WO2021016259A1 - Systems and methods of salutation protocol to communicate using a private overlay peer to peer network - Google Patents

Systems and methods of salutation protocol to communicate using a private overlay peer to peer network Download PDF

Info

Publication number
WO2021016259A1
WO2021016259A1 PCT/US2020/042911 US2020042911W WO2021016259A1 WO 2021016259 A1 WO2021016259 A1 WO 2021016259A1 US 2020042911 W US2020042911 W US 2020042911W WO 2021016259 A1 WO2021016259 A1 WO 2021016259A1
Authority
WO
WIPO (PCT)
Prior art keywords
profile
digital
private network
network
invitation
Prior art date
Application number
PCT/US2020/042911
Other languages
French (fr)
Inventor
Billy Gayle Moon
Original Assignee
Whitestar Communications Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Whitestar Communications Inc. filed Critical Whitestar Communications Inc.
Priority to JP2022504523A priority Critical patent/JP7357141B2/en
Priority to BR112022000664A priority patent/BR112022000664A2/en
Priority to EP20844686.4A priority patent/EP4005182A4/en
Priority to KR1020227005600A priority patent/KR102642108B1/en
Publication of WO2021016259A1 publication Critical patent/WO2021016259A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/23Reliability checks, e.g. acknowledgments or fault reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Definitions

