WO2021171070A1 - Cyber space valuation software - Google Patents

Cyber space valuation software Download PDF

Info

Publication number
WO2021171070A1
WO2021171070A1 PCT/IB2020/058295 IB2020058295W WO2021171070A1 WO 2021171070 A1 WO2021171070 A1 WO 2021171070A1 IB 2020058295 W IB2020058295 W IB 2020058295W WO 2021171070 A1 WO2021171070 A1 WO 2021171070A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
weight
cyber space
application
digital
Prior art date
Application number
PCT/IB2020/058295
Other languages
French (fr)
Inventor
Morteza HEIDARIANNOGHONDAR
Seyed javad MIR SHARIFI
Hassan DOLATABADI
Pouyan FARZAD
Original Assignee
Kala Shahr Hoshmand
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kala Shahr Hoshmand filed Critical Kala Shahr Hoshmand
Priority to PCT/IB2020/058295 priority Critical patent/WO2021171070A1/en
Publication of WO2021171070A1 publication Critical patent/WO2021171070A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Definitions

  • Cyber space valuation software is an individual digital bag with digital weight and the basis of producing a digital identity in this system is the hardware ID code of each person through which it enters the system and creates a digital bag for each person by entering the system. And all the activities of the person are evaluated in the form of digital code and each user can give digital weight to his activities in two ways.
  • the first method is that users can put all their useful social networks on their personal page.
  • First data is accessed describing a plurality of different functional aspects of a particular software application.
  • the first data is received from multiple different sources.
  • Second data is accessed describing a plurality of different non-functional aspects of the particular software application, the second data received from multiple different sources.
  • a plurality of functional scores for the particular software application is derived based on the plurality of functional aspects.
  • a plurality of non-functional scores for the particular software application is derived based on the plurality of non-functional aspects.
  • a quality score for the particular software application is calculated from the plurality of functional scores and the plurality of non-functional scores.
  • the above invention is a method for evaluating the quality of the software program, which includes access to functional and non-functional data of the particular software and explains various aspects of that software and finally calculates the quality score of that software.
  • our invention which is named "Cyber space valuation" software can display all the activities of users in cyberspace, such as the use of search engines, various applications, games, useful programs, etc. in one page according to the user's choice. According to the working mechanism of the application, every user’s activity on phone or hardware is reported without invading the users 'privacy and the amount of users' activity in virtual network is evaluated based on this report. This acquired weight is recorded in the form of a unit called "Cyber space valuation" in the personal profile of each user which can be used in various cases and facilities, provided by this application or other startups.
  • a method includes receiving, by a computer, input from a client device.
  • the input is indicative of a software environment for software to be developed by a user.
  • the method further includes analyzing, by the computer, the received input against a knowledge base to generate a technology recommendation for the user to use to develop the software.
  • the method also includes providing, by the computer, the technology recommendation to the client device.
  • the above invention is a program for technology recommendation for the software environment.
  • this program In the input part of this program, there is a query tree with leaf nodes, which asks questions to query the input of the user related to encryption software operating system.
  • Knowledge-based data analysis is also performed to generate a technology recommendation for the user related to a software operating system.
  • our invented software called “Cyber space valuation” has special advantages which can be used to create a unique security code for each user when installing the program called “Arbit” Code.
  • This code is a common unit in credit exchange called “Cyber space valuation” which can evaluate the activities of users in virtual network by intended hardware and can determine the amount and weight of users' activities in virtual social network.
  • a method of establishing a centralized analytics environment includes receiving a plurality of environmental requirements from a user and, based upon the plurality of environmental requirements, establishing at least one recommended technology stack for a centralized analytics environment.
  • the environmental requirements that define the centralized analytics problem can include data format requirements, data volume requirements, data refresh rate requirements, data source requirements, analytics nature requirements, analytics complexity requirements, analytics application requirements, analytics consumption environment requirements, and analytics consumption frequency requirements.
  • the at least one recommended technology stack typically includes a recommended data loading tool, a recommended data transformation tool, a recommended data storage tool, a recommended analytics tool, and a recommended extended data storage tool. It can also include recommended physical and/or virtual hardware infrastructure.
  • the above invention is a program for creating a centralized analytics environment that receives some user’s information and a technology package will be recommended for a centralized analytical environment based on this derived environmental information.
  • our intended invention named “Cyber space valuation” is able to create a security code for each user when installing the program with the name of “Cyber space valuation” code. Therefore, users can use their personal page as a messenger to chat and they can also visit their activity chart as well as Cyber space valuation box in every second online.
  • An example method may include collecting utilization metrics for an application hosted on a computing instance.
  • the utilization metrics may be a measure of computing resources used by the application.
  • the utilization metrics may be analyzed to determine a level of computing resources for the computing instance used by the application.
  • a software container configuration for the application may be determined based at least in part on the utilization metrics when analysis of the utilization metrics indicates an underutilization of computing resources by the application.
