WO2017015695A1 - Système modulaire binaire non hiérarchique pour l'organisation, l'enregistrement, la livraison et la gestion de contenu dans de multiples réseaux privés repérables sur une plateforme générale - Google Patents

Système modulaire binaire non hiérarchique pour l'organisation, l'enregistrement, la livraison et la gestion de contenu dans de multiples réseaux privés repérables sur une plateforme générale Download PDF

Info

Publication number
WO2017015695A1
WO2017015695A1 PCT/AU2016/000265 AU2016000265W WO2017015695A1 WO 2017015695 A1 WO2017015695 A1 WO 2017015695A1 AU 2016000265 W AU2016000265 W AU 2016000265W WO 2017015695 A1 WO2017015695 A1 WO 2017015695A1
Authority
WO
WIPO (PCT)
Prior art keywords
ulp
ulps
binary
content
users
Prior art date
Application number
PCT/AU2016/000265
Other languages
English (en)
Inventor
Simon DORING
Original Assignee
Doring Simon
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2015902981A external-priority patent/AU2015902981A0/en
Application filed by Doring Simon filed Critical Doring Simon
Priority to EP16829482.5A priority Critical patent/EP3329397A4/fr
Publication of WO2017015695A1 publication Critical patent/WO2017015695A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/93Document management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to software applications for delivery, storage, organisation and management of electronic content in user constructed and infinitely expandable LPN's (Locatable Private Networks) and in particular to software applications for non-hierarchical delivery, modular organisation and management of content by multiple non- related persons acting without administrators or moderators.
  • LPN's Local Private Networks
  • the invention has been developed primarily for use in methods and systems for a binary modular, self-searching platform for non-hierarchical electronic content delivery, organisation and management and will be described hereinafter with reference to this application. However, it will be appreciated that the invention is not limited to this particular field of use.
  • Known methods of electronic content delivery, organisation, storage and management in a computing environment are typically based on a hierarchical organisation and access- base model in which content is organised to a tree-like structure with access via an administrator.
  • the electronic content in such known methods is stored as named records that are connected to one another through hierarchical links commonly known as folders.
  • a record is a collection of fields with each field containing only one value.
  • the entity type of a record defines which fields the record contains.
  • Such hierarchical content-base models are preferentially suited to structured electronic content and become less useful as the content becomes semi-structured or unstructured content.
  • Unstructured content refers to computerised information that does not have a rigorous internal structure. Unstructured content can be found in, for example, emails, text messages, reports, presentations, phone notes, agendas and photographs. It is estimated that up to 80% of the content in the real world is unstructured in nature as is a large degree of the civilian communications using that content. Accordingly structured hierarchical content- base systems struggle to maintain the content in a manner that is coherent to all users and is easily managed and searchable by all users, all of the time.
  • Such structured hierarchical systems usually have to negate almost all the needs of some users and some needs of all users, at the same time as satisfying most fully the needs of just one or a few appointed administrators who define all the parameters.
  • all users must adhere to the administrator's systems of ordering and purpose hence they are by definition hierarchical systems even when the level of hierarchical interaction is discernibly small.
  • Typical content-base methods of a hierarchical nature force a structured hierarchy onto unstructured content or communications, which results in a less than efficient content storage, delivery and/or management system, particularly if efficiency is defined by the satisfaction of all users as to purpose, access, security, management and delivery.
  • One arrangement provides a computer program product for providing a system as described herein.
  • One arrangement provides a non-transitive carrier medium for carrying computer executable code that, when executed on a processor, causes the processor to provide a system as described herein.
  • One arrangement provides a system configured for providing a system as described herein.
  • a non- hierarchical binary modular system for organisation, storage, delivery, and management of electronic content in multiple Locatable Private Networks on an overarching Platform.
  • the system may comprise at least two upload portal (ULPs) that may contain information of interest to at least one or a plurality of users.
  • the upload portals (ULP) may each be of a binary compatibility with distinct and inter-related control mechanisms enabling a modular construction, by one or a plurality of users.
  • the system may further comprise contact means between the users in respect of information of interest being a binary modular based omnidirectional and private notification system for maintaining real-time interaction between users in respect of information of interest.
  • the system may further comprise moderation means for the maintenance of Locatable Private Networks formed on the Platform being a binary modular based consensual self-moderation system for maintaining a logical purpose without site administrators or third-party moderators.
  • the system may further comprise security means for the continued existence of Locatable Private Networks formed by users activating at least one ULP containing information of interest on the Platform being a binary modular based security system formed by binary locks attached to each individual ULP and activated by each individual user subscription to the Platform and each individual user activity on the Platform.
  • the system may further comprise a filing means for the user only placement and retrieval of content by distinct hyperlink using a 3 dimensional point placement of all ULPs into a replicate-able multiple point n-dimensional 3D array, each multiple point 3D array having an 'n' reference that allows layering of said multiple point 3D arrays into each other, and each point position being designated by an n-dimensional nomenclature, to create a limitless, anonymous, non-administered, non-hierarchical compartmentalised and uncommon database.
  • the filing means may be an n-dimensional 3D filing system comprising an anonymous n-dimensional 3D tag (a plurality of layers in the same virtual space designated by xyz@n).
  • the anonymous n-dimensional 3D tag provides a direct hyperlink distinct to each and every ULP deposited within the filing system as the LNP's are randomly constructed by users, which negates the need to use a normal tree-like hierarchical filing system created by a normal sequential system.
  • This n-dimensional 3D filing system is expandable in the n- dimension(s) being a direct individual hyperlinked filing system of limitless additional 3- dimensional file fields layered within the same virtual space as previous and future layers.
  • the location of an LNP within an n-dimensional file area gives rise to its nomenclature as a Locatable Private Network containing files tagged only on the basis of a position uniquely referenced by a location/position of the form xyz@n.
  • any particular unique LNP within the many layers of the n-dimensional file area space is also its actual visual position (as visualised in a user interface) as part of a whole and all its related positions as searchable elements exclusive to distinct users within an LNP.
  • the particular LNP is accessible directly from any user's interface via a corresponding 3D visual representation of the file areas which are advantageously navigable and accessed using simple drag, tap and drag functions as would be appreciated by the skilled addressee.
  • the system further comprises computer program code means for an infinite n-dimensional 3D filing system enabling 'Locatable' Private Networks to be visually represented for instant user only access, placement and retrieval purposes, anonymous filing purposes, fractured encrypted filing purposes, visual interface purposes, all governed by the attachment of ULP to other relevant ULP in a logical user only controlled 3 dimensional sequence into an endlessly replicated (n-dimensional) multiple point 3D array file location with no hierarchical file path or file tree that could be hacked by an outside party.
  • an infinite n-dimensional 3D filing system enabling 'Locatable' Private Networks to be visually represented for instant user only access, placement and retrieval purposes, anonymous filing purposes, fractured encrypted filing purposes, visual interface purposes, all governed by the attachment of ULP to other relevant ULP in a logical user only controlled 3 dimensional sequence into an endlessly replicated (n-dimensional) multiple point 3D array file location with no hierarchical file path or file tree that could be hacked by an outside party.
  • a non-hierarchical binary modular system for the organisation, storage, delivery and management of content in multiple Locatable Private Networks on an overarching Platform, the system comprising: at least two upload portals (ULPs) containing information of interest to at least one or a plurality of users, the at least two ULPs each being of a binary compatibility with distinct and inter-related control mechanisms enabling a binary and modular construction, by one or a plurality of users; connection means for the users to define a logical connection between the at least two modular ULPs being a Binary Modular Platform based self-searching system; contact means between the users in respect of information of interest being a Binary Modular Platform based omni-directional and private notification system for maintaining real-time interaction; moderation means for the maintenance of Locatable Private Networks formed on the Platform being a Binary Modular Platform based consensual self-moderation system for maintaining a logical purpose without site administrators or third-party moderators; security means for the continued existence of
  • the security means may further comprise adding a contact's username to a ULP the content of which they intend to thereby share.
  • the binary locks may be slip-paired binary locks comprising a user's own password and a secret auto -generated password formed from that user's username by the platform.
  • the ULP may be adapted to retain electronic content in multiple formats.
  • connection means may utilise a title associated with each ULP to enable a self- searching function to control dual purposes of assembly of person into Locatable Private Networks and the collection of the content contained within the ULPs of interest to each individual user for the purpose of group formation based on conceptual relevance only.
  • the ULP may be one of a selection of two different types of ULP: an Origin ULP or a Related ULP for the purpose of assembling Locatable Private Networks.
  • the two types of Binary Modular ULPs may be used to create large systems comprising connected ULP.
  • the ULPs may be thought of as a Binary Modular depository of a selected content type containing content, which generally is linked to other, related, ULP by relevance to the depositors who have formed a group or association.
  • the origin ULP may have the property of being able to be placed by a user in relation to a specific topic or subject matter and may generally serve as an anchor for any further ULPs (whether these are Origin ULPs, Related ULPs, or any combination of a plurality of Origin and Related ULPs logically connected to an initial Origin ULP as may be determined by a user or users of the system who have formed into a group via the self-search function inherent to all ULPs).
  • the at least two ULPs may be selected from a ULP type comprising either an Origin ULP or a Related ULP.
  • the Origin ULP may be adapted for storing content.
  • the Related ULPs may be adapted for storing content of relevance to the Origin ULP.
  • the system may further comprise a plurality of Related ULPs each comprising a logical connection to at least one or more Origin ULPs and/or to an associated Origin ULP.
  • Each Origin ULP and each Related ULP may accommodate an associated title.
  • the title may or may not be reflective of the type of content contained within the associated ULPs. Construction of a content collection may thereby be constructed in a Binary Modular manner where the content contained within the ULPs may not be searchable.
  • the title of each of the ULPs may be searchable within the Platform.
  • the system may further comprise a consensus based self-moderated system for the exclusion of irrelevant content from a group LPN.
  • a computer program product having a computer readable medium having a computer program recorded therein for providing non-hierarchical binary modular system for delivery, organisation, delivery and management of content in multiple Locatable Private Networks on an overarching Platform.
  • the computer program product may comprise computer program code means for at least two ULPs containing information of interest to at least one or a plurality of users, the at least two ULPs each being of a binary compatibility with distinct and inter-related control mechanisms enabling a modular like construction, by one or a plurality of users.
  • the computer program product may further comprise computer program code means for connection means for the users to define a logical connection between the at least two modular ULPs being a binary modular based self-searching system.
  • the computer program product may further comprise computer program code means of contact means between the users in respect of information of interest being a binary modular based omni-directional and private notification system for maintaining real-time interaction.
  • the computer program product may further comprise computer program code means for moderation means for the maintenance of Locatable Private Networks formed on the Platform being a binary modular based consensual self- moderation system for maintaining a logical purpose without site administrators or third- party moderators.
  • the computer program product may further comprise computer program code means for security means for the continued existence of Locatable Private Networks formed by users activating at least one ULP containing information of interest on the Platform being a binary modular based security system formed by binary locks attached to each individual ULP and activated by each individual user subscription to the Platform.
  • a computer program product having a computer readable medium having a computer program recorded therein for providing non-hierarchical binary modular system for organisation, delivery and management of content in multiple Locatable Private Networks on an overarching Platform
  • the computer program product comprising: computer program code means for at least two ULPs containing information of interest to at least one or a plurality of users, the at least two ULPs each being of a binary compatibility with distinct and inter-related control mechanisms enabling a modular like construction, by one or a plurality of users; computer program code means for connection means for the users to define a logical connection between the at least two modular ULPs being a binary modular based self-searching system; computer program code means for contact means between the users in respect of information of interest being a binary modular based omni-directional and private notification system for maintaining realtime interaction; computer program code means for moderation means for the maintenance of Locatable Private Networks formed on the Platform being a binary modular based consensual self-moderation system
  • the ULPs may be adapted to retain electronic content in multiple formats.
  • the notification system may be continuously adjustable, omni-directional and variably compartmentalised by virtue of the Binary Modular construction.
  • the computer program product may further comprise computer program code means for providing a consensus based self-moderated system for removal of irrelevant content from the Binary Modular ULPs in their binary constructed format.
  • connection means may provide a logical connection between at least two users.
  • a computer program for providing a non-hierarchical system for delivery, organisation and management of content.
  • the program may comprise code for providing at least two ULPs containing information of interest to at least one or a plurality of users.
  • the ULPs may each be of a binary compatibility with distinct and inter-related control mechanisms enabling a modular like construction, by one or a plurality of users.
  • the program may further comprise code for providing connection means for the user to define a logical connection between the at least two ULPs.
  • the program may further comprise code for providing an omni-directional binary-based notification system for maintaining real-time interaction between users in respect of information of interest and relevance to the plurality of users in the subsequent Locatable Private Networks.
  • a computer program for providing a non-hierarchical system for delivery, organisation and management of electronic content comprising: code for providing at least two ULPs containing information of interest to at least one or a plurality of users, the ULPs each being of a modular binary compatibility with distinct and inter-related control mechanisms enabling a binary modular like construction, by one or a plurality of users; code for providing connection means (self-search system) for the users to collectively define a logical connection between the at least two ULPs and therefore between a plurality of users; and code for providing thereafter an omni-directional binary-based voluntary notification system for maintaining real-time interaction between users in respect of information of interest and relevance to the plurality of users in the subsequent Locatable Private Networks.
  • the computer program may further comprise code for providing a consensus based self-moderated system for removal of irrelevant content from the Locatable Private Networks formed by a plurality of users assembling the binary ULPs in their modular constructed format.
  • a computer program element comprising computer program code means to make a computer execute a procedure for providing a non-hierarchical system for delivery, organisation and management of electronic content.
  • the program may comprise code means for providing at least two upload portals (ULPs) containing information of interest to at least one or a plurality of users.
  • the ULPs may each be of a Binary compatibility with distinct and inter-related control mechanisms enabling a Modular construction, by one or a plurality of users.
  • the program may further comprise code means for providing modular connection means for the user to define a logical connection between the at least two ULPs using titles.
  • the program may further comprise code means for providing an omni-directional notification system for maintaining real-time interaction between users in respect of information of interest and relevance to the plurality of users.
  • a computer program element comprising computer program code means to make a computer execute a procedure for providing a non-hierarchical system for delivery, organisation and management of content
  • the program comprising: code means for providing at least two ULPs containing information of interest to at least one or a plurality of users, the ULPs each being of a Binary compatibility with distinct and inter-related control mechanisms enabling a Modular like construction, by one or a plurality of users; code means for providing modular connection means for the user to define a logical connection between the at least two ULPs using titles; and code means for providing an omni-directional notification system for maintaining realtime interaction between users in respect of information of interest and relevance to the plurality of users.
  • the computer program element may further comprise code means for providing a consensus based self-moderated system for removal of irrelevant content from Locatable Private Networks using Binary ULPs in their modular constructed format.
  • the consensus- based self-moderated system may be responsive to the plurality of users whether or not the consensus-based self-moderated system activated on a particular ULP is related to a ULP 'belonging' to any other user.
  • a computer readable medium may have a program recorded thereon.
  • the program may be configured to make a computer execute a procedure to provide a non- hierarchical system for delivery, organisation and management of content in multiple Locatable Private Networks on an overarching platform.
  • a computer readable medium having a program recorded thereon, where the program is configured to make a computer execute a procedure to provide a non-hierarchical system for delivery, organisation and management of content in multiple Locatable Private Networks on an overarching platform
  • a security system for a computing environment.
  • the security system may be formed from the binary modular construction of a ULP shared between at least 2 users and comprising at least 4 unique content elements, at least 2 unique content elements being associated with each one of the at least 2 users and one's own password being sufficient for any one user to access their own content.
  • the security system of 2 unique elements (binary password) associated with any one user being comprised of one self-elected password formed by that user and one secret robot generated password formed by the platform comprised of a 3 character extension to the username of each unique user.
  • the security system of 4 unique elements on a single ULP being activated by the presence of both usernames concomitant with the intention of both parties to privately and securely share it's content, said content having been placed in the ULP by one of the parties who then invites the other party to share that content by adding the other parties username to their ULP.
  • a security system for a computing environment being formed from the binary modular construction of a ULP shared between at least 2 users and comprising at least 4 unique content elements, at least 2 unique content elements being associated with each one of the at least 2 users and being sufficient for any one user to access their content.
  • the security system is further enhanced by the Origin' party inviting a plurality of users to share the content in a single ULP by adding each party's username to the ULP and thereby adding each party's binary passwords to the ULP thereby giving each user access to the ULP via their own self-elected password and enclosing the ULP against all others by a plurality of binary passwords with no limit to the number of binary passwords that may be attached to the ULP.
  • the security system may be a Binary Modular security system.
  • the Binary Modular security system may be an at least 2 half, binary code system with various unique codes in at least 6 parts of 3 slip-paired format or, at least 7 parts of 3 slip-paired format and universal verification code or, at least 4 parts of 2 slip paired format or, 5 parts of 2 slip paired format and a universal verification code.
