Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
TRUSTED NETWORK DEVELOPMENT SYSTEM AND METHOD
Document Type and Number:
WIPO Patent Application WO/2018/042321
Kind Code:
A1
Abstract:
The present disclosures relates to the field of networks. More particularly it pertains to a system for creation and development of networks wherein members trust each other and communicate in a safe environment knowing fully the identity of other members. System allows creation of a group based upon common attributes that is managed by a group admin. The group admin is provided or may create a pre-qualified members database and only such people may be granted membership of the group. Such secure groups may be used for different purposes. An exemplary embodiment of a group for residents of a gated community is elaborated upon.

Inventors:
AMBERKAR HIMANSHU R (IN)
SHIRKE PRASHANT P (IN)
Application Number:
PCT/IB2017/055169
Publication Date:
March 08, 2018
Filing Date:
August 29, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
AMBERKAR HIMANSHU R (IN)
SHIRKE PRASHANT P (IN)
International Classes:
G06Q10/00; G06F15/16; G06Q30/02; H04L9/00
Foreign References:
US20080235353A12008-09-25
Attorney, Agent or Firm:
KHURANA & KHURANA, ADVOCATES & IP ATTORNEYS (IN)
Download PDF:
Claims:
im:

A system for developing a trusted network having one or more entities, said system comprising:

a non-transitory storage device having embodied therein one or more routines operable to facilitate development of the trusted network; and

one or more processors coupled to the non-transitory storage device and operable to execute the one or more routines, wherein the one or more routines include:

an administration module, which when executed by the one or more processors, enables a group administrator to obtain a pre-qualified database of authorized entities for a group, said database storing a unique key for each authorized entity;

an invitation module, which when executed by the one or more processors, initiates a group invitation for the group membership to an authorized entity;

a response receive module, which when executed by the one or more processors, receives a response to the invitation from the authorized entity, said response being followed by a key sent by the authorized entity; and

a key match based group membership confirmation module, which when executed by the one or more processors, matches the key received from the authorized entity with corresponding unique key stored against said authorized entity in said database, wherein said authorized entity is confirmed as a member of the group when a match is confirmed.

The system of claim 1, wherein the key received from the authorized entity is sent beforehand by the system to the authorized entity based on interaction of the authorized entity with the group invitation.

The system of claim 1, wherein the unique key is temporary.

The system of claim 1, wherein the group invitation is sent to mobile phone number of the authorized entity, based on processing of which said authorized entity is required to enter said key on an interface provided in its mobile phone in order to become member of said group.

The system of claim 1, wherein said system receives a group membership request from a second entity, and confirms if one or more attributes of said second entity match with corresponding attributes of authorized entities, based on which said second entity is confirmed as a member of the group.

6. The system of claim 1, wherein said system receives a group membership request from a second entity, and confirms if one or more attributes of said second entity match with corresponding attributes of said group, based on which said second entity is confirmed as a member of the group.

7. The system of claim 1, wherein the group is associated with one or more attributes that indicate at least the type of authorized entities that form part of said group.

8. A method for developing a trusted network having one or more entities, said method comprising steps of:

enabling, at a computing system, a group administrator to obtain a pre- qualified database of authorized entities for a group, said database storing a unique key for each authorized entity;

initiating, using the computing system, a group invitation for the group membership to an authorized entity;

receiving, at the computing system, a response to the invitation from the authorized entity, said response being followed by a key sent by the authorized entity; and

matching, at the computing system, the key received from the authorized entity with corresponding unique key stored against said authorized entity in said database, wherein said authorized entity is confirmed as a member of the group when a match is confirmed.

9. The method of claim 8, wherein the key received from the authorized entity is sent beforehand to the authorized entity based on interaction of the authorized entity with the group invitation.

10. The method of claim 8, wherein the group invitation is sent to mobile phone number of the authorized entity, based on processing of which said authorized entity is required to enter said key on an interface provided in its mobile phone in order to become member of said group.

Description:
TRUSTED NETWORK DEVELOPMENT SYSTEM AND METHOD

TECHNICAL FIELD

[0001] The present invention relates to networks and in particular to systems and methods for developing trusted networks.

BACKGROUND

[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.

[0003] "No man is an island" - so said English poet John Donne in 1624. Relations and networks are essential to survival of not only humans but almost every animal, for example, even ants. Humans are born, live and die enmeshed in connections termed as networks. Some of which are bestowed upon them by their birth itself such as family and relatives while others are a consequence of their interactions with society as they pass through life, such as school and college friends, teachers, alumni and almost everyone they come in contact with. Indeed, as far as back in 1929 it was proposed that anyone on planet Earth can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. This is the "six degrees of separation" theory that was first proposed in 1929 by the Hungarian writer Frigyes Karinthy in a short story called "Chains."

[0004] With the advent of information technology and Internet, human need to form and be part of networks found an easy expression. One of the first networking sites was launched in 1997 and named, fittingly enough, Six Degrees after the six degrees of separation concept. It allowed users to list friends, family members and acquaintances both on the site and externally; external contacts were invited to join the site. Users could send messages and post bulletin board items to people in their first, second, and third degrees, and see their connection to any other user on the site. Six Degrees grew to around 3,500,000 registered users and was sold to YouthStream Media Networks in 1999 for $125 million.

[0005] Since then, a plethora of networking sites has launched. Friendster™ was founded in 2002 and at its peak had more than 100 million users. The site was many people's introduction to online networking, but like many before and after, the network failed to become a part of users' daily routine and ultimately people skipped off when newer, shinier networks emerged. From 2005 until 2008, Myspace™ was the largest networking site in the world, and in June 2006 surpassed Google™ as the most visited website in the United States. Facebook™ overtook Myspace™ in May 2008and presently rules networking world with about 2 billion monthly active users. Other networks such as Twitter™ and Whatsapp™ are also now available and networking is an integral part of the Internet experience.

[0006] While any networking platform allows people to form groups, membership of such groups is not controlled and members are not determined/ identified based upon such well-defined parameters/attributes, for example, family relations and hierarchies. At the same time, human needs for networking is generally expressed and satisfied only when we feel secure and are communicating with others whom we already trust and are familiar with, including for example, culturally.

[0007] Hence, major issue of all networks presently is lack of a system/ mechanism to establish a network /networks comprising only trusted members. There is a need in the art for a system that enables people to form networks based upon clearly identified relationships so that each member of a network enjoys a warm feeling of security, safety, familiarity and trust with no fears of an "alien breach".

[0008] In some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.

[0009] As used in the description herein and throughout the claims that follow, the meaning of "a," "an," and "the" includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of "in" includes "in" and "on" unless the context clearly dictates otherwise.

[0010] The recitation of ranges of values herein is merely intended to serve as a shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. "such as") provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.

[0011] Groupings of alternative elements or embodiments of the invention disclosed herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.

OBJECTS OF THE INVENTION

[0012] It is an object of the present disclosure to provide a system for developing trusted networks / groups whose members have well-defined common attributes.

