may have such incoming interactions automatically diverted by service providers to the interaction server where interaction rules may again apply, such as restrictions, routing, escalation, permissions, and the like.
- Interaction rules may be based on the originating phone number, originating email address, time of day, and the like.
- the interaction server may restrict unwanted interaction requests, including unwanted communications, from being sent to users.
- the interaction server may allow only certain interaction requests and not others.
- One method of controlling access may be through the use of access codes.
- Interaction requests may include an access code, and the interaction server may determine whether interaction requests are authorized for the received access code.
- the interaction server may require that an access code be registered with the interaction server before that access code is used by a sender.
- the interaction server may also dynamically allocate access codes when an interaction request with a new access code is received. An unlimited number of messages and/or an unlimited number of different senders may use an access code. If access code functionality is enabled and an interaction request arrives without an access code, the sender may be prompted to enter one and/or the request may be ignored. Ignored requests may be stored such that the receiver may choose to review blocked or ignored interaction requests.
- the interaction server may reject and/or bounce interaction requests without valid access codes before the entire interaction request has been downloaded by the interaction server to save bandwidth.
- the access code when sending or receiving a written message, may be added as a suffix or prefix to the local part of an email address and set off by a special character, such as a tilde, (e.g., "user1 ⁇ 56aQ1 nE3@example.com"), and the email message itself may serve as the interaction request.
- a special character such as a tilde, (e.g., "user1 ⁇ 56aQ1 nE3@example.com")
- the email message itself may serve as the interaction request.
- Users may issue valid new access codes and revoke access codes at will, such as when interaction is no longer desired or unwanted interaction requests begin arriving with a particular access code. If an interaction request does not have a valid access code, a bounce message and/or a prompt to enter a correct access code may be returned, and the user may not receive the interaction request or a notice of the attempt. If access code functionality is not enabled by a user, interaction requests addressed to the user's public address and including any access code or not including an access code may be received by the user. [0029] Interaction rules may be specified for each access code. For example, messages with certain access codes may be treated as unverified interaction requests, whereas other access codes may grant specific rights.
- "4428” may be an access code for important new contacts who automatically become trusted senders when using that access code
- "7726” may be an access code that is treated as spam and routed to a spam or unverified inbox and/or tagged as spam
- "soccer” may be an access code that automatically tags senders as new contacts under a "Soccer Team" heading.
- interaction via all interaction methods may be authorized, and/or only certain interaction types and/or methods may be used.
- Some access codes may allow messages to be sent to a verified mailbox and/or allow live communication, whereas other access codes may allow one or neither of these rights.
- the interaction server may include the access code used for access with forwarded messages, so the user may filter received messages (e.g., "soccer” may be filtered to a soccer folder, and "7726" may be filtered to a bulk folder).
- the interaction requests may be sent to different inboxes based on the access code used.
- the interaction requests may be sorted, displayed, tagged, grouped, etc. within a message center and/or a mailbox based on the access code used.
- Interaction requests and/or messages received with an access code may display or otherwise encode the access code used along with the interaction request and/or message, for the reference of the user.
- Interaction rules for access codes may include the methods of interaction allowed, how to handle urgent and emergency messages, whether escalation of such messages is allowed, the frequency, sequence, and types of interactions to use when escalating, the duration that access is granted for, when each method of interaction is permitted (e.g., time of day, day of week, etc.), whether personal contact information or other data is visible, if or how to display the sender in a directory of contacts, how replies to senders are formatted and/or handled, and the like. Users may be permitted to change the interaction rules for access codes at will, including revoking access codes. Interaction rules for access codes may set the default interaction rules for a particular sender, which may be changed or customized or maintained later.
- a sender may inherit default interaction rules from the first access code used by the sender. Interaction rules may also be used to aggregate or consolidate messages from a particular sender or group of senders such that a "digest" of sorts can be presented to the receiver. Instead of multiple similar messages showing up as separate messages, they may be consolidated into one message, wherein the receiver may view a single message that summarizes the multiple interactions.
- Another method the interaction server may utilize to restrict access may be designation of trusted senders ("trusting"). Trusting may be used by itself or in combination with other methods of restricting access, such as access codes (e.g., the interaction server may allow trusting and/or access codes to be selectively enabled or disabled). Using both trusting and access codes may achieve two significant benefits of "privately public" interaction: the public use of an interaction address without fear of unstoppable unwanted interaction requests and without disclosure of private addresses. For example, if unwanted interaction requests are received from a trusted sender, that sender may be un-trusted and/or blacklisted, preventing further interaction. The interaction server may reject and/or bounce interaction requests from blacklisted senders before the entire interaction request has been downloaded by the interaction server to save bandwidth.
- the access code may be revoked without affecting future interactions with trusted senders, and without having to change the public address.
- a trusted sender may be required to use a valid access code for the interaction request to be received by the user.
- Users may designate certain other users and/or non-users as trusted senders and automatically allow some or all communications and/or interaction requests from those users.
- Other users, email addresses, phone numbers, mailing address, IM addresses, and the like and/or entities or accounts owning one or more of these addresses may be designated as trusted senders.
- Messages from new senders and/or new addresses may be flagged, grouped, identified, marked, and/or the like until a trust level has been established by the user.
- Senders may be designated as trusted before or after they have sent interaction requests to a user.
- Interaction and/or communication addresses may be designated as trusted before or after the user has received interaction requests and/or communications from them.
- Senders and/or addresses may be designated as trusted individually or in groups, from a list, directory, file, folder, database, and/or the like. Entire domains, sub- domains, zones, area codes, zip codes, ranges, and the like may be trusted or un- trusted (e.g., blacklisted). Users may establish rules and/or execute steps by which senders are trusted, such as automatically trusting every recipient to whom the user has previously sent a message.
- Communications and/or interaction requests from trusted senders may be allowed even if no access code is included or an incorrect access code is included with an interaction request, and/or if access code functionality is disabled altogether.
- Trusted senders may be authenticated via a login process, a digital signature, ensuring an IP and/or email address is not spoofed, Sender Policy Framework (SPF) records, third-party validation, and/or the like.
- Interaction rules may be specified for each trusted sender and/or default interaction rules may be used for a plurality of trusted senders.
- the interaction rules for trusted senders may include different levels of trust for different activities, such as the methods of interaction allowed, how to handle urgent and emergency messages, whether escalation of such messages is allowed, duration as a trusted sender, when each method of interaction is permitted (e.g., time of day, day of week, etc.), whether the trusted sender may view personal contact information or other data of the user, if or how the trusted sender is included in a directory of contacts, how replies to the sender are formatted and/or handled, and the like. It may also be possible for a user to blacklist other users, non-users, and/or interaction addresses of any type so all communications and/or interactions are blocked, and previously granted permissions are revoked.
- a blacklisted user may remain blocked even if the user attempts to interact using a new private address and/or a valid access code. Users may be permitted to change the interaction rules for trusted senders at will, including revoking trusted sender status or modifying the level of trust and/or permissions.
- the interaction rules may allow third parties who are trusted by a first user's trusted senders ("trusted senders of my trusted senders") to be automatically trusted, trusted on a case-by-case basis, trusted only for certain types of interactions, etc. If this rule is disabled, the mutual acquaintance may be requested to make an introduction. Users may be able to send requests for trust to other users without a valid access code, but users may be permitted only a limited number of trust denials before the ability to send requests for trusted status is revoked. The trusting of senders may be crowd-sourced based on the trusting decisions made by other users. Trusting statistics of decisions by other users may be shared with the user when the user is deciding whether to trust the sender, and/or the user may establish rules for automatically trusting or not trusting senders based on the trusting decisions of other users.
- Different mailboxes, folders, labels, tags, flags, groupings, or the like may be used to identify messages from trusted senders versus non-trusted senders, among different trusted senders, and/or the like. For example, a verified or trusted inbox may hold messages from trusted senders whereas another inbox may hold messages from non-trusted senders. Alternatively, or in addition, messages may be sorted, displayed, tagged, grouped, etc. based on the trust level of the sender and/or the use of an access code. Once a non-trusted sender is designated as trusted, the sort, display, tags, etc. of the messages sent by that sender may change.
- trusted callers may be allowed to ring through to the user, whereas a non-trusted caller may be automatically routed to a voice mail or other messaging system or prompted to identify themselves and/or provide an access code, and/or the incoming call attempt may cause an alert to be sent to the user.
- a provisional and/or temporary account may be created that enables the trusting process, with or without any action on the part of the user receiving the request or the non-user.
- users may use the trusting, communication consolidation, acknowledgement delivery, and other features of the interaction server to interact with non-users.
- Some features and capabilities that users enjoy may be used and/or made available to non-users when the non-users interact with users, such as prompting the non-user for confirmation of receipt by including a link or a button on an email message, notifying the non-user when their message has been received and/or acknowledged, escalating between a non-user's known interaction addresses and/or devices until that confirmation has been received, and the like.
- Non-users with provisional accounts may mark messages with hash tags and/or other characters to leverage features of the interaction server (e.g., #task for a task assignment (discussed below), #urgent for an urgent message (discussed below), or the like).
- Non-users with provisional accounts may convert their provisional account to a permanent account and may be provided with a means to merge multiple provisional accounts into a single regular account.
- the first person Prior to the present disclosure, for a first person to interact electronically with a second person, the first person needed to select a known interaction address of the second person (such as a phone number, Skype (or similar service) username, email address, SMS number, IM name, and the like) and attempt interaction. If the interaction attempt is unsuccessful, the first person then needed to attempt another address (if it is known).
- a known interaction address of the second person such as a phone number, Skype (or similar service) username, email address, SMS number, IM name, and the like
- the interaction attempt is unsuccessful, the first person then needed to attempt another address (if it is known).
- the interaction server to interact via almost any interaction type, whether voice or text
- the first person may need only possess a single public address for the user (if the user has enabled access codes and/or trusting, a valid access code or prior acceptance as a trusted sender may also be required).
- the first person may not need to possess any phone numbers, email or other addresses of the user with whom they are attempting to interact, and
- a first person may select the public address of the user, the desired interaction type (such as voice or written), and a level of urgency. When urgency is not indicated on an interaction, it may default to normal or low. Interactions from the first person may be processed according to interaction rules for the corresponding urgency established in the interaction server for the user. For example, the first person may indicate that a written message is of normal urgency, and the user's rules may specify email as the preferred delivery medium for normal- urgency text/written messages. Messages from the first person indicated to be of a higher urgency may trigger the high-urgency delivery rules for the user, such as repeated SMS messages, simultaneous or sequential dialing of multiple phone numbers, and the like.
- Users may grant other users, non-users, and/or zones (defined below) rights to send to the user emergency or other urgent messages. Users may establish certain access codes as urgent or emergency access codes. The access code, sender, zone, and/or another field in the interaction request may indicate that the message is an urgent message, and/or the message may include an urgency indicator indicating a specific level of urgency (e.g., low, normal, urgent, and emergency). [0040] When a user receives a message with an urgency indicator, the interaction server may escalate the urgent message by sending it repeatedly, via multiple interaction methods (e.g., voice, text, etc.), to multiple addresses and/or devices sequentially or simultaneously, at predetermined intervals, and/or the like.
- multiple interaction methods e.g., voice, text, etc.
- the interaction server may continue escalation until the message is acknowledged.
- the urgent message may be sent sequentially via multiple interaction methods, with a predetermined interval between transmissions by each interaction method, and/or the urgent message may be sent via selected interaction methods simultaneously with a predetermined interval between each set of simultaneous transmissions, or the like. If a user views their message center and/or inbox, the message may be flashing red or the like to indicate that it is currently being escalated.
- the interaction server may be configured to change the volume on a device (e.g., changing a smartphone volume from silent to maximum volume), cause it to vibrate, flash lights, and the like, in an attempt to alert a user.
- the urgent message may also be escalated to a user's spouse, family, friends, co-workers, etc.
- the user may be enabled to snooze the urgent message, and the escalation may be delayed for a predetermined and/or user indicated snooze interval.
- the user may send a confirmation or acknowledgement message to the interaction server to end escalation.
- the interaction server may provide a confirmation or acknowledgement, or report of a lack thereof, to the sender of the message.
- the interaction server may use GPS or other location-aware technologies to aid in reaching the intended user.
- the interaction server may escalate urgent messages to other users in the physical vicinity of the user. For example, if a user being notified is unaware of the notification because their mobile phone ringer is off or their battery has died, other users in the vicinity could be alerted to look for the intended user and convey the message.
- Location data may also be used to dynamically change the escalation order. For example, when a user is at the office, the office phone numbers and IM accounts may be alerted first; when a user is at home, the escalation order may be dynamically changed so that the home number and personal IM accounts may be alerted first.
- the user may be able to define escalation rules and settings that determine which interaction methods are used, the order in which those interaction methods are used, the intervals between attempts for emergency messages, and the like.
- the user may select escalation settings for each sender, zone, and/or access code, and/or the user may use default settings for multiple senders, zones, access codes, and the like. If the sender is abusing emergency rights, the second user may revoke or modify the emergency rights. All messages from the sender may then be treated as non-urgent messages. Alternatively, the user may permit escalation only at certain times of day, days of week, weeks of the year, etc.
- a sender is regarded by the receiver as very important (a VIP), such as the receiver's child or the receiver's work supervisor, certain or all types of interactions may be automatically escalated, irrespective of the urgency indicator included with the interaction request, or the urgency level specified may be automatically upgraded to the next higher urgency level, or the like.
- VIP very important
- the interaction server may allow relationships between users including parent-child, employer-employee, peer-to-peer and the like.
- a parent account may be able to control interaction rules for and access to a child account.
- the parent may be able to designate trusted senders, issue and revoke access codes, establish or modify interaction rules, control use of and access to other account features, and the like.
- the parent may choose to have all interaction requests or all unverified interaction requests addressed to the child to be held, invisible to the child.
- the parent may then approve interaction requests and allow them to be sent to the child.
- the parent may choose to allow interaction requests from certain trusted senders and/or comprising certain access codes to be sent to the child without requiring approval.
