Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
METHOD AND SYSTEM FOR CONTROLLED INTERACTIONS ON A NETWORKING PLATFORM
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 7 November 2024
Abstract
ABSTRACT METHOD AND SYSTEM FOR CONTROLLED INTERACTIONS ON A NETWORKING PLATFORM The present invention relates to a secure and customizable social networking platform that enables controlled user interactions through enhanced authentication, personalized settings, and organized communication management. The platform integrates biometric and multi-factor authentication to verify user identities, ensuring only authorized access. Users can define interaction thresholds, such as message frequency and content scope, allowing for personalized communication limits. Each user message is assigned a unique relay code for traceability and undergoes verification before storage, ensuring message authenticity and security. The platform further includes a relay sharing control unit to regulate message distribution, preventing unauthorized mass sharing. Users can create and manage a personalized "Sky environment," where customizable "Colours" group and categorize interactions by themes, enhancing organization and privacy. The system dynamically adjusts user permissions based on real-time interaction parameters and provides options for adding, blocking, or removing participants within each Colour. Through encrypted storage of user data and customizable access controls, the invention delivers a secure, user-centric social networking experience that prioritizes privacy, accountability, and flexible interaction management. Fig. 1
Patent Information
Application ID | 202441085482 |
Invention Field | COMPUTER SCIENCE |
Date of Application | 07/11/2024 |
Publication Number | 47/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
Sriram Balasubramanian | Plot No: 11, Block No 857, Kaveri Nagar, Kusugal, Hubli, Dharwad, Karnataka 580023 | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
Sriram Balasubramanian | Plot No: 11, Block No 857, Kaveri Nagar, Kusugal, Hubli, Dharwad, Karnataka 580023 | India | India |
Specification
Description:FIELD OF THE INVENTION
The present invention relates to a social networking system and method designed to facilitate secure, privacy-centric interactions between users. More specifically, it pertains to a platform for controlled user communication that incorporates features such as relay-based messaging with unique authentication codes, user-defined ratings in place of comments, and a modular framework for creating and managing customizable Colour categories within a Sky environment. The invention addresses issues of social stability and data security by implementing regulated connection limits, restricted communication formats, and dynamic access controls, making it particularly relevant in the fields of computer science, social media technology, and data privacy management.
BACKGROUND OF THE INVENTION
In current social networking platforms, there is a lack of adequate controls over the dissemination of information. This results in the unrestricted spread of unverified or potentially harmful content, which can lead to widespread misinformation and social instability.
Existing platforms generally emphasize broad connectivity and open interactions, often compromising user privacy. The absence of limits on user connections enables widespread access to personal information, increasing the risk of privacy breaches and misuse of user data.
Further, conventional social networks allow for mass sharing and communication features, such as group chats, forums, and public commenting. These features, while intended for engagement, often lead to collective behavior that may escalate into coordinated misinformation, protests, or disruptions to public order, especially in regions with significant social diversity.
The Negative User Interactions is also a main concern. Public commenting and unrestricted feedback mechanisms lead to negative interactions, such as trolling, harassment, and cyberbullying. The ability for users to post unfiltered comments results in a hostile environment that discourages users from expressing themselves freely and safely.
There are a lot challenges with Content Authenticity. The current social networks lack systematic tools for verifying the authenticity of user-generated content. Without authentication methods for shared messages, it is difficult to trace the origin of information, leading to issues with trust and content reliability.
It also observed that there were no Mechanism to Restrict Repeated Sharing. Many social networking platforms allow users to share and reshare content without limitations. This creates an overload of redundant information and makes it challenging for users to find original, verified content, often resulting in misinformation and content fatigue.
Further, social media platforms enable the continuous flow of information, leading to an overload of content that can overwhelm users. This "information fatigue" makes it difficult for individuals to discern relevant information from noise, diminishing the quality of user experience. Also, the Current social networks do not offer flexible mechanisms for categorizing and organizing content based on themes or user-defined settings. This lack of categorization limits users' ability to personalize their information environment and efficiently manage their shared content.
The Absence of Access Control Mechanisms is also one of the biggest problem. Existing social media platforms provide minimal controls for restricting or customizing user access to specific content. Users are often unable to tailor their content visibility and permissions effectively, which can lead to unwanted interactions and information leaks. The Open connectivity on traditional social networking sites creates data security concerns. Sensitive user data is often vulnerable to unauthorized access or misuse due to limited access control options, leading to compromised data integrity and privacy risks.