  • the specifications of the software container configuration may then be provided to a customer.
  • the above invention represents the software for analyzing the selected criteria, which may lead to lack of computational resources of the program.
  • Our invention is the software that allows the users to have their own personal user codes which can evaluate their activities in virtual social networks. Also, this software has the ability to easily access and thematically categorize virtual activities to facilitate the work and display them at desired time intervals. Moreover, the users can upload their executive activities in it. They can also chat and exchange information with others using their personal pages.
  • Cyber space valuation software is able to display all the activities of users in virtual network, such as the use of search engines, various applications, games, useful programs, etc. in one page according to the user's choice and report the amount of user activity at any time for each of these programs.
  • the user opens an application or a website by the Cyber space valuation program.
  • Cyber space valuation calculates the amount of his/her usage in the background, and then sends the usage time along with the domain or program name to the server.
  • the virtual communication world has proceeded to a further step in which the governing rules of labor division have changed significantly and traditional businesses have given way to a variety of Internet businesses. Hence, every day we witness the growing prosperity of this type of business in different communities.
  • the virtual world has created many opportunities to increase wealth, education and information for the general public in the world.
  • virtual social world has created an equal opportunity for all classes in different societies" so that people can use minimum features such as a smartphone to enjoy an equal opportunity.
  • “Cyber space valuation” software is able to display all users’ activities in virtual social network, such as the use of search engines, a variety of applications, games, useful programs, etc. in one page according to users' choices.
  • every user’s activity on phone or hardware is reported without invading users 'privacy and the amount of users' activity is evaluated based on this report.
  • This acquired weight is recorded in the form of a unit called “Cyber space valuation" in the personal profile of each user which can be used in various cases and facilities, provided by this application or other startups.
  • a digital wallet is created for every user and all the activities of the user are evaluated in the form of a digital code. Every user can open all his/her activities in virtual social networks, computer games, etc. through this application and acquire digital weight by working in virtual network. Digital valuation in this system is implemented by the users themselves. Therefore, the digital wallet of a person with its digital weight is called "Cyber space valuation”.
  • the intended algorithm employs an equation of the time when user is active in virtual network along with the weight of the used website or application.
  • the amount of acquired weight coefficient is calculated by Artificial intelligence methods and classification algorithms.
  • the user opens an application or a website with the Cyber space valuation program.
  • Cyber space valuation calculates the amount of usage and then sends the time of this usage along with the domain or program name to the server.
  • a classification algorithm will be employed to calculate and classify the weight coefficient of that website.
  • the intended domain will also be placed in one of the categories of sports, scientific, political, economic, social, news. Then, according to the considered priorities and weights, the weight coefficient of the website is calculated.
  • This coefficient is combined with the usage time, user activities and Alexa ranking score according to specific algorithms and finally the weight of user activity is calculated.
  • the weight of user activity is calculated in the application.
  • Each user can assign digital weight to his/her activities in the following ways:
  • the person's personal page in the "Cyber space valuation” application has a "Digital Resume" field.
  • the user can upload all his executive activities in it and through this he can advertise and offer his activities.
  • the system loads the individual activities on the main page and makes them available to others according to the selected category.
  • Users can use their personal page as a messenger to chat and exchange information with others and receive bits in return.
  • the amount of use of each of the websites or applications in terms of Cyber space valuation in relation to the time used is provided to the user in an instant so that the user can use the amount at any time. View on your personal page.
  • This diagram shows the user usage of different sites so that in what fields these sites are located. Different categories of sites include sports, scientific, political, economic, social, news sites. Using this chart, the user can check his activity level.
  • This chart shows the usage of each user of different applications or applications so that the user can measure the time of their activities in different applications on a daily basis.
  • a digital bag is created for the person and all the activities of the person are evaluated in the form of a digital code.
  • This weight is an equation from the time the user uses cyberspace with the weight of the website or application that the user has used. The amount of this weight coefficient is calculated using artificial intelligence methods and classification algorithms.
  • Cyber space valuation calculates the amount of their use in the background and then sends the usage along with the domain or program name to the server. If the user has used a website, a classification algorithm will be used to calculate and classify the weight coefficient of that website. The intended domain will also be placed in one of the categories of sports, scientific, political, economic, social, news.
  • UV validation method by the system:
  • UV The weight gained by the user
  • Cyber space valuation software can be used in a variety of online and Internet services (such as buying and selling), communication software (such as messengers), informative software, educational services, requirement research services, technical and engineering services, medical services, public services, banking and financial services, along with the presentation of individual and group achievements (such as handicrafts, etc.) and can report the amount of their usage .