- parents may provide a safe, controlled way for children to enjoy the benefits of electronic interaction.
- Zones may allow zone owners or administrators to control the look and feel of their members' interactions and monitor content.
- An organization may register a zone with the interaction server. The organization may then invite or permit certain users to associate with the zone and may generate unique addresses for those users that may be used in conjunction with the zone.
- a unique address used in conjunction with a zone e.g., "Sam.Jones ⁇ company1 ⁇ ", with the zone contained inside the braces) may function like and be interchangeable with the public address described previously; interaction requests may be restricted, trusted senders identified, and the like.
- a user Sam Jones may use "Sam.Jones ⁇ company1 ⁇ ” and "1234" when giving out his zone-provided public address along with a valid access code.
- the access code may no longer be necessary and "Sam.Jones ⁇ company1 ⁇ " may be sufficient for trusted senders to successfully interact with Sam.
- Unique addresses with zones may be part of a new user account or associated with a user's existing account. Unique addresses with zones may be associated with an existing account only when permission is granted by the account owner. When a user disassociates from an organization, that user may be removed from the associated zone. A user may be associated with a plurality of zones. For example, while user Sam Jones may use “SamJones123" as his personal public address, he may also associate it with "Sam.Jones ⁇ company1 ⁇ " and "CoachJones ⁇ soccerteam1 ⁇ .”
- An email message may be addressed to "Sam.Jones ⁇ company1 ⁇ @example.com," for example, with the zone contained inside the braces.
- An email addressed with a zone and an access code might look like Sam.Jones ⁇ company1 ⁇ 1234@example.com. If an organization's email communications are forwarded to the interaction server for processing, email messages from trusted senders may be sent to sam.jones@company1 .com, for example, without requiring the zone in braces, resulting in "privately public" interactions being transparently provided to an organization's interactions within an email format.
- a user may be allowed by the zone administrator to control certain aspects of his zone-related interactions but not others. For example, the user may be allowed to control some or all rules for receiving interactions or identifying trusted senders, but not allowed to modify other rules or settings such as the look and feel of interactions, editing certain contacts in the zone directory, etc. Users may access the zone through signing in to their own personal account with which the zone is associated, or through a separate sign in process established by the zone. Even though a zone may be associated with a personal account and the user may access the zone through that personal account, the zone administrator may have no access to the user's personal account.
- the interaction server may segregate interactions according to each zone and by non-zone interactions.
- a user may specify alternate interaction rules for each zone, such as only allowing a work phone and work email to receive calls and messages addressed to a zone associated with work, and/or the user may apply default interaction rules to both zone and non-zone interactions.
- Contacts may also be segregated by zone. Thus, an interaction request sent to a contact associated with a zone may be automatically branded with a predetermined signature, look/feel, return address, etc. For contacts associated with multiple zones, the user may select which zone and/or branding to apply.
- the interaction server may also determine zone-associated phone usage and non-zone associated phone usage, so the organization and user may precisely account for usage, costs, etc.
- a zone administrator and/or one or more users with ownership privileges may be able to specify zone settings and/or view and control all interactions and data associated with the zone.
- the zone administrator and/or privileged users may be able to add associated users to groups and/or sub-groups within the zone; interact with the associated users including sending interaction requests based on group, sub-group, physical location, department, and the like; remove users from the zone; make global changes affecting all associated users; designate and remove trusted senders; manage access codes; force associated users to subscribe to channels, remove them from subscribing to channels, and/or approve the subscription to channels; share directories among associated users, groups, sub-groups, etc.; record all interaction requests sent via any method of interaction, such as for compliance purposes; allow and disallow features within the zone, such as subscribing to channels or storing files; create a standardized web and/or social media page for each associated user; assign and monitor tasks and projects; submit requests; and the like.
- a zone may be used for intra-zone interaction and collaboration with features and capabilities such as: uninhibited interaction between some or all zone members; shared contacts and directories; file sharing and data repositories; application sharing and collaboration; virtual bulletin board; shared calendaring; and the like.
- Email, SMS messages, and hand-written letters are typically composed without any particular original structure.
- Users may compose new interaction requests as unstructured or create or use a different structure, such as requests, assignments, invitations, notifications, forms, multiple choice, fill-in-the-blank, and the like using formats, templates and/or tools.
- Recipients of interaction requests may respond according to the structure received, such as yes or no, a grant or denial of approval with or without added conditions, multiple choice, fill-in-the-blank, filling out a form, responding with an unstructured message, and the like. If multiple responses are requested of a user, a plurality of interaction requests and/or messages may be delivered with each requiring separate responses. Received interaction requests may be sorted based on whether a response is requested or no response is requested.
- Interaction requests formed as assignments, tasks or the like may integrate with a task or project management system. Recipients may accept, reject, or otherwise respond to assignments or task requests. Requesters may view responses and track progress on tasks and/or projects. Tasks and/or projects may involve multiple parties, such as requesters, actors, sponsors, those to be informed, helpers, and the like. Authorized and/or invited parties may be notified or allowed to interact with the task and/or project data and/or other parties. Communications, notifications, other workflows, and other actions may be triggered upon the occurrence of certain events or thresholds, such as task completion, new comments, answers to queries, attachments or other data, approaching or passed deadlines, external data, and the like. Tasks, projects, conversations, actions, etc. may be stored within the interaction server, and/or local copies may be provided for offline access and other purposes, which copies can later be synchronized when online access is restored.
- the interaction server may facilitate simple or complex workflows. Users may use built-in, custom or external tools, templates, and the like to build electronic forms and processes for a workflow.
- a workflow process may include a series of steps to be executed by the interaction server. For each step, certain conditions may need to be satisfied before the step is executed. For example, an accounting department may create an expense reimbursement form and embedded workflow process within the interaction server.
- a first user may complete the form, which may trigger an alert to a manager for approval. The manager's approval may trigger an alert to the accounting department to reimburse the first user.
- a payment notification may be sent to the first user, who may then accept the payment. All parties may retain access to a permanent record of all aspects of the workflow transaction, including requests, responses, dates, names, approvals, denials, comments, attachments, notifications and the like.
- the interaction server may be configured to facilitate interaction on a one- to-many or many-to-many basis, such as when customers interact with a customer service department, for example.
- a plurality of individuals may be granted certain rights to receive and act upon interaction requests received by one or more user accounts, such as representatives within a customer service department, for example.
- Interaction requests may be automatically and/or manually separated by priority, urgency, VIP sender, and the like.
- Interaction requests may be automatically or manually assigned to one or more authorized individuals. Once assigned, an interaction request may be unavailable to other individuals, moved into a queue, marked with a certain status, and/or otherwise categorized or segmented from other interaction requests.
- Interaction requests may be transferred and/or escalated in several ways, such as moved up in priority, sent and/or assigned to different individuals or departments, different services, etc. Escalation may occur for different reasons, including a delay in response time, an urgency indicator, a VIP sender, and the like.
- An interaction between two parties may be begin in one form, such as text, and move or change to another form, such as when the parties may wish to initiate a phone call, video conference, or the like.
- the medium of interaction for an interaction request need not be the same for each party interacting.
- the sender may wish to type or talk, while the receiver elects to display video to the sender, or vice versa.
- the sender or the receiver may wish to keep private their personal contact information, real identity, or other information.
- the sender or receiver may require certain information to be revealed or shared as a condition of interaction.
- the interaction server may be used to transfer files, share screens, engage in real-time instant messaging and/or collaborate in other ways. Access to a permanent record of each interaction may be retained for each party.
- a mass notification system may be configured to send communications to addresses contained in a database of contact information.
- the mass notification system may be used primarily for urgent and/or emergency notification but may also sometimes be used for non-urgent communications.
- the mass notification system may have several significant limitations.
- the mass notification system may require a database of contact information to be gathered and maintained in order to "push" the notification to the group; but intended recipients are increasingly reluctant to provide personal contact information out of privacy fears, complacency, and/or the inconvenience of having to manage the same information in multiple disparate systems, such as one for a city, a different one for a school, etc. Further, maintaining the accuracy of contact information may quickly become be a never-ending uphill battle as group members move, disconnect or change numbers, change email addresses, leave the group, etc.
- the mass notification system may be convenient to populate the database of contact information with land-line phone numbers obtained from telecommunications carriers; land-lines are increasingly being deactivated in favor of voice over IP (VoIP) and mobile phones, which may leave large gaps of missing phone numbers for residents that might require notification.
- VoIP voice over IP
- the mass notification system may also be expensive, which may prevent use by smaller groups such as small schools, small cities, small organizations; teams and clubs; families; and the like.
- a social media tool may allow free communication a plurality of users.
- the social media tool may lack the database gathering and maintenance headaches of the mass notification system, but the social media tool may not provide escalation, acknowledgement (confirmation of receipt), dynamic segmentation and other features used by the mass notification system, and which are necessary for effective urgent or emergency notification.
- Users may establish one or more "channels" that facilitate interaction among groups, including mass notification. Users may subscribe to a channel and receive broadcasted messages without revealing any private addresses, personal contact information, their real name, etc. Users allowed to broadcast on a channel may thereby be enabled to interact with an unlimited audience without knowing any of the subscribers' private addresses, personal contact information, phone numbers, email address, real names, etc. Interaction data sent or posted to the channel may be forwarded or "broadcasted" to one or more subscribers of that channel in a plurality of ways, including via an application, email, SMS, IM, phone calls, postal mail, and the like.
- Broadcasted messages may be in a plurality of formats, including recorded voice, live voice, text, video, announcements, requests, questions, prompts, and the like. Subscribers may automatically allow channel interactions to be received without an access code. The subscribers may be able to select how they receive channel messages, and may respond to messages using the same or a different method. Channel administrators and/or subscribers may be able to send interaction requests to other subscribers of a channel individually, to access information about other subscribers, and the like.
- Channels may be hosted by the interaction server and/or channels may be hosted by a separate server and/or entity. Users having accounts with the interaction server may subscribe to channels hosted by the interaction server and/or to channels hosted remotely.
- the interaction server may include an API that allows a remote channel hosted by a separate server to broadcast messages to users who have accounts with the interaction server and who have subscribed to the remote channel.
- the interaction server may authenticate the separate server using the API and route received messages to the user's message center. When the user subscribes to a channel, the user's private data and/or a trusted list for the user may be updated to reflect the subscription.
- the interaction server may reject interaction requests from a channel to which the user is not subscribed and/or may notify the channel that the user is not subscribed, such as by sending a bounce message.
- a channel may request or require access to certain private addresses or other data when a user seeks to subscribe to the channel (e.g., requesting access to a postal address when attempting to subscribe to a wedding channel set up by a couple to be wed).
- the requested information may be made available to a channel administrator and/or other subscribers, such as by creating a directory from the requested information, and the user seeking to subscribe may be informed prior to subscribing of who will have access.
- Admission rules may determine what information is requested or required and any other criteria for admission, such as location, family relation, team affiliation, age limit, parental permission, a limitation on the number of subscribers, answering a security question, possessing a password, and/or the like.
- a channel may be configured to automatically approve all subscribers satisfying the admission rules and/or to require the channel administrator's permission before approving subscribers. The channel administrator may also remove subscribers.
- Each subscriber may set their own interaction rules, which may be similar to the interaction rules for receiving non-channel interaction requests.
- the interaction rules may include which devices should receive the messages, whether the channel has emergency rights, how urgent messages should be handled including the frequency and order in which additional devices or users should receive the message, blackout periods in which messages may be blocked or held until the end of the blackout period, and the like.
- a subscriber may set custom rules for a channel or use default rules.
- the interaction server may request acknowledgement of receipt of the message and/or attempt to confirm delivery was achieved.
- the interaction rules may determine how unacknowledged messages should be handled. For example, some users may not permit a message to be escalated even if it is never acknowledged. Users may stop subscribing to a channel or change their rules at will.
- Some channels may allow users to subscribe to the channel with just an email address, SMS number, phone number, and/or the like, without explicitly creating an account with the interaction server.
- a channel administrator may add and/or invite subscribers to a channel individually or from lists or directories or the like.
- An application may provide access to an electronic directory or other applications to facilitate the process of inviting subscribers. Users may be notified that they have been invited to subscribe to a channel. Non-users may also be invited to subscribe to a channel by sending the non-user a button or link in an email message, for example, or by providing the channel name to the non-user and inviting them to search for it online or through an application.
- a provisional and/or temporary account may be created that enables non-users to subscribe to channels, with or without any action on the part of the non-user.
- all subscribers may receive broadcasts whether through their account, email address, SMS, phone, and/or the like.
- Provisional subscribers may respond to broadcasts, be counted as part of reporting statistics for the channel, etc.
- Provisional subscribers may convert their provisional account to a permanent account, and may be provided with a means to merge multiple provisional accounts into a single permanent account.
- Users may be automatically subscribed to certain channels, such as a local Amber Alert channel, or when the user enters a predetermined area, for example.
- Users may be able to stop subscribing to channels in which they are no longer interested or channels to which they were automatically subscribed, or prevent some or all future automatic subscriptions. Users may be able to create multiple channels. Each channel may have a web page and/or web presence that may be made available to subscribers and/or the public, through which visitors may learn about the channel, subscribe to the channel, receive broadcasts, respond to broadcasts, see past broadcasts, see statistics or other information related to the channel, download related files, see related video or hear related audio, etc. Channels may be found by direct link, search, browsing, and the like.
- Broadcasts may be initiated by authorized users and others in a plurality of ways, such as through an application or API, from a text message, email, or phone call, or through any other form of interaction.
- Channels may have a designated email or other address, where any message received at that address is automatically broadcast on the channel. Subscribers may be permitted to respond to broadcasts, wherein their response may or may not be broadcast on the channel.
- Some channels may permit important, urgent, and/or emergency messages to be broadcasted to subscribers. Messages indicated as urgent may trigger the subscriber's rules for delivery of urgent messages, which may be enabled/disabled and/or customized for each channel subscribed to. For example, urgent messages may be escalated until an acknowledgement or confirmation is received.