Furthermore, there was insufficient Privacy Options for Businesses. Businesses seeking secure and controlled information sharing on public platforms face challenges, as these platforms lack specific privacy features tailored for business needs. Open commenting and broad access to posts make it difficult for businesses to manage their reputations and ensure their messages reach the intended audience without distortion.
The Social media platforms often fail to provide sufficient tools for selective audience engagement and effective content moderation. This lack of moderation controls can result in the spread of false information, offensive remarks, and disruptive behavior, undermining the platform's credibility and user trust.
There is a Lack of Traceability for Shared Content. On current platforms, once content is shared, it becomes difficult to track its dissemination and ensure its integrity. Without unique identifiers or tracking mechanisms, users cannot verify the source or authenticity of shared posts, reducing trust in the information provided.
Further, there is Hugh negative Social Impact from Unrestricted Group Messaging. Group messaging features on traditional platforms allow users to form large groups where information can be rapidly disseminated. This unrestricted group communication can lead to the amplification of divisive messages, protests, or calls to action, which may disrupt social harmony and public safety.
Also account getting compromised due to hacking and unauthorized persons posting unauthorized messages from popular persons account are sure to damage their reputation, this specific issue is solved by using read-only mode (SMPP) a special feature especially suited for celebrities & famous persons.
There is also inadequate Solutions for Preventing Social Disruptions. Due to the open nature of most social networks, there are few options available to mitigate the potential for social unrest or disruptions. The absence of regulatory mechanisms to limit user interactions and mass messaging contributes to the platform's susceptibility to misuse.
The Current social media platforms offer limited customization options for users wishing to control their communication settings, connections, and content organization. This lack of flexibility restricts users' ability to tailor their online interactions and structure their information-sharing environment according to their preferences. Further, traditional social networks often lack effective methods for blocking, removing, or managing connections. Users may encounter unsolicited or undesirable connections, leading to unwelcome interactions and an erosion of personal boundaries.
Furthermore, the current platforms provide limited options for real-time control over shared content. Users have minimal means to regulate who can interact with their content or restrict the scope of its dissemination, resulting in potential risks of content exploitation and privacy violations.
It has also seen that there is unstructured Environment for Professional Networking. Businesses and professionals who use traditional social networks face challenges with structuring their networks and managing interactions effectively. The lack of organized content-sharing options and selective audience features limits their ability to present information in a professional and controlled manner.
Therefore, existing social networking platforms offer minimal safeguards to prevent unauthorized alterations to shared content. This lack of content integrity controls makes it challenging to maintain the authenticity and accuracy of information shared among users and there is need for laying the groundwork for understanding the necessity of a structured, secure, and controlled environment for user interactions.
OBJECTIVES OF THE INVENTION
An object of the present invention is to provide a social networking system that ensures controlled dissemination of information, thereby preventing the unrestricted spread of unverified or potentially harmful content, which often leads to misinformation and social instability.
Another object of the present invention is to offer enhanced privacy options through limited user connections, allowing users to interact only within predefined boundaries and reducing the risk of privacy breaches and unauthorized access to personal data.
An object of the present invention is to limit mass communication features by allowing only one-to-one messaging, effectively preventing group communication that could lead to the rapid spread of misinformation or socially disruptive content.
Another object of the present invention is to replace open commenting with a rating-based feedback mechanism, providing a safer, less hostile environment that minimizes harassment, trolling, and negative interactions on the platform.
An object of the present invention is to implement a relay-based messaging system with unique authentication codes for each message, ensuring content authenticity and traceability, which helps build trust in the information shared on the platform.
Another object of the present invention is to incorporate a relay sharing control unit that limits repeated and mass sharing of relays, reducing content redundancy and preventing the spread of misinformation through uncontrolled sharing.
An object of the present invention is to avoid information overload by implementing measures that control the frequency and scope of shared content, providing a more manageable and relevant information flow for users.
Another object of the present invention is to provide a customizable Sky environment that allows users to create and manage various Colour categories, enabling structured content organization based on user-defined themes and settings.
An object of the present invention is to enable dynamic access control mechanisms that adjust user permissions based on specific interaction parameters, ensuring that user access is tailored to their specific needs and usage context.
Another object of the present invention is to secure sensitive data by providing a robust access control framework that limits unauthorized access and protects user information from exploitation or misuse.
An object of the present invention is to provide specific privacy settings for businesses, allowing them to manage reputation-sensitive information sharing and protect their brand image in a controlled, secure environment.
