Internet – Clive Morel Fourman, Gaiasoft IP Ltd

Abstract for “Content delivery system, and method of delivering”

A content delivery system (100), includes a trusted holder (200) that is arranged to store information about a conscious entity, a contents delivery requirement entity (210), and a content intermediary (226); as well as a source (232). The profile reference data trusted holder (200) is set up to issue (230), profile data to the content delivery entity in response to a request (22). Also, the content intermediary entity (226) will communicate (224), the profile data and at most part of the stored information regarding the conscious entity to (226) the request for content provision (222), being capable of identifying and identifying the conscious entity to (222). The content intermediary entity (226), is set up to source relevant content from the source (232) using at least some of the stored information about the conscious entity.

Background for “Content delivery system, and method of delivering”

“1. “1.

“The invention concerns a content delivery system that, for instance, receives content requests and sources them from a content source. The invention also covers a method for delivering content. For example, the system receives content requests and sources them from a content source.

“2. “2.

“In the world of online knowledge sharing and social networking, collaboration and communication, there are two seemingly contradicting trends in the Internet Search and Telecommunications: On one hand, people are more concerned about privacy and how confidential information is stored and used. People should be cautious about disclosing sensitive or harmful information and use caution when sharing information. However, search engines that have the most information about users can deliver the best results in content retrieval and search. In order to maximize the benefits of the Internet, users must share more information. However, by sharing information, users risk compromising their privacy. It is important to maximize the relevance and utility of search results and content retrieval without compromising privacy.

“A sensitive, empathic, articulate human communicator is known to use a communication style that matches the knowledge, frame, values, and worldview of the other party to whom they are communicating. The communicator uses knowledge, emotional intelligence, and what is now called “spiritual intelligence” to make judgments. An inappropriate online communication can lead to embarrassing results.

A system for online knowledge sharing and social networking, collaboration, communication, or an interactive website can form the information provided based upon a profile of the user to which the system is providing information. If the profile does not reflect the character, values and beliefs of the user, then the online system will be unable to act in an empathetic, articulate, and sensitive manner. A person’s personality will be revealed to different people in different situations. A LinkedIn profile may be suitable for professional colleagues but not for family members. A FaceBook profile may also be suitable for friends but not professional colleagues.

Web services allow different processes and programs to communicate with each other and thus create more complex and functional systems. However, the sharing of information between web service must be restricted by the need to protect privacy, confidentiality, and data protection. While many people try to avoid sharing online risks and limit their exposure, they also lose out on the benefits of sharing. Profiles are often ‘dumbed down’. Profiles are deemed to be the lowest common denominator, without exposing any depth or risk. The more people are open about their character, beliefs, and values, the greater the chance for human connection, empathy, and relationship. Internet relationships can be superficial, meaningless, and unsatisfying. The Internet and its potential as a business and personal tool is limited in this regard by the absence of deep personal, private, and biometric data available to intelligent devices and computer systems for processing. Intelligent devices are limited in their intelligence without deep profiling and the use of profiling information. If a building or motor vehicle can sense whether the user is under stress, or cold, it will behave more appropriately. An online advertising service might also be able to provide more relevant and profitable advertisements if it knows that the user is a photographer who likes a specific brand of hardware. If the website sells medical products, it could target advertising more effectively and deliver content better if it knew the user is diabetic. However, the user is not willing to share all their information with all these devices and services.

“Accordingly to a first aspect, there is provided content delivery system consisting of: a trusted owner of profile information arranged for storage information concerning a conscious entities; a contents delivery requirement entity; and a content intermediary. The trusted holder is arranged that the content delivery entity issues profile reference data to the content requirement entity in response therefrom. The request for content provision is capable of identifying conscious entities to the trusted data holder; and the content intermediary is arranged that the content intermediary is able to source the information about the conscious entity

“The content intermediary entity can be a software program, a website, or any other device or entity that is capable of receiving and using at least some of the stored information about the conscious entity to source relevant content from the source.

“The content delivery entity” could be any entity that can request provision of content to the conscious entity. This could include a web site or web service, agent, or other software application. It may also be embedded in a mobile phone, computer, garment or vehicle.

“The source content could be any content resource that can be searched, queried or mined for relevant content. For example, a database such as a media databases.

“The source of content might be arranged to compile relevant content in response the query including at minimum part of the stored information regarding the conscious entity.”

“The trusted holder for profile data can be set up to allow management, maintenance, and/or upgrading of the data and to secure it while serving multiple devices and/or websites with appropriate information.

“The trusted holder may have a database of elements that can be categorised by or may be queried according the conscious entity type to each, as well as the physio, psycho-social state(s), at which the information element(s) is relevant. For example, a state might be under stress, and the relevant information could relate to when a subject may be under stress.”

“The conscious entity can be a person and could in general be any system that may include a person or an organisation, a community, town, society or device or location or electronic, electromechanical, or physical system.”

“The content delivery entity could be set up to receive identity data identifying conscious entities.”

“Identity data can be a name or a password that is associated with the conscious entity.”

“Identity data can be received from a communication device associated with the conscious entity.”

“An alteration in at least one of the stored information regarding the conscious entity could trigger the content delivery requirements entity to request the sourcing of relevant content.”

“At minimum, part of the stored information regarding the conscious entity could include profiling information compiled through measuring habitual thoughts patterns.”

“The measurement and recording of habitual thought patterns can be done by measuring brain physiology. This data may include behavioural analysis, questionnaires, or biometric data.

“The information concerning the conscious entities may include information about a preference. A function may be included in at least some of the information about the conscious entity. Executable software data may perform the function. A particular example of a general capability is the use of formulae or scripts to derive the contents of Access Control Groups. Either a profile element, or access control group, may contain executable data or scripts. These can be executed by the CPD as well as other clients using the Web Service provided through the CPD.

“The information about the conscious entity could include an identity, context, and/or geographic information. It may also contain any other relevant information relating to, regarding, or belonging the conscious entity.

“At least part of the information regarding the conscious entity could include personal information, such as profile, identity and/or context information, and/or personal content, including purpose, vision and values, intensions and observations, definitions and recommendations, intentions and objectives, projects and actions, maturity levels and measures, issues and risks, blogs/blog entry, wikis/wiki entry, documents, media and/or fields.

“At least part of the information regarding the conscious entity could include personal information, which may include profile data. Profile information can be collected using a variety of methods and in many forms. A test that returns information according to a model for understanding the social, psychological, and/or physiological status of a conscious entity may produce a profile element. This could be a questionnaire, survey, biometric, and/or observation. The device or software interface may allow for input via the device. The device could include a way to determine the social, psychological, and/or physiological status of a person or group of people. This may be done by using an electromagnetic, biometric and/or bioenergetic device.

“A profile analysis may provide at least some information about the conscious entity. It can result in one or several profile elements consisting either of continuous or discrete rating within one or more dimensions. For example, using models of Spiral Dynamics profiling systems for people and/or group and/or Enneagram personality profiling systems. A profile may contain some information, including learning styles, Neurolinguistic Programming (NLP), categories, and other details. NLP categories include, but not be limited to, visual, auditory, and/or kinaesthetic.

“At least part of information regarding the conscious entity could relate to the location of a user. This information may be based on a cell phone, Global Navigation Satellite System information (GNSS), and/or local Bluetooth information, or any other location determination mechanism. A device with a known location that communicates with the Bluetooth communications interface may provide the local Bluetooth location information.

“Some information may be related to linguistic data, such as linguistic information found in words entered into a software program. Some information may be related to proper nouns within a software program. For example, proper nouns within word-processed documents. Some information may be collected in the form a profile, such as a survey demographic. The collected information may be used to determine the staged development psychology of an individual using the Spiral Dynamics methodology. Some information may be collected in the form a profile, including mindset and values system as described in a CTT7 Levels of Consciousness profile. Information collected could include information about internet behavior and history, such as search topics and websites visited.

“A plurality or all of the profile information can be combined to create a profile for one conscious entity.” A conscious entity’s information may be at least partially related to an organisation, community, or other conscious system.

“At minimum part of the stored data concerning the conscious entity could include current location information associated to the conscious entity.”

“The current location information may be derived from use of software programs and/or communications-enabled device, for example a computer or a portable communications device, such as a cell phone.”

“At minimum part of the stored data concerning the conscious entity could contain context information.”

The context information could relate to the current activity of the conscious entity. A software program that is supported by a computer device may provide the context information. A computer or portable communication device such as a cell telephone may be the computing device. A computing device can be embedded or incorporated into another structure, such as an automobile, building, garment, or other suitable device.

