US20080028472A1 - Heterogeneous evolutionary self-formatting Internet protocols - Google Patents
Heterogeneous evolutionary self-formatting Internet protocols Download PDFInfo
- Publication number
- US20080028472A1 US20080028472A1 US11/492,229 US49222906A US2008028472A1 US 20080028472 A1 US20080028472 A1 US 20080028472A1 US 49222906 A US49222906 A US 49222906A US 2008028472 A1 US2008028472 A1 US 2008028472A1
- Authority
- US
- United States
- Prior art keywords
- rules
- rule
- members
- society
- action
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 49
- 230000009471 action Effects 0.000 claims description 55
- 238000004891 communication Methods 0.000 claims description 30
- 230000008569 process Effects 0.000 claims description 18
- 238000012795 verification Methods 0.000 claims description 13
- 230000003993 interaction Effects 0.000 claims description 11
- 230000008859 change Effects 0.000 claims description 4
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 230000011273 social behavior Effects 0.000 claims description 4
- 238000000638 solvent extraction Methods 0.000 claims description 2
- 238000004590 computer program Methods 0.000 abstract description 14
- 230000007246 mechanism Effects 0.000 abstract description 13
- 230000006870 function Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000007935 neutral effect Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000008846 dynamic interplay Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/131—Protocols for games, networked simulations or virtual reality
Definitions
- the present invention relates generally to computer-based communications, systems and environments thereof, and more particularly, to a novel system and method for providing heterogeneous evolutionary self-formatting Internet protocols.
- U.S. Pat. No. 6,829,569 is directed to a system and method that covers social dilemma virtual world environment (VWE) software facilitates creation and usage of social dilemma tests or exercises for measuring and analyzing online interactive societies.
- VWE social dilemma virtual world environment
- the teachings of U.S. Pat. No. 6,829,569 are directed to only the collection of data and the measurement of interaction between members of the virtual world environment.
- America On-line® the software and service provider that provides interactive services, Web brands, Internet technologies and e-commerce services, provides a mechanism for establishing community standards.
- the AOL® web-site provides a community infrastructure through message boards and chat rooms by providing a large gathering place enabling users to share interests and forge friendships.
- Appurtenant to the AOL® web-site's community infrastructure enabling interaction among users there are established community standards and guidelines aim to make it easier for users to take part and help provide a better experience for all participants.
- AOL® offers supervised community areas for kids and teens including a mechanism providing parents with the ability to establish Parental Controls and enable customization of their family's online experience.
- AOL® in the context of the AOL® web-site providing a chat room and message boards infrastructure, rules and standards are established that discourage usage of extreme language, explicit sexual references or talk that incites criticism anywhere on the service. Moreover, AOL® the web-site discourages users discussing any money-making schemes or advertisements in the chat rooms or on the message boards, and discourages the users not to use the message boards or chat rooms as a personals service, i.e., users are restrained from posting personal or viewing personal ads. Moreover, the chat rooms and message boards in the AOL® web-site prevents distribution of any content (photos, files, etc.) that is sexually explicit or incites ashamed against race, culture, religion or sexuality.
- AOL® further has a zero tolerance policy towards illegal activities taking place on the service and cooperates with law enforcement as well as take action against a user's account.
- the second prior art example thus indicates the establishment of rules to the members of societies by external means.
- the present invention is directed to a system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society.
- the system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves, that allows for the self-evolution of the virtual societies.
- a method of providing heterogeneous evolutionary self-formatting Internet protocols based on multiple communication channels such as speech, VoIP, WebCam or regular text-based communication.
- the members using heterogeneous evolutionary self-formatting Internet protocols will be protected, providing they are not impinging rights of other members.
- the Internet-like system plays a part in maintaining a proper rules-based system to the benefit of its members.
- the system of rules for heterogeneous evolutionary self-formatting Internet protocols behaves and corresponds to the set of software/hardware configurations.
- the system provides hypervisor ability with necessary restriction to follow rules formulated for the specific heterogeneous evolutionary self-formatting Internet protocol.
- Such protocols are built based on different system rules. Example for such rules could be based on the rules regulating democratic society, for example, as opposed to the rules regulating the totalitarian regime.
- an open, modality neutral system to connect humans and computers into manageable virtual societies allows overcoming current flaws in the Internet design and suggests the next social-evolutionary step for the existing Internet. That is, its contents change for its own evolution by changing the managing rules which may be created, validated and enforced within the virtual societies.
- the invention provides a system, method and computer program product for managing a virtual society comprising an on-line community of peers interacting via computer systems through the Internet, the method comprising:
- rule system comprising rules for governing actions that may be performed by members of the on-line community
- said on-line community of peers is self-evolving by enabling members to change rules for said on-line community's own evolution.
- the social behavior of members of the virtual society is supported in accordance with needs of the virtual society.
- a self-evolving system for managing a virtual society comprising an on-line community of peers interacting via computer systems through the Internet, the system comprising:
- the system of the present invention is self-evolving; it is built as a projection of the society (e.g., human society) having members that are united in groups with groups creating rules (laws of the society) with rules adapted to evolve by members.
- the system additionally implements a mechanism for enforcing the laws.
- FIG. 1 conceptually depicts an example virtual society structure for which the present invention is implemented
- FIG. 2 depicts an exemplary system 50 in which the present invention may be implemented
- FIG. 3 is a logical view depicting an example interactive Internet-based scenario implementing the system 10 of the invention.
- FIG. 4 depicts an example execution stack of the system implementing the system 10 of the invention
- FIG. 5 depicts sub-layers of the Verification Layer of the protocol stack implementing the system 10 of the invention
- FIG. 6 depicts the methodology for creating a peer in accordance with the present invention
- FIG. 7 depicts the main processing thread implemented by a region formed in the system 50 of the invention.
- FIG. 8 depicts an example process for creating a new rule in accordance with the invention.
- FIG. 9 depicts an initialization of verification process performed in accordance with the invention.
- FIG. 10 depicts an object model 500 of a virtual society
- FIG. 11 depicts a sequence implemented when a member of a region or on-line community requests an action be performed.
- the present invention is directed to a system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society.
- the system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves that allows for the self-evolution of the virtual societies.
- the rule system there are several requirements for the rule system: 1) it must be open to any member of the society (open or democracy like approach) or, to selected group of members of the society (e.g., an Intranet-like approach); and 2) they must be changeable by a predefined body in the society.