  • the present invention is in the technical field of establishing and controlling conversations in social media with the use of secure and encrypted private networks. More particularly, the present invention is in the technical field of facilitating introductions and establishing different levels of relationships. More particularly, the present invention is in the technical field of establishing a simple and straightforward de-centralized and flat hierarchy of different types and categories of computing devices including establishing equal access and rights to a personal computer as well as an internet of things device.
  • Social media typically facilitates user-generated content including text, comments, photos, videos and voice.
  • these various media are generated through "online" interactions and are facilitated by one or more third party platforms such as Twitter, Facebook, Youtube, SnapChat, Instagram, Weibo, LinkedIn and many others.
  • the service provides have recently gone into censorship or "de-platforming" of content based on their or their advertisers best interests and not necessary the interest of their users or user communities, in some cases the censorship is at the direction of a central government but in most cases it is carried out based on arbitrary decisions of the social media service provides.
  • the present invention is systems and methods of modeling a private network communication, comprising: associating a secure and encrypted private network with a digital identity of a first profile; allowing access to the private network by other profiles with digital invitation only; optionally adding another profile to the blacklist by default when a request to communicate is initiated without a digital invitation; sharing the private network communication credentials after authentication of the digital invitation; receiving an encrypted digital relationship request from a second profile for the first profile through the private network communication with an embedded temporal key; decrypting the temporal key and a digital identity of the requestor; sending an authenticated response from the first profile on the digital relationship request and performing one of the following: adding the second profile to a whitelist and communicating with the second profile using a secure channel on the private network if it determined that the authenticated response signal acceptance; or adding the second profile on a blacklist if it is determined that the request is not desired or fails verification.
  • the systems and methods of modeling a private network communication wherein the digital invitation includes signet of the first profile that is shared using one or more of the following: a business card, a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer.
  • the systems and methods of modeling a private network communication wherein the signet includes: embedded information to get one or more of the following: an alias, a public key, a network address, or a phone number; comprises of one or more of the following codes to contain the embedded information: a Quick Response Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code; and comprises of one or more of the following formats to encode the embedded information: binary using type-length-value, concise binary object representation, javascript object notation, extensible Markup Language or key/value pairs.
  • the systems and methods of modeling a private network communication wherein the acceptance types include one or more of the following: permanent acceptance, transient acceptance based on geographic location, transient acceptance expiring with a lapse of a time period.
  • the systems and methods of modeling a private network communication further comprising: sending the digital invitation using an out of band network channel.
  • the systems and methods of modeling a private network communication further comprising: establishing the private network as an overlay network on an existing public network, or establishing the private network as an overlay peer to peer network.
  • the systems and methods of modeling a private network communication wherein the first profile digitally resides on a computing device including one or more of the following: a persona! computer, tablet, laptop, handheld device, smart device, or internet of things device.
  • the systems and methods of modeling a private network communication further comprising: sharing the whitelist or portions of the whitelist with another profile.
  • Fig, 1 shows a diagram illustrating an example of a system and method of modeling a private network with different types and categories of computing devices including internet of things devices,
  • FIG. 2 shows an exploded view of a computing device with overlay network, according to one embodiment
  • Fig, 3 is an exploded view of initial salutation protocol out of band messaging and response, according to one embodiment
  • Fig. 4 is an exploded view of second stage of messaging in a salutation protocol, according to one embodiment.
  • Fig. 5 is an exploded view of the third and final stage of messaging in a salutation protocol, according to one embodiment.
  • Fig. 6 shows a flowchart illustrating an example of a method of a salutation protocol.
  • FIG. 7 is a schematic diagram of exemplary computing devices that can be used to implement the methods and systems disclosed herein, according to one embodiment,
  • Fig, 8 is a staged level diagram illustrating different types of stages in a relationship between two profiles and the corresponding parameters of communication
  • Fig. 9 is an exploded view of an end point profile computing device with different subroutines according to one embodiment.
  • the systems and methods of modeling a private network provides for a completely distributed social media platform that allows both humans and machines to freely associate with one another through a special salutation protocol.
  • this platform there is no central service. There is no cost to stand up the platform. There are no additional costs as each new user joins the social network.
  • a centra! services storing user content and facilitating user content distribution and user discover, all these facilities are provided in a peer to peer social network by the users themselves.
  • No central authority can prevent the users from freely associating with one another or can exclude a given user from participation in social media with this system.
  • This request is sent from user A to user B directly, without the aid of a centralized social media company.
  • this interaction would be carried out via a specialized text message sent via MMS, SMS, or similar.
  • Salutation addressing would simply be by phone number.
  • User A would know the phone number of user B.
  • User A would, through a custom application, send a salutation request to user B via text messaging to user B's cellular phone number.
  • a second application resident on user B's cellular device would receive this specially coded message, extract the salutation and in one embodiment, would present user B the option of accepting or rejecting the salutation sent from user A. Still in other embodiments, the acceptance or rejection could be automated and not require the interaction of user B.
  • IP addresses could be used to send a direct packet or message stream from one user A to another user B.
  • user B would contain within it one or more IP addresses that user B can use to send a response to user A.
  • user B would send an accept message to user A by sending user A a special message.
  • user B would include, amongst other things, certain crypto graphic information necessary to authenticate user B and to encrypt messages that are sent to user B as well as one or more IP addresses that user A can use to send messages to user B.
  • User A would send an encrypted message to user B also containing, amongst other things, certain crypto graphic information necessary to authenticate user A and to encrypt messages that are sent to user A.
  • Each party now has the ability to send information to the other party, directly, peer to peer via the counter parties IP address, again without the aid of a central service.
  • the salutation protocol embodies the means by which users may freely associate
  • the system also provides for a means by which they dissolve their association as well.
  • salutation acceptance messages and messages to dissolve associations are sent via TCP/IP, but many other protocols such as UDP or message busses or even SMS/MMS may also be used.
  • the information contained within an endpoint message is held in a special object. That object contains at least the following information: (i) One or more network addresses that may be used to communicate with the endpoint— in other words an address that that endpoint is willing and able to receive further messages at. (ii) The public key of a public/private key pair to be used for cryptographic purposes, (iii) An alias that is associated with the public/private key pair. The alias is any monotonicaily incrementing number such that each new instance of public/private key pairs has a higher value than the previous key pairs, (iv) A collection of zero or more conversation ID's that have been created by the endpoint, (v) An endpoint ID.
  • the endpoint ID is unique in the entire world and does not require coordination to achieve uniqueness, in our preferred embodiment, the endpoint ID is based on a UUID as defined by the IETF, (vi) A time stamp that indicates when the endpoint object was first created, (vii) A time stamp that indicates the last time the endpoint object was updated, (viii) An arbitrary array of content that is base 8 binary format (aka, a byte array) of zero or more bytes of content associated with the endpoint. In our preferred embodiment, this content is an HTTP encoded document that when rendered will create a hypertext document.
  • a “component” or a “module” as used in this invention disclosure includes a dedicated or shared processor and, typically, firmware or software modules executed by the processor. Depending upon implementation-specific or other considerations, a module can be centralized or its functionality distributed. A component or a module can include special purpose hardware, firmware, or software embodied in a computer-readable medium for execution by the processor.
  • FIG. 1 depicts a diagram 100 illustrating an example of securely connecting computing devices through the private network.
  • the environment includes a first loT devices 110-1 through an nth client system 110-n, private network 140, a smart watch 120, a fitness tracker 130, intelligent voice assistants 150-1 to 150-n, personal computers from 160-1, ..160-n, smartphones from 170-1 to 170-n, servers from 180-1, .. 180-n.
  • the loT device 110 includes components related to network connectivity.
  • the loT device 110 includes speaker and/or microphone hardware and software components to enable receipt and execution of speech commands directly on the device.
  • the loT device 110 does not include a speaker and/or microphone capability to enable receipt and execution of speech commands directly on the device, yet the ioT device is able to communicate with the private network system to enable receipt and execution of speech commands translated to device specific SDK/API commands.
  • the role of the computing device manufacturers is separated from the use of the computing devices. After purchase, a user of the computing device has control on how to use, configure and communicate using that device. Use of any central services including those from the device manufacturer become optional.
  • the IoT devices integrate with the private network with zero additional programming. Different categories of smart watches 120, fitness trackers 130, personal computers 160 are connected securely and with encryption.
  • the Intelligent voice assistants 150 can be from a variety of providers like Amazon Alexa, Google Home Assistant, Apple HomePod, Microsoft Cortana etc.
  • Smartphones 170 and servers 180 with more computing power, bandwidth and capabilities are also connected. For example, the smallest computing device, i.e. an IoT doorbell ring to the largest computing device, a full-fledged server, are both treated equal in the digital private network world.
  • a user profile may be associated with one or more aliases.
  • the smallest building brick for the private network is an alias.
  • an alias may be given the capability to automate and make some of its own decisions. By default communication occurs only with devices that you choose too and not with any random device on a public network or the internet.
  • a single alias is associated with a single computing device.
  • a user or owner has access to the private key associated with the public/private key for that alias.
  • two or more user profiles may have access to the same alias profile.
  • a private network is associated with all aliases that a user owns.
  • a person of ordinary skill in the art would appreciate that by assigning an alias to a computing device that operates independent of a user profile, the private network operates by authenticating each computing device on its network. Authentication is not based on user password or related parameters associated with a user that can be used on more than one device. A user owning more than one computing device, authenticates each device separately using its own associated alias. Authenticating at the device level, enables better control of access on the private network.
  • Computing devices irrespective of their size, category or applications have powerful computing capabilities in terms of processing power and also have network bandwidth to connect
  • the systems and methods of modeling private network allow for these computing devices to connect seamless in a secure and encrypted manner after authentication.
  • Each transaction is an authenticated exchange. Such exchanges eliminate spam. An unwanted sender is revoked from the whitelist of authenticated senders and cannot send spam.
  • the computing devices connect only after establishment of a trusted relationship through the salutation protocol.
  • the computing device can accept public network connections but periodically go into private network mode that are secured and authenticated. This would be equivalent to going into a mute mode when distractions are not needed from strangers that are not already trusted.
  • any profile that is not authorized to be on the whitelist is by default on the blacklist and denied access to secure channel communications.
  • relationship between two profiles can transition from untrusted stranger, trusted transient relationship based on attending an event or conference i.e. triggered for a time period or triggered by proximity to a location, permanent trusted, revoked to blacklist.
  • the salutation protocol is used in a discovery mode when different aliases are open to accepting requests for relationships. Discovery mode allows two devices associated with two different aliases to exchange messages in accordance with the salutation protocol described herein and subsequently established a secure channel for communications.
  • the salutation protocol creates relationship tables for a given alias that can be forwarded to other trusted aliases, i.e., for example, aliases that are owned by your roommate, wife or partner.
  • a user can customize whether to forward ail or portions of relationship tables from one of his aliases.
  • an owner of a house may have setup a relationship table with all the internet of things devices in his home. After a sale or rent of his house, the owner may forward that portion of the relationship table to the new owner or tenant giving or transferring rights to access those devices. If the devices are sold, the previous owner can delete those relationships from his own aliases after transferring them to the new owner.
  • Private Network 140 can be different wireless and wired networks available to connect different computer devices including client and server systems.
  • private network 140 is publicly accessible on the internet through salutation protocol described herein, in an implementation, private network 140 is inside a secure corporate wide area network, in an implementation, private network 140 allows connectivity of different systems and devices using a computer-readable medium.
  • API application programming interface
  • XML extensible markup language
  • JSON Javascript Object Notation
  • PHP Hypertext Preprocessor
  • Python Python
  • Node.js Java/C++ object-oriented programming or simple web-based tools.
  • Different components may also implement authentication and encryption to keep the data and the requests secure.
  • Authentication of a device may be accomplished using public/private key, passwords, token, transaction, biometrics, multi-factor authentication or other methods known in the industry.
  • Encryption may use data encryption standard (DES), TripleDES, RSA, Advanced Encryption Standard (AES) or other methods known in the industry.
  • DES data encryption standard
  • TripleDES TripleDES
  • RSA Advanced Encryption Standard
  • AES Advanced Encryption Standard
  • FIG. 2 is an exploded view 200 of different versions of an implementation that allow application programming interface, hooks, or overlay network connections in a computing device.
  • Alias-1 270 is associated with a computing device that may have one or more operating systems including Android 210, iOS 220 or Iol operating system 230.
  • the computing device includes device hardware 250 that can be controlled by the private network API/ hooks 240 that are incorporated at a system level on the computing device.
  • the private network overlay hooks are implemented using Java Android SDK, Objective C, or C++.
  • any and all communications are controlled using the private network overlay architecture.
  • a user can customize the alias to go in and out of the private network overlay architecture mode.
  • the private network 260 includes other trusted alias 2 to alias n i.e. 280-1 to 280-n ail of which can communicate with Alias-1 using authenticated, secure and encrypted channels.
  • the overlay network is based on peer to peer network.
  • the private network using an overlay network using the existing public network.
  • Fig. 3 outlines 300 the first stage of the salutation protocol to establish a trusted relationship between two aliases.
  • two persons Person A and Person B are strangers to begin with.
  • Alias 310-1,, ,.310-n are owned by Person A.
  • Alias 320-1 is owned by Person B,
  • the profile associated with any alias includes an alias, public key, network address, for example, an ip address and a phone number.
  • the initial profile details are exchanged out of band between Alias 1 and Alias 2 310-1.
  • the business card includes the profile details in a signet 340 for one of the aliases.
  • Each alias has a relationship table for the private network that includes one or more whitelists and one or more blacklists.
  • the out of band exchange occurs using a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer, in one embodiment, the out of band exchange is triggered by a discovery mode.
  • the computing devices go into discovery mode on push of a button or holding of the reset button, on first instance of power up or each time a new network is detected.
  • one or more of the white lists or portions of the whitelists, blacklists or portions of the blacklists can be shared with another trusted alias.
  • the signet includes embedded information to get one or more of the following: an alias, a public key, a network address, or a phone number.
  • the signet comprises of one or more of the following codes to contain the embedded information: a Quick Response Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code.
  • the signet comprises of one or more of the following formats to encode the embedded information: binary using type-length-value, concise binary object representation, javascript object notation, extensible Markup Language or key/value pairs.
  • the signet is made public to all.
  • the signet may be associated with providing a service to all or selling a product.
  • One way of marketing with the use of the private networks is to make the signet publicly available to all for a selected topic of conversation, i.e. sell of a product or a service.
  • the signet is sent using an out of band channel, i.e. similar to a vcard attachment to an email message or a text message that does not use the private network.
  • Aliases 310-1,...310-n form a private network 330 that is not accessible by Alias 320-1 yet. Private Network 330 allows only whiteiist members from the relationship table that currently include all Alias 310-1 to 310-n, Alias 320-1 is absent from the whiteiist and hence is effectively on the blacklist by default.
  • Alias 320-1 sends a request to form a trusted relationship to Alias 310-1 after decoding the signet 340 received out of band.
  • the request 350 includes decoding alias 310-1 information, generating temporal key Tk, Encrypting with public key Epk(Tk), create endpoint payload (EPB) Payload (EPB), encrypt payload with temporal key Etk(Payload), This allows a packet that includes ⁇ My Endpoint Identification, Your Alias, Encrypted Temporal Key, Encrypted Payload ⁇ . The packet is then sent to Alias 310-1.