Another object of the present invention is to enable selective audience engagement and effective content moderation tools that mitigate the risks of false information, offensive remarks, and disruptive behavior, thereby maintaining the credibility and trustworthiness of the platform.
An object of the present invention is to introduce unique relay identifiers that allow users to trace the source and authenticity of shared content, enhancing the trust in information disseminated within the platform.
Another object of the present invention is to limit communication to one-to-one interactions, reducing the risks associated with unrestricted group messaging, which often leads to amplified divisive messages or social disruptions.
An object of the present invention is to provide regulatory mechanisms to prevent the spread of potentially disruptive content, contributing to social stability and responsible communication within the platform.
Another object of the present invention is to offer flexible customization options for users, allowing them to control their communication settings, connections, and content organization according to their preferences.
An object of the present invention is to enable the blocking, removal, or control of unwanted connections, thereby protecting users from unsolicited interactions and preserving personal boundaries.
Another object of the present invention is to provide real-time control over shared content, allowing users to regulate who can interact with their content and prevent unauthorized dissemination of sensitive information.
Another object of the present invention is to lock/unlock the user from adding & sharing messages/contents, thereby protecting users from posting messages without their knowledge even when account is compromised.
An object of the present invention is to offer structured networking options for businesses and professionals, allowing them to organize content-sharing and manage audience interactions in a professional, controlled manner.
Yet another object of the present invention is to ensure the integrity of shared content by preventing unauthorized modifications, maintaining the authenticity and accuracy of information shared on the platform.
SUMMARY OF THE INVENTION
The present invention provides a method and system for controlled and secure interactions on a social networking platform, emphasizing privacy and user-defined customization. The method begins with a user interface provided on a network-connected computing device, which facilitates user registration and authentication for secure platform access. The user's profile information is processed through a server's data processing unit, where connection parameters are stored to control interactions based on predefined thresholds and permissions. Unique relay codes are generated for user messages by a relay code generation module within the server, linking each message to a verification unit that authenticates its origin and stores it in a dedicated database.
Feedback on user messages is facilitated through a rating module, allowing feedback to be processed and displayed without enabling public comments. This feedback is integrated into a graphical interface on the user's device, supported by a local rating processing unit within the server. Group communication is restricted by a communication control module within the server, which only permits one-to-one messaging, thereby preventing unauthorized mass messaging. Access permissions are dynamically adjusted using a computing-based access control mechanism within the server, based on specific interaction parameters. To manage content sharing, a relay sharing control unit is implemented within the server, configured to limit repeated and mass sharing of user messages by controlling the frequency and scope of sharing according to predefined rules.
The invention also includes a Sky environment that allows users to create and manage various Colours, listed by categories, for organizing relays. Each Colour is customizable based on user-defined themes and settings, with options to add, remove, or block users implicitly or explicitly. In another aspect of the invention, the registration process can incorporate a secure multi-factor authentication mechanism to verify user identity, adding an extra layer of security. Additionally, a time-stamped relay log may be generated for each message, recording essential details like date, time, and origin, ensuring traceability.
The social networking system includes a network-connected computing device with a display screen, input interface, and communication interface unit, designed to support user registration, authentication, and platform interactions. The server within the system includes a data processing unit coupled with a storage unit to store user profiles, connection parameters, and relays, and to generate and associate unique relay codes with each message. A relay verification module validates messages by cross-referencing relay codes with stored data, ensuring authenticity. A feedback processing module within the server processes rating inputs and displays feedback without enabling public comments.
A communication control module within the server restricts communications to one-to-one messaging based on preset permissions, while an access control module with a computing-based mechanism dynamically manages user permissions according to interaction parameters. The system's relay sharing control unit prevents repeated and mass sharing by applying frequency and scope-based sharing rules. Additionally, a Sky management unit enables users to create, categorize, and customize Colours to organize relays based on user-defined themes and settings, with the facility for owners to approve, reject, or ignore other users' interactions with specific Colours.
For enhanced security, the system's computing device may include a biometric input interface to enable secure access through biometric verification. An alert generation module integrated within the server provides real-time notifications for unauthorized access attempts or relay sharing violations. Lastly, the feedback processing module may also display aggregated ratings for each user message as a visual rating indicator, further enriching the user experience.
Other aspects, advantages, and salient features of the present invention will become apparent to those skilled in the art from the following detailed description read in conjunction with the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The summary above, as well as the following detailed description of the illustrative embodiment, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the drawings. However, the present disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale. Wherever possible, like elements have been indicated by identical numbers.