- the body can represent the whole society (“democracy”) or some selected group of users (e.g., a corporation, Intranet).
- FIG. 2 shows the design and architecture of an adaptive (self-formatting) Internet protocols infrastructure 50 in which the methodology for self-formatting Internet protocols of the present invention may be implemented.
- the system 50 may comprise one or more server devices 30 and one or more connected computing devices 32 a , . . . , 32 n connected thereto via a wired or wireless network connection that implement client-side Web browsers for interacting with the server.
- Each computer device 32 a , . . . , 32 n generally implements a processor device (e.g., a CPU) executing an Operating System (O/S) natively on the computer hardware that is adapted for executing basic computer system functions, and controlling execution of one or more processes and applications.
- a processor device e.g., a CPU
- O/S Operating System
- authorized users may access the Internet via a variety of devices 32 a , . . . , 32 n such as personal computer/computing device, handheld devices (personal digital assistant), laptop or like mobile computing devices, mobile phones or handsets, that implement an operating system such as Windows, Macintosh, UNIX, Linux or other operating system equipped with a Web browser application.
- the computing devices 32 a , . . . , 32 n may further implement: computer readable media, including a variety of types of volatile and non-volatile media, each of which can be removable or non-removable.
- a system memory includes computer readable media in the form of volatile memory, such as random access memory (RAM), and non-volatile memory, such as read only memory (ROM).
- volatile memory such as random access memory (RAM)
- ROM read only memory
- the ROM may include an input/output system (BIOS) that contains the basic routines that help to transfer information between elements within computer device 32 , such as during start-up.
- BIOS input/output system
- non-volatile memory may comprise non-volatile “flash” memory or EEPROM memory.
- the RAM component typically contains data and/or program modules in a form that can be quickly accessed by the CPU.
- ⁇ examples include a hard disk drive (not shown) for reading from and writing to a non-removable, non-volatile magnetic media, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from and/or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM, or other optical media.
- a hard disk drive for reading from and writing to a non-removable, non-volatile magnetic media
- a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”).
- an optical disk drive for reading from and/or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM, or other optical media.
- Any hard disk drive, magnetic disk drive, and optical disk drive would be connected to a system bus by one or more data media interfaces (not shown).
- the computer 32 can include other types of computer readable media providing non-volatile storage for storing computer readable instructions, data structures, program modules, and other data for use by computer 32 .
- the readable media can store the operating system (O/S), and one or more application programs, such as a program for maintaining the rule-based efficiency in the virtual society described herein in greater detail, and/or other program modules and program data for performing the Internet protocol self-formatting methodology conducted in accordance with the invention.
- O/S operating system
- application programs such as a program for maintaining the rule-based efficiency in the virtual society described herein in greater detail
- other program modules and program data for performing the Internet protocol self-formatting methodology conducted in accordance with the invention.
- the system infrastructure 50 is adapted to operate as a networked environment using logical connections to a computer device, i.e., server device 30 , which may comprise an application server, database server or the like, or may comprise a cluster of servers, accessible by a connected device 32 via a public or private network, represented as network 99 , which may comprise a local area network (LAN), or a wide area network (WAN), a corporate intranet, or the Internet.
- LAN local area network
- WAN wide area network
- the Internet a public or private network
- the computer device 32 connects to the local network via a network interface card or adapter (not shown) that supports a wireless or wired network communication protocol, transport, and data link layer protocol, e.g., Ethernet, etc.
- the computer device 32 When implemented in a WAN networking environment, the computer device 32 connects to the WAN via a high speed cable/dsl modem, network connection, telephone connection, fiber optic connection, or some other connection means (not shown).
- the server device 30 receives user queries and, in response, executes one or more applications and database software components for maintaining the rule-based efficiency in the virtual society according to the invention.
- a web-server, database server or cluster of servers may embody a web-site, such as may be hosted by an I.S.P. (Internet Service Provider) or like hosting enterprise, and includes network router and firewall components (not shown), that would enable the self-formatting functions of the invention securely over the Internet.
- I.S.P. Internet Service Provider
- the software embodying the computer-implemented functions of the invention can be executed on one computer (e.g., in a star-based topology) or can be copied or distributed across several computers in the system 50 , and can even be organized as a peer-to-peer computer network.
- the server device 30 (whether embodied as part of a web-site, or not) includes those hardware components, software processes and interface connections enabling user access via a wired or wireless network, e.g., through an interface such as a web-browser, as described herein.
- a wired or wireless network e.g., through an interface such as a web-browser, as described herein.
- users implementing computer based accessing devices 32 a , . . . , 32 n of the system 50 are enabled to access the server/web site remotely via wired or wireless connections to the network 99 (e.g., Internet).
- the network 99 e.g., Internet
- Wired or wireless communications between the server/web site and authorized users are via the public Internet in accordance with network communications protocols, e.g., TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP, SMTP (Simple Mail Transfer Protocol), secure sockets layer, and/or other transport and network protocols.
- network communications protocols e.g., TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP, SMTP (Simple Mail Transfer Protocol), secure sockets layer, and/or other transport and network protocols.
- a variety of communications protocols for enabling communication channels may be implemented including but not limited to: speech, VoIP, WebCam, or text-based communication.
- the system 50 preferably includes a searchable database 74 providing an inventory of rules and rule sets associated with a region (virtual society) that may be accessed and updated in the manner as described herein according to the invention.
- the rules are implemented in a rule-based programming language that can be integrated with platform independent software components, e.g., objects in Java, C++, and the like, as described herein with respect to FIG. 10 .
- control programs and/or rule-inference engines are provided that implement algorithms that interpret the rules based on a set of input data and the rules being enforced. Details regarding the contents of database 74 will be described in further detail hereinbelow.
- An additional user database 73 is provided that enables tracking of users and regions, i.e., virtual societies, on-line communities, etc., to which the present invention for enabling the establishment of rules created by members of the virtual society themselves, and allowing for the self-evolution of the virtual societies, is directed.
- the software whether implemented upon one computer (e.g., in a star-based topology) or distributed across several computers in the system 50 , is described by way of example with reference to a logical view 90 of the system as depicted in FIG. 3 , by way of example:
- the system 50 supports Application Services 75 providing functions governing, for example, a.) Execution of the communication request such as received from a user, e.g., peer 1 , use cases 1 and 2 as depicted in FIG. 3 ; and, b.) Obtaining return code of the request.