  • the Binary Modular security system may be adapted for a computing environment.
  • the Binary Modular security system may be formed from the Modular construction of the binary ULPs shared between more than two users that each of the at least two unique content elements (slip pairs) associated with each user is added to the number of unique content elements associated with the binary security system when the plurality of user increases beyond two users.
  • every username in a contact list attached to a ULP there may be an increase by two in the number of unique content elements locking the ULP in the case of the at least four part code and three the number of unique content elements locking the ULP in the case of the at least six part code
  • a Binary Modular based security system for a computing environment.
  • the Binary Modular based security system may be formed from the modular construction of one or more binary ULPs shared between at least 2 users.
  • the Binary Modular based security system may comprise at least 4 unique content elements. At least 2 unique content elements may be associated with each one of the at least 2 users.
  • the binary modular based security system may further comprise a universal verification code.
  • a binary modular based security system for a computing environment, the security system being formed from the binary construction of one or more binary upload portals (ULPs) shared between at least 2 users and comprising at least 4 unique content elements, at least 2 unique content elements being associated with each one of the at least 2 users, and a universal verification code.
  • ULPs binary upload portals
  • a binary modular security system for a computing environment, the binary modular security system being formed from the modular construction of the binary ULPs shared between at least 2 users and comprising at least 5 unique content elements, at least 2 unique content elements be associated with each one of the at least 2 users, and a universal verification code.
  • the verification code may comprise a randomised code generated by a centralised processor associated with the system of the above aspects and from parts of which a daily encryption flip and skip code may be sourced (see Figure 9 for explanation of the flip and skip encryption regime).
  • a binary modular security system for a computing environment.
  • the binary modular security system may be formed from the modular construction of UPLs shared between at least 2 users.
  • the binary modular security system may comprise at least 5 unique content elements.
  • a least 2 unique content elements may be associated with each one of the at least 2 users, and a universal verification code.
  • the verification code may comprise a randomised code generated by a centralised processor associated with the system of the above aspects in association with a user's email address for identification purposes, and from parts of which a daily encryption flip and skip code may be sourced.
  • the at least 2 content elements associated with each of the at least 2 users may be selected from the group comprising: a user's own account access password, a user's username including a random auto generated 3 character extension provided by the Platform.
  • a binary modular security system for a computing environment.
  • the binary modular security system may be formed from the modular construction of the ULPs shared between at least 2 users.
  • the binary modular security system may comprise at least 7 unique content elements. At least 3 of the unique content elements may be associated with each one of the at least 2 users and a verification code may comprise a randomised code generated by a centralised processor associated with the system of the above aspects in association with a user's email address for identification purposes, and from parts of which a daily encryption flip and skip code may be sourced.
  • a binary, modular security system for a computing environment, the binary, modular security system being formed from the modular construction of ULPs shared between at least 2 users and comprising at least 7 unique content elements, at least 3 unique content elements be associated with each one of the at least 2 users and a verification code may comprise a randomised code generated by a centralised processor associated with the system of the above aspects in association with a user's email address for identification purposes, and from parts of which a daily encryption flip and skip code may be sourced.
  • the at least 3 content elements associated with each of the at least 2 users may be selected from the group comprising: a user's own account access password, a user's username including a randomly generated 3 character extension, a site-generated personally unique verification code.
  • the personally unique verification code may comprise a randomised code generated by a centralised processor associated with the system of the above aspects and from which a daily encryption flip and skip code may be sourced.
  • a relay solution computational arrangement using a modification of the binary modular system as disclosed in any one of the preceding aspects.
  • the relay solution computational arrangement may comprise a notification system.
  • the relay solution computational arrangement may further comprise a bi-polar ULP title system.
  • the relay solution computational arrangement may further comprise a self-search system adapted to accelerate the solving of complex mathematical problems.
  • a relay solution computational arrangement using a modification of the binary modular system as claimed in any one of any one of the preceding aspects comprising a notification system; and a bi-polar ULP title system and a self-search system adapted to accelerate the solving of complex mathematical problems.
  • Figures 1A, IB and 1C show a conceptual depiction of a non-hierarchical system for delivery, organisation and management (storage) of content as disclosed herein, namely the Binary Modular Document (BMDocument) formation sometimes described as a table, Figure 1A at a high level of zoom, Figure IB at a medium level of zoom and Figure 1C at a low level of zoom;
  • BMDocument Binary Modular Document
  • Figures 2 A and 2B show a conceptual depiction of the ULPs of the system of Figure 1, Figure 7, Figure 8 and representative of the background activity of Figure 10 and representative of the button activity of Figures 4A and 4B, all comprising an assembly of Origin ULP and a Related ULP respectively as described herein;
  • Figure 3 shows a computing device adapted for methods and systems for a binary modular, self-searching platform for non-hierarchical content delivery, organisation and management (storage) of content;
  • Figures 4A and 4B show conceptual depictions of the Origin and Related ULP's particular features and control options respectively as described herein including a summary of the typical characteristics of each type of ULP in the Binary ULP system;
  • Figure 5A shows a schematic depiction of the relationship links between Origin and Related ULPs
  • Figures 5B & 5C show schematic depictions of the process by which many Origin and Related ULPs may be linked to form a complex platform. From this figure, it would be readily appreciated by the skilled addressee that the Origin and Related ULPs may be linked together in a plurality of strings, tables and 3dimensional (3D) grids to form a complex string, table or 3 dimensional grid of ULPs;
  • Figure 6 shows a schematic depiction of a complex array of Origin and Related ULPs linked to form a complex platform in the form of a Table construction and indicating possible link routes within the Table construction.
  • the Table is referred to in this document as a Binary Modular Document or BMDocument;
  • Figure 7 shows a schematic depiction of a complex array of Origin and Related ULPs linked by a plurality of users to form part of a complex Locatable Private Network in the form of a 3 dimensional construction and indicating possible link routes within the 3 dimensional constructions, and indicative of the organic relationship between tagged files within a Locatable Private Network.
  • the illustration shows just one n-dimensional 3D file area and is indicative of only one dimension of the n-dimensional 3D array filing system which may have thousands or millions of such layers all in the same virtual position;
  • Figure 8 shows a hypothetical illustration of the background connections between locations within the complex array of Origin and Related ULPs linked to form part of a Locatable Private Network as shown by the User Experience Interface of the file area illustrated in Figure 10.
  • Figure 8 illustrates what areas of the n-dimensional file area are being accessed at Figure 10 and represents only a fraction of an LNP file area;
  • Figure 9 shows the flip skip code through its permutations from a sender to a receiver within an LNP for the encryption of data transferred when a notification of a deposit in an existing ULP is accepted and opened. Because the encryption is occurring within an already secure private network there is no need for a matching key regime between parties. A single encryption key is sufficient for all parties sharing the same verification code from which the flip skip code is derived within a high secure network. Encryption here is to protect content at retrieval and deposit via the public hardware of the Internet where it may be intercepted by tapping the data stream and is in addition to current end to end encryption systems.
  • Figure 10 shows an example depiction of a visual interface 1000 adapted to show a file within an LNP of the form shown in the inset 1001 (i.e. a replication of Figure 8), showing a fraction of the entire database with location of areas A, B and C indicative of close quarters retrieval of one's own ULP deposits and related ULP deposits close by in a shared LNP area.
  • Files are located within in the LNP by three different levels of density in a n- dimensional file area and how they relate to the visual interface where they are swiped across within a density layer (e.g. strings A, B & C) and swiped upwards to open at the top of the screen.
  • a density layer e.g. strings A, B & C
  • Section 1003 shows a representation of the entire database with only one's own files visible and manipulatable with interface 1000 as, for example, bright coloured dots inside duller coloured conceptual area bands. Colour coding enables compartmentalisation of one's own files by one's own colour choices.
  • One single dot represents a file location within a concept area and includes areas A, B and C within which one's own ULP's may appear several times or just once within the related area.
  • a double tap action by the user is preferably used to open a single ULP deposit and a single tap action by the user used to close the ULP and revert to the default location interface of Figure 10.
  • Single tapping any ULP in the interface screen is preferably used to immediately bring it to the top of the screen where double tapping will open it.
  • any ULP to the top of the screen from any location will preferably populate areas A, B, and C with all related file areas and their corresponding file densities.
  • the vertical bars with dots at the bottom of 'screen' represent the entire database as visible to a user where the bars and dots would be differing colours representing conceptual file areas and the dots would be brighter areas indicating the presence of a user's own files within the otherwise inaccessible file areas of the platforms database.
  • the user as relating to a particular file subject would define the colour of a particular file on a user's own modular interface.
  • the platform would only assign each ULP file location an n-dimensional file tag (xyz@n), particular files of which are then assigned a colour on the interface screen by the user.
  • the bar and dot screen represents the entire database it will in fact only display the areas of the database where a user's own files are located.
  • Figure 11 shows a conceptualisation of the Wyrdom non-hierarchical systems disclosed in detail herein as applied to existing internet networks compared with a complementary conceptualisation of the current hierarchical state of the internet.
  • Users Refers to random and unrelated members of the public who may come together in net space by means of the non-hierarchical Binary Modular Platform. Users may also be referred to here as members of a Net based LPN, group or association. Users in this document does not refer to members of a closed network, VPN, institution, association, forum, website or other traditional hierarchically based hosted site where they are commonly interacting with the host in isolation to all other users of a site, or if they are interacting with other users are doing so only within the terms and conditions of access dictated by that host, including censorship, fixed interfaces and user shared commonly accessible databases.
  • Author refers to a person whose initial posting of an Origin ULP is considered within a conceptual group to be the main conceptual progenitor for which every other user has joined the relevant LPN regardless of subsequent postings by other users and especially as regards the Binary Modular Document formed by the mass content dump feature that translates a standard static document (such as an Excel table of manufacturers data) into the core operability of an interactive supply chain network and therefore consists of a table of origin and related ULPs ( Figure la,b,c & 6). All members of any other LPN could be considered to be authors of their own conceptually relevant content uploads attached to an initial document or any other part of a network and Author is therefore also an interchangeable term with User,
  • Locatable Private Network Refers to the network of random unrelated users who have formed a group or association on the Binary Modular Platform using the binary modular ULPs and whom, by virtue of the attributes of the binary modular Platform described herein, are interacting within a Locatable Private Network. Formation of an LPN can occur by the deposit by an Author of a BMDocument consisting of a large table of strings itself consisting of one Origin ULP and a fixed number of Related ULPs in strings replicated into tables to compartmentally contain all celled information in an original static document, or a single string of one Origin ULP and one or more Related ULP.
  • An LPN is assembled on the n-dimensional 3D grid array filing system of the Binary Modular Platform and accessible over a public network, such as for example, the Internet, by any number of participants unrelated by hosted purpose or institution, controlled by no one other than the participants directly engaging 'peer-to-peer' for their own purposes, and accessing content in a voluntary manner unfettered to the hosted Binary Modular containment method.
  • a browser based closed network with a definably limited number of participants related by hosted purpose and institution, controlled by administrator, moderator or hosted channel manager, and accessing content in a manner fixed and defined by the host in a singular containment method.
  • Locatable Private Network makes clear the difference between the non-hierarchical Binary Modular Platform disclosed herein and any other hierarchical network platform that may normally be associated with, for example, a Virtual Private Network (VPN) in that the binary modular platform supports private interactions between random users who have found each other on a publically accessible platform (also hence 'Locatable Private Network').
  • a VPN uses tunnelling protocols, point-to-point Wide Area Networks (WAN) and encryption and any group formed in a VPN whether on a single hosted site (e.g. Facebook) or a physically assembled WAN (e.g. multiple nationwide university campus connections), must be accessed by administered subscription only.
  • a VPN cannot support random self-invited inclusions of members of the public from outside the VPN without compromising the internal privacy of the whole network.
  • To access an LPN supported on the binary modular platform does not require any further subscription process than the platform access itself as all ULPs in an LPN are secured independently of the platform security.
  • invitation into an LPN group and the LPN itself is not hierarchically controlled by platform administration or moderation. Subscription to join the platform is for the purpose of accessing the platform only.
  • Locked and compartmentalised binary modular ULPs allow the creation of an infinite number of Locatable Private Networks on the platform by random members of the public and can therefore support further random inclusions of members of the public from outside the LPN's without compromising the internal privacy of any other areas of an LPN supported on the platform.
  • Binary Modular refers to a combination construction methodology that involves a blending together of (i) two distinct binary entities that by their nature are compatible and inseparable for the purposes of their continued existence and/or function and (ii) a modular construction method that requires modules that are by their nature compatible but not inseparable for the purposes of their assembly and reassembly into elements that are functionally greater than in their isolated condition.
  • Binary Modular refers specifically to the Origin ULPs and the Related ULPs, which are designed and function as outlined directly above.
  • the binary modular design of the ULPs on the platform is the unifying technique across the whole platform, in that the following non-hierarchical attributes of the platform are impossible without the compartmentalised binary modular construction method described above, i.e.:
  • the Self-Search System that creates the ability for multiple unrelated users to join together into LPN according to concept and purpose, with no common database 'search of content' facility and no ability to impose an administrative oversight, is only possible if the interactive facility is composed of two compatible but distinct and separated entities for each user that 'find each other' in order to enable the users to come together by using the same modular system of binary modules with similar or same titles. It cannot function when there is only one interactive facility that is shared by all users as in almost all hierarchical systems, as this type of system relies on a common resource content database whereas the binary modular platform relies on having no common resource content database.
  • the Self-Search System to create the Self-Moderated Locatable Private Networks is therefore only possible on a Binary Modular Platform as disclosed herein.
  • the Consensus Based Self-Moderation system for eliminating irrelevant content from the LPN's is driven by all the users in LPN's on the platform being on an equal footing within the system and is only possible on a system using compartmentalised and individually locked ULPs in a non-hierarchical Locatable Private Network.
  • a non-hierarchical Locatable Private Network is impossible on any other type of hierarchically organised Platform or site as they all need some sort of administrator or moderator for the groups to function around a common resource database.
  • n-dimensional 3D filing system that relies on the automatic mapping of the modular construction placement of the binary ULPs in LPN's by random members of the public, to create the platform interface, the xyz@n tagged hyperlink non- hierarchical (treeless and pathless) content retrieval system, the virtual compartmentalised location of the Located Private Networks and parts thereof, the universal virtual 3D drag and tap file opening Interface system and the Establishment system for LNP continuity. All these things are impossible without the user-operated non-hierarchical n-dimensional 3D filing system, which in turn is impossible without the binary modular construction method of the ULPs as it, and all the above 3D features (a to f), is a direct result of the binary modular construction method of the ULPs.
  • ULP Up Load Portal: Refers to one or other of the binary modular elements, Origin ULP and Related ULP (formerly referred to as Start envelope and Other envelope or data packages), which are fundamental to the action of all other elements of the platform described herein and are critical to the purpose of making available, managing and storing content for multiple unrelated participants in an unlimited publically accessible Locatable Private Network on the non-hierarchical platform.
  • a ULP does not refer to a webpage, node, website, folder, file or file tree, forum entry or any other traditional mode of content transfer or storage.
  • a ULP contains a means of entering a title, which guides the Self-Search function of the platform enabling the introduction of like-minded users.
  • a user of the Platform beginning or initiating an interaction with another user activates a ULP string by entering a definition term/s into an Origin ULP and Related ULPs, inserting any type of electronic content, making settings in either the Origin ULP or both Origin and Related ULPs and then posting the strung-together ULPs on the Platform.
  • the user By posting any ULP into the Platform or into an existing LPN the user is in effect plugging their ULP into the notification system of other ULPs in the system.
  • every distinct ULP is assigned an n-dimensional file location tag commensurate with its user assigned position in a LNP. This n-dimensional tag is anonymous, bears no relationship to the content or the title of a ULP, and forms a direct hyperlink to a ULP that can be shared with others.
  • All ULPs at posting contain a minimum of two password locks comprised of the user's account access password and a platform-generated (i.e. automatically generated using a random number/character generator) password based on a secret 3 character inclusion into a user's username.
  • a platform-generated (i.e. automatically generated using a random number/character generator) password based on a secret 3 character inclusion into a user's username.
  • another user may request access by attaching their own Origin ULP to any of the Related ULPs in a string and may be granted access to the content of some or all the associated ULPs according to settings by the original poster of the searched ULP string and that user adding the requester's username to the relevant ULP contact list.
  • a user grants access to another user (by adding their username to a ULP) the two users will form a group made of the contact details of their usernames being in a shared contact list. This group is now a Locatable Private Network, which can in turn be found by others via the self-search function.
  • the ULP/s When the ULP/s are accessed and become shared ULPs by virtue of the shared usernames attached to them they become locked by at least four passwords comprised of both user's account access passwords and two platform generated password based on a secret 3 character inclusions into both user's usernames.
  • the LPN gains more members various different ULPs in a string gain more locks as they gain more usernames in the attached contact lists.
  • a ULP notification is activated between members of the LPN over a network communications medium, such as, for example, the Internet, it presents to any other third party, whether they are other members on the platform or as intercepted by a hacker from outside the Platform as a string of individually locked and titled folder-like entities.