Abstract

Cyber space valuation software is an individual digital bag with digital weight and the basis of producing a digital identity in this system is the hardware ID code of each person through which it enters the system and creates a digital bag for each person by entering the system. And all the activities of the person are evaluated in the form of digital code and each user can give digital weight to his activities in two ways. The first method is that users can put all their useful social networks on their personal page. Upload and through this, for each person's activity in each of the social networks, it has a digital weight (Cyber space valuation) and the second method is that users can upload each of their applications on their personal page and through this and for the activity of the person.

Description

Cyber space valuation software
Cyber space valuation software is an individual digital bag with digital weight and the basis of producing a digital identity in this system is the hardware ID code of each person through which it enters the system and creates a digital bag for each person by entering the system. And all the activities of the person are evaluated in the form of digital code and each user can give digital weight to his activities in two ways. The first method is that users can put all their useful social networks on their personal page.
Upload and through this, for each person's activity in each of the social networks, it has a digital weight (Cyber space valuation) and the second method is that users can upload each of their applications on their personal page and through this And for the activity of the person, he is given Cyber space valuation and its acquired weight is calculated from the time the user uses the Cyber space along with the weight of the website or application that the user has used, and the amount of this weight coefficient, using It is calculated from artificial intelligence methods and classification algorithms.
Physics (G) computing; calculating; counting (G06) electric digital data processing (G06F) arrangements for software engineering (G06F 8/00)
Software application quality assessment
United States Patent Application 20170235662
First data is accessed describing a plurality of different functional aspects of a particular software application. The first data is received from multiple different sources. Second data is accessed describing a plurality of different non-functional aspects of the particular software application, the second data received from multiple different sources. A plurality of functional scores for the particular software application is derived based on the plurality of functional aspects. A plurality of non-functional scores for the particular software application is derived based on the plurality of non-functional aspects. A quality score for the particular software application is calculated from the plurality of functional scores and the plurality of non-functional scores.
The above invention is a method for evaluating the quality of the software program, which includes access to functional and non-functional data of the particular software and explains various aspects of that software and finally calculates the quality score of that software. However, our invention which is named "Cyber space valuation" software can display all the activities of users in cyberspace, such as the use of search engines, various applications, games, useful programs, etc. in one page according to the user's choice. According to the working mechanism of the application, every user’s activity on phone or hardware is reported without invading the users 'privacy and the amount of users' activity in virtual network is evaluated based on this report. This acquired weight is recorded in the form of a unit called "Cyber space valuation" in the personal profile of each user which can be used in various cases and facilities, provided by this application or other startups.
Technology recommendation for software environment
United States Patent 9934002
A method includes receiving, by a computer, input from a client device. The input is indicative of a software environment for software to be developed by a user. The method further includes analyzing, by the computer, the received input against a knowledge base to generate a technology recommendation for the user to use to develop the software. The method also includes providing, by the computer, the technology recommendation to the client device.
The above invention is a program for technology recommendation for the software environment. In the input part of this program, there is a query tree with leaf nodes, which asks questions to query the input of the user related to encryption software operating system. Knowledge-based data analysis is also performed to generate a technology recommendation for the user related to a software operating system. However, our invented software called “Cyber space valuation” has special advantages which can be used to create a unique security code for each user when installing the program called “Arbit” Code. This code is a common unit in credit exchange called “Cyber space valuation” which can evaluate the activities of users in virtual network by intended hardware and can determine the amount and weight of users' activities in virtual social network.
Methods and Systems for Establishing a Centralized Analytics Environment
United States Patent Application 20160164749