Embodiments of the present disclosure will now be described, by way of example only, with reference to the following diagrams wherein:
Figure 1 is representing a method for enabling controlled interactions on a social networking platform.
Figure 2 is representing a social networking system for controlled and secure interactions.
DETAILED DESCRIPTION OF EMBODIMENTS
The process depicted in FIG. 1 begins with a user accessing the social networking platform through a user interface (101) on a computing device (102). This device could be a smartphone, tablet, or computer, providing flexibility for users to connect from various environments. Upon accessing the platform, users are prompted to begin the registration and authentication process, which ensures that only authorized individuals are permitted access to the system's features.
User authentication is a crucial step in the process, involving the verification of credentials to confirm user identity. This secure authentication step prevents unauthorized access and provides a strong foundation for a secure social networking experience. The authentication mechanism checks the validity of user-provided information, such as usernames, passwords, and other identifying details, ensuring that only verified users gain access to the platform.
Following successful authentication, the data processing unit (103) engages in the next stage, which involves gathering and verifying user profile information. This unit collects necessary details from each user and stores them for further processing, enabling the platform to apply customized settings based on individual profiles. The data processing unit ensures that user information remains secure and is processed in a centralized manner.
In addition to profile information, connection parameters are also collected by the data processing unit (103). These parameters define the thresholds and permissions for each user, such as the level of interaction allowed and the scope of message exchanges. The connection parameters serve as a set of rules governing how users can interact on the platform, ensuring controlled and moderated communications.
The user profile data and connection parameters are stored securely in a storage unit (105) within the central server (104). This storage mechanism ensures that all data is organized and accessible when needed, allowing for efficient management of user permissions and access levels. The secure storage of these parameters plays a vital role in maintaining the integrity of the platform, as it regulates user interactions based on predefined rules.
One of the key features of this platform is the relay code generation module (107), which generates a unique relay code (106) for each user message. This relay code acts as a digital fingerprint, allowing the system to trace the origin and authenticity of each message. By assigning a unique relay code to every interaction, the platform enables a secure and verifiable messaging process.
Once a relay code is generated, the message proceeds to a verification stage, where it is checked for authenticity by the message verification unit (108). This unit compares the relay code with stored parameters to confirm that the message is genuine and has not been altered. Verification of each message is essential for maintaining trust within the network, as it ensures that users can rely on the authenticity of their communications.
After successful verification, the message is stored in a database (109), which serves as a secure repository for all validated communications on the platform. This database provides a record of all interactions, making it easy to retrieve messages if needed for reference or verification. By storing verified messages, the platform upholds a high standard of security and accountability for all communications.
In addition to message storage, the platform incorporates a rating module (110) that enables users to privately provide feedback on messages they receive. Through this rating system, users can express their opinions without publicizing their feedback, ensuring a secure and non-intrusive way to gauge message quality. The rating module is accessible via a graphical user interface (111), which is user-friendly and easily navigable.
The feedback provided through the rating module is processed by a local rating processing unit (112), which aggregates and displays ratings in a controlled manner. This unit ensures that feedback is presented without revealing detailed user comments, protecting the privacy of user interactions. By displaying ratings in a non-disruptive way, the platform encourages honest feedback while maintaining a respectful social environment.
To regulate user interactions further, the communication control module (113) restricts interactions to one-on-one messaging, thereby limiting communication to authorized participants only. This restriction is crucial for maintaining a secure network, as it prevents unauthorized group messages and reduces the risk of message spam. Users are assured that their interactions will remain private and within authorized boundaries.
In support of controlled access, the platform employs an access control mechanism (114) that dynamically adjusts user permissions based on interaction parameters. This mechanism continuously monitors user behavior and adjusts permissions in real-time, allowing the system to respond proactively to potential security risks. Access control provides an additional layer of security, ensuring that users can only access what they are permitted to view.
The interaction parameters, which govern user communication limits, are configured to restrict interactions to a specific scope and frequency. These parameters prevent users from engaging in excessive messaging, thereby enhancing the quality and relevance of interactions. By limiting message frequency, the platform prevents spam and unauthorized mass communication, creating a more meaningful social experience for users.
The relay sharing control unit (115) serves as a regulatory layer by limiting the sharing of relay codes based on pre-defined rules. This control unit enforces restrictions on relay sharing to prevent excessive message dissemination. By controlling relay sharing, the platform ensures that messages are shared responsibly and that the integrity of communication is preserved.
