WO2012100331A1 - An internet search and security system that uses balanced logic - Google Patents

An internet search and security system that uses balanced logic Download PDF

Info

Publication number
WO2012100331A1
WO2012100331A1 PCT/CA2012/000069 CA2012000069W WO2012100331A1 WO 2012100331 A1 WO2012100331 A1 WO 2012100331A1 CA 2012000069 W CA2012000069 W CA 2012000069W WO 2012100331 A1 WO2012100331 A1 WO 2012100331A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
network
computer system
computer
Prior art date
Application number
PCT/CA2012/000069
Other languages
French (fr)
Inventor
Gregory VEZINA
Original Assignee
Vezina Gregory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vezina Gregory filed Critical Vezina Gregory
Publication of WO2012100331A1 publication Critical patent/WO2012100331A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/20Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
    • H04W4/21Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications

Definitions

  • This invention is in the field of computer-based searching and security protocols for interactions over the world wide web.
  • Figure 1 is a schematic diagram of a computer system according to the invention, comprising a hierarchical classification-based search engine, shielded access, and an assurance of security for individual who use the internet through the interface programmed according to this invention.
  • Figure 2 shows a preferred classification system for a subject classification based search of the internet search engine of this invention.
  • Figure 2(A) shows the top left branches;
  • Figure 2(B) shows the upper middle left branches;
  • Figure 2(C) shows the lower middle left branches;
  • Figure 2(D) shows the bottom left branches;
  • Figure 2(E) shows the top right branches;
  • Figure 2(F) shows the middle right branches;
  • Figure 2(G) shows the bottom right branches.
  • This invention provides a unique approach to the challenges of internet search and privacy. It delivers a rich online experience by providing users a powerful search tool that returns more relevant search results than what is currently available.
  • a new form of multi-value synergistic balanced logic is implemented as a methodology for tools that provide Autonomous Automation (AA).
  • the invention provides a secure and private connection between the consumer and whatever on-line content that they seek to engage with, by way of a Virtual Private Network (VPN) for each subscriber.
  • VPN Virtual Private Network
  • the user can maintain complete control over their information.
  • This invention also provides a pre-loaded personal organizer that permits almost endless customization by the user.
  • Balanced-Unified-Symbiotic-Logic A methodology upon which the searching capabilities of this invention may be constructed is referred to in this disclosure as "Balanced-Unified-Symbiotic-Logic", or “Balanced Logic”. This is a series of tools and applications that constitute a new "unified field theory" concept for logic. It allows humans and computers to yield and utilize knowledge, using all the definitions and values of logic together and simultaneously. This brings about a human and bionic computer interface for knowledge automation.
  • the logic methodology is not solely based on mathematical valued logic. It also uses multivalued logic, the classification system shown in Figure 2, and the "Tree of Knowledge” concept for combining the practices and theories of psychology, and other logic, ideas, innovation, systems, methods and concepts, to create a truly new form of fuzzy logic. It includes many other new and modified ways of interfacing thought and technology to allow the creation of a truly global collective community.
  • the Tree of Knowledge System provides: "a new unified theory of knowledge that maps the pieces of the scientific puzzle in a novel way that connects Quantum Mechanics to Sociological processes and everything in between into a coherent whole.
  • the most novel aspect of the Tree of Knowledge is its visuo-spatial depiction of knowledge as consisting of four dimensions of complexity (Matter, Life, Mind, and Culture) that correspond to the behavior of four classes of objects (material objects, organisms, animals, and humans), and four classes of science (physical, biological, psychological, and social).”
  • TRIZ Teoriya Resheniya Izobretatelskikh Zadatch
  • Hua, Z. et al International Journal of Business Innovation and Research V. 111-128 (2006).
  • the theory includes a practical methodology, tool sets, a knowledge base, and model-based technology for generating new ideas and solutions for problem solving. It is intended for application in problem formulation, system analysis, failure analysis, and patterns of system evolution.
  • TRIZ has been the development of an algorithmic approach to the invention of new systems, and the refinement of existing ones.
  • VEZ logic Visualize Everything Zoom in
  • VEZ logic uses a new symbiotic matrix map and organizing approach to informal logic, formal logic, symbolic logic, and a new definitions of logic.
  • the new methodologies and tools provided in this invention will basically allow everyone to obtain wisdom instantly, eliminating or removing the requirement of having or needing, age, time, or experience to fill in the gaps between proven and unknown knowledge and wisdom. It essentially allows users to find out what they know about what they know, what they know about they do not, and almost anything that is possible to know.
  • This invention employs a three dimensional computerized methodology for discovering knowledge that utilizes 3D interfaces, tools and devices. It uses multi-level balanced-logic tools including but not limited to semantic and, scientific methodologies to deliver context to the user.
  • the classification system shown in Figure 2 makes possible the next generation, which brings together technology, devices, tools, utilities, interfaces, users.
  • a form of multi-value synergistic balanced logic had been developed as a methodology for tools that provide Autonomous Automation (AA), not just Al (artificial intelligence) or IA (information architecture). Interaction between various components of the computer system
  • Figure 1 generally shows how a computer system can be configured to adopt a number of different features and benefits of the invention.
  • Users initiate contact with a computer system of the invention by way of a portal over a shared computer network.
  • the user interface shown is adapted to receive user information over the internet.
  • Users may sign on to the system in two ways: anonymously, or by way of authentication.
  • anonymous users can be charged a modest fee (such as $1 ) to gain access.
  • authenticated users also have access to certain services and levels of service that are not ordinarily made available to anonymous users.
  • Authentication allows the user not just to avoid the sign-on fee, but also share in a portion of the proceeds. Authentication can be done by using a standard piece of identification, such as a credit card, which can verify the user's name and contact information through the service provider. Alternatively, for users who do not have or do not wish to use a credit card, authentication can take place by way of an authorized agent: for example, a licensed lawyer or accountant; or someone working at a government facility such as the post office. Once the user's identity is confirmed by the agent, the agent provides the user with an access code, and communicates the linkage between the approved user and the code to the system administrator to allow programmed access.
  • a standard piece of identification such as a credit card
  • connection of the user to the interface may occur through a Virtual Private
  • VPN encapsulates data transfers between the user and the interface so as to keep the transferred data private from other devices, particularly third-party programs that track internet traffic without regard to personal privacy.
  • Anonymous and authenticated users have access through the user interface to a search engine.
  • the search engine uses the Balanced Logic as described above.
  • This invention provides an improved process by which the computer network to which it is attached (exemplified by the world wide web) may identify information that is particularly desired by each user. This process involves organizing what is available over the network and whatever other knowledge bases to which the search engine has access into one or more categories of a subject classification system.
  • the classification system organizes information or access points before the search is made into different subject categories according to a classification hierarchy.
  • the system parses the topic into one or more key words and one or more subject classifications.
  • Information available to the computer network is searched according to one or more classification(s), optionally in combination with one or more key word(s) according to the Balanced Logic described above.
  • Information that contains desired key words and matches desired classifications are identified and ranked according to an appropriate hierarchy.
  • Context of the search results can be displayed by way of a three-dimensional or multidimensional format, allowing the user to visualize the results of the search in their proper context.
  • the display can show the search result in a branched hierarchical structure in which similar subjects are presented nearby each other, regardless what branches of the hierarchy they have emerged from. Hyperlinks are provided by which the user may proceed to the site actually providing the information or interface that they are seeking, in order to retrieve the desired documents and information.