- the system 50 supports a Region System Services application 80 providing functions governing, for example, a.) Request of a rule set; b.) obtaining a service description; c.) provision of support for suggestion of the new rule; d.) provision of support for the acceptance of the new rule (for example, support for the voting for rule acceptance); and e.) verification of the rule compliance.
- the system 50 includes an abstraction of the (Open Systems Interconnection (OSI) reference standard networking communications stack as implemented by software in the system 50 of the invention.
- the execution stack 100 of the invention comprises an application layer portion 110 that provides a means for the user to access information on the network through an application (application specific processing), a Verification Layer 120 supporting rules sets processing, and a Communication Layer 130 responsible for the support of the communication.
- An example of the Application layer 110 includes a mail client and mail servers, HTTP client and servers, etc.
- An example of the Communication layer 130 is the TCP/IP layer (corresponding to the Network and Transport layers of the OSI network stack). This layer provides necessary communication between different peers and supporting servers.
- FIG. 5 describes sub-layers of the verification layer 120 of the execution stack of FIG. 4 .
- the Verification layer comprises two (2) sub layers—a first sub-layer 122 responsible for the support of regional rules, and another sub-layer 125 responsible for the global rules.
- Both sub-layers include an application dependant component—an Application Specific Verification component 123 depicted as elements 123 a , b for respective sub-layers supporting regional rules 122 and global rules 125 .
- FIG. 6 depicts the methodology for creating a peer in accordance with the present invention.
- a user alternately referred to as a “peer” will generate a request via that user's computing device to participate in the region or sub-region.
- the request is validated against regional and global rule sets as indicated at step 155 .
- a validation may comprise a statement that system does not keep communications older than certain period of time, for example 90 days.
- a document creation date is earlier than 90 days from now it should be removed/replaced. More specifically, such a document maybe documents containing passwords.
- This step may entail the peer, from an interface generated at his/her computer device 32 , accessing the searchable database 74 ( FIG. 2 ) via a network connection using the communications protocol supported, accessing the rule sets appropriate for the region, in addition to the global rule set, and applying the rules to the user request.
- a rule may be applied that will verify a user's request based on that user's identification (e.g., a history of the behavior of the user based on that user's ID, for instance). Then, at step 158 a determination is made as to whether the request has been validated. If the request has been validated, i.e., the request of the peer has been approved, a peer is created at step 160 and an acceptance notification is generated at step 165 . The peer may be given a User ID/password combination that will be used to identify the peer in further interactions with the community. In case the request of the peer has not been approved, a rejection notification is generated as indicated at step 170 .
- FIG. 7 depicts the main processing thread implemented by a region formed in the system 50 of the invention.
- a system user logs in with his/her User ID via his/her computer device 32 , as indicated at step 175 .
- a menu choice is provided at step 178 that enables the peer to choose one from among the following activity threads: Communication activity 180 , Rule Creation process 185 , and Rule Acceptance process 190 .
- Processes of the Communication and Rule Creations activities are defined in details with respect to FIGS. 8 and 9 .
- Rule Acceptance process 190 would be enabling participation in a voting scheme enabling peers to participate in defining and determining if a rule is to be accepted as a regional rule or sub-region rule, for example.
- On-line voting schemas are known in the art (see for example U.S. Pat. No. 6,175,833, the entire contents and disclosure of which is incorporated by reference as if fully set forth herein ), and can be implemented to enable peer voting on rules dependent upon the needs of the region/community.
- FIG. 8 depicts an example process for creating a new rule in accordance with the invention.
- a logged in system user via his/her computer device 32 , can initiate creation of a new rule. Then, dependent upon the needs of the type of community, vocabulary and rule language level information are obtained.
- This vocabulary and rule language level information is used to specify an Object/Action model (an “action” to be performed on an “object”) and possible level of the reasoning supported by the system.
- Object/Action model an “action” to be performed on an “object”
- a community may comprise a meeting place for children, with a specified vocabulary for interaction being the ability to only interact using voice or text-only, for example.
- Example of such rule is “messages/communications do not contain coarse words”, and list of coarse words/expressions is kept in some accessible storage device which can be compared against.
- the user creates one or more new rules of appropriate reasoning level.
- An example rule that may be implemented comprises specifying that no-one can share art with other peers under 15 years of age, for example, or that only select few have voting rights. Any rule that is created must then be verified to establish syntactic correctness which verification step is performed at step 210 , FIG. 8 . If rule is incorrect it is returned to the user for correction as indicated by the line 211 . Continuing, however, a rule that is determined as correct is submitted to the regional acceptance process as indicated at step 215 . As will be described in greater detail hereinbelow, upon acceptance of the rule, a process of initialization of verification is started as indicated at step 220 . That is, upon acceptance of the rule, any existing communications will be verified against newly accepted rule.
- FIG. 10 there is depicted an object model 500 of a virtual society.
- a member of a society performs and interacts with other members of the same region or other regions according to the regional rule system and the system of the region where the objects-subjects of interaction belong.
- FIG. 10 more particularly illustrates central classes of the possible object model needed to implement virtual society.
- the object model defines the structural relationships and dynamic interaction between a group of objects expressing virtual society. They may be realized in the language of choice (such as Java, C++, etc.).
- Objects of the virtual society are created and implemented to represent one or more of the following: the root region, represented as object 502 ; the region or society, represented as object 505 ; the member, represented as object 510 ; and action models, represented as objects 515 .
- Corresponding objects representing rules are depicted in FIG. 10 as comprising absolute rules, represented as objects 520 ; and, rules, represented as objects 525 .
- Realized objects of the virtual society are part of the implementing computer program and are created and invoked by computer program when there is a need for a structure or interaction specific to the virtual society.
- FIG. 11 shows the block diagram of an action “meta-rule” depicting the process enabling a member (peer) to perform an action in the region (for example, sending an e-mail to a peer under the age of 15 that includes a non-text-based attachment greater than 2 Gbytes).
- This is performed by interaction between a member and the system 50 providing the virtual society infrastructure.
- the following sequence is implemented when a member of the community requests an action be performed: a member 510 first initiates an action request. Then, the regional virtual society system hypervisor automatically performs a rule consistency check for checking the consistency of the request against the set of absolute rules 520 and regional rules 525 in an automated or semi-automated fashion. If the request conforms to the previous check, the request is being implemented as indicated at 550 , FIG. 11 . Otherwise, if the action request does not conform to the set of absolute and regional rules it is rejected as indicated at 575 .
