Privacy protected internet networks, subnetworks and sub-subnetworks
First Claim
1. A non-transitory computer-readable medium storing software instructions that are executable to perform operations comprising:
- a creation of a protected subnetwork that can be accessed anonymously by a user via a subnetwork protected device having an anonymous code associated to the subnetwork protected device, wherein said protected subnetwork is connected to a pre-existing network, the software enables the subnetwork protected device to be verified by a protected network reader;
upon verification of authenticity the software allows the user access to the subnetwork and digital elements, anonymously storing and tracking all user interactions with the digital elements by the anonymous code within the protected subnetwork, wherein said digital elements is any digital code that conveys meaning and is defined as relating to meaning in language and logic, thereafter providing the user of the subnetwork protected device with multiple anonymous codes, the multiple anonymous codes being distributed to other new users in order to access a protected sub-subnetwork via multiple protected sub-subnetwork devices and interactions with digital elements.
0 Assignments
0 Petitions
Accused Products
Abstract
A computerized methods and systems to create, control and manage restricted scope and closed internet interactive networks, subnetworks and sub-subnetworks. The invention permits the protected network, subnetworks and sub-subnetworks to be connected to an open or previously established network, yet still remaining protected, secure and anonymous. Entrance into the protected interactive networks, subnetworks and sub-subnetworks by the user is achieved through a protected network device, anonymous address code, anonymous access code and/or anonymous login information. As the user interacts with the digital elements within the protected interactive networks, subnetworks and sub-subnetworks, a database of said interactions is created and used by the protected network provider in various ways, such as for user behavior information. No personal identifiable information is stored within interactive networks, subnetworks and/or sub-subnetworks and communication on said networks is unique, which inhibits and deters the targeting of the networks by cyber-criminals.
-
Citations
18 Claims
-
1. A non-transitory computer-readable medium storing software instructions that are executable to perform operations comprising:
a creation of a protected subnetwork that can be accessed anonymously by a user via a subnetwork protected device having an anonymous code associated to the subnetwork protected device, wherein said protected subnetwork is connected to a pre-existing network, the software enables the subnetwork protected device to be verified by a protected network reader;
upon verification of authenticity the software allows the user access to the subnetwork and digital elements, anonymously storing and tracking all user interactions with the digital elements by the anonymous code within the protected subnetwork, wherein said digital elements is any digital code that conveys meaning and is defined as relating to meaning in language and logic, thereafter providing the user of the subnetwork protected device with multiple anonymous codes, the multiple anonymous codes being distributed to other new users in order to access a protected sub-subnetwork via multiple protected sub-subnetwork devices and interactions with digital elements.- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18)
-
11. A system, comprising:
a server computer storing software instructions enabling a connectivity between a pre-existing internet network, a protected subnetwork and a protected sub-subnetwork, the software instructions allowing a possessor of a subnetwork protected device to anonymously enter the protected subnetwork via an anonymous code, upon verification of authenticity the software allows the possessor to interact with digital elements, anonymously storing and tracking all possessor interactions with the digital elements by the anonymous code;
thereafter providing the possessor of the subnetwork protected device with multiple anonymous codes, the multiple anonymous codes being distributed to other new possessors in order to access the protected sub-subnetwork via multiple protected sub-subnetwork devices and interact with digital elements.- View Dependent Claims (12, 13, 14, 15, 16, 17)
Specification