- urgent channel messages may be escalated in several ways, such as attempting multiple devices, repeatedly attempting the same devices, using multiple mediums, making sequential or simultaneous attempts, alerting other users within the vicinity, alerting multiple recipients until acknowledged, etc. Subscribers may also snooze messages to delay escalation.
- the subscriber may send a confirmation or acknowledgement message to the interaction server to end escalation.
- the interaction server may provide a confirmation or acknowledgement, or indicate a lack thereof, to the sender of the broadcast, the administrator(s) of the channel, etc.
- Some channels may allow all subscribers to broadcast messages to some or all other subscribers, and other channels may allow only certain subscribers and/or a channel administrator to broadcast messages on the channel. Some or all subscribers may be able to escalate messages back to the channel administrator and/or other channel subscribers.
- Messages received by a channel from subscribers may be allocated and/or assigned for handling as described above.
- Channels may be permanent, such as for clubs, families, associations, companies, departments, schools, municipalities, and the like, or channels may be temporary, such as for teams, classes, weddings, and the like.
- Channels may be used to initiate audio or video conference calls, including dialing out to subscribers or allowing them to dial in.
- Channels may also be used as chat rooms or to instantly query and receive responses from large groups of people, such as to receive votes or answers on a live television show or at a stadium.
- Channels may support question and answer formats such as yes or no, multiple choice, fill in the blank, open-ended, and the like, and may provide real-time statistics to the channel administrator and/or broadcaster.
- Channels may facilitate two-way interaction between a broadcaster and recipients via multiple methods of interaction, including text, voice, video, and the like, which may be useful for small groups such as families, teams, clubs, classes, and the like.
- Channel interactions may be recorded or monitored. Some channels may require a paid subscription, and the subscription status may be confirmed before a message is transmitted to a subscriber.
- Channels may be used for broadcasting newsfeeds, newsletters, blogs, podcasts, and the like.
- Broadcasted messages may include attachments, which may be opened by subscribers.
- Subscribers may have readers and/or multimedia players with which they receive and interact with messages sent by the channel.
- Subscribers may be able to retrieve data from the channel, such as private channel data, private data from other subscribers, private data from a channel administrator, and/or the like.
- the purpose of a channel may be to allow subscribers to access private data.
- Channels may be used to create directories of subscribers.
- any subscriber to a directory channel may be able to interact with any other subscriber.
- the directory channel may be set up by a school, such as for students; a city; a state; a country; and/or the like.
- the directory channel may place restrictions on the types of interaction allowed, such as only permitting non-urgent, written messages, and/or may require subscribers to reveal predetermined contact information and/or to allow certain types of interactions from other subscribers.
- the directory channel may specify the number of trust denials permitted before a subscriber can no longer interact with other subscribers, specify parameters for crowd-sourcing of trusting, and/or the like to protect subscribers from unwanted communications.
- a subscriber may also specify rules for how other subscribers to the directory channel may interact with the subscriber including types of interaction permitted; limits on the geographic area of subscribers from which interactions are permitted; filtering all interactions from the directory channel to a particular folder, label, and/or mailbox; and/or the like.
- the subscriber's rules for the directory channel may blacklist and/or whitelist particular users, groups of users, categories of users, such as merchant that fit the subscriber's profile/interests, geographies of users, etc.
- the subscriber may unsubscribe from the directory channel and/or may block all interactions from subscribers to the directory channel.
- the subscriber may choose to have a trust status for an individual user override rules for a group of users comprising the individual user, and/or the subscriber may choose to be prompted if a conflict arises.
- Channels may also allow subscribers to interact with shared data.
- a pot-luck-style channel may include a list of items that subscribers may take or sign up for on a first-come, first-serve basis (e.g., a list of dinner items for a pot-luck dinner).
- Channels may have calendaring capabilities, including integrated calendars and/or linked calendars from other channels or calendaring systems.
- Broadcasted messages may have calendaring elements, including the ability for subscribers to auto-insert events into calendaring systems. Notifications may be triggered automatically when administrators add new events. The administrator may trigger a broadcast by tapping on or editing a calendar event.
- Linked channel events may have scheduled reminders, which may be escalated, snoozed, dismissed, acknowledged, and the like.
- Channels may also allow for dynamic segmentation of subscribers to enable broadcasting a message to only a subset of subscribers. For example, when sending a message, a broadcaster may select criteria and the message may be automatically sent only to the subscribers satisfying the criteria.
- the criteria may include private information that is known to the interaction server but not the broadcaster. For example, the criteria may specify that a message is intended only for recipients over the age of 50, even though the channel administrator has no way to determine which subscribers fit that criterion.
- Criteria may include location (e.g., an evacuation order to people currently located in a certain area or with a registered address in a certain area), zone including group and/or sub-group, age, gender, new/recent subscribers (e.g., users that began subscribing to the channel within a specified time limit), subscribers with a particular profile or product interest, and the like.
- the broadcaster may not need to pre-segregate the subscribers into groups before specifying the criteria. In the event that the broadcaster sends a message based on conditions for which some subscribers have not specified relevant data, those subscribers may be notified that they may have missed channel messages because information was missing from their profile or preferences. Once the appropriate information is entered, then the original communication may pass through to the subscriber.
- Channels may provide mail merge-type functionality to broadcasters.
- a broadcaster may be able to merge data from a database, list, or the like into a message. For example, a broadcaster may type "Dear ⁇ $NAME ⁇ ," to reference a name field and populate each message with the name of the intended recipient.
- the data may include private data of the subscribers stored on the interaction server.
- the broadcaster may merge data to which she does not have access, and she may not be permitted to see the messages produced by the merge process.
- the broadcaster may need rights to the private data to merge it into a message, and the broadcaster may be prompted to determine if she wants to request the data from subscribers that do not allow her access.
- More sensitive information may be prohibited by the interaction server and/or the subscribers from being merged and/or may require a subscriber permission before being merged, while less sensitive information (e.g., first name) may be merged and/or may not require permission.
- An application used to compose the message may display a list of available fields, and/or indicate fields for which merging is prohibited or permission is required.
- Automatic messages may be sent by channels and/or to individual users. For example, automatic messages may be sent at predetermined times as a reminder or alert for a scheduled event (e.g., a birthday or anniversary, a reminder to vote, a reminder to change an air filter, etc.), or automatic messages may be sent when a predetermined condition occurs (e.g., a server crashes, a stock hits a certain price, a pedophile moves nearby, a desired item becomes available for sale on a website, a temperature that is being monitored reaches a certain threshold, a message is received from a predetermined user, any type of alarm or alert is triggered, or the like).
- a predetermined condition e.g., a server crashes, a stock hits a certain price, a pedophile moves nearby, a desired item becomes available for sale on a website, a temperature that is being monitored reaches a certain threshold, a message is received from a predetermined user, any type of alarm or alert is triggered, or the like).
- the interaction server may receive, retrieve, and/or compute data, which it uses to determine if the predetermined condition has occurred.
- the condition data may be retrieved from email, calendar, data providers/servers, file servers, databases, websites, web services, APIs, the message center, other channels, and the like.
- an aggregator promo channel may forward promotions from the channels of individual retailers.
- Automatic channel messages may also be combined with dynamic segmentation to send smart messages to subscribers matching certain criteria.
- an automotive services chain may automatically send messages to users within a radius of a service center letting them know that an oil change is required. The date of the most recent oil change may be saved by the interaction server and/or the automotive services chain to determine which users are in need of an oil change.
- Automated mechanisms may be used for broadcasting communications on channels.
- Automated servers may interact directly with the interaction server utilizing web services or API's or the like, eliminating the need for direct human interaction in sending messages.
- the interaction server may use location data in processing channel messages and/or one-to-one interaction requests.
- the interaction server may receive location data from users, such as location data determined from a Global Positioning System (GPS) receiver on a client device.
- GPS Global Positioning System
- An interaction request may indicate that delivery of the message should be delayed until the intended recipient enters a predetermined area, such as coming within a predetermined distance of the delivery location.
- Channel messages may be filtered by location and/or automatically delivered upon entering a predetermined area (e.g., an emergency evacuation order, an advertisement from a local business, or the like).
- a chain store may be opening a new location. Customers may subscribe to the chain store on a channel, but they may desire not to give their addresses to the chain store.
- the interaction server may allow the chain store to send a message advertising the new store to all subscribers with addresses near the new store and/or whose GPS location comes within a certain proximity of the store within a predetermined time period.
- the interaction server may use user-defined rules or other criteria to select which client devices should receive interaction requests based on received location data.
- the subscriber's location and/or direction and/or speed of travel may be taken into consideration when determining when to send the message. For example, a local coffee shop may wish to broadcast a promotion on a new product when subscribers are approaching and will arrive at approximately 60 seconds.
- a user may be requested to sign in to the interaction server when they enter the range of or connect to a WiFi network (e.g., a WiFi network at a coffee shop or hotel). Then, even if the user has disabled location-aware capabilities, such as GPS, the user may be notified of emergencies at their location, and/or the user's interaction rules may allow for intelligent interaction request routing based on the location.
- a provisional and/or temporary account may be created for persons not having an account.
- Users' private addresses may include one or more postal addresses. Users may wish to receive postal mail without divulging an address and/or a broadcaster may wish to send postal mail without having to gather or maintain a database of addresses.
- a sender may transmit an electronic message to the interaction server intended as postal mail for one or more recipients without the sender possessing the postal address of the recipient(s).
- the interaction server may determine postal addresses for the intended recipient(s). If the interaction request specifies a zone for the recipient(s) and/or sender, the interaction server may determine the appropriate "to" and/or "from” address and other branding, labeling, etc. to use to send the item (e.g., choosing a work address or a home address).
- the interaction server may comprise one or more apparatuses configured to print the message, print correctly addressed envelopes with proper postage, and stuff the envelopes for mailing.
- the interaction server may allow the sender to select first class postage, priority postage, overnight postage, or the like.
- the one or more apparatuses may also be configured to label and/or stuff envelopes and/or boxes for physical goods that are received by the blind mailing service.
- the interaction server may send blind mail without using an apparatus by transmitting or otherwise providing access to all necessary information to a third party for fulfillment.
- the item may be addressed to the user's public address and sent to a central processing location.
- a bar code, QR code, and/or the like may be used to facilitate routing.
- the interaction server may be queried for the postal address of the intended recipient and the item may be mailed or shipped to its final destination.
- "blind" mailing of physical items may be achieved, whereby the sender need not know the recipient's actual postal address, and the receiver need not divulge it.
- a mailing or shipping provider such as the US Postal Service, may be provided with tools and/or access to the interaction server to authenticate senders and retrieve address information for receivers.
- the shipping provider may provide seamless blind mailing service, negating the need for items to be mailed or shipped twice (first to a central processing location and then to the final destination).
- a channel administrator and/or message broadcaster may be able to view or receive channel-related data through a search, a dashboard, summary reports, real-time reports, a ticker or banner, alerts, notifications, and the like.
- the channel- related data may include real time statistics, historical statistics, the percentage of users acknowledging receipt of the message, the number of subscribers, new subscribers, past subscribers, past notifications, responses, attachments, and the like.
- the channel-related data may also include statistics fitting pre-defined or custom criteria, such as subscribers over a certain age, of a certain sex, married, living within a specified area, with a specific product interest, answering a question in a certain manner, and the like.
- the interaction rules for each user may specify how much of that user's information may be revealed in the channel-related data.
- the interaction server may allow shoppers to interact directly and anonymously with sellers without visiting the seller's website, driving anywhere, divulging contact information, and/or needing to know the seller's phone number or web address. Further, the seller may pay for the service only when directly interacting with a shopper. In addition, the interaction server may allow for securely entering into agreements and/or making payments.
- sellers may bid on bid words by indicating an amount they are willing to pay when a shopper initiates interaction.
- Sellers may also or instead create a list of bid words by uploading or providing real-time access to a product inventory and/or other data.
- the shopper may post what the shopper is shopping for to the interaction server.
- the shopper may request matches in certain locations, such as within a certain radius of the shopper's location.
- the interaction server may return a list of matching products by comparing the bid words to the post and/or by comparing the seller's location to the locations specified by the shopper.
- the highest bidding seller may be listed first.
- Shoppers may also be able to search and sort results based on ratings from third party websites.
- the shopper may click a listing to view additional information (e.g., seller information, product ratings by third parties, and/or the like), including pictures, videos, descriptions, advertising, helpful information, or the like, which may be available through the interaction server and/or through another site.
- additional information e.g., seller information, product ratings by third parties, and/or the like
- the shopper may anonymously initiate interaction with the seller via text, chat, voice, video, and/or the like.
- the seller may not be charged until interaction is initiated. If a shopper's post does not result in any matches, the interaction server may save the post until a seller bids for a matching bid word. The shopper may then be alerted to the match.
- a shopper may also choose to save a post. The saved post may enable additional results to accumulate and additional sellers to find the shopper.
- sellers may manually search for posts and advertise to those shoppers. Sellers may also be alerted when a shopper's posts match their bid word(s), but they may not be able to initiate interaction with the shopper.
- Interaction requests from shoppers may be answered by the seller and/or others, such as sales clerks.
- the shopper may specify a generic method of interaction, and the seller may select a specific method of interaction and/or device for interacting. For example, the shopper may specify a voice communication and the seller may choose to escalate the communication starting with the office phone, then a mobile phone, etc., until the communication is answered.
- the shopper and/or the seller may reveal their public addresses, their private addresses, both, or neither.
- the shopper may wish to always interact anonymously with sellers, while sellers may wish to always reveal as much as possible. For example, within a communication the shopper may be heard by the seller in a voice call or the seller may receive the shopper's written communication without the shopper revealing any private or public addresses, while the seller is both seen and heard by the shopper via video conference.
- the seller may not need a website or to reveal a phone number to interact with the shopper. Instead, the seller may have just a phone and/or a computer.
- An app on the phone or computer may be used for interaction in some embodiments. If the seller does have a website, the app may also allow the seller to interact with visitors to the website.
- the seller may show the store, themselves, product/model in which the shopper is interested, and/or the like, while the shopper may elect not to display video or otherwise identify themselves.