- rules can be categorized as comprising Absolute or “Hypervisor” rules and Regional rules.
- Hypervisor rules include, but are not limited to: a rule that every existing peer has the right to exist until this peer or hypervisor decides to de-construct itself; or, a rule that every user may register to the system upon agreement of hypervisor; a rule that the common resource which is being shared by peers is possible to exist according to regional/society rules enforcers.
- Regional rules these are generated by members of the region/society with regional rules being enforced by regional/society rules enforcers.
- a Verification Service is implemented for requesting vocabulary from an application in order to create the object and action model.
- the Verification Service requests the needed language level (examples of the language level may be forward reasoning, backward reasoning, first order logic, description logic, etc.).
- the vocabulary of the region binds to the Object/Action Model using late binding or lazy binding schema as indicated at step 260 .
- usage of different rule inference engines may be used in accordance with the patterns as described in commonly-owned, co-pending United States Patent Publication No. 2004/0083454 A1, entitled Object Oriented Framework for Reasoning Having Pluggable Inference Engines, the whole disclosure and contents of which are incorporated by reference as if fully set forth herein.
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the functions specified herein.
- the computer program instructions may also be loaded onto a computer-readable or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified herein.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- The present invention relates generally to computer-based communications, systems and environments thereof, and more particularly, to a novel system and method for providing heterogeneous evolutionary self-formatting Internet protocols.
- While connecting to Internet users and organizations together in a generic, multimodal and open standards-based way, it is found that the Internet, by and of itself, does not provide means to connect its users in a most efficient way. That is, the Internet is neutral to the way users communicate or act (except providing basic ways to provide protocol for communication), it does not protect users from potential misusages of other users. Usually all regulations are external to the Internet, regulation rules belong to the country, region, forum or chat room a specific person operates in.
- U.S. Pat. No. 6,829,569 is directed to a system and method that covers social dilemma virtual world environment (VWE) software facilitates creation and usage of social dilemma tests or exercises for measuring and analyzing online interactive societies. The teachings of U.S. Pat. No. 6,829,569 are directed to only the collection of data and the measurement of interaction between members of the virtual world environment.
- In a further prior art example, America On-line® the software and service provider that provides interactive services, Web brands, Internet technologies and e-commerce services, provides a mechanism for establishing community standards. Particularly, the AOL® web-site provides a community infrastructure through message boards and chat rooms by providing a large gathering place enabling users to share interests and forge friendships. Appurtenant to the AOL® web-site's community infrastructure enabling interaction among users, there are established community standards and guidelines aim to make it easier for users to take part and help provide a better experience for all participants. For example, AOL® offers supervised community areas for kids and teens including a mechanism providing parents with the ability to establish Parental Controls and enable customization of their family's online experience. Further examples, in the context of the AOL® web-site providing a chat room and message boards infrastructure, rules and standards are established that discourage usage of extreme language, explicit sexual references or talk that incites hatred anywhere on the service. Moreover, AOL® the web-site discourages users discussing any money-making schemes or advertisements in the chat rooms or on the message boards, and discourages the users not to use the message boards or chat rooms as a personals service, i.e., users are restrained from posting personal or viewing personal ads. Moreover, the chat rooms and message boards in the AOL® web-site prevents distribution of any content (photos, files, etc.) that is sexually explicit or incites hatred against race, culture, religion or sexuality. Other rules, or standards include: the discouragement of impersonating people, whether it is AOL® staff, volunteers or other members; and preventing users who try to obtain someone else's account information, passwords, phone number or address; the maintenance of friendly chat rooms by moderating language used; refraining from harassment or threatening of other members; refraining from disrupting a chat room with scrolling or continuous sounds. AOL® further has a zero tolerance policy towards illegal activities taking place on the service and cooperates with law enforcement as well as take action against a user's account.
- Thus it is the case that just as there are unspoken rules that govern how to behave in society, i.e., real-life social gatherings, there are codes of behavior on the Internet (called “etiquette”) that are equally important and users must become familiar with these rules of social engagement before becoming involved in AOL's community. Through a reporting mechanism provided via AOL's community infrastructure, all AOL members can report anyone who violates the Conditions of Service at AOL®.
- The second prior art example thus indicates the establishment of rules to the members of societies by external means.
- It would be highly desirable to provide a system and method for virtual communities that enables the establishment of rules created by members of the community (“society”) in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society.
- It would further be highly desirable to provide a mechanism that enables the establishment of rules created by members of the virtual communities or society themselves that allows for the self-evolution of the virtual societies.
- The present invention is directed to a system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society. The system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves, that allows for the self-evolution of the virtual societies.
- Thus, according to the present invention, there is provided a method of providing heterogeneous evolutionary self-formatting Internet protocols, based on multiple communication channels such as speech, VoIP, WebCam or regular text-based communication. The members using heterogeneous evolutionary self-formatting Internet protocols will be protected, providing they are not impinging rights of other members. The Internet-like system plays a part in maintaining a proper rules-based system to the benefit of its members. The system of rules for heterogeneous evolutionary self-formatting Internet protocols behaves and corresponds to the set of software/hardware configurations. The system provides hypervisor ability with necessary restriction to follow rules formulated for the specific heterogeneous evolutionary self-formatting Internet protocol. Such protocols are built based on different system rules. Example for such rules could be based on the rules regulating democratic society, for example, as opposed to the rules regulating the totalitarian regime.
- Thus, according to the invention, there is provided an open, modality neutral system to connect humans and computers into manageable virtual societies. The system allows overcoming current flaws in the Internet design and suggests the next social-evolutionary step for the existing Internet. That is, its contents change for its own evolution by changing the managing rules which may be created, validated and enforced within the virtual societies.
- Generally, the invention provides a system, method and computer program product for managing a virtual society comprising an on-line community of peers interacting via computer systems through the Internet, the method comprising:
- providing, by members of the on-line community, a rule system comprising rules for governing actions that may be performed by members of the on-line community;
- initiating, by the members of a society, an action request comprising an interaction with another member of the virtual society via a communication channel; and,
- enforcing rules that determine compliance of a requested action with one or more the rules that govern whether a requested action is to be performed; and
- one of, rejecting the action if not in compliance with the rule or enabling performance of the action if the requested action is in compliance with the rules,
- wherein said on-line community of peers is self-evolving by enabling members to change rules for said on-line community's own evolution.