A unique aspect of the platform is the "Sky environment" (118), which allows users to customize their social space by categorizing interactions. Within this environment, users can create different Colours, each representing a distinct category for organizing relays based on themes or preferences. This feature enables users to personalize their experience and manage communications according to their interests.
The Sky environment provides users with the ability to control participation in each Colour by adding, removing, or blocking individuals. This feature grants users comprehensive control over their social interactions, allowing them to curate their communication spaces. By managing who participates in specific discussions, users can create focused and relevant communication channels within the platform.
Users have the flexibility to add participants to Colours either implicitly or explicitly, based on predefined criteria or manual selection. Implicit additions occur when users meet certain criteria, while explicit additions require the Colour owner's approval. This dual approach to managing participation enhances user control and enables customized interaction within the Sky environment.
For enhanced security, the computing device (102) can include a biometric input interface (116), which adds an additional layer of user verification. This biometric feature, such as fingerprint or facial recognition, strengthens authentication by ensuring that only verified users can access sensitive areas of the platform. Biometric verification supports the platform's goal of maintaining a secure and trusted environment for user interactions.
The platform also includes a time-stamped relay log (117) that records each message's date, time, and origin, providing an audit trail for all interactions. This relay log acts as an accountability measure, allowing the platform to trace user activity. By maintaining a comprehensive log of all communications, the platform ensures transparency and offers a way to verify message histories if needed.
In summary, the process illustrated in FIG. 1 provides a secure and structured approach to social networking, focusing on controlled interactions and user authentication. By combining relay code generation, message verification, user feedback, and access control, the platform ensures that all communications are authenticated, private, and secure. This structured process aligns with the platform's mission to provide a safe and customized social networking experience.
FIG. 2 represents the system architecture of the social networking platform, highlighting the primary components involved in secure communication and user interaction management. At the core of the system is a computing device (202) that users interact with, which includes a display screen (203), input interface (204), and communication interface unit (205). This device serves as the user's gateway to the platform, allowing them to access various features and functionalities.
The user interface (201) on the computing device provides an intuitive entry point for users, guiding them through the registration and authentication processes. This interface is designed to be user-friendly, ensuring a seamless experience for individuals with varying technical skills. Through this interface, users can initiate interactions, manage settings, and engage with the platform securely.
The server (206) houses the data processing unit (207) and storage unit (208), which work together to manage and store user profile data and connection parameters. These components are essential for organizing user data efficiently and securely, enabling centralized management of permissions and settings. The server acts as the backbone of the system, supporting all operations related to user data processing and storage.
The data processing unit (207) is responsible for generating unique relay codes (209) for each user message, ensuring that every communication can be traced and verified. This code generation process is vital for maintaining the integrity of communications, as it allows the system to validate the origin and authenticity of each message. By creating unique identifiers for each interaction, the platform enhances security and accountability.
After generating relay codes, the system uses a relay verification module (210) to authenticate each message, comparing relay codes with stored data to confirm validity. This verification process prevents unauthorized modifications to messages, ensuring that users can trust the authenticity of their interactions. The relay verification module plays a critical role in safeguarding the platform against tampered communications.
Verified messages are stored in a secure database (209), which acts as a repository for all authenticated interactions on the platform. This database ensures that only verified messages are recorded, creating a reliable archive of communications. The storage of verified messages provides a reference point for users and platform administrators, ensuring a traceable record of all interactions.
User feedback on messages is processed by a feedback processing module (211), which enables users to rate messages privately. This feedback mechanism allows users to express their opinions on message quality without exposing comments publicly. By keeping feedback private, the platform creates a respectful and secure environment for users to provide honest ratings.
The platform's communication control module (212) enforces restrictions on user interactions, limiting messaging to authorized one-on-one exchanges. This restriction prevents unauthorized group messaging, ensuring that interactions remain private and within the boundaries set by user permissions. By controlling communication scope, the platform minimizes risks associated with spam and unauthorized access.
Access control is managed by a dynamic permission adjustment mechanism within the access control module (213), which adjusts permissions based on real-time interaction parameters. This mechanism monitors user behavior and modifies access rights accordingly, ensuring that users can only interact within approved limits. Dynamic access control supports the platform's goal of providing a secure and responsive environment.
Interaction parameters define the scope and frequency of user communications, preventing excessive messaging and enhancing the quality of interactions. By setting limits on message frequency, the platform reduces spam and creates a more focused social experience. These parameters are configured to balance user engagement with security, ensuring that interactions are meaningful and controlled.