“The system could also include a software program that identifies the conscious entity to fulfill content delivery requirements entity. An electronic device that communicates the identity of the conscious entity to the content delivery entity may be used.

“The content delivery entity entity” could be any entity that can request delivery of content. Delivery of content can be made to the software program and/or the communication device.

“Content can be delivered to one user or demographic via multiple content intermediary entities. It may include a combination multiple media and/or simultaneous, sequential and/or unasynchronous delivery to multiple devices. Multi-casts may allow the content to be broadcast simultaneously to multiple users. One signal may be used to communicate with many users. The signals can only be split and duplicated if the network connection between those users is not available. Information sent to the communications device could be broken down into segments. The content of each segment can depend on the profile of the individual user. Segment content may be affected by user actions and responses. For example, a control loop could exist where content is modified in response to the conscious entity’s response. Information may be displayed in one or more areas of the communication device. Depending on the user’s profile and other user actions, information may be displayed in different areas. Advertisers using the content delivery platform may need to agree to a code or conduct in order to use the service. An advertiser profile can be created by a user. The user can choose the advertiser from which they would like to receive ads. The system may offer a rebate for the amount they spend or the amount the provider earns from their activity.

“The content intermediary entity could be set up to provide reference data related to the sourced content.”

“The content intermediary could be asked to provide data related to the sourced content upon receipt of profile reference data from software application. The content intermediary could be asked to transmit the data associated to the sourced content to the communications device.

“The profile reference data could be authority data. The authority data could be a certificate.

“The content intermediary entity can be set up to process data requests where the recipient of the data is anonymous with regard to the content intermediary.”

“At least a portion of the stored information concerning the conscious entities may have a legitimate use associated with it.”

“Profile reference data can be communicated to the software application by the content delivery entity.”

“The communications device could be set up to support private communication. Private communication could exclude content delivery requirements entity.

“Accordingly to a second aspect, the invention provides a content intermediary apparatus consisting of: a processing resource capable to receiving profile reference data as well as at least some information concerning a conscious entities; and the processing resource is set up to source relevant content from a source using at least some of the information about the conscious entity when it is in use.

“Accordingly to a third aspect, the invention provides a trusted holder for profile data apparatus consisting of: a store for information concerning a conscious entities; a processing resource that generates reference data in response of request for the references data; and the processing resources is set up to communicate the reference and at least some information about the conscious entity to source relevant content. Communication for sourcing relevant content is in response to the request to the reference.

“The content intermediary entity can receive the reference data and at least some of the information concerning the conscious entities.”

“Accordingly to a fourth aspect, there is a method for delivering content. The method comprises: A trusted holder profile data that retains information about a conscious entity; a trusted entity issuing profile refer data to a content delivery entity in response to content provision request. The request being capable of identifying a conscious entity to the trusted entity of profiledata; communicating the profile information and at least some of the stored data concerning the conscious entities to a content intermediary; and the content intermediary entity sourcing relevant content

It is therefore possible to provide a content delivery method and system that can deliver highly personalized and valuable content retrieval and search results, without disclosing any more confidential information about a subject than is permitted by the owner or subject of the confidential data. This system and method can deliver highly personalized content based on private data without disclosing the private information.

It is therefore possible to make sure that the legitimate owner or user of private information can search for and retrieve content without disclosing the identity. Receiving information about, say, a medical condition, is not a risk. If the recipient knows who the private information was sent to and its contents, there are no risks.

“The power of personal data can be used to a greater extent to obtain the highest possible value from a global resource like the Internet without compromising privacy. Physical devices such as computers, smartphones, and buildings, can be made more responsive to the user profile or the system they interact with.

The ability to give the right information at the right time to the right person in the above-mentioned way increases the value of computer system and motivates investment in them. The media context, such as television, entertainment,?edutainment, and video communications, also increases the media’s value by matching the viewer’s or receivers needs and the content. When there is a good match, the content provider can derive profit from advertising or subscriptions, while the recipient receives a positive benefit. Vendors of next-generation high bandwidth internet technology for video broadcasting and transmission, such as Cisco Systems, Inc., can deliver next-generation personalized video broadcasting. This service is available to corporations on an internal or external basis, as well as to content owners and television stations. It can also be licensed, leased, or revenue shared with revenues from advertising or subscriptions. These communications can, at best, be used to promote the development and evolution of the recipient. Media can also be used to promote the best interests for recipients, organizations, and society in general.

Vendors of next-generation video enabled mobile phones and other portable devices can also make it possible to enable consumers to manage their profile, including Identity, Context and Location (ICL), and encourage users to access larger data volumes of media based on this ICL. Vendors of bandwidth and content to mobile phones and other portable devices can also benefit from increased content value.

“Also, even though vendors and creators of?applications real estate? have large installed bases but are under threat by open-source and free software alternatives, it is possible to generate advertising revenues from that entire base. This could potentially supplement or replace licensing revenues. It is possible to make software that interacts with users more effectively by making their ICL more sensitive so they can deliver rich, dynamically-constructed media.

Website owners and creators, including those who own corporate intranets and portals, can provide an additional level of value through personalised content. They also have the potential to generate revenue from advertising and merchandising. Advertisers can also maximize economic value by using on-line advertising that is personalized to ICL. This includes targeting specific audiences, demographics, mediums, content, and preferred advertisers. Advertising agencies can also deliver a higher level of value to their clients.

“People, organisations, groups, and communities that want to grow, transform, and improve their performance, success, and/or improvement can also benefit.”

“Identical reference numbers will be used throughout the following description to identify like parts.”

The current embodiment has been described as being implemented at least partially using web services communications between programs, servers, and devices. However, the invention could be used in other system configurations and other methods of transferring information.

“The embodiments described herein allow a plurality interconnected server devices as well as client access devices to communicate through software, such web service calls, in order to deliver content with improved privacy and value.

Referring to FIG. 1. A content delivery system 100 includes a database server (102) to host a Central Profile Database. The system 100’s Content Management Server 106 and Streaming Media Server 104 can communicate with one another and the database server 102 through a communications network. This allows them to deliver media to a user 108 via client devices such as a cell phone 110 or smart phone 112, and laptop 114.

“The contents of CPD databases can be accessed via a web service using other applications that are identified by Application Server 116 in the system 100.”

“Turning towards FIG. 2. The Central Profile Database 200 (CPD) 200, mentioned above, stores a PROFILE 202 table that contains identity profile information and context information. CPD 200 also contains a PARTNER WEBSITE TRUST table (204) and an access group table (206), which together contain details about who can see what aspects of the user’s profile. It is assumed that the skilled individual is familiar with how to securely transmit information between users and servers, as this is what is being described herein. CPD 200 is equipped with its own certifying authority that can issue security certificates to users and servers, allowing them to securely communicate under the delegated authority of CPD 200. This allows web service requests to be recognized as coming from server or user servers and can therefore be trusted. CPD 200 offers a web service 208, which protects and secures the personal identity of its users.

“A Client Web Site (CWS210) 116 supported by the Application Server 116 connects with a variety of applications and devices, such as the laptop 114. CWS 210, one of a variety of CWSs (212 216, 214) allows users to edit or change their profile information. This information can be saved back to CPD 200 via the web service 208, which is initiated from a computer, laptop 114, web site, or device such as the cell phone 110. Another CWS is SOCNET 212. A social network website stores a copy the user’s profile information in its own database. A medical information site 214 (MEDSITE) does not save any confidential medical information except in the CPD 200. This information is not saved outside the CPD 200, which is designed to protect and maintain confidentiality of personal information.

“In this example, a user Peter Simpson edits a page on a social networking site SOCNET 212. Some elements are summarized in Table I below.

“TABLE InName is Peter Simpson Access Restriction PublicnLocation London Access Restriction PublicnId : PSimpson Access Restricttion: Logged In UsersnTel. +44 207 387 08888 Access Restriction PrivatenLearning Style : Visual Access Restriction Friends”

“The same user can create a second profile on the medical information web site MEDSITE214, which includes elements such as those listed below in Table II:

“TABLE IInName : Peter Simpson Access Restriction : Logged In UsersnId : PeteS Access Restriction : Logged In UsersnMobile +44 7720 300 000 Access Restriction : PrivatenMedical Diabetes Restriction : Health Advisors

“In this case, the SOCNET 212 or the MEDSITE 214 saved Peter Simpson’s profile information to the CPD 200 via a web service 208. Peter Simpson uses the CPD 200 to increase the quality of the information he receives from his employer, CORP, corporate communication department, and, generally, from a corporate portal COPORTAL 226.

