专利汇可以提供METHOD AND SYSTEM FOR THE CONTROL OF PERSONAL IDENTITIES IN VIRTUAL NETWORKED ENVIRONMENTS专利检索,专利查询,专利分析的服务。并且Methods and systems to allow individuals participating in social networks to establish pseudonymity amongst people they know in real life or in a virtual context are disclosed. In one embodiment, the present invention provides the assignment of disposable aliases or other temporary forms of personal identity, such as an image, to users in a virtual network to obfuscate their real identities or persistent online identities. Another paradigm introduces the notion of a private group or “campfire” where invited users (whether initiated by an individual or systematically broadcast to a broad or limited group) are allowed or expected to use such dynamic aliases to facilitate protected online interaction, expression, and discourse with the group at large (campfire), rather than as multiple one-to-one conversations (hub and spoke).,下面是METHOD AND SYSTEM FOR THE CONTROL OF PERSONAL IDENTITIES IN VIRTUAL NETWORKED ENVIRONMENTS专利的具体信息内容。
What is claimed is:
This application claims priority to U.S. Provisional Patent Application No. 61/043,812, entitled METHOD FOR THE CONTROL OF PERSONAL IDENTITIES IN VIRTUAL NETWORKED ENVIRONMENTS, filed Apr. 10, 2008, which is hereby incorporated by reference in its entirety.
The present invention relates to the management and control of personal identities in networked environments, and more specifically to a method for allowing individuals participating in social networks and other virtual environments to selectively assume an obfuscated identity through a temporary or disposable user alias or other temporary form of personal identity (e.g. an image).
Social networks and other virtual environments enabled by the Internet are largely centered on persistent personal identities. Users' real world names are often used as identifiers, personal photographs are displayed, and online personas are otherwise closely connected to our real selves. Even when users represent themselves using a pseudonym, these identities are persistent within the networks in which they exist (e.g. Tila Tequila on MySpace.com) and can often be tied back to real identities. As a result, the behavior of users within social networks—especially when interacting with people whom they know in the real world, and/or around sensitive and personal topics—can be inhibited, deliberate, and superficial, if not to some degree disingenuous.
The most honest interactions, however, often occur in virtual environments where users can maintain their anonymity. By and large, these communications occur between complete strangers using pseudonyms and, as a result, the communication is largely unfettered. However, this type of anonymous communication between strangers is ultimately fertile ground for deception, lying, and other illicit activities. Deeper personal engagement, including the revelation of one's true identity, is rarely, if ever, achieved.
The safe virtual distance that is generally maintained when complete strangers interact online also affects our engagement with people who are closer to us but still distanced by more than one degree of separation (e.g. friends of our friends and beyond). The benefits of sharing common space as in the real world and the presence of a common personal connection are absent. For example, it is possible for one to interact directly with his friend's friends at a dinner party, and thereby getting to know them and perhaps even achieving a first degree connection with one or more of them. Online, however, despite the fact that one talks of interacting as part of a social “network”, in fact, the interaction that occurs is on a one-to-one basis with many individuals rather than interacting in an online version of the group setting described above (i.e. the dinner party). This method of interaction is more akin to a hub-and-spoke paradigm, centered around a given user (the hub), who generally interacts directly with a multitude of direct connections (the spokes). In such a paradigm, rarely if ever is a group interaction achieved that facilitates a safer, mediated introduction to friends of friends who may well be people with whom a first degree connection is mutually desired.
What is needed is a method and system whereby dynamic groups can be created, analogous to those we create in the real world (e.g., attending a dinner party, sitting around a campfire, etc.). In such a setting, users can feel free to openly engage with second degree connections and beyond and feel comfortable that their ability to gracefully disengage is maintained. At the same time, being able to directly tie a user's disposable identity back to their persistent or real identity allows users to choose to have the virtual connections they make persist, just as friends of friends may choose to do in the real world.