- Further to the method, the social behavior of members of the virtual society is supported in accordance with needs of the virtual society.
- According to a further aspect of the invention, there is provided a self-evolving system for managing a virtual society comprising an on-line community of peers interacting via computer systems through the Internet, the system comprising:
- means for generating a rule system comprising rules for governing actions that may be performed by members of the on-line community;
- means for initiating, by the members of a society, an action request comprising an interaction with another member of the virtual society via a communication channel; and,
- means for enforcing rules that determine compliance of a requested action with one or more the rules that govern whether a requested action is to be performed, wherein an action request is rejected if not in compliance with the rule or, the action is performed if the requested action is in compliance with the rules,
- wherein social behavior of members of the virtual society is supported in accordance with needs of the virtual society.
- Advantageously, the system of the present invention is self-evolving; it is built as a projection of the society (e.g., human society) having members that are united in groups with groups creating rules (laws of the society) with rules adapted to evolve by members. The system additionally implements a mechanism for enforcing the laws.
- The objects, features and advantages of the present invention will become apparent to one skilled in the art, in view of the following detailed description taken in combination with the attached drawings, in which:
-
FIG. 1 conceptually depicts an example virtual society structure for which the present invention is implemented; -
FIG. 2 depicts anexemplary system 50 in which the present invention may be implemented; -
FIG. 3 is a logical view depicting an example interactive Internet-based scenario implementing thesystem 10 of the invention; -
FIG. 4 depicts an example execution stack of the system implementing thesystem 10 of the invention; -
FIG. 5 depicts sub-layers of the Verification Layer of the protocol stack implementing thesystem 10 of the invention; -
FIG. 6 depicts the methodology for creating a peer in accordance with the present invention; -
FIG. 7 depicts the main processing thread implemented by a region formed in thesystem 50 of the invention; -
FIG. 8 depicts an example process for creating a new rule in accordance with the invention; -
FIG. 9 depicts an initialization of verification process performed in accordance with the invention; -
FIG. 10 depicts an object model 500 of a virtual society; and, -
FIG. 11 depicts a sequence implemented when a member of a region or on-line community requests an action be performed. - The present invention is directed to a system, method and computer program product for virtual communities that enables the establishment of rules created by members of the society in accordance with the existing rule creation restrictions and, that provides a mechanism for validating and accepting of the rules established inside the society. The system, method and computer program product further provides a mechanism that enables the establishment of rules created by members of the virtual society themselves that allows for the self-evolution of the virtual societies.
- As will be referred to herein, the following terms are defined:
- 1. Virtual society: is a term describing various forms of computer-mediated communication, particularly long-term, among large groups through the mediation of computer networks. An example virtual society structure is shown in
FIG. 1 , that depicts a root region (a globe) 100 comprising multiple societies, e.g., regions, depicted asregions 1,region 2 andregion 3, withregion 3, for example, broken into further sub-regions, region 3.1 and 3.2. The regions partitioning defines domains on which corresponded rule systems applies as will be described in greater detail hereinbelow. - 2. Self-evolving: means that the society evolves without external supervision/help.
- 3. Hierarchical: means that groups in the society may include other groups/members.
- In accordance with the invention, there are several requirements for the rule system: 1) it must be open to any member of the society (open or democracy like approach) or, to selected group of members of the society (e.g., an Intranet-like approach); and 2) they must be changeable by a predefined body in the society. The body can represent the whole society (“democracy”) or some selected group of users (e.g., a corporation, Intranet).
-
FIG. 2 shows the design and architecture of an adaptive (self-formatting)Internet protocols infrastructure 50 in which the methodology for self-formatting Internet protocols of the present invention may be implemented. Thesystem 50 may comprise one ormore server devices 30 and one or moreconnected computing devices 32 a, . . . , 32 n connected thereto via a wired or wireless network connection that implement client-side Web browsers for interacting with the server. Eachcomputer device 32 a, . . . , 32 n generally implements a processor device (e.g., a CPU) executing an Operating System (O/S) natively on the computer hardware that is adapted for executing basic computer system functions, and controlling execution of one or more processes and applications. For instance, authorized users may access the Internet via a variety ofdevices 32 a, . . . , 32 n such as personal computer/computing device, handheld devices (personal digital assistant), laptop or like mobile computing devices, mobile phones or handsets, that implement an operating system such as Windows, Macintosh, UNIX, Linux or other operating system equipped with a Web browser application. Thecomputing devices 32 a, . . . , 32 n may further implement: computer readable media, including a variety of types of volatile and non-volatile media, each of which can be removable or non-removable. For example, a system memory is provided that includes computer readable media in the form of volatile memory, such as random access memory (RAM), and non-volatile memory, such as read only memory (ROM). The ROM may include an input/output system (BIOS) that contains the basic routines that help to transfer information between elements withincomputer device 32, such as during start-up. Additionally, non-volatile memory may comprise non-volatile “flash” memory or EEPROM memory. The RAM component typically contains data and/or program modules in a form that can be quickly accessed by the CPU. Other kinds of computer storage media include a hard disk drive (not shown) for reading from and writing to a non-removable, non-volatile magnetic media, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from and/or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM, or other optical media. Any hard disk drive, magnetic disk drive, and optical disk drive would be connected to a system bus by one or more data media interfaces (not shown). Alternatively, the hard disk drive, magnetic disk drive, and optical disk drive can be connected to the system bus by a SCSI interface (not shown), or other coupling mechanism. Although not shown, thecomputer 32 can include other types of computer readable media providing non-volatile storage for storing computer readable instructions, data structures, program modules, and other data for use bycomputer 32. For instance, the readable media can store the operating system (O/S), and one or more application programs, such as a program for maintaining the rule-based efficiency in the virtual society described herein in greater detail, and/or other program modules and program data for performing the Internet protocol self-formatting methodology conducted in accordance with the invention. - The