In this case, user 108 participated in the Hewitt Employee Engagement Survey. The survey results show that he is an “Enthusiastic Follower”. However, the skilled person should appreciate that information concerning a user can be processed in any other suitable manner, for example another type of survey for demographic derivation which can then be included in Identity-Context-Location (ICL) data associated with an individual. The information for Peter Simpson was entered manually in this example. The information can, however, be sent to the CPD 200 automatically and added to the user?s profile with his consent. The survey company and his employer do not need to have any information about his personal or demographic. Peter Simpson, in this case, prefers to keep the information private. He does so with his other colleagues as well, who are some of the less enthusiastic people profiled as “Embittered Detractors”. The user (Peter Simpson), has decided to let the CPD 200 improve the information sent to COPORTAL 216, using information from his ICL stored at PROFILE table 200. CORP and COPORTAL do not have access to Peter Simpson?s confidential ICL, or any ICL-based content that was retrieved during the process. This means that Peter Simpson’s corporate communication experience and corporate portal’s value are enhanced, although Peter Simpson’s privacy remains protected. User 108 has complete control over his data and can anonymously make ICL information public to enhance the information he receives.

“Table III” below shows an example of profile information that was stored for the user with respect to his membership in the corporate portal COPORTAL. It also includes Peter Simpson’s demographic?”Enthusiastic?” From the Hewitt engagement study.”

“TABLE IIInName : Peter Simpson Access Restriction : Logged In UsersnId : PeterJSimpson access Restriction : Logged In UsersnEmployer CoCORP Access Restriction : PrivatenEngagement Enthusiast Restricttion : Private”

“Table IV” below shows an example of ICL data that can be stored in the CPD 200 for the user.

“TABLE IVnExamples Basis to MatchnName Peter SimpsonnTitle Mrs.nDesignation Peter James SimpsonnAddress 1, 2, 3. . .\n(physical)\nE-mail 1, 2, 3, . . . instant\nmessaging\nPhone 1, 2, 3, . . .\nVOIP 1, 2, 3\nWebsite 1, 2, 3, . . .nDOB Same day, same month, and same date. Symptoms and medical conditions that are similar to those of other people. Also content related\nto symptoms and conditions\nChildren 2\nSignificant other Name, ID\nChild 1 Name, ID\nChild 2 Name, ID\nLanguages English, French English or French content and\npeople who share a common\nlanguage\nPsycho demographic For example Spiral Dynamics\nprofile; mindset, vMeme which indicates\nworldview, value system, expected mindset and mental\nconscious development models. In this case, vMeme\nis Orange, Achievist\nSurvey profile 1, eg Life Enthusiastic Follower\nEngagement\nCultural background English/Middle Class Match with others of like\nChristian background\nPrincipal (family) Religion Christian\nReligious Approach Liberal\nSecondary (lived) Religion Buddhism\nReligious Approach Liberal\nEnneagram 5 (Investigator) with 6 Communication appropriate to 1\nPersonality Type (Loyalist) and 4\n(Individualist) wings\nEthnicity Anglo Indian\nLearning Style Visual Ads/Content presented visually\nBiometrics Pulse rate, ECG, EEG, EMG, Content matched to mod and needs\ngalvanic skin response, brain\nsignals, respiration rate, body\ntemperature, movement facial\nmovements, facial expressions\nand blood pressure and other\nbiometric\nDemographic Group Enthusiastic Follower Communications matched to\n(Hewitt Engagement profile of passionate advocate\nMyers Briggs (MBTI) INTP (Introvert, Intuitive,\nThinking, Perceiving)\nAstrology Sign (character) Aquarius\nAstrology North Node\n(Purpose)\nAstrology Rising Sign\n(Emotion)\nNumerology Birthdate 7 Researcher\n(Purpose\nNumerology Destiny 1 Leader\nProfessional (1, 2, 3)\nOrganization Name, CORP\nIPI\nBusiness Unit\nTitle Producer\nRole Documentary Film Maker\nFunction Camera\nSecurity Level\nPreferred Advertiser Low Price Guarantee, Advertisers who guarantee to\nmatch the best price for the same\nproduct\nAttributes Free Delivery\nPreferred Advertiser Sony, Mercedes, Apple Advertisers for Sony, Mercedes\nand Apple\nName\nCurrent product Professional movie\nInterest Camera, sports car\nAccess control groups While access control groups\nmay be considered as\nlogically a part of the IPI and\nICL, in the embodiment\ndescribed herein, they are\nstored physically by use of\nadditional tables. FIGS. 2\nand 3\nHierarchy of Intent\nHOI?Purpose, Vision,\nLife Areas, Intentions,\nMeasures, Actions\nPersonal HOI This is a hierarchy of Life\nAreas, Life Goals and sub-\ngoals in areas\nCareer HOI Career HOI Purpose: Use Keywords identified from HOI\nmedia to uplift include ?Buy? ?Camera’nArea?nAction: New Projects Also??Meet? and ?Rod Johnson?\nIntention: Documentary on\nNew Media\nAction: Buy high-end camera\nAction: meet Rod Johnson\nregarding production\nOrganization HOI\nCommunity Memberships\nDemographic membership\nmailing list membership\nother membership\nAccess Control For each element of the ICL,\n(Permissions and Masks) permissions can be defined\nallowing appropriate ICL\nsubscribers to access and use\nthe ICL content. Refer tonFIG. 2 for the tables that store\nthis information in the current\nembodiment\nTrusted Certificates ID of others who are fully A special case of Access Control\ntrusted Group\nLocation\nLocation (Applications) UK/London/Marylebone Match people in same location\nLocation (OS) Country + Map References Proximity\nLocation (mobile cell London West End\nlocation and name)\nBluetooth Location Pavilions Shopping Centre Proximity\nLocation (based on IP London Marylebone\naddress)\nLocation based on mast London Marylebone\nserving serving the cell\nLocation based on satellite\nand optionally fixed mast,\naircraft, airship, serving\ncell\nCurrent Context\nCurrent activity context www.thissie.com\nCheapflights.com or MS word\nCurrent focus This may include any Trigger events, eg., switch\ninformation from applications application, change device, move\nor devices which the user is focus within application. Thesenlogged into are inncurrently accessing, using, or background triggered. events, CPD is updated on my\nbehalf which means that any\napplication or web services I have\nworking for me in background will\nbe able to optimize based on all\nthis information\nInternet Behaviour Current search habits, sites, Match advents for relevant\ncontent products, services\nPreferred Devices Preferred media for receiving Match media delivery with\ncontent preference”

“Location information for the user is derived using the cell location of user’s mobile device 110. However, more detailed location information is possible if the communications device is equipped Bluetooth receivers or similar. The Web Service 208 transfers the information to the CPD 200. A biometric sensor can be added to the mobile phone 110 or laptop. It senses one or more of ECG, EEG, EMG, pulse rate, brain signals and respiration rate. Additionally, context information, possibly also IP address, and thus location information, can be derived using the current settings and activity on the laptop computer 114. This information is transmitted via the Web Service 208 and to the CPD 200.

Peter Simpson (user 108) is able to confirm his online identity on various sites by providing IDs or passwords to CPD200. PSimpson’s identity is in SOCNET212 PeteS in MEDSITE214 and PeterJSimpson at COPORTAL216. CPD web service confirms that the accounts exist by referencing the relevant CWS and stores linkage information within an IDENTITY Table 218. Below is Table V, which shows an example of the IDENTITY tables:

“TABLE VnCPD owner APP_UID/APP_PSWDnCPD ID for APP_SOURCE This ID is used to identify which ID is related to application APP_SOURCEn1 2 1 SOCNET PSimpson Passwordn2 3 1 COPORTAL PeteS Passwordn3 1 COPORTAL PeterJSimpson passwordn4 2 SONET RJones passwordn5 3 SOCKET Lavies password

“The IDENTITY table (see Table V) indicates that PSimpson and PeteS are the same person. This is based on the CPD identity 1 stored in a USER database maintained by the CPD 200. Below is Table VI, which shows an example of the USER tables:

“TABLE VI”nID CPD_USER_ID PASSWORDnUser is referenced by Unique user. CPD id name password for CPDn1 Peter. Encoded Passwordn2 Rjones. Encoded Passwordn3 davies. Encoded Password.

“Referring back to Figure V, there are five mappings in the IDENTITY Table, each representing three unique CPD IDs. Three of the five IDs represent SOCNET 212, one for MEDSITE 221 and one for COPORTAL 216.

“The CPD 200 also contains details of access settings and values for profile elements of each user that make up an Individual Personal Identity (IPI), and more generally Identity, Context & Location(ICL) in PROFILE table 202. An example is shown below in Table VII.