The relay sharing control unit (215) enforces rules on relay sharing, limiting the frequency and scope of message dissemination. This unit prevents users from engaging in mass sharing, ensuring that communications remain relevant and secure. By controlling relay sharing, the platform protects against misuse of the platform for unsolicited messages or spam.
The Sky management unit (218) is a unique feature that allows users to organize their interactions within a customizable environment known as the "Sky." Within this space, users can define Colours to categorize relays based on themes or preferences, allowing for a personalized social experience. The Sky management unit enables users to tailor their interactions to match their interests, adding a layer of customization.
Users can control who participates in each Colour, with options to add, remove, or block participants. This control feature empowers users to manage their social spaces and ensures that only relevant individuals are involved in specific discussions. The flexibility to approve or reject participants supports focused and secure interactions.
Participants can be added to Colours either implicitly or explicitly, depending on user preferences or predefined conditions. Implicit additions are based on criteria set by the platform, while explicit additions require user selection. This feature enhances control over user interactions, allowing the Sky environment to adapt to varying user needs.
For added security, the platform supports biometric verification via a biometric input interface (216) on the computing device. Biometric features, such as fingerprint or facial recognition, strengthen user authentication, ensuring that only verified users can access sensitive areas. This feature bolsters the platform's security measures, protecting user privacy and sensitive interactions.
A time-stamped relay log (217) records the date, time, and origin of each message, providing an audit trail for all user interactions. This log enables the platform to trace user activity and offers transparency in communication. The time-stamped log is invaluable for reviewing message histories and verifying the authenticity of interactions.
The system includes a real-time alert generation feature (217), which notifies users of relevant events or updates within their social network. This alert system ensures that users stay informed about important activities, enhancing engagement and responsiveness. By providing timely notifications, the platform supports a dynamic and interactive social experience.
Visual feedback indicators are incorporated to display ratings and interaction outcomes in a non-intrusive manner. These indicators allow users to gauge message quality without exposing detailed feedback, maintaining the privacy of user opinions. Visual feedback contributes to a respectful social environment where users can interact without concern for public judgment.
The combination of secure message storage, controlled access, and customizable environments enables the platform to offer a unique social networking experience. By providing users with control over interactions and secure communication channels, the system meets the demands of privacy-conscious individuals. The platform's architecture is designed to prioritize user security, engagement, and customization.
In conclusion, FIG. 2 illustrates a robust system architecture that supports a secure, customizable, and user-friendly social networking platform. Through components like the relay verification module, access control, and Sky management unit, the platform provides a structured environment where users can interact safely. This system architecture aligns with the platform's mission to deliver a trusted and personalized social experience.
In a preferred embodiment of the invention, additional layers of security and customization are introduced to enhance user interactions and data management with confidentiality and personalization. The authentication process is bolstered by incorporating biometric inputs, such as fingerprint and facial recognition, providing an additional layer of identity verification beyond traditional username and password entry. This ensures that only authorized users are granted access to the platform, preventing unauthorized access and protecting sensitive user data.
Furthermore, the authentication process includes multi-factor authentication (MFA), which requires users to provide multiple credentials. For instance, after entering a password, users might be prompted to input a one-time verification code sent to their mobile devices. This step reduces the risk of unauthorized access by requiring verification from multiple sources, safeguarding user profiles and ensuring only legitimate users can interact on the platform.
This embodiment also includes customizable interaction limits, enabling users to set thresholds for various parameters, such as message frequency or the scope of content sharing. These settings are stored securely within the user's profile and can be adjusted according to individual preferences. For example, a user may restrict the number of messages they receive within a specific timeframe, controlling the flow of communication. Such customizable interaction limits allow users to define and enforce personal engagement boundaries, providing a tailored user experience that respects individual preferences.
Additionally, all user profiles, messages, and associated data are stored within an encrypted storage unit, where encryption protocols ensure that only authorized personnel or systems can access stored information. This secure storage helps maintain data integrity while allowing secure retrieval by authorized users, preventing unauthorized access to sensitive information and ensuring the confidentiality of personal details and communication history.
A key feature of this embodiment is the relay code generation, which assigns unique relay codes to each user message. Each relay code serves as a digital fingerprint for its respective communication, enabling the system to track and verify messages accurately. The unique relay codes provide a comprehensive audit trail, where each interaction is individually identifiable and traceable. Before messages are stored, these relay codes undergo validation, ensuring that only authentic and verified messages are retained. This tracking and authentication mechanism guarantees that all communications within the system are genuine and unaltered.