  • [75] Delivery of Content refers to the transmission of content over the Internet between unrelated parties on the Platform using the locked binary modular ULPs in the resultant LPN; as opposed to the transmission of content over the Internet within a closed network of related parties or a VPN or the open transmission of unsecured content between any hosted net users.
  • Delivery of Content implies that the content, like a traditional sealed and addressed envelope, is sealed from and unreadable to anyone who is not the intended recipient within an associated LPN.
  • the ULP's themselves are not delivered, as they are semi-permanent entities in which content is deposited for retrieval by others.
  • a notification goes to a user in the contact list that the content of a ULP has been changed and is now available by all users in the attached contact list for viewing or download.
  • the content is then transmitted over the Internet as a download or as a URL location for viewing, hence delivery of content, not delivery of ULPs.
  • Omni-directional Notification Refers to the multipliable application of notification settings made available by and integral to the binary modular system which allows for highly nuanced directional and discretionary capabilities open to every user and not normally associated with either open or closed hierarchical network systems.
  • the notices are transmitted over the Internet within the Platform from distinct users to other distinct users in multiple directions within each Locatable Private Network formed on the non-hierarchical Binary Modular Platform for the purpose of notifying any other user within a same Locatable Private Network on the Platform they so choose to include in a notification schedule made up of multiple contact lists directly and individually associated with each distinct ULP. Every other user included in a notification schedule within a Locatable Private Network electing to either receive or not receive the notification, further controls such notices.
  • Consensus Based Self-Moderation (Formerly referred to as Democratic Self- Moderation): Refers to a manner of selection and removal of content from groups on the binary modular Platform that involves a set percentage limit of participants within a group, incrementally arrived at, that actions a decision for the rest of the group when content is to be removed from the entire group LPN content collection. Self-Moderation therefore refers to a group of people moderating together their shared content collection by incremental consensus.
  • Self-Search Function refers to the search that is activated from within the Platform by the titles that are assigned to each binary modular ULP placed by a user on the binary modular Platform and which are fundamental to the formation of groups and associations by unrelated persons in a non-hierarchical LPN. It does not refer to an internal search of a common resource database made on a website or search engine by a single user from their own browser which has no affect what-so-ever on any other user of a website or forum that the search is made. It is also in no way equivalent to a content search facility on a normal website or forum which is designed to find the content of documents (in the normal sense) or whole files from a common resource that is administered by hierarchical oversight of a site administrator, forum moderator or channel manager.
  • the binary modular Platform has no unilateral site administrator, forum moderator or channel manager and so it cannot have any commonly accessible content, and so it does not have any commonly used search facility because it has no common database.
  • Document therefore refers to a Binary Modular Document (or BMD) that has omni-directional and scalable networking functionality only possible on the Binary Modular Platform.
  • Slip Paired Binary Lock refers to the action of the binary passwords on a ULP whereby the separate content elements comprising a complete lock on the ULP are made of password pairs derived from at least two users whose usernames appear in the contact list attached to the ULP.
  • One half of a Binary lock is derived from either of the passwords of at least two users sharing a ULP.
  • code pairs are changed at similar but not the same time on either side of the binary lock based on the login times of the usernames, but at different rates in relation to the other code pairs attached to the ULPs which are based on the users own passwords, and in the case of the Ultra high security version the third code pair based on a unique verification code generated by the platform for each user.
  • a slip paired password regime as described above will afford only potential hackers with a very limited window of opportunity in which to crack a password pair to gain access to the secure areas of the system, typically, for example, a day at most or significantly less time, possibly on the scale of hours, to crack a minimum of four passwords because two of them are automatically changing at every user login and every username added to a contact list adds two more passwords to each ULP.
  • Warranted or user-authorised access to the public version of the Platform LPN's can be granted by turning off the 3-character username extension to that unique username and retrieving the warranted user's password from the Platform subscriber data-base, if the user doesn't abide by a warrant to divulge that password themselves or the warrant is a covert warrant.
  • Warranted access to the subscription only High Security version will require the consent of the subscription holder's head authority to turn off the warranted person's 3 character username extension, retrieval of the warranted person's password from the Platform data-base, and then the additional supply by the Platform to the legal authority of a specially issued unique verification code for the legal authorities to access that account. Under 'normal' political circumstances a court would never grant a general access warrant and no specific warrant can compromise the overall privacy of any other ULPs in any LPN's on the Platform.
  • N -Dimensional 3D Filing System Refers to the means of organising, managing and storing ULPs and LPN's on the Binary Modular Platform in a non-hierarchical manner.
  • Normal hierarchical filing systems can use ordering and organising based on alphabetical placement, date of upload, date of update, file size or sort, name of uploaders and or recipients, but none of these systems is suitable on a non-hierarchical Platform.
  • the content of the Platform is completely private even from the Platform itself and the Locatable Private Networks by definition are absolutely private. There is therefore no common database, no hierarchical classifications, designations or upload facilities, no common administrator and no way of having usernames attached to the content other than for user defined notification purposes.
  • This n-dimensional embodiment however provides visual location for the fixed interface purposes while providing a limitless non-hierarchical file system in the background to the interface because a normal 3D axis (xyz) has a maximum of 6 consecutive placements around a conceptually relevant ULP whereas an n-dimensional 3D axis (xyz@n) is completely limitless.
  • xyz@n position tags are attached to each ULP as it is uploaded and cannot bear any relationship to the content of those ULPs or the usernames or titles attached to them.
  • n-dimensional 3D axis (xyz@n) makes it possible to compartmentalise the database to maintain user privacy so that users and only users can build their own databases inside the main database using the binary ULP modules, and modularize the user interface operability, as well as centralise all the user separated databases for overall platform management purposes.
  • Every attachment of a unique ULP into an LPN is therefore located on a virtual n- dimensional axis position in direct 3D relationship to its associated ULP postings within a specific LPN and more broadly within a shared conceptual area defined by that part of the n- dimensional axis grid.
  • the positions can be represented visually on a 3D axis represented by for example 3 planes of 10,000 units left to right (x), 1000 units top to bottom (y) and 100 units front to back (z), making, for example, a one-billion point positions per axis grid area.
  • example one billion point positions may be vertically divided into roughly 100 general subject areas left to right, graduated into transitioning volumes of subject according to usage fluctuations and each assigned a colour on a standard spectrum with every ten positions in each x, y plane assigned a single pixel giving a long narrow slit of pulsating and moving colour at the bottom of an example interface screen.
  • the fluctuations of subject volume will largely settle to roughly consistent amounts and these roughly consistent volumes on an n-dimensional grid will be filled as axis positions next to and surrounding other ULPs on the same layer or corresponding layers of grid positions as described below.
  • N-Dimensional refers to the 1 billion-grid area being infinitely replicable in the same virtual position as the grid onto which it is layered previously and into the future.
  • a new 3D grid position will appear in exactly the same place but will have the designation of a new n-dimension group of one billion. For example xyz@l, xyz@2, xyz@-40 etc. ad- infinitum in both negative and positive directions.
  • Each new 3D grid position will slightly intensify the colour in that area representing the amount of activity within that conceptual area.
  • n-dimensional 3D axes will enable users to note areas of greater and lesser activity as the constellation of concept is navigated but will enable with a single drag in that area, to the top of screen, to take the user to the ULPs associated with their own content at that axis position and their own associated ULPs.
  • Each of the xyz@n positions assigned to a ULP will be the hyperlinked tag of that particular ULP and can be used by the Platform to retrieve the ULP from storage in the cloud the moment it is touched upon by a user.
  • a ULP Before a ULP is placed in the n-dimensional 3D grid by a user, it has only one username attached to it and no active notification settings and therefore does not need an axis position. It therefore can reside in an undesignated state accessible and visible only to that user in a virtual 'foyer' prior to placement in the Platform database where it can be checked for malware etc. As soon as the user attaches it to another ULP in a LPN in anticipation of their request to join being accepted, it becomes a designated file with an n-dimensional 3D axis position tag.
  • n-dimensional 3D axis grid system creates the three following methods of file retrieval for any user.
  • Point positions in the n-dimensional 3D axis grid are accessible at any point with drag and tap of random or particular ULPs to bring them into view, in and out of the grid constellation formed by the virtual 3D representation of the entire platform's tagged database.
  • the representation is not of (and does not have to be) the actual entire database but only a thin skin of active ULPs associated with each users own account activity backgrounded by an algorithmic statistical representation of the entire database. Even so, the statistical representation area not directly associated with a users own account can be accessible by dragging in an area of interest and bringing forth the closest ULPs and their LPN's for inspection as they appear in the UX interface due to the proximity of the user's own account activity to associated concepts around them.
  • N-dimensional 3D grid axis file tags of ULPs are based directly and solely on the ULPs n-dimensional 3D axis position number and can be sent as hyperlinks simply containing the tag as the retrieval code, to other users via internal notification or external email but a receiver cannot access the content unless their username is in the ULP contact list associated with the hyperlink. This enables the location of any ULPs in an LPN to be shared by any user with any other user or external non-user with the intention of expanding an LPN membership without compromising the privacy of any other member.
  • the tag is anonymous, bears no relationship to the content of a ULP, links only to that ULP deposit and only invites the recipient onto that sole ULP's contact list, the sharing of any material on the Platform is possible without compromising the internal security of anyone else's user accounts in the rest of an LPN or the Platform database.
  • the n-dimensional 3D system enables the interface to be designed around a fixed area of virtual file locations that can be divided up into a manageable number of conceptual areas.
  • the screen can easily represent a 1000 across and 100 high (see Figure 10) which can be divided into around hundred areas of conceptual relevance, each with conceptually related xyz coordinates and each assigned a colour which the user will associate with the content they know they have placed into ULP at various locations.
  • the ability to layer many new 3D layers onto the same xyz location enables an infinitely expandable and numerically adjustable file system that can accommodate the consensus based moderation system of eliminating irrelevant content and a standardised fixed 3D touch screen interface to represent it individually for each user access.
  • n-dimensionality enables every file location for every user to be compartmentalised per user interface without needing to actually represent every file in existence to every user.
  • a non-hierarchical system must accommodate at the same time the platform's need for a coherent file system based on conceptualised relevance that is coded with anonymous 3d axis hyperlink tags controlled by users but managed by the platform, and the needs of the users to maintain compartmentalised privacy.
  • This system of file storage & retrieval using anonymous n-dimensional file tags also has implications for the security system. Because the tag is based only on a 3D axis location and not the content at that location, it allows the relevant ULP to be fragmented into multiple storage places in the cloud for extra security.
  • a hyperlink can be made to link with many different locations without replicating the entire content of a ULP, as the hyperlink relates only to a single fractured ULP, not its entire content.
  • the n-dimensional 3D axis filing system forms the basis of the establishment procedure for maintaining an LPN in perpetuity as desired by its members.
  • This establishment procedure is a voluntary procedure undertaken by all members of an LPN wishing to establish their group on a more permanent basis than the standard consensus based self-moderation system will allow for.
  • the procedure involves the members of an LPN agreeing to isolate a core constituency of ULPs from the consensus based self-moderation system thereby 'Establishing' the whole LPN against a possible eventual shifting from an original conceptual purpose.
  • the core of not necessarily more than 5% of an LPN membership as decided by consensus of at least 50% of the group, will by its established existence perpetuate the surrounding LPN that can then continue and expand as described above.
  • This procedure may have a fee attached to the establishment of the core file area elected for establishment, as it is in effect an undertaking by the Platform to archive that core area on behalf of the LPN by turning off the ability of those ULPs to be unplugged from the LPN.
  • the establishment procedure may, in effect, create virtual, if not actual, online real estate as the n-dimensional 3D axis positions covered by an establishment procedure represent an 'authorised' conceptual location that can be on-sold by the LPN group that purchase it if they wished at some stage to devolve themselves from the responsibility of maintaining the LPN and the LPN has by such time gained a value worth maintaining or selling to the general or potential membership.
  • real-time for example “displaying real-time notification” refers to the display of the notification content without intentional delay, given the processing limitations of the system and the time required to accurately process and direct the notification content.
  • near-real-time for example “obtaining real-time or near-real-time content” refers to the obtaining of content either without intentional delay (“real-time”) or as close to real-time as practically possible (i.e. with a small, but minimal, amount of delay whether intentional or not within the constraints and processing limitations of the of the system for obtaining and recording or transmitting the content.
  • real-time intentional delay
  • close to real-time i.e. with a small, but minimal, amount of delay whether intentional or not within the constraints and processing limitations of the of the system for obtaining and recording or transmitting the content.
  • exemplary is used in the sense of providing examples, as opposed to indicating quality. That is, an "exemplary arrangement” is an arrangement provided as an example, as opposed to necessarily being an arrangement of exemplary quality for example serving as a desirable model or representing the best of its kind.
  • the various methods or processes outlined herein may be coded as software that is executable on one or more processors that employ any one of a variety of operating systems or platforms. Additionally, such software may be written using any of a number of suitable programming languages and/or programming or scripting tools, and also may be compiled as executable machine language code or intermediate code that is executed on a framework or virtual machine.
  • inventive concepts may be embodied as a computer readable storage medium (or multiple computer readable storage media) (e.g., a computer memory, one or more floppy discs, compact discs, optical discs, magnetic tapes, flash memories, circuit configurations in Field Programmable Gate Arrays or other semiconductor devices, or other non-transitory medium or tangible computer storage medium) encoded with one or more programs that, when executed on one or more computers or other processors, perform methods that implement the various arrangements of the invention discussed above.
  • the computer readable medium or media can be transportable, such that the program or programs stored thereon can be loaded onto one or more different computers or other processors to implement various aspects of the present invention as discussed above.
  • program or “software” are used herein in a generic sense to refer to any type of computer code or set of computer-executable instructions that can be employed to program a computer or other processor to implement various aspects of arrangements as discussed above. Additionally, it should be appreciated that according to one aspect of the fundamental binary modular construction of the platform, one or more computer programs that when executed perform methods of the present invention will not reside on a single computer or processor, but must be distributed in a modular fashion amongst any number of different computers or processors to implement various aspects of the present invention.
  • Computer-executable instructions may be in many forms, such as program modules, executed by one or more computers or other devices.
  • program modules include routines, programs, objects, components, content structures, etc. that perform particular tasks or implement particular abstract content types.
  • functionality of the program modules may be combined or distributed as desired in various embodiments/arrangements.
  • content structures may be stored in computer-readable media in one suitable form.
  • content structures may be shown to have fields that are related through 2 dimensional location in the content structure but is based on or derived from a 3 dimensional array as is found in common drafting software and which forms the basis of the tagged filing system for storage and management of the content of the Platform and forms the basis of the default user interface of the Platform.
  • Such relationships may likewise be achieved by assigning storage for the fields with locations in a computer-readable medium that convey relationship between the fields of ULPs and each ULP.
  • any suitable mechanism may be used to establish a relationship between information in fields of a content structure, including through the use of pointers, tags or other mechanisms that establish relationship between content elements.
  • inventive concepts may be embodied as one or more methods, of which an example has been provided.
  • the acts performed as part of the method may be ordered in any suitable way. Accordingly, embodiments/arrangements may be constructed in which acts are performed in an order different than illustrated, which may include performing some acts simultaneously, even though shown as sequential acts in illustrative embodiments or arrangements.
  • a reference to "A and/or B, when used in conjunction with open-ended language such as “comprising” can refer, in one embodiment/arrangement, to A only (optionally including elements other than B); in another embodiment/arrangement, to B only (optionally including elements other than A); in yet another embodiment/arrangement, to both A and B (optionally including other elements); etc.
  • an Origin ULP may be placed on its own as an initial origin point for the creation of an LPN or the joining of an LPN by an individual user, but that a Related ULP cannot be placed unless it directly follows the placement of an Origin ULP.
  • the phrase "at least one,” in reference to a list of one or more elements, especially as it applies to the binary modular construction method of Locatable Private Networks on this Platform as disclosed herein, should be understood to mean at least one element selected from any one or more of the elements in the list of elements, but not necessarily including at least one of each and every element specifically listed within the list of elements and not excluding any combinations of elements in the list of elements.
  • This definition also allows that elements may optionally be present other than the elements specifically identified within the list of elements to which the phrase "at least one" refers, whether related or unrelated to those elements specifically identified.
  • At least one of A and B can refer, in one embodiment/arrangement, to at least one, optionally including more than one, A, with no B present (and optionally including elements other than B) but not in another embodiment/arrangement, to at least one, optionally including more than one, B, with no A present; in yet another embodiment/arrangement, to at least one, optionally including more than one, A, and at least one, optionally including more than one, B (and optionally including no other elements); etc.
  • the Binary Modular network construction system has as an essential progenitor of Locatable Private Networks the initial placement of an Origin ULP and subsequent placement of Related ULP or Origin ULPs.
  • the Origin ULP contains the instructions for the more nuanced subsequent notification and media controls of its Related ULPs. This does not limit the further placement of new Origin ULPs or their Related ULPs within the same string or LPN.
  • the first initial placement by any user must be an Origin ULP.
  • a Related ULP by definition cannot precede an Origin ULP unless it is NOT directly related by author.
  • This feature allows a single user to construct multiple contact lists within the same LPN and thereby allows for the creation of multilayered highly secure Intra-networks using the same names in authoritatively separated contact lists within the same organisational LPN.