A method of establishing a centralized analytics environment includes receiving a plurality of environmental requirements from a user and, based upon the plurality of environmental requirements, establishing at least one recommended technology stack for a centralized analytics environment. The environmental requirements that define the centralized analytics problem can include data format requirements, data volume requirements, data refresh rate requirements, data source requirements, analytics nature requirements, analytics complexity requirements, analytics application requirements, analytics consumption environment requirements, and analytics consumption frequency requirements. The at least one recommended technology stack typically includes a recommended data loading tool, a recommended data transformation tool, a recommended data storage tool, a recommended analytics tool, and a recommended extended data storage tool. It can also include recommended physical and/or virtual hardware infrastructure.
The above invention is a program for creating a centralized analytics environment that receives some user’s information and a technology package will be recommended for a centralized analytical environment based on this derived environmental information. However, our intended invention named “Cyber space valuation” is able to create a security code for each user when installing the program with the name of “Cyber space valuation” code. Therefore, users can use their personal page as a messenger to chat and they can also visit their activity chart as well as Cyber space valuation box in every second online.
Software container recommendation service
United States Patent 9122562
A technology is described for a software container recommendation service. An example method may include collecting utilization metrics for an application hosted on a computing instance. The utilization metrics may be a measure of computing resources used by the application. The utilization metrics may be analyzed to determine a level of computing resources for the computing instance used by the application. A software container configuration for the application may be determined based at least in part on the utilization metrics when analysis of the utilization metrics indicates an underutilization of computing resources by the application. The specifications of the software container configuration may then be provided to a customer.
The above invention represents the software for analyzing the selected criteria, which may lead to lack of computational resources of the program. Our invention, on the other hand, is the software that allows the users to have their own personal user codes which can evaluate their activities in virtual social networks. Also, this software has the ability to easily access and thematically categorize virtual activities to facilitate the work and display them at desired time intervals. Moreover, the users can upload their executive activities in it. They can also chat and exchange information with others using their personal pages.
Nowadays, the use of online and Internet services (such as buying and selling), communication software (such as messengers), informative software, educational services, requirement research services, technical and engineering services, medical services, public services, banking and financial services, along with the presentation of individual and group achievements (such as handicrafts, etc.) is increasing rapidly. Therefore, users need software to inform them about the amount of their activity on various sites and Internet programs and applications. According to the abovementioned notes, "Cyber space valuation" software is able to display all the activities of users in virtual network, such as the use of search engines, various applications, games, useful programs, etc. in one page according to the user's choice and report the amount of user activity at any time for each of these programs. For this purpose, the user opens an application or a website by the Cyber space valuation program. Cyber space valuation calculates the amount of his/her usage in the background, and then sends the usage time along with the domain or program name to the server.
These days, the use of online and Internet services (such as buying and selling), communication software (such as messengers), informative software, educational services, requirement research services, technical and engineering services, medical services, public services, banking and financial services, along with the presentation of individual and group achievements (such as handicrafts, etc.) is increasing expeditiously. Even many users, who previously did not have any trust and positive attitude toward online and Internet-based services, have changed their mind and eagerly use these services nowadays. Therefore, the burgeoning populations of users who rely on online services have led to the considerable growth of this type of business. As a result, we can daily observe the increasing numbers of such activities around countries and the world.
In today's world, equipping with the science and knowledge of Cyber space s and communications such as the Internet, social networks, useful applications, etc., can be considered as a specific weight and privilege. Therefore, if an individual enjoys more knowledge in this field, he/she can manage daily affair of life more efficiently comparing with others.
The virtual communication world has proceeded to a further step in which the governing rules of labor division have changed significantly and traditional businesses have given way to a variety of Internet businesses. Hence, every day we witness the growing prosperity of this type of business in different communities.
The virtual world has created many opportunities to increase wealth, education and information for the general public in the world. In other words, it can be said that virtual social world "has created an equal opportunity for all classes in different societies" so that people can use minimum features such as a smartphone to enjoy an equal opportunity.