Moreover, this embodiment includes provisions for one-on-one messaging regulated through a communication control module, which restricts interactions to private, direct exchanges between two individuals. By prohibiting mass or group messaging unless explicitly authorized, the system prevents misuse of its communication features and upholds user privacy. This one-on-one messaging limitation is particularly useful in environments where confidentiality and controlled information access are critical, as it minimizes the potential for unauthorized message dissemination.
The system also dynamically manages user access permissions, adjusting them based on real-time interaction parameters. This mechanism allows permissions to be modified according to predefined criteria, ensuring that access aligns with the user's current behavior and interaction history. For example, if a user frequently interacts with specific types of content or individuals, their permissions may be adjusted to either expand or restrict access accordingly. This dynamic adjustment of permissions provides flexibility while maintaining security, allowing access to adapt to each user's interaction level and behavior.
Additionally, permissions are controlled based on interaction parameters designed to limit access according to user activity, interaction frequency, or role within the platform. This control measure helps ensure that users interact within defined boundaries, aligning permissions with the user's needs and level of engagement. These predefined restrictions prevent unauthorized activities and ensure that users operate within their designated access limits.
A relay sharing control unit further prevents repeated or mass sharing of messages. This unit applies sharing rules that restrict the frequency and scope of relay code usage. For example, if a user tries to share the same relay code multiple times within a short period, the system will limit or block such actions to prevent spam or excessive message distribution. These rules, derived from user-defined settings or system defaults, maintain a balanced flow of communication, ensuring that sharing remains within acceptable limits.
Another feature is the Sky environment, where users can create and manage a personalized space for organizing interactions. Within this environment, users can customize Colours to group and categorize relays based on themes or user-defined settings. Each Colour serves as a grouping mechanism, allowing users to organize messages or interactions according to specific criteria. For instance, a user might assign a particular Colour for work-related messages and another for personal communications, providing a structured approach to interaction organization.
Within the Sky environment, users can approve, reject, or ignore other users based on the Colour categories they have created. This capability allows users to exercise control over who can access or participate in specific groups, maintaining a high level of customization and exclusivity. By managing user access within Colour categories, users can curate their interactions, ensuring that only approved participants engage in each categorized relay.
Finally, users can add, remove, and block individuals within each Colour category, allowing for dynamic interaction management. If a user no longer wishes to interact with certain individuals in a specific Colour, they can block or remove them without affecting other interactions. This flexible control over interactions enables users to adjust their social and professional circles according to their preferences, thereby maintaining a tailored and secure communication environment.
Through the integration of biometric authentication, multi-factor access, customizable interaction limits, encrypted storage, and unique relay codes, this preferred embodiment ensures secure and controlled interactions. The system provides a highly customizable, user-friendly platform that maintains privacy, aligns with user-defined preferences, and safeguards data, delivering a robust and personalized communication experience.
In one embodiment, the system (200) includes an SMPP module integrated within the server (206). This module is configured to disable or lock the functionality of adding and sharing relays within the system (200), even when a user is logged in. This feature enhances control over relay-sharing capabilities, preventing unauthorized additions or modifications. To re-enable or unlock this functionality, the system (200) is designed to send an email to the registered email address associated with the account. This email contains a numeric code, which the user must input to unlock the SMPP mode, thus allowing the addition or sharing of relays. This process provides an additional security layer, ensuring that only authorized users can alter relay settings in the system (200).
Although the invention has been described with reference to specific embodiments, this description is not meant to be construed in a limiting sense. Various modifications of the disclosed embodiments, as well as alternate embodiments of the invention, will become apparent to persons skilled in the art upon reference to the description of the invention. It is, therefore, contemplated that such modifications, improvements can be made without departing from the spirit or scope of the present invention as defined.