  • Intranets are currently associated with Internet-separated secure-server systems, which the Binary Modular system makes redundant because only one Internet connected server is necessary to use the much more secure binary modular system.
  • a non-hierarchical system 100 shown conceptually in Figures 1 to 10 for non- hierarchical organisation, delivery and management of content between unrelated individuals over a communications network, such as, for example the Internet, in a multitude of Locatable Private Networks.
  • the system 100 comprises an Omni- Directional voluntary notification and self-searching system for maintaining real-time interaction between users in respect of information of interest.
  • the system 100 further comprises at least two content upload portals (ULPs) 101 comprising information of interest to at least one user; connection means 102 for the user to define a logical connection between the at least two ULPs, the binary modular elements shared between the at least two ULPs, enabling the Omni-Directional voluntary notification system; and the title elements on each ULP enabling the self-searching system for logical group formation.
  • ULPs content upload portals
  • the three foundation techniques of the Internet are the creation of bytes using the binary system of 1 and 0, packet switching of the byte streams, and Hosts (instead of routers), being assigned responsibility for the security and transmission reliability of packet switching, that is, decentralised security.
  • the Internet itself not including node software such as hosts and your own browser, is mostly electronic hardware that carries and routes data in the form of 'bytes' according to 'packet switching' set by software on 'hosts'. Incidentally these three foundation techniques are almost the only non-hierarchical features of the Internet.
  • the systems disclosed herein together apply binary systems, packet switching and decentralised security to user accounts and not just the byte stream alone.
  • the networks would form by people and hosts joining their 'artificial' nodes together, and these data packages in this newly disclosed system must actually be securely packaged.
  • the binary modular systems disclosed herein comprise networks built using a binary modular form of packaging. By design, the presently disclosed binary modular system shifts primary security responsibility from thousands of individual hosts at the edge of the Internet to a single giant host inside the Internet.
  • This 'artificially' recentralised security responsibility uses decentralised usernames to automatically create the 'back-end' passwords that then enables the public and hosts to autonomously utilise binary modular packets equally without host interference, to create their private networks 'peer-to-peer' and access them via their 'front-end' passwords.
  • binary modular system with automation of half of the binary passwords and up-scaling the number of passwords according to user sharing habits makes networking secure by default rather than by individual user effort alone.
  • a Giant Host must be free and open to everyone and everything, so it can't have an administrator or a commonly accessible database since it would fail someone's expectations.
  • the binary modular systems disclosed herein allow everyone to tailor their own sense of hierarchy, order and purpose inside their own networks. Individual users can have as much hierarchy in as many Intranets of access as they wish precisely because the system is so thoroughly non-hierarchical. Additionally the networks need some way of finding each other and the only non-hierarchical system is one based on matching indeterminate conceptual relevance.
  • the modules are therefore like blank envelopes that the users put together by 'addressing' them according to their individual needs.
  • the binary modular systems disclosed herein has its own database but there is no public access into the platform database because there is no common interface and no need for common access. Instead, users build and access their own networks inside the binary modular non-hierarchical and inaccessible database. Every single content upload is in self- contained private binary modules accessible only to the user who uploaded it and their intended recipients and retrievable by direct hyperlink. A Giant Host therefore handles user privacy and security without needing to know, other than file size and type, what the specific content is.
  • the binary modular systems disclosed herein is the digital age version of a truly secure private postal service but it's done by enabling 'miniature' private Internetworks that users build and manage themselves on the hardware of the greater public Internet.
  • a Giant Host gives users private networks where each user, not the host, is responsible for how their content is shared and who joins their networks because the Giant Host manages overall security and thereby provides the means to communicate and network privately. Additionally, the absence of a common interface or database eliminates the main access route typically employed by hackers into the platform database thereby doubly protecting the individual networks created within the system.
  • the Giant Host comprising the binary modular systems disclosed herein puts all hosts and the public on equal footing to go online, peer-to-peer, to do what before could only be done on a hosted site on a host's terms.
  • the binary modular systems disclosed herein let's individual users use the Internet like a private citizen because it makes the Internet their private space. Giant Host security, or 'Ghost' security, is so in the background and all around the underlying platform that it barely affects the user experience at all as it is not the user's responsibility.
  • the binary part of the binary modular systems disclosed herein is the two inseparable digital modules, referred to herein as Up-Load Portals or ULPs.
  • An Origin ULP is a main controller of contact lists, media content and access permissions and Related ULPs are an interdependent level of control that, in unison with the Origin ULP, creates enormous flexibility in control and upload of user content whilst minimising data processing. By putting them together in any order, beginning with just a single Origin ULP, users can have public and private Intranets blended together in networks all using the same contact list.
  • the modular part of the binary modular systems disclosed herein is that the ULPs are plugged together by any number of people to collectively build private networks for any purpose and autonomously create the private notification paths between network members. They are akin to semi-permanent, flexibly addressable envelopes but these are not sent repeatedly. A users will just set them up with their preferred contacts and change the content as needed, and the user's network contacts are notified of those changes according to more settings that both the user and their intended recipients control.
  • each user's username and the title given by each user to their ULPs is publicly visible. The content and the addressee remain confidential.
  • the binary modular systems disclosed herein uses the public face of each ULP to self-search and invite networks and individuals to join together. Members of networks can deliberately locate each other, but similarly named ULPs randomly placed on the binary modular systems disclosed herein will seek out each other to form new networks or join existing networks. It's a 'vernacular switching' system that allows the binary modular systems disclosed herein to be both a randomly public and a deliberately private DIY network builder.
  • ULP titles that are added to a self-search string of ULPs (a string of at least one Origin ULP followed by any number of Related ULPs) the more refined and nuanced the searches will be.
  • a variable-resolution thumbnail of content will also be visible which, in further arrangements of the binary modular systems disclosed herein, may be utilised to provide self-search capabilities based on jpeg and docx files, as well as allowing the ability for such things as public social media mixed into private commercial media networks as in an eminently flexible supply chain network.
  • the binary modular systems disclosed herein use consensual moderation internal to each network (LNP). All users in any network can action a 'Hide' button on every ULP posted to a network to which they have access, including their own, to eliminate trolls and irrelevant content. The 'Hide' action unplugs that particular ULP and its content from the user's notification system. When a critical mass of users in an LPN, for example 50%, all "Hide" a particular ULP, that particular ULP is deemed by the system to contain irrelevant content and is 'unplugged' from all users within the network. This consensus-based hiding eliminates the need for internal moderators or external administrators and makes the decision to hide content immediately effective for the users in a group who activate the 'Hide' action.
  • the binary modular system since the binary modular system has no access to a common database, it is therefore not an archive of any one user's material. Users wishing to utilise the archive functionality of the platform may be provided the possibility to isolate their content from the consensus moderation system. Thus, archived ULPs would have their consensus "Hide” ability turned off, and the user may be charged a fee for this particular service. These archive ULPs would effectively be private non-networked repositories.
  • the networks are formed only around conceptual relevance amongst members of a network, the opportunity also exists in unison with archiving outlined above, to 'Establish' parts of networks as an authority over that conceptual area of a Network. This may involve an establishment fee and a vote by network members that would be suitable for such things as corporate identity, social endeavour, services associations, etc.
  • the platform's conceptual relevance algorithm offers the Internet its first ever online real estate and 'Institutionalised' networks as it will encompass preserving a lot more than a mere domain name.
  • the platform password is secret and may advantageously comprise a randomly inserted 3 -character extension to each user's username so all users are inside the password regime together, not outside trying to get in. Therefore, instead of having to cross a gateway to access data, everyone a user shares data with has already attached that user's passwords to their own ULPs (and vice versa) by way of the contact lists, so there is no longer any need for password matching.
  • Users build the Networks together by plugging their already secure ULPs together. Since the user must already be inside the Platform to be in any Network, the user's half of the binary password pair is always sufficient to view their own content. Indeed, users can actually build their own private Networks involving just them because it's still a binary password that's protecting the content. In effect the user is responsible for their own security but the overall network security is handled by the Platform via their combined usernames.
  • Ghost Security systems disclosed herein are potentially the strongest password regimes in existence and certainly the only one so strong in which all users need only one password to remember, and the only system that increases in strength the more people are given access to each ULP.
  • ghost security as disclosed herein makes every ULP twice as secure as an individual user's own account access, and at least four times as secure as anything on the Internet today. All this is achieved by the binary modular nature of the binary modular systems disclosed herein with a user only needing to remember their own password whilst being protected by a minimum of 3 other passwords.
  • the binary lock for two people in a private network on the binary modular systems Platform disclosed herein is assembled from the passwords outlined below. As contacts are added to ULP postings, all recipient user's binary passwords are added only to the ULPs they share.
  • Such binary password include:
  • the ghost Security as described above will have encryption included in an associated software messaging program (app) adapted for use on a mobile computing device (e.g. a smartphone or tablet device) and another paired layer added to the Ultra high secure subscription versions as discussed herein (see also monetization discussion below) (see Figure 9).
  • apps software messaging program
  • a universal Platform generated verification code is periodically forwarded e.g. monthly, to all subscribers and their recipient contacts.
  • the verification code may be changed by automatic regeneration from the Platform to all users' emails.
  • a user would simply copy and paste the verification code each period to continue using the software application, where the user advantageously is not required to remember it or even know what it is.
  • all users are already within the same Platform hosted private network they all share the one encryption 'key' rather than having two 'keys' that have to match.
  • a 12-digit universal monthly verification code may be employed as the common source for a shorter encryption key changing daily, to run the shared encryption engine.
  • a distinct Platform generated verification code may be sent to each user's email on a periodic schedule e.g. weekly, calculated from the date the user signed-up to the Platform. This would will turn every user's 4 slip paired password into a 6 slip paired password unique to each of them.
  • a corporate or government subscriber may have enough browsers in their private network in close enough proximity for a hacker to gain access to two computers at once, there is no super computer yet invented that could brute force all 6 passwords on a ULP in the window of opportunity that a slip pairing of this size leaves open.
  • a ULP would usually contain a single document at most, not a corporation's entire database so a random type fishing expedition as in most credit detail theft would be rendered practically impossible.
  • the two ULPs 101 may be considered in terms of an "Origin ULP" 101A and a "Related ULP" 101B where there can be any number of Related ULPs 101B associated with any particular Origin ULP 101 A.
  • Logical connection 102 in general will comprise a link back route 102 A and a link forward route 102B via the assembled ULPs.
  • Logical connection 102 may also comprise a further connection 102C to a further Origin ULP to form a logical connection between Origin ULPs which may further comprise a link back route 102D to the initial Origin ULP.
  • Any user can connect a further Origin ULP 101A to any existing ULP (either an Origin ULP 101A or a Related ULP 101B) to form an interested group. Accordingly, the description above could also describe the logical collection of content of interest to any number of people or to a single person.
  • Figures 2 A and 2B also show an example of the particular attributes that each Origin ULP 101A and Related ULP 101B may have in various arrangements of system 100.
  • system 100 may be referred to as an Unlimited Locatable Private Network Builder.
  • System 100 may also be referred to herein as The Wyrdom Binary Modular Platform or more simply: "Binary Modular Platform”.
  • Binary Modular Platform system 100 comprises an Omni-Directional notification system to maintain real-time interaction for groups in strings, tables and 3 dimensional grids throughout each Locatable Private Network on the Binary Modular Platform system. (See uncommon definitions for Binary Modular Platform, Omni Directional Notification, and Locatable Private Network).
  • Binary Modular Platform system 100 comprises two distinct ULP types (or ULPs) 101A and 101B which are adapted to be logically connected in a Binary Modular construction in any order according to the desires of the platform users, each ULP type (or ULP) being adapted to order and rearrange potentially un-connectable content for amplified usability by allowing any number of users to join together with a common purpose and/or subject matter in a Locatable Private Network and the ability to form an unlimited number of Locatable Private Networks within the same Platform.
  • ULP type or ULP
  • Binary Modular Platform system 100 has a Modular user interface system distinct from the Binary Modular delivery of content system which allows re-arrangement of the content of ULPs 101A and 101B into random or patterned arrays distinct to each browser accessing the Platform according to personal habit or desire using the Modular user interface and thereby rearranging of a tabulated 'document' made up of ULPs selected from an original compilation or arrangement. (See the above definition for the term 'document' as used herein) without the need to adhere to any other user's preferences and without disrupting the links (except voluntarily and in certain privacy situations) between ULPs established by the publishers of the original core ULPs 'binary modular document' that began the Locatable Private Network content collection.
  • Binary Modular Platform system 100 permits unlimited exercise of consensual preference with no rules of hierarchy, moderation, censorship, precedent, or pre-determined arrangements or classifications, to inhibit or hinder user relationships, intentions or purpose that could conflict with the conceptual denominator of any Locatable Private Network formed on the Platform. (See the above definition for the term 'Locatable Private Network' as used herein).
  • Binary Modular Platform system 100 makes dialect and group intention integral to search functionality to form community adherences within and between consensual groups to form Locatable Private Networks by making the self-search parameters governed by naming or coding of the ULPs title facility 101A and 101B rather than by the content of the ULPs which is not readable by the Platform and as such the Platform has no administrative oversight of the content of ULPs placed by the users and operates by way of a 'vernacular switching' system (see the above definition for the term 'Self-Search' as used herein).
  • Binary Modular Platform system 100 allows consensual and preferential formation of communities into Locatable Private Networks by a continual updating of intention and purpose by 'unplugging' irrelevant content from an LPN via the user controlled Consensus Based Self-Moderation system. (See uncommon definitions for Consensus Based Self- Moderation as used herein)
  • Binary Modular Platform system 100 exists as a distinct platform to transmit and augment preferential and privileged content as interrelated entity within an LPN where every user builds and rebuilds the Locatable Private Network to suit their needs using the available ULP types 101A and 101B and making logical connections with other users according to their personal requirements or interests in the privacy of a secure LPN.
  • Binary Modular Platform 100 uses compatible digital ULP types, or ULPs 101 A and 101B, which form a Binary Modular foundation for user groups to collectively build strings, tables, 3 -dimensional and n-dimensional grids of information of any size for any purpose within an LPN.
  • the modular strings can comprise any combination in any order of the two ULP types in accordance with their individual requirements.
  • the Origin ULP type 101A is a main controller and can be a secondary controller and the Related ULP type 101B, of which there can be one, a plurality, or any number of such Related ULPs 101B connected to any one or other previous Origin ULP 101A, are an interdependent level of control that in their modular unison creates enormous, almost infinite flexibility.
  • Focus amongst a group is provided by the continuous removal of irrelevant content via a Consensus Based Self- Moderation system. For example, at the moment 50% of participants engaged with a particular Related ULP 101B have chosen to hide that ULP from their individual instance of the Binary Modular Platform system 100 then that particular hidden ULP will be determined to be no longer relevant to the group LPN as a whole and as such the hidden ULP will be 'unplugged' from the LPN of the group. Continuous progress of dialogue and content exchange in the LPN is unimpeded by content stagnation, hierarchical ownership or user precedent.
  • the Consensus Based Self- Moderation system in the Binary Modular Platform system 100 has four functioning levels that allow all users on the platform to clear out irrelevant or offensive material from their LPN without having to rely on an external moderator on the Platform or an internal moderator within any LPN.
  • the Consensus Based Self-Moderation system functions immediately for a person activating it and incrementally for a group until more than 50% of the LPN group activate it, at which point the ULP is 'unplugged' from the LPN's notification system and becomes invisible to the whole LPN but remains on the Platform.
  • a second level is purchased Advertising ULPs, which use the same system but selected ULP are removed completely from the Platform when more than 85% activate it.
  • a third level that applies only to 50% ULPs is the ability of users to check within 2 weeks if a ULP they have hidden from view has been deleted by the whole LPN, giving that user a chance to reconsider their hide which can be either ignored or acted upon by reinstatement into the LPN.
  • a fourth level is users of a ULP that have been 'unplugged' from an LPN group are notified of impending complete removal from the Platform after a set period of inactivity of that ULP.
  • the Consensus Based Self- Moderation system enables any number of users to accumulate relevant content without compromising the ability of all other users to focus on and manipulate the most relevant parts to them. Its functions utilise a model of consensual human interaction with irrelevance clearance where no one user can prevent a group's LPN from continuously maintaining consensus on relevance and purpose.
  • the content of the ULPs 101 is privileged and inaccessible to the owners of the Binary Modular Platform 100 or to anyone not in an LPN recipient list of the uploaders.
  • Binary Modular Platform system 100 has no business knowing the content of the ULPs and treats that confidentiality like a traditional sealed delivery postal service by removing the ability to read the ULP content being delivered. Since the Binary Modular Platform system 100 or system administrators have no ability to read content and therefore no ability to archive content, and all participants carry out the continuous removal of irrelevant content themselves, byte storage needs will be relatively small compared to the volumes of content being transferred through the platform.
  • Locatable content archiving for purposes of the Binary Modular Platform system 100 is preferably limited for a short duration to file size of content at upload for the continuous review of storage needs and statistical purposes, and for a longer duration, international banking identity codes to license hosting of financial institutions, the username identities attached to each ULP on the platform to guide the notification system, maintain user accounts and subscriptions, administer the advertising and banking licence revenue and facilitate the satisfaction of official agency access via court ordered warrant.
  • Most other user content is parked temporarily or longer term behind their own LPN 'fire walled' privacy and as such is being stored by the Binary Modular Platform system 100, but not archived. As its storage is not guaranteed like an archive most of the content will likely be in the form of links to external archive locations. Any archiving of content is the sole responsibility of the individual users of Binary Modular Platform system 100.