- the interaction server may manage payment (detailed below), such as a down payment or full payment, including escrowing the payment and maintaining a paper trail.
- the interaction server may also save a copy of any agreements between the seller and shopper. Shoppers and sellers may be able to submit ratings of each other to the interaction server once the transaction is complete.
- the interaction server may also be used to facilitate payments between and among users and non-users. Payers and/or payees may not be required to reveal payment and/or private information (such as a user's name, email address, phone number, credit card number, bank account number, etc.) to one another. Transactions may not require merchant capabilities, such as Point-of-Sale capabilities. As a result, users may quickly and easily make and/or receive payments, whether to or from other users or non-users, and untrustworthy users may be prevented from receiving unauthorized payments.
- a potential payee may send a payment request that specifies the amount of money requested, a desired payer, a desired payment type (e.g., credit, check, etc.), and/or the like to the interaction server.
- the payment request may be sent via an application, through email to a specific address, through an automated teller, via touch-tone phone, and the like.
- the payee may use a location-aware app that automatically suggests payers in the area with whom the transaction may be intended.
- the payer may receive notification of the payment request, decide whether to approve the transaction, and/or designate a payment source, amount, category, description, etc.
- a transaction may be initiated by a payer attempting to send payment to a payee.
- the payer may designate the amount, source, category, description, etc.; specify the desired payee (for example by selecting from a location-aware-generated list of nearby payees, such as the store the payer is standing in); and initiate payment.
- the payee may receive the payment attempt and may then apply it to an agreement, invoice, purchase order, etc.; deposit it to a particular account; forward it to another payee; reject the payment; and the like.
- the payee may include a generic indication of a desired or required payment source (e.g., the payee may prefer funds from a checking account or may prefer payment by credit cards).
- the payer may select a specific payment source when responding to a payment request.
- Personal payment and account information for various sources may be saved on the interaction server.
- Personal payment information may include credit card numbers, electronic check information (e.g., routing number and account number), access and/or addresses for online payment services, and the like.
- the interaction server may submit a request for the specified amount of money to a payment processing system associated with the payment source specified by the payer, such as the Automated Clearing House (ACH), a credit card processing system, and/or the like.
- ACH Automated Clearing House
- indications of account balances for accounts managed by the interaction server may be updated based on the transaction and may be supplied to the user(s).
- a receipt or other summary of interaction history may be saved to a storage device within the interaction server, on a separate storage medium, or the like and may be made available to one or more parties to the transaction and/or other desired parties.
- Parties to a transaction may select the level of user authentication required. For example, before releasing payment a payer may require that a payee re-login to their user account, answer one or more security questions, pass through biometric security, receive a form of third-party validation, and the like. Before the user is permitted to utilize payment and/or agreement functionalities, extended validation may be performed to confirm a user's identity and prevent identity theft. Extended validation may include vouching by a highly trusted user, a credit check, receipt of a notarized letter, or the like. Users may not be permitted to save their passwords and/or may need to select longer and/or more secure passwords than normal if they are using payment and/or agreement functionalities.
- a payment request may be sent as a telephone call, text message, email, notification via an application operable on a smartphone, tablet, personal computer (PC), or the like.
- An authorization response may be made by touching keys during the telephone call, sending a responsive text message or email, responding via a smartphone app, submitting a response using a website, voice recognition or other biometric authentication, or the like.
- a pin and/or password and/or other authentication information and/or process may be required to authorize the interaction.
- the payer may specify approved payees who are automatically approved and/or may individually approve or deny payment requests for payees that are not approved.
- a payer may pre-authorize a specific or maximum amount to be paid to a particular payee, for a particular period of time, or within a particular area. For example, to save time at checkout a payer may pre-authorize up to $50 to be charged by a store he or she may be shopping in, and that authorization may last for only an hour.
- a payer's ability to pay may be similarly limited by a parentally linked account or an associated zone.
- a child may be pre-authorized by a parent to spend only a maximum of $20 and only to a specified payee or category of payees, within a certain distance from home, from only a specified account, for a specified window of time, and the like.
- an employee may be pre-authorized through his or her associated zone to spend a certain amount of money entertaining clients, only to specified payees or categories of payees, only from specified accounts, within only a specified window of time, etc.
- a user may attempt to pay or request payment from a user or non-user.
- the non-user may receive an email or other message informing them of the request.
- the non-user may be invited to respond to and/or complete the transaction with or without creating a user account.
- the non-user may complete the transaction by making payment in any way, such as cash, check, credit or debit card, establishing a user account, authorizing the transaction with their financial institution through any number of means, and the like.
- the user may receive notification if the transaction was completed or rejected electronically, or the user may manually notate the transaction record as to how the transaction was completed.
- a permanent record of the transaction and all associated events may be stored within the interaction server, and copies, receipts, and/or other information may be made available to involved parties.
- the interaction server may optionally act as an escrow agent for the transaction.
- Payment settings specified by the payer and/or the response to the payment request may determine whether the interaction server acts as an intermediary.
- the payer may keep their payment information private and need only provide the public address. Also, the payer may keep their personal contact information private to allow for anonymous payments.
- the request for the specified amount of money sent to the payment processing system may designate the interaction server as the recipient of the funds.
- the interaction server may also initiate and/or approve a second transaction to transfer funds to the payee from a source affiliated with the interaction server.
- the payer may give payment information to the payee, and the interaction server may control transactions attempted with that payment information.
- a merchant may attempt to submit a charge on a credit card. The charge may be automatically denied by the payer's bank. The payer's bank may notify the payer via the interaction server of the attempted charge and/or denial. The payer may send a response approving the charge. Then, the merchant may attempt to submit the charge again, and the charge may process successfully. Alternatively, the merchant may attempt to submit the charge a first time, and the charge may not be approved or denied until a response is received from the payer. In an embodiment, the payer may pre-authorize the merchant for a specific or maximum dollar amount.
- the pre-authorization may have time, location, specified merchant, and/or other limits.
- charges requiring a PIN such as charges to a debit card, may be allowed without a response from the payer.
- the interaction server may save a copy of all payment requests, authorization responses, charge approvals, and the like to provide a paper trail.
- the interaction server may allow a user to use their smartphone, tablet, and/or other similar device as a Point-of-Sale device. A user may avoid waiting in merchant checkout lines by using an application running on their smartphone to scan the barcode, QR code, and/or the like of a desired item and add it to an electronic shopping cart and/or complete the purchase immediately.
- NFC Near- field-communications
- GPS GPS
- location-aware and wireless technologies may enable the user, carrying the smartphone or other device used in the transaction and possessing the proof of purchase, to exit a store without triggering theft detection devices and without the intervention of a store clerk, checkout line, etc.
- the interaction server may also be used in negotiating and executing agreements. Users may wish to agree to a contract of which a permanent record is kept, and/or one or more users may want approval of an action before that action is undertaken.
- a storage device may save agreements and/or indications of approval.
- a first user may send an agreement request to the interaction server including a written agreement or a description of an action for which approval is requested.
- the agreement request may be forwarded to the second user by the interaction server for authorization.
- the interaction server may save the agreement request and the time and date of each authorization to the storage device as a temporary or permanent record of the agreement.
- the interaction server may make the agreement and/or a receipt available to both users. The same process may work for more than two parties to an agreement, or where multiple approvals are necessary before an action is undertaken.
- Users may be able to make changes to an agreement prior to agreeing, and a time-stamped history of the changes may be saved on the storage device.
- Exemplary uses of agreements may include an auto mechanic seeking approval to do additional work on a vehicle, or two parties conducting a private sale of a used vehicle.
- credit providers and/or agencies may request authorization before opening a new credit account to prevent identity theft.
- the credit provider and/or a credit reporting agency may request authorization to open the account.
- the interaction server may make templates available to the parties for creating the agreements, such as a bill of sale template for sale of a vehicle, a letter of undertaking, an I owe you ("IOU"), or the like.
- a provisional account may be created automatically.
- the provisional account holder may be sent a link that allows them to manipulate the agreement and interact with the counter party without signing up for a full account.
- the agreement may be printed and signed once the parties have finished manipulation.
- Parties to an agreement may select the level of user authentication required prior to finalization and/or execution of the agreement. For example, one party may require that another party re-login to their user account, answer one or more security questions the interaction server, pass through a biometric form of security, receive a form of third-party validation, meet in person, review identification, and the like.
- the interaction server may also store personal and other data on a storage device, and the data may be available as a web presence.
- the data may be available over a public medium but access to the data may be restricted.
- An entity may submit an interaction request specifying data desired from a user.
- the user may allow certain trusted senders and/or access codes to access the data automatically.
- the user may also or instead require their authorization/approval before the data is shared.
- the interaction server may prompt the user to provide the information.
- the data may include shipping and/or billing addresses, personal health records, demographic information, personal contact information, advertising preferences, browsing preferences, authentication data, answers to questions, and/or the like.
- the user may also authorize an entity to append and/or add new data to the user's web presence.
- addresses and health records may be accessible to entities needing such information.
- a magazine or newspaper publisher may verify a subscriber's address before sending each new publication.
- a health provider may download patients' health records, query patients for new information, and/or append new information to the record.
- the user may select entities to receive automatic updates of the information.
- that update may be immediately available and/or accessible to newspaper and magazine publishers with which a subscription is held, banks with which an account is held, friends and family, and the like.
- the interaction server may manage directories of contacts or other information shared by the user with other users. Changes to shared private contact information may be immediately visible to other shared and/or trusted users, and/or the new changes may automatically propagate to the shared directories.
- the user For personal health records, the user may update a personal health record with new symptoms or the like, and the updated personal health records may be immediately available to a doctor.
- the doctor may also submit interaction requests to the user, such as medical questions, which are appended to the personal health records along with the answers to the questions.
- Some entities may be given access rights to modify private data and/or may be able to submit a request to update the private data.
- a hospital with access rights may update personal health records, and that update may be transmitted to other hospitals or health providers selected by the user.
- Users may maintain a profile within the interaction server that may be made available to advertisers.
- the profile may include advertising preferences, product interests, demographic information, location information, user-selected interests, browsing preferences, and the like.
- a browser, cookie, browser plug-in, or the like on a client device of the user may indicate the public address for the user and thereby allow a webpage and/or advertiser to request and/or obtain profile information from the interaction server.
- the information may be transferred as a highly compressed preferences map.
- the user may log into an account controlled by or with access to the interaction server when the user starts browsing, and the browser may transmit the public address during a request for a webpage or other service.
- Ads may also include one or more control buttons that allow the user to update preferences, turn off undesirable ads, and/or the like.
- a parent account may be able to control the advertising and browsing preferences for a child account to ensure only age-appropriate and/or parentally approved sites are visited.
- the profile infornnation may be also be shared with authorized merchants, websites, and other organizations according to the user's desires.
- the shared information may be general information applicable to multiple websites, and/or the information may be site-specific.
- the user may also allow direct interaction requests from the website/organization, set limitations for interactions, and/or block interactions at will. Users may allow organizations to ask and receive answers to new questions about their profile and/or interests, append new sections and/or information to their profile, and the like.
- the interaction server may store usernames and passwords for a plurality of websites, online accounts, and/or the like.
- a form-filler may automatically fill the username and password into a login form on that webpage.
- a website may implement an application programming interface (API) through which the interaction server may authenticate the user.
- API application programming interface
- the user may log into the interaction server, and the website may communicate with the interaction server to verify the identity of the user.
- the website and interaction server may communicate according to the OpenID standard, the OAuth standard, a proprietary standard, or the like.
- the website may direct the user to the interaction server to log in, and/or the user may log in first and be automatically authenticated when upon arrival at the website. Once authenticated, the user may utilize the website as they normally would.
- Authentication and access to profile information may work synergistically to benefit both users and websites.
- the "Runner's World” website may desire that a user create an account on their website to access desirable content and provide her profile, interests, and interaction preferences to help them market to her. While the user is an avid runner, she prefers not to create yet another online account. Instead, when visiting runnersworld.com she may log in with her interaction server account, which instantly authenticates and identifies her.
- the interaction server may also provide Runner's World with access to her profile and product preferences and a direct method to interact with her, which she can revoke at any time.
- the interaction server may also offer cloud and collaboration services and tools.
- the interaction server may offer calendars, word processing, spreadsheets, presentation capabilities, flow charting, and the like to users. Users may be able to share and edit calendars and documents, collaborate, schedule events, and the like.
- a storage device may store calendars, documents, pictures, notes, backup files, and other files.
- the interaction server may allow files too large for email to be stored for sharing and/or transferred among users.
- the interaction server may provide language translation capabilities for interaction requests, while messages are being composed, during transmission, after receipt, and the like.
- Interaction is broadly defined herein and may include communication, interacting with another person's information or files, interacting with shared files or workflows, interacting via any method described in this application, or the like.
- Interaction requests may include any initialization of an interaction, by any mechanism or medium, synchronous or asynchronous, with or without a message.
- the term "communication” as used herein may indicate voice communication, text communication, physical mail, an electronic request for interaction, a response to a request, an entire record of a conversation or interaction, recordings, attachments, notifications, broadcasts, responses, answers, selections, and the like.
- Messages may include written text, voice messages, video messages, any data necessary to fulfill an interaction request, or the like and may be structured or unstructured.
- the interaction server and/or clients may comprise a processor. Alternatively or in addition, the interaction server and/or clients may be implemented by a computer system. Embodiments may include various steps, which may be embodied in machine-executable instructions to be executed by a computer system.
- a computer system comprises one or more general-purpose or special-purpose computers (or other electronic devices). Alternatively, the computer system may comprise hardware components that include specific logic for performing the steps or comprise a combination of hardware, software, and/or firmware.
- a computer system may comprise a workstation, laptop computer, disconnectable mobile computer, server, mainframe, cluster, so-called “network computer” or “thin client,” tablet, smartphone, personal digital assistant or other hand-held computing device, "smart” consumer electronics device or appliance, or a combination thereof.
- a server may include a physical server, a server cluster, a distributed server, a virtual server, a cloud server, a computer providing resources to one or more clients, a combination of one or more of the aforementioned, and/or the like. Some or all of the functions, steps, and/or operations discussed herein may be performed by one or more clients rather than the interaction server. Those of skill in the art will realize possible divisions of operations between the interaction server and the one or more clients.