  • a person of ordinary skiil in the art would understand that it is not possible to create the packet to request to form a trusted relationship without having access to the profile details in the signet.
  • a person cannot communicate with another person without an initial out of band exchange that discloses his public key.
  • the digital signet information may be encoded in a QR Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code. Only after receipt and decoding this initial information, can the initial packet be sent.
  • a person of ordinary skill in the art would understand that a person may create a signet with alias information including public key that expires after a certain period of time. A person may be able to restrict access by changing the digital signet periodically. This allows customized control where only fresh relationships can make the request and expired relationships cannot renew.
  • a person has full control on what he or she receives at a given time from any application, any server or anywhere at any given time. There is no need to customize filters or access rights on different servers or applications. In one embodiment, all of the services and applications are accessed only through the private network overlay as described herein.
  • FIG. 4 with 400 shows second stage of the salutation protocol that follows Fig. 3.
  • Alias 310-1 has now received a packet from Alias 320-1.
  • the packet includes a request to form a trusted relationship.
  • An initial check is done to determine whether the packet sender is on blacklist. If he is already on a blacklist, i.e. if he is listed on blacklist explicitly and not on blacklist by default of not being on the whitelist, then the packet aborts and no response is sent back.
  • the packet is decrypted to get Encrypted Temporal Key, get Alias 320-1 information, lookup Private Key associated with Alias 310-1, decrypt Temporal key with private key, decrypt Payload using Temporal key.
  • Payload. Command Request Relationship, Extract Endpoint information from Payload, automatically accept or Indicate to User for acceptance the new Request, if accept (From user or automated) Request, add to whitelist for Private Network 330 and send Response, else add Endpoint-A (ERA) to blacklist.
  • FIG. 5 with 500 shows the final stage of the salutation protocol that follows Fig. 4 to establish secure channel of communication to the private network 330.
  • 310-1 Alias does the following steps: decode Alias 320-1 information, generate Temporal Key TK, encrypt with Public Key Epk(TK), create Put Endpoint (ERA) Payload(EPB), encrypt payload with Temporal key Etk(Payload), Packet ⁇ My EP Identification, Your Alias, Encrypted Temporal key, Encrypted Payload ⁇ , The packet is then sent to 320-1 Alias.
  • Endpoint A adds Endpoint B on the white list and vice versa.
  • 310-1 Alias and 320-1 Alias can now establish a secure channel and start communicating with encrypted messages.
  • the communication may now include higher level application protocols, including, for example, using Hyper-Text Transport Protocol ("HTTP”), Hyper-Text Transport Protocol Secure (“HTTPS”) or Message Queuing Telemetry Transport (“MQTT”) protocols.
  • HTTP Hyper-Text Transport Protocol
  • HTTPS Hyper-Text Transport Protocol Secure
  • MQTT Message Queuing Telemetry Transport
  • the device communication is encrypted using overlay Transport commands that include Transport control protocol (“TCP”), Web Sockets, MQTT or Constrained Application Protocol (“CoAP”).
  • TCP Transport control protocol
  • Web Sockets Web Sockets
  • MQTT Constrained Application Protocol
  • FIG. 6 depicts a flowchart 600 illustrating an example of a method for a private network modeling.
  • the flowchart 600 is discussed in conjunction with the environment shown in the diagram 100 in FiG, 1.
  • the digital invitation includes signet of the first profile that is shared using one or more of the following: a business card, a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer.
  • a coffee shop may have a signet that is based on geographic proximity depending on when the users are in the coffee shop. Such a signet would expire when there is no geographic proximity, in another example, a conference host may have a signet that expires at the end of the conference. Attendees attending the conference may freeiy use the signet while at the conference.
  • the invention is systems and methods of a private network modeling allow controlled, flexible and customized communications that are secure and encrypted between one or more computing devices that are independent of any public networks or third-party applications or servers.
  • Each alias associated with a computing device establishes a relationship table based on other trusted devices.
  • Figure 7 is a schematic diagram of computing device 700 that can be used to implement the methods and systems disclosed herein, according to one or more embodiments.
  • Figure 7 is a schematic of a computing device 700 that can be used to perform and/or implement any of the embodiments disclosed herein.
  • loT device 110, SDK/API 120, Speak- to-IoT system 130, voice assistants 150, user end devices with mobile apps 170 or 180 of Figure 1 may be the computing device 700.
  • the computing device 700 may represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and/or other appropriate computers.
  • the computing device 700 may represent various forms of mobile devices, such as smartphones, camera phones, personal digital assistants, cellular telephones, and other similar mobile devices.
  • the components shown here, their connections, couples, and relationships, and their functions, are meant to be exemplary only, and are not meant to limit the embodiments described and/or claimed.
  • FIG. 7 shows an example of a computing device 700 on which techniques described here can be implemented.
  • the computing device 700 can be a conventional computer system that can be used as a client computer system, such as a wireless client or a workstation, or a server computer system.
  • the computing device 700 Includes a computer 705, I/O devices 710, and a display device 715.
  • the computer 705 includes a processor 720, a communications interface 725, memory 730, display controller 735, non-volatile storage 740, and I/O controller 745.
  • the computer 705 may be coupled to or include the I/O devices 710 and display device 715.
  • the computer 705 interfaces to external systems through the communications interface 725, which may include a modem or network interface, it will be appreciated that the communications interface 725 can be considered to be part of the computing device 700 or a part of the computer 705.
  • the communications interface 725 can be an analog modem, integrated services for digital networks ("ISDN") modem, cable modem, token ring interface, satellite transmission interface (e.g. "direct personal computer” also known as "direct PC"), or other interfaces for coupling a computer system to other computer systems.
  • the processor 720 may be, for example, a conventional microprocessor such as an Intel Pentium microprocessor or Motorola power PC microprocessor.
  • the memory 730 is coupled to the processor 720 by a bus 750.
  • the memory 730 can be Dynamic Random Access Memory (DRAM) and can also include Static RAM (SRAM).
  • the bus 750 couples the processor 720 to the memory 730, also to the non-volatile storage 740, to the display controller 735, and to the I/O controller 745.
  • the !/O devices 710 can include a keyboard, disk drives, printers, a scanner, and other input and output devices, including a mouse or other pointing device.
  • the display controller 735 may control in the conventional manner a display on the display device 715, which can be, for example, a cathode ray tube (CRT) or liquid crystal display (LCD).
  • the display controller 735 and the I/O controller 745 can be implemented with conventional well-known technology.
  • the non-volatile storage 740 is often a magnetic hard disk, an optical disk, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory 730 during execution of software in the computer 705.
  • machine-readable medium or “computer-readable medium” includes any type of storage device that is accessible by the processor 720 and also encompasses a carrier wave that encodes a data signal.
  • the computing device 700 is one example of many possible computer systems that have different architectures.
  • personal computers based on an Intel microprocessor often have multiple buses, one of which can be an I/O bus for the peripherals and one that directly connects the processor 720 and the memory 730 (often referred to as a memory bus).
  • the buses are connected together through bridge components that perform any necessary translation due to differing bus protocols.
  • Network computers are another type of computer system that can be used in conjunction with the teachings described here.
  • Network computers do not usually include a hard disk or other mass storage, and the executable programs are loaded from a network connection into the memory 730 for execution by the processor 720.
  • a Web TV system which is known in the art, is also considered to be a computer system, but it may lack some of the components shown in FIG. 7, such as certain input or output devices.
  • a typical computer system will usually include at least a processor, memory, and a bus coupling the memory to the processor.
  • FIG. 7 shows an example of the computing device 700
  • a computer system will include a processor, memory, non-volatile storage, and an interface.
  • a typical computer system will usually include at least a processor, memory, and a device (e,g., a bus) coupling the memory to the processor.
  • the processor can be, for example, a general-purpose central processing unit (CPU), such as a microprocessor, or a special-purpose processor, such as a microcontroller.
  • CPU general-purpose central processing unit
  • microprocessor such as a microprocessor
  • FIG. 7 An example of a computer system is shown in FIG. 7.
  • the memory can include, by way of example but not limitation, random access memory (RAM), such as dynamic RAM (DRAM) and static RAM (SRAM).
  • RAM dynamic RAM
  • SRAM static RAM
  • the memory can be locai, remote, or distributed.
  • computer-readable storage medium is intended to include only physical media, such as memory.
  • a computer-readable medium is intended to include all mediums that are statutory (e.g., in the United States, under 35 U.S.C. 101), and to specifically exclude all mediums that are non-statutory in nature to the extent that the exclusion is necessary for a claim that includes the computer-readable medium to be valid.
  • Known statutory computer-readable mediums include hardware (e.g., registers, random access memory (RAM), non- volatile (NV) storage, to name a few), but may or may not be limited to hardware.
  • the bus can also couple the processor to the non-volatile storage.
  • the non-volatile storage is often a magnetic floppy or Hard disk, a magnetic-optical disk, an optical disk, a read-only memory (ROM), such as a CD-ROM, EPROM, or EEPROM, a magnetic or optical card, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory during execution of software on the computer system.
  • the non-volatile storage can be local, remote, or distributed. The non-volatile storage is optional because systems can be created with all applicable data available in memory.
  • a software program is assumed to be stored at an applicable known or convenient location (from non-volatile storage to hardware registers) when the software program is referred to as "implemented in a computer-readable storage medium.”
  • a processor is considered to be “configured to execute a program” when at least one value associated with the program is stored in a register readable by the processor.
  • a computer system can be controlled by operating system software, which is a software program that includes a file management system, such as a disk operating system.
  • operating system software is a software program that includes a file management system, such as a disk operating system.
  • file management system such as a disk operating system.
  • operating system software with associated file management system software is the family of operating systems known as Windows ® from Microsoft Corporation of Redmond, Washington, and their associated file management systems.
  • Windows ® from Microsoft Corporation of Redmond, Washington
  • Windows ® Windows ® from Microsoft Corporation of Redmond, Washington
  • Linux operating system is the Linux operating system and its associated file management system.
  • the file management system istypically stored in the non-volatile storage and causes the processor to execute the various acts required by the operating system to input and output data and to store data in the memory, including storing files on the non-volatile storage.
  • the bus can also couple the processor to the interface.
  • the interface can include one or more input and/or output (I/O) devices.
  • the I/O devices can include, by way of example but not limitation, a keyboard, a mouse or other pointing device, disk drives, printers, a scanner, and other I/O devices, including a display device.
  • the display device can include, by way of example but not limitation, a cathode ray tube (CRT), liquid crystal display (LCD), or some other applicable known or convenient display device.
  • the interface can include one or more of a modem or network interface, it will be appreciated that a modem or network interface can be considered to be part of the computer system.
  • the interface can include an analog modem, isdn modem, cable modem, token ring interface, satellite transmission interface (e.g. "direct PC"), or other interfaces for coupling a computer system to other computer systems, interfaces enable computer systems and other devices to be coupled together in a network.
  • analog modem isdn modem
  • cable modem cable modem
  • token ring interface e.g. "direct PC”
  • satellite transmission interface e.g. "direct PC”
  • Fig. 8 shows different stages in a relationship between two aliases.
  • whiteiist would include all of the devices owned by user of Alias 310-1.
  • everyone else is an untrusted stranger.
  • 810 stranger untrusted mode does not allow communication 815 between Alias 320-1 and Alias 310-1.
  • Users of Alias 310-1 may meet User of Alias 320-1 and exchange out of band salutation signet or digital information. Either one of the them can then initiate salutation protocol to establish a relationship between their two aliases.
  • the initiation and exchange of the salutation protocoi 825 occurs only after an initial exchange out of band of the signet including digital information. This is equivalent of meeting a new person in real life and exchanging their contact information, i.e. business card etc,
  • the alias can be added on a whitelist of a private network for a transient time period, transient geographic proximity or permanently trusted period that does not expire, or transient acceptance based on selected topics of a conversation.
  • the aliases can communicate two way secure channel 835,
  • a transient trusted relationship could be based on topics of the conversation.
  • an alias 320-1 can accept all conversations originating from alias 310-1 when on selected topics of sports, politics etc.
  • a sports figure can accept conversations from fans related to sports but declines to discuss any personal topics or political unrelated news,
  • a permanent trusted 840 relationship allows unlimited conversations on unlimited topics for an unlimited period of time irrespective of the geographic location. This is equivalent of having a permanent trusted relationship with members of your family and close friends, As in a real-life situation, any relationship may be revoked by either alias.
  • trusted relationship is revoked 850, all history between the two aliases is deleted and both are again placed back at the top of the chart, i.e. in an untrusted relationship and stranger status to each other.
  • Fig. 9 shows an exploded view of endpoint object in a computing device according to one embodiment of the proposed solution.
  • the endpoint object uses overlay network architecture to respond to all communications occurring with the private network. In one embodiment, the endpoint object closes all communications outside of the private network.
  • Module 970 is used to receive and respond to communications. These include requests to start a trusted relationship, revoke a relationship or end of a transient relationship.
  • Module 910 receives requests for new relationships or can be put in discovery mode to discovery new relationships.
  • Module 920 implements the exchanges needed for salutation protocol.
  • Module 930 performs whitelist management, i.e., adding, modifying or deleting a whitelist and members of the whitelist.
  • Module 940 performs blacklist management, i.e.
  • the list managements also include customization and sharing or forwarding of portions or all of the lists with their trusted aliases.
  • the whitelists and blacklists collectively form the relationship tables for an alias.
  • Module 950 performs relationship types management. Categorizing the types of aliases into smart devices, owned by family or friends, transient or permanent.
  • Module 960 performs secure channel communications among the trusted relationships that can feed into one or more applications for a user of the alias,
  • the private network is implemented using a biockchain platform.
  • the blockchain platform provides different services that are modular, customized and flexible for a given set of users.
  • the biockchain platform provides modular services for authentication, encryption, different applications etc.
  • the private network can pick and choose to modularly work with a biockchain platform to provide additional features and services to its aliases and the end- users.
  • the private network can be implemented at personal level as well as for an enterprise.
  • the relationship tables could be configured in a bulk for an enterprise based on on-boarding of a new employee and correspondingly revoked when an employee leaves the enterprise.
  • a hotel offering guest services includes different features and services based on transient geographic proximity.
  • an overlay network including, for example, a peer to peer network
  • a peer to peer network is a system that provides computing resources, software, and/or information to client systems by maintaining de-centralized services and resources that the client systems can access over a communications interface, such as a network.
  • a communications interface such as a network.
  • modules or components described herein could be implemented using a cloud-based computing system.
  • Such systems can involve a subscription for services or use a utility pricing model. Users can access the protocols of the private network through a web browser or other container application located on their client system.
  • the invention disclosure describes techniques that those of skill in the art can implement in numerous ways. For instance, those of skill in the art can implement the techniques described here using a process, an apparatus, a system, a composition of matter, a computer program product embodied on a computer-readable storage medium, and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor.
  • a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is configured to perform the task at a given time or a specific component that is manufactured to perform the task.
  • the term 'processor' refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
  • the apparatus can be specially constructed for the required purposes, or it can comprise a general- purpose computer selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a computer-readable storage medium, such as, but is not limited to, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, any type of disk including floppy disks, optica! disks, CD-ROMs, and magnetic-optical disks, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • the structures and modules in the figures may be shown as distinct and communicating with only a few specific structures and not others.
  • the structures may be merged with each other, may perform overlapping functions, and may communicate with other structures not shown to be connected in the figures.
  • the above-described functions and components may be comprised of instructions that are stored on a storage medium such as a computer readable medium.
  • the instructions may be retrieved and executed by a processor.
  • Some examples of instructions are software, program code, and firmware.
  • Some examples of storage medium are memory devices, tapes, disks, integrated circuits, and servers.
  • the instructions are operational when executed by the processor to direct the processor to operate in accord with some embodiments. Those skilled in the art are familiar with instructions, processor(s), and storage medium.
  • the structures and modules in the figures may be shown as distinct and communicating with only a few specific structures and not others.
  • the structures may be merged with each other, may perform overlapping functions, and may communicate with other structures not shown to be connected in the figures.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Operations Research (AREA)