  • the system 100 is a shareable content organising tool that allows users including group participants and invited recipients of links to content within system 100 to add relevant content to an existing string of content ULPs (using Origin and/or Related ULPs) and to allow all authors (i.e. users) of that string of ULPs to access the content collected by the group participants and connected within the string of ULPs. It allows a string or line of relevant content to accumulate organically without compromising the ability of authors and recipients in the string to hone in on the most relevant parts to them.
  • the value of the system 100 lies in the ability to quickly build focused searchable strings of content files in any format, for any purpose, by any interested party in the total privacy of a Locatable Private Network.
  • system 100 allows interested parties, such as closed academic circles or privileged business-to-business groups, to share, control and add to relevant content strings or tables (BMDocuments) of content ULPs. It also allows acutely interested parties to send and receive standard content tables, such as business to business price lists or parts lists that can also act as sales content records, direct marketing tools, adjustable and updatable price and parts lists. It also allows non-acutely interested parties to join as for example; bloggers or forum members connected to the same functionality as more privileged members of the LPN.
  • interested parties such as closed academic circles or privileged business-to-business groups, to share, control and add to relevant content strings or tables (BMDocuments) of content ULPs. It also allows acutely interested parties to send and receive standard content tables, such as business to business price lists or parts lists that can also act as sales content records, direct marketing tools, adjustable and updatable price and parts lists. It also allows non-acutely interested parties to join as for example; bloggers or forum members connected to the same functionality as more privileged members of the L
  • a key aspect for business to business interactions is that the system 100 allows an extremely fast upload of existing content formats into the ULPs system 101 so that, for instance, the vast reams of content contained in an Excel parts list can be loaded into an interactive table (BMDocument) simply by feeding the first row of content in the original table into a row of ULPs, then activating the Set Mass Content Dump at the ULP corresponding to the last item in the original content row.
  • BMDocument an interactive table
  • System 100 allows members of broadly interested groups to access and sift relevant content strings for their needs directly on their desktop or device, such as being able to isolate discussion threads from social media or any forum and blog poster without the need to trawl through past history or have one's mailbox inundated. For academic circles this would allow members to isolate particular matters of interest to them within a large group but have to hand any other relevant content attached in the string without the need to search for it separately from memory or ask participants to forward it. Of particular interest for academics is the ability to receive notification for any changes to or uploads of ULPs, which would allow live editing of complex theory discussions without losing track of the development of nuanced alternatives or special interest discussions, and keeping the ability to maintain confidential privilege and focus within a potentially vast discussion board.
  • system 100 is a pre-eminently flexible content management, sales and blog system that relies on a non-hierarchical infinitely reorganizational arrangement of the content contained in ULP tables (BMDocuments).
  • the content is tagged to the original source document via each Origin ULP and is searchable by the title, whether unique or not, but thereafter the receiver of the new binary modular document (BMDocument) can reorganize the ULP strings to suit their purposes by adding or subtracting any Origin and Related ULP strings, 'plug in' extra information as needed or desired using their own ULPs, including preferred ordering and payment systems for in- house clients or the general public, forums, blogs, images and forwarding new rearrangements of ULPs etc.
  • BMDocuments ULP tables
  • the new attached ULPs become both searchable by title (and this search-ability can be exploited by any third parties wishing to join an LPN formed around the original BMDocument) and linked via the notification system back to all users and authors of the original BMDocument inside an LPN.
  • BMDocument table or grid of ULPs of Origin and Related ULPs in rows
  • extra Origin ULPs can be added at any point in each row by any other user that allows the plugging into the BMDocument of images, blog references, forums by the sender or receiver, alerts, ordering systems, etc.
  • the addition of a new Origin ULP by any user triggers a notification to every other user of a new Origin ULP in the string or table unless they have elected not to receive default notification from any or all individual ULP sources. This is controlled from their own Origin ULP under the notification drop down containing all other users privileged by the initial users (Show Notifications).
  • the receiver can adjust the string of ULPs without breaking the link to the source string of ULPs including being able to reorganize dozens or hundreds of source ULPs that may look different and be labelled differently into a rearranged string or table of ULPs with the receivers own naming and ordering system.
  • each ULP is independent of others but shares the same tag/serial number via its associated Origin ULP so that it doesn't matter if the content is separated and rearranged.
  • This means that the original string or table of ULPs can be searched from any individual ULP to which the serial number is attached and the string or table author can send updates back the other way to anyone holding the serial number tag whether or not the string or table has been rearranged.
  • the users of a string of ULPs may be the initial publisher or the rearrangement publisher and each such user can set who can and can't open only their own individual Origin ULPs in the string of ULPs. This is to protect the publishers copyright and privileges and help preserve the raison d'etre of an existing LPN formed around that initial BMDocument.
  • the initial publisher or new user/publishers can also request that information on sales can come back to them from wholesalers and retailers as an automatic ordering/notification system, but those subject persons can elect to turn off that default notification function to protect their privileges.
  • any interface can be available that may or may not look anything like the Interface set by the original BMDocument author.
  • Interfaces are therefore a plug-in app type additional choice unrelated to the Locatable content of the ULP tables and is reconfigurable by any interested user creating or purchasing their own interface from a modular selection.
  • the ULPs are therefore adjustable in their look, such as colour, shape, size, font, position on screen without losing the link to the original content contained or interfering with notification controls.
  • Interfaces are able to be added to as modular plug-in options that anyone can build and sell to other subscribers just like a normal app.
  • a default interface would be made available to access the Platform but thereafter any user accessing their LPN's can create their own Interfaces distinct from the Interface all other members of an LPN are using or simply as distinct for each LPN they are a member of which suit the raison d'etre of the LPN. (For example, some interfaces will suit social media purposes more than some sales interfaces because members of the same LPN may have differing reasons for using the same BMDocument content.)
  • Several optional drag and drop Interfaces with a notification system primarily using colour codes instead of numerals will be available. Additional 'plug-in' apps ports that allow insertion of other 'home-made' interfaces will be available as licensed additions created by the public from open source coding and/or available from professional app builders.
  • Utility fee As a wholly utilitarian entity providing the ability to form scalable networks for any purpose with default privacy as an overall primary function, and no hierarchical host to user engagement entailed, the Binary Modular system as disclosed herein may at some stage have a utility fee attached for its usage on a par with or marginally less than the normal utility fees as found on delivery systems for such utilities as gas, water and electricity but applied globally on a pro rata basis nationally.
  • the Platform Since the primary attribute of the Platform is unlimited numbers of Locatable Private Networks it will be a relatively simple step, and desirable in terms of statutory control, to expand the automatic financial transaction license to apply for an International financial transaction overlay license in which case the Platform will itself become a financial institution for the transfer of funds via the Locatable Private Networks. Until that time, the Platform will be licensed to use an overlay service of an established financial institution such as, for example either MasterCard or Visa to transfer funds but this will be a direct seller to bank relationship that does not involve the Platform. The Platform will only gather a small weekly fee to install that facility into a user's ULP string and maintain the connection. In preferable arrangements, the platform is not the broker, but instead only provides a private venue suitable for the broker and the seller to engage in, for which service the Platform may charge a small flat fee applied globally.
  • Advertising fee Special advertising ULPs that are completely deleted from the Platform after 85% of users hide those ULPs. There are several types of advertising revenue possible on the Platform including banner adds, directed adds and focused adds but this source of income will remain mindful of the LPN nature of the Platform both in access limits to advertisers and the functionality of Advertiser ULPs.
  • High security subscription Subscriber only high security LPN licences. This may, in particular arrangements, involve the sale of annual licenses to use the 7-part Binary lock system within any associated LPN system. This may, in particular arrangements, be available only to large corporations and government agencies because the binary password regime is susceptible to multiple browser access in the case of a hacker accessing browsers side by side in the same LPN network.
  • the high security version (3 slip paired passwords instead of 2 on the public system) would substantially reduce the multiple password-cracking time-window.
  • the large advantage for such an entity is that the multiple LPN's available on the Platform with a single contact list enables corporations and governments to dispense with their own secure and separated servers and to be able to store encrypted content in the cloud. The fee would preferably be applied on a number of browser basis
  • the Binary Modular Platform system 100 may be secured by a unique form of ultra-high security measures termed herein as a Binary Lock or ghost security implementations and variations thereof as would be appreciated by the skilled addressee.
  • Binary Modular Platform system 100 uses the compartmentalised construction of the modular ULPs to create the Binary Lock.
  • the difference between the Binary Modular Platform and traditional 2 key password locks is that the Platform does not need a matching key pair to individual user keys because the ULPs and hence the users are already compartmentalised inside the platform. All the users have their own keys to all of their shared deposits so the platform provides each person another unique and secret key that is intended only to keep anyone else out.
  • the Binary Lock system contemplated by system 100 is easily the strongest password system in existence. It is very simple to use and augments by a factor of billions the security of third party hosting agencies that may be linked to in a ULP. For example, with the high security version of 6 slip paired locks and a universal verification code, the possible combinations assuming an average 9 digit password are around 151,200 billion without each part constantly changing and only using numbers, not the entire keyboard character list. If the entire keyboard character list is involved and the passwords are 12-character minimum the possible combinations are 151,200 billion times 67,000 Trillion. Now add to that the fact that as each additional user is added to a ULP contact list so too are the passwords of their part in the Binary Lock...
  • the verification code may comprise a randomised code generated by a centralised processor associated with the system 100, and sent via a user's email for reinstallation.
  • the Platform provides a constantly changing password in the 3 -character extension of a username every time a login is affected so there is no difference for the user except that they may need only a single password to go to all their other sites if they're stored as open links in the Platform.
  • the 6 part, 3 slip-paired, binary code system is assembled from at least, for example:
  • All verification codes will be randomly changed by automatic generation from the site and may be sent as a secret asterisk string to a user email on a monthly basis from their sign-up. (i.e. the verification code is known only to the site administrator - the user must copy and paste only that secret asterisk string to log them back in to the Platform each month) A user just copy and pastes the secret verification code or clicks the link from email every month to continue using the site but does not have to remember it since it is secret anyway. 3. Randomly whenever a voluntary username account password change is affected which will be encouraged but is well backed up by password re-generation methods 1 and 2.
  • the 4 part, 2 slip-paired, binary code system is assembled from:
  • Another user's own account access password
  • All verification codes will preferably be randomly changed by automatic generation from the site on a monthly basis and is delivered to the user via their recoded email address as a secret asterisk string.
  • a user simply copies the verification code from the email and pastes it into a dialogue box provided at a platform login page each month to be able to continue using the platform 100.
  • the platform login page will keep the verification code in its cached memory for each user whilst the code remains valid (i.e. for at most one month or until a new verification code is emailed to the user) so that the user does not have to remember the verification code each time they log in to the platform.
  • This particular medium security Binary Lock system may be made available to users of system 100 as a standard version free with the website based platform.
  • An alternate version of the medium security Binary Lock disclosed above may alternatively or additionally be employed comprising a Five-part Binary Lock system.
  • This particular Binary Lock system may be implemented as part of a secure, encrypted messaging service.
  • This adjusted version of the Binary Lock may be specifically adapted for use on mobile computing devices such as a smartphone or tablet device in conjunction with texting or similar messaging service in conjunction with a document / pdf / image application on mobile devices.
  • the five-part Binary Lock version enables system 100 to use the verification code as a source for the encryption regime so that all users are within the system of encryption rather than being on either side of it. They therefore share the one 'key' rather than having two 'keys' that must match.
  • the four parts of the Binary Lock as discussed above enable security at either end of a text based 'discussion' between users with the fifth part providing the common source of the universal encryption code securing the content when it is in transit between the users.
  • the five-part Binary Lock system may be incorporated into a software application specifically adapted for use on a mobile computing device.
  • the software application may be purchased by a user for a nominal fee.
  • the purchasing user may then be provided with the ability to distribute the software application to a selected number of others, e.g. between 2 and 10 other individuals depending on the fee paid).
  • Each of those individuals who received the software application from the purchasing user preferably are provided the ability to freely use the software application for their own personal purposes, but may also be provided with the opportunity to purchase further distribution rights for the same nominal fee to distribute the software application to further individuals, and so on, with all users having the same verification code re-issued every month.
  • the software application encompassing the five-part Binary Lock system in preferred arrangements may be a stand-alone messaging system adapted to use a distributed network such as the Internet and it will be appreciated that communications between users utilising the software application will be secure at the devices and between users. It will be functional as both a one to one system and a group conference / sharing system and it will always be a single Locatable Private Network protected by the additional verification code.
  • Each half of a Binary Lock belonging to a user has the same site generated secret 3 character extension to a username and user password of minimum 12 characters (the 4 Parts) but all parties receive the same verification code changed weekly at a regular date (the 1 Part).
  • a user's username including a login generated 3 character extension
  • All verification codes will preferably be randomly changed by automatic generation from the site on a weekly basis and delivered to the user via their recorded email address or mobile device number.
  • a user simply copies the verification code from the email or text and pastes it into a dialogue box provided at a platform login page each week to be able to continue using the software application.
  • the platform login page will keep the verification code in its cached memory for each user whilst the code remains valid (i.e. for at most one month or until a new verification code is emailed to the users) so that the user does not have to remember the verification code each time they log in to the platform.
  • This hidden verification code preferably is a 12 digit number code with a sequential group of 6 numbers picked randomly from it on a daily basis as the flip and skip code to drive the encryption engine in the following manner: (see Figure 9)
  • Each number in the group of 6 numbers represents the amount of bytes in the original byte sequence making up a message or document or image within a text message that will be flipped end to end in its original position.
  • the flip numbers will be an integer value selected from integers 2, 3, 4, 5, 6, 7, 8 and 9 with 0 and 1 being instructed skip numbers.
  • the term 'author' refers to a user who publishes an initial Origin ULP in a string or table of ULPs notated herein with the term BMDocument. It will be appreciated that unless the 'author' can maintain control over subsequent published material many other authors of ULPs in an LPN will soon corrupt it. There-after they all become 'users' assumed to be authors only of their own ULP no matter how many subsequent ULP are attached by others to an initiating BMDocument and no matter how much or how often a BMDocument is manipulated by other 'authors' subsequent to being published.
  • the main functionality of the Binary Modular Platform system 100 is non- hierarchical in terms of, for example: compartmentalisation of LNP into user controlled ULPs enabling non-hierarchical participant control, content manipulation, user management, content distribution, basic functionality, consensus content accumulation, and consensus content filtering. Participant control:
  • ULPs in a string, table or grid can only be changed by deleting and replacing a ULP or by replacement of a ULP's entire content, and only the author of the Origin ULP they belong to can do this.
  • a new Origin or Related ULP attachment or ULP content change triggers a notification through all Origin ULPs attached to that string, table or grid. All other Origin ULP authors are notified of a change only if they choose to receive it.
  • the Binary Modular Platform system 100 can behave like a private secure Intranet with search ability confined only to its own members or as an Extranet with elements of the group at different levels of security to other elements of the LPN. It can be a completely open forum or a completely closed forum or a blend of both conditions. It can be both an Intranet and Extranet network at the same time depending entirely on each member's notification settings in each ULP.
  • Each individual ULP within a string or table can be altered to change access to suit the member or group using and distributing their content.
  • the Platform does not distinguish between a sole user and 10,000 users because it is primarily a packaging system of sealed ULPs in sealed LPNs with distribution of content in ULPs entirely a prerogative of the users.
  • the Binary Modular Platform relies on combinations for the first and second types of binary 'ULPs' (or ULPs as described above) that are modular, reusable digital repositories with a name or coding to identify the content to its author to make it searchable via a designated keyword or serial number.
  • the Binary Modular Platform 100 will be further adapted from the forms herein, thereby to use images as 'ULP identifiers.
  • search criteria for the content other than the author's own naming criteria and, by extension, the community to which they belong or indeed the community whom 'they' create.
  • the system 100 is like a library shelf with no universal access or Dewey number (referencing) system. Instead every item is privately code-worded and made searchable to other discreet recipients who have joined the LPN. Joining an LPN gives access to the ULPs in that LPN at levels expressed by each member's individual needs. Access to a ULP does not grant access to the whole LPN, as each ULP is a distinct compartmentalised entity controlled by the uploaders alone and removed against their wishes only by the consensus deletion system. Access to the ULPs is by request and permission and gains access to other users also by request and permission. But once permission is granted recipients can take and use the content as they wish with the exception of direct text copying permissions, which are voluntarily controlled.
  • a continuous method of updating LPN's on the platform that accounts for the intentions of any number of participants including just one. Controlled by determination of relevance that removes irrelevant, unwanted or offensive ULPs from any content string or BMDocument. Hiding an ULP in a string activates a consensus system. When more than 50% of participants in a group have determined irrelevance by hiding, those ULPs or strings are automatically unplugged from the LPN (meaning unplugged from the notification system within that LPN, but immediately for each person as they use the hide function. Hidden ULPs stay available in a drop down for 2 weeks to allow a recipient to reconsider their hide and reinstate an ULP or string if desired.