Acquired weights in the virtual world, how to achieve these weights and how to exploit its opportunities in real world prompted us to introduce a solution for estimating the weight of the user's usage of virtual world through the "Cyber space valuation" application. The calculation of acquired weights in the virtual world is called "energy of data" and the use of this weight and digital credit in the real world is introduced as digital credit.
Various methods and capabilities have been presented by some browsers and programs which determines the amount of usage of different websites and programs at present. These methods, however, cannot play a role in providing users with the amount of acquired weights in virtual world since they only measure the amount of internet traffic for each program and do not differentiate between one scientific activity and another different activity. In other words, there would be no difference between an active in internet and a person who is just watching. In this regard, the existing problems are mentioned as follows:
Problem 1: At present, some browsers such as internet explorer, Firefox, etc., search the information and have various features like email, etc. Nevertheless, these browsers do not have the ability to report and record all Internet users' activities. In some limited cases, this feature is constrained to a small part of users' activities. However, it is imperative to create a comprehensive database to aggregate user’s activities so that users can not only realize the amount of used traffic by browsers and applications but also can understand their active or inactive role.
Problem 2: In general, every application or Internet program is supported by a database in which the required information of that application is stored. So, users can exploit the stored information in that database only during their usage or special cases. In fact, it is impossible to integrate data into a single database due to various reasons including the size of big data or security issues. This shortcoming has eliminated the possibility of estimating the contribution weight of users in any application or Internet program in a cumulative way and has made it inaccessible.
Problem 3: Many international documents and international oversight organizations emphasize the protection of citizens' privacy and the protection of user’s data. Therefore, a solution must be achieved in which the acquired weight can be calculated by users through the estimation of internet usage while the user’s privacy is protected.
According to the abovementioned notes, "Cyber space valuation" software is able to display all users’ activities in virtual social network, such as the use of search engines, a variety of applications, games, useful programs, etc. in one page according to users' choices. According to the working mechanism of the application, every user’s activity on phone or hardware is reported without invading users 'privacy and the amount of users' activity is evaluated based on this report. This acquired weight is recorded in the form of a unit called "Cyber space valuation" in the personal profile of each user which can be used in various cases and facilities, provided by this application or other startups.
Solution of problem
In the digital world, every device or hardware has its own unique hardware code. Therefore, the basis of generating a digital identity in this system is the hardware ID of each user, who enters the system.
By entering the system, a digital wallet is created for every user and all the activities of the user are evaluated in the form of a digital code. Every user can open all his/her activities in virtual social networks, computer games, etc. through this application and acquire digital weight by working in virtual network. Digital valuation in this system is implemented by the users themselves. Therefore, the digital wallet of a person with its digital weight is called "Cyber space valuation".
To calculate the acquired weight of users in cyberspace, the intended algorithm employs an equation of the time when user is active in virtual network along with the weight of the used website or application. The amount of acquired weight coefficient is calculated by Artificial intelligence methods and classification algorithms. The user opens an application or a website with the Cyber space valuation program. In the background, Cyber space valuation calculates the amount of usage and then sends the time of this usage along with the domain or program name to the server. If the user has used a website, a classification algorithm will be employed to calculate and classify the weight coefficient of that website. The intended domain will also be placed in one of the categories of sports, scientific, political, economic, social, news. Then, according to the considered priorities and weights, the weight coefficient of the website is calculated. This coefficient is combined with the usage time, user activities and Alexa ranking score according to specific algorithms and finally the weight of user activity is calculated. On the other hand, if the user has used an application, the amount of active installations of each user which can be identified in the application stores along with the amount of user’s usage and application types are combined according to the defined algorithms and the weight of user activity is calculated in the application. By means of these coefficients, the weight of the user's activity is calculated and assigned to the user.
Each user can assign digital weight to his/her activities in the following ways:
By using an application, users can upload all their most used social networks or other applications on their personal page. Therefore, a shortcut is created from the used application in Cyber space valuation. In this way, a digital weight (Cyber space valuation) can be assigned for every activity of user in shortcut applications.