  • Access to the selected websites from the interface may be configured so that they guarded by a website grading system.
  • a suitable service of this kind is available through the trade name Web of Trust.
  • the grading system shows the user which websites can be trusted for safe surfing, shopping and searching on the web, based on other users' experiences and carefully chosen trusted sources. Multiple rating components of a website's reputation are shown, such as trustworthiness, vendor reliability, privacy and child safety, as assessed by critical analysis or the general consensus of traffic to the site.
  • the system can be configured to monitor access to various websites through the search engine, and traffic between various websites by single users.
  • the system is primarily designed so that such usage and traffic between sites is done anonymously, such that there is no residual trace of the activity of an identifiable user.
  • the generic or anonymous usage and traffic information is nonetheless useful to retail vendors, service providers, and advertisers to optimize the tailoring of their goods and services, and presentation over the internet.
  • the data is made available to advertisers for a fee, which in turn can go towards supporting the system, and potentially shared with users who have provided identifying information by which their dividend may be provided.
  • a Democracy ChannelTM This is a specialized internet gathering site through which large numbers of computer users may come together to generate statistical trends, and possibly to share viewpoints and effect societal change.
  • Google Inc. (Mountainview CA) runs what is currently the world's most frequently used search engine. The system employs robotic servers to constantly crawl the web, following links on page after page and downloading the results. Google employs a suite of proprietary technologies to deliver search results to the end user. These include its Page/Rank Algorithm for ranking results, and the Google File System (GFS) and Map Reduce to support the distributed computing system. This permits fast results for thousands of simultaneous users.
  • GFS Google File System
  • FIG. 2(A) to 2 (G) show the classification system used in a preferred embodiment of the invention. Areas of knowledge are ranked in a branching hierarchy from sixteen main categories. Proximity of different categories in this depiction shows relatedness of topics, even if they have branched out of different general categories. When search results are returned to someone using this invention, they can navigate along the branches of the classification system and survey related topics across multiple branches.
  • the advantage of a subject-based classification search is the ability to understand context. In a library, for example, one can see the books located on either side of the title desired.
  • the search engine provided by this invention combines the best of both language and classification based search. It can organize all human knowledge by category and language. It is both hierarchical and associative in its nature.
  • the search engine can be programmed as a representation of search results providing all pathways to the desired result. The user is thus able to see layers of relevant search results by classification and context.
  • the user chooses his or her path unencumbered by advertising, thereby delivering the most relevant results.
  • the invention allows the user to quickly Visualize Everything then Zoom in (VEZTM). Once a query is made, a user can follow a stream without losing the overall picture or structure of the search. Like a hologram, it is a multidimensional tool permitting both breadth and depth of search.
  • the invention lends itself to search by gesture.
  • a user could, for example, use a Wii® or KinectTM gaming platform as a way of interacting with and powering the search engine of the invention.
  • the search engine can also provide meaningful results to mobile search queries by voice. It contextualizes searches and data management using a methodology that allows users to search all known human knowledge with a pinpoint accuracy.
  • Security and privacy of the system can is provided by one or more of the following components.
  • Front end user verification (known as Actual User Verification, which facilitates the privacy blanket) is done by an independent third party, which is selected by the user.
  • the user may be verified by providing a credit card.
  • they want to remain private they can get authenticated by registering with a lawyer, accountant or a post office. Then that data (without their name) is given to the system operator so that they can use the services provided by the system and participate in the cooperative revenue model, while maintaining their anonymity.
  • the search engine of the invention can be configured to use an interface that filters the search query (user question) through the terms and categories of the knowledge compass, as a gateway.
  • a secure and private connection between the consumer and whatever on-line content that they seek can be provided by way of a Virtual Private Network for each subscriber.
  • the VPN encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks.
  • Secure VPN protocols include the following: IPsec (Internet Protocol Security), Transport Layer Security (SSL/TLS), Datagram Transport Layer Security (DTLS), Microsoft Point-to-Point Encryption (MPPE), Secure Socket Tunneling Protocol (SSTP), MPVPN (Multi Path Virtual Private Network, by Ragula Systems Development Company), and Secure Shell (SSH) VPN.
  • IPsec Internet Protocol Security
  • SSL/TLS Transport Layer Security
  • DTLS Datagram Transport Layer Security
  • MPPE Point-to-Point Encryption
  • MPPE Secure Socket Tunneling Protocol
  • SSTP Secure Socket Tunneling Protocol
  • MPVPN Multi Path Virtual Private Network, by Ragula Systems Development Company
  • SSH Secure Shell
  • Open SSH offers VPN tunneling to secure remote connections to a network or inter-network links.
  • Authentication Tunnel endpoints must authenticate before secure VPN tunnels are established.
  • Remote access VPNs may use passwords, biometrics, two-factor authentication or other cryptographic methods.
  • tunnels can use passwords or digital certificates, permanently
  • Website "content” verification or ratings classification can be done by a plug-in such as the "Web of Trust” (available at the URL www.mywot.com).
  • the WOT add-on shows the user which websites can be trusted for safe surfing, shopping and searching on the web, based on other users' experiences and carefully chosen trusted sources. By clicking the WOT icon visible in the browser's toolbar, the user may see the reputation of the website currently being viewed.
  • each website has a scorecard page in WOT where the user can access detailed rating information about the site. On the scorecard, four rating components of a website's reputation are shown: Trustworthiness, Vendor Reliability, Privacy and Child Safety.
  • the reputation ratings are shown in colored WOT icons and also in numeric values. The graphic of small figures after each rating component shows the user how reliable the system considers the current rating. The scorecard also provides comments that other users have written.
  • Another component provided by this invention is a Personal Organizer that enables the system to become a true personal assistant.
  • the user custom tailors it to their life with information more traditionally stored in diaries, adult day books, job sheet, calendars, planners, contact relationships, nick names, personal connections, financial memory bank parameters, and so on. Because the information is secure, the Organizer is like a safety deposit for personal data.
  • the term Americans Channel is a trade-mark for the sponsorship, promotion of others by dissemination of printed literature and information in the field of politics, and the production of television programming.
  • a channel of this nature can be adapted to flow out of using the knowledge tools of this invention, registering and using the organizer functions simultaneously. It can be configured to allow communication of millions of people simultaneously based of political subject activity or function.
  • the Democracy ChannelTM could be joined as a reporter so as to try and be covered by the umbrella of freedom of the press. It can also constitute a world non-partisan political action committee.
  • This invention can be configured to make money through monthly subscriptions and a small fee on each transaction executed through its network. In addition, it can provide polling services to third parties. For $1.00 per month subscription fee, the system can provide a highly secure system for the user to interact with institutions, companies and individuals on the internet.
  • this invention can provide the same level of security to users and return 50% of the net revenues to subscribers, thereby creating the worlds largest collective co-operative.
  • the Knowledge Compass can be configured to sell user information - not name or address - to advertisers. With permission, users can be polled.
  • the system can be configured in a business model in which there is sharing of revenue with the users. The more people use the system, the more advertizing, polling and other revenue can be shared among users.
  • the system can be configured to provide users with discounts on goods and services as their numbers increase.
  • Result was 132,000 sites (reduced the results by about 150 times, or to 0.0067% or to about 2/3 of 0.01 %).
  • Search 4 "Blue moon” using exact scientific term “selenology”.
  • Result was 2,470 sites (reduced the results by about 10,000 times, or 0.0001 % or to about 1/10,000).
  • This invention may deliver all the nine search results shown above and every other combination possible at the same time, instantly.