“TABLE VII\nID CPD ID Access Identifying Name Value Source Site\n1 1 Public Identifies Name Peter Simpson SOCNET,\nMEDSITE\n2 1 Public Anon Location London SOCNET\n3 1 Private Identifies Tel +44 207 387 8888 SOCNET\n4 1 Friends Anon Learning Visual SOCNET\nStyle\n5 1 Private Identifies Mobile +44 7710 300 000 MEDSITE\n6 1 MEDSITE Anon Medical Diabetic MEDSITE\nHealth\nAdvisors\n7 1 Colleagues Anon Employer CORP CORPORTAL”

“Each row in the PROFILE Table 202 represents a profile element, or item as defined by its CPD Owner and the item Name. It is possible to have multiple profile items with the same Name, but from different sources. Multiple values can be entered in the Source Site field. This allows for identical Profile items to be used by multiple source sites. Profile items that have an identifying value of?Identifies Profile requests that do not allow the user to be identified or identifiable will not make these items available.”

A user can edit elements of their IPI within the PROFILE table 200 using a CWS, or via the user interface of CPD 200. The CPD 200 user interface is shown in this example. It can be accessed via a web browser on a computer connected to the Internet. However, other options include the use of a mobile phone 110, or other devices with the appropriate permissions.

It should be noted that the profile owner in CPD may include any person, demographic group, community or other object. This may include a building, motor vehicle, city or other entity that may have associated it with profile metadata. ICLs are where applicable. It is best to assume that a user is the most applicable definition. The user can also be called a Conscious System.

This profile metadata IPI can be called IPI or ICL (which could include context information and location information). The most applicable definition is assumed. You can decide how much IPI you want to make available to IPI Subscribers. For example, they can control how much of the IPI is available to other people or organisations, including their employer. The IPI subscriber can use the IPI in order to communicate with the IPI owner more effectively. The ICL contains metadata about a user’s identity and context. Other Conscious Systems may use the profile of the Conscious System with their permission to communicate with it effectively. Metadata can be used to retrieve information from the ICL. Metadata can be any information that is derived from the Internet, including name, birth date, health information, language and dialect information and at what level. It can also include information about the person, such as their personality, lifestyle, and goals. Determining which elements are visible; trusted people, groups, and/or personal recommendations of persons or organisations which can be in the form of endorsements and trust certificates.

“Context information and location information can or may not be part of the IPI. They can be used to provide context or derive additional context for selecting relevant content or information as part of the Identity, Context, Location. ICL can be used interchangeably with IPI. However, it is a broader term than IPI. ICL may include, but not be limited to: location. This can be based upon application settings, computer operating systems settings, IP address, GPS location, Bluetooth identification and Bluetooth derived information about location, cellular phone cell location or identity, antenna or mast serving that cell however suspended whether mounted on a balloon or aircraft or other; current activities: attributes or name web site, portal used, portal used, portal used; current focus: words within the document, particular proper nouns in the focus document, such as the word “London?” In a word-processed document, the values and principles that a person uses to operate. These may be derived from a questionnaire, polling others or by other means, such as by their community membership, relationships or spending patterns, or any other information.

“In relation to the current focus on attention mentioned above, it can include the activity/application/website the user is currently using, the device they’re using, and the current focal point of attention. This could be, for example, the user editing a Microsoft Word document on a laptop using the word “London?” highlighted. The user 108 has edited a document titled?Report.doc. The user 108 has highlighted the correct noun “London?”. A Current Focus can indicate whether the user has used their phone recently to send a message and to whom. The context contains dynamic information that indicates the user?s current or most recent focus of attention. To retrieve relevant content, context and location can be combined with profile. The user’s current context, location and other profile elements can also be useful information. This allows applications to provide timely and relevant content.

It is clear that some elements of the Identity can be static, such as Birth Name, but other elements of pertinent information, like the current Context (current website accessed, current word being typed into a word processing document, and current Location) can be dynamic. The development and use of a comprehensive Identity-Context-Location facilitates more accurate targeting of people to people and people to services and content.”

“The skilled person must be aware that certain profile elements can be referenced and used, and therefore can either be changed by SOCNET 221 or MEDSITE 214. Multiple profile elements can be displayed on a single page in COPORTAL 221 or MEDSITE 214, but to minimize conflicts, some elements can be locked. Generally, after saving, only the changed elements will be written back to the CPD 200. The PROFILE table 200 stores each profile element as an individual record. If a profile element has been modified by MEDSITE, it will be prompted for confirmation.

“In this case, MEDSITE 214, a member of a CPD Network, requires that MEDSITE 214 operate by the principles and CPD 200. For example, in respect to not linking between user identities and private content. MEDSITE 214 is an example of a CWS provider. It has legal obligations and responsibilities to adhere to certain standards, values, and principles to obtain access to the CPD 200. MEDSITE 214 has Peter Simpson as its member. However, MEDSITE214 does not intend to use or permit Peter Simpson’s ICL information to retrieve or serve any information other than via the anonymous and secure CPD 200 route.

“MEDSITE214 is a member the CPD Network and adheres additional privacy requirements. MEDSITE214 also benefits from a higher TRUST LEVEL than the user 108 has granted CPD Network members. MEDSITE 214 has therefore been granted?secure access? To the user’s profile. This permission allows the user to receive content that is relevant to his profile. It does not compromise his privacy or reveal to MEDSITE any information that could identify him. We will discuss the assignment of TRUST LEVELS in more detail later.

“It is desirable for the owner/legitimate user of a profile (consisting, for example of Identity, Context, and Location) to have full control over their confidential ICL data. However, they should also be able access their ICL information through all available channels. This example shows a web service architecture that allows communication input devices, web site and databases to read and to use ICL information without knowing who their ICL is. CWS (including applications and devices) can request content based upon the ICL. However, the CWS never?touches? the ICL. The content. This can be done by sending a web service request, which can then executed on behalf the legitimate user or owner of the ICL to retrieve the information. Only after the legitimate owner or user has secured logged into the CPD 200, can they access and retrieve information.”

“The PARTNER SITE TRUST 204 allows the CPD owner to specify how their ICL information may be used and by who or what. It stores default permission settings and optional permissions for specific sites that are CWS of CPD 200. This includes permissions in relation to SOCNET 212 and MEDSITE 214. COPORTAL 216. MEDPROD 210. Below is Table VIII, which shows an example of the PARTNER WEBSITE TRUST table:

“TABLE VIIInID OWNER SITE CPD LEVELn1 1 CPD Site Default (sites visited) Publicn21 1 CPD Secure Read AccessnNetworkn3 1 1 SOCNET Publicn41 1 MEDSITE Secure Read Accessn5 MEDPROD Secure Read Accessn6 ONE COPORTAL Secure Read Access

“The PARTNER WEBSITE TRUST table 200 defines the trust or level of access that is allowed to different CWS clients under the CPD 200 for a particular user. This table shows Peter Simpson editing this information to maintain privacy while enhancing the relevancy of web content delivery sites and advertisements.

“By setting values in the PARTNER WEBSITE TRUST table 204, the user has made it clear that, by default, information that is?Public?” will be displayed on all sites he visits. You can share. Web services implementation allows for the mapping of standard CPD 200 fields to site fields. This means that users 108 and others can use the CPD 200 to populate or maintain field values for websites or groups they belong to. However, only the trust or disclosure level he has defined in the PARTNER WEBSITE TRUST table for each site is possible. As shown in Table VIII, the user has specified that default access rights to CDP 200 are ‘Secure Read Access’ for sites which are part of the?CPD Network, such as MEDSITE 214. This means that the user can retrieve any useful information from his private information, including medical information (e.g., diabetic information). This private information cannot be shared with anyone else except those who are part of the group “Medical Advisors?”

“It is important to note that the CPD 200 has predefined security access groups. These include Public (Web Users); Logged in Users (users currently signed in), and Private (“no user access).

“In addition, and as mentioned above, pre-named Trust level are used in the table PARTNER SITE TRUST 204. The?Secure Read Access’ trust level is used to define CWS applications and devices that have permission to make requests of the CPD 200. The trust level described above is used to define CWS applications or devices that have permission to request the CPD 200 to deliver content back to them. A pre-named Access Control Group, which is ‘Full Read Access’, can be used as an example. This group has full access to the ICL, except for passwords.

Users can also add Access Control Groups to their control. The ACCESS CONTROL GROUP table 206 contains definitions for user-defined Access Control Groups. A Table IX shows an example.