[0013] It is another object of the present disclosure to provide for a system as above wherein members communicate amongst themselves in a secure and trusting environment as the networks developed include only known persons, with no fear of an "alien breach".

[0014] It is yet another object of the present disclosure to provide for a system as above that is operated as a website and/or mobile application accessible via any Internet enabled computing device.

[0015] It is another object of the present disclosure to provide for a system as above that enables networks so developed to deploy the power of groups formed to advantageously achieve several objectives such as economically and properly managing community services of a residential society such as garbage removal, road and light works, security, meeting and lobbying with governmental agencies, financial benefits such as discounts from vendors etc.

SUMMARY OF THE INVENTION

[0016] The present disclosures relates to the field of networks. More particularly it pertains to a system and method for allowing for creation and development of networks wherein members trust each other and communicate in a safe environment knowing fully the identity of other members. [0017] In an aspect, present disclosure proposes a system for developing a trusted network having one or more entities, the system including: a non-transitory storage device having embodied therein one or more routines operable to facilitate development of the trusted network; and one or more processors coupled to the non-transitory storage device and operable to execute the one or more routines, wherein the one or more routines can include: an administration module, which when executed by the one or more processors, can enable a group administrator to obtain a pre-qualified database of authorized entities for a group, the database storing a unique key for each authorized entity; an invitation module, which when executed by the one or more processors, can initiate a group invitation for the group membership to an authorized entity; a response receive module, which when executed by the one or more processors, can receive a response to the invitation from the authorized entity, the response being followed by a key sent by the authorized entity; and a key match based group membership confirmation module, which when executed by the one or more processors, can match the key received from the authorized entity with corresponding unique key stored against the authorized entity in the database, wherein the authorized entity can be confirmed as a member of the group when a match is confirmed.

[0018] In another aspect, the key received from the authorized entity can be sent beforehand by the system to the authorized entity based on interaction of the authorized entity with the group invitation.

[0019] In yet another aspect, the unique key can be temporary.

[0020] In an aspect, the group invitation can be sent to mobile phone number of the authorized entity, based on processing of which the authorized entity can be required to enter the key on an interface in its mobile phone in order to become member of the group.

[0021] In another aspect, the system can receive a group membership request from a second entity, and can confirm if one or more attributes of the second entity match with corresponding attributes of authorized entities, based on which the second entity can be confirmed as a member of the group.

[0022] In yet another aspect, the system can receive a group membership request from a second entity, and can confirm if one or more attributes of the second entity match with corresponding attributes of the group, based on which the second entity can be confirmed as a member of the group.

[0023] In an aspect, the group can be associated with one or more attributes that indicate at least the type of authorized entities that form part of the group. [0024] In an aspect, present disclosure proposes a method for developing a trusted network having one or more entities, the method including steps of: enabling, at a computing system, a group administrator to obtain a pre-qualified database of authorized entities for a group, the database storing a unique key for each authorized entity; initiating, using the computing system, a group invitation for the group membership to an authorized entity; receiving, at the computing system, a response to the invitation from the authorized entity, the response being followed by a key sent by the authorized entity; and matching, at the computing system, the key received from the authorized entity with corresponding unique key stored against the authorized entity in the database, wherein the authorized entity can be confirmed as a member of the group when a match is confirmed.

[0025] In another aspect of the method, the key received from the authorized entity can be sent beforehand to the authorized entity based on interaction of the authorized entity with the group invitation.

[0026] In yet another aspect of the method, the group invitation can be sent to mobile phone number of the authorized entity, based on processing of which the authorized entity can be required to enter the key on an interface in its mobile phone in order to become member of the group.

[0027] Various objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features.

BRIEF DESCRIPTION OF DRAWINGS

[0028] FIG. 1 A, IB and 1C illustrate various methods for developing trusted networks, in accordance with exemplary embodiments of the present disclosure.

[0029] FIGs. 2A and 2B illustrate exemplary functional modules of a trusted network development system, in accordance with exemplary embodiments of the present disclosure.

[0030] FIG. 3A, 3B and 3C illustrate overall working of system disclosed, in accordance with exemplary embodiments of the present disclosure.

[0031] FIG. 4 illustrates how a totally secure and trusted group can be formed, in accordance with an exemplary embodiment of the present disclosure.

[0032] FIG. 5 illustrates the various services that can be offered to members of a group formed, in accordance with an exemplary embodiment of the present disclosure.

[0033] FIG. 6 elaborates how a township and society hierarchy can be formed, in accordance with an exemplary embodiment of the present disclosure. [0034] FIG. 7 A to 7E illustrate how system disclosed can create unique IDs/keys using existing hierarchies, in accordance with an exemplary embodiment of the present disclosure.

[0035] FIG. 8 illustrates how system disclosed can use existing unique IDs to create further unique IDs for members of a group that comprises members of two or more groups, in accordance with an exemplary embodiment of the present disclosure.

[0036] FIG. 9A and FIG. 9B illustrate how unique IDs for people external to the society can be created using parameters that can easily identify such people, in accordance with an exemplary embodiment of the present disclosure.

[0037] FIG. 10 illustrates the various services that can be enabled using system disclosed, in accordance with an exemplary embodiment of the present disclosure

[0038] FIG. 11 illustrates an exemplary technology landscape of system disclosed, in accordance with an exemplary embodiment of the present disclosure.

[0039] FIG. 12 illustrates an overall architecture of a network that can be created using system disclosed, in accordance with an exemplary embodiment of the present disclosure.

DETAILED DESCRIPTION

[0040] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.

[0041] Each of the appended claims defines a separate invention, which for infringement purposes is recognized as including equivalents to the various elements or limitations specified in the claims. Depending on the context, all references below to the "invention" may in some cases refer to certain specific embodiments only. In other cases it will be recognized that references to the "invention" will refer to subject matter recited in one or more, but not necessarily all, of the claims.

[0042] Various terms as used herein are shown below. To the extent a term used in a claim is not defined below, it should be given the broadest definition persons in the pertinent art have given that term as reflected in printed publications and issued patents at the time of filing.

[0043] The present disclosures relates to the field of networks. More particularly it pertains to a system allowing for creation and development of networks wherein members trust each other and communicate in a safe environment knowing fully the identity of other members.

[0044] In an aspect, present disclosure proposes a system for developing a trusted network having one or more entities, the system including: a non-transitory storage device having embodied therein one or more routines operable to facilitate development of the trusted network; and one or more processors coupled to the non-transitory storage device and operable to execute the one or more routines, wherein the one or more routines can include: an administration module, which when executed by the one or more processors, can enable a group administrator to obtain a pre-qualified database of authorized entities for a group, the database storing a unique key for each authorized entity; an invitation module, which when executed by the one or more processors, can initiate a group invitation for the group membership to an authorized entity; a response receive module, which when executed by the one or more processors, can receive a response to the invitation from the authorized entity, the response being followed by a key sent by the authorized entity; and a key match based group membership confirmation module, which when executed by the one or more processors, can match the key received from the authorized entity with corresponding unique key stored against the authorized entity in the database, wherein the authorized entity can be confirmed as a member of the group when a match is confirmed.