Abstract

The systems and methods of modeling a private network communication, comprising: associating a with a digital identity of a first profile; allowing access by other profiles with digital invitation only; optionally adding another profile to the blacklist by default when a request to communicate is initiated without a digital invitation; sharing the credentials after authentication of the digital invitation; receiving an encrypted digital relationship request from a second profile for the first profile with an embedded temporal key; decrypting the temporal key and a digital identity of the requestor; sending an authenticated response from the first profile and performing one of the following: adding the second profile to a whitelist and communicating with the second profile using a secure channel if it determined that the authenticated response signal acceptance; or adding the second profile on a blacklist when the request is not desired or fails verification.

Description

SYSTEMS AND METHODS OF SALUTATION PROTOCOL TO COMMUNICATE USING A PRIVATE
OVERLAY PEER TO PEER NETWORK
[0001] If an Application Data Sheet (ADS) has been filed on the filing date of this application, it is incorporated by reference herein. Any applications claimed on the ADS for priority under 35 U.S.C, §§119, 120, 121, or 365(c), and any and all parent, grandparent, great-grandparent, etc. applications of such applications, are also incorporated by reference, including any priority claims made in those applications and any material incorporated by reference, to the extent such subject matter is not inconsistent herewith.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0002] The following Whitestar Communications, Inc.'S concurrently filed patent applications are incorporated herein by reference: (1) Attorney Docket No. WSTAR.0G2, titled "SYSTEMS AND METHODS OF SECURING DIGITAL CONVERSATIONS FOR ITS LIFE CYCLE AT SOURCE, DURING TRANSIT AND AT DESTINATION"; (2) Attorney Docket No. WSTAR.003, titled "SYSTEMS AND METHODS OF COLLABORATIVE APPLICATION ON A PRIVATE NETWORK"; (3) Attorney Docket No. WSTAR.004, titled "SYSTEMS AND METHODS OF ENFORCING COMM UNICATIONS SEMANTICS ON A PRIVATE NETWORK”; (4) Attorney Docket No. WSTAR.Q05, titled "SYSTEMS AND M ETHODS OF GESTURE TRIGGERED AUTOMATIC ERASURE ON A PRIVATE NETWORK"; (5) Attorney Docket No. WSTAR.006, titled "SYSTEMS AND METHODS OF DISTRIBUTED BACKUP AND RECOVERY ON A PRIVATE NETWORK"; and (6) Attorney Docket No. WSTAR.007, titled "SYSTEMS AND METHODS OF DELEGATION OR REPLICATION ON A PRIVATE NETWORK."
FIELD OF THE INVENTION
[0003] The present invention is in the technical field of establishing and controlling conversations in social media with the use of secure and encrypted private networks. More particularly, the present invention is in the technical field of facilitating introductions and establishing different levels of relationships. More particularly, the present invention is in the technical field of establishing a simple and straightforward de-centralized and flat hierarchy of different types and categories of computing devices including establishing equal access and rights to a personal computer as well as an internet of things device.
BACKGROUND
[0004] Social media typically facilitates user-generated content including text, comments, photos, videos and voice. Traditionally these various media are generated through "online" interactions and are facilitated by one or more third party platforms such as Twitter, Facebook, Youtube, SnapChat, Instagram, Weibo, LinkedIn and many others.
[0005] In traditional social media systems, users create profiles via a service providers website or app and all the content is maintained, processed and stored by the social media company. Users of each system can "discover" each other through extensive online directories or via a direct invitation from one user to another,
[0006] While users don't pay "directly" for use of these services, the services providers generate revenue from their users content and meta data through directed ads and selling access to their subscribers content for data mining or harvesting. This revenue then offsets the cost of maintaining the centralized servers and data centers and in some cases returns dividends to their shareholders.
[0007] Unfortunately, there are a number of serious drawbacks to this architecture. Most notably is the broken business model that requires the service provider to monetize their customers, which in turn requires their customers to give some, if not all of their privacy.
[0008] Additionally, the service provides have recently gone into censorship or "de-platforming" of content based on their or their advertisers best interests and not necessary the interest of their users or user communities, in some cases the censorship is at the direction of a central government but in most cases it is carried out based on arbitrary decisions of the social media service provides.
[0001] Complicating the matter, should a competitor wish to enter the market to compete against the entrenched social media companies it takes tremendous capital to build out the data centers and facilities to onboard even a single user. As users join the new network, more resources must be added to the central networks to manage the traffic load and to store the content being created by their users. At the end of the day, the new social media company would once again have to monetize their customer base, solicit advertisers and adhere to government oversight. While the new company might impose a different set of censorship policies than the legacy companies its still censorship by a third party and not by end users. In summary, the current architecture of social media tends to lead to: (i) Third party censorship, sometimes legally, sometimes not; (ii) Lack of Privacy either on purpose or by accidental exposure; and (iii) Lack of free association.
[0002] The last point, lack of free association can best be understood by the fact that the social media companies can and do decide what user can and can not participate in their platform. Worse is that while excluding one user A from freely joining a given community and conversing with members of that community, the same platform may allow other members to make almost any claim about user A without allowing user A the ability to refute those claims. This leads to very bad social norms in which gangs of denizens roam from social media site to social media site spreading false or unsubstantiated claims about user A without user A being able to defend herself on any of those platforms.
[0003] Furthermore, because the user's content is held by a third party and the social media companies routinely change their terms of services, most users are unaware that their content may be retained or archived, indefinite. A frivolous statement which is deemed "social acceptable today" may be judged years into the future by a new set of standards and lead to harsh consequences including ability to get into schools and colleges, ability to get a job, ability to run for public office, etc. We call this effect "Future Guilt"
[0004] Still further problems exist in the semantics of existing social interactions on social media sites. When someone creates content, they don't "own" that content, the social media company does. Even with as simple as email, "ownership" of content is fluid and the semantics of "polite" conversation are not a part of the system.
[0009] For example, if user A creates an email message and sends it to user B and in that email, user A included content that she did not want to disclose to anyone else, there is nothing in the art that would prevent user B from saving that information away, copying it or forwarding it to someone else like user C. Neither is user B prevented from replying to user A and copying additional users D, E, etc. on that reply. This sort of "lack of control" of content is pervasive in today's social media systems and this leads to a lack of polite discourse amongst members of society.
[0010] With the explosion of Internet of Things (loT) devices, the number of devices connecting on the internet are exploding. It is unreasonable to expect any single device, for example, to have equal probability of connecting with another loT device next to it or a personal computer remotely located in Mongolia. The current internet and networked communication do not align to the way society or human behavior operates. There are no digital equivalents that promotes good behavior in a digital or online environment that are cultivated based on existing social norms.
[0005] The current public networks assume uniform packet distribution that cannot be converged. Security is also an issue because any computing device can send a packet to any other device. The approaches to resolve digital spam including email or text spam are based on prevention and not fixing the root cause of the problem, i.e. openness of receiving packets from unauthenticated senders.
SUMMARY OF THE INVENTION
[0006] The present invention is systems and methods of modeling a private network communication, comprising: associating a secure and encrypted private network with a digital identity of a first profile; allowing access to the private network by other profiles with digital invitation only; optionally adding another profile to the blacklist by default when a request to communicate is initiated without a digital invitation; sharing the private network communication credentials after authentication of the digital invitation; receiving an encrypted digital relationship request from a second profile for the first profile through the private network communication with an embedded temporal key; decrypting the temporal key and a digital identity of the requestor; sending an authenticated response from the first profile on the digital relationship request and performing one of the following: adding the second profile to a whitelist and communicating with the second profile using a secure channel on the private network if it determined that the authenticated response signal acceptance; or adding the second profile on a blacklist if it is determined that the request is not desired or fails verification.
[0011] The systems and methods of modeling a private network communication, wherein the digital invitation includes signet of the first profile that is shared using one or more of the following: a business card, a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer.
[0007] The systems and methods of modeling a private network communication, wherein the signet includes: embedded information to get one or more of the following: an alias, a public key, a network address, or a phone number; comprises of one or more of the following codes to contain the embedded information: a Quick Response Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code; and comprises of one or more of the following formats to encode the embedded information: binary using type-length-value, concise binary object representation, javascript object notation, extensible Markup Language or key/value pairs.
[0012] The systems and methods of modeling a private network communication, wherein the acceptance types include one or more of the following: permanent acceptance, transient acceptance based on geographic location, transient acceptance expiring with a lapse of a time period.
[0013] The systems and methods of modeling a private network communication, wherein the digital invitation is made public to all.
[0014] The systems and methods of modeling a private network communication, further comprising: sending the digital invitation using an out of band network channel.
[0008] The systems and methods of modeling a private network communication, further comprising: establishing the private network as an overlay network on an existing public network, or establishing the private network as an overlay peer to peer network.
[0015] The systems and methods of modeling a private network communication, wherein the secure channel with the second profile does not include a server intermediary,
[0016] The systems and methods of modeling a private network communication, wherein the first profile digitally resides on a computing device including one or more of the following: a persona! computer, tablet, laptop, handheld device, smart device, or internet of things device.
[0017] The systems and methods of modeling a private network communication, further comprising: sharing the whitelist or portions of the whitelist with another profile.
BRIEF DESCRIPTION OF THE DRAWINGS [0018] The embodiments of this invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
[0019] Fig, 1 shows a diagram illustrating an example of a system and method of modeling a private network with different types and categories of computing devices including internet of things devices,
[0020] Fig. 2 shows an exploded view of a computing device with overlay network, according to one embodiment,
[0021] Fig, 3 is an exploded view of initial salutation protocol out of band messaging and response, according to one embodiment,
[0022] Fig. 4 is an exploded view of second stage of messaging in a salutation protocol, according to one embodiment.
[0023] Fig. 5 is an exploded view of the third and final stage of messaging in a salutation protocol, according to one embodiment.
[0024] Fig. 6 shows a flowchart illustrating an example of a method of a salutation protocol.
[0025] Fig. 7 is a schematic diagram of exemplary computing devices that can be used to implement the methods and systems disclosed herein, according to one embodiment,
[0026] Fig, 8 is a staged level diagram illustrating different types of stages in a relationship between two profiles and the corresponding parameters of communication,
[0027] Fig. 9 is an exploded view of an end point profile computing device with different subroutines according to one embodiment.
DETAILED DESCRIPTION OF THE INVENTION
[0028] The systems and methods of modeling a private network with a standardized introduction or salutation protocol to establish increasing or decreasing levels of trust in a relationship between two profiles. One of the keys to address the problems with today's social media is to provide for an alternative mechanism for users to freely associate. If users must rely on a central authority, or third party, to discover one another and who may or may not allow users to join their platform, then they are unable to freely associate with one another,
[0009] The systems and methods of modeling a private network provides for a completely distributed social media platform that allows both humans and machines to freely associate with one another through a special salutation protocol. In this platform, there is no central service. There is no cost to stand up the platform. There are no additional costs as each new user joins the social network. Instead of a centra! services storing user content and facilitating user content distribution and user discover, all these facilities are provided in a peer to peer social network by the users themselves.