“TABLE IX\nCPD\nID OWNER AGG_NAME ACG_TYPE ACG_DEFINITION SOURCE\n1 1 Friends NORMAL CPD\n2 1 London Friends COMPOUND Friends AND\nProfile.location – London\n3 1 MEDSITE.Health REFERENCED MEDSITE\nAdvisors”

“The ACCESS CONTROL GROUPE table 206 defines the Client Web Site from where the definition was derived. Each Access Control Group is assigned a type. This field is ACG_TYPE. Access Control Group definitions may include user-defined lists (NORMAL), referenced control groups (REFERENCED), and logically defined control groups (COMPOUND).

Summary for “Content delivery system, and method of delivering”

“1. “1.

“The invention concerns a content delivery system that, for instance, receives content requests and sources them from a content source. The invention also covers a method for delivering content. For example, the system receives content requests and sources them from a content source.

“2. “2.

“In the world of online knowledge sharing and social networking, collaboration and communication, there are two seemingly contradicting trends in the Internet Search and Telecommunications: On one hand, people are more concerned about privacy and how confidential information is stored and used. People should be cautious about disclosing sensitive or harmful information and use caution when sharing information. However, search engines that have the most information about users can deliver the best results in content retrieval and search. In order to maximize the benefits of the Internet, users must share more information. However, by sharing information, users risk compromising their privacy. It is important to maximize the relevance and utility of search results and content retrieval without compromising privacy.

“A sensitive, empathic, articulate human communicator is known to use a communication style that matches the knowledge, frame, values, and worldview of the other party to whom they are communicating. The communicator uses knowledge, emotional intelligence, and what is now called “spiritual intelligence” to make judgments. An inappropriate online communication can lead to embarrassing results.

A system for online knowledge sharing and social networking, collaboration, communication, or an interactive website can form the information provided based upon a profile of the user to which the system is providing information. If the profile does not reflect the character, values and beliefs of the user, then the online system will be unable to act in an empathetic, articulate, and sensitive manner. A person’s personality will be revealed to different people in different situations. A LinkedIn profile may be suitable for professional colleagues but not for family members. A FaceBook profile may also be suitable for friends but not professional colleagues.

Web services allow different processes and programs to communicate with each other and thus create more complex and functional systems. However, the sharing of information between web service must be restricted by the need to protect privacy, confidentiality, and data protection. While many people try to avoid sharing online risks and limit their exposure, they also lose out on the benefits of sharing. Profiles are often ‘dumbed down’. Profiles are deemed to be the lowest common denominator, without exposing any depth or risk. The more people are open about their character, beliefs, and values, the greater the chance for human connection, empathy, and relationship. Internet relationships can be superficial, meaningless, and unsatisfying. The Internet and its potential as a business and personal tool is limited in this regard by the absence of deep personal, private, and biometric data available to intelligent devices and computer systems for processing. Intelligent devices are limited in their intelligence without deep profiling and the use of profiling information. If a building or motor vehicle can sense whether the user is under stress, or cold, it will behave more appropriately. An online advertising service might also be able to provide more relevant and profitable advertisements if it knows that the user is a photographer who likes a specific brand of hardware. If the website sells medical products, it could target advertising more effectively and deliver content better if it knew the user is diabetic. However, the user is not willing to share all their information with all these devices and services.

“Accordingly to a first aspect, there is provided content delivery system consisting of: a trusted owner of profile information arranged for storage information concerning a conscious entities; a contents delivery requirement entity; and a content intermediary. The trusted holder is arranged that the content delivery entity issues profile reference data to the content requirement entity in response therefrom. The request for content provision is capable of identifying conscious entities to the trusted data holder; and the content intermediary is arranged that the content intermediary is able to source the information about the conscious entity

“The content intermediary entity can be a software program, a website, or any other device or entity that is capable of receiving and using at least some of the stored information about the conscious entity to source relevant content from the source.

“The content delivery entity” could be any entity that can request provision of content to the conscious entity. This could include a web site or web service, agent, or other software application. It may also be embedded in a mobile phone, computer, garment or vehicle.

“The source content could be any content resource that can be searched, queried or mined for relevant content. For example, a database such as a media databases.

“The source of content might be arranged to compile relevant content in response the query including at minimum part of the stored information regarding the conscious entity.”

“The trusted holder for profile data can be set up to allow management, maintenance, and/or upgrading of the data and to secure it while serving multiple devices and/or websites with appropriate information.

“The trusted holder may have a database of elements that can be categorised by or may be queried according the conscious entity type to each, as well as the physio, psycho-social state(s), at which the information element(s) is relevant. For example, a state might be under stress, and the relevant information could relate to when a subject may be under stress.”

“The conscious entity can be a person and could in general be any system that may include a person or an organisation, a community, town, society or device or location or electronic, electromechanical, or physical system.”

“The content delivery entity could be set up to receive identity data identifying conscious entities.”

“Identity data can be a name or a password that is associated with the conscious entity.”

“Identity data can be received from a communication device associated with the conscious entity.”

“An alteration in at least one of the stored information regarding the conscious entity could trigger the content delivery requirements entity to request the sourcing of relevant content.”

“At minimum, part of the stored information regarding the conscious entity could include profiling information compiled through measuring habitual thoughts patterns.”

“The measurement and recording of habitual thought patterns can be done by measuring brain physiology. This data may include behavioural analysis, questionnaires, or biometric data.

“The information concerning the conscious entities may include information about a preference. A function may be included in at least some of the information about the conscious entity. Executable software data may perform the function. A particular example of a general capability is the use of formulae or scripts to derive the contents of Access Control Groups. Either a profile element, or access control group, may contain executable data or scripts. These can be executed by the CPD as well as other clients using the Web Service provided through the CPD.

“The information about the conscious entity could include an identity, context, and/or geographic information. It may also contain any other relevant information relating to, regarding, or belonging the conscious entity.

“At least part of the information regarding the conscious entity could include personal information, such as profile, identity and/or context information, and/or personal content, including purpose, vision and values, intensions and observations, definitions and recommendations, intentions and objectives, projects and actions, maturity levels and measures, issues and risks, blogs/blog entry, wikis/wiki entry, documents, media and/or fields.

“At least part of the information regarding the conscious entity could include personal information, which may include profile data. Profile information can be collected using a variety of methods and in many forms. A test that returns information according to a model for understanding the social, psychological, and/or physiological status of a conscious entity may produce a profile element. This could be a questionnaire, survey, biometric, and/or observation. The device or software interface may allow for input via the device. The device could include a way to determine the social, psychological, and/or physiological status of a person or group of people. This may be done by using an electromagnetic, biometric and/or bioenergetic device.

“A profile analysis may provide at least some information about the conscious entity. It can result in one or several profile elements consisting either of continuous or discrete rating within one or more dimensions. For example, using models of Spiral Dynamics profiling systems for people and/or group and/or Enneagram personality profiling systems. A profile may contain some information, including learning styles, Neurolinguistic Programming (NLP), categories, and other details. NLP categories include, but not be limited to, visual, auditory, and/or kinaesthetic.

“At least part of information regarding the conscious entity could relate to the location of a user. This information may be based on a cell phone, Global Navigation Satellite System information (GNSS), and/or local Bluetooth information, or any other location determination mechanism. A device with a known location that communicates with the Bluetooth communications interface may provide the local Bluetooth location information.

“Some information may be related to linguistic data, such as linguistic information found in words entered into a software program. Some information may be related to proper nouns within a software program. For example, proper nouns within word-processed documents. Some information may be collected in the form a profile, such as a survey demographic. The collected information may be used to determine the staged development psychology of an individual using the Spiral Dynamics methodology. Some information may be collected in the form a profile, including mindset and values system as described in a CTT7 Levels of Consciousness profile. Information collected could include information about internet behavior and history, such as search topics and websites visited.

“A plurality or all of the profile information can be combined to create a profile for one conscious entity.” A conscious entity’s information may be at least partially related to an organisation, community, or other conscious system.

“At minimum part of the stored data concerning the conscious entity could include current location information associated to the conscious entity.”

“The current location information may be derived from use of software programs and/or communications-enabled device, for example a computer or a portable communications device, such as a cell phone.”

“At minimum part of the stored data concerning the conscious entity could contain context information.”

The context information could relate to the current activity of the conscious entity. A software program that is supported by a computer device may provide the context information. A computer or portable communication device such as a cell telephone may be the computing device. A computing device can be embedded or incorporated into another structure, such as an automobile, building, garment, or other suitable device.

“The system could also include a software program that identifies the conscious entity to fulfill content delivery requirements entity. An electronic device that communicates the identity of the conscious entity to the content delivery entity may be used.

“The content delivery entity entity” could be any entity that can request delivery of content. Delivery of content can be made to the software program and/or the communication device.