[0045] In another aspect, the key received from the authorized entity can be sent beforehand by the system to the authorized entity based on interaction of the authorized entity with the group invitation.

[0046] In yet another aspect, the unique key can be temporary.

[0047] In an aspect, the group invitation can be sent to mobile phone number of the authorized entity, based on processing of which the authorized entity can be required to enter the key on an interface in its mobile phone in order to become member of the group.

[0048] In another aspect, the system can receive a group membership request from a second entity, and can confirm if one or more attributes of the second entity match with corresponding attributes of authorized entities, based on which the second entity can be confirmed as a member of the group.

[0049] In yet another aspect, the system can receive a group membership request from a second entity, and can confirm if one or more attributes of the second entity match with corresponding attributes of the group, based on which the second entity can be confirmed as a member of the group. [0050] In an aspect, the group can be associated with one or more attributes that indicate at least the type of authorized entities that form part of the group.

[0051] In an aspect, present disclosure proposes a method for developing a trusted network having one or more entities, the method including steps of: enabling, at a computing system, a group administrator to obtain a pre-qualified database of authorized entities for a group, the database storing a unique key for each authorized entity; initiating, using the computing system, a group invitation for the group membership to an authorized entity; receiving, at the computing system, a response to the invitation from the authorized entity, the response being followed by a key sent by the authorized entity; and matching, at the computing system, the key received from the authorized entity with corresponding unique key stored against the authorized entity in the database, wherein the authorized entity can be confirmed as a member of the group when a match is confirmed.

[0052] In another aspect of the method, the key received from the authorized entity can be sent beforehand to the authorized entity based on interaction of the authorized entity with the group invitation.

[0053] In yet another aspect of the method, the group invitation can be sent to mobile phone number of the authorized entity, based on processing of which the authorized entity can be required to enter the key on an interface in its mobile phone in order to become member of the group.

[0054] Various objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features.

[0055] FIGs. 1A to 1C illustrate methods of developing trusted networks, in accordance with exemplary embodiments of the present disclosure.

[0056] In an aspect, methods elaborated hereunder can be performed by one or more computer systems in which the proposed system can be configured.

[0057] FIG. 1 A illustrates a method of developing a trusted network, in accordance with an exemplary embodiment of the present disclosure.

[0058] As illustrated in FIG. 1A, method disclosed can include, at step 102, sending a group membership invitation with a pre-assigned secure key to a person per details present in a pre-qualified members database. In an exemplary implementation, a secure key can be generated (once generated, the secure key can be referred as pre-assigned secure key) based on a unique common key, for example identity of housing society, large residential complex, or families. [0059] In an aspect each secure key can be unique and can be interchangeably termed as unique ID. The pre-assigned secure key generated from a unique key can also be unique.

[0060] In another aspect, the method can include, at step 104, receiving acceptance response of the invitation with the pre-assigned secure key.

[0061] In an aspect, step 106 of method disclosed can include checking if the pre- assigned secure key in acceptance response is valid. The method can include step 108 of granting group membership to sender of the acceptance response if the pre-assigned secure key in the acceptance response is valid and step 110 of denying group membership to sender of the acceptance response if the pre-assigned secure key in acceptance response is invalid.

[0062] FIG. IB illustrates another method of developing a trusted network, in accordance with an exemplary embodiment of the present disclosure.

[0063] As illustrated in FIG. IB, method disclosed can include, at step 152, receiving, from a sender, group membership request with information as required per membership criteria of the group.

[0064] In another aspect, method disclosed can include, at step 154, checking if the information matches a record of the pre-qualified members database of the group.

[0065] In an aspect, method disclosed can include, at step 156, granting group membership to the sender if the information matches a record of the pre-qualified members database of the group.

[0066] In another aspect, method disclosed can include, at step 158, denying group membership to the sender if the information does not match any record of the pre- qualified members database of the group.

[0067] FIG. 1C illustrates another method of developing a trusted network, in accordance with an exemplary embodiment of the present disclosure.

[0068] As illustrated in FIG. 1C, method disclosed can include, at step 172, enabling a group administrator to obtain a pre-qualified database of authorized entities for a group, the database storing a unique key for each authorized entity.

[0069] In another aspect, method disclosed can include, at step 174, initiating a group invitation for the group membership to an authorized entity.

[0070] In yet another aspect, method disclosed can include, at step 176, receiving a response to the invitation from the authorized entity, the response being followed by a key sent by the authorized entity.

[0071] In another aspect, method disclosed can include, at step 178, matching the key received from the authorized entity with corresponding unique key stored against the authorized entity in the database, wherein the authorized entity is confirmed as a member of the group when a match is confirmed.

[0072] FIG. 2A illustrates exemplary functional modules of a trusted network development system in accordance with an exemplary embodiment of the present disclosure.

[0073] In an exemplary embodiment, a system in accordance with the present disclosure can include a registration module 202, an admin module 204, an invitation module 206, a profile module 208, a privacy settings module 210, a communication module 212, a connections module 214 and a database module 216.

[0074] In an aspect, all above modules can be configured at a website that can be accessed by any Internet enabled device such as a Computer, a mobile phone, a laptop, a tablet etc. The modules can enable display of relevant information at such devices as required and elaborated herein as well as take inputs of relevant information on such Internet enabled devices and pass such information to other modules of system disclosed as required.

[0075] In another aspect, system disclosed can be configured to support a mobile application that can be downloaded like other applications from various app stores such as for Windows™, Android™ and Apple™.

[0076] In an aspect, all people using network disclosed can be termed as users while those users who are members of a group made on the network can be termed as members, the group administrator being termed group admin.

Registration module 202

[0077] In an aspect registration module 202 can enable different people to register themselves with system disclosed using authentication procedures well known in the art. As elaborated above, such persons can be termed as users.

Admin module 204

[0078] In an aspect, admin module 204 can enable a user to create a group or multiple groups as elaborated herein. Such a user can be termed as group administrator (interchangeably termed as group admin herein) of the group(s) he/she creates.

[0079] In another aspect, system admin of system disclosed may designate a user as a group administrator with his/her consent and then group admin can perform tasks as elaborated herein.

[0080] In an aspect, system disclosed can enable groups for different purposes to be formed, with membership of a group being granted to a user on the basis of membership criteria for the group and corresponding information provided by the user. [0081] In another aspect, admin module 204 can enable a group admin setting up a group to define membership criteria for the group, store data regarding people that meet the membership criteria in database module 216in a pre-qualified members database and then use invitation module 206 to send group invitations to all of them in one go. Only such people as are in the pre-qualified members database can be granted membership and none else.