- Each computer system includes at least a processor and a memory; computer systems may also include various input devices and/or output devices.
- the processor may include one or more general-purpose central processing units (CPUs), graphic processing units (GPUs), or Digital Signal Processors (DSPs), such as Intel®, AMD®, Nvidia®, ATI®, Tl®, or other "off-the-shelf microprocessors.
- the processor may include a special-purpose processing device, such as ASIC, PAL, PLA, PLD, Field Programmable Gate Array (FPGA), or other customized or programmable device.
- the memory may include static RAM, dynamic RAM, flash memory, ROM, CD-ROM, disk, tape, or magnetic, optical, or other computer storage medium.
- the input device(s) may include a keyboard, mouse, touch screen, light pen, tablet, microphone, sensor, or other hardware with accompanying firmware and/or software.
- the output device(s) may include a monitor or other display, printer, speech or text synthesizer, switch, signal line, or other hardware with accompanying firmware and/or software.
- the computers may be capable of using a floppy drive, tape drive, optical drive, magneto-optical drive, memory card reader, or other means to read a storage medium.
- a suitable storage medium includes a magnetic, optical, or other computer- readable storage device having a specific physical configuration. Suitable storage devices include floppy disks, hard disks, tape, CD-ROMs, DVDs, PROMs, random access memory, flash memory, and other computer system storage devices.
- the physical configuration represents data and instructions which cause the computer system to operate in a specific and predefined manner as described herein.
- Embodiments may also be provided as a computer program product, including a non-transitory machine-readable storage medium having stored thereon instructions that may be used to program a computer (or other electronic device) to perform processes described herein.
- the non-transitory machine-readable storage medium may include, but is not limited to, hard drives, floppy diskettes, optical disks, CD-ROMs, DVD-ROMs, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, tapes, solid-state memory devices, or other types of media/machine-readable media suitable for storing electronic instructions.
- Suitable networks for configuration and/or use as described herein include one or more local area networks, wide area networks, metropolitan area networks, and/or "Internet” or IP networks, such as the World Wide Web, a private Internet, a secure Internet, a value-added network, a virtual private network, an extranet, an intranet, or even standalone machines which communicate with other machines by physical transport of media (a so-called “sneakernet”).
- a suitable network may be formed from parts or entireties of two or more other networks, including networks using disparate hardware and network communication technologies.
- One suitable network includes a server and several clients; other suitable networks may contain other combinations of servers, clients, and/or peer-to- peer nodes, and a given computer may function both as a client and as a server.
- Each network includes at least two computer systems, such as the server and/or clients.
- the network may include communications or networking software, such as the software available from Novell, Microsoft, Artisoft, and other vendors, and may operate using TCP/IP, SPX, IPX, and other protocols over twisted pair, coaxial, or optical fiber cables, telephone lines, satellites, microwave relays, modulated AC power lines, physical media transfer, and/or other data transmission "wires" known to those of skill in the art.
- the network may encompass smaller networks and/or be connectable to other networks through a gateway or similar mechanism.
- Suitable software to assist in implementing the invention is readily provided by those of skill in the pertinent art(s) using the teachings presented here and programming languages and tools, such as Java, Pascal, C++, C, PHP, JavaScript, Python, C#, Perl, SQL, Ruby, Shell, Visual Basic, Assembly, Action Script, Objective C, Lisp, Scala, Tel Haskell, Scheme, database languages, APIs, SDKs, assembly, firmware, microcode, and/or other languages and tools.
- Suitable signal formats may be embodied in analog or digital form, with or without error detection and/or correction bits, packet headers, network addresses in a specific format, and/or other supporting data readily provided by those of skill in the pertinent art(s).
- a software module or component may include any type of computer instruction or computer-executable code located within a memory device.
- a software module may, for instance, comprise one or more physical or logical blocks of computer instructions, which may be organized as a routine, a program, a script, an object, a component, a data structure, etc., that performs one or more tasks or implements particular abstract data types.
- a particular software module may comprise disparate instructions stored in different locations of a memory device, different memory devices, or different computers, which together implement the described functionality of the module.
- a module may comprise a single instruction or many instructions, and may be distributed over several different code segments, among different programs, and across several memory devices.
- Some embodiments may be practiced in a distributed computing environment where tasks are performed by a remote processing device linked through a communications network.
- software modules may be located in local and/or remote memory storage devices.
- data being tied or rendered together in a database record may be resident in the same memory device, or across several memory devices, and may be linked together in fields of a record in a database across a network.
- FIG. 1 is a schematic diagram of an interaction server 100 configured to enable privately public communication for a receiver 160.
- Senders 151 , 152 may transmit interactions, such as interaction requests, to the interaction server 100.
- a user 152 having an account with the interaction server 100 may be one of the senders 151 , 152.
- a sender 151 , 152 may include a person, a computer acting autonomously, a computer operated by a person, and/or the like.
- the interaction requests may include an address and/or a public identifier (e.g., a public address), an access code, a payload (e.g., a message), and/or the like.
- the interaction requests may initially be processed by an authentication/identification module 102.
- the authentication/identification module 102 may require login credentials from the user 152 and may verify that the non-user sender 151 has not spoofed their identity. If the senders 151 , 152 have been authenticated and/or identified, their interaction requests may be passed to an authorizer module 1 10. Otherwise, the interaction request may be rejected, deleted, flagged, and/or the like.
- the authorizer module 1 10 may determine whether interaction requests from the senders 151 , 152 are authorized for delivery to one or more user resources associated with the receiver 160. If the interaction requests are not authorized, they may be deleted (symbolically represented by trashcan 130). The authorizer module 1 10 may also be configured to sort interaction requests among the one or more user resources, such as one or more inboxes 121 , 122. If a sender 151 , 152 is on a trusted list 1 12, the interaction request may be sent to a trusted inbox 121 . If the interaction request is otherwise authorized (e.g., has a valid access code or the interaction rules specify that all interaction requests should be sent to the receiver 160), the interaction request may be sent to an unverified inbox 122.
- the authorizer module 1 10 may determine whether interaction requests from the senders 151 , 152 are authorized for delivery to one or more user resources associated with the receiver 160. If the interaction requests are not authorized, they may be deleted (symbolically represented by trashcan 130). The authorizer module 1 10
- the inboxes 121 , 122 are separate mailboxes. In other embodiments, all authorized interaction requests may be stored in a message center with tags, fields, and/or the like indicating whether the interaction request is from a trusted sender.
- the unverified inbox 122 is a holding area not visible to the receiver 160, and a request for the receiver 160 to trust the sender 151 , 152 may be sent to the trusted inbox 121 .
- a provisional account module 1 16 may create a provisional account before the interaction request is delivered to one of the inboxes 121 , 122.
- the interaction server 100 may include an interaction notification engine 120.
- the interaction notification engine 120 may be configured to periodically check the trusted and/or unverified inboxes 121 , 122 and/or a message center to see if new interaction requests and/or messages have arrived.
- the interaction notification engine 120 may store or access interaction rules that it uses to determine how to handle new messages.
- the interaction notification engine 120 may notify the receiver 160 that a new message has arrived, escalate messages until the receiver 160 acknowledges them, do nothing, and/or the like when a new message is detected in the inboxes 121 , 122.
- the interaction notification engine 120 may include the message, a copy of the message, a preview of the message (e.g., a predetermined number of characters from the beginning of the message), a link to the message, and/or the like.
- the receiver 160 may access the inboxes 121 , 122 and/or a consolidated message center (not shown) to review the messages therein. When reviewing unverified messages, the receiver 160 may be prompted to determine whether a sender 151 , 152 is trusted. The receiver 160 may or may not be permitted to respond to a message until a trust decision is made. The receiver 160 may be able to respond "Yes,” “No,” or “Maybe” when determining whether to trust a sender 151 , 152.
- the sender 151 , 152 may be added to the trusted list 1 12 and any messages from the sender 151 , 152 may be moved to the trusted inbox 121 and/or tagged, grouped, or otherwise identified as trusted. A response of "Maybe" may partially trust the sender 151 , 152 and/or provide the sender 151 , 152 with limited trust privileges. If the receiver 160 indicates that the sender 151 , 152 is not trusted, the interaction request may be discarded. If the receiver 160 is receiving undesired messages sent with a particular access code, the receiver 160 may use an access code module 1 14 to disable or modify the rules for the access code. If the receiver 160 is receiving undesired messages and access codes are disabled, the receiver 160 may use the access code module 1 14 to enable access codes.
- Some interaction requests may request acknowledgement or response.
- the receiver 160 may indicate to an acknowledgement module 140 that the message was received, and/or the receiver may provide a response to the request, such as an answer to a multiple-choice question, a yes or no, a detailed answer, and/or the like.
- the acknowledgement module 140 may indicate to the sender 151 , 152 that the interaction request was acknowledged, and/or the module may convey a response.
- FIG. 2 is a flow diagram of a method 200 for processing interaction requests received by the interaction server 100.
- the method 200 may begin when the interaction server 100 receives 202 an interaction request.
- the interaction server 100 may determine 204 whether the receiver 160 has enabled trusting of senders. If the trusting of senders is not enabled, the interaction server 100 may proceed to step 208. Otherwise, the interaction server 100 may determine 206 whether the sender 151 , 152 is trusted (e.g., determine whether the sender 151 , 152 is on the trusted list 1 12). If the sender 151 , 152 is trusted, the interaction request may be designated as trusted and/or delivered 220 to the trusted inbox 121 . Otherwise, the interaction server may proceed to step 208.
- the interaction server 100 may determine if access codes are enabled. In the illustrated configuration, if access codes are not enabled, the interaction request may be delivered 220 to the inbox 121 or otherwise made available for review. Alternatively or in addition, the interaction request may be deleted if access codes are not enabled. If access codes are enabled, the interaction server 100 may determine 210 if the received access code is valid. If the received access code is not valid, the interaction request may be deleted 218. If the access code is valid, the interaction request may be designated as unverified and/or moved to the unverified inbox 122.
- the receiver 160 may be prompted to specify whether the sender 151 , 152 should be trusted.
- the interaction server 100 may receive 212 a response indicating whether the sender 151 , 152 is trusted. If the receiver 160 indicates that the sender 151 , 152 is not trusted, the interaction server may block 214 the sender 151 , 152 from sending any future interaction requests and delete 218 the interaction request. If the receiver 160 indicates that the sender 151 , 152 is trustworthy, the sender 151 , 152 may be added 216 to the trusted sender list 1 12, and the interaction request may be designated as trusted and/or delivered 220 to the trusted inbox 121 . The method 200 ends upon deletion 218 or delivery 220 of the interaction request until the next interaction request is received.
- FIG. 3 is a flow diagram of a method 300 for processing interaction requests addressed to a child public address that is linked to a parent account.
- the method 300 may begin when the interaction server 100 receives 302 an interaction request that is addressed to a child public address.
- the interaction server 100 may determine 304 whether the sender 151 , 152 is trusted and/or has a valid access code. If the sender 151 , 152 is not trusted and/or does not have a valid access code, the interaction request may be deleted 314. Otherwise, the interaction server 100 may proceed to step 306. [0118] At step 306, the interaction server 100 may determine whether parent approval is required. The parent may allow certain senders 151 , 152 and/or access codes to transmit interaction requests to the child without parent approval.
- the interaction request may be made available and/or transmitted 316 to the child. If parent approval is required, the interaction request may be made available and/or transmitted 308 to the parent for approval. The parent may review the interaction request, and the interaction server 100 may receive 310 a response indicating whether the parent trusts the sender and/or approves the interaction request. If the parent does not trust the sender, the sender may be blocked 312 and the interaction request may be deleted 314. Otherwise, the interaction request may be made available and/or transmitted 316 to the child. If the parent trusts the sender, the parent may indicate to the interaction server 100 that future messages do not require approval or may indicate that all future messages should be reviewed by the parent before delivery.
- FIG. 4 is a flow diagram of a method 400 for delivering an interaction request to the receiver 160 using location-based interaction rules.
- the method 400 may begin when an interaction request is received 402 by the interaction server 100.
- the interaction server 100 may determine 404 whether a location (e.g., a GPS location) for the intended receiver 160 is available.
- the interaction server 100 may also or instead determine whether the intended receiver has logged into a computer or performed other activities from which location data can be leveraged.
- the interaction server 100 may use the location to select 406 a destination for the interaction request. If no location is available, the interaction server 100 may use the current time of day, current day of the week, and/or the like and/or the interaction rules to predict 408 the destination most likely to reach the receiver 160. The interaction rules may be learned based on past behavior of the receiver 160. The interaction server 100 may deliver 410 the interaction request to the selected and/or predicted destination.
- FIG. 5 is a schematic diagram of a system 500 configured to broadcast messages to a plurality of channel subscribers 540, 550, 560.
- the system 500 may include a plurality of channels 51 1 , 512, 513.
- the channel subscribers 540, 550, 560 may be subscribed to one or more of the channels 51 1 , 512, 513, and/or the channels 51 1 , 512, 513 may make interaction requests and/or messages available to one or more of the channel subscribers 540, 550, 560.
- Broadcasters 531 , 532, 533 may transmit the interaction requests and/or messages to the channels 51 1 , 512, 513, and the channels may make the received interaction requests and/or messages available to the channel subscribers 540, 550, 560.
- the channel subscribers 540, 550, 560 may each maintain a database 545, 555, 565.
- the databases 545, 555, 565 may include various information, such as private data, which may include interaction rules and/or personal contact information, that is maintained by the subscribers 540, 550, 560.
- the channels 51 1 , 512, 513 may retrieve the private data from the databases 545, 555, 565. Based on the retrieved information, the channels 51 1 , 512, 513 may determine how to deliver the message and/or interaction request.
- the private data may be shared with the channels 51 1 , 512, 513 and/or interaction notification engine (not shown) only and not with the broadcasters 531 , 532, 533.