“Content can be delivered to one user or demographic via multiple content intermediary entities. It may include a combination multiple media and/or simultaneous, sequential and/or unasynchronous delivery to multiple devices. Multi-casts may allow the content to be broadcast simultaneously to multiple users. One signal may be used to communicate with many users. The signals can only be split and duplicated if the network connection between those users is not available. Information sent to the communications device could be broken down into segments. The content of each segment can depend on the profile of the individual user. Segment content may be affected by user actions and responses. For example, a control loop could exist where content is modified in response to the conscious entity’s response. Information may be displayed in one or more areas of the communication device. Depending on the user’s profile and other user actions, information may be displayed in different areas. Advertisers using the content delivery platform may need to agree to a code or conduct in order to use the service. An advertiser profile can be created by a user. The user can choose the advertiser from which they would like to receive ads. The system may offer a rebate for the amount they spend or the amount the provider earns from their activity.

“The content intermediary entity could be set up to provide reference data related to the sourced content.”

“The content intermediary could be asked to provide data related to the sourced content upon receipt of profile reference data from software application. The content intermediary could be asked to transmit the data associated to the sourced content to the communications device.

“The profile reference data could be authority data. The authority data could be a certificate.

“The content intermediary entity can be set up to process data requests where the recipient of the data is anonymous with regard to the content intermediary.”

“At least a portion of the stored information concerning the conscious entities may have a legitimate use associated with it.”

“Profile reference data can be communicated to the software application by the content delivery entity.”

“The communications device could be set up to support private communication. Private communication could exclude content delivery requirements entity.

“Accordingly to a second aspect, the invention provides a content intermediary apparatus consisting of: a processing resource capable to receiving profile reference data as well as at least some information concerning a conscious entities; and the processing resource is set up to source relevant content from a source using at least some of the information about the conscious entity when it is in use.

“Accordingly to a third aspect, the invention provides a trusted holder for profile data apparatus consisting of: a store for information concerning a conscious entities; a processing resource that generates reference data in response of request for the references data; and the processing resources is set up to communicate the reference and at least some information about the conscious entity to source relevant content. Communication for sourcing relevant content is in response to the request to the reference.

“The content intermediary entity can receive the reference data and at least some of the information concerning the conscious entities.”

“Accordingly to a fourth aspect, there is a method for delivering content. The method comprises: A trusted holder profile data that retains information about a conscious entity; a trusted entity issuing profile refer data to a content delivery entity in response to content provision request. The request being capable of identifying a conscious entity to the trusted entity of profiledata; communicating the profile information and at least some of the stored data concerning the conscious entities to a content intermediary; and the content intermediary entity sourcing relevant content

It is therefore possible to provide a content delivery method and system that can deliver highly personalized and valuable content retrieval and search results, without disclosing any more confidential information about a subject than is permitted by the owner or subject of the confidential data. This system and method can deliver highly personalized content based on private data without disclosing the private information.

It is therefore possible to make sure that the legitimate owner or user of private information can search for and retrieve content without disclosing the identity. Receiving information about, say, a medical condition, is not a risk. If the recipient knows who the private information was sent to and its contents, there are no risks.

“The power of personal data can be used to a greater extent to obtain the highest possible value from a global resource like the Internet without compromising privacy. Physical devices such as computers, smartphones, and buildings, can be made more responsive to the user profile or the system they interact with.

The ability to give the right information at the right time to the right person in the above-mentioned way increases the value of computer system and motivates investment in them. The media context, such as television, entertainment,?edutainment, and video communications, also increases the media’s value by matching the viewer’s or receivers needs and the content. When there is a good match, the content provider can derive profit from advertising or subscriptions, while the recipient receives a positive benefit. Vendors of next-generation high bandwidth internet technology for video broadcasting and transmission, such as Cisco Systems, Inc., can deliver next-generation personalized video broadcasting. This service is available to corporations on an internal or external basis, as well as to content owners and television stations. It can also be licensed, leased, or revenue shared with revenues from advertising or subscriptions. These communications can, at best, be used to promote the development and evolution of the recipient. Media can also be used to promote the best interests for recipients, organizations, and society in general.

Vendors of next-generation video enabled mobile phones and other portable devices can also make it possible to enable consumers to manage their profile, including Identity, Context and Location (ICL), and encourage users to access larger data volumes of media based on this ICL. Vendors of bandwidth and content to mobile phones and other portable devices can also benefit from increased content value.

“Also, even though vendors and creators of?applications real estate? have large installed bases but are under threat by open-source and free software alternatives, it is possible to generate advertising revenues from that entire base. This could potentially supplement or replace licensing revenues. It is possible to make software that interacts with users more effectively by making their ICL more sensitive so they can deliver rich, dynamically-constructed media.

Website owners and creators, including those who own corporate intranets and portals, can provide an additional level of value through personalised content. They also have the potential to generate revenue from advertising and merchandising. Advertisers can also maximize economic value by using on-line advertising that is personalized to ICL. This includes targeting specific audiences, demographics, mediums, content, and preferred advertisers. Advertising agencies can also deliver a higher level of value to their clients.

“People, organisations, groups, and communities that want to grow, transform, and improve their performance, success, and/or improvement can also benefit.”

“Identical reference numbers will be used throughout the following description to identify like parts.”

The current embodiment has been described as being implemented at least partially using web services communications between programs, servers, and devices. However, the invention could be used in other system configurations and other methods of transferring information.

“The embodiments described herein allow a plurality interconnected server devices as well as client access devices to communicate through software, such web service calls, in order to deliver content with improved privacy and value.

Referring to FIG. 1. A content delivery system 100 includes a database server (102) to host a Central Profile Database. The system 100’s Content Management Server 106 and Streaming Media Server 104 can communicate with one another and the database server 102 through a communications network. This allows them to deliver media to a user 108 via client devices such as a cell phone 110 or smart phone 112, and laptop 114.

“The contents of CPD databases can be accessed via a web service using other applications that are identified by Application Server 116 in the system 100.”

“Turning towards FIG. 2. The Central Profile Database 200 (CPD) 200, mentioned above, stores a PROFILE 202 table that contains identity profile information and context information. CPD 200 also contains a PARTNER WEBSITE TRUST table (204) and an access group table (206), which together contain details about who can see what aspects of the user’s profile. It is assumed that the skilled individual is familiar with how to securely transmit information between users and servers, as this is what is being described herein. CPD 200 is equipped with its own certifying authority that can issue security certificates to users and servers, allowing them to securely communicate under the delegated authority of CPD 200. This allows web service requests to be recognized as coming from server or user servers and can therefore be trusted. CPD 200 offers a web service 208, which protects and secures the personal identity of its users.

“A Client Web Site (CWS210) 116 supported by the Application Server 116 connects with a variety of applications and devices, such as the laptop 114. CWS 210, one of a variety of CWSs (212 216, 214) allows users to edit or change their profile information. This information can be saved back to CPD 200 via the web service 208, which is initiated from a computer, laptop 114, web site, or device such as the cell phone 110. Another CWS is SOCNET 212. A social network website stores a copy the user’s profile information in its own database. A medical information site 214 (MEDSITE) does not save any confidential medical information except in the CPD 200. This information is not saved outside the CPD 200, which is designed to protect and maintain confidentiality of personal information.

“In this example, a user Peter Simpson edits a page on a social networking site SOCNET 212. Some elements are summarized in Table I below.

“TABLE InName is Peter Simpson Access Restriction PublicnLocation London Access Restriction PublicnId : PSimpson Access Restricttion: Logged In UsersnTel. +44 207 387 08888 Access Restriction PrivatenLearning Style : Visual Access Restriction Friends”

“The same user can create a second profile on the medical information web site MEDSITE214, which includes elements such as those listed below in Table II:

“TABLE IInName : Peter Simpson Access Restriction : Logged In UsersnId : PeteS Access Restriction : Logged In UsersnMobile +44 7720 300 000 Access Restriction : PrivatenMedical Diabetes Restriction : Health Advisors

“In this case, the SOCNET 212 or the MEDSITE 214 saved Peter Simpson’s profile information to the CPD 200 via a web service 208. Peter Simpson uses the CPD 200 to increase the quality of the information he receives from his employer, CORP, corporate communication department, and, generally, from a corporate portal COPORTAL 226.