Abstract

This invention provides a unique approach to the challenges of internet search and privacy. It delivers a rich online experience by providing users a powerful search tool. The network searching capability is constructed with Balanced Logic. Relevant results are obtained by a combination of keyword, classification, and context-based searching. The invention also provides a secure and private connection between the consumer and on-line content, allowing the user to maintain complete control over their information.

Description

AN INTERNET SEARCH AND SECURITY SYSTEM
THAT USES BALANCED LOGIC
TECHNICAL FIELD
This invention is in the field of computer-based searching and security protocols for interactions over the world wide web.
BACKGROUND
The explosive growth of data across a global digital infrastructure that we all rely on is well documented. We live, work and play in cyberspace. An over abundance of data, however, means that information requested is often difficult to find quickly. At the same time, the incidence of individual, corporate and government digital records being compromised is rising.
According to The Economist, the amount of data produced now exceeds our capability to process it. Content creators are using popular search engines like Google against itself thereby returning disappointing search results. Poor search results are increasingly driving people from free search to paid subscription search services.
Data security is also an important issue, as rapidly expanding networks are difficult to monitor and manage. More than 1 1.1 million adults in the U.S. were victims of identity theft and fraud in 2009. This 12 percent surge in new identity theft incidents translated into a loss of more than $54 billion by consumers and businesses, a figure that security experts predict will only increase this year and through the rest of the decade. According to Statistics Canada, 80% of Canadians are concerned about internet security. People are re-examining the value of the social web and the implicit trade-off of privacy vs. easy interaction. There is a need for an authentication service without information disclosure. The U.S. government's internet user ID system is not the answer, as information will not be private.
The nature of technology before the making of this invention is described generally in the following texts: How the Internet Works (8th Edition), by Preston Gralla (Published by Que, 2006), Information Retrieval: Implementing and Evaluating Search Engines, by Stefan Buttcher (The MIT Press, 2010); Practical Internet Security, by John R. Vacca (Springer Press, 2010). See also "Rethinking the Internet with security and mobility in mind", by Larry Greenemeier, Scientific American, August 31 , 2010.
The invention described below provides a unique business opportunity that will satisfy not only the need for seeking relevant information quickly but the need for security as well. DRAWINGS
Figure 1 is a schematic diagram of a computer system according to the invention, comprising a hierarchical classification-based search engine, shielded access, and an assurance of security for individual who use the internet through the interface programmed according to this invention.
Figure 2 shows a preferred classification system for a subject classification based search of the internet search engine of this invention. Figure 2(A) shows the top left branches; Figure 2(B) shows the upper middle left branches; Figure 2(C) shows the lower middle left branches; Figure 2(D) shows the bottom left branches; Figure 2(E) shows the top right branches; Figure 2(F) shows the middle right branches; Figure 2(G) shows the bottom right branches.
DETAILED DESCRIPTION
This invention provides a unique approach to the challenges of internet search and privacy. It delivers a rich online experience by providing users a powerful search tool that returns more relevant search results than what is currently available. A new form of multi-value synergistic balanced logic is implemented as a methodology for tools that provide Autonomous Automation (AA).
In addition, the invention provides a secure and private connection between the consumer and whatever on-line content that they seek to engage with, by way of a Virtual Private Network (VPN) for each subscriber. With all the security features that can be worked into the system, the user can maintain complete control over their information. This invention also provides a pre-loaded personal organizer that permits almost endless customization by the user.
Search Logic
A methodology upon which the searching capabilities of this invention may be constructed is referred to in this disclosure as "Balanced-Unified-Symbiotic-Logic", or "Balanced Logic". This is a series of tools and applications that constitute a new "unified field theory" concept for logic. It allows humans and computers to yield and utilize knowledge, using all the definitions and values of logic together and simultaneously. This brings about a human and bionic computer interface for knowledge automation.
The logic methodology is not solely based on mathematical valued logic. It also uses multivalued logic, the classification system shown in Figure 2, and the "Tree of Knowledge" concept for combining the practices and theories of psychology, and other logic, ideas, innovation, systems, methods and concepts, to create a truly new form of fuzzy logic. It includes many other new and modified ways of interfacing thought and technology to allow the creation of a truly global collective community. The Tree of Knowledge System provides: "a new unified theory of knowledge that maps the pieces of the scientific puzzle in a novel way that connects Quantum Mechanics to Sociological processes and everything in between into a coherent whole. The most novel aspect of the Tree of Knowledge is its visuo-spatial depiction of knowledge as consisting of four dimensions of complexity (Matter, Life, Mind, and Culture) that correspond to the behavior of four classes of objects (material objects, organisms, animals, and humans), and four classes of science (physical, biological, psychological, and social)."
[quoted from the Tree of Knowledge System website, http://psychweb.cisat.jmu.edu/ToKSystem, sourced January 24, 201 1.] See Henriques, G.R., "The tree of knowledge system and the theoretical unification of psychology." Review of General Psychology, 7, 150-182 (2003). See also J Clin Psychol. 61 : 121 -39 (2005); J Clin Psychol. 60: 1207-21 (2004); Journal of Clinical Psychology, 60, 1051-1063 (2004).
For almost a thousand years, humankind has been using knowledge in a much less efficient and effective way. Focusing and using primarily mathematics based logic, instead of Knowledge based has slowed the use and restricted the development and evolution and of knowledge, "knowledge of knowledge" technology reveals unproven and unknown knowledge. It turns all facts and beliefs into knowledge more rapidly. It can be used as an engine to expand and accelerate its development and application.
Until recently, there have been two and three-valued logic interfaces and applications tools and utilities (fuzzy, pro-logic in music, MPEG), but not based on "three or more valued logic", multi-logic or infinite-logic. In fact, things have been done in a much less efficient and effective way, by using mathematics, instead of Knowledge, which should have been used with category, definition, and "context", the most sought after and difficult of all logic values.