  • Unplugged ULPs remain on the platform outside that particular LPN but they may form new LPN as they re-join with others. If an unplugged LPN is unused or inactive for a period of time it is removed with notice, from the Platform entirely to save file space.
  • a second level of hiding is purchased Advertising ULPs, which use the same system but are removed completely from the Platform when more than 85% activate it and without the option to reconsider. Notice of this feature will be part of the subscription rules but will be anonymous in action.
  • the inherent fairness of this system is that hiding normal or advertising ULPs is a vote of no confidence that also allows the hider to immediately put into effect their decision whilst entrusting a quorum to decide if everyone in the group should be prevented from seeing something or denied access to the LPN.
  • Arrangements of system 100 are inherently flexible in a number of key areas including: accessibility to an unlimited number of participants or users; unlimited purposes and applications; organic accumulation of content; and eminently shareable.
  • Organically accumulating content [224] Unlimited incremental and/or exponential content gathering patterns that are bound only by relevance determined by current participants. With the ability to name a ULP for search purposes without involving the content of that ULP in the search, relevance is determined and controlled by members of the LPN and not by external search parameters. This allows for highly confidential and/or highly specialised sharing and search abilities that together with the consensus clearing system reflects the overt intentions of a majority of participants in any LPN.
  • the platform 100 can be anything from a simple alternative to email, drop box, face book or twitter, or a massive interactive content retention and delivery system for large multinationals using private in-house functions, or hundreds of thousands of private market places for products and services eliminating the need for third party transaction hosts such as eBay, Face book, SEEK etc. Without third party governors restricting or manipulating patterns of distribution, a truly consensus based freedom of information is enabled where more secure packaging, increased flexibility of delivery and more focused aim of intention protects sharing.
  • the ease with which participants can join an LPN and submit content ULPs, the control of particular recipients of content string ULPs by authors and the ease of eliminating irrelevant or offensive content means that individual requirements can be much more easily met within a singular platform of delivery. No one is excluded by any hierarchical deficiency of the underlying Binary Modular construction method. Self-Searching
  • the Modular nature of the construction of the platform enables a self-searching functionality whereby the system will enable at least two users to gravitate together if ULPs which they have authored/created are titled similarly.
  • the self-search function recognises similar posting titles and enables each to contact the other via a dropdown once a ULP has been uploaded. This is distinct from the notification system in that the awareness' of a similar ULP is via a voluntary request for such similarities done by activating the dropdown at the title window of an ULP, rather than an unrequested notice from already established recipient/contact lists. It is also distinct form the 'search similar settings', which is used to search one's own content/recipient settings for the purpose of speeding up posting and use of the platform.
  • the system consists of two interdependent ULPs 101 A and 101B that work in unison to give an infinite variety of applications of the content contained in them. They are respectively termed an Origin ULP 101A and an Related ULP 101B.
  • the ULPs are preferably both user titled with no connection to the content they contain but the ability to automatically search for and suggest connection to similar ULP titles and settings by other users both within a closed group and within the open internet.
  • the Origin ULP 101A has a primary settings permission and recipient group and the Related ULP has the ability to fine-tune the first settings group and/or augment the content contained in the first ULP.
  • the Origin ULP 101A can be the equivalent of a prefix and the Related ULP 101B is the equivalent of the suffix or subtext, giving a user the ability to construct an infinite number of ULP sequences from just the two ULPs with differing titles and order of placement in a string.
  • the ULPs themselves contain a much larger mass of unsearchable content with the title acting as the primary search parameter and the permissions and recipient lists the primary direction instructions for the content. For a user this condenses an unwieldy amount of content into a very few distinct terms that others with similar or the same intentions can easily find enabling autonomous groups to 'naturally' form according to intentions and biases of the group.
  • Origin ULP 101 A is a non-restrictive governor of the Related ULPs 101B and forms the marker for a new sequence with new behaviour instructions within a string of Origin and Related ULPs.
  • the sequences of one user can be joined to the Origin and Related ULP sequences of another user creating a new meaningful sequence for either parties or indeed, an infinite and transitioning number of parties.
  • System 100 recognizes and stops mass participants joining a string to prevent stacking of content strings by malware from hacker computers, malcontent or mal-participant group's intent on outnumbering an entire group in order to delete them.
  • System 100 allows the upload of permitted banking facilities into a string by author using a drag a drop facility to subscribe for a financial transaction licence and then provide the banking facility. Algorithm that recognises the international financial transaction identifier codes assigned to all Internet banking facilities. All ULP content is sealed after closing by authors. At the point of loading into ULPs all content is technically readable by the Binary Modular Platform system 100 but the bank recognition algorithm is the only reading of content that occurs. Allows the system 100 to stop the uploading of a transaction site onto the platform until a charge for an on-site transaction licence has been paid under the terms of subscription.
  • System 100 allows any author active in a multiple member string or table to relocate any other author's whole string for their own purposes. Automatically breaks the receivable notification system settings of the original author to protect privacy but preserves the deliverable notification settings. Allows for example, rearrangement of a manufacturers table by specialist retailers who may require only part of a larger parts list.
  • ULP notification system Activates ULP notification system by author to all other authors within a string, of any changes including new ULP attachments or new content in existing ULPs that others have requested notification of. Allows external site notification systems via hyperlinked contents. Allows many changes in an author's string to send notification via one notice. By default disallows notices to be sent.
  • Updates include any content associated with forums, blogs, banking, document edits, and calendar notifications, email address changes, social media etc. This allows the Binary Modular Platform system 100 to function as a social media tracker, task dedicated calendar, retail purchase/marketing information board, live spare parts list, live chat etc. Default algorithm to clear fan card notifications that aren't activated within a time limit of being received. (Clearance rate dropdown selection, e.g. 1 day, 3 days, 1 week etc.) Optional archive by collation preference settings into tables or graph for activity tracking.
  • Default notification array uses colour coded 'fanned card' decks to notify updates from each Origin ULP in a string, rather than numbers. Different colour used to denote weeks, days and or hours since each notice was received and self-deletion to rely on longevity settings. Allows an author to control the appearance of notifications on their User Interface. Default link from the colour card notice to the relevant ULP within a string. Magnified ULP title on scrolling over colour cards on home page. Optional hidden numbered collation system that allows archive and survey of the notifications received and deleted via the colour method to allow traffic tracking in graph form.
  • Park Content Pending will appear and user can deposit their content in this ULP. It will remain private but a notice will be sent to Requested author that will initiate a message chat in the pending ULP to negotiate attachment of the content.
  • Example 1 Parts List to create a BMDocument
  • a standard manufacturer's parts list that contains serial numbers and descriptions as part of the organising material can be turned into an expandable marketing, inventorying, surveying, ordering and notification tool called a Binary Modular Document.
  • the binary modular platform may further include a Mass Content Dump feature which, in operation, inserts the first row of an original static excel document into a first row of ULPs that then automatically loads the rest of the table into a new Binary Modular Document (BMDocument - refer to the definition of this term as defined herein).
  • BMDocument - refer to the definition of this term as defined herein.
  • This new BMDocument of ULPs is sent to clients who can then cherry-pick the rows that suit their needs without changing the interactivity or integrity of the original table for anyone else who receives it.
  • Each original row becomes an interactive string of ULPs that any recipient can attach two-way inventory and ordering ULPs to, or invite special interest groups to join the LPN who may blog about and promote those products, or customers who may wish to buy them on a regular or irregular basis.
  • the initial BMDocument is only editable by its author but gathers links to every group or person who joins the LPN so the author can thereby notify everybody into the future of any relevant changes to a parts list table. This eliminates the need to go through a separate platform such as email or a subscription page to add new suppliers and retailers or notify existing and future customers of changes. It also eliminates the need for total new document update and resend, as each line of an original BMDocument becomes the individual live update portals for the whole Document, as it exists on many different user interfaces.
  • a manufacturer updates a BMDocument by 'editing' the relevant ULP in the table at their head office.
  • the entire network of users will then automatically have their BMDocuments or parts thereof updated and be notified.
  • any user of the BMDocument can upload content relevant to them into a ULP string (or BMDocument row) and a manufacturer/author can choose to be notified of these uploads about their products using their own notification settings.
  • the strings of ULP can grow as long as it is long but all users of it can fully inhabit and exploit just the part of it that is useful to them without debilitating access to the content in either direction of them.
  • the original BMDocument is only editable by its author but the table joins to its notification system every group or person who plugs their own ULPs into it so the original up loader can notify everybody in a network of any relevant changes to a parts list table.
  • This eliminates the need to go through a separate platform such as email or a site-subscription page to add new suppliers, retailers or customers.
  • the platform may also be configured to provide functionality to send recall notices and make obsolete the need for total document update and resending, as each ULP of an original BMDocument is by default the live update link for the whole table.
  • users can add their own drag and connect a banking- function ULP if they're selling something of relevance to the original BMDocument or can include links back to their own selling networks in the platform.
  • Hiding a Related ULP clears just that ULP from view while Hiding an Origin ULP clears it and the entire string of Related ULPs associated with it.
  • a non-active contributor or offensive and irrelevant content will drop out of an LPN unless 51% of members deem it to still be relevant but 49%o don't have to see it or waste energy on it in the meantime, and it will eventually drop off the Platform if not activated by the user so excluded.
  • Each group using an LPN on the Binary Modular Platform system will behave like a vibrant community that reflects the current psychological existence of its members rather than a growing historic archive that eventually becomes overloaded with content out of step with its current users.
  • the community that gathers has to behave in a way that encourages a consensus assessment of relevance to maintain the community.
  • the community exists as the preeminent entity driven by group preservation and not by external non-group considerations.
  • the access permissions required in opening ULPs involves binary ULP settings on each distinct ULP as well as both account holder's identity settings, the contained content remains largely inaccessible outside the LPN community, making flaming or trolling very easy to control.
  • the Binary Modular Platform system 100 described herein creates access to vast amounts of similar content collected and collated by like-minded individuals in a potentially infinite number of previous similar searches. Because each user marks the ULPs as the searchable parameter, it eliminates the need for other individuals to conduct separate searches using similar key words or numbers. A user joining a group will potentially receive a library full of pre-searched results collected by a community of the like-minded.
  • the binary modular systems disclosed herein creates access to vast amounts of data collected and collated by like-minded individuals in previous searches. It's the difference between individually searching alone through millions of possibilities in a single Google search and searching through a list already compiled from Google by many other like-minded people who collated the information for you into a network of conceptual relevance. Because each user titles the ULPs as the searchable parameter, it eliminates the need for others in the network to conduct separate searches using similar key words or numbers. A user joining a network will receive a collection by a community of the like-minded. Trawling through data uses preference bias in others, which greatly accelerates the formation of virtual communities augmented by the fact ULPs work as easily with private messaging as they do with raw data uploads so users are not restricted by having to shift, for example, from a website to email.
  • Networks formed in the binary modular systems disclosed herein will behave like vibrant communities that reflect the current existence of their members rather than an historic archive out of step with its users. As no one person controls the addition and removal of any other member in a network the community has to have a consensus based assessment of relevance to maintain the community. The community is driven by internal preservation and not by external or moderated considerations.
  • the Binary Modular Platform system 100 described herein enables thousands of documents to be shared with distinct focusing of the recipients by every contributor at the same time as allowing informal general discussion in the total privacy of an LPN.
  • the Binary Modular Platform system 100 allows members of broad or narrow interest groups to access and sift many content strings relevant to their own needs directly to a single page on their desktop or device, without the need to trawl through past history or have one's mailbox inundated. Academic users can isolate documents or matters of interest from within disparate groups and sub groups in various strings, without the need to search separately from memory or remind other participants to forward it all in the same LPN
  • the Binary Modular Platform system 100 described herein allows the completely secure transfer of information between people or groups. Unauthorised acquisition of any content whilst in the custody of the Binary Modular Platform system 100 is virtually impossible.
  • the Binary Modular Platform system 100 is the hosting agency for all the LPN's 101 but, similar to a safe deposit box repository, the system has no interest in knowing, and no regular way of accessing the content once it's deposited in a ULP within an LPN. Transparency of an ULP is possible but only to a logged-in author viewing their own ULPs using thumbnails. From outside an LPN the username and title of the ULP is visible with thumbnails of content voluntarily visible.
  • the content of a ULP may be shared by users with others outside an LPN or even outside the Platform, but only if the original author allows it and only by breaking all links back into the LPN and the Platform.
  • the site itself has secure foyers.
  • Foyers in this context means at the moment of upload of content and opening of a content ULP, the content ULP is not linked to the rest of the platform, only the user name account connected to the particular ULP.
  • the ULP is therefore like an anteroom, airlock, or foyer in respect of the rest of the platform. While it is at the user's interface being either loaded into the platform or opened from the platform, it may be overlaid with an algorithm searching for malware, shadow IP addresses that may belong to a hacker, cookies that will interfere with the platform, or the like. Malware scrubbers warn against and prevent incursions into the main content-base via or from users.
  • the Binary Modular Platform system 100 relies on links between ULPs within distinct strings, tables, 3-D grids and LPN's, it has no link between the name or code of an ULP and its content and no link between separate strings, tables, 3-D grids and LPN's.
  • a Binary Lock of one version or another is in place with respect of every individual ULP in an LPN as a default aspect of the Binary Modular construction of the system 100 as a whole.
  • the binary modular systems disclosed herein is the Giant Host (discussed above) for all the ULPs but, similar to a safe deposit box repository the platform has no interest in knowing and no regular way of accessing the content once it's deposited (although the ability for access may be provided where the content is the subject of a Court order or warrant from a law enforcement agency).
  • the platform has no link between the name or code of a ULP and its content, no link between separate Networks and a Binary password on every ULP. Transparency of a ULP with thumbnails is possible but only to a logged-in user viewing their own ULPs, or if they give permission, to members of the network or to the public on the platform as a whole.
  • the platform may also be adapted to use thumbnails as part of the 'vernacular' self-search function in further arrangements of the platform and may also be adapted to create publicly viewable content in selected ULPs in line with the social media needs of networks.
  • the Binary Modular Platform system 100 described herein is basic and versatile enough to collect and collate any content that may be relevant only to a single person or business for only a limited time.
  • the Binary Modular Platform system 100 allows for a continual refreshment of those priorities by simply adding a new ULP to an existing string and hiding an old ULP allowing for new friends, new products, new contacts and new contracts with the whole string shuffling up to reflect the current situation.
  • a virtual market place need only sell a single type of item relevant to all buyers and sellers of that item based only on the name used as a link to join the parties.
  • the Binary Modular Platform system 100 therefore eliminates the third party market-place host where many different things are sold with commissions and within limited definitions and terms of sale, and replaces it with absolutely no limit on how and what can be sold other than the statutory limits of each country and a miniscule financial transaction licence. More than just selling and buying anything in a platform market place dedicated to a particular item only, anyone can add forums, blogs, YouTube links, chat and photo swaps.
  • Binary Modular Platform system 100 enables a genuine online version of the traditional village market place the information being exchanged between buyers and sellers becomes a crucial reason for joining. A new market could spring up every single day exchanging similar items but the 'Search Similar' function will allow for many different people to quickly join together in special interest markets free from external third party exploitation or compulsion and formed in a way that suits their aesthetic ideals and their entrepreneurial limits.
  • the Binary Modular Platform system 100 described herein may in some arrangements be configured to provide user controlled job board sites that do away with third party control of information exchange.
  • a jobs market can be something much more like a local community noticeboard and much less like an international or national job search website.
  • people seeking and offering the same type of job would end up on a single LPN with self-moderation clearing out redundant jobs using the Consensus Based Self-Moderation system and continually updated with new jobs, with no third party controlling the clearing out, the conversations or contact information.
  • Thousands of individual job specific market place LPN's would form similar to the Market Place application where everything of relevance to that specific job type in any format of content could be posted free of charge, unless a banking or advertising licence is required.
  • the Binary Modular Platform system 100 described herein would also allow for far more of the personal and localised 'word of mouth' elements of job and employee hunting that can be found in semi-rural areas or village type situations where external competition or publicity may not be desired or useful and the parties can be protected by being in an LPN.
  • Such posters could use job title, location and local dialect to immediately focus themselves away from standard large job sites or large job market strings in the Binary Modular Platform system and therefore maintain a level of privacy in a small community.
  • the Binary Modular Platform system 100 described herein in alternate arrangements can be configured to form a services market noticeboard, similar to the construction of a goods market and a jobs market.
  • a traditional 'Yellow Pages' type service-listing host is restricted by the amount of content that can be stored versus the profit from advertising and the cost of hierarchically administering a massive common database including keeping content up to date and accurate. Compared to the near total lack of labour costs of an LPN 'database' that is being self- administered and kept up to date by the LPN participants for free.
  • the Binary Modular Platform system 100 allows a service provider to join with other similar providers in their area, or their entire nation, to create informal and formal 'associations' that can correct and augment their own posts with video tutorials, advice strings, whatever! Strings can still have google earth and website links, phone numbers etc. but can be anything else the providers feel like adding to their advertised services. As soon as a group is formed the Consensus Based Self-Moderation system ensures that each association maintains relevance and accuracy to itself with everyone acting as administrator and moderator of the string.