[0029] No central authority can prevent the users from freely associating with one another or can exclude a given user from participation in social media with this system.
[0030] The systems and methods of modeling a private network, allows free association between user A and user B as follows, if user A wishes to associate with user B, then user A would send a special salutation message to user B introducing himself to user B and requesting permission to association with him.
[0010] This request is sent from user A to user B directly, without the aid of a centralized social media company. In our preferred embodiment, this interaction would be carried out via a specialized text message sent via MMS, SMS, or similar. Salutation addressing would simply be by phone number. User A would know the phone number of user B. User A would, through a custom application, send a salutation request to user B via text messaging to user B's cellular phone number.
[0031] Now when user B receives this invitation, a second application resident on user B's cellular device would receive this specially coded message, extract the salutation and in one embodiment, would present user B the option of accepting or rejecting the salutation sent from user A. Still in other embodiments, the acceptance or rejection could be automated and not require the interaction of user B.
[0032] Further, other transport means might be utilized other than SMS, MMS or text messaging between the devices. For example, IP addresses could be used to send a direct packet or message stream from one user A to another user B.
[0033] Now, should user B accept the salutation sent from user A, then that message would contain within it one or more IP addresses that user B can use to send a response to user A. At this point, user B would send an accept message to user A by sending user A a special message. In that message, user B would include, amongst other things, certain crypto graphic information necessary to authenticate user B and to encrypt messages that are sent to user B as well as one or more IP addresses that user A can use to send messages to user B.
[0034] At this point then, User A would send an encrypted message to user B also containing, amongst other things, certain crypto graphic information necessary to authenticate user A and to encrypt messages that are sent to user A.
[0035] Each party now has the ability to send information to the other party, directly, peer to peer via the counter parties IP address, again without the aid of a central service.
[0036] While the salutation protocol embodies the means by which users may freely associate, the system also provides for a means by which they dissolve their association as well. For in a polite society, we must have a well-defined mechanism for dissolving free associations when either party wishes to do so.
[0037] In our system, if user A, having received endpoint information about user B and therefore having the ability both send and receive information to and from user B, decides to dissolve their association, user A merely has to remove user B from her application. Upon doing so, a special message is sent to user B informing user B that user A no longer wishes to associate with user B at which point user B's application automatically removes user A's endpoint information from user B's device just as user A's application automatically removes user B's information from user A's device. This "tit-for-tat" mechanism assures that any party that is in free association with any other party, may at their discretion dissolve that association and that no further discourse can be had between the parties unless and until they repeat the salutation process.
[0038] Hence, in our system, free association and proper association controls are in the hands of the users of the system. There is no central authority governing such behaviors.
[0039] In our preferred embodiment, salutation acceptance messages and messages to dissolve associations are sent via TCP/IP, but many other protocols such as UDP or message busses or even SMS/MMS may also be used.
[0040] The information contained within an endpoint message is held in a special object. That object contains at least the following information: (i) One or more network addresses that may be used to communicate with the endpoint— in other words an address that that endpoint is willing and able to receive further messages at. (ii) The public key of a public/private key pair to be used for cryptographic purposes, (iii) An alias that is associated with the public/private key pair. The alias is any monotonicaily incrementing number such that each new instance of public/private key pairs has a higher value than the previous key pairs, (iv) A collection of zero or more conversation ID's that have been created by the endpoint, (v) An endpoint ID. The endpoint ID is unique in the entire world and does not require coordination to achieve uniqueness, in our preferred embodiment, the endpoint ID is based on a UUID as defined by the IETF, (vi) A time stamp that indicates when the endpoint object was first created, (vii) A time stamp that indicates the last time the endpoint object was updated, (viii) An arbitrary array of content that is base 8 binary format (aka, a byte array) of zero or more bytes of content associated with the endpoint. In our preferred embodiment, this content is an HTTP encoded document that when rendered will create a hypertext document.
[0041] Different embodiments described herein include components or structures to perform the described functionality. A "component" or a "module" as used in this invention disclosure, includes a dedicated or shared processor and, typically, firmware or software modules executed by the processor. Depending upon implementation-specific or other considerations, a module can be centralized or its functionality distributed. A component or a module can include special purpose hardware, firmware, or software embodied in a computer-readable medium for execution by the processor.
[0042] In one embodiment, FIG. 1 depicts a diagram 100 illustrating an example of securely connecting computing devices through the private network. In the example of FIG. 1, the environment includes a first loT devices 110-1 through an nth client system 110-n, private network 140, a smart watch 120, a fitness tracker 130, intelligent voice assistants 150-1 to 150-n, personal computers from 160-1, ..160-n, smartphones from 170-1 to 170-n, servers from 180-1, .. 180-n.
[0043] in an implementation, the loT device 110 includes components related to network connectivity. In one implementation, the loT device 110 includes speaker and/or microphone hardware and software components to enable receipt and execution of speech commands directly on the device. In another implementation, the loT device 110 does not include a speaker and/or microphone capability to enable receipt and execution of speech commands directly on the device, yet the ioT device is able to communicate with the private network system to enable receipt and execution of speech commands translated to device specific SDK/API commands.
[0044] The role of the computing device manufacturers is separated from the use of the computing devices. After purchase, a user of the computing device has control on how to use, configure and communicate using that device. Use of any central services including those from the device manufacturer become optional. In one embodiment, there are one or more aliases associated with each of the computing devices including the IoT devices. The IoT devices integrate with the private network with zero additional programming. Different categories of smart watches 120, fitness trackers 130, personal computers 160 are connected securely and with encryption. The Intelligent voice assistants 150 can be from a variety of providers like Amazon Alexa, Google Home Assistant, Apple HomePod, Microsoft Cortana etc. Smartphones 170 and servers 180 with more computing power, bandwidth and capabilities are also connected. For example, the smallest computing device, i.e. an IoT doorbell ring to the largest computing device, a full-fledged server, are both treated equal in the digital private network world.
[0045] A user profile may be associated with one or more aliases. The smallest building brick for the private network is an alias. With the evolution of smarter devices and use of artificial intelligence, an alias may be given the capability to automate and make some of its own decisions. By default communication occurs only with devices that you choose too and not with any random device on a public network or the internet.
[0046] In one embodiment, a single alias is associated with a single computing device. A user or owner has access to the private key associated with the public/private key for that alias. For devices that are co-owned, two or more user profiles may have access to the same alias profile. In one embodiment, a private network is associated with all aliases that a user owns. [0047] A person of ordinary skill in the art would appreciate that by assigning an alias to a computing device that operates independent of a user profile, the private network operates by authenticating each computing device on its network. Authentication is not based on user password or related parameters associated with a user that can be used on more than one device. A user owning more than one computing device, authenticates each device separately using its own associated alias. Authenticating at the device level, enables better control of access on the private network.
[0048] Computing devices irrespective of their size, category or applications have powerful computing capabilities in terms of processing power and also have network bandwidth to connect The systems and methods of modeling private network allow for these computing devices to connect seamless in a secure and encrypted manner after authentication. Each transaction is an authenticated exchange. Such exchanges eliminate spam. An unwanted sender is revoked from the whitelist of authenticated senders and cannot send spam.
[0049] In one embodiment, by default the computing devices connect only after establishment of a trusted relationship through the salutation protocol. In one embodiment, the computing device can accept public network connections but periodically go into private network mode that are secured and authenticated. This would be equivalent to going into a mute mode when distractions are not needed from strangers that are not already trusted.
[0050] in one embodiment, any profile that is not authorized to be on the whitelist is by default on the blacklist and denied access to secure channel communications. In one embodiment, relationship between two profiles can transition from untrusted stranger, trusted transient relationship based on attending an event or conference i.e. triggered for a time period or triggered by proximity to a location, permanent trusted, revoked to blacklist. [0051] in one embodiment, the salutation protocol is used in a discovery mode when different aliases are open to accepting requests for relationships. Discovery mode allows two devices associated with two different aliases to exchange messages in accordance with the salutation protocol described herein and subsequently established a secure channel for communications.
[0052] In one embodiment, the salutation protocol creates relationship tables for a given alias that can be forwarded to other trusted aliases, i.e., for example, aliases that are owned by your roommate, wife or partner. A user can customize whether to forward ail or portions of relationship tables from one of his aliases.
[0053] In one scenario, an owner of a house may have setup a relationship table with all the internet of things devices in his home. After a sale or rent of his house, the owner may forward that portion of the relationship table to the new owner or tenant giving or transferring rights to access those devices. If the devices are sold, the previous owner can delete those relationships from his own aliases after transferring them to the new owner.
[0054] A person of ordinary skill in the art would appreciate that two aliases communicating with each other have equal rights and access. Both the aliases require permission with each other to enter into a relationship and start a conversation through a secure channel. Either one of the aliases can decide to terminate the relationship and revoke the established trust. These exchanges mirror the scenarios of communication in real life.
[0055] Private Network 140 can be different wireless and wired networks available to connect different computer devices including client and server systems. In an implementation, private network 140 is publicly accessible on the internet through salutation protocol described herein, in an implementation, private network 140 is inside a secure corporate wide area network, in an implementation, private network 140 allows connectivity of different systems and devices using a computer-readable medium.
[0056] The messaging and notification between different components can be implemented using application programming interface (API) calls, extensible markup language ("XML") or Javascript Object Notation ("JSON") config file interfaces between different interfaces, Hypertext Preprocessor (earlier called, Personal Home Page) ("PHP"), Python, Node.js, Java/C++ object-oriented programming or simple web-based tools.
[0057] Different components may also implement authentication and encryption to keep the data and the requests secure. Authentication of a device may be accomplished using public/private key, passwords, token, transaction, biometrics, multi-factor authentication or other methods known in the industry. Encryption may use data encryption standard (DES), TripleDES, RSA, Advanced Encryption Standard (AES) or other methods known in the industry.
[0058] FIG. 2 is an exploded view 200 of different versions of an implementation that allow application programming interface, hooks, or overlay network connections in a computing device. For example, Alias-1 270 is associated with a computing device that may have one or more operating systems including Android 210, iOS 220 or Iol operating system 230. The computing device includes device hardware 250 that can be controlled by the private network API/ hooks 240 that are incorporated at a system level on the computing device. In one embodiment, depending on the computing device platform the private network overlay hooks are implemented using Java Android SDK, Objective C, or C++. In one embodiment, any and all communications are controlled using the private network overlay architecture. In one embodiment, a user can customize the alias to go in and out of the private network overlay architecture mode. The private network 260 includes other trusted alias 2 to alias n i.e. 280-1 to 280-n ail of which can communicate with Alias-1 using authenticated, secure and encrypted channels. In one embodiment, the overlay network is based on peer to peer network. In one embodiment, the private network using an overlay network using the existing public network.