There is a fairly new mathematical logic based methodology called TRIZ (Teoriya Resheniya Izobretatelskikh Zadatch), a "problem-solving, analysis and forecasting tool derived from the study of patterns of invention in the global patent literature." Hua, Z. et al, International Journal of Business Innovation and Research V. 111-128 (2006). The theory includes a practical methodology, tool sets, a knowledge base, and model-based technology for generating new ideas and solutions for problem solving. It is intended for application in problem formulation, system analysis, failure analysis, and patterns of system evolution. TRIZ has been the development of an algorithmic approach to the invention of new systems, and the refinement of existing ones.
TRIZ is mathematically based, however, and fails the utility test based context requirement that is necessary for mathematically based logic, fuzzy logic, or multi-logic. It does not really incorporate most other logic values, definitions, instruments, objects, tool sets, and items, etc. because it does not use category, definition, and other four or more valued logic, and "context", the most sought after and difficult of all logic values, and other logic values, definitions, instruments, objects, tool sets, and items. Rather than using traditional mathematically based logic and computer programming sciences, the new logic system of this invention, referred to herein as VEZ logic (Visualize Everything Zoom in) uses a new symbiotic matrix map and organizing approach to informal logic, formal logic, symbolic logic, and a new definitions of logic.
The use of category, definition, and context logic values, the most sought after and difficult of all logic values, and other logic values, definitions, instruments, objects, tool sets, and items, etc. to develop concepts and technology resulted in the creation of the new form of logic, its development , use and scientific verification. Using a human or computer algorithmic approach to understand all the branches of logic will allow us to achieve infinite or indefinite-synergistic-natural-balanced-perpetual and perceptual-logic, for understanding and utilizing all knowledge. By combining and/or using the new logic and methodology with, tools like as the classification system shown in Figure 2 (the HWY 101 Knowledge Map, described in the sections that follow), and/or our new organizing, filing, management, search, retrieval and use of data and knowledge technologies, methodologies, applications, utilities, products, tools, and devices. This has resulted in the creation of a great number of new human and machine computer technologies and applications that will allows most of us humans to realize almost all of it, almost immediately after it is launched.
As soon as mankind (or computers, devices, and other tools) are able to access the technology, applications, products, tools, and devices needed to learn, access or use and understand the knowledge already contained in the digitized information, using the Internet or other data and electronic interfaces (most of the knowledge), there will be instantaneous superhuman and computer based knowledge, interaction and communication.
The new methodologies and tools provided in this invention will basically allow everyone to obtain wisdom instantly, eliminating or removing the requirement of having or needing, age, time, or experience to fill in the gaps between proven and unknown knowledge and wisdom. It essentially allows users to find out what they know about what they know, what they know about they do not, and almost anything that is possible to know.
This invention employs a three dimensional computerized methodology for discovering knowledge that utilizes 3D interfaces, tools and devices. It uses multi-level balanced-logic tools including but not limited to semantic and, scientific methodologies to deliver context to the user. The classification system shown in Figure 2 makes possible the next generation, which brings together technology, devices, tools, utilities, interfaces, users. A form of multi-value synergistic balanced logic had been developed as a methodology for tools that provide Autonomous Automation (AA), not just Al (artificial intelligence) or IA (information architecture). Interaction between various components of the computer system
Various embodiments of the invention comprise specialized components described in the sections that follow, either alone or working together in combination.
Figure 1 generally shows how a computer system can be configured to adopt a number of different features and benefits of the invention.
Users initiate contact with a computer system of the invention by way of a portal over a shared computer network. The user interface shown is adapted to receive user information over the internet. Users may sign on to the system in two ways: anonymously, or by way of authentication. As an incentive to be authenticated, anonymous users can be charged a modest fee (such as $1 ) to gain access. In some embodiments of the invention, authenticated users also have access to certain services and levels of service that are not ordinarily made available to anonymous users.
Authentication allows the user not just to avoid the sign-on fee, but also share in a portion of the proceeds. Authentication can be done by using a standard piece of identification, such as a credit card, which can verify the user's name and contact information through the service provider. Alternatively, for users who do not have or do not wish to use a credit card, authentication can take place by way of an authorized agent: for example, a licensed lawyer or accountant; or someone working at a government facility such as the post office. Once the user's identity is confirmed by the agent, the agent provides the user with an access code, and communicates the linkage between the approved user and the code to the system administrator to allow programmed access.
Once approved, connection of the user to the interface may occur through a Virtual Private
Network for each subscriber, according to any suitable secure tunneling protocol. VPN encapsulates data transfers between the user and the interface so as to keep the transferred data private from other devices, particularly third-party programs that track internet traffic without regard to personal privacy.
Anonymous and authenticated users have access through the user interface to a search engine. In a preferred embodiment, the search engine uses the Balanced Logic as described above. This invention provides an improved process by which the computer network to which it is attached (exemplified by the world wide web) may identify information that is particularly desired by each user. This process involves organizing what is available over the network and whatever other knowledge bases to which the search engine has access into one or more categories of a subject classification system. The classification system organizes information or access points before the search is made into different subject categories according to a classification hierarchy.
When the user communicates to the system a topic they wish to search, the system parses the topic into one or more key words and one or more subject classifications. Information available to the computer network is searched according to one or more classification(s), optionally in combination with one or more key word(s) according to the Balanced Logic described above. Information that contains desired key words and matches desired classifications are identified and ranked according to an appropriate hierarchy. Context of the search results can be displayed by way of a three-dimensional or multidimensional format, allowing the user to visualize the results of the search in their proper context. In particular, the display can show the search result in a branched hierarchical structure in which similar subjects are presented nearby each other, regardless what branches of the hierarchy they have emerged from. Hyperlinks are provided by which the user may proceed to the site actually providing the information or interface that they are seeking, in order to retrieve the desired documents and information.