system infrastructure 50 is adapted to operate as a networked environment using logical connections to a computer device, i.e.,server device 30, which may comprise an application server, database server or the like, or may comprise a cluster of servers, accessible by aconnected device 32 via a public or private network, represented asnetwork 99, which may comprise a local area network (LAN), or a wide area network (WAN), a corporate intranet, or the Internet. When implemented in a LAN networking environment, thecomputer device 32 connects to the local network via a network interface card or adapter (not shown) that supports a wireless or wired network communication protocol, transport, and data link layer protocol, e.g., Ethernet, etc. When implemented in a WAN networking environment, thecomputer device 32 connects to the WAN via a high speed cable/dsl modem, network connection, telephone connection, fiber optic connection, or some other connection means (not shown). Regardless of which networked environment is implemented, theserver device 30 receives user queries and, in response, executes one or more applications and database software components for maintaining the rule-based efficiency in the virtual society according to the invention. It is understood that a web-server, database server or cluster of servers may embody a web-site, such as may be hosted by an I.S.P. (Internet Service Provider) or like hosting enterprise, and includes network router and firewall components (not shown), that would enable the self-formatting functions of the invention securely over the Internet. It is thus understood that the software embodying the computer-implemented functions of the invention can be executed on one computer (e.g., in a star-based topology) or can be copied or distributed across several computers in thesystem 50, and can even be organized as a peer-to-peer computer network. - Regardless of the networked environment employed, it is understood that the server device 30 (whether embodied as part of a web-site, or not) includes those hardware components, software processes and interface connections enabling user access via a wired or wireless network, e.g., through an interface such as a web-browser, as described herein. Particularly, users implementing computer based accessing
devices 32 a, . . . , 32 n of thesystem 50 are enabled to access the server/web site remotely via wired or wireless connections to the network 99 (e.g., Internet). Wired or wireless communications between the server/web site and authorized users are via the public Internet in accordance with network communications protocols, e.g., TCP/IP (Transmission Control Protocol/Internet Protocol), HTTP, SMTP (Simple Mail Transfer Protocol), secure sockets layer, and/or other transport and network protocols. Additionally, a variety of communications protocols for enabling communication channels may be implemented including but not limited to: speech, VoIP, WebCam, or text-based communication. - As shown in
FIG. 2 , thesystem 50 preferably includes asearchable database 74 providing an inventory of rules and rule sets associated with a region (virtual society) that may be accessed and updated in the manner as described herein according to the invention. Generally, the rules are implemented in a rule-based programming language that can be integrated with platform independent software components, e.g., objects in Java, C++, and the like, as described herein with respect toFIG. 10 . Additionally, control programs and/or rule-inference engines are provided that implement algorithms that interpret the rules based on a set of input data and the rules being enforced. Details regarding the contents ofdatabase 74 will be described in further detail hereinbelow. Anadditional user database 73 is provided that enables tracking of users and regions, i.e., virtual societies, on-line communities, etc., to which the present invention for enabling the establishment of rules created by members of the virtual society themselves, and allowing for the self-evolution of the virtual societies, is directed. - The software, whether implemented upon one computer (e.g., in a star-based topology) or distributed across several computers in the
system 50, is described by way of example with reference to alogical view 90 of the system as depicted inFIG. 3 , by way of example: As shown in the example rule-based scenario, thesystem 50supports Application Services 75 providing functions governing, for example, a.) Execution of the communication request such as received from a user, e.g.,peer 1, usecases FIG. 3 ; and, b.) Obtaining return code of the request. Thesystem 50 supports a RegionSystem Services application 80 providing functions governing, for example, a.) Request of a rule set; b.) obtaining a service description; c.) provision of support for suggestion of the new rule; d.) provision of support for the acceptance of the new rule (for example, support for the voting for rule acceptance); and e.) verification of the rule compliance. - As now shown in
FIG. 4 , thesystem 50 includes an abstraction of the (Open Systems Interconnection (OSI) reference standard networking communications stack as implemented by software in thesystem 50 of the invention. As shown inFIG. 4 , theexecution stack 100 of the invention comprises anapplication layer portion 110 that provides a means for the user to access information on the network through an application (application specific processing), a Verification Layer 120 supporting rules sets processing, and aCommunication Layer 130 responsible for the support of the communication. An example of theApplication layer 110 includes a mail client and mail servers, HTTP client and servers, etc. An example of theCommunication layer 130 is the TCP/IP layer (corresponding to the Network and Transport layers of the OSI network stack). This layer provides necessary communication between different peers and supporting servers. -
FIG. 5 describes sub-layers of the verification layer 120 of the execution stack ofFIG. 4 . Particularly, the Verification layer comprises two (2) sub layers—afirst sub-layer 122 responsible for the support of regional rules, and another sub-layer 125 responsible for the global rules. Both sub-layers include an application dependant component—an Application Specific Verification component 123 depicted aselements 123 a, b for respective sub-layers supportingregional rules 122 andglobal rules 125. -
FIG. 6 depicts the methodology for creating a peer in accordance with the present invention. As shown inFIG. 6 , at afirst step 150, a user, alternately referred to as a “peer” will generate a request via that user's computing device to participate in the region or sub-region. The request is validated against regional and global rule sets as indicated atstep 155. For example, a validation may comprise a statement that system does not keep communications older than certain period of time, for example 90 days. Thus, by checking if a document creation date is earlier than 90 days from now it should be removed/replaced. More specifically, such a document maybe documents containing passwords. This step may entail the peer, from an interface generated at his/hercomputer device 32, accessing the searchable database 74 (FIG. 2 ) via a network connection using the communications protocol supported, accessing the rule sets appropriate for the region, in addition to the global rule set, and applying the rules to the user request. For example, a rule may be applied that will verify a user's request based on that user's identification (e.g., a history of the behavior of the user based on that user's ID, for instance). Then, at step 158 a determination is made as to whether the request has been validated. If the request has been validated, i.e., the request of the peer has been approved, a peer is created atstep 160 and an acceptance notification is generated atstep 165. The peer may be given a User ID/password combination that will be used to identify the peer in further interactions with the community. In case the request of the peer has not been approved, a rejection notification is generated as indicated atstep 170. -