In this case, user 108 participated in the Hewitt Employee Engagement Survey. The survey results show that he is an “Enthusiastic Follower”. However, the skilled person should appreciate that information concerning a user can be processed in any other suitable manner, for example another type of survey for demographic derivation which can then be included in Identity-Context-Location (ICL) data associated with an individual. The information for Peter Simpson was entered manually in this example. The information can, however, be sent to the CPD 200 automatically and added to the user?s profile with his consent. The survey company and his employer do not need to have any information about his personal or demographic. Peter Simpson, in this case, prefers to keep the information private. He does so with his other colleagues as well, who are some of the less enthusiastic people profiled as “Embittered Detractors”. The user (Peter Simpson), has decided to let the CPD 200 improve the information sent to COPORTAL 216, using information from his ICL stored at PROFILE table 200. CORP and COPORTAL do not have access to Peter Simpson?s confidential ICL, or any ICL-based content that was retrieved during the process. This means that Peter Simpson’s corporate communication experience and corporate portal’s value are enhanced, although Peter Simpson’s privacy remains protected. User 108 has complete control over his data and can anonymously make ICL information public to enhance the information he receives.

“Table III” below shows an example of profile information that was stored for the user with respect to his membership in the corporate portal COPORTAL. It also includes Peter Simpson’s demographic?”Enthusiastic?” From the Hewitt engagement study.”

“TABLE IIInName : Peter Simpson Access Restriction : Logged In UsersnId : PeterJSimpson access Restriction : Logged In UsersnEmployer CoCORP Access Restriction : PrivatenEngagement Enthusiast Restricttion : Private”

“Table IV” below shows an example of ICL data that can be stored in the CPD 200 for the user.

“TABLE IVnExamples Basis to MatchnName Peter SimpsonnTitle Mrs.nDesignation Peter James SimpsonnAddress 1, 2, 3. . .\n(physical)\nE-mail 1, 2, 3, . . . instant\nmessaging\nPhone 1, 2, 3, . . .\nVOIP 1, 2, 3\nWebsite 1, 2, 3, . . .nDOB Same day, same month, and same date. Symptoms and medical conditions that are similar to those of other people. Also content related\nto symptoms and conditions\nChildren 2\nSignificant other Name, ID\nChild 1 Name, ID\nChild 2 Name, ID\nLanguages English, French English or French content and\npeople who share a common\nlanguage\nPsycho demographic For example Spiral Dynamics\nprofile; mindset, vMeme which indicates\nworldview, value system, expected mindset and mental\nconscious development models. In this case, vMeme\nis Orange, Achievist\nSurvey profile 1, eg Life Enthusiastic Follower\nEngagement\nCultural background English/Middle Class Match with others of like\nChristian background\nPrincipal (family) Religion Christian\nReligious Approach Liberal\nSecondary (lived) Religion Buddhism\nReligious Approach Liberal\nEnneagram 5 (Investigator) with 6 Communication appropriate to 1\nPersonality Type (Loyalist) and 4\n(Individualist) wings\nEthnicity Anglo Indian\nLearning Style Visual Ads/Content presented visually\nBiometrics Pulse rate, ECG, EEG, EMG, Content matched to mod and needs\ngalvanic skin response, brain\nsignals, respiration rate, body\ntemperature, movement facial\nmovements, facial expressions\nand blood pressure and other\nbiometric\nDemographic Group Enthusiastic Follower Communications matched to\n(Hewitt Engagement profile of passionate advocate\nMyers Briggs (MBTI) INTP (Introvert, Intuitive,\nThinking, Perceiving)\nAstrology Sign (character) Aquarius\nAstrology North Node\n(Purpose)\nAstrology Rising Sign\n(Emotion)\nNumerology Birthdate 7 Researcher\n(Purpose\nNumerology Destiny 1 Leader\nProfessional (1, 2, 3)\nOrganization Name, CORP\nIPI\nBusiness Unit\nTitle Producer\nRole Documentary Film Maker\nFunction Camera\nSecurity Level\nPreferred Advertiser Low Price Guarantee, Advertisers who guarantee to\nmatch the best price for the same\nproduct\nAttributes Free Delivery\nPreferred Advertiser Sony, Mercedes, Apple Advertisers for Sony, Mercedes\nand Apple\nName\nCurrent product Professional movie\nInterest Camera, sports car\nAccess control groups While access control groups\nmay be considered as\nlogically a part of the IPI and\nICL, in the embodiment\ndescribed herein, they are\nstored physically by use of\nadditional tables. FIGS. 2\nand 3\nHierarchy of Intent\nHOI?Purpose, Vision,\nLife Areas, Intentions,\nMeasures, Actions\nPersonal HOI This is a hierarchy of Life\nAreas, Life Goals and sub-\ngoals in areas\nCareer HOI Career HOI Purpose: Use Keywords identified from HOI\nmedia to uplift include ?Buy? ?Camera’nArea?nAction: New Projects Also??Meet? and ?Rod Johnson?\nIntention: Documentary on\nNew Media\nAction: Buy high-end camera\nAction: meet Rod Johnson\nregarding production\nOrganization HOI\nCommunity Memberships\nDemographic membership\nmailing list membership\nother membership\nAccess Control For each element of the ICL,\n(Permissions and Masks) permissions can be defined\nallowing appropriate ICL\nsubscribers to access and use\nthe ICL content. Refer tonFIG. 2 for the tables that store\nthis information in the current\nembodiment\nTrusted Certificates ID of others who are fully A special case of Access Control\ntrusted Group\nLocation\nLocation (Applications) UK/London/Marylebone Match people in same location\nLocation (OS) Country + Map References Proximity\nLocation (mobile cell London West End\nlocation and name)\nBluetooth Location Pavilions Shopping Centre Proximity\nLocation (based on IP London Marylebone\naddress)\nLocation based on mast London Marylebone\nserving serving the cell\nLocation based on satellite\nand optionally fixed mast,\naircraft, airship, serving\ncell\nCurrent Context\nCurrent activity context www.thissie.com\nCheapflights.com or MS word\nCurrent focus This may include any Trigger events, eg., switch\ninformation from applications application, change device, move\nor devices which the user is focus within application. Thesenlogged into are inncurrently accessing, using, or background triggered. events, CPD is updated on my\nbehalf which means that any\napplication or web services I have\nworking for me in background will\nbe able to optimize based on all\nthis information\nInternet Behaviour Current search habits, sites, Match advents for relevant\ncontent products, services\nPreferred Devices Preferred media for receiving Match media delivery with\ncontent preference”

“Location information for the user is derived using the cell location of user’s mobile device 110. However, more detailed location information is possible if the communications device is equipped Bluetooth receivers or similar. The Web Service 208 transfers the information to the CPD 200. A biometric sensor can be added to the mobile phone 110 or laptop. It senses one or more of ECG, EEG, EMG, pulse rate, brain signals and respiration rate. Additionally, context information, possibly also IP address, and thus location information, can be derived using the current settings and activity on the laptop computer 114. This information is transmitted via the Web Service 208 and to the CPD 200.

Peter Simpson (user 108) is able to confirm his online identity on various sites by providing IDs or passwords to CPD200. PSimpson’s identity is in SOCNET212 PeteS in MEDSITE214 and PeterJSimpson at COPORTAL216. CPD web service confirms that the accounts exist by referencing the relevant CWS and stores linkage information within an IDENTITY Table 218. Below is Table V, which shows an example of the IDENTITY tables:

“TABLE VnCPD owner APP_UID/APP_PSWDnCPD ID for APP_SOURCE This ID is used to identify which ID is related to application APP_SOURCEn1 2 1 SOCNET PSimpson Passwordn2 3 1 COPORTAL PeteS Passwordn3 1 COPORTAL PeterJSimpson passwordn4 2 SONET RJones passwordn5 3 SOCKET Lavies password

“The IDENTITY table (see Table V) indicates that PSimpson and PeteS are the same person. This is based on the CPD identity 1 stored in a USER database maintained by the CPD 200. Below is Table VI, which shows an example of the USER tables:

“TABLE VI”nID CPD_USER_ID PASSWORDnUser is referenced by Unique user. CPD id name password for CPDn1 Peter. Encoded Passwordn2 Rjones. Encoded Passwordn3 davies. Encoded Password.

“Referring back to Figure V, there are five mappings in the IDENTITY Table, each representing three unique CPD IDs. Three of the five IDs represent SOCNET 212, one for MEDSITE 221 and one for COPORTAL 216.

“The CPD 200 also contains details of access settings and values for profile elements of each user that make up an Individual Personal Identity (IPI), and more generally Identity, Context & Location(ICL) in PROFILE table 202. An example is shown below in Table VII.