- Subscribers 540, 550, 560 may share certain private data with broadcasters 531 , 532, 533 and may allow one or more broadcasters to use the private data to contact them individually.
- the same user account and private data may be used by the subscribers 540, 550, 560 to subscribe to a plurality of channels 51 1 , 512, 513.
- FIG. 6 is a flow diagram for a method 600 of admitting new subscribers to a channel.
- the method 600 may begin when a channel receives 602 a request from a user to subscribe to the channel.
- the channel may retrieve 604 admission rules to determine what criteria must be met for the user to subscribe to the channel.
- the admission rules may specify that the user must provide access to private user data. For example, a running channel may require that the user allow access to the user's location and/or that the user specify what distances the user runs.
- the user's location and/or answers to questions may be added to their private data, which may be maintained by the user and shared with other channels and/or trusted contacts (not shown).
- the channel and/or a system comprising user databases may determine 606 whether the user's database contains the private user data required. If the user's database does not contain the data required, the user may be prompted 608 to enter the data. Otherwise, the channel may request 610 access to the private user data in the user's database. The channel may receive 612 a response indicating whether the private user data has been entered into the user's database and/or whether the user allows access to the private user data. If the user does not enter the data when prompted 608 and/or does not allow access to the data, the method 600 may end 618 without admitting the user. Otherwise, the user may be admitted 614 as a channel subscriber or await final approval from an administrator. In some configurations, recent messages may be forwarded 616 to the user, and/or the user may be given access to a history of previous channel messages. The method 600 may end 618 until the next request to join the channel.
- FIG. 7 is a schematic diagram of a system 700 configured to broadcast messages to channel subscribers, including subscriber 760.
- a broadcaster 730 may have broadcast rights for the channel 710.
- the broadcaster 730 may transmit an interaction request and/or a message to the channel 710 for distribution to subscribers.
- the channel 710 may be configured to process the interaction request and/or message received from the broadcaster 730.
- the channel 710 may determine that the channel subscriber 760 subscribes to the channel 710 and should receive the interaction request and/or message.
- An interaction notification engine 720 may be configured to notify the channel subscriber 760 of new interaction requests and/or messages sent to the channel 710.
- the channel 710 may notify the interaction notification engine 720 that the interaction request and/or message should be made available to the subscriber 760.
- the channel 710 may deliver the interaction request and/or message to a message center for the channel subscriber 760, and the interaction notification engine 720 may check the message center for new interaction requests and/or messages.
- the interaction notification engine 720 becomes aware of a new interaction request and/or message for the channel subscriber 760, it may attempt to notify the channel subscriber 760.
- the interaction notification engine 720 may retrieve the channel subscriber's private data, which may include personal contact information, interaction rules, and/or escalation rules, from a database 765 in which the channel subscriber 760 maintains such information.
- the private data may be shared with the interaction notification engine 720 and not with the channel 710 and/or broadcaster 730. Based on the retrieved data, the broadcaster 730, the channel 710, and/or data in the interaction request and/or message, the interaction notification engine 720 may determine how to deliver the interaction request and/or message to the channel subscriber 760 and whether the interaction request and/or message should be escalated.
- a text message may be sent to a feature phone 764, and/or a voice message, text message, chat message, and/or application message may be sent to a computer 761 , a smartphone 762, and/or a home phone 763 based on the interaction rules.
- the broadcaster 730 and/or channel 710 may have no visibility into this escalation process.
- the interaction request and/or message may request an acknowledgement and/or response. If an escalated interaction request and/or message is not acknowledged or responded to by the channel subscriber 760, the message may be sent repeatedly, sent to different devices 761 , 762, 763, 764, sent to a third party 770, and/or the like.
- the third party 770 may be a relative or friend of the channel subscriber 760, and/or the third party 770 may be a stranger in the vicinity of the channel subscriber 760.
- a summary report specifying how many subscribers acknowledged the message, what responses were received, and/or other useful statistics and information may be made available to the broadcaster 730.
- the broadcaster 730 and the channel 710 may not have access to the channel subscriber's private data.
- That information may be shared with the broadcaster 730 only if the channel subscriber 760 explicitly allows it to be shared.
- the channel subscriber 760 may be allowed to send interaction requests and/or messages back to the broadcaster 730 if the broadcaster 730 and/or channel settings allow.
- the channel settings may always allow interaction requests replying to the broadcaster 730, never allow interaction requests replying to the broadcaster 730, permit the broadcaster 730 to decide whether to allow interaction requests replying to the broadcast, and/or the like.
- FIG. 8 is a schematic representation of escalation rules 800 for a user 810.
- the user 810 may be a channel subscriber (e.g., channel subscriber 760) and/or a receiver of an interaction request (e.g., receiver 160).
- the escalation rules 800 may be default rules for all channel messages and/or interaction requests received by the user 810.
- the user 810 may receive a message on her computer 81 1 and a call on her home phone 812. If, after a first predetermined time period, the user 810 has not acknowledged the notification, the interaction may escalate to a second escalation level 804.
- the user 810 may again receive a message on her computer 81 1 and call on her home phone 812.
- the user 810 may also receive a message via an application on her smartphone 813 and a text message on her feature phone 814.
- the notification may escalate to a third escalation level 806.
- the second predetermined time period may equal or not equal the first predetermined time period.
- the third escalation level 806 may be identical to the other escalation levels, and interaction may be attempted using the same devices.
- a fourth and highest escalation level 808 may be reached after a third predetermined time period. Notification may again be attempted through the user's devices 81 1 , 812, 813, 814 during the fourth escalation level 808.
- a computer 821 , a home phone 822, and a smartphone 823 of a second user 820 may be messaged.
- Notification may be repeatedly attempted at the fourth escalation level 808 with delays of a fourth predetermined time interval separating each additional attempt.
- the repeated attempts at the fourth escalation level 808 may be continued until an acknowledgement is received.
- escalation may be ended after a predetermined number of delivery attempts.
- there may be a different number of escalation levels, and/or different methods may be used to attempt to notify the user 810 at each escalation level.
- FIG. 9 is a schematic diagram of a system 900 configured to broadcast a message to a dynamically segmented plurality of channel subscribers 940, 950, 960, 980.
- the broadcaster 930 may wish to send a message only to subscribers that match specific criteria. For example, the broadcaster 930 may desire to broadcast a question to a channel dedicated to avid runners. The broadcaster's question may relate to marathon training, so she may wish to send the message only to subscribers interested in marathons.
- the channel subscribers 940, 950, 960, 970, 980 may store preferences and/or data in subscriber databases 945, 955, 965, 975, 985, such as specifying the types of races they compete in and/or are interested in.
- Each channel subscriber 940, 950, 960, 970, 980 may have their own database 945, 955, 965, 975, 985, and/or one database may store information about multiple channel subscribers 940, 950, 960, 970, 980.
- the channel subscribers 940, 950, 960, 970, 980 may indicate that they wish to be notified only of messages that match their stated interests. [0133]
- the broadcaster 930 sends her message with the question about marathon training to the interaction server, she may request dynamic segmentation so that only subscribers interested in marathons receive the message.
- the channel 910 may send the message to an interaction notification engine 920 to determine which of the channel subscribers 940, 950, 960, 970, 980 should receive the message.
- the channel 910 may determine which of the channel subscribers 940, 950, 960, 970, 980 should receive the message, and the interaction notification engine 920 may notify the channel subscribers 940, 950, 960, 970, 980 after the channel 910 has delivered the message to each channel subscriber's message center.
- the interaction notification engine 920 may automatically access the databases 945, 955, 965, 975, 985 to determine the subscribers 940, 950, 960, 980 interested in marathons.
- the dynamic segmentation may occur without the broadcaster 930 having access to the private data used to determine to whom to broadcast the message.
- the interaction notification engine 920 may determine the dynamic segmentation without sharing any private data with the broadcaster 930.
- the interaction notification engine 920 may send a notification to the subscribers 940, 950, 960, 980, which may include the message, a copy of the message, a predetermined number of characters from the message, a link to the message, and/or the like.
- a first subscriber 940 and a second subscriber 950 may have indicated in their information that they have previously run marathons, so the message may be delivered to them.
- the interaction notification engine 920 may determine that the message should be sent to the first subscriber's computer 942 and the second subscriber's home phone 952.
- a third subscriber 960 may have indicated that he is interested in marathons.
- the third subscriber 960 may own a small athletic store and may wish to be notified immediately of messages to the channel.
- the third subscriber 960 may specify in his escalation rules that any messages to the channel should first be sent to his smartphone 962 and, if no response is received, escalated to his computer 964.
- a fourth subscriber 970 may have specified that she does not run any distances longer than ten kilometers, so the message may not be delivered to her.
- a fifth subscriber 980 may also be interested in marathons because she is training for a marathon.
- the fifth subscriber 980 may want to ensure that she receives all messages from the channel, so the interaction rules for the fifth subscriber 980 may specify that all messages should be delivered to the fifth subscriber's home phone 982, smartphone 984, and computer 986. Acknowledgement, response, and/or dynamic segmentation statistics, such as the number of subscribers satisfying the submitted criteria, may be made available to the broadcaster 930.
- FIG. 10 is a schematic diagram of a system 1000 configured to broadcast automatic messages to interested channel subscribers 1040, 1080.
- a channel 1010 may periodically receive and/or retrieve information from an information server 1030, and/or the channel 1010 may compute information.
- the channel 1010 may request information about upcoming running races from the information server 1030 and may determine that a half-marathon in San Francisco has been added to the list of races stored in the information server 1030.
- the channel 1010 may send the information to an interaction notification engine 1020 to determine which subscribers should receive notification of the information.
- the first and fifth subscribers 1040, 1080 may live in San Francisco and may have specified in their databases 1045, 1085 that they would like to receive messages about upcoming races of interest.
- the interaction notification engine 1020 may broadcast an automatic message about the race to the first and fifth subscribers 1040, 1080.
- the second subscriber 1050 may live in San Francisco but not want to receive automatic messages about upcoming races, the third subscriber 1060 may only be interested in races on the East Coast, and the fourth subscriber 1070 may only run races of ten kilometers or less.
- the interaction notification engine 1020 may determine from the databases 1055, 1065, 1075 for these subscribers that the second subscriber 1050 does not wish to receive messages and that the location and distance are inapplicable for the third and fourth subscribers 1060, 1070 respectively, so the messages may not be transmitted and/or made available to them.
- FIG. 1 1 is a schematic diagram of a system 1 100 for communication among a plurality of channel subscribers 1 130, 1 140, 1 150, 1 160, 1 170.
- a channel 1 1 10 may be configured to allow the plurality of channel subscribers 1 130, 1 150, 1 160, 1 170 to broadcast interaction requests and/or messages to one another and/or to view one another's private data.
- the channel 1 1 10 may be a channel for a family.
- the channel 1110 may allow the family to leverage many of the features discussed herein. Messages may be dynamically segmented among the channel subscribers 1130, 1140, 1150, 1160, 1170, so messages only relevant to some family members may only get delivered to those channel subscribers 1130, 1140, 1150, 1170.
- the channel 1110 may also allow for one-to-one communication among any two of the channel subscribers 1130, 1140, 1150, 1160, 1170. Messages may be escalated to a plurality of devices 1172, 1174, 1176 for a channel subscriber 1170 to ensure important and/or urgent messages are received.
- the channel subscribers 1130, 1140, 1150, 1160, 1170 may each maintain a database 1135, 1145, 1155, 1165, 1175, which may contain private data, such as personal contact information, interaction rules, escalation rules, and/or the like.
- the information in the databases 1135, 1145, 1155, 1165, 1175 may be used by the channel 1110 and/or an interaction notification engine (not shown) to determine how to deliver message, and/or the information may be shared among the channel subscribers 1130, 1140, 1150, 1160, 1170, such as family members sharing mailing addresses and other personal contact information.
- An administrator 1130 may control rules for the channel 1110.
- the administrator 1130 may allow some channel subscribers 1130, 1150, 1160, 1170 to broadcast messages and may not allow other channel subscribers 1140 to broadcast messages, such as a child in the family.
- the administrator 1130 may also decide to whom each channel subscriber 1130, 1140, 1150, 1160, 1170 may broadcast.
- the channel subscribers 1130, 1140, 1150, 1160, 1170 may be permitted to broadcast to all other channel subscribers 1130, 1140, 1150, 1160, 1170, a dynamically segmented subset, specific individual channel subscribers 1130, 1140, 1150, 1160, 1170, and/or the like.
- the administrator 1130 may be able to change the rules for the channel 1110 at will.
- the channel 1110 may be operated by a school, and the channel subscribers 1130, 1140, 1150, 1160, 1170 may include parents, students, teachers, staff, and the like.
- the school may be able to broadcast urgent messages to parents and students, such as a school closing due to a weather emergency.
- Parents may also be allowed to send messages, which may include urgent messages, back to the school.
- the school may allocate and/or assign messages received from parents to teachers and/or staff for a response. Students and/or parents may or may not be permitted to send messages to other students and parents.
- the channel subscribers 1 130, 1 140, 1 150, 1 160, 1 170 may be able to interact with shared data.
- a teacher may be able to create a parent-teacher conference signup request and use dynamic segmentation to share it with only the parents of her students.