[0059] Fig. 3 outlines 300 the first stage of the salutation protocol to establish a trusted relationship between two aliases. Here, two persons Person A and Person B are strangers to begin with. Alias 310-1,, ,.310-n are owned by Person A. Alias 320-1 is owned by Person B, The profile associated with any alias includes an alias, public key, network address, for example, an ip address and a phone number. The initial profile details are exchanged out of band between Alias 1 and Alias 2 310-1. This could mirror real-life situations where person A and person B meet for the first time at a coffee shop, in a bar, at an office meeting, at an event or a conference and exchange business cards, The business card includes the profile details in a signet 340 for one of the aliases. Each alias has a relationship table for the private network that includes one or more whitelists and one or more blacklists.
[0060] In one embodiment, the out of band exchange occurs using a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer, in one embodiment, the out of band exchange is triggered by a discovery mode. In one embodiment, ail the computing devices go into discovery mode on push of a button or holding of the reset button, on first instance of power up or each time a new network is detected. In one embodiment, there is bulk provisioning of the relationship tables that include one or more of the whitelists and blacklists. In one embodiment, one or more of the white lists or portions of the whitelists, blacklists or portions of the blacklists can be shared with another trusted alias. In one embodiment, the signet includes embedded information to get one or more of the following: an alias, a public key, a network address, or a phone number. The signet comprises of one or more of the following codes to contain the embedded information: a Quick Response Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code. The signet comprises of one or more of the following formats to encode the embedded information: binary using type-length-value, concise binary object representation, javascript object notation, extensible Markup Language or key/value pairs.
[0061] In one embodiment, the signet is made public to all. For example, the signet may be associated with providing a service to all or selling a product. One way of marketing with the use of the private networks is to make the signet publicly available to all for a selected topic of conversation, i.e. sell of a product or a service. In one embodiment, the signet is sent using an out of band channel, i.e. similar to a vcard attachment to an email message or a text message that does not use the private network.
[0062] Aliases 310-1,...310-n form a private network 330 that is not accessible by Alias 320-1 yet. Private Network 330 allows only whiteiist members from the relationship table that currently include all Alias 310-1 to 310-n, Alias 320-1 is absent from the whiteiist and hence is effectively on the blacklist by default.
[0063] Alias 320-1 sends a request to form a trusted relationship to Alias 310-1 after decoding the signet 340 received out of band. The request 350 includes decoding alias 310-1 information, generating temporal key Tk, Encrypting with public key Epk(Tk), create endpoint payload (EPB) Payload (EPB), encrypt payload with temporal key Etk(Payload), This allows a packet that includes {My Endpoint Identification, Your Alias, Encrypted Temporal Key, Encrypted Payload}. The packet is then sent to Alias 310-1.
[0064] A person of ordinary skiil in the art would understand that it is not possible to create the packet to request to form a trusted relationship without having access to the profile details in the signet. A person cannot communicate with another person without an initial out of band exchange that discloses his public key. The digital signet information may be encoded in a QR Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code. Only after receipt and decoding this initial information, can the initial packet be sent.
[0065] A person of ordinary skill in the art would understand that a person may create a signet with alias information including public key that expires after a certain period of time. A person may be able to restrict access by changing the digital signet periodically. This allows customized control where only fresh relationships can make the request and expired relationships cannot renew.
[0066] A person has full control on what he or she receives at a given time from any application, any server or anywhere at any given time. There is no need to customize filters or access rights on different servers or applications. In one embodiment, all of the services and applications are accessed only through the private network overlay as described herein.
[0067] FIG. 4 with 400 shows second stage of the salutation protocol that follows Fig. 3. Alias 310-1 has now received a packet from Alias 320-1. The packet includes a request to form a trusted relationship. An initial check is done to determine whether the packet sender is on blacklist. If he is already on a blacklist, i.e. if he is listed on blacklist explicitly and not on blacklist by default of not being on the whitelist, then the packet aborts and no response is sent back.
[0068] If he is not listed on the blacklist, the packet is decrypted to get Encrypted Temporal Key, get Alias 320-1 information, lookup Private Key associated with Alias 310-1, decrypt Temporal key with private key, decrypt Payload using Temporal key. If Payload. Command = Request Relationship, Extract Endpoint information from Payload, automatically accept or Indicate to User for acceptance the new Request, if accept (From user or automated) Request, add to whitelist for Private Network 330 and send Response, else add Endpoint-A (ERA) to blacklist.
[0069] FIG. 5 with 500 shows the final stage of the salutation protocol that follows Fig. 4 to establish secure channel of communication to the private network 330. 310-1 Alias does the following steps: decode Alias 320-1 information, generate Temporal Key TK, encrypt with Public Key Epk(TK), create Put Endpoint (ERA) Payload(EPB), encrypt payload with Temporal key Etk(Payload), Packet {My EP Identification, Your Alias, Encrypted Temporal key, Encrypted Payload}, The packet is then sent to 320-1 Alias.
[0070] When the response is with acceptance, Endpoint A adds Endpoint B on the white list and vice versa. The private network 330's white! ist now includes all 310 aliases and 320-1 Alias- AH others remaining by default are on the blacklist.
[0071] 310-1 Alias and 320-1 Alias can now establish a secure channel and start communicating with encrypted messages.
[0072] The communication may now include higher level application protocols, including, for example, using Hyper-Text Transport Protocol ("HTTP"), Hyper-Text Transport Protocol Secure ("HTTPS") or Message Queuing Telemetry Transport ("MQTT") protocols. The device communication is encrypted using overlay Transport commands that include Transport control protocol ("TCP"), Web Sockets, MQTT or Constrained Application Protocol ("CoAP").
[0073] FIG. 6 depicts a flowchart 600 illustrating an example of a method for a private network modeling. The flowchart 600 is discussed in conjunction with the environment shown in the diagram 100 in FiG, 1. At block 605, begins with associating securely and with encrypted messaging with a digital identity of a first profile. At block 610, allow access to the private network by other profiles with digital invitation only. In one embodiment, optionally adding another profile to the blacklist by default when a request to communicate is initiated without a digital invitation. At block 615, share the private network communication credentials after authentication of the digital invitation. At block 620, receive an encrypted digital relationship request from a second profile for the first profile with an embedded temporal key 620. At block 625, decrypt the temporal key and a digital identity of the requestor. At block 630, send an authenticated response from the first profile on the digital relationship request. At block 635, add second profile to whitelist if accepted or blacklist If verification fails.
[0074] In one embodiment, the digital Invitation includes signet of the first profile that is shared using one or more of the following: a business card, a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer. For example, a coffee shop may have a signet that is based on geographic proximity depending on when the users are in the coffee shop. Such a signet would expire when there is no geographic proximity, in another example, a conference host may have a signet that expires at the end of the conference. Attendees attending the conference may freeiy use the signet while at the conference.
[0075] In a broad embodiment, the invention is systems and methods of a private network modeling allow controlled, flexible and customized communications that are secure and encrypted between one or more computing devices that are independent of any public networks or third-party applications or servers. Each alias associated with a computing device establishes a relationship table based on other trusted devices.
[0076] Figure 7 is a schematic diagram of computing device 700 that can be used to implement the methods and systems disclosed herein, according to one or more embodiments. Figure 7 is a schematic of a computing device 700 that can be used to perform and/or implement any of the embodiments disclosed herein. In one or more embodiments, loT device 110, SDK/API 120, Speak- to-IoT system 130, voice assistants 150, user end devices with mobile apps 170 or 180 of Figure 1 may be the computing device 700.
[0077] The computing device 700 may represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and/or other appropriate computers. The computing device 700 may represent various forms of mobile devices, such as smartphones, camera phones, personal digital assistants, cellular telephones, and other similar mobile devices. The components shown here, their connections, couples, and relationships, and their functions, are meant to be exemplary only, and are not meant to limit the embodiments described and/or claimed.
[0078] FIG. 7 shows an example of a computing device 700 on which techniques described here can be implemented. The computing device 700 can be a conventional computer system that can be used as a client computer system, such as a wireless client or a workstation, or a server computer system. The computing device 700 Includes a computer 705, I/O devices 710, and a display device 715. The computer 705 includes a processor 720, a communications interface 725, memory 730, display controller 735, non-volatile storage 740, and I/O controller 745. The computer 705 may be coupled to or include the I/O devices 710 and display device 715.
[0079] The computer 705 interfaces to external systems through the communications interface 725, which may include a modem or network interface, it will be appreciated that the communications interface 725 can be considered to be part of the computing device 700 or a part of the computer 705. The communications interface 725 can be an analog modem, integrated services for digital networks ("ISDN") modem, cable modem, token ring interface, satellite transmission interface (e.g. "direct personal computer" also known as "direct PC"), or other interfaces for coupling a computer system to other computer systems. [0080] The processor 720 may be, for example, a conventional microprocessor such as an Intel Pentium microprocessor or Motorola power PC microprocessor. The memory 730 is coupled to the processor 720 by a bus 750. The memory 730 can be Dynamic Random Access Memory (DRAM) and can also include Static RAM (SRAM). The bus 750 couples the processor 720 to the memory 730, also to the non-volatile storage 740, to the display controller 735, and to the I/O controller 745.
[0081] The !/O devices 710 can include a keyboard, disk drives, printers, a scanner, and other input and output devices, including a mouse or other pointing device. The display controller 735 may control in the conventional manner a display on the display device 715, which can be, for example, a cathode ray tube (CRT) or liquid crystal display (LCD). The display controller 735 and the I/O controller 745 can be implemented with conventional well-known technology.
[0082] The non-volatile storage 740 is often a magnetic hard disk, an optical disk, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory 730 during execution of software in the computer 705. One of skill in the art will immediately recognize that the terms "machine-readable medium" or "computer-readable medium" includes any type of storage device that is accessible by the processor 720 and also encompasses a carrier wave that encodes a data signal.
[0083] The computing device 700 is one example of many possible computer systems that have different architectures. For example, personal computers based on an Intel microprocessor often have multiple buses, one of which can be an I/O bus for the peripherals and one that directly connects the processor 720 and the memory 730 (often referred to as a memory bus). The buses are connected together through bridge components that perform any necessary translation due to differing bus protocols.
[0084] Network computers are another type of computer system that can be used in conjunction with the teachings described here. Network computers do not usually include a hard disk or other mass storage, and the executable programs are loaded from a network connection into the memory 730 for execution by the processor 720. A Web TV system, which is known in the art, is also considered to be a computer system, but it may lack some of the components shown in FIG. 7, such as certain input or output devices. A typical computer system will usually include at least a processor, memory, and a bus coupling the memory to the processor.
[0085] Though FIG. 7 shows an example of the computing device 700, it is noted that the term "computer system," as used here, is intended to be construed broadly. In general, a computer system will include a processor, memory, non-volatile storage, and an interface. A typical computer system will usually include at least a processor, memory, and a device (e,g., a bus) coupling the memory to the processor. The processor can be, for example, a general-purpose central processing unit (CPU), such as a microprocessor, or a special-purpose processor, such as a microcontroller. An example of a computer system is shown in FIG. 7.