FIG. 7 depicts the main processing thread implemented by a region formed in thesystem 50 of the invention. As shown inFIG. 7 , a system user (peer) logs in with his/her User ID via his/hercomputer device 32, as indicated atstep 175. Via an interface generated atcomputer device 32, a menu choice is provided atstep 178 that enables the peer to choose one from among the following activity threads:Communication activity 180,Rule Creation process 185, andRule Acceptance process 190. Processes of the Communication and Rule Creations activities are defined in details with respect toFIGS. 8 and 9 . One example of aRule Acceptance process 190 would be enabling participation in a voting scheme enabling peers to participate in defining and determining if a rule is to be accepted as a regional rule or sub-region rule, for example. On-line voting schemas are known in the art (see for example U.S. Pat. No. 6,175,833, the entire contents and disclosure of which is incorporated by reference as if fully set forth herein ), and can be implemented to enable peer voting on rules dependent upon the needs of the region/community. -
FIG. 8 depicts an example process for creating a new rule in accordance with the invention. - As shown in
FIG. 8 atstep 200, a logged in system user (peer) via his/hercomputer device 32, can initiate creation of a new rule. Then, dependent upon the needs of the type of community, vocabulary and rule language level information are obtained. This vocabulary and rule language level information is used to specify an Object/Action model (an “action” to be performed on an “object”) and possible level of the reasoning supported by the system. For instance, a community may comprise a meeting place for children, with a specified vocabulary for interaction being the ability to only interact using voice or text-only, for example. Example of such rule is “messages/communications do not contain coarse words”, and list of coarse words/expressions is kept in some accessible storage device which can be compared against. Then, continuing on to step 205, based on the Object/Action model specified, the user creates one or more new rules of appropriate reasoning level. An example rule that may be implemented comprises specifying that no-one can share art with other peers under 15 years of age, for example, or that only select few have voting rights. Any rule that is created must then be verified to establish syntactic correctness which verification step is performed atstep 210,FIG. 8 . If rule is incorrect it is returned to the user for correction as indicated by theline 211. Continuing, however, a rule that is determined as correct is submitted to the regional acceptance process as indicated atstep 215. As will be described in greater detail hereinbelow, upon acceptance of the rule, a process of initialization of verification is started as indicated atstep 220. That is, upon acceptance of the rule, any existing communications will be verified against newly accepted rule. - Referring now to
FIG. 10 , there is depicted an object model 500 of a virtual society. A member of a society performs and interacts with other members of the same region or other regions according to the regional rule system and the system of the region where the objects-subjects of interaction belong.FIG. 10 more particularly illustrates central classes of the possible object model needed to implement virtual society. The object model defines the structural relationships and dynamic interaction between a group of objects expressing virtual society. They may be realized in the language of choice (such as Java, C++, etc.). Objects of the virtual society are created and implemented to represent one or more of the following: the root region, represented asobject 502; the region or society, represented asobject 505; the member, represented asobject 510; and action models, represented asobjects 515. Corresponding objects representing rules are depicted inFIG. 10 as comprising absolute rules, represented asobjects 520; and, rules, represented asobjects 525. Realized objects of the virtual society are part of the implementing computer program and are created and invoked by computer program when there is a need for a structure or interaction specific to the virtual society. -
FIG. 11 shows the block diagram of an action “meta-rule” depicting the process enabling a member (peer) to perform an action in the region (for example, sending an e-mail to a peer under the age of 15 that includes a non-text-based attachment greater than 2 Gbytes). This is performed by interaction between a member and thesystem 50 providing the virtual society infrastructure. As shown inFIG. 11 , the following sequence is implemented when a member of the community requests an action be performed: amember 510 first initiates an action request. Then, the regional virtual society system hypervisor automatically performs a rule consistency check for checking the consistency of the request against the set ofabsolute rules 520 andregional rules 525 in an automated or semi-automated fashion. If the request conforms to the previous check, the request is being implemented as indicated at 550,FIG. 11 . Otherwise, if the action request does not conform to the set of absolute and regional rules it is rejected as indicated at 575. - With respect to methodology depicted in
FIGS. 10 and 11 , rules can be categorized as comprising Absolute or “Hypervisor” rules and Regional rules. Examples of Hypervisor rules include, but are not limited to: a rule that every existing peer has the right to exist until this peer or hypervisor decides to de-construct itself; or, a rule that every user may register to the system upon agreement of hypervisor; a rule that the common resource which is being shared by peers is possible to exist according to regional/society rules enforcers. With respect to Regional rules, these are generated by members of the region/society with regional rules being enforced by regional/society rules enforcers. - Referring now to
FIG. 9 , there is illustrated the process for initializing Verification as performed atstep 220 inFIG. 8 . In a first step, depicted asstep 250, a Verification Service is implemented for requesting vocabulary from an application in order to create the object and action model. In thenext step 255, the Verification Service requests the needed language level (examples of the language level may be forward reasoning, backward reasoning, first order logic, description logic, etc.). Then, the vocabulary of the region binds to the Object/Action Model using late binding or lazy binding schema as indicated atstep 260. Note that usage of different rule inference engines may used in accordance with the patterns as described in commonly-owned, co-pending United States Patent Publication No. 2004/0083454 A1, entitled Object Oriented Framework for Reasoning Having Pluggable Inference Engines, the whole disclosure and contents of which are incorporated by reference as if fully set forth herein. - The present invention has been described with reference to diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each diagram can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified herein.
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the functions specified herein.
- The computer program instructions may also be loaded onto a computer-readable or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified herein.
- The invention has been described herein with reference to particular exemplary embodiments. Certain alterations and modifications may be apparent to those skilled in the art, without departing from the scope of the invention. The exemplary embodiments are meant to be illustrative, not limiting of the scope of the invention.