- the parents may be able to see what time slots are available and reserve time slots, which may be marked as unavailable immediately upon reservation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2014205387A AU2014205387B2 (en) | 2013-01-09 | 2014-01-09 | Systems and methods for access-controlled interactions |
JP2015552778A JP6349328B2 (en) | 2013-01-09 | 2014-01-09 | Access controlled interaction system and method |
BR112015016568A BR112015016568A2 (en) | 2013-01-09 | 2014-01-09 | controlled access interaction systems and methods |
SG11201505362WA SG11201505362WA (en) | 2013-01-09 | 2014-01-09 | Systems and methods for access-controlled interactions |
CN201480009157.9A CN105164663B (en) | 2013-01-09 | 2014-01-09 | The system and method for accessing controllable interaction |
KR1020157020142A KR20150105359A (en) | 2013-01-09 | 2014-01-09 | Systems and methods for access-controlled interactions |
CA2897042A CA2897042A1 (en) | 2013-01-09 | 2014-01-09 | Systems and methods for access-controlled interactions |
EP14738017.4A EP2943889B1 (en) | 2013-01-09 | 2014-01-09 | Systems and methods for access-controlled interactions |
ZA2015/04903A ZA201504903B (en) | 2013-01-09 | 2015-07-08 | Systems and methods for access-controlled interactions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361750634P | 2013-01-09 | 2013-01-09 | |
US61/750,634 | 2013-01-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014110279A1 true WO2014110279A1 (en) | 2014-07-17 |
Family
ID=51061857
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2014/010905 WO2014110279A1 (en) | 2013-01-09 | 2014-01-09 | Systems and methods for access-controlled interactions |
Country Status (11)
Country | Link |
---|---|
US (3) | US8874770B2 (en) |
EP (1) | EP2943889B1 (en) |
JP (1) | JP6349328B2 (en) |
KR (1) | KR20150105359A (en) |
CN (1) | CN105164663B (en) |
AU (1) | AU2014205387B2 (en) |
BR (1) | BR112015016568A2 (en) |
CA (1) | CA2897042A1 (en) |
SG (1) | SG11201505362WA (en) |
WO (1) | WO2014110279A1 (en) |
ZA (1) | ZA201504903B (en) |
Families Citing this family (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140379390A1 (en) | 2013-06-20 | 2014-12-25 | Live Nation Entertainment, Inc. | Location-based presentations of ticket opportunities |
US9762685B2 (en) * | 2005-04-27 | 2017-09-12 | Live Nation Entertainment, Inc. | Location-based task execution for enhanced data access |
US20150003595A1 (en) * | 2011-04-25 | 2015-01-01 | Transparency Sciences, Llc | System, Method and Computer Program Product for a Universal Call Capture Device |
US9547862B2 (en) * | 2012-08-01 | 2017-01-17 | Paypal, Inc. | Electronic payment restriction |
US20150256679A1 (en) * | 2014-03-08 | 2015-09-10 | J. Stephen Burnett | Electronic Message Aggregation and Sharing System and Apparatus |
US8844050B1 (en) * | 2013-03-15 | 2014-09-23 | Athoc, Inc. | Personnel crisis communications management and personnel status tracking system |
US10142277B2 (en) * | 2013-06-28 | 2018-11-27 | Orange | Posting and consultation of messages by users of social networks |
US9710808B2 (en) * | 2013-09-16 | 2017-07-18 | Igor V. SLEPININ | Direct digital cash system and method |
US11055721B2 (en) * | 2013-10-30 | 2021-07-06 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for information verification |
WO2015089100A1 (en) * | 2013-12-10 | 2015-06-18 | Sweigh, Inc. | Social messaging system and method |
US20150269700A1 (en) | 2014-03-24 | 2015-09-24 | Athoc, Inc. | Exchange of crisis-related information amongst multiple individuals and multiple organizations |
US11410221B2 (en) | 2014-04-29 | 2022-08-09 | Vivint, Inc. | Integrated secure delivery |
US10657483B2 (en) * | 2014-04-29 | 2020-05-19 | Vivint, Inc. | Systems and methods for secure package delivery |
US11049343B2 (en) | 2014-04-29 | 2021-06-29 | Vivint, Inc. | Techniques for securing a dropspot |
US11900305B2 (en) | 2014-04-29 | 2024-02-13 | Vivint, Inc. | Occupancy identification for guiding delivery personnel |
US10169776B2 (en) | 2014-05-12 | 2019-01-01 | Adobe Systems Incorporated | Obtaining profile information for future visitors |
US10498899B2 (en) * | 2014-06-16 | 2019-12-03 | Karen Paulson | Communication logging system |
US11096018B2 (en) * | 2014-07-01 | 2021-08-17 | Time Warner Cable Enterprises Llc | Message management and conditional delivery of available messages |
GB2529721A (en) * | 2014-09-01 | 2016-03-02 | Ibm | Temporary authorizations to access a computing system based on user skills |
US11146629B2 (en) * | 2014-09-26 | 2021-10-12 | Red Hat, Inc. | Process transfer between servers |
CN105530640B (en) * | 2014-09-30 | 2019-02-22 | 国际商业机器公司 | Method and apparatus for communication control |
US20160119785A1 (en) * | 2014-10-23 | 2016-04-28 | Hyunil Choi | System and method for managing posts |
WO2016092715A1 (en) * | 2014-12-08 | 2016-06-16 | 日本電気株式会社 | Wireless terminal and method for messaging |
US20160275301A1 (en) * | 2015-03-17 | 2016-09-22 | Dots Communication, Inc. | Information sharing control |
US10860958B2 (en) * | 2015-04-24 | 2020-12-08 | Delta Pds Co., Ltd | Apparatus for processing work object and method performing the same |
US9824351B2 (en) | 2015-05-27 | 2017-11-21 | Bank Of America Corporation | Providing access to account information using authentication tokens |
US9830591B2 (en) | 2015-05-27 | 2017-11-28 | Bank Of America Corporation | Providing access to account information using authentication tokens |
US10298617B2 (en) | 2015-07-08 | 2019-05-21 | T-Mobile Usa, Inc. | Trust policy for telecommunications device |
US11044283B2 (en) * | 2015-08-06 | 2021-06-22 | Ford Global Technologies, Llc | Methods and systems to customize a vehicle computing system based on an electronic calendar |
US10367852B2 (en) | 2015-09-04 | 2019-07-30 | Swim.IT Inc. | Multiplexed demand signaled distributed messaging |
CN105491121A (en) * | 2015-11-27 | 2016-04-13 | 常作廷 | Method and device for sending key signal to APP (Application) |
CN105516259B (en) * | 2015-11-27 | 2019-06-04 | 北京奇虎科技有限公司 | A kind of method for sending information and device |
CN106973322A (en) * | 2015-12-09 | 2017-07-21 | 财团法人工业技术研究院 | Multi-media content cross-screen synchronization device and method, playing device and server |
US10028145B2 (en) * | 2016-04-15 | 2018-07-17 | Microsoft Technology Licensing, Llc | Blocking undesirable communications in voice over internet protocol systems |
CN105898066A (en) * | 2016-05-19 | 2016-08-24 | 努比亚技术有限公司 | Method and device for automatically distributing to specific contact based on specific information |
US11582215B2 (en) | 2016-06-12 | 2023-02-14 | Apple Inc. | Modifying security state with secured range detection |
CN106162306B (en) * | 2016-07-05 | 2019-01-15 | 北京真真科技有限公司 | A kind of merchandise display for net cast shopping and lower single system for prompting |
US10630666B2 (en) * | 2016-08-31 | 2020-04-21 | Dhiraj Sharma | Peer registration and relationship fulfillment system and method thereof |
EP3510492A4 (en) * | 2016-09-09 | 2020-04-08 | Sensoriant, Inc. | A software-based switch for providing products and/or services to users without compromising their privacy |
US9886689B1 (en) * | 2016-09-12 | 2018-02-06 | Square, Inc. | Processing a mobile payload |
CN106488294A (en) * | 2016-09-28 | 2017-03-08 | 乐视控股(北京)有限公司 | Barrage information transfer, display packing and device |
CN106341313A (en) * | 2016-09-29 | 2017-01-18 | 北京小米移动软件有限公司 | Method and apparatus for obtaining billing information |
WO2018084726A1 (en) * | 2016-11-07 | 2018-05-11 | Motorola Solutions, Inc. | Guardian system in a network to improve situational awareness of a crowd at an incident |
GB2555660B (en) * | 2016-11-07 | 2019-12-04 | Cirrus Logic Int Semiconductor Ltd | Methods and apparatus for authentication in an electronic device |
US20190207946A1 (en) * | 2016-12-20 | 2019-07-04 | Google Inc. | Conditional provision of access by interactive assistant modules |
US10614420B2 (en) * | 2017-01-27 | 2020-04-07 | Dropbox, Inc. | Managing reminders in a content management system |
CN108809799B (en) * | 2017-04-28 | 2020-09-15 | 腾讯科技(深圳)有限公司 | Information sending method, information display method, device and system |
US10887423B2 (en) * | 2017-05-09 | 2021-01-05 | Microsoft Technology Licensing, Llc | Personalization of virtual assistant skills based on user profile information |
JP2019004413A (en) * | 2017-06-19 | 2019-01-10 | 株式会社サテライトオフィス | Bot system and program |
CN110870274A (en) * | 2017-07-07 | 2020-03-06 | 山姆查特股份有限公司 | System, method and computer program product for providing enhanced chat services |
US11122057B2 (en) * | 2017-09-01 | 2021-09-14 | Open Text Holdings, Inc. | Systems, methods and computer program products for ingress email security |
US12056706B2 (en) * | 2017-09-26 | 2024-08-06 | International Business Machines Corporation | System and method for enforcing granular privacy controls during transaction fraud screening by a third party |
US10536440B2 (en) | 2017-10-23 | 2020-01-14 | Disney Enterprises, Inc. | User account access management |
US10803139B2 (en) * | 2017-10-27 | 2020-10-13 | Intuit Inc. | Instrument disambiguation to facilitate electronic data consolidation |
CN107770284A (en) * | 2017-11-09 | 2018-03-06 | 四川研宝科技有限公司 | A kind of data interaction system and method based on user's physiological characteristic and geographical position |
JP6954821B2 (en) * | 2017-12-11 | 2021-10-27 | トヨタ自動車株式会社 | Dialogue management device and program |
JP6907948B2 (en) | 2018-01-04 | 2021-07-21 | 富士通株式会社 | File generation program, file generation method and file generation device |
US11005853B1 (en) * | 2018-03-06 | 2021-05-11 | Amazon Technologies, Inc. | Restriction transitivity for session credentials |
US10796016B2 (en) * | 2018-03-28 | 2020-10-06 | Visa International Service Association | Untethered resource distribution and management |
US10772141B2 (en) * | 2018-06-28 | 2020-09-08 | The Chinese University Of Hong Kong | System and method for peer-to-peer wireless communication |
EP3682345B1 (en) | 2018-08-07 | 2021-11-24 | Google LLC | Assembling and evaluating automated assistant responses for privacy concerns |
HUE058223T2 (en) * | 2018-10-29 | 2022-07-28 | Grieshaber Vega Kg | Method and apparatus for the transmission of an access token for access to a field device used in the processing industry |
US11075914B2 (en) * | 2018-12-28 | 2021-07-27 | Kinzoo Technologies, Inc. | Social networking platform with adult drop-in review |
CN109829735A (en) * | 2019-01-31 | 2019-05-31 | 上海易点时空网络有限公司 | Comment information screening technique and device |
US11087798B2 (en) * | 2019-04-16 | 2021-08-10 | Honda Motor Co., Ltd. | Selective curation of user recordings |
WO2020214833A1 (en) * | 2019-04-18 | 2020-10-22 | Apple Inc. | Remote interaction with a device using secure range detection |
FR3097350B1 (en) * | 2019-06-14 | 2021-10-29 | Ingenico Group | Method of assisting in the use of an electronic transaction device. |
US11412013B2 (en) * | 2019-08-07 | 2022-08-09 | Jpmorgan Chase Bank, N.A. | System and method for implementing video soft phone applications |
NL2023811B1 (en) * | 2019-09-11 | 2021-05-17 | Microsoft Technology Licensing Llc | Validating and providing accessible electronic messages |
US11290560B2 (en) * | 2019-09-30 | 2022-03-29 | Slack Technologies, Llc | Group-based communication apparatus, method, and computer program product configured to manage draft messages in a group-based communication system |
US10951564B1 (en) | 2020-04-17 | 2021-03-16 | Slack Technologies, Inc. | Direct messaging instance generation |
CN111552947A (en) * | 2020-04-30 | 2020-08-18 | 尚杰 | Education answer processing method and device |
US11784949B2 (en) | 2020-10-06 | 2023-10-10 | Salesforce, Inc. | Limited functionality interface for communication platform |
US12034613B2 (en) * | 2021-02-18 | 2024-07-09 | Cerner Innovation, Inc. | Smart ticket routing to determined support team |
US20220294788A1 (en) * | 2021-03-09 | 2022-09-15 | Oracle International Corporation | Customizing authentication and handling pre and post authentication in identity cloud service |
JP6945909B1 (en) * | 2021-06-04 | 2021-10-06 | 株式会社アクリート | Message transmission scenario generator, message transmission scenario generation method, and message transmission scenario generation program |
CN113590531B (en) * | 2021-07-26 | 2021-12-31 | 浙江汇鼎华链科技有限公司 | Data classification storage system and method based on big data |
US12088649B2 (en) * | 2021-08-20 | 2024-09-10 | International Business Machines Corporation | Adaptive content masking during web conferencing meetings |
US20230077262A1 (en) | 2021-09-02 | 2023-03-09 | Yohana Llc | Systems and methods for dynamic chat streams |
CN114071382B (en) * | 2021-11-16 | 2023-05-02 | 中国银行股份有限公司 | Message sending method and device |
CN114338224B (en) * | 2022-01-17 | 2024-04-12 | 广东好太太智能家居有限公司 | Cross-platform control method and system for intelligent hardware |
US20230267444A1 (en) * | 2022-02-18 | 2023-08-24 | Bank Of America Corporation | Proximity-based device pairing system via acoustic communication for secure resource transfer |
CN114666295A (en) * | 2022-03-21 | 2022-06-24 | 北京九思自然科技有限公司 | Home-school intercommunication communication method and system |
CN114726956B (en) * | 2022-04-11 | 2024-03-19 | 中国联合网络通信集团有限公司 | Telephone incoming call processing method and device |
KR102526530B1 (en) * | 2022-07-27 | 2023-04-27 | 주식회사 디프스팩 | blocking method for Web mail and system thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020072996A1 (en) * | 2000-03-28 | 2002-06-13 | Paiz Richard S. | Method of and apparatus for practicing religious faith through the world wide web via purchase of copies of proprietary religious audio and visual works and merchandise |
US20020120568A1 (en) * | 2000-10-30 | 2002-08-29 | Jonathan Leblang | User-to-user payment service with payee-specific pay pages |