By using a website, Users can upload any of their websites address on their personal page. Therefore, a shortcut is created from the address of used website in Cyber space valuation and Cyber space valuation is assigned for any activity of the user.
Finally, in order to validate the acquired user weight, we convert this weight to a measureable coupon by using a unique user ID and encryption methods. In other words, by combining the acquired user weight (UV) and the user ID, we can create a string that represents the user weight with a specific user ID. To validate, we use RSA (Rivest–Shamir–Adleman) cryptography or any public key encryption method such as Elliptical Curve Cryptography  (ECC), etc.
First, we create a pair of public and private keys using public key encryption methods. Then we encrypt the created coupon with our public key and deliver its output to the user as a valid coupon. To determine the validity, it is enough to send the encrypted coupon to the server. Initially, the coupon is decrypted by a private key, and if the ID and UV structure is valid, it can be viewed and extracted. If the user inadvertently or intentionally manipulates the encrypted coupon, the decrypted coupon will have no proper structure with no weight. Hence, the acquired weight can be validated by extracting the user ID as well as user weight UV.
Advantage effects of invention
Create a unique code for each user when installing the program called "Cyber space valuation"
Creating a common unit in the exchange of credit obtained by users called "Cyber space valuation"
Evaluate the activities of users in cyberspace using the hardware used by the user.
Determining the amount and weight of users' activities in Cyber space as a unit of "Cyber space valuation"
Easy access and thematic categorization of virtual activities for the convenience of users
Integrating users' activities in using different types of applications and websites in cyberspace and displaying them at desired intervals.
Ability to thematically categorize user activities in cyberspace and use it in the form of a digital resume.
Ability to transfer "Cyber space valuation" among users
The person's personal page in the "Cyber space valuation" application has a "Digital Resume" field. The user can upload all his executive activities in it and through this he can advertise and offer his activities. The system loads the individual activities on the main page and makes them available to others according to the selected category.
Users can view their activity chart and their Cyber space valuation fund online and instantly.
Users can use their personal page as a messenger to chat and exchange information with others and receive bits in return.
Cyber space valuation chart in terms of time
Activity chart on different sites
Activity chart in applications
Cyber space valuation software algorithm
In this diagram, the amount of use of each of the websites or applications in terms of Cyber space valuation in relation to the time used is provided to the user in an instant so that the user can use the amount at any time. View on your personal page.
This diagram shows the user usage of different sites so that in what fields these sites are located. Different categories of sites include sports, scientific, political, economic, social, news sites. Using this chart, the user can check his activity level.
This chart shows the usage of each user of different applications or applications so that the user can measure the time of their activities in different applications on a daily basis.
Upon entering the system, a digital bag is created for the person and all the activities of the person are evaluated in the form of a digital code. This weight is an equation from the time the user uses cyberspace with the weight of the website or application that the user has used. The amount of this weight coefficient is calculated using artificial intelligence methods and classification algorithms.
Examples
The user opens an application or a website by the Cyber space valuation program. Cyber space valuation calculates the amount of their use in the background and then sends the usage along with the domain or program name to the server. If the user has used a website, a classification algorithm will be used to calculate and classify the weight coefficient of that website. The intended domain will also be placed in one of the categories of sports, scientific, political, economic, social, news.
In this software, the algorithm for calculating the weight acquired by users in cyberspace is as follows:
Figure pctxmlib-appb-M000001
UV in terms of "Cyber space valuation": User-acquired weight in cyberspace
Domain Ranking -
Figure pctxmlib-appb-M000002
: Table a - Site ranking coefficient or application type
Figure pctxmlib-appb-M000003
: Tables B and C - Alexa coefficient or stores
Figure pctxmlib-appb-M000004
: Time in seconds
……… Economic news Political Sports Science
D i D 5 D 4 D 3 D 2 D 1
1-99 100-999 1000-9999 10000- ------
R 1 R 2 R 3 R i
1-99 100-999 1000-9999 10000- ------
R 1 R 2 R 3 R i
Table c: Stores coefficient
UV validation method by the system:
UV: The weight gained by the user
ID: The unique identifier of the user
pub = General key of encryption algorithm
prv = Private key of the encryption algorithm
Enc: Encryption function
Dec: Decryption function
ticket = Enc((UV, ID) , pub) user
Coupon Validation:
Dec (ticket, prv) = (UV, ID)
Cyber space valuation software can be used in a variety of online and Internet services (such as buying and selling), communication software (such as messengers), informative software, educational services, requirement research services, technical and engineering services, medical services, public services, banking and financial services, along with the presentation of individual and group achievements (such as handicrafts, etc.) and can report the amount of their usage .