[0082] In an exemplary embodiment, the group can be of residents of a gated community. In this case group admin can store name, e-mail id and cell phone number and address of all residents in database module 216 in a database for that gated community that can be the pre- qualified members database for that gated community.

[0083] Likewise, a group admin can set multiple groups with different membership criteria, create pre-qualified databases of members of the multiple groups and store all such details in database module 216. System disclosed can allow only such people whose relevant data is present in the corresponding pre-qualified members database of a group (and so meet the membership criteria of the group) to become members of that group as per process elaborated herein.

[0084] Admin module 204 can receive a membership request along with information as required per membership criteria that can be provided by any user desiring to become member of a group to invitation module 206. Admin module 204 can compare information provided by the user with the pre-qualified members database for the group and inform invitation module 206 accordingly. In case information provided by the user matches a record of the pre-qualified members database, invitation module 206 can grant membership of the group to the user else reject his/her request.

[0085] It can be readily understood that groups can be formed on any one or more common parameters/attributes such as, but not limited to, common housing society, large residential complex, townships, large families staying at various locations, users with similar interests etc. At the same time, multiple groups can be formed, such as for multiple townships and societies, and each can be clearly separate and secure from each other.

[0086] While family ties are very loose in advanced countries, in developing nations they are not only intact and strong but very closely knitted. In addition to individual identity, people also hold at least one other prominent identity such as father/mother, son/daughter brother/sister etc. Such a nuclear family culture (wherein a couple and their dependent children are regarded as a basic network unit) constitutes above 95 % of population in developing countries compared to advanced nations where majority comprises individuals / loners. Groups formed on basis of family ties hence can comprise members who enjoy a high feeling of security and trust while interacting with other members of the group.

[0087] Groups formed can be used to handle common group tasks. For example, if group pertains to residential complex information on issues such as parking, garbage removal, forming and managing a residents welfare association, declaring a general body meeting of the association etc. can be announced. Meetings with external governmental and other external agencies can be more effectively organized. The power of groups can be used to get financial benefits from retailers and service providers etc. such as discounts, loyalty benefits etc.

[0088] In another aspect, a group admin can make one or more group members also as group sub-admins for proper management of the group. Rights of the sub-admins can be configured by the group admin and the group admin can elevate sub-admins to group admin level with rights same as himself/herself. These rights can include ( but are not restricted to) sending out invitations, accepting group invitation requests, sending invitation requests to other groups, moderating group discussions, setting up sub-groups etc.

[0089] In another aspect, a group admin can add/modify/delete people from the pre- qualified members database of which he is the admin. In case of addition, such people can be sent invitations as elaborated in invitation module 206 hereunder while in case of deletion they can be removed from the group if they are already a member of it. In case of modification, group admin can modify data of any person in pre-qualified member's database. An admin can remove members from the group for various reasons for example their abusive behavior towards other group members, they no longer being residents of the gated community to which the group pertains etc.

[0090] In an aspect, group admin can enable group members to send each other direct private messages. In another aspect, group admin can disable this facility and no group member can send a private message to another group member, unless they are directly connected (as elaborated hereunder).

Invitation module 206

[0091] In an aspect, using invitation module 206 a group admin can create and send invitations to different people (also termed as persons or recipients) inviting them to become members of a group of which he is the group admin. For the purpose, the group admin can first gather information per membership criteria of his group. In an exemplary embodiment of a gated community, such information can include person's Name, Residence Address, (that can be Flat and Block Number, for example), name of residence head and relationship of the recipient to residence head ( for example, son, daughter, wife, father-in-law etc. ). The group admin can enter these details in a pre-qualified members database and then use invitation module 206 to create invitations and send them to recipients. Such invitations can be sent via e-mail or SMS or any combination of these. Each invitation can carry a unique pre-assigned secure key (herein termed only as pre-assigned secure key as well). In an exemplary implementation, a secure key can be generated (once generated, the secure key can be referred as pre-assigned secure key) based on a unique common key, for example identity of housing society, large residential complex, or families.

[0092] In an exemplary embodiment, the pre-assigned secure key can be embedded in a hyperlink provided in the invitation sent. The recipient can click on the hyperlink to confirm his acceptance of the invitation. Invitation module 206 can receive this acceptance response along with the pre-assigned secure key. Invitation module 206 can check and confirm that the pre-assigned secure key in the acceptance response is valid and automatically grant membership of the group to the recipient. In an aspect checking the validity of pre-assigned secure key can entail determining that the pre-assigned secure key sent with the invitation to the recipient is exactly the same as that received with the acceptance response.

[0093] In another aspect, in case the recipient of an invitation forwards it to another cell phone/e-mail id whose owner (the second recipient) tries to make himself member of the group by accepting the invitation; the pre-assigned secure key can become corrupted and so, no more valid. Invitation module 206 can receive the acceptance response from the second recipient along with the corrupted pre-assigned secure key and can determine that the pre- assigned secure key in the acceptance response is no more valid and so, not allow the second recipient to become member of the group.

[0094] In an aspect, invitation module 206 can create an invitation that has other authentications means in addition to a pre-assigned secure key elaborated above. For example, the invitation module 206 can put in the invitation a question selected randomly from a set of questions and their right answers already stored in the pre-qualified members database or elsewhere and match answer received from the recipient with the right answer stored in the pre-qualified members database or elsewhere. Only if the recipient answer is correct and the pre-assigned secure key in the acceptance response is valid can invitation module 206 automatically grant membership of the group to the recipient. In this manner, a multi-level authentication mechanism can be employed. The set of questions and answers can be unique for each recipient. [0095] In this manner, only those people can be granted membership of a group whose details per membership criteria are present in the pre-qualified members database of the group.

[0096] In another aspect, in case the group admin sends a group invitation to a person not yet a user, system disclosed can automatically make him a user before making him a member of the group. Or, system disclosed can invite the recipient to become a user using module 202 and then make him a group member after authentication as elaborated above. It can readily be understood that only users can become group members.

[0097] In another aspect, invitation module 206 can enable any user to request for a group membership. For the purpose the user can provide information as required per membership criteria to invitation module 206. In an example of a gated community such information can be user's Name, Residence Address, (that can be Flat and Block Number, for example), name of residence head and relationship of the user to residence head (for example, son, daughter, wife, father-in-law etc.). Invitation module 206 can pass the request along with information as provided by the user to admin module 204 that can compare information provided by the user with the pre-qualified members database for that group and inform invitation module 206 accordingly. In case information provided by the user matches a record of the pre-qualified members database, invitation module 206 can grant membership of the group to the user else reject his/her request.

[0098] In an aspect, invitation module 206 can enable the group admin to fix different policies for sending out invitations. For example, only group admin may send out invitations, or other members may send them out to anyone without any restriction, or only some other members may send them out only after they have been a group member for a pre-determined time period etc. Before sending out such invitations, invitation module 206 can ask members to provide membership criteria information for the person they are inviting. Such information can be stored in database module 216 in pre-qualified members database of the group and only recipients matching the information as elaborated above can be granted membership of the group.