US20070043608A1 (en) * | 2005-08-22 | 2007-02-22 | Recordant, Inc. | Recorded customer interactions and training system, method and computer program product |
Family Cites Families (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5287498A (en) | 1991-04-02 | 1994-02-15 | Rolm Company | Message transmitting system wherein recipient site is determined using information concerning the relationship between the sender and recipient sites |
US5724521A (en) | 1994-11-03 | 1998-03-03 | Intel Corporation | Method and apparatus for providing electronic advertisements to end users in a consumer best-fit pricing manner |
FR2741465B1 (en) * | 1995-11-20 | 1997-12-19 | Bull Sa | METHOD FOR AUTHENTICATION OF A USER WORKING IN A DISTRIBUTED ENVIRONMENT IN CLIENT/SERVER MODE |
US6055510A (en) | 1997-10-24 | 2000-04-25 | At&T Corp. | Method for performing targeted marketing over a large computer network |
US6161185A (en) * | 1998-03-06 | 2000-12-12 | Mci Communications Corporation | Personal authentication system and method for multiple computer platform |
AU2001234908A1 (en) | 2000-02-11 | 2001-08-20 | Marcio Marc Abreu | System and method for communicating product recall information, product warningsor other product-related information to users of products |
US8489669B2 (en) | 2000-06-07 | 2013-07-16 | Apple Inc. | Mobile data processing system moving interest radius |
US20050015443A1 (en) * | 2000-10-10 | 2005-01-20 | Alex Levine | Personal message delivery system |
US7239860B2 (en) | 2000-10-27 | 2007-07-03 | Fulcit New Zealand Limited, a New Zealand Company of Hercus King & Company | Method and apparatus for generating an alert message |
AU2002239391A1 (en) * | 2000-11-30 | 2002-06-11 | Message Machines, Inc. | Systems and methods for routing messages to communications devices |
US20020069192A1 (en) | 2000-12-04 | 2002-06-06 | Aegerter William Charles | Modular distributed mobile data applications |
US20020138622A1 (en) | 2001-03-21 | 2002-09-26 | Motorola, Inc. | Apparatus and method of using long lived addresses in a private network for push messaging to mobile devices |
US7228438B2 (en) * | 2001-04-30 | 2007-06-05 | Matsushita Electric Industrial Co., Ltd. | Computer network security system employing portable storage device |
FR2827465B1 (en) | 2001-07-13 | 2004-01-02 | Cegetel | METHOD FOR ADDRESSING A MOBILE TERMINAL |
GB0125201D0 (en) * | 2001-10-19 | 2001-12-12 | Nokia Corp | A messaging system |
US20030130857A1 (en) | 2002-01-04 | 2003-07-10 | Masanobu Matsuo | Systems, methods and computer program products for utilizing an information exchange framework |
US20030225590A1 (en) * | 2002-06-04 | 2003-12-04 | Baby Croesus Sa | Web card system |
US7010565B2 (en) | 2002-09-30 | 2006-03-07 | Sampson Scott E | Communication management using a token action log |
US20040111480A1 (en) | 2002-12-09 | 2004-06-10 | Yue Jonathan Zhanjun | Message screening system and method |
US7664233B1 (en) | 2003-06-25 | 2010-02-16 | Everbridge, Inc. | Emergency and non-emergency telecommunications notification system |
US8102974B2 (en) | 2003-07-01 | 2012-01-24 | Avaya Inc. | Method and apparatus for event notification based on the identity of a calling party |
US8316128B2 (en) | 2004-01-26 | 2012-11-20 | Forte Internet Software, Inc. | Methods and system for creating and managing identity oriented networked communication |
US7827234B2 (en) | 2005-01-10 | 2010-11-02 | International Business Machines Corporation | Privacy entitlement protocols for secure data exchange, collection, monitoring and/or alerting |
US7672440B2 (en) | 2005-01-20 | 2010-03-02 | International Business Machines Corporation | Single point of contact personal communication system |
US7130389B1 (en) | 2005-04-28 | 2006-10-31 | Tech Radium, Inc. | Digital notification and response system |
US7706253B1 (en) | 2005-12-02 | 2010-04-27 | Network Equipment Technologies, Inc. | Gateway to route communications during a fault |
JP2009526322A (en) | 2006-02-08 | 2009-07-16 | イマジニア・ソフトウェア,インコーポレーテッド | Secure digital content management using change identifiers |
US7301450B2 (en) | 2006-03-14 | 2007-11-27 | John Carrino | Citizen communication center |
CN100466783C (en) * | 2006-04-06 | 2009-03-04 | 华为技术有限公司 | Method and device for managing multi-users of mobile terminal |
US20080013712A1 (en) * | 2006-07-11 | 2008-01-17 | Karsten Gopinath | Unified Communication Directory Service |
US7927214B2 (en) * | 2006-12-08 | 2011-04-19 | Microsoft Corporation | Transfer of content to closed systems |
CN101335622B (en) * | 2007-06-27 | 2012-08-29 | 日电(中国)有限公司 | Method and apparatus for distributed authorization using anonymous flexible certificate |
US9838365B2 (en) | 2007-07-10 | 2017-12-05 | Qualcomm Incorporated | Peer to peer identifiers |
ES2809237T3 (en) | 2007-12-06 | 2021-03-03 | Amika Mobile Corp | Content processing and network services for mobile or fixed devices |
JP5045417B2 (en) * | 2007-12-19 | 2012-10-10 | ソニー株式会社 | Network system and direct access method |
US8424057B2 (en) * | 2007-12-28 | 2013-04-16 | Ebay, Inc. | Mobile anti-phishing |
US8224284B2 (en) | 2008-01-04 | 2012-07-17 | At&T Intellectual Property I, L.P. | Emergency communication system and method |
US20090271873A1 (en) * | 2008-04-24 | 2009-10-29 | Alon Ram | Method and system for displaying a sequence of media files |
WO2009142473A1 (en) | 2008-05-23 | 2009-11-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for message routing in ims and circuit switched networks |
US8416933B2 (en) | 2008-10-30 | 2013-04-09 | International Business Machines Corporation | Trusted environment for communication between parties |
US9473419B2 (en) * | 2008-12-22 | 2016-10-18 | Ctera Networks, Ltd. | Multi-tenant cloud storage system |
US20130254314A1 (en) * | 2009-06-09 | 2013-09-26 | Edmond K. Chow | Digital content delivery |
US8315595B2 (en) | 2009-06-10 | 2012-11-20 | International Business Machines Corporation | Providing trusted communication |
US20120303439A1 (en) * | 2010-01-13 | 2012-11-29 | Sotxtme Ltd | User-defined access controls for accessing user via an electronic communication device |
US8219542B2 (en) * | 2010-03-25 | 2012-07-10 | Boku, Inc. | Systems and methods to provide access control via mobile phones |
CN102823190B (en) | 2010-03-26 | 2016-08-10 | 诺基亚技术有限公司 | For the method and apparatus providing the reliability rating accessing resource |
US8468584B1 (en) * | 2010-04-02 | 2013-06-18 | Wells Fargo Bank, N.A. | Authentication code with associated confirmation words |
US8914523B2 (en) | 2010-05-17 | 2014-12-16 | Verizon Patent And Licensing Inc. | Dynamic internet protocol registry for mobile internet protocol based communications |
CN102567115B (en) * | 2010-12-23 | 2016-04-06 | 伊姆西公司 | Distribute for information technology resources in cloud system and utilize the apparatus and method of following the tracks of |
CA2823343A1 (en) | 2011-01-03 | 2012-07-12 | David MONTOYA | Geo-location systems and methods |
WO2012106820A1 (en) | 2011-02-08 | 2012-08-16 | Sierra Wireless, Inc. | Method and system for forwarding data between network devices |
US20120215620A1 (en) | 2011-02-18 | 2012-08-23 | Ryan Scott Rodkey | Message Center Application and System |
US8769422B2 (en) | 2011-05-10 | 2014-07-01 | Echostar Technologies L.L.C. | Apparatus, systems and methods for facilitating social networking via a media device |
US8751317B2 (en) | 2011-05-12 | 2014-06-10 | Koin, Inc. | Enabling a merchant's storefront POS (point of sale) system to accept a payment transaction verified by SMS messaging with buyer's mobile phone |
CN102918878B (en) | 2011-05-31 | 2016-03-09 | 华为技术有限公司 | File transmitting method and device |
KR101748732B1 (en) * | 2011-06-27 | 2017-06-19 | 삼성전자주식회사 | Method for sharing contents using temporary keys and Electric device |
US8589481B2 (en) * | 2011-09-14 | 2013-11-19 | Microsoft Corporation | Multi tenant access to applications |
US8584259B2 (en) * | 2011-12-29 | 2013-11-12 | Chegg, Inc. | Digital content distribution and protection |
US9276869B2 (en) * | 2013-01-02 | 2016-03-01 | International Business Machines Corporation | Dynamically selecting an identity provider for a single sign-on request |
-
2014
- 2014-01-09 CA CA2897042A patent/CA2897042A1/en not_active Abandoned
- 2014-01-09 SG SG11201505362WA patent/SG11201505362WA/en unknown
- 2014-01-09 AU AU2014205387A patent/AU2014205387B2/en not_active Ceased
- 2014-01-09 US US14/151,590 patent/US8874770B2/en not_active Expired - Fee Related
- 2014-01-09 BR BR112015016568A patent/BR112015016568A2/en not_active Application Discontinuation
- 2014-01-09 JP JP2015552778A patent/JP6349328B2/en not_active Expired - Fee Related
- 2014-01-09 EP EP14738017.4A patent/EP2943889B1/en not_active Not-in-force
- 2014-01-09 WO PCT/US2014/010905 patent/WO2014110279A1/en active Application Filing
- 2014-01-09 CN CN201480009157.9A patent/CN105164663B/en not_active Expired - Fee Related
- 2014-01-09 KR KR1020157020142A patent/KR20150105359A/en not_active Application Discontinuation
- 2014-09-29 US US14/499,892 patent/US20150019666A1/en not_active Abandoned
-
2015
- 2015-07-08 ZA ZA2015/04903A patent/ZA201504903B/en unknown
- 2015-09-16 US US14/856,345 patent/US9763064B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020072996A1 (en) * | 2000-03-28 | 2002-06-13 | Paiz Richard S. | Method of and apparatus for practicing religious faith through the world wide web via purchase of copies of proprietary religious audio and visual works and merchandise |
US20020120568A1 (en) * | 2000-10-30 | 2002-08-29 | Jonathan Leblang | User-to-user payment service with payee-specific pay pages |
US20070043608A1 (en) * | 2005-08-22 | 2007-02-22 | Recordant, Inc. | Recorded customer interactions and training system, method and computer program product |
Non-Patent Citations (1)
Title |
---|
See also references of EP2943889A4 * |
Also Published As
Publication number | Publication date |
---|---|
AU2014205387B2 (en) | 2019-02-21 |
US8874770B2 (en) | 2014-10-28 |
EP2943889B1 (en) | 2018-10-24 |
EP2943889A1 (en) | 2015-11-18 |
JP2016510459A (en) | 2016-04-07 |
EP2943889A4 (en) | 2016-09-28 |
US20160105776A1 (en) | 2016-04-14 |
US20150019666A1 (en) | 2015-01-15 |
SG11201505362WA (en) | 2015-08-28 |
BR112015016568A2 (en) | 2017-07-11 |
US9763064B2 (en) | 2017-09-12 |
US20140195626A1 (en) | 2014-07-10 |
ZA201504903B (en) | 2016-06-29 |
AU2014205387A1 (en) | 2015-08-20 |
KR20150105359A (en) | 2015-09-16 |
JP6349328B2 (en) | 2018-06-27 |
CN105164663B (en) | 2018-05-01 |
CA2897042A1 (en) | 2014-07-17 |
CN105164663A (en) | 2015-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9763064B2 (en) | Systems and methods for access-controlled interactions | |
US9911134B2 (en) | Recipient centric messaging system and protocols to implement it over data networks | |
US8566414B2 (en) | Systems and methods for subscription management in a multi-channel context aware communication environment | |
ES2862455T3 (en) | Data management in computer and telecommunications networks | |
US8621005B2 (en) | Computer-based methods and systems for arranging meetings between users and methods and systems for verifying background information of users | |
US8364770B2 (en) | Heterogeneous network delivery of electronic messages in accordance with privacy and personalization criteria | |
US8787581B2 (en) | Teired key communication system and method in support of controlled vendor message processing | |
US20140019561A1 (en) | Systems and Methods for Interactive Content Generation | |
US20130217365A1 (en) | Automatic profile update in a mobile device with transactional and social intelligence capabilities | |
US20140244765A1 (en) | System and method for messaging and notification. | |
US11303597B2 (en) | Blockchain-based community messaging system and method thereof | |
US20110161253A1 (en) | Systems and methods for managing social internetwork services | |
CN110622184B (en) | Creation, modification and provision of compliance documents | |
CN103039032B (en) | Communication system and method | |
US20180210964A1 (en) | Third-party database interaction to provision users | |
US20120185545A1 (en) | Method and apparatus for exchange of information | |
US20230087384A1 (en) | Systems and methods for virtual card generation and provisioning for bulk requests | |
US20150319262A1 (en) | Simultaneous formation of associations among multiple members of a social network | |
WO2022162414A1 (en) | Method and system for generating email address based on country code, mobile phone number and domain name | |
KR101916684B1 (en) | Method for transferring message and sorting, receiving and managing of data and message transferring system therefore | |
KR101118105B1 (en) | Method for serving electric business card | |
US9722959B2 (en) | Associating private annotations with public profiles | |
US11956483B2 (en) | Multi-level content delivery system and method thereof | |
WO2018011653A1 (en) | A system and a method for exchanging information over chat system through structured forms | |
US20240095638A1 (en) | Software program system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201480009157.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14738017 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2897042 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2015552778 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015016568 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 20157020142 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014738017 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2014205387 Country of ref document: AU Date of ref document: 20140109 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112015016568 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150709 |