Claims (8)

  1. It is claimed that Cyber space valuation software is a digital wallet of a person with its digital weight. The basis for producing a digital identity in this system is the hardware ID code of each user through which the user can enters the system. By entering the system, a digital wallet is created for each user and all activities of the user are evaluated in the form of digital code which is performed by the users themselves.
  2. According to Claim 1, each user can give digital weight to their activities in two ways: 1. By using an application, users can upload all their most used social networks or other applications on their personal page. Therefore, a shortcut is created from the used application in Cyber space valuation 2. By using a website, Users can upload any of their websites address on their personal page. Therefore, a shortcut is created from the address of used website in Cyber space valuation and Cyber space valuation is assigned for any activity of the user.
  3. According to claim 2, the acquired weight is an equation of the usage time spent in virtual network along with the weight of the intended website or application. The amount of this weight coefficient is calculated using artificial intelligence methods and classification algorithms.
  4. According to claim 3, the working method of this software is as follows: the users open an application or a website by Cyber space valuation program and Cyber space valuation calculates the amount of their usage in the background. Then the usage time along with the name of domain or program is sent to the server.
  5. According to Claim 4, classification algorithms are used to calculate and classify the weight of the used website. The intended domain will be also placed in one of the categories of sports, scientific, political, economic, social, news etc.
  6. According to Claim 5, the weight coefficient of the website is calculated according to the considered priorities and weights. This coefficient is combined with the usage time, user activities and Alexa ranking score according to specific algorithms and finally the weight of user activity is calculated.
  7. According to Claim 2, If the user uses the applications that he has placed on Cyber space valuation, the application coefficient in calculating the weight earned by the user will be calculated according to the type of application and the amount of installations reported from the application in the App Stores. This coefficient is then combined with the user performance to calculate the weight gained by the user.
  8. According to Claim 7, in order to validate the acquired user weight, we convert this weight to a measureable coupon by using a unique user ID and encryption methods. In other words, by combining the acquired user weight (UV) and the user ID, we can create a string that represents the user weight with a specific user ID. To validate, we use RSA (Rivest–Shamir–Adleman) cryptography or any public key encryption method such as Elliptical Curve Cryptography (ECC), etc.
PCT/IB2020/058295 2020-09-06 2020-09-06 Cyber space valuation software WO2021171070A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IB2020/058295 WO2021171070A1 (en) 2020-09-06 2020-09-06 Cyber space valuation software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2020/058295 WO2021171070A1 (en) 2020-09-06 2020-09-06 Cyber space valuation software