[0099] As elaborated above, in an exemplary embodiment, the pre-qualified members database for a group can be configured by system admin or by a group admin to gather family relations information as well, if suitable to purposes of the group. For example, for a gated community , the pre-qualified members database can have fields such as name, e-mail id, cell phone number, residence address ( that can be Flat and Block Number, for example ) and relationship to residence head ( for example, son, daughter, wife, father-in-law etc. ) for each member. In case invitation is being sent to residence head, relationship can be "residence head". In such a manner family members can also become members of a group. In an aspect, system disclosed can allow only adult members of a family with a verified e-mail id to become members of a group.

[00100] In such a manner, once a group is established people can join it only on "invitation basis" thereby removing the possibility of unwarranted people joining the group.

[00101] In another aspect, using privacy settings module 210 a group admin can make all communications amongst group members visible only to them and none else. In this manner, group members can communicate with each other in a trusting, secure environment wherein identity of each member is known.

[00102] In another aspect, using invitation module 206 group admin of a group can request an invitation from group admin of another group to form a third group comprising members of both the groups. In case the other group admin consents, a third group comprising members of both groups can be formed that can behave similar to as elaborated above and herein. Both group admins can choose one of them to become admin of new group, or can appoint yet more admins as required.

[00103] In an exemplary embodiment, group admin A of a gated community X having 50 resident members can request an invitation from group admin B of a gated community Y having 100 resident members. Once B sends such an invitation and A accepts it, a new group Z comprising 150 members is formed. In this manner, smaller groups can easily be merged to form larger groups allowing for yet more networking and its consequent advantages.

[00104] In another aspect, invitations module 206 can enable any user to send an invitation to any other user to connect directly with him/ her. If the other user accepts the invitation, both the users can be directly connected to one another and can communicate directly and privately with each other without being members of the same group.

[00105] In another aspect, invitation module 206 can send any invitation generated to a pre-determined group of existing members for their approval. Invitation generated can be sent to the user/recipient only after a majority of the pre-determined group of existing members approves the invitation. In this manner, the group members can exercise control over addition of new members to the group.

Profile module 208

[00106] In an aspect, any user of system disclosed can create/ edit his profile using profile module 208. Such profile can be stored in the system disclosed and displayed to other users as per privacy settings set by the user using privacy settings module 210, when requested by other users. In an exemplary embodiment a first user can click on name of a second user as being shown in different posts made by the second user when the profile of the second user can be displayed on the computing device of the first user.

[00107] Profile of a user can have a section showing groups he is member of and data pertaining to his membership criteria for achieving membership of each group. Any member of a group can check out profile of any other member of the group to see, at the minimum, such membership criteria data of the other member, irrespective of privacy settings set by the other member using privacy settings module 210. In this manner, all members of a group are fully aware of identity of other members of the group and hence can communicate in a secure, trusting environment.

[00108] In an exemplary embodiment of a group for a gated community for example, a group admin can create a pre-qualified members database as elaborated above. As people accept invitations sent by group admin and become members of the group, database module 216 can in turn provide their information to profile module 208 and automatically populate relevant fields in the profile of the user. In this way a family tree/ hierarchy of different members of a group can develop over time using system disclosed.

[00109] In another aspect, users requesting membership can provide information to determine whether they meet the membership criteria or not. In an exemplary embodiment, such information can include Name, Residence Address, (that can be Flat and Block Number, for example), name of residence head and relationship of the user to residence head( for example, son, daughter, wife, father-in-law etc. ). Such information can be automatically matched with information available in the pre-qualified members database in database module 216 before granting them membership of the group. Database module 216 can in turn provide this information to profile module 208 and automatically populate relevant fields in the profile of the user. In this way a family tree/ hierarchy of different members of a group can develop over time using system disclosed.

[00110] In an aspect, profile module 208 can display family hierarchy for a user on the profile page of that user to other users, as per privacy settings set by the user using privacy settings module 210 as elaborated herein. Profile module 208 can get information for this purpose from connections module 214 as elaborated hereunder.

Privacy settings module 210

[00111] In an aspect using privacy settings module 210 a user of system disclosed can finely control what information concerning his profile he wants to display and to whom. For example, a user X may decide to show his complete profile information to everyone, while user Y may decide to show her complete profile only to people directly connected to her, or those that are members of a particular group she is also a member of (a gated community group, for example) and only her name to everybody else.

[00112] In another aspect, using privacy settings module 210 a group admin can make all communications amongst group members visible only to them and none else. In this manner, group members can communicate with each other in a trusting, secure environment wherein identity of each member is known.

Communication module 212

[00113] In an aspect communication module 212 can enable all communications across system disclosed and amongst its various users. Such communication can include (but is not limited to) private communication between two users (any of which can be a member of a group as well), public "posts" made by a user that are visible to other users as per settings in privacy settings module 210, invitations sent, requested and accepted by any user, discussions amongst users who are members of a group etc.

[00114] In another aspect communication module 212 can enable any user to 'block' any other user that he/she does not wish to communicate with.

[00115] In another aspect, communication can take the form of small notifications that can be displayed on a user's computing device. The notification can carry a hyperlink that when clicked opens the complete communication.

[00116] In an aspect, communication module 212 can include a bulletin board system (BBS) enabling users to display their communications to others, per privacy settings set by them. In an exemplary embodiment, each group (such as a gated community) can have its BBS wherein various messages can be posted and viewed only by group members. The BBS can be used to announce and satisfy various needs within the group such as emergency help (blood supply, child care, short term lending, finding trusted skilled labor support, buying selling good from known people, tuition's, medical care, carpooling with trusted neighborhood people, crowd funding for social cause, easily paying for different utility services, information regarding maintenance of various society equipments such as lifts, generators etc. etc.

Connections module 214

[00117] In an aspect, connections module 214 can enable all users of system disclosed to see how they are connected to any other user. Such connections can be visually displayed on a user's computing device. For the purpose a first user can click on name of any other user (say second user) as can be showing at different points of system disclosed such as posts made by the second user, for example. Then first user can be shown profile of second user that can carry another link that when clicked shows how first user is connected to second user. As can be readily understood, all users that are members of a group will be connected directly to the group admin.

[00118] In another aspect, connections module 214 can display connection of any user to another as a connection map in the form of "degrees of separation" showing also intermediate members. For example X may want to see his present connection to Z. Z may be son of Y. Both X and Y may be members of a group T whose group admin is A. When X clicks on name of Z in a post made by Z, he can be shown a connection map showing him connected to A, A being connected to Y and Z shown as connected to Y. The connection map can also indicate that both X and Y belong to group T whose admin is A and that Z is son of Y. So, X is has two degrees of 'separation' from Z.

[00119] In another aspect, connections module 214 can collect from database module 216 details common to a residence head so as to create a family hierarchy for that residence head and show such hierarchy to other members as per privacy settings set by the member using privacy settings module 210 as elaborated herein.