Access to the selected websites from the interface may be configured so that they guarded by a website grading system. A suitable service of this kind is available through the trade name Web of Trust. The grading system shows the user which websites can be trusted for safe surfing, shopping and searching on the web, based on other users' experiences and carefully chosen trusted sources. Multiple rating components of a website's reputation are shown, such as trustworthiness, vendor reliability, privacy and child safety, as assessed by critical analysis or the general consensus of traffic to the site.
The system can be configured to monitor access to various websites through the search engine, and traffic between various websites by single users. The system is primarily designed so that such usage and traffic between sites is done anonymously, such that there is no residual trace of the activity of an identifiable user. The generic or anonymous usage and traffic information is nonetheless useful to retail vendors, service providers, and advertisers to optimize the tailoring of their goods and services, and presentation over the internet. The data is made available to advertisers for a fee, which in turn can go towards supporting the system, and potentially shared with users who have provided identifying information by which their dividend may be provided.
Users travelling through various websites may also be given the option of reporting presence to a common communal site, referred to in this disclosure as a Democracy Channel™. This is a specialized internet gathering site through which large numbers of computer users may come together to generate statistical trends, and possibly to share viewpoints and effect societal change.
Combined language and classification based internet search
Google Inc. (Mountainview CA) runs what is currently the world's most frequently used search engine. The system employs robotic servers to constantly crawl the web, following links on page after page and downloading the results. Google employs a suite of proprietary technologies to deliver search results to the end user. These include its Page/Rank Algorithm for ranking results, and the Google File System (GFS) and Map Reduce to support the distributed computing system. This permits fast results for thousands of simultaneous users.
One component of the invention described here is a searching service that assists the user with results that are potentially more relevant to what they are seeking. Search results are generated and ranked on a combination of language and classification based criteria. Figures 2(A) to 2 (G) show the classification system used in a preferred embodiment of the invention. Areas of knowledge are ranked in a branching hierarchy from sixteen main categories. Proximity of different categories in this depiction shows relatedness of topics, even if they have branched out of different general categories. When search results are returned to someone using this invention, they can navigate along the branches of the classification system and survey related topics across multiple branches.
The advantage of a subject-based classification search is the ability to understand context. In a library, for example, one can see the books located on either side of the title desired.
The search engine provided by this invention combines the best of both language and classification based search. It can organize all human knowledge by category and language. It is both hierarchical and associative in its nature. The search engine can be programmed as a representation of search results providing all pathways to the desired result. The user is thus able to see layers of relevant search results by classification and context.
The user chooses his or her path unencumbered by advertising, thereby delivering the most relevant results. The invention allows the user to quickly Visualize Everything then Zoom in (VEZ™). Once a query is made, a user can follow a stream without losing the overall picture or structure of the search. Like a hologram, it is a multidimensional tool permitting both breadth and depth of search.
The invention lends itself to search by gesture. A user could, for example, use a Wii® or Kinect™ gaming platform as a way of interacting with and powering the search engine of the invention. The search engine can also provide meaningful results to mobile search queries by voice. It contextualizes searches and data management using a methodology that allows users to search all known human knowledge with a pinpoint accuracy.
Security
Security and privacy of the system can is provided by one or more of the following components.
Front end user verification (known as Actual User Verification, which facilitates the privacy blanket) is done by an independent third party, which is selected by the user. The user may be verified by providing a credit card. Alternatively, if they want to remain private, they can get authenticated by registering with a lawyer, accountant or a post office. Then that data (without their name) is given to the system operator so that they can use the services provided by the system and participate in the cooperative revenue model, while maintaining their anonymity.
The search engine of the invention can be configured to use an interface that filters the search query (user question) through the terms and categories of the knowledge compass, as a gateway. A secure and private connection between the consumer and whatever on-line content that they seek can be provided by way of a Virtual Private Network for each subscriber. The VPN encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks.
Secure VPN protocols include the following: IPsec (Internet Protocol Security), Transport Layer Security (SSL/TLS), Datagram Transport Layer Security (DTLS), Microsoft Point-to-Point Encryption (MPPE), Secure Socket Tunneling Protocol (SSTP), MPVPN (Multi Path Virtual Private Network, by Ragula Systems Development Company), and Secure Shell (SSH) VPN. Open SSH offers VPN tunneling to secure remote connections to a network or inter-network links. Authentication Tunnel endpoints must authenticate before secure VPN tunnels are established. Remote access VPNs may use passwords, biometrics, two-factor authentication or other cryptographic methods. Alternatively, tunnels can use passwords or digital certificates, permanently storing the key to allow the tunnel to establish automatically and without intervention by the user on each occasion.
Website "content" verification or ratings classification can be done by a plug-in such as the "Web of Trust" (available at the URL www.mywot.com). The WOT add-on shows the user which websites can be trusted for safe surfing, shopping and searching on the web, based on other users' experiences and carefully chosen trusted sources. By clicking the WOT icon visible in the browser's toolbar, the user may see the reputation of the website currently being viewed. Furthermore, each website has a scorecard page in WOT where the user can access detailed rating information about the site. On the scorecard, four rating components of a website's reputation are shown: Trustworthiness, Vendor Reliability, Privacy and Child Safety. The reputation ratings are shown in colored WOT icons and also in numeric values. The graphic of small figures after each rating component shows the user how reliable the system considers the current rating. The scorecard also provides comments that other users have written.