“TABLE VII\nID CPD ID Access Identifying Name Value Source Site\n1 1 Public Identifies Name Peter Simpson SOCNET,\nMEDSITE\n2 1 Public Anon Location London SOCNET\n3 1 Private Identifies Tel +44 207 387 8888 SOCNET\n4 1 Friends Anon Learning Visual SOCNET\nStyle\n5 1 Private Identifies Mobile +44 7710 300 000 MEDSITE\n6 1 MEDSITE Anon Medical Diabetic MEDSITE\nHealth\nAdvisors\n7 1 Colleagues Anon Employer CORP CORPORTAL”

“Each row in the PROFILE Table 202 represents a profile element, or item as defined by its CPD Owner and the item Name. It is possible to have multiple profile items with the same Name, but from different sources. Multiple values can be entered in the Source Site field. This allows for identical Profile items to be used by multiple source sites. Profile items that have an identifying value of?Identifies Profile requests that do not allow the user to be identified or identifiable will not make these items available.”

A user can edit elements of their IPI within the PROFILE table 200 using a CWS, or via the user interface of CPD 200. The CPD 200 user interface is shown in this example. It can be accessed via a web browser on a computer connected to the Internet. However, other options include the use of a mobile phone 110, or other devices with the appropriate permissions.

It should be noted that the profile owner in CPD may include any person, demographic group, community or other object. This may include a building, motor vehicle, city or other entity that may have associated it with profile metadata. ICLs are where applicable. It is best to assume that a user is the most applicable definition. The user can also be called a Conscious System.

This profile metadata IPI can be called IPI or ICL (which could include context information and location information). The most applicable definition is assumed. You can decide how much IPI you want to make available to IPI Subscribers. For example, they can control how much of the IPI is available to other people or organisations, including their employer. The IPI subscriber can use the IPI in order to communicate with the IPI owner more effectively. The ICL contains metadata about a user’s identity and context. Other Conscious Systems may use the profile of the Conscious System with their permission to communicate with it effectively. Metadata can be used to retrieve information from the ICL. Metadata can be any information that is derived from the Internet, including name, birth date, health information, language and dialect information and at what level. It can also include information about the person, such as their personality, lifestyle, and goals. Determining which elements are visible; trusted people, groups, and/or personal recommendations of persons or organisations which can be in the form of endorsements and trust certificates.

“Context information and location information can or may not be part of the IPI. They can be used to provide context or derive additional context for selecting relevant content or information as part of the Identity, Context, Location. ICL can be used interchangeably with IPI. However, it is a broader term than IPI. ICL may include, but not be limited to: location. This can be based upon application settings, computer operating systems settings, IP address, GPS location, Bluetooth identification and Bluetooth derived information about location, cellular phone cell location or identity, antenna or mast serving that cell however suspended whether mounted on a balloon or aircraft or other; current activities: attributes or name web site, portal used, portal used, portal used; current focus: words within the document, particular proper nouns in the focus document, such as the word “London?” In a word-processed document, the values and principles that a person uses to operate. These may be derived from a questionnaire, polling others or by other means, such as by their community membership, relationships or spending patterns, or any other information.

“In relation to the current focus on attention mentioned above, it can include the activity/application/website the user is currently using, the device they’re using, and the current focal point of attention. This could be, for example, the user editing a Microsoft Word document on a laptop using the word “London?” highlighted. The user 108 has edited a document titled?Report.doc. The user 108 has highlighted the correct noun “London?”. A Current Focus can indicate whether the user has used their phone recently to send a message and to whom. The context contains dynamic information that indicates the user?s current or most recent focus of attention. To retrieve relevant content, context and location can be combined with profile. The user’s current context, location and other profile elements can also be useful information. This allows applications to provide timely and relevant content.

It is clear that some elements of the Identity can be static, such as Birth Name, but other elements of pertinent information, like the current Context (current website accessed, current word being typed into a word processing document, and current Location) can be dynamic. The development and use of a comprehensive Identity-Context-Location facilitates more accurate targeting of people to people and people to services and content.”

“The skilled person must be aware that certain profile elements can be referenced and used, and therefore can either be changed by SOCNET 221 or MEDSITE 214. Multiple profile elements can be displayed on a single page in COPORTAL 221 or MEDSITE 214, but to minimize conflicts, some elements can be locked. Generally, after saving, only the changed elements will be written back to the CPD 200. The PROFILE table 200 stores each profile element as an individual record. If a profile element has been modified by MEDSITE, it will be prompted for confirmation.

“In this case, MEDSITE 214, a member of a CPD Network, requires that MEDSITE 214 operate by the principles and CPD 200. For example, in respect to not linking between user identities and private content. MEDSITE 214 is an example of a CWS provider. It has legal obligations and responsibilities to adhere to certain standards, values, and principles to obtain access to the CPD 200. MEDSITE 214 has Peter Simpson as its member. However, MEDSITE214 does not intend to use or permit Peter Simpson’s ICL information to retrieve or serve any information other than via the anonymous and secure CPD 200 route.

“MEDSITE214 is a member the CPD Network and adheres additional privacy requirements. MEDSITE214 also benefits from a higher TRUST LEVEL than the user 108 has granted CPD Network members. MEDSITE 214 has therefore been granted?secure access? To the user’s profile. This permission allows the user to receive content that is relevant to his profile. It does not compromise his privacy or reveal to MEDSITE any information that could identify him. We will discuss the assignment of TRUST LEVELS in more detail later.

“It is desirable for the owner/legitimate user of a profile (consisting, for example of Identity, Context, and Location) to have full control over their confidential ICL data. However, they should also be able access their ICL information through all available channels. This example shows a web service architecture that allows communication input devices, web site and databases to read and to use ICL information without knowing who their ICL is. CWS (including applications and devices) can request content based upon the ICL. However, the CWS never?touches? the ICL. The content. This can be done by sending a web service request, which can then executed on behalf the legitimate user or owner of the ICL to retrieve the information. Only after the legitimate owner or user has secured logged into the CPD 200, can they access and retrieve information.”

“The PARTNER SITE TRUST 204 allows the CPD owner to specify how their ICL information may be used and by who or what. It stores default permission settings and optional permissions for specific sites that are CWS of CPD 200. This includes permissions in relation to SOCNET 212 and MEDSITE 214. COPORTAL 216. MEDPROD 210. Below is Table VIII, which shows an example of the PARTNER WEBSITE TRUST table:

“TABLE VIIInID OWNER SITE CPD LEVELn1 1 CPD Site Default (sites visited) Publicn21 1 CPD Secure Read AccessnNetworkn3 1 1 SOCNET Publicn41 1 MEDSITE Secure Read Accessn5 MEDPROD Secure Read Accessn6 ONE COPORTAL Secure Read Access

“The PARTNER WEBSITE TRUST table 200 defines the trust or level of access that is allowed to different CWS clients under the CPD 200 for a particular user. This table shows Peter Simpson editing this information to maintain privacy while enhancing the relevancy of web content delivery sites and advertisements.

“By setting values in the PARTNER WEBSITE TRUST table 204, the user has made it clear that, by default, information that is?Public?” will be displayed on all sites he visits. You can share. Web services implementation allows for the mapping of standard CPD 200 fields to site fields. This means that users 108 and others can use the CPD 200 to populate or maintain field values for websites or groups they belong to. However, only the trust or disclosure level he has defined in the PARTNER WEBSITE TRUST table for each site is possible. As shown in Table VIII, the user has specified that default access rights to CDP 200 are ‘Secure Read Access’ for sites which are part of the?CPD Network, such as MEDSITE 214. This means that the user can retrieve any useful information from his private information, including medical information (e.g., diabetic information). This private information cannot be shared with anyone else except those who are part of the group “Medical Advisors?”

“It is important to note that the CPD 200 has predefined security access groups. These include Public (Web Users); Logged in Users (users currently signed in), and Private (“no user access).

“In addition, and as mentioned above, pre-named Trust level are used in the table PARTNER SITE TRUST 204. The?Secure Read Access’ trust level is used to define CWS applications and devices that have permission to make requests of the CPD 200. The trust level described above is used to define CWS applications or devices that have permission to request the CPD 200 to deliver content back to them. A pre-named Access Control Group, which is ‘Full Read Access’, can be used as an example. This group has full access to the ICL, except for passwords.

Users can also add Access Control Groups to their control. The ACCESS CONTROL GROUP table 206 contains definitions for user-defined Access Control Groups. A Table IX shows an example.

“TABLE IX\nCPD\nID OWNER AGG_NAME ACG_TYPE ACG_DEFINITION SOURCE\n1 1 Friends NORMAL CPD\n2 1 London Friends COMPOUND Friends AND\nProfile.location – London\n3 1 MEDSITE.Health REFERENCED MEDSITE\nAdvisors”

“The ACCESS CONTROL GROUPE table 206 defines the Client Web Site from where the definition was derived. Each Access Control Group is assigned a type. This field is ACG_TYPE. Access Control Group definitions may include user-defined lists (NORMAL), referenced control groups (REFERENCED), and logically defined control groups (COMPOUND).

Click here to view the patent on Google Patents.