In at least one embodiment, the present invention contemplates a variety of methods and systems for the assignment and management of temporary personal identities or disposable aliases in social networks and other virtual environments. The ability to temporarily assume an unknown but unique identity, like wearing a distinct mask at a masquerade party, will allow for more unqualified and honest virtual interactions. That such temporary identities may be used as infrequently as desired (e.g. associated with only one comment made within an virtual environment), or only within a certain context (e.g. while interacting with a specific group of participants or around a specific topic), makes it difficult to tie a collection of statements, opinions, and expressions back to a single identity or individual.
Accordingly, in at least one embodiment, the present invention provides the use of a platform that enables a user to assume a dynamic alias prior to logging into one of a listed number of social networking environments offered through the platform. In one embodiment, the invention also contemplates that an individual user may have multiple dynamic aliases they use in specific contexts (e.g., in different online discussion groups within the same social network environment) and that a user can willingly remove his dynamic alias, and reveal his real or persistent identity to one or more users at any time.
One or more embodiments of the present invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
References in this specification to “an embodiment”, “one embodiment”, or the like, mean that the particular feature, structure or characteristic being described is included in at least one embodiment of the present invention. Occurrences of such phrases in this specification do not necessarily all refer to the same embodiment.
In at least one embodiment, the present invention provides methods and systems to allow individuals participating in social networks and other virtual environments (hereinafter “virtual networks”) to establish pseudonymity amongst people they know in real life or in a virtual context, and to specifically break the connection between their behaviors, interests, attitudes, and opinions from their persistent online identities or real selves. At least some of these methods are a result of new paradigms contemplated by the present invention. One paradigm involves the assignment of temporary or disposable aliases or other temporary forms of personal identity, such as an image, (hereinafter “dynamic alias(es)”) to users in a virtual network to obfuscate their real identities or persistent online identities. Another paradigm introduces the notion of a private group or “campfire” where invited users (whether initiated by an individual or systematically broadcast to a broad or limited group) are allowed or expected to use such dynamic aliases to facilitate protected online interaction, expression, and discourse with the group at large (i.e. campfire), rather than as multiple one-to-one conversations (i.e. hub and spokes).
The term “virtual network,” as described herein, refers to any online group of users interacting around a common user platform that facilitates some combination of communication, socialization, and entertainment, and which may or may not require a persistent user identity or the revealing of a user's real name and/or identity. The virtual network contemplated by the present invention can be a closed network, a wide area network, a local area network, a destination website on the World Wide Web, or the Internet itself.
Refer now to
The server 120 includes one or more processors 124 and memory 128 coupled to an interconnect 130. The interconnect shown in
The processor(s) 124 is/are the central processing unit (CPU) of the server 120 and, thus, control the overall operation of the server 102. In certain embodiments, the processor(s) 124 accomplish this by executing software or firmware stored in memory 126. The processor(s) 124 may be, or may include, one or more programmable general-purpose or special-purpose microprocessors, digital signal processors (DSPs), programmable controllers, application specific integrated circuits (ASICs), programmable logic devices (PLDs), trusted platform modules (TPMs), or the like, or a combination of such devices.
The memory 126 is or includes the main memory of the server 120. The memory 126 represents any form of random access memory (RAM), read-only memory (ROM), flash memory, or the like, or a combination of such devices. In use, the memory 126 may contain, among other things, code embodying the platform module 161, the interface module 163, the storage module 165, and the access mechanism 167.
In one embodiment, the processor(s) 124 include multiple units/blocks configured to perform various functions of the server 120. The units include a platform module 161, an interface module 163, a storage module 165, and an access mechanism 167, each of which is discussed below. It is noted that these units are described here for illustration of an example, and that the techniques described herein may be performed using other means as understood by people of ordinary skill in the art. In some instances, these units may be located outside of the processor(s) 124. In such instances, the units can be implemented by using programmable circuitry programmed by software and/or firmware, or by using special-purpose hardwired circuitry, or by using a combination of such embodiments.
In one embodiment, the platform module 161 provides a platform through which the server 120 provides dynamic aliasing features to various users accessing the server through the clients 101. In some instances, the platform module provides to the users access to a list of social networking sites. The social networking sites include commercial online social networks (e.g., MySpace®, Facebook®, etc.) or one or more private social networks hosted, for example, by the server 120. The interface module 163, in some embodiments, is configured to enable the user to assume a dynamic alias before the user, for example, logs in to one of the social networking sites.