Everything is decided by the user, how and where to register, how much information is provided to and through the system, how much privacy they want, and what tools, and the services and level of involvement they want.
Personal Organizer
Another component provided by this invention is a Personal Organizer that enables the system to become a true personal assistant. The user custom tailors it to their life with information more traditionally stored in diaries, adult day books, job sheet, calendars, planners, contact relationships, nick names, personal connections, financial memory bank parameters, and so on. Because the information is secure, the Organizer is like a safety deposit for personal data.
Democracy Channel™
The term Democracy Channel is a trade-mark for the sponsorship, promotion of others by dissemination of printed literature and information in the field of politics, and the production of television programming. A channel of this nature can be adapted to flow out of using the knowledge tools of this invention, registering and using the organizer functions simultaneously. It can be configured to allow communication of millions of people simultaneously based of political subject activity or function.
The Democracy Channel™ could be joined as a reporter so as to try and be covered by the umbrella of freedom of the press. It can also constitute a world non-partisan political action committee. Some of the concepts that can be used with this aspect of the invention are described further in the book Democracy, Eh?: A Guide to Voter Action, by John Deverell and Greg Vezina (Studio 9 Books, 2011 ). The book outlines and proposes reforms including "Fair Voting", "Citizen Lawmaking", "Open Democratic Government", and most importantly "Teledemocracy: Opening the Channels". The closing Chapter and Appendices show readers how to organize to bring about changes they seek and include political party constitutions, candidate and delegate selections forms and other related activists' tools. For all purposes related to description of the invention, patent prosecution, patent interpretation, and patent enforcement in the United States, the afore-listed book is hereby incorporated into this patent disclosure in its entirety. Revenue model
This invention can be configured to make money through monthly subscriptions and a small fee on each transaction executed through its network. In addition, it can provide polling services to third parties. For $1.00 per month subscription fee, the system can provide a highly secure system for the user to interact with institutions, companies and individuals on the internet.
For permission to sell user-defined information to third parties (while protecting the user identity), this invention can provide the same level of security to users and return 50% of the net revenues to subscribers, thereby creating the worlds largest collective co-operative.
Users have full and complete control of their personal information. They can be authenticated by credit card, lawyer, accountant, or Canada Post. Upon receiving permission from the user, the Knowledge Compass can be configured to sell user information - not name or address - to advertisers. With permission, users can be polled. The system can be configured in a business model in which there is sharing of revenue with the users. The more people use the system, the more advertizing, polling and other revenue can be shared among users.
In addition to a return of revenue, the system can be configured to provide users with discounts on goods and services as their numbers increase. Illustrative Example
A working prototype of this invention is being developed under the trademark "Knowledge Compass". In preliminary tests, a classification scheme was used based on 16 main branches of knowledge. These are the main classification categories used in the classification system shown in Figure 2.
• Psychology (Mind and reason for behavior)
• Business and Technology (applied sciences to industry
• Neurology (nerves)
· Philosophy (principles and concepts of knowledge)
• Political Science (government)
• Literature (writings)
• Linguistics (language)
• Physiology (life's processes)
· Sociology (society)
• Anthropology (humans)
• Medicine (treatments)
• Pathology (origin, nature of disease)
• Zoology (animals)
· Biology (life)
• Chemistry (atoms and molecules)
• Geology (earth)
• Physics (matter)
• Astronomy (universe)
To test the effectiveness of subject area based searching, nine comparative searches of the internet were conducted.
• Search 1 : "Blue moon" only. Result was 19,700,000 sites (20 million).
· Search 2: "Blue moon" adding universal linguistic general term "study of moon". Result was 1 ,010,000 sites (1 million) (reduced the results by about 20 times, or to 5% or about 1/2 of 1 %).
• Search 3: "Blue moon" using the general 16 Main Branches of knowledge and definitions.
Result was 132,000 sites (reduced the results by about 150 times, or to 0.0067% or to about 2/3 of 0.01 %). • Search 4: "Blue moon" using exact scientific term "selenology". Result was 2,470 sites (reduced the results by about 10,000 times, or 0.0001 % or to about 1/10,000).
• Search 5: "Blue moon" using (2 separate) universal linguistic general and scientific terms ("study of and "moon" and "selenology"). Result was 843 sites (reduced the results by about 25,000 times, or 0.0000428% or to about 4/100,000).
• Search 6: "Blue moon" (using "blue moon" in quotes) and universal linguistic general and scientific terms "study of and "moon" and "selenology" without quotes). Result was 415 sites (reduced the results by about 50,000 times, or 0.000021 % or to about 2/100,000).
• Search 7: "Blue moon" (using "blue moon" in quotes) and universal linguistic general and scientific terms "study of and "moon" without quotes and "selenology" with quotes). Result was 128 sites (reduced the results by about 150,000 times, or 0.000006% or to about 1/200,000).
• Search 8: "Blue moon" using universal linguistic general and scientific (singular) terms "study of moon" and "selenology" in quotes). Result was 40 sites (reduced the results by 500,000 times, or 0.0000002% or to about 2/1 ,000,000).
• Search 9: "Blue moon" (using "blue moon" in quotes) and universal linguistic general and scientific terms "study of and "moon" and "selenology" with quotes). Result was 2 sites (reduced the results by 10 million times or 0.00000001 % or to about 1/10,000,000). The number of websites returned went from almost 20 million websites to 400 (general) to only 2 (very specific) websites. The 2 to 400 final results are exactly on topic and on point, and contain only the results sought.
This invention may deliver all the nine search results shown above and every other combination possible at the same time, instantly.
For all purposes related to description of the invention, patent prosecution, patent interpretation, and patent enforcement in the United States, the following book and articles are hereby incorporated into this patent disclosure in its entirety. Democracy, Eh?: A Guide to Voter Action, by John Deverell and Greg Vezina (Studio 9 Books, 201 1 ); and the four articles referred to above that are authored or co- authored by Henriques, G.R.
The examples and illustrations referred to in this disclosure are provided for the benefit of the reader, and are not intended to limit the implementation or practice of the invention except where explicitly referred to or otherwise required in the claims that follow. The devices and methods of this invention can be effectively refined or modified by routine optimization without departing from the spirit of the invention embodied in the claims.