[00120] For example, family of a residence head can include himself, his wife and his son. All of these can be members of a gated community group. During the process of membership, their details have been stored in database module 216. Using these details connections module 214 can create family hierarchy for all members of the family and provide them to profile module 208. Profile module 208 can accordingly display family hierarchy for each member of the family on the profile page of that member to other members, as per as per privacy settings set by the member using privacy settings module 210 as elaborated herein. In this manner, system disclosed can provide family hierarchy along with identity of a user/member.

Database module 216

[00121] In an aspect database module 216 can store all data for operation of system disclosed, and can provide such data to other modules, as elaborated above.

[00122] In another aspect, database module 216 can enable different group admins to create different pre-qualified members databases per the groups being formed and managed by the group admins.

[00123] FIG. 2B illustrates exemplary functional modules of a trusted network development system in accordance with another exemplary embodiment of the present disclosure. [00124] In an aspect, a system for developing a trusted network having one or more entities ( the entities being users, for example ) can include an administration module 252 that can enable a group administrator to obtain a pre-qualified database of authorized entities for a group, the database storing a unique key for each authorized entity; an invitation module 254 that can initiate a group invitation for the group membership to an authorized entity; a response receive module 256 that can receive a response to the invitation from the authorized entity, the response being followed by a key sent by the authorized entity; and a key match based group membership confirmation module 258 that can match the key received from the authorized entity with corresponding unique key stored against the authorized entity in the pre-qualified database , wherein the authorized entity can be confirmed as a member of the group when a match is confirmed.

[00125] In another aspect, the key received from the authorized entity can be sent before hand by the proposed system to the authorized entity based on interaction of the authorized entity with the group invitation, and the unique key can be temporary.

[00126] In another exemplary embodiment, the group invitation can be sent to mobile phone number of the authorized entity, based on processing of which the authorized entity can be required to enter the key on an interface provided in its mobile phone in order to become member of the group.

[00127] In yet another aspect, the proposed system can receive a group membership request from a second entity, and confirm if one or more attributes of the second entity match with corresponding attributes of authorized entities, based on which the second entity can be confirmed as a member of the group.

[00128] In an aspect, the proposed system can receive a group membership request from a second entity, and can confirm if one or more attributes of the second entity match with corresponding attributes of the group, based on which the second entity can be confirmed as a member of the group.

[00129] The system of claim 1, wherein the group is associated with one or more attributes that indicate at least the type of authorized entities that form part of the group.

[00130] FIG. 3A and FIG. 3B illustrate working of system disclosed, in accordance with an exemplary embodiment of the present disclosure.

[00131] As illustrated in FIG. 3A, a trusted network development system 302 can be installed at a server. Communication between system 302 and any internet enabled computing device can be done via internet. System 302 can send a group invitation with pre- assigned secure key to an e-mail id configured on internet enabled mobile device 304, getting the e-mail id from a pre-qualified member's database.

[00132] In an exemplary embodiment relevant to a residents group, mobile device 304 can get an e-mail message on the e-mail id saying "You are invited to join XYZ Society Residents Group. Click here to join", 'here' can carry a hyperlink. The holder of mobile device 304 can click 'here' in the e-mail message. Upon such clicking, system 302 can determine that clicking of 'here' has been done from the e-mail id and can enable mobile device 304 to send an acceptance response with valid pre-assigned secure key to system 302 and system 302 can make owner of the e-mail id member of XYZ Society's Resident's Group.

[00133] In such a case, system 302 can send an acceptance notification to the e-mail id configured on mobile device 304.

[00134] In another aspect, as illustrated in FIG. 3B, the system 302 disclosed can send a group invitation with a pre-assigned secure key to an e-mail id configured on internet enabled mobile device 352, getting the e-mail id from a pre-qualified member's database.

[00135] Mobile device 352 can get an e-mail message on e-mail id configured on mobile device 352saying "You are invited to join XYZ Society Residents Group. Click 'here' to join", 'here' can carry a hyperlink. However, holder of mobile device 352 can instead forward the e-mail message to a second e-mail id configured on a second mobile device 354.

[00136] Accordingly, mobile device 354 can get the e-mail message on second e-mail id configured on it. Holder of mobile device 354 can click 'here' in the e-mail message.

[00137] In this case, upon such clicking, system 302 can determine that clicking of 'here' has been done from second e-mail id and can enable mobile device 354 to send an acceptance response with invalid pre-assigned secure key to system 302. System 302 can in this case deny owner of second e-mail id membership of XYZ Society's Resident's Group.

[00138] In an aspect in such a case system 302 can send a rejection notification to the second e-mail id configured on mobile device 354.

[00139] FIG. 3C illustrates working of system disclosed, in accordance with another exemplary embodiment of the present disclosure.

[00140] In an aspect, a group administrator can obtain a pre-qualified database of authorized entities for a group, wherein the database can store a unique key for each authorized entity. Such a database can be pre-configured in the proposed system 302, or can be provided to it as and when required. [00141] In an exemplary embodiment, as illustrated at FIG. 3C, an authorized entity to be granted group membership can be user 372. Pre-qualified database obtained by the group administrator can have phone number of mobile device 374 being used (associated with) by user 372. A unique key can be generated by proposed system 302 and associated with the phone number of mobile device 374, as shown at 376. Using proposed system 302, the group admin can send an SMS carrying a group invitation as shown at 378 to mobile device 374. The group invitation can invite user 372 to download and install a mobile application in order to be granted membership of the group and various other features offered by the proposed system, as elaborated above. The group invitation can carry a short link for the purpose that can lead user 372 to the mobile application of the proposed system at relevant app store depending upon operating system of mobile device 374 ( for example, App Store for Apple ™ iOS based mobile phones and Google Play for Android™ based mobile phones.

[00142] In case user 372 decides to become a member of the group, he/she can download the mobile application using the short link provided in the proposed invitation on mobile device 374 as shown at 380. Upon such downloading, the mobile application can send a response shown as 382 that can be received by proposed system 302. Upon receipt of the response proposed system 302 can generate a key as shown at 384 and send the key to mobile device 374 associated with user 372. Proposed system 302 can send the key only to mobile device 374 and no other. In this manner even if someone else using some other mobile device gets the group invitation by mistake and downloads the application he/she will not get the key and cannot proceed further. The key can be same as the unique key or based upon the unique key in such a manner that the two can be matched.

[00143] Upon receipt of the key, the mobile application of the proposed system can present appropriate interface in mobile device 374 allowing user 372 to send/transmit the key back to proposed system 302, as shown at 386. Upon receipt of the key, proposed system 302 can match the unique key with the key as shown at 388 and, in case a match is found, grant membership of the group to mobile device 374 ( and its associated user 372) as shown at 390. Upon such grant, proposed system 302 can send a notification shown at 392 to mobile device 374 for information of user 372.

[00144] In an exemplary embodiment, the unique key can be a temporary key and user 372 can be invited to transmit the key to proposed system within a pre-determined time. After that the unique key can be removed by the proposed system so that, in case user 372 takes action later than the pre-determined time, he/she cannot be granted the group membership. [00145] It can be readily appreciated group invitation can be sent by alternate means as well. For instance, group invitation can be sent using email to email id of user 372 and can carry a link that can be uniquely associated, for example, with IP address of personal computer of user 372. In case user 372 forwards the link to someone else at a different IP address, that someone else may not be permitted to log into the website of the proposed system and can be redirected instead to an error/warning age. All such embodiments are fully in scope of the present disclosure.

[00146] In this manner, system disclosed can allow only such people whose relevant data is present in the pre-qualified members database (and so meet the membership criteria of a group) to become members of that group as per process elaborated herein.

[00147] In an aspect, system disclosed can have one or more security mechanisms well known in the art that prohibit any mass downloading of its contents, databases, software etc. so as to prevent software piracy and any misuse of data of members.

[00148] In an exemplary embodiment using system disclosed a secure group for a housing complex can be formed. The Residents Welfare Association (RWA) and its committee members can be explained the purpose of the group and circulars sent to all residents about the initiative wherein they can be advised to download the application or an SMS can be broadcast to all residents with the download link for the app. Residents can register on the website of system disclosed. One of them can become group admin and create an initial pre- qualified members database for the residents, taking information for the same from the RWA. Membership of the group can be increased in a phased manner by the group admin, sending group invitations to residents of one block at a time. As elaborated above, only people in the pre-qualified members database can become members of the group, thereby enabling "ring fencing" of the group. Group members can avail various messaging platforms such as one to one or to the whole group. They can collaborate with other residents either within the group or by creating other independent groups. The group admin can be a committee member of the RWA and hence can use the group for performing common administrative services pertaining to the RWA such as broadcasting various messages to all residents, uploading monthly maintenance statements of various common assets of the society, managing various complaint requests of members, monitoring amounts due from members and advising them the same in a one on one communication or as a general group announcement etc. As the group grows and becomes established, various other aspects such as bulk discounts from showrooms, better insurance premiums, loyalty bonuses from airlines etc. can be negotiated and group members can avail the same. [00149] FIG. 4 illustrates how a totally secure and trusted group can be formed, in accordance with an exemplary embodiment of the present disclosure.

[00150] As illustrated, a system 400 per the present disclosure can be used for residents and other people relevant to residents of a society. In an exemplary embodiment, using system 400, a group 402 that can be named "So-cy-tea" can be formed, as shown.

[00151] As illustrated, system 400 can enable a group admin or a system admin to create a prequalified members database for So-cy-tea 402 that can include different categories such as residents 404, committee 406, internal services 408 and business services 410. Committee 406 can have people from the Resident's Welfare committee. Likewise, internal services 408 can have people required for internal services of the society such as security, gardening, lifts maintenance, plumbing, fire alarm maintenance etc. Business services 410 can have people external to the society but willing to offer business services to it. For example, these can be nearby vendors such as eateries, drycleaners, tailors etc.

[00152] In an aspect, the pre-qualified members database can carry a field that can identify the category of a member. The category of a member can also be displayed on profile of the member.

[00153] In such a manner, a pre-qualified members database comprising people from categories as elaborated above can be built up. Group admin of So-cy-tea 402 can create and send invitations to all such people. As elaborated above, only people per this pre-qualified members database can become members of the group. Hence, as illustrated in FIG. 4, a "ring fenced" digitally localized group can be created which is totally secure from any outside interference by unwarranted members.

[00154] FIG. 5 illustrates the various services that can be offered to members of a group formed, in accordance with an exemplary embodiment of the present disclosure.

[00155] In exemplary embodiment shown, a pre-qualified members database can be formed pertaining to society 502. The database can include people to provide resident services 504, administrative committee services 506, skilled services 508, C2B or retail services 510 and utilities payments 512.

[00156] Besides, as illustrated, system disclosed can also offer private communication services 514 wherein different members of society 502 can communicate one to one with each other. In another aspect, any member not wishing to communicate with another member can "block" another member so as not to receive any communication from the another member. [00157] FIG. 6 elaborates how a township and society hierarchy can be formed, in accordance with an exemplary embodiment of the present disclosure.

[00158] As shown a township 602 can have a plurality of residential societies such as society A 604-1, society B 604-2 ....society N 604-N. Each society can have a plurality of residents shown as 606-1..606-N for society 604-1 and 608-1 ..608-N for society 604-2.

[00159] Further, a resident can in turn have different family members. Or a resident can have a tenant (say a paying guest) staying with him. For example resident 606-1 can have family members 610 or tenant 612. In another aspect, resident 606-1 can have both family members as well as tenants in his house. Likewise resident 608-1 can have family 614 and resident 608-N can have family 616.

[00160] Invention disclosed can handle all above hierarchies or other hierarchies and a plurality of pre-qualified members databases can be created accordingly to cater to those. As elaborated above, each group can be separate and secure from one another.

[00161] FIGs. 7A to 7E illustrate how system disclosed can create unique IDs (interchangeably termed as unique keys herein) using existing hierarchies, in accordance with an exemplary embodiment of the present disclosure. The unique keys can be further used to create unique pre-assigned secure keys.

[00162] As being elaborated, in an exemplary embodiment, system disclosed can be used by different residential societies to create secure groups comprising their residents and other relevant people. System disclosed can enable a system admin to create unique township ID 702, society IDs 704-1 and 704-2, principal resident IDs 708-1 and 708-2, family IDs 710-1 and 710-2 and tenant ID 712 as shown in FIG. 7 A. In an aspect, a principal resident can be head of the family residing in a house in a residential society that is using system disclosed. In another aspect, a principal resident can be the owner of the house.

[00163] In an exemplary embodiment, a codification scheme can be employed. For example a township can have a 5 letter code wherein the first letter is Y while others are an abbreviation of the city. A township ID can be YQWDG for example, as illustrated in FIG.7B at 718. System disclosed can map any township ID to its name and coordinates, and can ensure that no two townships have the same township ID.

[00164] As illustrated in FIG. 7C, system disclosed can conjoin a unique township ID 732 and a unique society ID734 to create a unique society ID. For example, if township ID is YQWDG and society ID is 56435, system disclosed can create a unique society ID as YQWDG56435. [00165] Likewise, system disclosed can create a unique resident ID of a principal resident by combining unique township ID, unique society ID and unique resident ID of the principal resident with another identifier of the principal resident. In an embodiment, such an identifier can be mobile number of the resident. As illustrated in FIG.7D, if township ID is YQWDG (746), society ID is 56435 (748) and resident ID of the principal resident is AB275 (750) and his mobile number is 9111100000 (752), system disclosed can create a unique principal resident key/ID as YQWDG56435AB2759111100000.