Claims (22)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/492,229 US20080028472A1 (en) | 2006-07-25 | 2006-07-25 | Heterogeneous evolutionary self-formatting Internet protocols |
CNA2007101390423A CN101115069A (en) | 2006-07-25 | 2007-07-24 | System and method for managing virtual society including online community |
US12/193,395 US8583734B2 (en) | 2006-07-25 | 2008-08-18 | Heterogeneous evolutionary self-formatting internet protocols |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/492,229 US20080028472A1 (en) | 2006-07-25 | 2006-07-25 | Heterogeneous evolutionary self-formatting Internet protocols |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/193,395 Continuation US8583734B2 (en) | 2006-07-25 | 2008-08-18 | Heterogeneous evolutionary self-formatting internet protocols |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080028472A1 true US20080028472A1 (en) | 2008-01-31 |
Family
ID=38987960
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/492,229 Abandoned US20080028472A1 (en) | 2006-07-25 | 2006-07-25 | Heterogeneous evolutionary self-formatting Internet protocols |
US12/193,395 Expired - Fee Related US8583734B2 (en) | 2006-07-25 | 2008-08-18 | Heterogeneous evolutionary self-formatting internet protocols |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/193,395 Expired - Fee Related US8583734B2 (en) | 2006-07-25 | 2008-08-18 | Heterogeneous evolutionary self-formatting internet protocols |
Country Status (2)
Country | Link |
---|---|
US (2) | US20080028472A1 (en) |
CN (1) | CN101115069A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090193083A1 (en) * | 2008-01-30 | 2009-07-30 | Gerald Rea | Method and apparatus to link members of a group |
US20120131581A1 (en) * | 2010-11-24 | 2012-05-24 | Sap Ag | Controlled Sharing of Information in Virtual Organizations |
US10311808B1 (en) * | 2017-04-24 | 2019-06-04 | Facebook Technologies, Llc | Display latency calibration for liquid crystal display |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7996510B2 (en) * | 2007-09-28 | 2011-08-09 | Intel Corporation | Virtual clustering for scalable network control and management |
US8954562B2 (en) * | 2007-09-28 | 2015-02-10 | Intel Corporation | Entropy-based (self-organizing) stability management |
CN102523335B (en) * | 2011-11-28 | 2013-11-27 | 苏州英福迈升信息技术有限公司 | Mobile terminal middleware system oriented to virtual community application |
US20160013999A1 (en) * | 2014-07-08 | 2016-01-14 | Igt | Logging server appliance for hosted system communities and operation center |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6829569B1 (en) * | 1998-09-15 | 2004-12-07 | Microsoft Corporation | Social dilemma software for evaluating online interactive societies |
US20040250258A1 (en) * | 2003-06-04 | 2004-12-09 | Raghuvir Yuvaraj Athur | System and method for rule based object navigation |
US20050052999A1 (en) * | 2003-04-05 | 2005-03-10 | Oliver Huw Edward | Use of nodes to monitor or manage peer to peer networks |
US20070050764A1 (en) * | 2005-08-30 | 2007-03-01 | Microsoft Corporation | Hierarchical virtualization with a multi-level virtualization mechanism |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7136843B2 (en) | 2002-10-23 | 2006-11-14 | International Business Machines Corporation | Object-oriented framework for reasoning having pluggable inference engines |
-
2006
- 2006-07-25 US US11/492,229 patent/US20080028472A1/en not_active Abandoned
-
2007
- 2007-07-24 CN CNA2007101390423A patent/CN101115069A/en active Pending
-
2008
- 2008-08-18 US US12/193,395 patent/US8583734B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6829569B1 (en) * | 1998-09-15 | 2004-12-07 | Microsoft Corporation | Social dilemma software for evaluating online interactive societies |
US20050052999A1 (en) * | 2003-04-05 | 2005-03-10 | Oliver Huw Edward | Use of nodes to monitor or manage peer to peer networks |
US20040250258A1 (en) * | 2003-06-04 | 2004-12-09 | Raghuvir Yuvaraj Athur | System and method for rule based object navigation |
US20070050764A1 (en) * | 2005-08-30 | 2007-03-01 | Microsoft Corporation | Hierarchical virtualization with a multi-level virtualization mechanism |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090193083A1 (en) * | 2008-01-30 | 2009-07-30 | Gerald Rea | Method and apparatus to link members of a group |
US20090192853A1 (en) * | 2008-01-30 | 2009-07-30 | Drake Robert A | Method and apparatus for managing communication services |
US20120131581A1 (en) * | 2010-11-24 | 2012-05-24 | Sap Ag | Controlled Sharing of Information in Virtual Organizations |
US8533774B2 (en) * | 2010-11-24 | 2013-09-10 | Sap Ag | Controlled sharing of information in virtual organizations |
US10311808B1 (en) * | 2017-04-24 | 2019-06-04 | Facebook Technologies, Llc | Display latency calibration for liquid crystal display |
Also Published As
Publication number | Publication date |
---|---|
CN101115069A (en) | 2008-01-30 |
US8583734B2 (en) | 2013-11-12 |
US20080313280A1 (en) | 2008-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10079819B2 (en) | Systems and methods for authenticating an avatar | |
US6564327B1 (en) | Method of and system for controlling internet access | |
JP6444855B2 (en) | How to modify access control to a web service using a query language | |
US8826155B2 (en) | System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface | |
US7765481B2 (en) | Indicating website reputations during an electronic commerce transaction | |
JP5324567B2 (en) | Personalized application content for social networks | |
US8583734B2 (en) | Heterogeneous evolutionary self-formatting internet protocols | |
EP1782604B2 (en) | Methods for authorizing transmission of content from first to second individual and authentication an individual based on an individual's social network | |
US9177294B2 (en) | Social network site including invitation functionality | |
US11645623B1 (en) | Resource management system | |
US20100042931A1 (en) | Indicating website reputations during website manipulation of user information | |
US20060253583A1 (en) | Indicating website reputations based on website handling of personal information | |
US20140331119A1 (en) | Indicating website reputations during user interactions | |
US20030154180A1 (en) | Profile management system | |
MXPA03005450A (en) | Parental controls customization and notification. | |
WO2006119480A2 (en) | Website reputation product architecture | |
KR20160092021A (en) | Third party application activity data collection | |
US20040098386A1 (en) | Profile management system | |
EP1692837B1 (en) | Method and system for user modelling | |
Coles-Kemp et al. | On-line privacy and consent: a dialogue, not a monologue | |
Wu et al. | CEPTM: A Cross‐Edge Model for Diverse Personalization Service and Topic Migration in MEC | |
Clark | Negotiation and monitoring in open environments | |
US20250013785A1 (en) | Creative Micro-Community System | |
US20250014059A1 (en) | Tiered Creative Micro-Community System | |
Loebl et al. | Personalized e-Justice ODR Forms. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES COROPRATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FAISMAN, ALEXANDER;GRABARNIK, GENADY;KANEVSKY, DIMITRI;AND OTHERS;REEL/FRAME:018246/0079;SIGNING DATES FROM 20060719 TO 20060720 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FAISMAN, ALEXANDER;GRABARNIK, GENADY;KANEVSKY, DIMITRI;AND OTHERS;SIGNING DATES FROM 20060719 TO 20060720;REEL/FRAME:018246/0079 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |