WO2013050837A1 - System and method for giving users control of information flow - Google Patents
System and method for giving users control of information flow Download PDFInfo
- Publication number
- WO2013050837A1 WO2013050837A1 PCT/IB2012/000916 IB2012000916W WO2013050837A1 WO 2013050837 A1 WO2013050837 A1 WO 2013050837A1 IB 2012000916 W IB2012000916 W IB 2012000916W WO 2013050837 A1 WO2013050837 A1 WO 2013050837A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- participant
- transmission
- source
- tokens
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Definitions
- the present disclosure relates generally to communications, information networks, and information management including, but not limited to, computer networks; voice transmission networks; video, image, and music networks; news and other content management; and database management. More specifically, this disclosure relates to providing users with an efficient method of filtering and controlling the flow of data, information, and other items.
- the disclosed system gives participants control of the flow of information to them and from them within a network.
- the participant is able to turn on, speed up, slow or stop inflows of information.
- the participant is able to control outgoing information.
- Tokens from a real-time finite supply accompany all informational transactions. Participants adjust the token value of exchanges to accelerate or decelerate various flows of information. Tokens may be exchanged for other items of value to reduce the total available supply of tokens.
- Another benefit to the participants is that those who contribute value to the system are rewarded. This directly benefits each participant who contributes value, but the less obvious indirect benefit to participants is that the system filters rewards to those whose contributions are of the greatest value to the participants. This reduces lower-value contributions and increases higher- value contributions, such that the value of the overall system to the individual participants is inclined to increase over time.
- a computer is confi gured to receive incoming flows of data, information, and other items for each participant, as well as to manage outgoing flows of the same, again for each participant. Participants are able to regulate where their information, data, and other items go, with these regulations being followed by the computer. Participants are also able to regulate incoming inform ation, data, and other items, these regulations also being followed by the computer. While participants can change these regulations in real time, they are at any given point stable enough to be followed to the letter by the computer. Users of this system are thus able to control both outgoing and incoming flows of information, data, or other items.
- FIG. l a is a schematic diagram of one embodiment of the disclosed system allowing participants to control flows of information
- FIG- l b is a detail schematic diagram of a participant controlling incoming flows of information or other transmissions
- FIG. 2 is a schematic diagram showing quasi-reciprocal flows between participants;
- FIG. 3a is a detail schematic diagram of how passive transmissions are created;
- FIG. 3b is a detail schematic diagram of such a passive transm ission being received (or not received) by potential recipients;
- FIG. 4 is a schematic diagram showing the effects of being a high-value participant vs, being a low-value participant within the system of the present disclosure
- FIG. 5 is a schematic diagram showing the effects of being a high-value participant vs. being a low-value participant known systems
- FIG. 6a is a schematic diagram showing automated ownership transfer
- FIG. 6b is a schematic diagram showing the effects of being an active participant vs. being an inactive participant in one embodiment.
- FIG. 6c is a schematic diagram showing the effects of being an active participant vs. being an inactive participant in another embodiment.
- Ranges may be expressed herein as from “about” one particular value, and/or to "about” another particular value. When such a range is expressed, another embodiment includes from the one particular value and/or to the other particular value. Similarly, when values are expressed as approximations, by use of the antecedent "about,” it will be understood that the particular value forms another embodiment It will be further understood that the endpoints of each of the ranges are significant both in relation to the other endpoint, and independently of the other endpoint.
- FIG. l a is a schematic diagram illustrating the system in one embodiment allowing participants to control flows of information.
- the participant is able to classify different sources of information into high-value, medium value, low-value, and unwanted.
- the participant is able to slow low-value information and encourage high-value information.
- Low-value information may be essentially worthless, but if accompanied by sufficient tokens the transaction becomes worthwhile.
- High-value inform ation could be accompanied by few, none-or even a negative number of tokens, but be worthwhile because of the information contained.
- FIG. l b is a detail schematic of a participant controlling incoming flows of information or other transmissions.
- FIG. 2 represents quasi-reciprocal flows between participants. Participants 1 and 2 are able to adjust the token rates they charge one another at will, encouraging or discouraging the flow of information between them. This does not involve any third party's judgm ent or decision-making. Tokens may be drained into the token pool with each transaction, and tokens may be acquired from the token pool by participants, typically at some cost. That the supply of tokens available to each participant is finite and that tokens can be applied usefully contribute to making tokens valuable enough to participants to offset, in sufficient quantity, the receipt of low-value or worthless information.
- FIG. 3a is a detail schematic of how passive transmissions are created
- FIG. 3b is a detail schematic of such a passive transm ission being actuated, or received (or not received) by potential recipients.
- Passive transmissions e.g., a blog post
- active transmission e.g., email
- the creator is able to set the desired rate (positive, null, or negative) and potential recipients are able to choose whether to accept the exchange at this rate.
- this disclosure can be applied to passive and active transmission of information, and to any other mode, such as a combination of active and passive, as well.
- FIG. 4 shows the effects of being a high- value participant vs. being a low-value participant within the system of this disclosure.
- FIG. 5 shows the effects of being a high-value participant vs. being a low-value participant in a current state-of-the-art system.
- FIG. 6a illustrates how the ownership option works.
- the system encourages participants to remain active and rewards the most active participants with greater ownership and control of the system in which they participate.
- the rate at which activity accumulates new ownership can be adjusted according to the value or type of the activity, so as to encourage high-value activity or activities of particular sorts.
- the rate can also be tied strictly to the level of activity.
- FIG. 6b and FIG. 6c illustrate the differences and similarities between the ownership option with or without the expiration or reabsorption of old ownership. As old ownership decreases, proportionally speaking, either way, the rewards and penalties are similar, but more powerful if the old ownership is removed from the system. Active participation yields an increase in ownership. Greater activity than others leads to a
- FIG. 6a, FIG. 6b, and FIG. 6c may be applied equally well to ownership of the system, to ownership of a subsystem of the system, or to some other ownable thing or commodity.
- An ownership option can be deployed with some, all, or none of the system . This involves distributing tokens to participants which allow high-value participants in the system to accumulate greater control over the system or parts of the system, to accumulate ownership of the system itself or parts of the system, or both.
- This ownership option can use the above token system, or it may be done separately. Typically, if done in conjunction with the above token system, it will be based on a second type of token in the same system . This is not necessary, however: one token could be used for both purposes.
- the ownership option of the system involves the gradual transmission of ownership to participants. As participants make use of the system, they earn tokens which can be exchanged for fractions of ownership of the system itself or of some part of the system. This ownership may be time-bound, expiring a certain period of time after it is issued. It may be limited in terms of how many times it may cast votes on issues before expiring. It may be limited in any other reasonable way. While ownership may be of the non-expiring sort traditional at most corporations, this is expected to yield suboptimal results. Expiration of ownership may take the form of the system buying the ownership according to a
- the utility of this aspect of this disclosure is to encourage and reward active participation in the system.
- Current state of the art systems typically suffer from the "tragedy of the commons" problem, mitigated to a greater or lesser extent by the activities of the organization which owns it.
- the participants in such systems do not have an actual financial stake in the well-being and success of the organization.
- By gradually giving them ownership as they contribute the system benefits by gaining owners whose stake in the organization is directly proportional to their own contributions.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A system that gives participants control of the flow of information to them and from them within a network is disclosed. The participant is able to turn on, speed up, slow or stop inflows of information. The participant is also able to exert control over outgoing information. Tokens from a real-time finite supply accompany all significant transactions. Participants adjust the token value of exchanges to accelerate or decelerate various flows of information. Tokens are largely or entirely owned by participants or their agents rather than by the system or its owner. Tokens may be exchanged for other items of value to reduce the total available supply of tokens. Depending on the configuration of the system, tokens may be exchanged for ownership of the system itself.
Description
SYSTEM AND METHOD FOR GIVING USERS CONTROL OF INFORMATION
FLOW
FIELD
[0001 ] The present disclosure relates generally to communications, information networks, and information management including, but not limited to, computer networks; voice transmission networks; video, image, and music networks; news and other content management; and database management. More specifically, this disclosure relates to providing users with an efficient method of filtering and controlling the flow of data, information, and other items.
BACKGROUND
[0002] The Internet and other communication and transmission networks have reshaped not only how we communicate and interact, but how much we communicate and interact. Technologies relating to collecting, storing, and sharing data, information, opinions, images, sounds, etc. have evolved to the point that the volume of information available is greater than the power of most, if not all, individuals and organizations to manage the flows of information. This problem is complicated further by the proliferation of valueless information and the deliberate transmission of malicious materials, such as lies, misleading or exploitative business offers, and computer programs which disable or seize control of the recipient's electronic devices. It is estimated at the time of this writing that in excess of 95% of the information transmitted through public networks is of zero or negative value.
[0003] For example, millions of people who have email addresses find themselves receiving, every day, multiple unsolicited offers of a varied but generally unsavory nature. Checking one's email has become akin to walking through a lawless neighborhood where everything seems to be for sale, but nothing is quite what it seems. Wading through the morass of unwanted information and images is a time-consuming and occasionally disturbing process. This process is made the more complex because there is always the possibility that a message from an unknown sender may prove to be a valuable transmission. Nor are these problems in any way confined to email.
[0004] Current methods of managing this flow generally focus on using automated procedures, some of which are quite complex and sophisticated, to fi lter incoming flows of information, data, and items. The more effective these systems are at preventing the passage of unwanted information, however, the more likely they are to accidentally prevent the
passage of wanted information as well. Legal barriers to certain sorts of predatory activities have also been employed. Nonetheless, the flow of information is increasing explosively and the average value of that information to its recipients is decreasing at almost the same rate. There is a need for a system which limits the transmission of low value and negative value information while streamlining the transmission of information which will be of value to the recipient.
[0005] There is also a need to allow users to control the flow of information from legitimate or semi-legitimate sources. People ordinarily enjoy hearing from their friends and family, but friends and family are subject to chain letters and similar "forward this to everyone you know" messages. Generally people expect and need to hear from their coworkers, customers, suppliers, et cetera. Institutional email lists or email "blasts" are frequently both unavoidable and a cause of significant waste of professional time at a significant cost to businesses, government, non-profits, and other groups. Both of these examples illustrate the more general problem of sources with a legitimate or semi-legitimate claim to the recipient's attention, but which do not necessarily have value.
[0006] Finally, there is a need for a system which may, in addition to providing the above benefits, rewards high value activity with ownership, transferring control and other ownership benefits from the original owner to those who are currently the greatest contributors. By means of this transfer, ownership is kept congruent with current contributions.
SUMMARY
[0007] The disclosed system gives participants control of the flow of information to them and from them within a network. The participant is able to turn on, speed up, slow or stop inflows of information. The participant is able to control outgoing information. Tokens from a real-time finite supply accompany all informational transactions. Participants adjust the token value of exchanges to accelerate or decelerate various flows of information. Tokens may be exchanged for other items of value to reduce the total available supply of tokens.
[0008] The benefits to the participants are manifold. Direct control over discrete information flows is one. By allowing the increase of valuable flows and the decrease of less valued flows according to present interest or need, the system gives participants the ability to exert direct control of the flows relevant to them, A single source of information flow, e.g., another participant, could be treated by this system as multiple flows, with some flows being
more valued than other flows from the same participant. The participants are not dependent on a centralized entity to manage and control their inform ation, nor are they dependent on automated filters provided by and controlled by such a centralized entity. In effect, the system allows the possibility of democratizing information flows by empowering each participant.
[0009] Another benefit to the participants is that those who contribute value to the system are rewarded. This directly benefits each participant who contributes value, but the less obvious indirect benefit to participants is that the system filters rewards to those whose contributions are of the greatest value to the participants. This reduces lower-value contributions and increases higher- value contributions, such that the value of the overall system to the individual participants is inclined to increase over time.
[0010] In one embodiment of the present disclosure, a computer is confi gured to receive incoming flows of data, information, and other items for each participant, as well as to manage outgoing flows of the same, again for each participant. Participants are able to regulate where their information, data, and other items go, with these regulations being followed by the computer. Participants are also able to regulate incoming inform ation, data, and other items, these regulations also being followed by the computer. While participants can change these regulations in real time, they are at any given point stable enough to be followed to the letter by the computer. Users of this system are thus able to control both outgoing and incoming flows of information, data, or other items.
[0011 ] These features and advantages, and others, are presented in more detail below, in the detailed description and accompanying figures, which illustrate by way of example the principles of this disclosure.
BRIEF DESCRIPTION OF THE DRAWINGS
[0012] The features, nature, and advantages of the disclosed subject matter will become more apparent from the detailed description set forth below when taken in conjunction with the drawings, in which like reference numerals indicate like features and wherein:
[0013] FIG. l a is a schematic diagram of one embodiment of the disclosed system allowing participants to control flows of information;
[0014] FIG- l b is a detail schematic diagram of a participant controlling incoming flows of information or other transmissions;
[0015] FIG. 2 is a schematic diagram showing quasi-reciprocal flows between participants;
[0016] FIG. 3a is a detail schematic diagram of how passive transmissions are created;
[0017] FIG. 3b is a detail schematic diagram of such a passive transm ission being received (or not received) by potential recipients;
[0018] FIG. 4 is a schematic diagram showing the effects of being a high-value participant vs, being a low-value participant within the system of the present disclosure;
[0019] FIG. 5 (PRIOR ART) is a schematic diagram showing the effects of being a high-value participant vs. being a low-value participant known systems;
[0020] FIG. 6a is a schematic diagram showing automated ownership transfer;
[0021 J FIG. 6b is a schematic diagram showing the effects of being an active participant vs. being an inactive participant in one embodiment; and
[0022] FIG. 6c is a schematic diagram showing the effects of being an active participant vs. being an inactive participant in another embodiment.
DETAILED DESCRIPTION
[0023] The present disclosure may be understood more readily by reference to the following detailed description, examples, drawings, and claims, and their previous and following description. However, before the present devices, systems, and/or methods are disclosed and described, it is to be understood that this disclosure is not limited to the specific devices, systems, and/or methods disclosed unless otherwise specified, as such can, of course, vary. It is also to be understood that the terminology used herein is for the purpose of describing particular aspects only and is not intended to be limiting.
[0024] As used in the specification and the appended claims, the singular forms "a," "an" and ltthe" include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to an "analyzer" can include two or more such analyzers unless the context indicates otherwise.
[0025] Ranges may be expressed herein as from "about" one particular value, and/or to "about" another particular value. When such a range is expressed, another embodiment includes from the one particular value and/or to the other particular value. Similarly, when values are expressed as approximations, by use of the antecedent "about," it will be understood that the particular value forms another embodiment It will be further understood that the endpoints of each of the ranges are significant both in relation to the other endpoint, and independently of the other endpoint.
[0026] As used herein, the terms "optional" or "optionally" mean that the subsequently described event or circumstance may or may not occur, and that the description includes instances where said event or circumstance occurs and instances where it does not.
[0027] Reference will now be made in detail to certain embodiments of the disclosure, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers are used throughout the drawings to refer to the same or like parts.
[0028J FIG. l a is a schematic diagram illustrating the system in one embodiment allowing participants to control flows of information. In this case, the participant is able to classify different sources of information into high-value, medium value, low-value, and unwanted. By applying different token rates to the different categories, the participant is able to slow low-value information and encourage high-value information. Low-value information may be essentially worthless, but if accompanied by sufficient tokens the transaction becomes worthwhile. High-value inform ation could be accompanied by few, none-or even a negative number of tokens, but be worthwhile because of the information contained.
[0029] FIG. l b is a detail schematic of a participant controlling incoming flows of information or other transmissions. It begins with a standard-value transmission, but could just as easily begin with a high-value or low-value transmission. The user evaluates the quality of the information flow from this source and potentially reclassifies it as high or low value or as unwanted (and thus blocked). Note that configuring the system with discrete categories, as in this example, is only one possible embodiment of the system. Adjusting the rate for each rate separately or some combination of categories and individual rates is also possible. In all configurations of the system, however, participants are able to balance the value of the information with the value of tokens— both the value to themselves and the value to the information source of getting the information to the recipient.
[0030] FIG. 2 represents quasi-reciprocal flows between participants. Participants 1 and 2 are able to adjust the token rates they charge one another at will, encouraging or discouraging the flow of information between them. This does not involve any third party's judgm ent or decision-making. Tokens may be drained into the token pool with each transaction, and tokens may be acquired from the token pool by participants, typically at some cost. That the supply of tokens available to each participant is finite and that tokens can be applied usefully contribute to making tokens valuable enough to participants to offset, in sufficient quantity, the receipt of low-value or worthless information.
[0031] FIG. 3a is a detail schematic of how passive transmissions are created, and FIG. 3b is a detail schematic of such a passive transm ission being actuated, or received (or not received) by potential recipients. Passive transmissions (e.g., a blog post) are created and made available for others to accept should they so desire, as opposed to active transmission (e.g., email) which participants proactively send to others. With passive transmission, the creator is able to set the desired rate (positive, null, or negative) and potential recipients are able to choose whether to accept the exchange at this rate. Thus, this disclosure can be applied to passive and active transmission of information, and to any other mode, such as a combination of active and passive, as well.
[0032] FIG. 4 shows the effects of being a high- value participant vs. being a low-value participant within the system of this disclosure. FIG. 5 (prior art) shows the effects of being a high-value participant vs. being a low-value participant in a current state-of-the-art system. Taken together, these figures demonstrate the utility of this disclosure to high-value participants in any system involving the flow of information, data, or similar items. By so encouraging high-value participants to create more high-value content and discouraging the
creation of low-value content, this disclosure also increases the overall value of participating in any given system that uses this disclosure, creating utility for all participants in the system.
[0033] FIG. 6a illustrates how the ownership option works. By expiring old ownership and distributing new ownership to active members, the system encourages participants to remain active and rewards the most active participants with greater ownership and control of the system in which they participate. The rate at which activity accumulates new ownership can be adjusted according to the value or type of the activity, so as to encourage high-value activity or activities of particular sorts. The rate can also be tied strictly to the level of activity.
[0034] FIG. 6b and FIG. 6c illustrate the differences and similarities between the ownership option with or without the expiration or reabsorption of old ownership. As old ownership decreases, proportionally speaking, either way, the rewards and penalties are similar, but more powerful if the old ownership is removed from the system. Active participation yields an increase in ownership. Greater activity than others leads to a
proportional increase in ownership. Inactivity leads to proportional loss of ownership in either embodiment and to loss of actual ownership as well if old ownership is reabsorbed or expired.
[0035] High-value activity can be rewarded at a higher rate than low-value activity, or all activity can be rewarded at the same rate. FIG. 6a, FIG. 6b, and FIG. 6c may be applied equally well to ownership of the system, to ownership of a subsystem of the system, or to some other ownable thing or commodity.
[0036] An ownership option can be deployed with some, all, or none of the system . This involves distributing tokens to participants which allow high-value participants in the system to accumulate greater control over the system or parts of the system, to accumulate ownership of the system itself or parts of the system, or both. This ownership option can use the above token system, or it may be done separately. Typically, if done in conjunction with the above token system, it will be based on a second type of token in the same system . This is not necessary, however: one token could be used for both purposes.
[0037J The ownership option of the system involves the gradual transmission of ownership to participants. As participants make use of the system, they earn tokens which can be exchanged for fractions of ownership of the system itself or of some part of the system. This ownership may be time-bound, expiring a certain period of time after it is issued. It may be limited in terms of how many times it may cast votes on issues before expiring. It may be
limited in any other reasonable way. While ownership may be of the non-expiring sort traditional at most corporations, this is expected to yield suboptimal results. Expiration of ownership may take the form of the system buying the ownership according to a
predetermined set of m lee, exchanging other goods or services for it, or simply invoking it.
[0038] The utility of this aspect of this disclosure is to encourage and reward active participation in the system. Current state of the art systems typically suffer from the "tragedy of the commons" problem, mitigated to a greater or lesser extent by the activities of the organization which owns it. The participants in such systems, however, do not have an actual financial stake in the well-being and success of the organization. By gradually giving them ownership as they contribute, the system benefits by gaining owners whose stake in the organization is directly proportional to their own contributions. As old ownership is retired and replaced by new ownership— assuming that old owners are compensated at market value for the ownership they lose— everyone benefits: original owners receive a beneficial return on their initial investment; active participants who become new owners gain control of the enterprise to which they have contributed and the chance to receive financial compensation in their turn; the system itself benefits from the active financial interest in its success shared by all its most active participants.
[0039] Those with ordinary skill in the art will recognize that the disclosed embodiments have relevance to a wide variety of areas in addition to those specific examples described above.
[0040] The foregoing description of the exemplary embodiments is provided to enable any person skilled in the art to make or use the claimed subject matter. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without the use of the innovative faculty . Thus, the claimed subject matter is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
[0041] It is intended that all such additional systems, methods, features, and advantages that are included within this description be within the scope of the claims.
Claims
1. A method of providing users control over the flow of information, the method comprising the following steps:
receiving a transmission from at least one source, said source one of the users, said transmission having a transm ission type and including an associated rate based on said source and/or said transmission type, said rate comprising a certain number of tokens required for receiving or transmitting said transmission;
adjusting a token account associated with said source according to said rate;
transmitting said transmission to at least one participant, said participant one of said users, wherein said participant evaluates said transmission and applies a value rating to said transmission and/or said source, wherein said value rating effects the number of tokens required for subsequent transmissions:
from said source; and/or
of said transmission type;
wherein said tokens represent an ownership interest and there is a finite supply of said tokens in a token pool.
2. The method of claim 1 , wherein said value rating is attributed to said participants perceived value of said transm ission.
3. The method of claim 1 or 2, wherein said value rating is high, medium, low, or worthless.
4. The method of claim 3, wherein if said value rating is worthless, said transmission is blocked.
5. The method of any of the preceding claims, wherein said rate for said transmission could be negative whereby for each such transmission with a negative rate, tokens are removed from said participant's token account and deposited into said Source's token account.
6. The method of any of the preceding claims, wherein said type of transmission is active or passive.
7. The method of any of the preceding claims, wherein said ownership interest of non- participating sources and/or participants are automatically reallocated to sources and/or participants with a higher participation level.
8. The method of claim 7, wherein said higher participation level includes at least one of number of transmissions and value rating of said transmissions.
9. The method of claim 7 and 8. wherein said higher participation level includes number of value ratings as participant.
10, The method of any of the preceding claims, wherein said source in one transaction could be said participant in another.
11. The method of any of the preceding claims, wherein said source and/or said participant may acquire additional tokens from said token pool at a cost to said source and/or said participant.
12. The method of any of the preceding claims, wherein said source and/or said participant may purge excess tokens to said token pool at a benefit to said source and/or said participant
13. A computer implemented method, the method according to any of the preceding claims.
14. A non-transitory computer readable medium encoded with a program, said program perform ing the steps of any of the preceding claims 1 through 12.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161483163P | 2011-05-06 | 2011-05-06 | |
| US61/483,163 | 2011-05-06 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013050837A1 true WO2013050837A1 (en) | 2013-04-11 |
Family
ID=48043222
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2012/000916 Ceased WO2013050837A1 (en) | 2011-05-06 | 2012-05-10 | System and method for giving users control of information flow |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2013050837A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11669627B1 (en) | 2020-10-13 | 2023-06-06 | Wells Fargo Bank, N.A. | System for data access token management |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060148446A1 (en) * | 2002-02-28 | 2006-07-06 | Stefan Karlsson | Method and distributed rating system for determining rating data in a charging system |
| US7558832B2 (en) * | 2003-03-03 | 2009-07-07 | Microsoft Corporation | Feedback loop for spam prevention |
| US20090296582A1 (en) * | 2007-04-13 | 2009-12-03 | Zhiqiang Shi | Token-based congestion control method for the internet |
| US20100005093A1 (en) * | 1999-10-08 | 2010-01-07 | Michael Carl Heumann | Knowledge filter |
-
2012
- 2012-05-10 WO PCT/IB2012/000916 patent/WO2013050837A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100005093A1 (en) * | 1999-10-08 | 2010-01-07 | Michael Carl Heumann | Knowledge filter |
| US20060148446A1 (en) * | 2002-02-28 | 2006-07-06 | Stefan Karlsson | Method and distributed rating system for determining rating data in a charging system |
| US7558832B2 (en) * | 2003-03-03 | 2009-07-07 | Microsoft Corporation | Feedback loop for spam prevention |
| US20090296582A1 (en) * | 2007-04-13 | 2009-12-03 | Zhiqiang Shi | Token-based congestion control method for the internet |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11669627B1 (en) | 2020-10-13 | 2023-06-06 | Wells Fargo Bank, N.A. | System for data access token management |
| US12135812B2 (en) | 2020-10-13 | 2024-11-05 | Wells Fargo Bank, N.A. | System for data access token management |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Haddon | Information and communication technologies in everyday life: A concise introduction and research guide | |
| Davis | Politics online: Blogs, chatrooms, and discussion groups in American democracy | |
| Whitworth et al. | Spam and the social-technical gap | |
| US20040024639A1 (en) | Direct marketing management on behalf of subscribers and marketers | |
| Junk | Synergies in lobbying? Conceptualising and measuring lobbying coalitions to study interest group strategies, access, and influence | |
| Kabachnik | To choose, fix, or ignore culture? The cultural politics of Gypsy and Traveler mobility in England | |
| Watts | “Running on Empty”: Australia’s Neoliberal Social Security System, 1988–2015 | |
| Loder et al. | An economic response to unsolicited communication | |
| Ingram et al. | Crowdfunding among IT entrepreneurs in Sweden | |
| CN102624536A (en) | Guest inviting method and system for net meeting | |
| CN105321099A (en) | Classification management system for cigarette-concerning users with multiple WeChat public accounts | |
| Xia et al. | Characterization of user online dating behavior and preference on a large online dating site | |
| WO2013050837A1 (en) | System and method for giving users control of information flow | |
| Delitheou et al. | Research into citizens' attitude towards electronic municipal services (e-local government) | |
| Heripracoyo et al. | Implementation of tourism business web | |
| Reeves et al. | A marketplace for attention: Responses to a synthetic currency used to signal information importance in e-mail | |
| Zimmer | Social media use in local public agencies: a study of California's cities | |
| US20080275817A1 (en) | Method and apparatus for encouraging the formation and joining of online account groups | |
| Zindel et al. | LGBielefeld 2021 | |
| Garg et al. | Peer influence and information diffusion in online networks: An empirical analysis | |
| Lee et al. | Long tail phenomenon in public policy: analyzing big data on citizen opinion | |
| US20090171689A1 (en) | Process and software for distribution of communications in a relational context utilizing the Internet | |
| CN121032570A (en) | Marketing method, device and equipment of consumption credit and computer program product | |
| Xu et al. | Improving spam filtering in enterprise email systems with blockchain-based token incentive mechanism | |
| Sánchez-Barrueco | Communicating financial accountability in an age of disinformation: The results of a cross-national survey of supreme audit institutions (SAIs) 1 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12837721 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12837721 Country of ref document: EP Kind code of ref document: A1 |