Claims

CLAIMS The invention claimed is:
1. An autonomous method of searching a computer network for a document or information resource that can be accessed through a web browser and displayed on a monitor or mobile device, comprising:
a) obtaining a topic to be searched for a user;
b) parsing the topic into one or more key words and one or more subject classifications; c) searching information available over the computer network according to said key word(s);
d) searching information available over the computer network according to said subject classification(s);
e) identifying information that contains at least one of said key words and matches at least one of said classifications;
f) establishing a hierarchy of the information identified in step e) according to how many of said key words it contains and how many of said categories it matches; and
g) providing a display of hyperlinks for the user to access information according to the hierarchy established in step f)
2. The method of claim 1 , wherein the computer network is the World Wide Web.
3. The method of claim 1 , wherein the information available over the network is searched in steps c) and d) using images or summaries of said information.
4. The method of claim 1 , wherein the display of hyperlinks provided to the user is provided on the display as a three-dimensional image.
5. The method of claim 1 , wherein information on the network is classified according to the classification system shown in Figure 2 of this disclosure.
6. A computer system comprising:
a) a microprocessor configured to search a computer network according to claim 1 ;
b) a user input portal by which the microprocessor may receive a topic to be searched for a user;
c) a network input portal by which the microprocessor may access information on the network;
d) an output portal by which the microprocessor may display hyperlinks for the user to access information on the network.
7. The computer system of claim 6, wherein the user input portal requires authentication of the user by credit card or by an approved authority.
8. The computer system of claim 6, which further provides a ranking of information sites according to trustworthiness, vendor reliability, privacy and child safety.
9. The computer system of claim 6, which collects data pertaining to usage of sites or information on the network, and traffic of users between sites or information, whereby said data cannot be traced to the identity of individual users.
10. The computer system of claim 9, wherein the usage and trafficking information is provided to commercial consumers for a fee.
1 1. The computer system of claim 10, wherein users who are subscribers to the system share in fees collected from the commercial consumers.
12. The computer system of claim 6, which interacts with users by way of a virtual private network (VPN).
13. A microprocessor programmed for searching a computer network for a document or information resource that can be accessed through a web browser and displayed on a monitor or mobile device, according to the method of claim 1.
14. A computer memory or computer-readable medium in which is recorded instructions for searching a computer network for a document or information resource that can be accessed through a web browser and displayed on a monitor or mobile device, according to the method of claim 1.
15. A computer network comprising the computer system of claim 6, and a plurality of user portals adapted for searching the computer network for information using the programmed microprocessor.
16. A personal organizer adapted to access the computer system of claim 6.
17. A method by which a human user may search a computer network for a document or information resource that can be accessed through a web browser and displayed on a monitor or mobile device, comprising:
(a) providing a topic to be searched to a computer system according to claim 6;
(b) observing the display of hyperlinks organized according to the hierarchy established by the computer system;
(c) selecting one or more hyperlinks to sites having such document(s) and/or information based on context of the selected hyperlinks in the display; and
(d) navigating to said one or more sites.
18. The method of claim 17, further comprising retrieving document(s) and/or information from one or more of the selected sites.
19. A computer system or method that allows a user to conduct a hierarchical network-based search, as hereintofore described.
20. A computer system or method that allows a user to anonymously browse a computer network and obtain information, as hereintofore described.
PCT/CA2012/000069 2011-01-25 2012-01-24 An internet search and security system that uses balanced logic WO2012100331A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161435809P 2011-01-25 2011-01-25
US61/435,809 2011-01-25