[00166] In an aspect, system disclosed can secure this ID using security procedures such as hashing well known in the art to create the unique pre-assigned secure key for the principal resident. In another aspect, the pre-assigned secure key can be sent as a one time password (OTP) that can be embedded in a hyperlink in a message sent to mobile device of the principal resident as shown at 754. Clicking on the hyperlink can authenticate the principal resident and make him a member of the society's secure group. In an aspect, the pre-assigned secure key can be mapped to the record of the user (who is the principal resident in this example) in the pre-qualified member's database and once the user accepts the invitation sent to him, he can be made member of the society's secure group.

[00167] In another embodiment, the OTP can comprise of an alphanumeric character that system disclosed can automatically verify once it is received on the mobile device of the principal resident, without any further intervention by the principal resident. Accordingly, the mobile device can automatically send an acceptance response with valid pre-assigned secure key to system disclosed and the mobile device can be automatically granted membership of the group. Consequently, system disclosed can send an acceptance notification to the mobile device advising its owner (that is the principal resident) that he has become a member of the group.

[00168] Likewise, as illustrated in FIG.7E a principal resident, if allowed by the group admin/system admin can send invitation to his family members as elaborated above. In an aspect a unique family member ID can be created by adding mobile number of the family member to the unique resident ID of the principal resident created as elaborated above. The principal can send an OTP invite 762 to family member 764. System disclosed can create a unique family member ID by combining township ID 766, society ID 768, resident ID of the principal resident 770, mobile number of the principal resident 772 and the mobile number of the family member 774.

[00169] The unique family member ID created can further be used and employed in a manner similar to that of a unique principal resident ID, as elaborated above. [00170] FIG. 8 illustrates how system disclosed can use existing unique IDs to create further unique IDs for members of a group that comprises members of two or more groups, in accordance with an exemplary embodiment of the present disclosure.

[00171] As illustrated in FIG. 8, a township 802 can have a society A with a building A 804, society B with building B 806 and likewise society N with building N. Each society can have a group of its own but some members of one society may want to form a group with members of another society. For example, a father 808 that is member of society A's group may have a son 810 that is member of society B's group. Father can create a co-family group and send an invitation to the son to become a member of the co-family group. System disclosed can create a unique key for the son's membership of the co-family group. This unique ID can be formed by joining unique IDs of township, society A, society B, father and son.

[00172] In this manner ID of any member can clearly indicate complete hierarchy that has been used to grant him membership of a group and, at the same time, completely identify the member.

[00173] FIG. 9A and FIG. 9B illustrate how unique IDs for people external to the society can be created using parameters that can easily identify such people, in accordance with an exemplary embodiment of the present disclosure.

[00174] As illustrated in FIG. 9A, a unique ID for a serviceman can be created using his PO Box Number 902, mobile number 904 and any government document 906 such as PAN, Adhaar or driving license (that are also used as KYC ( Know your client) documents by various banks/ financial institutions).

[00175] Likewise, as illustrated in FIG. 9B, a unique ID for a merchant can be created using his PO Box number 952, point of sale terminal ID 954 and any KYC ID 956. For a merchant the unique ID may also include other aspects such as chain ID 958 (that can show the retail chain to which the merchant belongs).

[00176] In this manner, system disclosed can create unique IDs which by themselves can identify the members completely.

[00177] FIG. 10 illustrates the various services that can be enabled using system disclosed, in accordance with an exemplary embodiment of the present disclosure.

[00178] As illustrated, a "So-Cy-Tea" platform 1002 can be created for a residential society. The platform can have residents 1004 and committee members 1006 that can manage the residents welfare society as well as the group. Members can avail various services 1008. Such services can include (but are not limited to) scrub board, broadcasts, messaging, collaboration and payments. Besides, members can avail a various business services 1010. Such business services can include (but are not limited to) those pertaining to retail, skilled industry, F&B, entertainment, healthcare, education etc.

[00179] FIG. 11 illustrates an exemplary technology landscape of system disclosed, in accordance with an exemplary embodiment of the present disclosure.

[00180] As illustrated, system disclosed can employ cloud services 1102. Core 1104 of system can have a web portal 1106, a mobile app 1108, appropriate user interfaces 1110, loyalty benefits module 1112 (that uses the power of the group to get bulk discounts and other like benefits from traders, hotels, airlines etc. by assuring them consistent business) and security module 1114. System can have messaging 1116, broadcast 1118 and payments 1120( for payments transactions amongst group members) modules.

[00181] System can also interface with external systems and hence enable services provided by them for group members. In an exemplary embodiment, corresponding services can be provided via an SMS/USSD module 1122, a payment gateway 1124 and portals 1126.

[00182] FIG. 12 illustrates an overall architecture of a network that can be created using system disclosed, in accordance with an exemplary embodiment of the present disclosure.

[00183] As illustrated, core engine 1202 (that is system disclosed and groups formed therein) can be interfaced with multiple external modules and systems to perform various tasks and provide various services, some of which are shown.

[00184] For example security module 1204 can provide security to the system and all data within, database administration module 1206 can handle all data requirements. Audit and monitoring module 1208 can perform periodic audits and monitor system performance. Automation module 1210 can automate various tasks, for example, sending out birthday greetings automatically to members as well as announcing them on the group. Risk and compliance module 1212 can ensure that the groups comply with rules set.

[00185] In another aspect, system disclosed can enable the network to perform a plurality of other services as required. Financial settlements 1214 can be achieved by employing appropriate financial connectors 1216 to connect system disclosed to various finance related services. Such connectors can be for payment gateways, Rupay, retail, membership of paid circles, SMS/USSD for financial transactions etc.

[00186] System disclosed can be employed on any operating system such as IOS, Android and Windows using appropriate mWEB connectors 1218 and corresponding user interface caching 1220. [00187] Various message routing protocols and systems 1222 can be used along with system disclosed to enable usage of enterprise applications 1224. Enterprise applications 1224 can include, for example, ODBC/JDBC, Risk Management, Accounting, System Monitoring, Security and LDAP/SSO.

[00188] Other connectors 1226 can be deployed as required for application management 1228. A plurality of applications can thus be managed. For example entities set-up, rule engine, transaction processing, loyalty, user management, transaction management, eLearning, portals, back office users, regulatory and KYC, fees and pricing and MIS and reporting.

[00189] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.

ADVANTAGES OF THE INVENTION

[00190] Present disclosure provides for a system that develops trusted networks / groups whose members have well-defined common attributes.

[00191] Present disclosure provides for a system as above wherein members communicate amongst themselves in a secure and trusting environment as the networks developed include only known persons, with no fear of an "alien breach".

[00192] Present disclosure provides for a system as above that is operated as a website and/or mobile application accessible via any Internet enabled computing device.

[00193] Present disclosure provides for a system as above that enables networks so developed to deploy the power of groups formed to advantageously achieve several objectives such as economically and properly managing community services of a residential society such as garbage removal, road and light works, security, meeting and lobbying with governmental agencies, financial benefits such as discounts from vendors etc.