, Claims:I claim:
1. A method (100) for enabling controlled interactions on a social networking platform comprising the steps of: providing a user interface (101) through a network-connected computing device (102), the user interface (101) being configured to allow registration and authentication of a user to access the platform; processing the user's profile information using a data processing unit (103) integrated into a server (104), wherein the processing involves storing connection parameters in a storage unit (105) to control user interactions based on pre-set thresholds and permissions; generating unique relay codes (106) for user messages using a relay code generation module (107) integrated within the server (104), wherein the relay codes (106) are linked to a message verification unit (108) that authenticates the origin of the messages stored in a database (109); facilitating feedback on user messages using a rating module (110) integrated into a graphical user interface (111) on the computing device (102), wherein the feedback is processed and displayed without enabling public comments, by utilizing a local rating processing unit (112) within the server (104); restricting group communications using a communication control module (113) within the server (104), the communication control module (113) being configured to allow only one-to-one messaging between users based on preset permissions; dynamically adjusting access permissions based on interaction parameters using a computing-based access control mechanism (114) integrated within the server (104); preventing repeated and mass sharing of user messages by implementing a relay sharing control unit (115) within the server (104), wherein the relay sharing control unit (115) is configured to limit the frequency and scope of relay sharing based on predetermined sharing rules; and allowing users to create and manage a Sky environment (118) containing various Colours, listed by categories, for grouping and organizing relays, wherein each Colour is customized based on user-defined themes and settings along with the provision to add/remove/block users to that Colour implicitly or explicitly.
2. The method (100) according to claim 1, wherein the registration step includes a secure user authentication process using a multi-factor authentication mechanism (116) that verifies the identity of the user before granting access to the platform.
3. The method (100) according to claim 1, further comprising a step of generating a time-stamped relay log (117) for each message, wherein the relay log (117) records the date, time, and origin details of each user-generated message to ensure traceability.
4. The method (100) according to claim 1, wherein the relay sharing control unit (115) is configured to restrict sharing of user messages based on predefined criteria including message type, user permission level, and the user's connection status within the platform.
5. A social networking system (200) for controlled and secure interactions comprising: a network-connected computing device (202) with a display screen (203), an input interface (204), and a communication interface unit (205), the computing device (202) being configured to provide a user interface (201) for registration, authentication, and interaction with a social networking platform; a server (206) comprising a data processing unit (207) coupled with a storage unit (208), the data processing unit (207) being configured to store user profiles, connection parameters, and relay messages, and to generate and associate unique relay codes (209) with each user-generated message; a relay verification module (210) integrated within the server (206), the relay verification module (210) being configured to validate the authenticity of messages by cross-referencing the relay codes (209) with stored message data; a feedback processing module (211) operatively coupled with the server (206), the feedback processing module (211) being configured to receive and process rating inputs for user messages via the computing device (202), and display the ratings without enabling public comments; a communication control module (212) integrated within the server (206), the communication control module (212) being configured to allow only one-to-one communications between users based on preset permissions and to prevent unauthorized mass messaging; an access control module (213) comprising a computing-based mechanism (214) configured to dynamically adjust and manage user permissions based on interaction parameters processed within the server (206); a relay sharing control unit (215) integrated within the server (206), the relay sharing control unit (215) being configured to restrict repeated and mass sharing of user messages by implementing frequency and scope-based sharing rules stored in the storage unit (208); and a Sky management unit (218) integrated within the server (206), the Sky management unit (218) being configured to allow users to create, categorize, and customize Colours to organize relays based on user-defined themes and settings within a Sky environment along with the facility to approve/reject/ignore users to that Colour by the owner's choice.
6. The system (200) according to claim 5, wherein the computing device (202) comprises a biometric input interface (216) for enabling secure access to the user interface (201) based on biometric verification of the user.
7. The system (200) according to claim 5, further comprising an alert generation module (217) integrated within the server (206), the alert generation module (217) being configured to notify users in real time regarding potential unauthorized access attempts or relay sharing violations.
8. The system (200) according to claim 5, wherein the feedback processing module (211) is further configured to aggregate and display ratings for each user message in the form of a visual rating indicator (220) on the computing device (202).
9. The system (200) of claim 5, further comprising:
an SMPP module integrated within the server (206), the SMPP module being configured to:
a) disable or lock the functionality of adding and sharing relays, even when a user is logged into the system (200); and
b) enable or unlock said functionality upon receiving an email at a registered email address associated with the system (200), wherein the email includes a numeric code to unlock the SMPP mode.
Documents
Name | Date |
---|---|
202441085482-COMPLETE SPECIFICATION [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-DECLARATION OF INVENTORSHIP (FORM 5) [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-DRAWINGS [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-FORM 1 [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-FORM 18 [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-FORM-9 [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-POWER OF AUTHORITY [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-REQUEST FOR EARLY PUBLICATION(FORM-9) [07-11-2024(online)].pdf | 07/11/2024 |
202441085482-REQUEST FOR EXAMINATION (FORM-18) [07-11-2024(online)].pdf | 07/11/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.