[0086] The memory can include, by way of example but not limitation, random access memory (RAM), such as dynamic RAM (DRAM) and static RAM (SRAM). The memory can be locai, remote, or distributed. As used here, the term "computer-readable storage medium” is intended to include only physical media, such as memory. As used here, a computer-readable medium is intended to include all mediums that are statutory (e.g., in the United States, under 35 U.S.C. 101), and to specifically exclude all mediums that are non-statutory in nature to the extent that the exclusion is necessary for a claim that includes the computer-readable medium to be valid. Known statutory computer-readable mediums include hardware (e.g., registers, random access memory (RAM), non- volatile (NV) storage, to name a few), but may or may not be limited to hardware.
[0087] The bus can also couple the processor to the non-volatile storage. The non-volatile storage is often a magnetic floppy or Hard disk, a magnetic-optical disk, an optical disk, a read-only memory (ROM), such as a CD-ROM, EPROM, or EEPROM, a magnetic or optical card, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory during execution of software on the computer system. The non-volatile storage can be local, remote, or distributed. The non-volatile storage is optional because systems can be created with all applicable data available in memory.
[0088] Software is typically stored in the non-volatile storage. Indeed, for large programs, it may not even be possible to store the entire program in the memory. Nevertheless, it should be understood that for software to run, if necessary, it is moved to a computer-readable location appropriate for processing, and for illustrative purposes, that location is referred to as the memory here. Even when software is moved to the memory for execution, the processor will typically make use of hardware registers to store values associated with the software, and local cache that, ideally, serves to speed up execution. As used here, a software program is assumed to be stored at an applicable known or convenient location (from non-volatile storage to hardware registers) when the software program is referred to as "implemented in a computer-readable storage medium." A processor is considered to be "configured to execute a program" when at least one value associated with the program is stored in a register readable by the processor.
[0089] In one example of operation, a computer system can be controlled by operating system software, which is a software program that includes a file management system, such as a disk operating system. One example of operating system software with associated file management system software is the family of operating systems known as Windows® from Microsoft Corporation of Redmond, Washington, and their associated file management systems. Another example of operating system software with its associated file management system software is the Linux operating system and its associated file management system. The file management system istypically stored in the non-volatile storage and causes the processor to execute the various acts required by the operating system to input and output data and to store data in the memory, including storing files on the non-volatile storage.
[0090] The bus can also couple the processor to the interface. The interface can include one or more input and/or output (I/O) devices. The I/O devices can include, by way of example but not limitation, a keyboard, a mouse or other pointing device, disk drives, printers, a scanner, and other I/O devices, including a display device. The display device can include, by way of example but not limitation, a cathode ray tube (CRT), liquid crystal display (LCD), or some other applicable known or convenient display device. The interface can include one or more of a modem or network interface, it will be appreciated that a modem or network interface can be considered to be part of the computer system. The interface can include an analog modem, isdn modem, cable modem, token ring interface, satellite transmission interface (e.g. "direct PC"), or other interfaces for coupling a computer system to other computer systems, interfaces enable computer systems and other devices to be coupled together in a network.
[0091] Fig. 8 shows different stages in a relationship between two aliases. To begin with a private network with Alias 310-1 whiteiist would include all of the devices owned by user of Alias 310-1. By default everyone else is an untrusted stranger. When by default you are on the blacklist, 810 stranger untrusted mode does not allow communication 815 between Alias 320-1 and Alias 310-1. Users of Alias 310-1 may meet User of Alias 320-1 and exchange out of band salutation signet or digital information. Either one of the them can then initiate salutation protocol to establish a relationship between their two aliases. The initiation and exchange of the salutation protocoi 825 occurs only after an initial exchange out of band of the signet including digital information. This is equivalent of meeting a new person in real life and exchanging their contact information, i.e. business card etc,
[0092] After the salutation protocol, the alias can be added on a whitelist of a private network for a transient time period, transient geographic proximity or permanently trusted period that does not expire, or transient acceptance based on selected topics of a conversation. When in a transient trusted 830 period, the aliases can communicate two way secure channel 835, In one embodiment, a transient trusted relationship could be based on topics of the conversation. For example, an alias 320-1 can accept all conversations originating from alias 310-1 when on selected topics of sports, politics etc. For example, a sports figure can accept conversations from fans related to sports but declines to discuss any personal topics or political unrelated news,
[0093] A permanent trusted 840 relationship allows unlimited conversations on unlimited topics for an unlimited period of time irrespective of the geographic location. This is equivalent of having a permanent trusted relationship with members of your family and close friends, As in a real-life situation, any relationship may be revoked by either alias. When trusted relationship is revoked 850, all history between the two aliases is deleted and both are again placed back at the top of the chart, i.e. in an untrusted relationship and stranger status to each other.
[0094] Fig. 9 shows an exploded view of endpoint object in a computing device according to one embodiment of the proposed solution. The endpoint object uses overlay network architecture to respond to all communications occurring with the private network. In one embodiment, the endpoint object closes all communications outside of the private network. Module 970 is used to receive and respond to communications. These include requests to start a trusted relationship, revoke a relationship or end of a transient relationship. Module 910 receives requests for new relationships or can be put in discovery mode to discovery new relationships. Module 920 implements the exchanges needed for salutation protocol. Module 930 performs whitelist management, i.e., adding, modifying or deleting a whitelist and members of the whitelist. Module 940 performs blacklist management, i.e. adding, modifying or deleting a blacklist and members of the blacklist. The list managements also include customization and sharing or forwarding of portions or all of the lists with their trusted aliases. The whitelists and blacklists collectively form the relationship tables for an alias. Module 950 performs relationship types management. Categorizing the types of aliases into smart devices, owned by family or friends, transient or permanent. Module 960 performs secure channel communications among the trusted relationships that can feed into one or more applications for a user of the alias,
[0095] In one embodiment, the private network is implemented using a biockchain platform. The blockchain platform provides different services that are modular, customized and flexible for a given set of users. For example, the biockchain platform provides modular services for authentication, encryption, different applications etc. The private network can pick and choose to modularly work with a biockchain platform to provide additional features and services to its aliases and the end- users.
[0096] A person of ordinary skill in the art would understand that the private network can be implemented at personal level as well as for an enterprise. For example, the relationship tables could be configured in a bulk for an enterprise based on on-boarding of a new employee and correspondingly revoked when an employee leaves the enterprise. For example, a hotel offering guest services, includes different features and services based on transient geographic proximity.
[0097] A person of ordinary skill in the art would appreciate that communicating through the private networks changes the perspective and use of communicating, freely associating and use of internet. An end-user i.e. owner of a computing device with the use of smart and intelligent aliases has full control on how to associate and communicate with different users.
[0098] Several components described here, including clients, servers, and engines, can be compatibie with or implemented using a cioud-based computing system. As used here, an overlay network including, for example, a peer to peer network, is a system that provides computing resources, software, and/or information to client systems by maintaining de-centralized services and resources that the client systems can access over a communications interface, such as a network. A person of ordinary skill in the art would understand that different modules or components described herein could be implemented using a cloud-based computing system. Such systems can involve a subscription for services or use a utility pricing model. Users can access the protocols of the private network through a web browser or other container application located on their client system.
[0099] The invention disclosure describes techniques that those of skill in the art can implement in numerous ways. For instance, those of skill in the art can implement the techniques described here using a process, an apparatus, a system, a composition of matter, a computer program product embodied on a computer-readable storage medium, and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used here, the term 'processor' refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
[0100] A detailed description of one or more implementations of the invention is provided here along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such implementations, but the invention is not limited to any implementation. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured,
[0101] Some portions of the detailed description are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
[0102] It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as "processing" or "computing" or "calculating" or "determining" or "displaying" or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
[0103] Techniques described here relate to apparatus for performing the operations. The apparatus can be specially constructed for the required purposes, or it can comprise a general- purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer-readable storage medium, such as, but is not limited to, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, any type of disk including floppy disks, optica! disks, CD-ROMs, and magnetic-optical disks, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus. Although the foregoing implementations have been described in some detail for purposes of clarity of understanding, implementations are not necessarily limited to the details provided.
[0104] A number of embodiments have been described. Nevertheless) it will be understood that various modifications may be made without departing from the spirit and scope of the claimed invention. In addition, the logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. In addition, other steps may be provided, or steps may be eliminated, from the described flows, and other components may be added to, or removed from, the described systems. Accordingly, other embodiments are within the scope of the foliowing claims.
[0105] It may be appreciated that the various systems, methods, and apparatus disclosed herein may be embodied in a machine-readable medium and/or a machine accessible medium compatible with a data processing system (e.g., a computer system}, and/or may be performed in any order.
[0106] The structures and modules in the figures may be shown as distinct and communicating with only a few specific structures and not others. The structures may be merged with each other, may perform overlapping functions, and may communicate with other structures not shown to be connected in the figures.
[0107] The above-described functions and components may be comprised of instructions that are stored on a storage medium such as a computer readable medium. The instructions may be retrieved and executed by a processor. Some examples of instructions are software, program code, and firmware. Some examples of storage medium are memory devices, tapes, disks, integrated circuits, and servers. The instructions are operational when executed by the processor to direct the processor to operate in accord with some embodiments. Those skilled in the art are familiar with instructions, processor(s), and storage medium.
[OIOS] While the foregoing written description of the invention enables one of ordinary skill to make and use what is considered presently to be the best mode thereof, those of ordinary skill will understand and appreciate the existence of variations, combinations, and equivalents of the specific embodiment, method, and examples herein. The invention should therefore not be limited by the above described embodiment, method, and examples, but by all embodiments and methods within the scope and spirit of the invention. A detailed description of one or more implementations of the invention is provided here along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such implementations, but the invention is not limited to any implementation. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
[0109] The structures and modules in the figures may be shown as distinct and communicating with only a few specific structures and not others. The structures may be merged with each other, may perform overlapping functions, and may communicate with other structures not shown to be connected in the figures.