  • Any members of an 'association' hidden off an LPN can simply set up a new LPN relevant to their followers but any true professional associations would disassociate as usual, and in any case they and their customers looking for those services will be equal defmers of the search parameters they can use, making 'false associations' extremely difficult to maintain.
  • the ULP's update notification functionality together with Update ULP Content and Allow ULP Transparency to enable continuously deleted archive-less chat forums with the option to create a permanent record in hard copy off-site and add different content formats in Related ULPs if necessary.
  • SnapChatTM Similar to SnapChatTM, it allows for a user to copy or preserve their own content but not the reply of the recipient unless permission to do so in recipient ULPs is enabled. Once a body of text has been sealed in the ULP it becomes open-able and readable by permitted recipients, but once the reply is received an acknowledgement requires the Update ULP Content to be activated. This automatically deletes the content making the ULP ready for new content, hence the Transparency option to allow authors to read their own initial words before continuing.
  • the Binary Modular Platform system 100 allows groups of 'friends' to exchange content free of the restrictions found on social media networks FacebookTM (prudishness, censorship and generalized friendship categories) or TwitterTM (size restrictions) and excludes the possibility to continuously enrage or obfuscate others with permanently preserved reams of irrelevant text and the inability to permanently remove antagonists.
  • the ability to set and block recipients and the consensus deletion system will keep it relevant and courteous for all users in a friendship group.
  • the binary modular systems disclosed herein may be configured to provide multiple intranets within existing intranets, for example, tailored to the requirements and needs of either Government or Corporate organisations.
  • the notification system, vernacular switching functions and binary modular settings (discussed above) enabled by the binary modular systems disclosed herein provide a limitless number of layers of access within the one system. For example, a multi layered intranet that doesn't need to store its separated recipient groups on separate secure servers because each ULP is twice as secure as the platform itself and can be as distinctly addressed as required.
  • the Ultra-secure version of the ghost Security systems enabled by the binary modular systems disclosed herein i.e. incorporating a 6 part Binary password and encryption regime exclusive to each subscription of purchase may additionally be configured to provided fractured file and encrypted cloud storage as users simply won't need separate secure servers anymore as the security of the networks and configurations formed using the binary modular systems disclosed herein is many orders of magnitude greater than existing password-protected systems.
  • ULPs capable of running 'Bipolar titles', 'Bipolar titles' here means an adjustment of the binary module system to create a 'title' relevant to both the input and the output part of a calculation on the same ULP such that is can be assembled in a modular fashion to other bi-polar ULPs but only in a head to toe means in direct correlation to the sequence of calculations.
  • the self-searching ability of the bi-polar ULP platform enables these calculations to be used in similar or vaguely similar applications without having to repeat the calculations or with various assumptions garnered and used to focus calculations between many different computers engaged in any number of processes where a package of results might have application.
  • the title searching abilities of the bi-polar ULPs can be automated in this system above a level of assumption and set and tested by a human user below it.
  • Figure 3 shows a computing device 300 adapted for methods and systems for a binary modular, self-searching platform for non-hierarchical electronic content organisation in a program application adapted for use on the computing device.
  • computing device 300 is adapted to comprise functionality for communication with the network 320 (for example, the internet), storage capability (such as a content-base) for storing user account content and the like.
  • the network 320 for example, the internet
  • storage capability such as a content-base
  • the system 100 provides a system for methods and systems for a binary modular, self-searching platform for non-hierarchical content organisation.
  • the system 100 depicted in Figures 1, 2A, 2B, 4A and 4B may be implemented using a computing device / computer system 300, such as that shown in Figure 3 wherein the system 100 may be implemented as software, such as one or more application programs executable within the computing device 300.
  • computing system 300 is inextricably linked to the provision of non-hierarchical system 100 for organisation of content.
  • the functions and operations of system 100 are affected by instructions in the software that are carried out within the computer system 300.
  • the instructions may be formed as one or more code modules, each for performing one or more particular tasks.
  • the software may also be divided into two separate parts, in which a first part and the corresponding code modules performs the described methods and a second part and the corresponding code modules manage a user interface between the first part and the user.
  • the software may be stored in a computer readable medium, including the storage devices described below, for example.
  • the software is loaded into the computer system 300 from the computer readable medium, and then executed by the computer system 300.
  • a computer readable medium having such software or computer program recorded on it is a computer program product.
  • the use of the computer program product in the computer system 300 preferably effects an advantageous apparatus for methods and systems for a binary modular, self-searching platform for non-hierarchical content organisation based on the binary construction.
  • the exemplary computing device 300 can include, but is not limited to, one or more arithmetic logic unit or central processing units (CPUs) 301 comprising one or more processors 302, a system memory 303, and a system bus 304 that couples various system components including the system memory 303 to the processing unit 301.
  • the processor(s) 302 may each be a reduced instruction set computer (RISC) or complex instruction set computer (CISC) processor or the like.
  • the system bus 304 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • the bus subsystem 304 may offer parallel connectivity such as Industry Standard Architecture (ISA), conventional Peripheral Component Interconnect (PCI) and the like or serial connectivity such as PCI Express (PCIe), Serial Advanced Technology Attachment (Serial ATA) and the like.
  • Computer program code instructions may be loaded into the device memory 303 from the HDD 311 or from the network 320 using network interface 322.
  • an operating system 308 and one or more software applications or program modules 309 are loaded from the storage device into the memory 303.
  • the CPU 301 fetches computer program code instructions from memory 303, decodes the instructions into machine code, executes the instructions and stores one or more intermediate results in memory 303.
  • the instructions stored in the memory 303 when retrieved and executed by the CPU 301, may configure the computing device 300 as a special-purpose machine that may perform the functions described herein.
  • the computing device 300 also typically includes computer readable media, which can include any available media that can be accessed by computing device 300 and includes both volatile and non-volatile media and removable and non-removable media.
  • computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes media implemented in any method or technology for storage of information such as computer readable instructions, content structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD- ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computing device 300.
  • Communication media typically embodies computer readable instructions, content structures, program modules or other content in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
  • the system memory 303 includes computer storage media in the form of volatile and/or non-volatile memory such as read only memory (ROM) 305 and random access memory (RAM) 306.
  • ROM read only memory
  • RAM random access memory
  • BIOS basic input/output system 307
  • RAM 306- typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 301.
  • Figure 3 illustrates an operating system 308, other program modules 309, and program data 310.
  • the computing device 300 may also include other removable/non-removable, volatile/non- volatile computer storage media.
  • Figure 3 illustrates a hard disk drive 311 that reads from or writes to non-removable, non-volatile magnetic media.
  • Other removable/non-removable, volatile/non-volatile computer storage media that can be used with the exemplary computing device include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like.
  • the hard disk drive 311 is typically connected to the system bus 304 through a non-removable memory interface such as interface 312.
  • the drives and their associated computer storage media discussed above and illustrated in Figure 3, provide storage of computer readable instructions, content structures, program modules and other data for the computing device 300.
  • hard disk drive 311 is illustrated as storing an operating system 33, other program modules 314, and program data 315. Note that these components can either be the same as or different from operating system 308, other program modules 309 and program data 310.
  • Operating system 313, other program modules 314 and program data 315 are given different numbers hereto illustrate that, at a minimum, they are different copies.
  • the computing device also includes one or more input/output (I/O) interfaces 330 connected to the system bus 304 for communicating with one or more peripheral devices including an audio-video interface that couples to output devices including one or more of a video display 334 and loudspeakers 335.
  • the I/O interface 330 may offer both serial and parallel interface connectivity.
  • the I/O interface 330 may comprise a Small Computer System Interface (SCSI), Universal Serial Bus (USB) or similar I/O interface for interfacing with computing device 300.
  • Input/output interface(s) 330 also couple(s) to one or more input devices including, for example a mouse 331, keyboard 332 or touch sensitive device 333 such as for example a smartphone or tablet device.
  • the I/O interface 330 may also comprise a computer to computer interface, such as a Recommended Standard 232 (RS- 232) interface, for interfacing the device 300 with one or more personal computer (PC) devices.
  • the I/O interface 330 may also comprise an audio interface for communicate audio signals to one or more audio devices 335, such as a speaker or a buzzer.
  • the computing device 300 may operate in a networked environment using logical connections to one or more remote computers.
  • the computing device 300 is shown in Figure 3 to be connected to a network 320 that is not limited to any particular network or networking protocols, but which may include, for example Ethernet, Bluetooth or IEEE 802. X wireless protocols.
  • the network 320 may be a wired network, such as a wired EthernetTM network or a wireless network, such as a BluetoothTM network, IEEE 802.1 1 network, or cellular network (e.g. a 3G or 4G telecommunications network).
  • the network 320 may be a local area network (LAN), such as a home or office computer network, or a wide area network (WAN), such as the Internet or private WAN.
  • LAN local area network
  • WAN wide area network
  • the logical connection depicted in Figure 3 is a general network connection 321 that can be a local area network (LAN), a wide area network (WAN) or other network, for example, the internet.
  • the computing device 300 is connected to the general network connection 321 through a network interface or adapter 322 which is, in turn, connected to the system bus 304.
  • program modules depicted relative to the computing device 300, or portions or peripherals thereof may be stored in the memory of one or more other computing devices that are communicatively coupled to the computing device 300 through the general network connection 321.
  • the network connections shown are exemplary and other means of establishing a communications link between computing devices may be used.
  • the above-described arrangements/embodiments of the present disclosure can be implemented in hardware, firmware or via the execution of software or computer code that can be stored in a recording medium such as a CD ROM, a Digital Versatile Disc (DVD), a magnetic tape, a RAM, a floppy disk, a hard disk, or a magneto-optical disk or computer code downloaded over a network originally stored on a remote recording medium or a non- transitory machine readable medium and to be stored on a local recording medium, so that the methods described herein can be rendered via such software that is stored on the recording medium using a general purpose computer, or a special processor or in programmable or dedicated hardware, such as an ASIC or FPGA.
  • a recording medium such as a CD ROM, a Digital Versatile Disc (DVD), a magnetic tape, a RAM, a floppy disk, a hard disk, or a magneto-optical disk or computer code downloaded over a network originally stored on a remote recording medium or
  • the computer, the processor, microprocessor controller or the programmable hardware include memory components, e.g., RAM, ROM, Flash, etc. that may store or receive software or computer code that when accessed and executed by the computer, processor or hardware implement the processing methods described herein.
  • memory components e.g., RAM, ROM, Flash, etc.
  • the execution of the code transforms the general purpose computer into a special purpose computer for executing the processing shown herein and integrally linked therewith.
  • Any of the functions and steps provided in the Figures may be implemented in hardware, software or a combination of both and may be performed in whole or in part within the programmed instructions of a computer.
  • bus and its derivatives, while being described in a preferred embodiment/arrangement as being a communication bus subsystem for interconnecting various devices including by way of parallel connectivity such as Industry Standard Architecture (ISA), conventional Peripheral Component Interconnect (PCI) and the like or serial connectivity such as PCI Express (PCIe), Serial Advanced Technology Attachment (Serial ATA) and the like, should be construed broadly herein as any system for communicating content.
  • parallel connectivity such as Industry Standard Architecture (ISA), conventional Peripheral Component Interconnect (PCI) and the like
  • serial connectivity such as PCI Express (PCIe), Serial Advanced Technology Attachment (Serial ATA) and the like
  • PCIe PCI Express
  • Serial Advanced Technology Attachment Serial ATA
  • 'a computer implemented method' should not necessarily be inferred as being performed by a single computing device such that the steps of the method may be performed by more than one cooperating computing devices.
  • objects as used herein such as 'web server', 'server', 'client computing device', 'computer readable medium' and the like should not necessarily be construed as being a single object, and may be implemented as a two or more objects in cooperation, such as, for example, a web server being construed as two or more web servers in a server farm cooperating to achieve a desired goal or a computer readable medium being distributed in a composite manner, such as program code being provided on a compact disk activated by a license key downloadable from a computer network.
  • content-base and its derivatives may be used to describe a database comprising user content, such as for example, a single not commonly accessible platform database, a set of separated user accessible LPN databases, a system of tagged interconnected databases or the like.
  • the system of content-bases may comprise a set of databases wherein the set of databases may be stored on a single implementation or span across multiple implementations that by virtue of the binary modular security system are not commonly accessible from inside or outside the Platform.
  • the terms “content-base” or “database” is also not limited to refer to a certain database format rather may refer to any database format.
  • database formats may include MySQL, MySQLi, XML or the like.
  • the invention may be embodied using devices conforming to other network standards and for other applications, including, for example other WLAN standards and other wireless standards.
  • Applications that can be accommodated include IEEE 802.1 1 wireless LANs and links, and wireless Ethernet.
  • wireless and its derivatives may be used to describe circuits, devices, systems, methods, techniques, communications channels, etc., that may communicate data through the use of modulated electromagnetic radiation through a non-solid medium. The term does not imply that the associated devices do not contain any wires, although in some embodiments/arrangements they might not.
  • wired and its derivatives may be used to describe circuits, devices, systems, methods, techniques, communications channels, etc., that may communicate data through the use of modulated electromagnetic radiation through a solid medium. The term does not imply that the associated devices are coupled by electrically conductive wires. Processes
  • processor may refer to any device or portion of a device that processes electronic content, e.g., from registers and/or memory to transform that electronic content into other electronic content that, e.g., may be stored in registers and/or memory.
  • a "computer” or a “computing device” or a “computing machine” or a “computing platform” may include one or more processors.
  • the methodologies described herein are, in one embodiment/arrangement, performable by one or more processors that accept computer-readable (also called machine- readable) code containing a set of instructions that when executed by one or more of the processors carry out at least one of the methods described herein.
  • Any processor capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken are included.
  • a typical processing system that includes one or more processors.
  • the processing system further may include a memory subsystem including main RAM and/or a static RAM, and/or ROM.
  • a computer-readable carrier medium may form, or be included in a computer program product.
  • a computer program product can be stored on a computer usable carrier medium, the computer program product comprising a computer readable program means for causing a processor to perform a method as described herein.
  • the one or more processors operate as a standalone device or may be connected, e.g., networked to other processor(s), in a networked deployment, the one or more processors may operate in the capacity of a server or a client machine in server-client network environment, or as a peer machine in a peer-to-peer or distributed network environment.
  • the one or more processors may form a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • one embodiment/arrangement of each of the methods described herein is in the form of a computer-readable carrier medium carrying a set of instructions, e.g., a computer program that are for execution on one or more processors.
  • a computer-readable carrier medium carrying a set of instructions, e.g., a computer program that are for execution on one or more processors.
  • embodiments/arrangements of the present invention may be embodied as a method, an apparatus such as a special purpose apparatus, an apparatus such as a data processing system, or a computer-readable carrier medium.
  • the computer-readable carrier medium carries computer readable code including a set of instructions that when executed on one or more processors cause a processor or processors to implement a method.
  • aspects of the present invention may take the form of a method, an entirely hardware embodiment/arrangement, an entirely software embodiment/arrangement or an embodiment/arrangement combining software and hardware aspects.
  • the present invention may take the form of carrier medium (e.g., a computer program product on a computer-readable storage medium) carrying computer-readable program code embodied in the medium.
  • the software may further be transmitted or received over a network via a network interface device.
  • the carrier medium is shown in an example embodiment/arrangement to be a single medium, the term “carrier medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
  • the term "carrier medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by one or more of the processors and that cause the one or more processors to perform any one or more of the methodologies of the present invention.
  • a carrier medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media.
  • a device A connected to a device B should not be limited to devices or systems wherein an output of device A is directly connected to an input of device B. It means that there exists a path between an output of A and an input of B which may be a path including other devices or means.
  • Connected may mean that two or more elements are either in direct physical or electrical contact, or that two or more elements are not in direct contact with each other but yet still co-operate or interact with each other.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un système modulaire binaire non hiérarchique pour l'organisation, la livraison et la gestion de contenu dans de multiples réseaux privés repérables sur une plateforme générale, le système comprenant une association d'au moins deux portails de chargement (ULP), un moyen de raccordement, un moyen de contact, un moyen de modération, un moyen de sécurité étant un système de sécurité basé sur une plateforme modulaire binaire formé par des verrous binaires fixés à chaque ULP individuel et activés par chaque abonnement d'utilisateur individuel à la plateforme et chaque activité individuelle d'utilisateur sur la plateforme, ainsi qu'un moyen d'archivage utilisant un placement par point en 3D de tous les ULP dans un réseau en 3D à n dimensions à points multiples pouvant être répliqué. Un système de sécurité formé à partir de la construction binaire d'un ou de plusieurs ULP partagés entre au moins 2 utilisateurs et comprenant au moins 2, 4 ou 6 éléments de contenu uniques, au moins 2, 2 ou 3 éléments de données uniques étant associés à chaque utilisateur parmi les au moins 2 utilisateurs.
PCT/AU2016/000265 2015-07-27 2016-07-27 Système modulaire binaire non hiérarchique pour l'organisation, l'enregistrement, la livraison et la gestion de contenu dans de multiples réseaux privés repérables sur une plateforme générale WO2017015695A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP16829482.5A EP3329397A4 (fr) 2015-07-27 2016-07-27 Système modulaire binaire non hiérarchique pour l'organisation, l'enregistrement, la livraison et la gestion de contenu dans de multiples réseaux privés repérables sur une plateforme générale