Publications (1)

Publication Number Publication Date
WO2021171070A1 true WO2021171070A1 (en) 2021-09-02

Family

ID=77490999

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2020/058295 WO2021171070A1 (en) 2020-09-06 2020-09-06 Cyber space valuation software

Country Status (1)

Country Link
WO (1) WO2021171070A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1208446B1 (en) * 1999-08-12 2007-07-11 Appliede, Inc. Professional time tracking and recouping system and software
US20140149588A1 (en) * 2003-11-04 2014-05-29 Rcs Dynamics, Llc Internet use monitoring system and method
US20180225693A1 (en) * 2012-03-06 2018-08-09 Richard Postrel Consumer data and privacy controls in a social networking environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1208446B1 (en) * 1999-08-12 2007-07-11 Appliede, Inc. Professional time tracking and recouping system and software
US20140149588A1 (en) * 2003-11-04 2014-05-29 Rcs Dynamics, Llc Internet use monitoring system and method
US20180225693A1 (en) * 2012-03-06 2018-08-09 Richard Postrel Consumer data and privacy controls in a social networking environment

Similar Documents

Publication Publication Date Title
US20230098818A1 (en) Systems and methods for conducting more reliable assessments with connectivity statistics
Toyoda et al. A novel methodology for hyip operators’ bitcoin addresses identification
Sun et al. Data security and privacy in cloud computing
JP2017091515A (en) Computer-implemented system and method for automatically identifying attributes for anonymization
US11177937B1 (en) Apparatus and method for establishing trust of anonymous identities
CN108491267B (en) Method and apparatus for generating information
Luntovskyy et al. Cryptographic technology blockchain and its applications
Elkordy et al. Federated analytics: A survey
Langevin et al. Generative adversarial networks for data augmentation and transfer in credit card fraud detection
CN114398553A (en) Object recommendation method and device, electronic equipment and storage medium
CN110197078B (en) Data processing method and device, computer readable medium and electronic equipment
CN107005576A (en) The bridge joint matching identification symbol for link identifiers is generated from server log
Jena et al. Ensuring data privacy using machine learning for responsible data science
Harkous et al. C3p: Context-aware crowdsourced cloud privacy
CN117094773A (en) Online migration learning method and system based on blockchain privacy calculation
WO2021171070A1 (en) Cyber space valuation software
Renuga et al. Efficient privacy-preserving data sanitization over cloud using optimal GSA algorithm
Vidhya et al. Fusion-based advanced encryption algorithm for enhancing the security of Big Data in Cloud
Ashraf et al. H2E: A Privacy Provisioning Framework for Collaborative Filtering Recommender System
Russo et al. Dare‐to‐Share: Collaborative privacy‐preserving recommendations with (almost) no crypto
Ricci et al. Privacy-preserving cloud-based statistical analyses on sensitive categorical data
JP2013210933A (en) Recommendation support method, recommendation support device and program
Saxena et al. Integration of back-propagation neural network to classify of cybercriminal entities in blockchain
CN114004456B (en) Data tag calculation method, device, computer equipment and storage medium
Bogdanov et al. K-Anonymity Versus PSI3 for Depersonalization and Security Assessment of Large Data Structures

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20921188

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20921188

Country of ref document: EP

Kind code of ref document: A1