The dynamic alias is designed to hide a true identity of the user when the user engages in interaction in the social networking sites. A “true identity,” as defined herein, refers to an identity (such as a profile name or user name) assumed by the user during normal interaction in the social networking site. The true identity, for example, reveals a personal trait of the user (e.g., the user's name, or location, or any such indicator identifying the user).
The user may select the dynamic alias from a list of aliases offered by, for example, the interface module. In some instances, the user may create a new alias. A storage module 165 of the server 120 saves a correlation of the user's true identity and the dynamic tag chosen by the user in the storage memory 126 of the server 120 (e.g., for later recovery when a user decides to discard the dynamic disguise and reveal the user's true identity). Finally, in some instances, an access mechanism 167 included in the server 120 enables the user to adopt the dynamic alias and login to a specific online social network using the adopted alias. In some instances, the access mechanism 167 retrieves the user's true identity by, for example, communicating with the storage module 165 when the user decides to reveal a true identity.
The process illustrated in
Other key dimensions to this primary paradigm is that an individual user can have more than one alias used in different contexts of a single virtual network (e.g. separate discussion groups occurring between different friend subgroups of Name 3). In this way, Name 3 will not always represent himself as Alias 3 and ultimately build a more persistent user profile that can increase the chance of being identified as Name 3. The dynamic aliases can be one-time usable or re-usable by an individual. They may be defined as forever unique to an individual or usable by a multitude of people. They may also be usable in a broad context (e.g. usable across a number of social networks) or only usable in a defined context (e.g. within a specific social network, in a specific online discussion thread, or in the context of an online game or game session).
The techniques introduced above can be implemented by using programmable circuitry programmed by software and/or firmware, or by using special-purpose hardwired circuitry, or by using a combination of such embodiments. Special-purpose hardwired circuitry may be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
Software or firmware to implement the techniques introduced here may be stored on a machine-readable medium and may be executed by one or more general-purpose or special-purpose programmable microprocessors. A “machine-readable medium”, as the term is used herein, includes any mechanism that can store information in a form accessible by a machine (a machine may be, for example, a computer, network device, cellular phone, personal digital assistant (PDA), manufacturing tool, any device with one or more processors, etc.). For example, a machine-accessible medium includes recordable/non-recordable media (e.g., read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; etc.), etc.
Although the present invention has been described with reference to specific exemplary embodiments, it will be recognized that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.
标题 | 发布/更新时间 | 阅读量 |
---|---|---|
基于XBRL智能报告平台的合并报表数据抽取方法 | 2020-05-12 | 456 |
洗衣机程序升级方法和升级系统 | 2020-05-18 | 307 |
用于信息中心网络的通用双模式数据转发平面 | 2020-05-24 | 995 |
一种个人车位的综合管理方法 | 2020-05-12 | 88 |
域名解析方法和装置 | 2020-05-17 | 487 |
一种基于通道与功能单元的户外导盲空间数据组织方法 | 2020-05-21 | 331 |
一种基于临时证书的互联网实名认证方法 | 2020-05-22 | 444 |
基于聚类的非一致性数据库查询方法 | 2020-05-24 | 866 |
一种基于日志通用性规则引擎的规则处理方法 | 2020-05-13 | 629 |
基于标签的安卓用户隐私数据黑盒防护方法及系统 | 2020-05-23 | 333 |
高效检索全球专利专利汇是专利免费检索,专利查询,专利分析-国家发明专利查询检索分析平台,是提供专利分析,专利查询,专利检索等数据服务功能的知识产权数据服务商。
我们的产品包含105个国家的1.26亿组数据,免费查、免费专利分析。
专利汇分析报告产品可以对行业情报数据进行梳理分析,涉及维度包括行业专利基本状况分析、地域分析、技术分析、发明人分析、申请人分析、专利权人分析、失效分析、核心专利分析、法律分析、研发重点分析、企业专利处境分析、技术处境分析、专利寿命分析、企业定位分析、引证分析等超过60个分析角度,系统通过AI智能系统对图表进行解读,只需1分钟,一键生成行业专利分析报告。