Publications (1)

Publication Number Publication Date
WO2012100331A1 true WO2012100331A1 (en) 2012-08-02

Family

ID=46580146

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2012/000069 WO2012100331A1 (en) 2011-01-25 2012-01-24 An internet search and security system that uses balanced logic

Country Status (1)

Country Link
WO (1) WO2012100331A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017145038A1 (en) * 2016-02-22 2017-08-31 Tata Consultancy Services Limited Systems and methods for computing data privacy-utility tradeoff

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6728702B1 (en) * 2001-06-18 2004-04-27 Siebel Systems, Inc. System and method to implement an integrated search center supporting a full-text search and query on a database
US20060195432A1 (en) * 1995-12-14 2006-08-31 Graphon Corporation Method for searching entries in an on-line database
WO2007045671A1 (en) * 2005-10-18 2007-04-26 Swisscube Limited Method and system for unified search using categories and keywords
CA2634918A1 (en) * 2005-12-22 2007-07-05 Lucidmedia Networks, Inc. Analyzing content to determine context and serving relevant content based on the context
US7756864B2 (en) * 2002-01-03 2010-07-13 Microsoft Corporation System and method for performing a search and a browse on a query
US7840548B2 (en) * 2007-12-27 2010-11-23 Yahoo! Inc. System and method for adding identity to web rank
US7856441B1 (en) * 2005-01-10 2010-12-21 Yahoo! Inc. Search systems and methods using enhanced contextual queries

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060195432A1 (en) * 1995-12-14 2006-08-31 Graphon Corporation Method for searching entries in an on-line database
US6728702B1 (en) * 2001-06-18 2004-04-27 Siebel Systems, Inc. System and method to implement an integrated search center supporting a full-text search and query on a database
US7756864B2 (en) * 2002-01-03 2010-07-13 Microsoft Corporation System and method for performing a search and a browse on a query
US7856441B1 (en) * 2005-01-10 2010-12-21 Yahoo! Inc. Search systems and methods using enhanced contextual queries
WO2007045671A1 (en) * 2005-10-18 2007-04-26 Swisscube Limited Method and system for unified search using categories and keywords
CA2634918A1 (en) * 2005-12-22 2007-07-05 Lucidmedia Networks, Inc. Analyzing content to determine context and serving relevant content based on the context
US7840548B2 (en) * 2007-12-27 2010-11-23 Yahoo! Inc. System and method for adding identity to web rank

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017145038A1 (en) * 2016-02-22 2017-08-31 Tata Consultancy Services Limited Systems and methods for computing data privacy-utility tradeoff
US11182502B2 (en) 2016-02-22 2021-11-23 Tata Consultancy Services Limited Systems and methods for computing data privacy-utility tradeoff

Similar Documents

Publication Publication Date Title
Yu et al. Knowledge diffusion paths of blockchain domain: the main path analysis
Benjamin et al. Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
Liu et al. A privacy-preserving framework for trust-oriented point-of-interest recommendation
Li et al. Visual topical analysis of library and information science
Trinh et al. An effective content-based event recommendation model
Karampelas Techniques and tools for designing an online social network platform
Spagnoletti et al. Online black-markets: An investigation of a digital infrastructure in the dark
Hailu et al. The use of academic social networking sites in scholarly communication: Scoping review
Collier et al. Privacy worlds: Exploring values and design in the development of the Tor anonymity network
Casillo et al. Recommender system for digital storytelling: A novel approach to enhance cultural heritage
Puglisi et al. On web user tracking of browsing patterns for personalised advertising
Fridgen et al. Challenges and opportunities of blockchain-based platformization of digital identities in the public sector
Yao et al. Topic-based rank search with verifiable social data outsourcing
Wu et al. CEPTM: A cross-edge model for diverse personalization service and topic migration in MEC
Chmyr Institutional provision of public access in Ukraine
WO2012100331A1 (en) An internet search and security system that uses balanced logic
Wamuyu Analyzing Global Social Media Consumption
Petit Introducing privacy in current web search engines
Dong et al. DSPM: A platform for personal data share and privacy protect based on metadata
Rajguru A review on challenges and opportunities in Blockchain Technology
Lappas From web mining to social multimedia mining
Demmler Towards practical privacy-preserving protocols
CN109074365A (en) Parameterize network communication path
Paul et al. Issues of Knowledge Management in Deep Web and Its Graph-Based Analysis
Braccini et al. New Internet-based relationships between citizens and governments in the public space: challenges for an integrated system design

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12738798

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12738798

Country of ref document: EP

Kind code of ref document: A1