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2015902981 2015-07-27
AU2015902981A AU2015902981A0 (en) 2015-07-27 Binary modular, self-searching platform for non-hierarchical data organisation

Publications (1)

Publication Number Publication Date
WO2017015695A1 true WO2017015695A1 (fr) 2017-02-02

Family

ID=57883840

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2016/000265 WO2017015695A1 (fr) 2015-07-27 2016-07-27 Système modulaire binaire non hiérarchique pour l'organisation, l'enregistrement, la livraison et la gestion de contenu dans de multiples réseaux privés repérables sur une plateforme générale

Country Status (2)

Country Link
EP (1) EP3329397A4 (fr)
WO (1) WO2017015695A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2379289A (en) * 2001-06-04 2003-03-05 Gordon Ross Multi-dimensional data storage and retrieval using multiple overlapping categorisations
WO2004079484A2 (fr) * 2003-03-06 2004-09-16 Imperial College Innovations Ltd Base de donnees non-hierarchique
US6839843B1 (en) * 1998-12-23 2005-01-04 International Business Machines Corporation System for electronic repository of data enforcing access control on data retrieval
US7159059B2 (en) * 2002-03-01 2007-01-02 Mcneil Donald H Ultra-modular processor in lattice topology
US8904290B2 (en) * 2012-06-26 2014-12-02 Motorola Mobility Llc Non-hierarchical multi-hash table model for menu data representation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1185049A1 (fr) * 2000-08-31 2002-03-06 Siemens Aktiengesellschaft Procédé de sécurisation d'un service Internet supplémentaire
US9959420B2 (en) * 2012-10-02 2018-05-01 Box, Inc. System and method for enhanced security and management mechanisms for enterprise administrators in a cloud-based environment
TW201431343A (zh) * 2013-01-31 2014-08-01 Chunghwa Telecom Co Ltd 認證系統及認證方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6839843B1 (en) * 1998-12-23 2005-01-04 International Business Machines Corporation System for electronic repository of data enforcing access control on data retrieval
GB2379289A (en) * 2001-06-04 2003-03-05 Gordon Ross Multi-dimensional data storage and retrieval using multiple overlapping categorisations
US7159059B2 (en) * 2002-03-01 2007-01-02 Mcneil Donald H Ultra-modular processor in lattice topology
WO2004079484A2 (fr) * 2003-03-06 2004-09-16 Imperial College Innovations Ltd Base de donnees non-hierarchique
US8904290B2 (en) * 2012-06-26 2014-12-02 Motorola Mobility Llc Non-hierarchical multi-hash table model for menu data representation

Also Published As

Publication number Publication date
EP3329397A4 (fr) 2019-05-01
EP3329397A1 (fr) 2018-06-06

Similar Documents

Publication Publication Date Title
JP6964182B2 (ja) 協働スプレッドシート埋め込みおよび管理
US20230289519A1 (en) Embedded spreadsheet data implementation and synchronization
US10296577B1 (en) Spreadsheet comment navigation
US10282405B1 (en) Task management in a collaborative spreadsheet environment
US10904261B2 (en) Intelligent personal information management system
US20150163206A1 (en) Customizable secure data exchange environment
EP2891300B1 (fr) Procédé permettant de générer des flux d'activité de réseau social
US20160162700A1 (en) Method for sharing multiple data items using a single url
De Saulles Information 2.0: New models of information production, distribution and consumption
Pal Applications of secured blockchain technology in the manufacturing industry
US20210201371A1 (en) System and method for managing electronic files and data in a centralized collaborative workspace
Taddeo et al. Analyzing peer-to-peer technology using information ethics
Nguyen et al. A Blockchain‐Based Framework for Developing Traceability Applications towards Sustainable Agriculture in Vietnam
Choe From the land of hibiscus: Koreans in Hawai'i, 1903-1950
Ayre et al. Technology column-blockchain, linked data, and you
Gouru et al. DistProv-data provenance in distributed cloud for secure transfer of digital assets with Ethereum Blockchain using ZKP
EP3329397A1 (fr) Système modulaire binaire non hiérarchique pour l'organisation, l'enregistrement, la livraison et la gestion de contenu dans de multiples réseaux privés repérables sur une plateforme générale
Malik et al. Integration of Blockchain and IoT (BIoT): Applications, Security Issues, and Challenges
Dzhigo Preserving Russia's Digital Cultural Heritage: Acquisition of Electronic Documents in Russian Libraries and Information Centers
Jiang et al. A measurement‐based study on user management in private BitTorrent communities
Lezama-León et al. Smart Government and E-Voting: Opportunities and Challenges in the Implementation of Electronic Voting With Blockchain
Noel et al. SharePoint 2013 unleashed
Natarajan Exploring Decentralized Computing Using Solid and IPFS for Social Media Applications
Navratil Distributed off-chain storage for inter-organizational business process execution
Tong Algorithms, Cloud Computing and Journalism

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16829482

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 11201800227V

Country of ref document: SG

Ref document number: 11201800228T

Country of ref document: SG

NENP Non-entry into the national phase

Ref country code: DE