Claims

1. A method of modeling a private network communication, comprising:
associating a secure and encrypted private network with a digital identity of a first profile; allowing access to the private network by other profiles with digital invitation only;
optionally adding another profile to the blacklist by default when a request to communicate is initiated without a digital invitation;
sharing the private network communication credentials after authentication of the digital invitation;
receiving an encrypted digital relationship request from a second profile for the first profile through the private network communication with an embedded temporal key;
decrypting the temporal key and a digital identity of the requestor;
sending an authenticated response from the first profile on the digital relationship request and performing one of the following:
adding the second profile to a whitelist and communicating with the second profile using a secure channel on the private network if it determined that the authenticated response signal acceptance; or
adding the second profile on a blacklist if it is determined that the request is not desired or fails verification.
2. The method of claim 1 , wherein the digital invitation includes signet of the first profile that is shared using one or more of the following: a business card, a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer.
3. The method of claim 2, wherein the signet includes:
embedded information to get one or more of the following: an alias, a public key, a network address, or a phone number;
comprises of one or more of the following codes to contain the embedded information: a Quick Response Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code; and
comprises of one or more of the following formats to encode the embedded information: binary using type-length-value, concise binary object representation, javascript object notation, extensible Markup Language or key/value pairs.
4. The method of claim 1 , wherein the acceptance types include one or more of the following: permanent acceptance, transient acceptance based on geographic location, transient acceptance expiring with a lapse of a time period; or transient acceptance based on selected topi cs of a conversation.
5. The method of claim 1, wherein the digital invitation is made public to all.
6. The method of claim 1 , further comprising:
sending the digital invitation using an out of band network channel.
7. The method of claim 1, further comprising;
establishing the private network as an overlay network on an existing public network, or establishing the private network as an overlay peer to peer network.
8. The method of claim 1, wherein the secure channel with the second profile does not include a server intermediary.
9. The method of claim 1 , wherein the first profile digitally resides on a computing device including one or more of the following: a personal computer, tablet, laptop, handheld device, smart device, or internet of things device.
10. The method of claim 1. further comprising: sharing the whitelist or portions of the whitelist with another profile.
11. A system of modeling a private network communication comprising:
a private network comprising of one or more profile computing devices configured to: associate securely and with encrypted messaging with a digital identity of a first profile;
allow access to the private network by other profiles with digital invitation only; optionally add another profile to the blacklist by default when a request to communicate is initiated without a digital invitation;
a first profile computing device on the private network configured to:
share the private network communication credentials after authentication of the digital invitation;
receive an encrypted digital relationship request from a second profile for the first profile through the private network communication with an embedded temporal key;
decrypt the temporal key and a digital identity of the requestor;
send an authenticated response from the first profile on the digital relationship request and performing one of the following:
add the second profile to a whitelist and communicating with the second profile using a secure channel on the private network if it determined that the authenticated response signal acceptance; or
add the second profile on a blacklist if it is determined that the request is n not desired or fails verification.
12. The system of claim 11, wherein the digital invitation includes signet of the first profile that is shared using one or more of the following: a business card, a posting on a website, broadcast on a public channel, shared with a private group at an event, shared on a social blog, exchanged by email, or digital information transfer.
13. The system of claim 12, wherein the signet includes:
embedded information to get one or more of the following: an alias, a public key, a network address or a phone number;
comprises of one or more of the following codes to contain the embedded information; a Quick Response Code, a bar code, a radio frequency identification tag, authentication code using public key, a near field communication code or a digital code; and
comprises of one or more of the following formats to encode the embedded information: binary using type-length-value, concise binary object representation, javascript object notation extensible Markup Language or key/value pairs.
14. The system of claim 11, wherein the acceptance types include one or more of the following: permanent acceptance, transient acceptance based on geographic location, transient acceptance expiring with a lapse of a time period or transient acceptance based on selected topics of a conversation.
15. The system of claim 11, wherein the digital invitation is made public to all.
16. The system of claim 11, wherein the first profile computed device is further configured to: send the digital invitation using an out of band network channel.
17. The system of claim 1 1, wherein the private network is further configured to:
establish as an overlay network on an existing public network, or
establish as an overlay peer to peer network.
18. The system of claim 11, wherein the secure channel with the first profile does not include a server intermediary.
19. The system of claim 11, wherein the first profile computing device including one or more of the following: a personal computer, tablet, laptop, handheld device, smart device, or internet of things device.
20. The system of claim 11, wherein the first profile computing device is further configured to: share the whitelist or portions of the whitelist with another profile.
PCT/US2020/042911 2019-07-22 2020-07-21 Systems and methods of salutation protocol to communicate using a private overlay peer to peer network WO2021016259A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP2022504523A JP7357141B2 (en) 2019-07-22 2020-07-21 Salutation Protocol System and Method for Communicating Using a Private Overlay Peer-to-Peer Network
BR112022000664A BR112022000664A2 (en) 2019-07-22 2020-07-21 Method and system for modeling private network communication
EP20844686.4A EP4005182A4 (en) 2019-07-22 2020-07-21 Systems and methods of salutation protocol to communicate using a private overlay peer to peer network
KR1020227005600A KR102642108B1 (en) 2019-07-22 2020-07-21 Greeting protocol system and method for communicating using a private overlay peer-to-peer network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/518,292 US11265325B2 (en) 2019-07-22 2019-07-22 Systems and methods of salutation protocol to communicate using a private overlay peer to peer network
US16/518,292 2019-07-22

Publications (1)

Publication Number Publication Date
WO2021016259A1 true WO2021016259A1 (en) 2021-01-28

Family

ID=74187931

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2020/042911 WO2021016259A1 (en) 2019-07-22 2020-07-21 Systems and methods of salutation protocol to communicate using a private overlay peer to peer network

Country Status (6)

Country Link
US (1) US11265325B2 (en)
EP (1) EP4005182A4 (en)
JP (1) JP7357141B2 (en)
KR (1) KR102642108B1 (en)
BR (1) BR112022000664A2 (en)
WO (1) WO2021016259A1 (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11954681B2 (en) * 2019-09-30 2024-04-09 Southeast University Blockchain-enhanced open internet of things access architecture
US12058243B2 (en) 2021-06-09 2024-08-06 Whitestar Communications, Inc. Identity management system establishing two-way trusted relationships in a secure peer-to-peer data network
US11924177B2 (en) 2021-06-11 2024-03-05 Whitestar Communications, Inc. Crypto-signed switching between two-way trusted network devices in a secure peer-to-peer data network
US12126728B2 (en) 2021-06-15 2024-10-22 Whitestar Communications, Inc. Anti-replay protection based on hashing encrypted temporal key in a secure peer-to-peer data network
US11924229B2 (en) 2021-06-29 2024-03-05 Whitestar Communications, Inc. Distributed security in a secure peer-to-peer data network based on real-time sentinel protection of network devices
US12081558B2 (en) 2021-06-29 2024-09-03 Whitestar Communications, Inc. Distributed security in a secure peer-to-peer data network based on real-time guardian protection of network devices
US11949717B2 (en) 2021-06-29 2024-04-02 Whitestar Communications, Inc. Distributed security in a secure peer-to-peer data network based on real-time navigator protection of network devices
US12113785B2 (en) 2021-07-12 2024-10-08 Whitestar Communications, Inc. Directory server providing tag enforcement and network entity attraction in a secure peer-to-peer data network
US11582241B1 (en) 2021-07-22 2023-02-14 Whitestar Communications, Inc. Community server for secure hosting of community forums via network operating system in secure data network
US11792186B2 (en) 2021-07-29 2023-10-17 Whitestar Communications, Inc. Secure peer-to-peer based communication sessions via network operating system in secure data network
US11784813B2 (en) 2021-07-30 2023-10-10 Whitestar Communications, Inc. Crypto tunnelling between two-way trusted network devices in a secure peer-to-peer data network
US12058122B2 (en) 2021-08-23 2024-08-06 Whitestar Communications, Inc. Password concatenation for secure command execution in a secure network device
US11870899B2 (en) 2021-08-30 2024-01-09 Whitestar Communications, Inc. Secure device access recovery based on validating encrypted target password from secure recovery container in trusted recovery device
US11582201B1 (en) 2021-09-16 2023-02-14 Whitestar Communications, Inc. Establishing and maintaining trusted relationship between secure network devices in secure peer-to-peer data network based on obtaining secure device identity containers
KR102540052B1 (en) * 2021-10-01 2023-06-02 백석대학교산학협력단 An internet of things network system based on blockchain and the management method thereof
US12088590B2 (en) 2021-10-07 2024-09-10 Whitestar Communications, Inc. Secure keyboard resource limiting access of user input to destination resource requesting the user input
US12010245B2 (en) 2021-11-09 2024-06-11 Whitestar Communications, Inc. Secure assistance for asynchronous task completion by unavailable endpoint device upon restored availability in a secure peer-to-peer data network
US12069032B2 (en) 2021-11-22 2024-08-20 Whitestar Communications, Inc. Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network
US12052266B2 (en) 2021-12-16 2024-07-30 Whitestar Communications, Inc. Secure streaming media based on updating hypercontent in a secure peer-to-peer data network
US11811755B2 (en) 2022-01-20 2023-11-07 Whitestar Communications, Inc. Dynamic secure keyboard resource obtaining interface definitions for secure ad-hoc control of a target device in a secure peer-to-peer data network
US11848763B2 (en) 2022-01-20 2023-12-19 Whitestar Communications, Inc. Secure ad-hoc deployment of IoT devices in a secure peer-to-peer data network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130159715A1 (en) * 2004-10-29 2013-06-20 Research In Motion Limited Secure Peer-to-Peer Messaging Invitation Architecture
US20140213309A1 (en) * 2003-09-16 2014-07-31 Blackberry Limited Method for Creating a Peer-to-Peer Immediate Messaging Solution Without Using an Instant Messaging Server
US9363221B1 (en) * 2011-07-26 2016-06-07 Ozog Media, LLC System, method, and computer program product for providing temporal contacts

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158960A1 (en) * 2000-05-22 2003-08-21 Engberg Stephan J. System and method for establishing a privacy communication path
US8250150B2 (en) * 2004-01-26 2012-08-21 Forte Internet Software, Inc. Methods and apparatus for identifying and facilitating a social interaction structure over a data packet network
US7499995B2 (en) * 2005-06-28 2009-03-03 International Business Machines Corporation Managing permission for accessing third party applications on a telecommunications network
US7756924B2 (en) * 2005-12-21 2010-07-13 Microsoft Corporation Peer communities
JP5006677B2 (en) 2007-03-28 2012-08-22 株式会社ミクシィ Invitation-based member service providing system and invitee duplicate registration authentication method
DE602007001075D1 (en) * 2007-07-05 2009-06-18 Conveneer Ab Method, apparatus and system for mobility management and efficient information retrieval in a communication network
US8171292B2 (en) * 2009-04-08 2012-05-01 Research In Motion Limited Systems, devices, and methods for securely transmitting a security parameter to a computing device
US8555054B2 (en) 2009-10-12 2013-10-08 Palo Alto Research Center Incorporated Apparatus and methods for protecting network resources
US8751808B2 (en) * 2009-11-12 2014-06-10 Roy Gelbard Method and system for sharing trusted contact information
US8630393B2 (en) 2010-07-27 2014-01-14 Marchex, Inc. System and method for blocking telephone calls
US8966643B2 (en) * 2011-10-08 2015-02-24 Broadcom Corporation Content security in a social network
US9253176B2 (en) * 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment
US9251360B2 (en) * 2012-04-27 2016-02-02 Intralinks, Inc. Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment
CN104333863B (en) 2014-10-20 2018-11-30 小米科技有限责任公司 Connection management method and device, electronic equipment
US9935962B2 (en) 2016-01-19 2018-04-03 Qualcomm Incorporated Method and system for onboarding wireless-enabled products in a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140213309A1 (en) * 2003-09-16 2014-07-31 Blackberry Limited Method for Creating a Peer-to-Peer Immediate Messaging Solution Without Using an Instant Messaging Server
US20130159715A1 (en) * 2004-10-29 2013-06-20 Research In Motion Limited Secure Peer-to-Peer Messaging Invitation Architecture
US9363221B1 (en) * 2011-07-26 2016-06-07 Ozog Media, LLC System, method, and computer program product for providing temporal contacts

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4005182A4 *

Also Published As

Publication number Publication date
US20210029126A1 (en) 2021-01-28
JP7357141B2 (en) 2023-10-05
JP2022541843A (en) 2022-09-27
BR112022000664A2 (en) 2022-05-31
EP4005182A4 (en) 2023-08-16
US11265325B2 (en) 2022-03-01
KR20220045962A (en) 2022-04-13
EP4005182A1 (en) 2022-06-01
KR102642108B1 (en) 2024-02-29

Similar Documents

Publication Publication Date Title
US11265325B2 (en) Systems and methods of salutation protocol to communicate using a private overlay peer to peer network
US11463418B2 (en) Systems and methods of enforcing communications semantics on a private network
US11343098B2 (en) Systems and methods of securing digital conversations for its life cycle at source, during transit and at destination
US11768951B2 (en) Systems and methods of gesture triggered automatic erasure on a private network
US11068195B2 (en) Systems and methods of distributed backup and recovery on a private network
US11546170B2 (en) Systems and methods of collaborative application on a private network
US20210029125A1 (en) Systems and methods of delegation or replication on a private network
US10298708B2 (en) Targeted notification of content availability to a mobile device
US11418627B2 (en) Targeted notification of content availability to a mobile device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20844686

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022504523

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112022000664

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 20227005600

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2020844686

Country of ref document: EP

Effective date: 20220222

ENP Entry into the national phase

Ref document number: 112022000664

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20220113