SYSTEMS AND METHODS FOR IDENTIFYING NON-TERRORISTS USING SOCIAL NETWORKING
First Claim
1. A method for identifying non-terrorists among a plurality of participants using a communication system governed by a non-governmental board of governors from consumer advocate organizations and privacy organizations, the communication system including a plurality of client systems and a server system connected to the plurality of client systems through a network, said method comprising:
- electronically communicating, via the server system, a verification request from a first participant of the plurality of participants using a first client system to a second participant of the plurality of participants using a second client system, wherein the second participant is a member of a personal network of the first participant;
electronically communicating, via the server system, a verification request from the second participant using the second client system to a third participant of the plurality of participants using a third client system, wherein the third participant is a member of a personal network of the second participant;
receiving, by the server system, a reply to the verification request from the second participant using the second client system;
receiving, by the server system, a reply to the verification request from the third participant using the third client system; and
determining, by the server system, a likelihood that the first participant is a non-terrorist based on the replies received from the second and third participants.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for identifying non-terrorists among a plurality of participants and/or potential participants using a communication system includes electronically communicating a verification request from a first participant to a second participant, wherein the second participant is a member of a personal network of the first participant, and electronically communicating a verification request from the second participant to a third participant, wherein the third participant is a member of a personal network of the second participant. The method also includes receiving replies to the verification requests sent by the first and second participants, and determining a likelihood that the first participant is a non-terrorist threat based on the replies received from the second and third participants.
42 Citations
24 Claims
-
1. A method for identifying non-terrorists among a plurality of participants using a communication system governed by a non-governmental board of governors from consumer advocate organizations and privacy organizations, the communication system including a plurality of client systems and a server system connected to the plurality of client systems through a network, said method comprising:
-
electronically communicating, via the server system, a verification request from a first participant of the plurality of participants using a first client system to a second participant of the plurality of participants using a second client system, wherein the second participant is a member of a personal network of the first participant; electronically communicating, via the server system, a verification request from the second participant using the second client system to a third participant of the plurality of participants using a third client system, wherein the third participant is a member of a personal network of the second participant; receiving, by the server system, a reply to the verification request from the second participant using the second client system; receiving, by the server system, a reply to the verification request from the third participant using the third client system; and determining, by the server system, a likelihood that the first participant is a non-terrorist based on the replies received from the second and third participants. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A communication system configured to identify non-terrorists among a plurality of participants and governed by a non-governmental board of governors from consumer advocate organizations and privacy organizations, said communication system comprising:
-
a plurality of client systems; and at least one server communicatively coupled to said plurality of client systems via a network, said at least one server configured to; electronically communicate a verification request from a first participant of the plurality of participants to a second participant of the plurality of participants, wherein the second participant is a member of a personal network of the first participant; electronically communicate a verification request from the second participant to a third participant of the plurality of participants, wherein the third participant is a member of a personal network of the second participant; receive a reply to the verification request from the second participant; receive a reply to the verification request from the third participant; and determine a likelihood that the first participant is a non-terrorist based on the replies received from the second and third participants. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program embodied on a computer readable medium for identifying non-terrorists among a plurality of participants using a system governed by a non-governmental board of governors from consumer advocate organizations and privacy organizations, said computer program comprising at least one code segment that configures a processor to:
-
electronically communicate, via a server system, a verification request from a first participant of the plurality of participants using a first client system to a second participant of the plurality of participants using a second client system, wherein the second participant is a member of a personal network of the first participant; electronically communicate, via the server system, a verification request from the second participant using the second client system to a third participant of the plurality of participants using a third client system, wherein the third participant is a member of a personal network of the second participant; receive a reply to the verification request from the second participant using the second client system; receive a reply to the verification request from the third participant using the third client system; and determine a likelihood that the first participant is a non-terrorist based on the replies received from the second and third participants. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification