Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SOCIAL NETWORK WITH NETWORK-BASED REWARDS
Document Type and Number:
WIPO Patent Application WO/2024/030665
Kind Code:
A2
Abstract:
A user interface system is provided, comprising a content display output for presentation of content to a user; a communication network interface port; and at least one automated processor configured to: receive at least one hyperlink in a social network record of a social network; request content associated with the hyperlink; receive an advertisement associated with at least one of the user, the social network record, the hyperlink, and the content; verify presentation of the advertisement to the user; present the content to the user; and account for presentation of the advertisement to the user, by crediting at least one account distinct from an account associated with the user, an account associated with a content owner, and an account associated with a social network.

Inventors:
MURIQI ARBNOR (US)
Application Number:
PCT/US2023/029578
Publication Date:
February 08, 2024
Filing Date:
August 04, 2023
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
MURIQI ARBNOR (US)
International Classes:
G06Q30/02; G06Q20/38
Attorney, Agent or Firm:
HOFFBERG, Steven (US)
Download PDF:
Claims:
Muriqi-201PCT - 86 - CLAIMS 1. A social network method, comprising: receiving at least one social network record of a social network, comprising a proposal, referral, or recommendation of content, through a network communication interface; requesting and receiving the content through the network communication interface; receiving a communication through the network communication interface; presenting the content and the communication to the user through a content presentation interface; and accounting for at least one of a presentation of the communication and an action predicated on the communication, to the user, by crediting at least one account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. 2. The user interface method according to claim 1, wherein the social network record comprises a history of user interaction with the content, further comprising debiting the account associated with the user for user interaction with the content. 3. The user interface method according to claim 1, further comprising receiving a subjective assessment or comment, wherein the subjective assessment or comment is linked to the social network record, and crediting or debiting the account associated with the user for the receipt of the subjective assessment or comment. 4. The user interface method according to claim 3, further comprising crediting or debiting the account associated with the user for the subjective assessment or comment, based on interaction of other users with the subjective assessment or comment. 5. The user interface method according to claim 1, further comprising crediting the account associated with the proprietor of the social network for the for at least one of the presentation of the communication and the action predicated on the communication. 6. The user interface method according to claim 1, further comprising crediting at least one of the account associated with the user, the account associated a proprietor of the content, and the account of a proprietor of the social network user for a presentation of the communication to the user. 7. The user interface method according to claim 1, further comprising verifying a presentation of the communication to the user. 8. The user interface method according to claim 7, further comprising capturing images of the user with a camera during the presentation of the communication; and verifying presentation of the communication to the user based on the captured images. 9. The user interface method according to claim 1, further comprising accounting for a transaction in a distributed ledger system. 10. The user interface method according to claim 1, further comprising receiving content through the network communication interface from a peer-to-peer distributed database. 11. The user interface method according to claim 1, further comprising receiving the at least one social network record from a decentralized social network database. 12. The user interface method according to claim 1, wherein the communication comprises a commercial advertisement video, and the at least one social network record of the social network, comprising the proposal, referral, or recommendation of content comprises a reference to a social media influencer who references the content, further comprising: receiving a payment from an account associated with a commercial sponsor of the commercial advertisement video; distributing proceeds of the payment to an account of social media influencer being the at least one account associated with the proposal, referral, or recommendation; and further distributing proceeds of the payment to an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. Muriqi-201PCT - 87 - 13. The user interface method according to claim 1, further comprising initiating a transaction to authorize presentation of the content to the user through the content presentation interface, wherein the transaction comprises execution of a smart contract on a distributed virtual machine. 14. The user interface method according to claim 1, further comprising providing an automated recommender; generating the proposal, referral, or recommendation of content with the automated recommender; and selecting or ranking the content for presentation to the user. 15. The user interface method according to claim 1, further comprising storing a user profile; and targeting the communication to the user based on the user profile, wherein the user profile is unavailable to the social network. 16. The user interface method according to claim 1, further comprising communicating with a generative pre-trained transformer comprising a large language model, which processes social network records and generates the proposal, referral, or recommendation of the content. 17. The user interface method according to claim 1, wherein: the social network record comprises at least one hyperlink to the content; and the communication comprises an advertisement selected based on at least the user, the social network record, and the content. 18. The user interface method according to claim 17, wherein the account is credited contingent on at least one of a presentation to the user of the advertisement, and consummation of a commercial transaction after display of the advertisement. 19. The user interface method according to claim 1, further comprising communicating with a distributed ledger comprising a blockchain through the network communication interface; and the crediting the at least one account comprises performing a transaction to credit a cryptocurrency token to a cryptocurrency wallet. 20. A decentralized social network method, for operating a device comprising a content presentation interface; a network communication interface; and at least one automated processor, the method comprising: receiving at least one social network record of a social network, comprising a proposal, referral, or recommendation of content, and a resource locator for the content, through the network communication interface; issuing a request for the content by communicating the resource locator through the network communication interface; receiving a sponsor message through the network communication interface associated with a smart contract, the smart contract defining a transaction comprising a cryptocurrency payment for at least one of a presentation to a user of the sponsor message and an action by the user predicated on the sponsor message; and accounting for the at least one of a presentation to the user of the sponsor message and the action predicated on the sponsor message, by executing the smart contract to conduct the transaction on a distributed ledger, crediting at least one cryptocurrency account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. 21. A social network system, comprising a content presentation interface; a network communication interface; and at least one automated processor, the at least one automated processor being configured to: receive through the network communication interface at least one social network record of a social network, comprising a proposal, referral, or recommendation of content; receive the content through the network communication interface; receive a communication through the network communication interface; Muriqi-201PCT - 88 - present the content and the communication to the user through the content presentation interface; and account for at least one of a presentation of the communication and an action predicated on the communication, to the user, by crediting at least one account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. 22. The user interface system according to claim 21, wherein the social network record comprises a history of user interaction with the content, and the at least one automated processor is further configured to debit the account associated with the user for user interaction with the content. 23. The user interface system according to claim 21, further comprising a user input device configured to receive a subjective assessment or comment, wherein the subjective assessment or comment is linked to the social network record, and the at least one automated processor is further configured to credit or debit the account associated with the user for the receipt of the subjective assessment or comment. 24. The user interface system according to claim 23, wherein the at least one automated processor is further configured to credit or debit the account associated with the user for the subjective assessment or comment, based on interaction of other users with the subjective assessment or comment. 25. The user interface system according to claim 22, wherein the at least one automated processor is further configured to credit the account associated with the proprietor of the social network for the for at least one of the presentation of the communication and the action predicated on the communication. 26. The user interface system according to claim 22, wherein the at least one automated processor is further configured to credit at least one of the account associated with the user, the account associated a proprietor of the content, and the account of a proprietor of the social network user for a presentation of the communication to the user. 27. The user interface system according to claim 22, wherein the at least one automated processor is further configured to verify presentation of the communication to the user. 28. The user interface system according to claim 27, further comprising a camera configured to capture images of the user during the presentation of the communication, wherein the at least one automated processor is further configured to verify presentation of the communication to the user based on the captured images. 29. The user interface system according to claim 22, wherein the at least one automated processor is configured to account for a transaction in a distributed ledger system. 30. The user interface system according to claim 22, wherein the content is received through the network communication interface from a peer-to-peer distributed database. 31. The user interface system according to claim 22, wherein the at least one social network record is received from a decentralized social network database. 32. The user interface system according to claim 22, wherein the communication comprises a commercial advertisement video, the proposal, referral, or recommendation of content comprises a reference to a social media influencer who references the content, and the at least one automated processor is further configured to receive a payment from an account associated with a commercial sponsor of the commercial advertisement video, distribute proceeds of the payment to an account of social media influencer being the at least one account associated with the proposal, referral, or recommendation, and further distribute proceeds of the payment to an account associated with the Muriqi-201PCT - 89 - user, an account associated a proprietor of the content, and an account of a proprietor of the social network. 33. The user interface system according to claim 22, wherein the at least one automated processor is further configured to initiate a transaction to authorize presentation of the content to the user through the content presentation interface, wherein the transaction comprises execution of a smart contract on a distributed virtual machine. 35. The user interface system according to claim 22, further comprising an automated recommender configured to generate the proposal, referral, or recommendation of content, and to select or rank content for presentation to the user. 36. The user interface system according to claim 22, further comprising a memory configured to store a user profile, wherein the at least one automated processor is further configured to target the communication to the user based on the user profile, wherein the user profile is unavailable to the social network. 37. The user interface system according to claim 22, wherein the at least one automated processor is further configured to communicate with a generative pre-trained transformer comprising a large language model, configured to process social network records and generate the proposal, referral, or recommendation of the content. 38. The user interface system according to claim 22, wherein the social network record comprises at least one hyperlink to the content, and the communication comprises an advertisement selected based on at least the user, the social network record, and the content. 39. The user interface system according to claim 38, wherein the account is credited contingent on at least one of a presentation to the user of the advertisement, and consummation of a commercial transaction after display of the advertisement. 40. The user interface system according to claim 22, wherein the network communication interface is configured to communicate with a distributed ledger comprising a blockchain, and the at least one account comprises a transaction to credit a cryptocurrency token to a cryptocurrency wallet. 41. A decentralized social network system, comprising a content presentation interface; a network communication interface; and at least one automated processor, the at least one automated processor being configured to: receive at least one social network record of a social network, comprising a proposal, referral, or recommendation of content, and a resource locator for the content, through the network communication interface; issuing a request for the content by communicating the resource locator through the network communication interface; receive a sponsor message through the network communication interface associated with a smart contract, the smart contract defining a transaction comprising a cryptocurrency payment for at least one of a presentation to a user of the sponsor message and an action by the user predicated on the sponsor message; and account for the at least one of a presentation to the user of the sponsor message and the action predicated on the sponsor message, by executing the smart contract to conduct the transaction on a distributed ledger, crediting at least one cryptocurrency account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. 42. A media player, comprising: a cryptocurrency wallet; a communication network interface; a media user interface; a user interface configured to receive a user rating or endorsement of media; Muriqi-201PCT - 90 - at least one processor configured to present selected media to a user, communicate the user rating through the communication network interface, and process distributed ledger transactions relating to the cryptocurrency wallet, wherein at least one transaction relates to a media cost and at least one transaction relates to a media subsidy. 43. The media player according to claim 42, wherein the at least one processor is further configured to interact with a social network database, wherein the user rating or endorsement of media is communicated to the social network database through the communication network interface. 44. The media player according to claim 42, wherein the communication network interface comprises a peer-to-peer ad hoc communication network, and the social network database comprises a distributed database. 45. The media player according to claim 42, wherein at least one transaction results in processing cryptocurrency transactions in at least three different cryptocurrency wallets. 46. The media player according to claim 42, wherein the at least one processor is further configured to communicate through the communication network interface using a virtual private network. 47. The media player according to claim 42, wherein the at least one processor is further configured to perform a homomorphic cryptographic operation. 48. The media player according to claim 42, wherein the at least one processor is further configured to perform a fully homomorphic cryptographic operation. 49. The media player according to claim 42, wherein the at least one processor is further configured to implement a media content recommender. 50. The media player according to claim 42, wherein the at least one processor is further configured to implement an advertisement media content recommender. 51. The media player according to claim 42, wherein the at least one transaction has a cryptocurrency valuation dependent on the user rating or endorsement of the media. 52. The media player according to claim 42, wherein the at least one processor is further configured to: receive at least one hyperlink in a social network record of a social network; request media content associated with the hyperlink; receive advertisement content dependent on at least one of a user, the social network record, the hyperlink, and the media content; verify presentation of the advertisement content through the media user interface to the user; present the media content to the user; and account for presentation of the advertisement content to the user, by crediting the cryptocurrency wallet. 53. The media player according to claim 52, wherein the hyperlink references a media object stored in a peer-to-peer file storage system. 54. The media player according to claim 52, wherein the media content and the advertisement content are stored in a distributed database. 55. The media player according to claim 52, wherein the cryptocurrency wallet is cryptographically accessible by the user through a wallet user interface and is cryptographically accessible by an administrator through an administrator user interface. 56. The media player according to claim 52, wherein the communication network interface comprises a cellular network Muriqi-201PCT - 91 - communication transceiver. 57. The media player according to claim 52, wherein the cryptocurrency wallet is owned by a user and is configured to support credit transactions and debit transactions without advance user authorization. 58. A social network, comprising: a distributed database comprising user records and content records; a distributed ledger, configured to authenticate ownership and authority to transfer a cryptotoken with respect to at least lack of prior encumbrance, and maintain an immutable record of a cryptotoken transaction; and a user interface device, configured to receive content records from the distributed database, dependent on user records from the distributed database, and update a respective user record. 59. The social network according to claim 58, further comprising a distributed virtual machine configured to process a smart contract which controls the cryptotoken transaction to allocate the cryptotoken between at least two cryptotoken wallets, in dependence on parameters of the smart contract, wherein the user interface supplies at least parameter of the smart contract. 60. A social network, comprising: a social network database comprising user records, content records, and advertising records; a user interface configured to present content records and advertising records to a user; and a payment system configured to receive a payment from an advertiser and distribute a first portion to a content provider and a second portion to a recommender of the content. 61. A social network system, comprising: a distributed database of social media records, the social media records comprising content references, relationships between people, relationships between persons and content, and at least one of subjective assessments and comments; a distributed virtual machine configured to execute smart contracts in conjunction with a blockchain; and a distributed ledger associated with the blockchain, storing smart contracts, wherein at least one smart contract is configured to execute on the distributed virtual machine to distribute a portion of a sponsor payment of a cryptocurrency token to a cryptocurrency wallet defined by the social media record.
Description:
Muriqi-201PCT - 1 - SOCIAL NETWORK WITH NETWORK-BASED REWARDS FIELD OF THE INVENTION The present invention relates to a social or user network that provides network-activity based rewards or incentives (or disincentives) to participants to encourage or discourage activities. BACKGROUND OF THE INVENTION Each patent and non-patent literature reference cited herein is expressly incorporated herein by reference in its entirety as if expressly recited explicitly herein, for all purposes. Numbers refer to US Patent or Published Patent Application Nos., unless otherwise indicated. The various disclosures of known concepts discussed herein are intended to be combined and permuted in accordance with the disclosure, to achieve the configurations and functions described. A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for analyzing the structure of whole social entities as well as a variety of theories explaining the patterns observed in these structures. The study of these structures uses social network analysis to identify local and global patterns, locate influential entities, and examine network dynamics. Social network analysis represents an approach to understanding peer influence in larger social contexts. Social network analysis relies on the mapping of relationships or ties between different individuals. Individuals may be linked to one another through any number of relationship types or associations, from friends, associates, or individuals with whom they spend time. Social networks are typically identified through asking individuals to nominate all of their relationship ties within a certain context. In typical social networks, the user receives benefits from using the network for free, but is subject to advertising or various other forms of monetization of the user or the user’s information. An advertiser or subsidy provider pays, and the platform proprietor receives the payment. In content distribution networks and systems, users pay a subscription or content viewing fee and/or an advertiser pays for ads or product placements. In each case, the economic transfers fail to accurately address all economic and social costs, and therefore the result is suboptimum. According to one aspect, a distribution algorithm is provided that addresses a plurality of, and preferably all, relevant factors. For example, in a social network, a referrer of content has a cost, e.g., opportunity cost, which is compensated by a valuation function. In complex economic transactions amongst multiple parties in an electronic network, in which trust may be required, it is advantageous to employ cryptocurrencies authenticated on a distributed ledger. Likewise, the economic transactions may be defined and controlled by a smartcontract. When the economic transactions impact the real economy, government regulations may require tax and transaction reporting, know-your-customer compliance, etc. The use of distributed ledger/blockchain transactions, and smartcontracts can assist in compliance with government regulations. The tokens may represent arbitrary units of wealth, a fiat currency, or other unit such as a commercial points program (e.g., airline miles, credit card points, S&H stamps [en.wikipedia.org/wiki/S%26H_Green_Stamps], etc.). SUMMARY OF THE INVENTION The present invention involves use of incentives or disincentives to facilitate overall value and benefit of a user network, such as a social network. The incentives may be in the form of cryptocurrency or cryptographic tokens, and may be distributed to various participants (or abstaining non-participants) according to a comprehensive value function, such as content providers, resource providers, content recipients, investors, etc. The tokens are supplied by beneficiaries, who may be, for example, advertisers, media consumers, investors, or other sponsors, for example. The network may be partially or fully decentralized, or operate on a hybrid model, in which a privileged centralized infrastructure exists and is available to perform or facilitate system operations, but is not required for operation of the network. Indeed, the decentralized Muriqi-201PCT - 2 - option constrains the privileged centralized infrastructure to abide by its rules or constraints, at risk of being demoted. The network has different functions, which may be consolidated or segregated, in which various functions are independently implemented, using various options. The system has a centralized, decentralized, hybrid, or other control mechanism to apply the costs and benefits to the various participants or affected parties. In the simplest case, the costs and incentives/disincentives have predetermined and published values, so that each party may have advance notice of the value of participation. In more complex implementation, the control provides a dynamic economic optimization, or a dynamic decentralized economic optimization, which may take the form of an auction or multipart auction. A particular use case of the system is a social content recommendation and distribution system. In this network, the major participants are content creators, content consumers, advertisers, network operators, and recommenders/influencers. Of course, other participants may be included as well. In this case, a content creator is typically compensated for making the content available, though in the case of promotional content (which may be advertising), the content provider pays for consumption of its content. Advertisers pay for placement of their messaging (though particularly popular ads may achieve meme status, and obtain positive utility and payment to the advertisement proprietor). The content consumer in this case has at least two economic functions, payment for content consumption, and subsidy payment for accepting and reviewing advertisements. The amount and value of the content and advertisements will determine the net user accounting. The network operator receives a payment or commission from some or all of the transactions on the network. Finally, recommenders and influencers, which serve to bias the network and give it character, receive payments for the value of their contributions. The network may also include investors, who provide payments to facilitate system operation, and receive return on investment from revenue streams. The investor function may be integrated with the network operator, or distinct from it. The recommenders/influencers serve as peer leaders and visionaries, to define social norms, trends and political correctness. They pass value judgements, and cancel members. The network operator may exert control over the use and weighting of recommender/influencer effects, though in a fully decentralized system, the network operator may have little or no influence. In various embodiments, the network operator, or other privileged member of the network may influence its control over the network through privileged tokens that differ from the normal participant tokens, that are used to control or bias/weight functions. The privileged tokens have different characteristics from “consumer” tokens, but operate within the optimization and targeting algorithms cooperative and competitive with the consumer tokens. There may be a plurality of different privileged tokens. These privileged tokens may be burnt (deactivated) during their use, transformed into another token type, distributed to other participants, or other disposition. In general, the common token has an economic value, and has a limited supply and positive demand. One type of privileged token has an unlimited supply to the network operator, and insignificant demand, such as due to restrictions on use. As a result, the value is zero or near zero, except to the network operator. The privileged tokens therefore perturb the targeting and compensation algorithms, and excess use will destabilize the network. As a result, the network operator is constrained by its own pecuniary interest to limit its privileged control over the network. The network operator may also use common tokens, though the costs may be prohibitive. The media distribution social network is built around client software, which provides a media player with digital rights management support, cryptocurrency wallet and transactional support, and other social network functions such as referral/recommendation and messaging. In order to preserve privacy, communications may be encrypted end-to-end, which may be performed using transcryption (untrusted intermediary) and/or homomorphic cryptography (operations on encrypted messages). The client software may operate as part of a decentralized ad hoc communication network, obviating the need for a massive scale Muriqi-201PCT - 3 - centralized infrastructure. The client software uses and manages local storage, and broadband network access to communicate with other client software. Messages within the network may be routed using local routing tables, metadata, distributed ledgers, central database lookups, etc. Direct communications with a central server are also supported, thereby maintaining a conduit for the social network proprietor to exercise some control and ensure network stability. In a prototypical embodiment, a social network is provided with a centralized or decentralized social network database, storing relationships between people and other objects, associated characteristics and information, and links to content and subsidized content (advertisements). In a decentralized database, the records may be stored in a decentralized ledger, with cryptographic protection of the content except with respect to authorized recipients. Typically, the distributed database would be replicated or near-replicated in a centralized location. In contrast to a cryptocurrency blockchain, immutability and perpetuality of data records are not necessarily critical characteristics of this aspect of the system. The token system, in contrast, preferably has characteristics of a more typical cryptocurrency blockchain. The various distributed ledgers may be consolidated or separate. The social network database is updatable, and according to social network rules, records may be purged and/or modified. Thus, the social network distributed ledger need not be immutable or non-repudiable, and therefore may be simplified with respect to a Bitcoin style blockchain. In the social network, one typical aspect is that users consume content. The content is sponsored by advertising. Content is recommended or suggested to users according to the social network by referrers or influencers, in addition to automated recommenders. The responsible referrer(s) or influencer(s) receive a portion of the subsidy for the content as compensation, and thus become incentivized for their activities within the social network. Users may also receive a portion of the subsidy as incentive for participation. Each participant in the system registers with a registrar, which may be a part of the system or external. The registrar performs user verification and authentication, and assures proper reporting to regulatory authorities. The registrar issues a credential, which may thereafter be used anonymously (pseudonomously) in the network. The registrar may be, for example, a bank, professional employer organization (PEO), credit card issuer, or other financial institution. The social network may include various features of existing social networks and other related systems, and the features discussed above are not mandatory. The elements of the system may be provided with an application programming interface, which segregates the underlying resources and functionality, from the operational paradigm and implementation as a skin. The network may support multiple skins concurrently, or the network may be segregated between system that have different skins. In the former case, filters may be used to isolate or restrict content sharing across different skinned applications, while sharing the same infrastructure. The system interacts with a user through client software, which interacts with both a peer-to-peer network and a central server (where available and supported). A distributed ledger transactional database performs fine-scale accounting for information flows and monetary or token transactions. Therefore, the system is less subject to censorship and government regulation than fully centralized systems. However, the client may provide for central control or third party control, as a moderating influence, to ensure system stability, or to provide a value-added service. The availability of an application programming interface (API) and reduced reliance on a single central service provider makes possible competition for required or optional services, with associated token transactions, further extending the range of interactions supported through the platform. For example, while freedom from censorship and anonymizing virtual private network communications are features desired by some users, others prefer or require a “walled garden” with curated content and centrally controlled or managed interactions. For example, where Muriqi-201PCT - 4 - the system and method is deployed in a business environment, and especially a regulated business, all communications may be authenticated and logged, content filtered for malicious content, secret exfiltration attempts, user time-wasting, phishing attempts, etc. The business may prefer to avoid all third party advertising, and simply pay (self-subsidize) network usage. Other examples are religious or social groups that wish to implement a biased system toward their own beliefs or norms, and to exclude, tag, or diminish opposing or antithetical beliefs. While as a general feature for all users, such control is undesired, a user or group of users may voluntarily accept external limitations. A still further example are persons or groups for which the embedded payment scheme is unacceptable. For example, business employees should normally not be paid by third parties for work supposedly on behalf of the employer. Likewise, some persons may wish to remain anonymous on the network, and regulations in the US for users which accept payment transactions require compliance with know-your-customer regulations. Therefore, a user may simply wish to opt-out of accepting payments, and therefore heightened authentication requirements. Therefore, the user interface is preferably modular, with a rich API, that allows extensions of the functionality and customization of both functionality and aesthetics. The modules are preferably cryptographically signed and authenticated with a supervisor, which acts as a hypervisor that executes a virtual machine and associated operating system isolated from other processes executing on the same platform. This helps avoid malicious additions and helps protect the system from other malicious processes, especially those modules that directly or indirectly influence the distributed ledger transactions. Likewise, such functions as biometric authentication and cryptocurrency wallet may be held to a higher standard than other modules or extensions. The system architecture may provide a hypervisor executing on a host platform, which in turn executes an operating system such as Linux, Android, iOS, or Windows, which in turn provide security features and execute modules or apps. The memory access, interrupts, and I/O requests all pass through the hypervisor, which itself may make use of a trusted platform module for root authentication. A fully anonymous and privacy preserving version, on the other hand, avoids use of any persistent identifiers, and does not maintain a unique wallet or accept identified token transactions. The social network according to the present technology may include a number of component interests, including a proprietor, content providers, advertisers, and users. Architecturally, it is preferably a decentralized network with privileged routes of communication to the network operator/proprietor. Operation of the system is preferably stabilized using a blockchain type decentralized ledger, which may be permissioned, public, or a hybrid. Operation of the system is influenced by an economic optimization, which seeks to include accounting for the interests of each participant in the system in a consolidated function. A blockchain is a system that creates authenticated blocks which are predicated on prior blocks, and which are therefore a small subset of the entire network record. This block architecture therefore allows some nodes to maintain an incomplete record of the entire database, while ensuring that new transactions may be authenticated, and as appropriate, non-repudiable, at all relevant nodes regardless of their historical databases. Blocks referenced in new transactions and not immediately available may be requested and communicated as needed. Because prior blocks are static and “frozen”, the information contained in them is considered immutable, unless the entire network agrees to replace an old block with a replacement, which then requires all subsequent blocks to be replaced, since they are dependent on a hash of the prior block(s). This is called a “fork”, which is typically a rare event. However, in a small cooperative community, the replacement of a block is possible. An alternate is to return to the block in contest, alter the transaction data, and reprocess all subsequent transactions into new blocks in a batch process, which may be more efficient than processing in a real-time competitive process. For example, because the subsequent blocks are already processed, the cryptographic strength of the batch process (which may be centralized) may be lower, and the competitive process for allocating work minimized or dispensed with, to create the new blocks. In an at-scale social network, replacing old blocks with Muriqi-201PCT - 5 - updated data is likely infeasible and untenable, because the community is large, the cooperation is uncertain, and the risks of desynchronized distributed ledgers is high. The client software may permit interfacing with traditional type advertising syndication platforms, such as Google, Yahoo, and Facebook, and/or a special platform dedicated advertising platform for the social network. In some cases, a user may be a content creator, and/or may sponsor content instead of advertisements (“sponsored content”). The consolidated function typically provides that the advertiser (and perhaps sponsor and/or investor) funds the system according to an advertisement/sponsorship/investment program, in which viewing (or listening) of sponsored content/advertisements by users in a context that promotes the interests of the advertiser leads to a subsidy. That subsidy is then distributed amongst the other participants. In modified systems, other sources of subsidy are obtained and employed. The interests of the advertiser typically include the sale of products or services, though public interest and awareness campaigns are also possible. The advertising campaign may pay per view, click (interaction), sale, commission on sale, subscription, etc. A sponsor may have more diverse interests. An investor is typically more interested in the health of the network and therefore its aggregate value, than in the gain on an individual transaction, but may nevertheless arbitrage differences in economics across the network (and even beyond the network) in order to make a profit. The investor therefore may provide required liquidity and absorb excess liquidity to ensure an efficient market for the other participants. The user has an economic interest in the opportunity cost of its time, and enjoyment of the interaction. The content provider may provide content without expected return (e.g., blog posts), or with expectation of a fixed or variable fee for the content per consumption (e.g., studios), or a blanket license fee, etc. The proprietor/network operator seeks compensation for establishing the opportunity for the other participants, and its own opportunity costs, and generally has the power to set terms on the entire system. In an optimized system, the proprietor in a steady state scenario may seek to maximize its own current revenues or profits, though during transition may define different strategies that do not achieve maximization of current revenues or profits. As the system becomes less centralized and more open to competing interests, the market power of the proprietor is diminished, and the profit seeking behavior becomes competitive, with competitors either internal or external to the social network. The proprietor may also assume other roles, e.g., investor, sponsor, content provider, etc., in the system. In some cases, the advertising may be embedded in content, and therefore the economic analysis of sponsorship, content purveyance, content advocacy, and consumption becomes different. However, in many cases, these perturbations are self-correcting, since the system typically operates as a competitive process between interested parties or their automated agents. In addition to human influencers and recommenders, the system supports automated agents that serve these roles. According to one embodiment, an open API is available for third parties to provide recommender and influencer services, which may be human, artificial intelligence, machine learning algorithms, or other algorithms. While the presence of “bots” on other social networks is considered a nuisance or worse, according to one aspect of the present technology, the application of recommenders and influencers is based on economics and/or success, in a generally competitive process. If a deranged recommender is nevertheless successful in engaging content consuming users and fulfilling their demand, that deranged recommender will be compensated in the same way that any ethical recommender is compensated. Of course, when and if a recommender (human or otherwise) is considered undesirable, it may be banned from the network, or filtered from user streams, or otherwise controlled or constrained. The limits may be imposed by any member based on economic flows, i.e., a content consuming user may restrict particular recommenders from providing a feed to it. The network operator may limit or restrict a recommender across all or a portion of the entire network. An advertiser, sponsor or investor may choose to disassociate from a recommender and not be Muriqi-201PCT - 6 - involved in transactions including it. Recommenders may also interact with each other, and impose rules or controls on that interaction. The present invention relates to a system and method for implementing a social network, which includes explicit referral fee compensation. The compensation is derived from a subsidy flow. Typically, the subsidy is provided by an advertiser, but any subsidy source or revenue stream may be employed. In addition to compensating the platform proprietor (as in e.g., Google, Facebook), other payments may be made, e.g., to the referrer of the content to a user, the user him or herself, upstream influencers, and others whose cooperation with the system is to be incentivized. In some cases, syndicated ads from outside the network may be shown, especially where internal advertising supply is insufficient, e.g., to properly fund system operations. Each participant in the system has a profile, against which rules and algorithms may be applied. The profile may be public, private (locally applied filtering at the user node only), or semi-private, such as usage applied at a central location with privacy applied based on trust, use of homomorphic encryption to employ a profile in encrypted form without decryption, etc. Messages and content may include targeting data or metadata which interact with content and/or user profiles to achieve targeting. For example, a value function may be included in media content that specifies parameters of a valuation function for the content owner. An advertiser may release an advertisement according to an advertisement placement program, targeting user characteristics (e.g., demographics, preferences, etc.), and having a valuation (fixed or algorithmic). The ad then competes with other ads (or blank space) for placement in ad slots, with the ad sponsor paying for ad placement, and the funds distributed according to the system rules. The ad may be worth more when displayed to some users than others. Different ads are generally played to different users, and repetition of ads may be defined by advertiser preferences and ad rules, as well as targeted user rules and preferences. Some incentive payments may be defined by the platform proprietor, and others may be defined by the advertiser or subsidy provider. For example, the user may be compensated for watching the advertisement, the system operator may be compensated for the underlying platform, a provider may be compensated for content, upstream referrers may be compensated for establishing the social network (referral network), commenters may be compensated, etc. The general architecture includes a custom content player, though a browser may be employed as well. The player integrates the display of content and advertisements, digital rights management for content protection, viewer/user verification/authentication, and the economic accounting for the content and advertisements. The player may also implement a digital wallet, e-commerce portal, a distributed ad hoc network for content distribution and redistribution, and social network functions. The network is tied to an economic platform, that may have its own incentives. The economic platform links tokens employed within the social network (electronic payments cannot be a typical fiat currency). The preferred tokens are a blockchain-based cryptocurrency. The blockchain may be a decentralized public ledger, which allows low centralized infrastructure transactions without a single point of failure, or as a permissioned blockchain. The typical token is like a micropayment, for example with a value of less than $1.00, and perhaps less than 1 cent, implying that the level of security required to ensure authenticity is not high, and that the transactional costs need to be maintained as a fraction of the transactional value. The economic platform may process individual transactions or aggregated token transactions. Therefore, especially for referrers, publishers and advertisers, an aggregated transaction may be, for example, thousands of dollars. Therefore, the security of the system should be sufficient for the largest transactions supported, or scalable with different levels for different valued transactions. The payments may be made in arbitrary units, and may represent fiat currency valuation, cryptocurrency valuation or tokens, or other value infrastructures, such as credit card and airlines points valuations. The token platform may be linked to a “rewards program”, to permit barter transactions instead of cash transactions. The rewards program may advantageously be linked to the advertising platform, with vendors both Muriqi-201PCT - 7 - advertising and selling goods on the platform. Under U.S. law, transactions require identification of counterparties, and reporting of payments above a threshold. This function may be within the economic platform itself, or provided as a distinct function and platform. For example, participant identification may be tokenized, with chained cryptographic authentication used to tie the user authentication platform to the economic platform, while preserving privacy. By segregating these functions, and indeed every function, each aspect of the platform may become competitive, with a unitary token exchange provided to connect the disparate parts. While the system need not have all features or any particular feature, the social network implementation typically requires an end user interface with consistent functions and themes, i.e., client software. The client software (optionally in conjunction with a central server) provides user authentication, user profile maintenance, cryptocurrency wallet, content consumption, advertising viewing, content and advertising viewing auditing/verification, referral and commenting, etc. Because of the referral compensation scheme, a part of the social network may include speculation by users of what is likely to become viral, and allowing promoters of the potentially viral content to “bet” on their selections, and receive rewards for correct determination of future viral capability of content. This function may be distinct from an investor function, in that the speculator does not necessarily value the platform, only the return on transactional risk, while the investor seeks a return on investment derived from the success of the platform over time. This internal competition may increase competition for advertising, and thus reduce low cost and presumably low quality (poorly targeted) advertising. The speculation may permit financial investment in the content, wagering (side bets), equity infusion into platform participants, arbitrage transactions, and the like. In some cases, the opportunity for speculation can lead to higher efficiency for underlying transactions, and therefore may present an investment opportunity. However, speculation on underlying risks, without equity in those risks, may have a destabilizing effect and lead to bubbles and crashes. This destabilization may be limited by regulation of the types of speculation and the value, taxing risk-taking or gains from speculation, or other controls. The platform may be integrated with an online gaming platform, with enforcement of legal and regulatory restrictions within the client and other aspects of the system. For example, financial institution “know your customer” regulations, or other financial industry support firms may provide regulatory compliance functions. Of course, these functions may be internal to another participant in the system. Because there are token exchanges, the gaming may include embedded advertising, or the advertising itself may be gamified. Tax regulation compliance may be provided intrinsically for all transactions having a monetary impact. In some cases, a participant may wish to avoid government tax regulations, in which case, for that user, no external transfers of wealth are permitted; therefore, according to mainstream interpretation, no income or gains are possible. While in some cases, this may block the user from functions otherwise supported by the platform, in other cases, an internal account may be used for content consumption subsidy, or other purely internal functions. Preferably, one or more application programming interfaces (APIs) are provided for third parties to enhance and extend the system. Each API may be linked to a central or distributed command and control infrastructure, the client software, and/or a blockchain virtual machine. The system may include payment processing. That is, because of the financial system integration and regulatory compliance aspects, as well as the wallet infrastructure, payments may be made and received through the system, for both consumer and commercial accounts. Internal payments may be made with low transaction fees, and have the advantage of adding liquidity to the platform. External transfers may employ traditional technologies at competitive rates. The internal token preferably has the characteristics of a stablecoin, i.e., tending to maintain a constant valuation with respect to fiat currency, especially over short periods. However, this is not a limitation on the system as a Muriqi-201PCT - 8 - whole. However, participants may act quite differently when payments are made in stablecoins as opposed to market-valued tokens. For example, a stablecoin would incentivize a participant to maintain tokens in an account, while a market valued token would incentivize a risk averse participant to liquidate tokens at earliest opportunity. The ability to monetize transactions is important, as the various businesses operate in the macroeconomy and therefore a stable and scalable exchange is important (though not critical for all implementations). Note that the business interests would generally not use the system for long-term savings, and therefore exchange rate stability over long terms is less critical than short term liquidity. Consumers and speculators, on the other hand, may be interested in investing in the platform, and may therefore store wealth in the platform on expectation of return on investment. In order to avoid risk of coordinated speculator action (i.e., mass selloff or buying), limits on sales may be implemented. This would generally limit external exchange, but not activities within the platform. The platform may also implement an auction-style selling site, to permit consumer sale and purchase transactions. In a preferred implementation, a cost function is applied for various aspects of system operation, including predicates, and an advertiser or subsidy fee may be split between the platform, the user (i.e., viewer of an ad), content provider (to the extent required or appropriate), referrer (and perhaps upstream referrers), and any relevant others. The cost function sets a minimum cost for a transaction (or in some cases, a maximum or permissible range) and an allocation of proceeds among the participants. In a typical implementation, a group of advertisers establish competing campaigns to deliver ads to users based on content consumed, demographics, user profile, user history, etc. The advertisers compete to establish pricing, which may be individualized, clustered, or fixed price for example. The advertiser provides the main financial input, and escrows tokens to fulfill the campaign with a smart contract on the blockchain. As an advertisement is delivered, and optionally viewing of the advertisement verified, and optionally authentication of the view performed, the appropriate token(s) are released from the escrow. In general, these are fungible tokens, though in some cases non-fungible tokens or classes of tokens may be employed. The release of the token(s) from escrow by the smart contract also leads to their disposition, according to the smart contract terms. The smart contract is “funded” by the sponsor (or other funding source), and may be a generic template or a specific smart contract generated by the sponsor. A portion of the sponsorship is allocated to the platform, which may be a fixed fee, a commission, or some other basis. Preferably, a portion of the token(s) are allocated by the smart contract to the referrer. The referrer is typically the referrer of the content associated with the sponsorship, but is not so limited. In another case, it is the advertisement that is referred to the end user. In other cases, the referrer has a tie to the referee, and is compensated on that basis, in the manner of a multi-level marketing network. Similarly, various relations of the referrer or referee may be compensated, such as further upstream referrers, other social ties to the referrer or referee, charitable causes of the referrer or referee, creditors of the referrer or referee, tax authorities (e.g., tax withholding), and the like. Optionally, the referee may be compensated for viewing of the advertisement. For example, if the content has a predetermined price below the portion of the advertisement subsidy allocated to the viewer, the excess may accrue to the account of the viewer. This account may then me used to consume commercial-free content, make up for content that is more expensive than the ads provided to subsidize it, or any other purpose. The referee may further refer the content, advertising, etc. to a contact, and become the referrer in that case. In some cases, communications and token transfers between various participants may be performed in an ad hoc manner, without central control. For example, without central control, unilateral censorship is avoided. However, users may opt-in to restrict, limit or filter communications, undesirable advertising, content, etc. Indeed, the system is not limited to a unitary type of token (though in competitive environments, there should be an exchange to perform economic valuation of disparate opportunities). Therefore, multiple blockchains, smart Muriqi-201PCT - 9 - contract term types, smart contract platforms, etc., may all be employed using a user or machine single interface. Extending this paradigm further, there may be multiple independent network operators, each with their own native token for operating their controlled resources. Other independent portions and agents on the internetwork may then process different tokens, or exchange then with other tokens for processing. For example, a user (or a control entity over the user) may wish to self-censor objectionable content, advertising, and communications. Therefore, a filter may be provided which limits access to that information. The content permission rules may be applied in a central authority, in the client application, in a blockchain virtual machine, etc. Advantageously, content permission rules are distributed on a blockchain, and are updated by a superuser or other privileged participant. An inverse way of addressing content permission is to consider subscription based content, where content is only available to a viewer who meets certain criteria, such as payment of a subscription fee, or personal authentication. The inclusion of referrers within the compensated group allows use of an attention token as part of a social network. While referral networks may be based on pre-existing relationships between social network participants, the system may also permit new relationships to evolve, either by manual selection or automatically. In the case of automatically proposed relationships, the individuals referring the content to the user may be selected based on unique attributes that those individuals have that allow them to have better insight than other persons. These individuals can influence the user’s decisions’ because of high correctness, reputability or other factors determined to be relevant. The “influencers” (peer leaders within the group) may be algorithmically determined dependent on a large data set that uses user profiles, outcomes, feedback, and tendencies. Applying known habits and behaviors to tagged data, clusters of advertising types may be developed and refined for accurate and precise marketing to target audiences from specific peer leaders. See, US 11,216,428; US 10,282,762; US 9607023; US 2013/0317908; US 2018/0204111; Doshi, Ronak, Ajay Ramesh, and Shrisha Rao. "Modeling Influencer Marketing Campaigns in Social Networks." IEEE Transactions on Computational Social Systems (2022). The advertisements may be provided in a traditional manner, through an advertisement server and according to campaign parameters. The campaign may target specific users or user profiles, and charge different fees for different users, for repeat presentation, etc. The ad server may seek to maximize platform profit, though different measures of profit or benefit may be employed. The targeted user may receive a portion of the payment, and the user may itself establish a campaign profile to price or limit ads presented, and other parameters. See, www.investopedia.com/terms/b/basic-attention-token.asp A particular aspect of an embodiment of the technology is that the platform is a social network, in which, for example, content is referred from one user to another, or relationships between users or content is exploited in operation of the system. If a user refers content to another user, the referrer may be compensated. Depending on the scheme, upstream referrers may also receive compensation in the style of a multi- level marketing system. The advertiser or sponsor may seek to generate a transaction with the targeted user, and therefore the referral fee may be dependent on the transaction itself. In an outcome-priced sponsorship scenario, all or a portion of the compensation is deferred unless and until a transaction is consummated, and often the rescission period expires. Because this is less preferred by at least the social network platform and content provider elements of the network, a hybrid compensation scheme is preferred. In a higher stakes risk and reward scenario, the referrer accepts a reward at least partially dependent on a rating of the referred content, product or service by the recipient. In some cases, a negative reward, i.e., penalty, is applied to a referrer whose reference is undesirable or “bad”. In some cases, the referee may have an option to reduce the reward to the referrer to at least zero, and with limits and constraints, to Muriqi-201PCT - 10 - impose a cost upon the referrer for an improper or undesired reference, or for a referral to a product or service that fails to fulfill expectations. This kind of risk will tend to improve quality of referrals, since the referrer has a cost of reference. Another option is to provide functionality within the system to select (or automatically select) the best (most optimal) referrers for any target. In other words, not everyone seeks to “keep[] up with the Kardashians”. Not everyone prefers five-star restaurants or hotels, even for the same price. On the other hand, some people prefer exclusivity, can afford “the best”, and seek assistance in identifying opportunities to experience it, even if higher costs for essentially the same product or service are incurred. By determining consumer profiles and preferences, and aligning referrer style with the referee utility function, referrals may be made that achieve highest social gains. Because a vendor transaction is often outside of the social network, unless the payments pass through a payment system provided by the social network, the transaction and compensation for the transaction may be off-chain or off-network, and not enforceable by an applicable smart contract. The risks inherent in hybrid on-chain and off-chain transactions may be mitigated by providing incentives for reporting of transactions. For example, a user that issues a transaction may receive token(s) for reporting the transaction and/or reviewing the vendor or the product or service. A discount may be provided for orders placed through the social network platform. Likewise, the transactions may be tied to a network-affiliated logistics supplier, which can assist in tracking orders and deliveries. Audits may also be used to ensure compliance. See, US 2022/0092624, and US 11282336. According to the social network paradigm, the referred content should be preferred by the targeted user, e.g., have a higher ranking in terms of user preferences than foregone content. Given the limited attention capacity of the targeted user, preferred referrals are rewarded, and non-preferred referrals not rewarded or even penalized. For example, a social media influencer may himself or herself stake the referral, either to individual targeted users, or to a community. If the targeted users “like” the referral, then the system rewards the referrer. On the other hand, if the referral is undesirable, then the referrer may be denied compensation or affirmatively penalized. In similar fashion, if a referral is automatically generated, the process provider that offered the referral may be penalized for poor performance. Thus, as an additional element of compensation, a broker or middleman may be provided that matches referrers (or itself acts as a referrer) with a consumer. The broker or middleman receives compensation for the presentation dependent on feedback from the user. In extreme cases, the broker or middleman receives no compensation or is affirmatively penalized. Normally, however, the broker or middleman receives a competitive payment for its service. The penalty may be monetary, or social. Thus, according to one aspect, an “influencer” may be downgraded by poor evaluations of referral quality. According to the economic scheme, content based likes and dislikes may be distinct criteria from the compensation relating to the advertising. Because the advertising is distinct from the referred content, and the advertisers ends may be met even if the associated targeted content is disliked, the advertising exchange may reward advertisement views regardless of referred content. That is, the status as an influencer relates to their capacity to recommend, while the economics follow from number of referrals, click-throughs, transactions, etc. In general, the behavior of each participant is incentivized by a reward (and/or penalty) structure. Therefore, behavior of the user/consumer should also be incentivized (and/or disincentivized) to conform with the desired behaviors or avoid undesired behaviors. For example, consumer reviews may be corrupted for various reasons independent of the quality of the product or service. Further, various reviews are applied to the wrong products or services, or vendors, and may apply to factors other that the subject of the review. Finally, reviews (which are a kind of recommendation or referral) may be falsified. By linking the economic interests of the individual to the social data in the database, incentives for optimality may be provided. Thus, a Muriqi-201PCT - 11 - user who is subject to the review or recommendation can rate the reviewer, which can have a direct economic impact by way of reward or punishment, or a less direct impact be promoting or demoting the reviewer in a ranking or evaluation, which may then be used to determine which referrers obtain opportunity. In some cases, economic optimality may be perturbed by a non-economic or bias factor. For example, the network operator may have a woke bias, MAGA bias, liberal bias, Christian bias, etc., and impose this boas on the network as a perturbation of the economic optimization that targets media to consumers. Therefore, this does not directly act as a filter or restriction, and rather a weighting that is permissive of opposing viewpoints while emphasizing conforming viewpoints. Determination of media content may be performed using a large language model (LLM), such as a generative pre-trained transformer system, e.g., ChatGPT, to understand the content of a work, its tone, bias, viewpoint, and other factors. The artificial intelligence (AI) system can operate on semantic components of media, or in a multimodal fashion. The AI system can perform specific functions within the network, or operate as a core function handling a variety of integrated tasks. For example, the AI may select and rank the content to be presented to a user, adaptively match ads to the selected content, and determine compensation for the participants in the network. The LLM typically requires substantial resources, more that can be realistically provided at each node. Therefore, the AI and/or LLM resources are typically centralized or cloud resources. On the other hand, the AI/LLM resources may analyze the media in a batch process, and append metadata to each record, that is available for processing by distributed nodes. A hybrid approach is also possible, where a centralized system selects a group of available media (subset) from a much larger universe (set), and the distributed system ranks that list for presentation to the user. The subset may be periodically adaptively updated. The subset may be derived from public selection criteria only, while the ranking may include private criteria as well. In a similar way, the economic analysis may also be performed centrally, with each record of the set tagged with the economic allocation parameters, so that the economics may be applied to the ranked subset. According to one aspect of the invention, a collaborative filter is implemented which clusters people with similar tastes, so to optimize the predictive nature of a rating for members of the cluster. Alternately, collaborative filter is asymmetric, with user who have predictive capacity for acceptability of recommendations identified to lead a cluster. Preferably, the data flows within the social network are monitored for aberrations. Given the decentralized nature of the platform, it is important to provide continuous monitoring and reporting, and a circumvention system which permits a graceful shut down of the system in case of hacking or unexpected operation. Most importantly, the state of the block chain is preserved, and further transfers are escrowed or blocked. Further, because an early indication may be incorrect, the early warning system preferably is sensitive, a complete system shutdown is preferably avoided initially. The operative system preferably provides a privileged API, which provides an ability to download state and log information, and alter system operation, i.e., update the software, while executing in a limited mode. Exercise of the API is preferably authenticated through a blockchain, which may be the same or distinct from the economic platform blockchain. For example, the command and control interface may employ a distinct non-public (privileged) blockchain, which reduces the attack surface of the system, and allows the primary blockchain to be inactivated as necessary without preventing all access. Compensation of participants may be performed using tokens, i.e., cryptocurrency tokens. For example, an advertiser may define a campaign based on a budget represented as tokens which are paid with advertising placement. The player used by the targeted user triggers a transaction upon playing the advertisement to the user. Evidence of viewing of the advertisement may be obtained by biometric confirmation, e.g., facial recognition of the user at the time of playing the ad, or other confirmation. In some cases, the content itself is subject to a digital rights management (DRM) protection scheme, and the owner of the content also receives compensation, which can be paid through the same player as the advertisement. While the compensation trigger for the content may Muriqi-201PCT - 12 - be independent from the compensation trigger for the advertisement, if the advertisement precedes the content play, then the accounting may be consolidated. On the other hand, if the DRM payment is triggered before the advertising payment, then if the advertising payment fails, the user is liable for the DRM payment. This, in fact, may be a feature of the system, since the risk of user liability for non-compliance with system may help prevent various types of fraud. On the other hand, it allows the user to avoid advertising by simply paying for use of the system. The compensation for media content may be hybrid between different paradigms, such as a minimum set fee per use, plus and allocated portion of the variable compensation available through the system. The distribution of the compensation may be made to various rightsholders for the media, e.g., through a smartcontract or other set of rules. By using a cryptocurrency token system, the payment architecture is decentralized, and the need for a high reliability centralized infrastructure minimized or eliminated. Therefore, system infrastructure cost may be reduced, and various aspects of the system may become competitive, such as advertising syndication, content syndication, player design, affinity groups, etc. The payment to the referrer, targeted user, content owner, may exceed U.S. Internal Revenue Service reporting thresholds. Therefore, the user account may be fully authenticated and verified, and supply a W-9 form. The player/social networking application may act as a cryptocurrency wallet for other purposes, and the currency may have value outside the network. Further, the value outside the network may be, for example, a “points” program, such as airline miles, credit card points, etc. The technology may employ aspects of traditional mechanisms for targeting advertisements, modified as discussed herein. A computer implemented method for recommending products and services can be provided. The method can enable a user to use the user interface to tune search results from a recommendation system. Interest input from the user can be received by the recommendation system. Interest-related categories of products or services to recommend to the user are determined based on the user interest input. The search results of the interest-related category recommendations are displayed. Each interest-related category recommendation is displayed with an associated slider bar. The user can use the slider bar to adjust the relevancy score of a respective interest-related category recommendation. The system can respond to the slider bar adjustment by recalculating the relevancy score of that respective interest-related category recommendation. The interest-related category recommendations can then be updated and redisplayed. The initial position of the slider bar represents the degree of the relevancy score. The relevancy score represents a normalized relevancy weight. The slider bar is used by the user to refine the recommendations made, where the recommendations are made based at least in part on data models, which are generated from coincident keywords that frequently appear in a corpus of user profiles. The user profiles can be from, for example, a social networking or online dating user site. The recommendation system, e.g., recommender (human or machine) are compensated by a formula that allocates a portion of a sale price to the recommenders. In this case, the recommender share is predetermined and held in an escrow, pending determination of an actual outcome of the recommendation for the particular user. If the user fully endorses the original positive recommendation, then the payment is made to the affirmative recommenders under an allocation program. If the user ultimately disagrees with the positive recommenders, then the payment is denied to the positive recommenders, and may be allocated to negative reviewers or reviewers who provided qualified reviews. That is, a collaborative-type filter is used to reward those recommenders who, in advance, agreed with the user after the fact. Using the collaborative filter prospectively, the user may be matched with highly correlated recommenders, who then can help define a ranked list of media, ads, messages, or the like, to be presented. In this case, the recommender may be prospectively compensated, without awaiting user confirmation, subject to demotion or reclassification of recommenders with a low accuracy and/or reliability in recommendation in general or for the particular user. A computer implemented method of providing targeted profile matching in an online dating network can be provided. User profiles of Muriqi-201PCT - 13 - matched (or complementary) couples or groups from an online dating network to extract keywords are processed and used to create data models. The matched couples or groups can be couples that are already dating. Keywords that commonly occur in the user online dating profiles of the matched couples are identified. The identified co-occurring keywords from the user profiles of the matched couples are ranked. The ranked identified co-occurring keywords of the matched couples are used to make mate recommendations for users seeking a romantic match by comparing the identified co-occurring keywords of the matched couples with co-identified keywords from profiles of the users seeking a romantic match. OBJECTS OF THE INVENTION It is therefore an object to provide a user interface system, comprising: a content display output for presentation of content to a user; a communication network interface port; and at least one automated processor configured to: receive at least one hyperlink in a social network record of a social network; request content associated with the hyperlink; receive an advertisement associated with at least one of the user, the social network record, the hyperlink, and the content; verify presentation of the advertisement to the user; present the content to the user; and account for presentation of the advertisement to the user, by crediting at least one account distinct from an account associated with the user, an account associated with a content owner, and an account associated with a social network. It is also an object to provide a user interface method, comprising: presenting content to a user through a content display output; communicating through a communication network interface port; receiving at least one hyperlink in a social network record of a social network; requesting content associated with the hyperlink; receiving an advertisement associated with at least one of the user, the social network record, the hyperlink, and the content; verifying presentation of the advertisement to the user; presenting the content to the user; and accounting for presentation of the advertisement to the user, by crediting at least one account distinct from an account associated with the user, an account associated with a content owner, and an account associated with a social network. The account may be credited contingent on display of the advertisement, or consummation of a transaction after display of the advertisement. The communication network interface port may be configured to communicate with an ad hoc communications network, and the at least one automated processor configured to is configured to control communication network interface port to receive content from a decentralized ad hoc communication network. The social network record may comprise a referrer of the content to the user, and an account of the referrer is credited. The referrer may provide a rating for the content. The referrer may identify the user. The account may be maintained on a distributed ledger or a blockchain. The content may have an associated cost, and the advertisement may provide a subsidy to compensate for the associated cost of the content. The content may have an associated variable cost, and the advertisement may provide a subsidy to compensate for the associated variable cost of the content. The advertisement may be targeted to a user dependent on a user profile. The advertisement may be recommended to a user dependent on a user profile. The content may be recommended to a user dependent on a user profile. The content may be recommended to a user dependent on a collaborative filter. A cryptocurrency token wallet may be provided. The token wallet may be configured to hold representations of non-fungible tokens. The at least one automated processor may be configured to process a distributed ledger transaction, a blockchain transaction, a smart contract transaction, a transaction in consideration of a fungible token, a transaction in consideration of a non-fungible token. The at least one automated processor may be configured to process a smart contract transaction which: verifies presentation of the advertisement to a user; and compensates a referrer to the user. The at least one automated processor may be configured to implement a distributed virtual machine. The at least one automated processor may be configured to transfer a basic attention token in consideration of viewing an advertisement. The at least one automated processor may be configured to limit presentation of the content to the user contingent on satisfaction of a digital rights management rule. The at least one automated Muriqi-201PCT - 14 - processor may be configured to engage in transcrypted communications through an untrusted intermediary. The at least one automated processor may be configured to perform a fully or partially homomorphic cryptographic operation on a message. en.wikipedia.org/wiki/Homomorphic_encryption. The at least one automated processor may be configured to cluster data. The at least one automated processor may be configured to engage in a distributed clustering of data with other nodes in a distributed network. The at least one automated processor may be configured to verify presentation of the advertisement to the user using a biometric sensor, video camera, eye tracking sensor, photoplethysmography, and/or user activity patterns. The at least one automated processor may be configured to perform sentiment analysis on the content. The at least one automated processor may be configured to calculate a distance function. The at least one automated processor may be configured to credit accounts of a content owner, a social network platform, a referrer, and optionally a user to account for presentation of the advertisement to the user. The at least one automated processor may be configured to adaptively credit a plurality of accounts to account for presentation of the advertisement to the user. The at least one automated processor may be configured to perform tax accounting for the crediting. It is also an object to provide a media player, comprising: a cryptocurrency wallet; a communication network interface; a media user interface; a user interface configured to receive a user rating or endorsement of media; andat least one processor configured to present selected media to a user, communicate the user rating through the communication network interface, and process distributed ledger transactions relating to the cryptocurrency wallet, wherein at least one transaction relates to a media cost and at least one transaction relates to a media subsidy. The at least one processor may be further configured to interact with a social network database, wherein the user rating or endorsement of media is communicated to the social network database through the communication network interface. The at least one processor may be further configured to communicate through the communication network interface using a virtual private network. The at least one processor may be further configured to perform a homomorphic cryptographic operation or a fully homomorphic cryptographic operation. The at least one processor may be further configured to implement a media content or advertisement content recommender. The communication network interface may comprise a peer-to-peer ad hoc communication network, and the social network database may comprise a distributed database. At least one transaction may result in processing cryptocurrency transactions in at least three different cryptocurrency wallets. The at least one transaction may have a cryptocurrency valuation dependent on the user rating or endorsement of the media. The at least one processor is further configured to: receive at least one hyperlink in a social network record of a social network; request media content associated with the hyperlink; receive advertisement content dependent on at least one of a user, the social network record, the hyperlink, and the media content; verify presentation of the advertisement content through the media user interface to the user; present the media content to the user; and account for presentation of the advertisement content to the user, by crediting the cryptocurrency wallet. The hyperlink may reference a media object stored in a peer-to-peer file storage system. The media content and the advertisement content may be stored in a distributed database. The cryptocurrency wallet may be cryptographically accessible by the user through a wallet user interface and is may also be cryptographically accessible by an administrator through an administrator user interface. The communication network interface may comprise a cellular network communication transceiver. The cryptocurrency wallet may be owned by a user and may be configured to support credit transactions and debit transactions without advance user authorization. It is also an object to provide a social network method, comprising: receiving at least one social network record of a social network, comprising a proposal, referral, or recommendation of content, through a network communication interface; requesting and receiving the content through the network communication interface; receiving a communication through the network communication interface; presenting the content and the communication to the user through a content presentation interface; and accounting for at least one of a presentation of Muriqi-201PCT - 15 - the communication and an action predicated on the communication, to the user, by crediting at least one account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. It is a still further object to provide a social network system, comprising a content presentation interface; a network communication interface; and at least one automated processor, the at least one automated processor being configured to: receive through the network communication interface at least one social network record of a social network, comprising a proposal, referral, or recommendation of content; receive the content through the network communication interface; receive a communication through the network communication interface; present the content and the communication to the user through the content presentation interface; and account for at least one of a presentation of the communication and an action predicated on the communication, to the user, by crediting at least one account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. The social network record may comprise a history of user interaction with the content, further comprising debiting the account associated with the user for user interaction with the content. The method may further comprise receiving a subjective assessment or comment, wherein the subjective assessment or comment is linked to the social network record, and crediting or debiting the account associated with the user for the receipt of the subjective assessment or comment. The method may further comprise crediting or debiting the account associated with the user for the subjective assessment or comment, based on interaction of other users with the subjective assessment or comment. The method may further comprise crediting the account associated with the proprietor of the social network for the for at least one of the presentation of the communication and the action predicated on the communication. The method may further comprise crediting at least one of the account associated with the user, the account associated a proprietor of the content, and the account of a proprietor of the social network user for a presentation of the communication to the user. The method may further comprise verifying a presentation of the communication to the user. The method may further comprise capturing images of the user with a camera during the presentation of the communication; and verifying presentation of the communication to the user based on the captured images. The method may further comprise accounting for a transaction in a distributed ledger system. The method may further comprise receiving content through the network communication interface from a peer-to-peer distributed database. The method may further comprise receiving the at least one social network record from a decentralized social network database. The communication may comprise a commercial advertisement video, and the at least one social network record of the social network, comprising the proposal, referral, or recommendation of content may comprise a reference to a social media influencer who references the content, the method further comprising: receiving a payment from an account associated with a commercial sponsor of the commercial advertisement video; distributing proceeds of the payment to an account of social media influencer being the at least one account associated with the proposal, referral, or recommendation; and further distributing proceeds of the payment to an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. The method may further comprise initiating a transaction to authorize presentation of the content to the user through the content presentation interface, wherein the transaction comprises execution of a smart contract on a distributed virtual machine. The method may further comprise providing an automated recommender; generating the proposal, referral, or recommendation of content with the automated recommender; and selecting or ranking the content for presentation to the user. The method may further comprise storing a user profile; and targeting the communication to the user based on the user profile, wherein the user profile is unavailable to the social network. The method may further comprise communicating with a generative pre-trained transformer comprising a large language model, which processes social network records and Muriqi-201PCT - 16 - generates the proposal, referral, or recommendation of the content. The social network record may comprise at least one hyperlink to the content; and the communication may comprise an advertisement selected based on at least the user, the social network record, and the content. The account may be credited contingent on at least one of a presentation to the user of the advertisement, and consummation of a commercial transaction after display of the advertisement. The method may further comprise communicating with a distributed ledger comprising a blockchain through the network communication interface; and the crediting the at least one account comprises performing a transaction to credit a cryptocurrency token to a cryptocurrency wallet. A further object provides a decentralized social network method, for operating a device comprising a content presentation interface; a network communication interface; and at least one automated processor, the method comprising: receiving at least one social network record of a social network, comprising a proposal, referral, or recommendation of content, and a resource locator for the content, through the network communication interface; issuing a request for the content by communicating the resource locator through the network communication interface; receiving a sponsor message through the network communication interface associated with a smart contract, the smart contract defining a transaction comprising a cryptocurrency payment for at least one of a presentation to a user of the sponsor message and an action by the user predicated on the sponsor message; and accounting for the at least one of a presentation to the user of the sponsor message and the action predicated on the sponsor message, by executing the smart contract to conduct the transaction on a distributed ledger, crediting at least one cryptocurrency account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. It is a further object to provide a decentralized social network system, comprising a content presentation interface; a network communication interface; and at least one automated processor, the at least one automated processor being configured to: receive at least one social network record of a social network, comprising a proposal, referral, or recommendation of content, and a resource locator for the content, through the network communication interface; issuing a request for the content by communicating the resource locator through the network communication interface; receive a sponsor message through the network communication interface associated with a smart contract, the smart contract defining a transaction comprising a cryptocurrency payment for at least one of a presentation to a user of the sponsor message and an action by the user predicated on the sponsor message; and account for the at least one of a presentation to the user of the sponsor message and the action predicated on the sponsor message, by executing the smart contract to conduct the transaction on a distributed ledger, crediting at least one cryptocurrency account associated with the proposal, referral, or recommendation, distinct from an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. The social network record may comprise a history of user interaction with the content, and the at least one automated processor is further configured to debit the account associated with the user for user interaction with the content. A user input device may be provided, configured to receive a subjective assessment or comment, wherein the subjective assessment or comment is linked to the social network record, and the at least one automated processor is further configured to credit or debit the account associated with the user for the receipt of the subjective assessment or comment. The at least one automated processor may be further configured to credit or debit the account associated with the user for the subjective assessment or comment, based on interaction of other users with the subjective assessment or comment. The at least one automated processor may be further configured to credit the account associated with the proprietor of the social network for the for at least one of the presentation of the communication and the action predicated on the communication. The at least one automated processor may be further configured to credit at least one of the account associated with the user, the account associated a proprietor of the content, and the account of a proprietor of the social network user for a presentation of the communication to the user. The at least one automated Muriqi-201PCT - 17 - processor may be further configured to verify presentation of the communication to the user. The system may further comprise a camera configured to capture images of the user during the presentation of the communication, wherein the at least one automated processor may be further configured to verify presentation of the communication to the user based on the captured images. The at least one automated processor may be configured to account for a transaction in a distributed ledger system. The content may be received through the network communication interface from a peer-to-peer distributed database. The at least one social network record may be is received from a decentralized social network database. The communication may comprise a commercial advertisement video, the proposal, referral, or recommendation of content may comprise a reference to a social media influencer who references the content, and the at least one automated processor may be further configured to receive a payment from an account associated with a commercial sponsor of the commercial advertisement video, distribute proceeds of the payment to an account of social media influencer being the at least one account associated with the proposal, referral, or recommendation, and further distribute proceeds of the payment to an account associated with the user, an account associated a proprietor of the content, and an account of a proprietor of the social network. The at least one automated processor may be further configured to initiate a transaction to authorize presentation of the content to the user through the content presentation interface, wherein the transaction may comprise execution of a smart contract on a distributed virtual machine. An automated recommender configured to generate the proposal, referral, or recommendation of content, and to select or rank content for presentation to the user may be provided. A memory may be provided, configured to store a user profile, wherein the at least one automated processor is further configured to target the communication to the user based on the user profile, wherein the user profile is unavailable to the social network. The at least one automated processor may be further configured to communicate with a generative pre-trained transformer comprising a large language model, configured to process social network records and generate the proposal, referral, or recommendation of the content. The social network record may comprise at least one hyperlink to the content, and the communication may comprise an advertisement selected based on at least the user, the social network record, and the content. The account may be credited contingent on at least one of a presentation to the user of the advertisement, and consummation of a commercial transaction after display of the advertisement. The network communication interface may be configured to communicate with a distributed ledger comprising a blockchain, and the at least one account may comprise a transaction to credit a cryptocurrency token to a cryptocurrency wallet. A further object provides a social network, comprising: a distributed database comprising user records and content records; a distributed ledger, configured to authenticate ownership and authority to transfer a cryptotoken with respect to at least lack of prior encumbrance, and maintain an immutable record of a cryptotoken transaction; and a user interface device, configured to receive content records from the distributed database, dependent on user records from the distributed database, and update a respective user record. The social network may further comprise a distributed virtual machine configured to process a smart contract which controls the cryptotoken transaction to allocate the cryptotoken between at least two cryptotoken wallets, in dependence on parameters of the smart contract, wherein the user interface supplies at least parameter of the smart contract. A still further object provides a social network, comprising: a social network database comprising user records, content records, and advertising records; a user interface configured to present content records and advertising records to a user; and a payment system configured to receive a payment from an advertiser and distribute a first portion to a content provider and a second portion to a recommender of the content. Another object provides a social network system, comprising: a distributed database of social media records, the social media records comprising content references, relationships between people, relationships between persons and content, and at least one of subjective Muriqi-201PCT - 18 - assessments and comments; a distributed virtual machine configured to execute smart contracts in conjunction with a blockchain; and a distributed ledger associated with the blockchain, storing smart contracts, wherein at least one smart contract is configured to execute on the distributed virtual machine to distribute a portion of a sponsor payment of a cryptocurrency token to a cryptocurrency wallet defined by the social media record. 1. SOCIAL NETWORKS Social networks are well-known. A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. The social network perspective provides a set of methods for analyzing the structure of whole social entities as well as a variety of theories explaining the patterns observed in these structures. The study of these structures uses social network analysis to identify local and global patterns, locate influential entities, and examine network dynamics. The social network is a theoretical construct useful in the social sciences to study relationships between individuals, groups, organizations, or even entire societies (social units, see differentiation). The term is used to describe a social structure determined by such interactions. The ties through which any given social unit connects represent the convergence of the various social contacts of that unit. This theoretical approach is, necessarily, relational. An axiom of the social network approach to understanding social interaction is that social phenomena should be primarily conceived and investigated through the properties of relations between and within units, instead of the properties of these units themselves. Thus, one common criticism of social network theory is that individual agency is often ignored, although this may not be the case in practice (see agent-based modeling). Precisely because many different types of relations, singular or in combination, form these network configurations, network analytics are useful to a broad range of research enterprises. In social science, these fields of study include, but are not limited to anthropology, biology, communication studies, economics, geography, information science, organizational studies, social psychology, sociology, and sociolinguistics. Social network activities may be analyzed economically, to determine their utility, and incentives to increase utility. Note that each participant in the network has a distinct utility function, and for example an advertiser has a distinct interest from an advertising target. In general, social networks are self-organizing, emergent, and complex, such that a globally coherent pattern appears from the local interaction of the elements that make up the system. These patterns become more apparent as network size increases. While an algorithm may bias the links within a network, ultimately the network is dependent on human selection or appreciation of links, people, content, products, services, etc., and extraction and exploitation of the information derived from the human inputs. The present technology encompasses a social network, in which media and/or multimedia are distributed to users according to a social network paradigm. A consuming user receive a feed, which is a series of media or media links that are a subset of a vast repository. The media are recommended for a user according to an algorithm, which has as a significant factor the satisfaction of a desire or need of the consuming user. The media may be accompanied by sponsored content, including advertisements. The media may be automatically recommended, or provided by an influencer or other user. An influencer is one who leads others in style, fashion, philosophy, prowess, or the like. The influencer participates in the social network for compensation, though the basis for compensation is not uniform across platforms. Media may be user- generated, or from professional sources. The social network database provides information on user characteristics, influencer characteristics, media characteristics, ad characteristics, accounting, etc. Complex networks require methods specific to modelling and interpreting social complexity and complex adaptive systems, including techniques of dynamic network analysis. Mechanisms such as Dual-phase evolution explain how temporal changes in connectivity contribute to the formation of structure in social networks. Muriqi-201PCT - 19 - Computer networks combined with social networking software produce a new medium for social interaction. A relationship over a computerized social networking service can be characterized by context, direction, and strength. The content of a relation refers to the resource that is exchanged. In a computer mediated communication context, social pairs exchange different kinds of information, including sending a data file or a computer program as well as providing emotional support or arranging a meeting. With the rise of electronic commerce, information exchanged may also correspond to exchanges of money, goods or services in the "real" world. Social network analysis methods have become essential to examining these types of computer mediated communication. Individuals influence each other through social interactions and marketers aim to leverage this interpersonal influence to attract new customers. It still remains a challenge to identify those customers in a social network that have the most influence on their social connections. A common approach to the influence maximization problem is to simulate influence cascades through the network based on the existence of links in the network using diffusion models. Referral Rank builds on the game theoretic concept of the Shapley value for assigning each individual in the network a value that reflects the likelihood of referring new customers. Looking at the influence of the two-hop neighbors of the customers improves the influence spread and product adoption. People are highly influenced by information received from others and word-of-mouth (WOM) is the most influential source of information to a customer. Empirical research shows that consumers rely heavily on the advice of others in their personal network when making purchase decisions and that positive WOM has a positive effect on business outcomes, i.e., sales. Referral marketing has become an important marketing technique to stimulate WOM in a controlled way for acquiring new customers. Suppose we have data on the social network of customers, in which the interactions give an indication of how influence flows between the individuals. If we want to attract as many new customers as possible by relying on the power of social influence, we want to initially target only a few individuals whom we expect to trigger a cascade of influence in which friends recommend the product to other friends. The key question is how to select those initial influencers who will seed this process. In order to do that, managers need to have an intelligent system that supports them in finding the optimal group of influential customers. Selecting a group of individuals who are most likely to generate the largest cascade of influence through WOM is also known as the influence maximization problem. Multiple approaches to solve the influence maximization problem have been developed. Customer referral programs encourage existing customers to recommend a firm’s services or products to their social network. They aim to provoke marketer-directed cascades of word-of-mouth (WOM). In that way, referral programs leverage on the powerful impact of WOM and the influence of social connections. Because online circumstances allows communication remotely and out of synchronization, along with a better communication capacity, online referral reward programs in social networks may have different characteristics compared with traditional referral reward programs. For decades, the advertising industry was based on an asymmetrical communication model, where marketers would engage audiences via paid media channels. The advent of social media platforms completely transformed the general media landscape, along with the advertising model, as audiences shifted from the role of content receivers to content creators, distributors, and commentators (Keller, 2009; Scott, 2015). Simply put, the empowerment of audiences from mere viewers to active content distributors effectively flipped the advertising model on its head. Where paid media (in this case, advertising) was once supported by earned and owned media, the modern advertising model uses owned, shared, and earned media as the key media planning strategy, supported by paid media (Pearson, 2016). Recognizing the increased potential for free content distribution, marketers realized that creating highly engaging advertising content could expand potential reach, a cheaper and more credible tactic than traditional paid advertising (Cho, Huh, & Faber, 2014; Golan & Zaidner, 2008). This fundamental Muriqi-201PCT - 20 - disruption of the advertising and marketing world led to growing interest in content creation, co-creation, and distribution. Advertising may be referred to as the “paid nonpersonal communication from an identified sponsor using mass media to persuade or influence an audience” (Wells, Moriarty, & Burnett, 2000, p.6). Consistent with most, but not all, of these requirements, Porter and Golan (2006) defined viral advertising as “unpaid peer-to-peer communication of provocative content originating from an identified sponsor using the Internet to persuade or influence an audience to pass along the content to others” (p.33). These definitions are useful, but not limiting on the disclosure as a whole. The expanding literature on viral advertising recognizes the ways in which peer-to-peer distribution of advertising content are redefining the industry. When examined holistically, the literature has several limitations. First, existing viral advertising research is limited primarily to advertising spread within one step of the original source (e.g., predicting the number of message shares), while information on social media often spreads beyond a single step from the original source. Second, in focusing on the characteristics of shared content or sharing users, researchers make the assumption that all shares are equal in terms of their impact. However, sharing-impact varies among users, based on their connectivity. Third, the metaphor of virality, the idea that content is spread gradually among individuals and their immediate contacts, may not fully capture what is often a complex multi-actor process of content distribution. Cascades of content distribution were found to be centered on a small number of distributors, creating a hierarchical, rather than egalitarian, pattern of content distribution (Baños, BorgeHolthoefer, & Moreno, 2013). An emergent body of scholarship in the field of marketing, advertising, and public relations examines the intermediary function of influencers between brands and consumers, organizations, and stakeholders in social media engagement (De Veirman, Cauberghe, & Hudders, 2017; Freberg, Graham, McGaughey, & Freberg, 2011; Phua, Jin, & Kim, 2016). At the most basic level, influencer is identified by their number of followers and their ability to impact social media conversation regarding brands or topics (Watts & Dodds, 2007). While the term social media influencer is ubiquitously applied, there are few formal definitions of what an influencer actually is. Brown and Hayes (2008) defined influencers broadly as individuals who hold influence over potential buyers of a brand or product to aid in the marketing activities of the brand. Others narrow the definition of an influencer to reflect on the latest marketing trend in which social media celebrities are paid by advertisers to promote products (Abidin, 2016; Evans et al., 2017; Senft, 2008). To explain the influence of influencers, media scholars often depend on the parasocial relationship explanation (Daniel, Crawford, & Westerman, 2018; Lou & Yuan, 2018; Rasmussen, 2018). Moving beyond a temporary parasocial interaction (as originally conceptualized by Horton & Wohl, 1956), parasocial relationships between audience members and mediated characters are formed over a period of time and provide audience members with a sense of engagement with onscreen characters (Klimmt, Hartmann, & Schramm, 2006; Tukachinsky, 2010). In the context of social media, such parasocial relationships provide influencers with unique social capital that leads to audience trust (Tsai & Men, 2017; Tsiotsou, 2015). The central role of trust in parasocial relationships may provide a plausible explanation for the influencer phenomenon and the rise of influencer marketing (Audrezet, De Kerviler, & Moulard, 2018). Trust has been identified as a key predictor of several advertising consequences including recall, attitude, and likelihood to share (Cho et al., 2014; Lou & Yuan, 2018; Okazaki, Katsukura, & Nishiyama, 2007). Abidin (2016), building on the concept of parasocial relations, identified four ways that influencers appropriated and mobilized intimacies: commercial, interactive, reciprocal, and disclosive. Influencers are identified not only based on their sheer number of such parasocial relationships, such as subscribers or followers on social media, but primarily based on their ability to impact social media conversation and subsequent behavior regarding brands or topics (Watts & Dodds, 2007). Muriqi-201PCT - 21 - In some cases, influencers are valued because of the objective correctness of their communications and the objective value of their recommendations. In other cases, followers seek to emulate an influencer, regardless of the merit of the communication or recommendation. The later is not “wrong”, and rather reflects the malleability of perceptions and value judgements, and a human need to belong to a community that is reflected by arbitrary customs. As explained by Golan and Zaidner (2008), there are several key differences between viral and traditional advertising. First, viral advertising earns audience eyeballs, as opposed to paying for them. This is a major departure from the traditional advertising exchange, where brands purchase media space and interrupt an audience’s media consumption with advertisements. Second, viral advertisements provide such increased value to audiences that they transform audiences from passive content receivers to active social distributors who play a key role in advertisement distribution. Third, although there are limited studies speaking to this point, it is worth noting that information sharing has been shown to increase a user’s followers on Twitter, which is a long-term benefit for marketers (Hemsley, 2016). Hayes, King, and Ramirez (2016) advanced research on viral advertising by illustrating the importance of interpersonal relationship strength in referral acceptance. Their study suggested that individuals are motivated to share advertising content based on reputational enhancement and reciprocal altruism. Alhabash and McAlister (2015) conceptualized virality based on three key components: viral reach, affective evaluation, and message deliberation. The authors linked virality and online audience behaviors in what they refer to as viral behavioral intentions (VBI). This linkage is supported by later research indicating that the virality of digital advertising is often related to several VBIs motivated by a variety of audience-based characteristics (Alhabash, Baek, Cunningham, & Hagerstrom, 2015; Alhabash et al., 2013). In essence, viral advertising represents a “peer-to-peer communication” strategy that depends on distribution of content (Petrescu & Korgaonkar, 2011; Porter & Golan, 2006). Despite the fact that most peer-to-peer social media shares include multiple distribution phases (e.g., from user A to user B to user C), existing viral advertising research is mostly limited to one-step advertisement spread (e.g., predicting number of message shares). Studies suggest that while content may be shared by many users, most viral content is spread beyond this single step (Bakshy, Hofman, Mason, & Watts, 2011). The body of literature concerning viral advertising does not examine advertising spread beyond a user’s immediate set of connections. The literature conceptualizes virality based on such sharing metrics as shares or retweets. In doing so, scholars fail to account for the possibility that the overall impact of such user actions may not result in equal content distribution outcomes. In fact, studies on virality of content and cascades of information flow highlight that “popularity is largely driven by the size of the largest broadcast” (Goel, Anderson, Hofman, & Watts, 2015, p.180). In other words, it is not only the number of consumer-to-consumer interactions but the connectivity of these consumers with others that determines the impact of viral advertising. One user’s retweet may count more than another user. The idea that content is spread gradually from one source to that source’s immediate small group of connections, to their neighbors, and so on is a powerful metaphor that resonates well with many scholars (Miles, 2014; Porter & Golan, 2006). However, research shows no foundation for such an egalitarian assumption. Connections are distributed in a skewed manner across individuals, a phenomenon referred to in ways that vary by discipline. Scholars offer different approaches to determine why do some advertisements receive wide-scale viewership via audience distribution, while others do not, one focusing on content characteristics (Brown, Bhadury, & Pope, 2010; Golan & Zaidner, 2008; Petrescu, 2014) and another examining virality attribute factors such as brand relationships (Hayes & King, 2014; Ketelaar et al., 2016; Shan & King, 2015). Porter and Golan (2006) specifically identify provocative content as contributing to advertising virality. Other studies identify appeals to sexuality, as well as shock, violence, and other inflammatory content as key elements of message virality (Brown et al., 2010; Golan & Zaidner, Muriqi-201PCT - 22 - 2008; Petrescu, 2014). Eckler and Bolls (2011) argue that the emotional tone of advertisement is directly related to audience intention to forward ads to others. Yet advertising content, tone, and emotion cannot fully account for ad virality. Scholars point to a variety of other variables significantly related to advertising virality including brand relationship (Hayes & King, 2014; Ketelaar et al., 2016; Shan & King, 2015), attitude toward the ad (Hsieh, Hsieh, & Tang, 2012; Huang, Su, Zhou, & Liu, 2013), and credibility of the sender/referrer (Cho et al., 2014; Phelps, Lewis, Mobilio, Perry, & Raman, 2004). Hayes, King, and Ramirez (2016) advanced research on viral advertising by illustrating the importance of interpersonal relationship strength in referral acceptance. Their study suggested that individuals are motivated to share advertising content based on reputational enhancement and reciprocal altruism. Alhabash and McAlister (2015) conceptualized virality based on three key components: viral reach, affective evaluation, and message deliberation. The authors linked virality and online audience behaviors in what they refer to as viral behavioral intentions (VBI). This linkage is supported by later research indicating that the virality of digital advertising is often related to several VBIs motivated by a variety of audience-based characteristics (Alhabash, Baek, Cunningham, & Hagerstrom, 2015; Alhabash et al., 2013). Viral advertising represents a “peer-to-peer communication” strategy that depends on distribution of content (Petrescu & Korgaonkar, 2011; Porter & Golan, 2006). Despite the fact that most peer-to-peer social media shares ultimately determined by their position in an issue or brand-specific conversation network, allowing their posted content to be distributed in a strategic manner. As such, these influencers play key roles in the virality of any advertising campaign on social media. A social networks approach, as illustrated by Himelboim, Golan, Moon, and Suto (2014) provides for a macro-understanding of social media relationships, content flow, and the role of social media influencers within the network. The present technology is compatible with various types of advertising, and especially viral advertising, which can be readily exploited in a social network. A single network can have different types of links, or ties, that connect its users. On Twitter, users can be connected, among others, by relationships of retweets and mentions. A network of advertising virality captures users who posted content with a hyperlink to a given ad. Such Twitter users share a link to a given advertisement via a tweet, expanding its reach one step away from the source (YouTube). Some studies have examined the overall network structure to explain virality. Pei et al. (2014) used social network analysis on LiveJournal, Twitter, Facebook, and APS journals and found that users who spread the most content were located in the K-Core (a metrics of subgroup cohesiveness in the network). At the node-level, a few users are expected to contribute further to the virality by having their tweets shared, or retweeted, by many additional users. Such users capture virality beyond a single step away from the source. Users with many connections in the network are known as social hubs (Goldenberg, Libai, & Muller, 2001) or simply Hubs. Using computer simulations, Hinz, Skiera, Barrot, and Becker (2011) found that seeding messages to hubs outperformed a random seeding strategy and seeding to low-degree users, in terms of number of referrals. Kaplan and Haenlein (2011) also illustrated the role that hubs play in integrative social media and viral marketing campaigns. Influencers may be categorized into three different types, based on the type of relationships, links in the network, that makes them central in a network. Given the opportunity to interact freely, connections among users will be distributed unequally, as a few will enjoy large and disproportionate number of relationships initiated with them, while most will have very few ties. On Twitter, content posted by a few users will enjoy major distribution via retweeting, while the rest will gain little shares, if any. Indeed, Araujo, Neijens, and Vliegenthart (2017), define influentials as “users with above average ability to stimulate retweets to their own messages” (p.503), consistent with conceptualization of influencers based on impact on content distribution (Cha, Haddadi, Benevenuto, & Gummadi, 2010; Kwak, Lee, Park, & Moon, 2010). Hubs as Muriqi-201PCT - 23 - conceptualized in social networks literature, therefore, are one type of social media influencers as conceptualized in social media scholarship, as each one makes a major contribution to content distribution. One type of influencer, from a social networks conceptualization, is therefore the Primary Influencer. The social networks conceptual framework shifts the focus from individual traits to patterns of social relationships (Wasserman & Faust, 1994). Applying a social networks approach to social media activity allows researchers to capture content virality and identify key social media influencers that affect the conversation about a brand and reach key groups of consumers. A social network is formed when connections (“links”) are created among social actors (“nodes”), such as individuals and organizations. The collections of these connections aggregate into emergent patterns or network structures. On Twitter, social networks are composed of users and the connections they form with other users when they retweet, mention, and reply to (Hansen, Shneiderman, & Smith, 2011). The network approach can bridge the viral advertising and social media influencer’s bodies of literature. As discussed earlier, social media platforms allow individuals to maintain parasocial relationships with influencers (Abidin, 2016). In the case of Twitter, such engagement is manifested in the form of mentions, likes, and retweets. In social networks research, these relationships are conceptualized as links in a network. The social networks approach allows us to capture the distribution of a specific piece of content (i.e., an advertisement) and identify users in key positions in the network that are responsible for the distribution of ads, as social media influencers. It should be noted that even in studies on information diffusion in related disciplines, it is quite rare to track the virality of a single piece of content, rather than the overall diffusion of messages in a broader conversation. Viral advertising research often focuses on the most visible type of content that is spread, shared, or retweeted on Twitter. Social media influencers are often examined by their number of connections in a social media platform (De Veirman et al., 2017). However, a link to a video advertisement, or any other source of paid advertising content, may be posted by more than a single user who contributes to its diffusion. In other words, while the advertisement itself may have a single point of origin (e.g., a YouTube video page), this advertisement may have multiple users who may account for multiple points of origin for distribution on Twitter. Burt’s (1992, 2001) theory of structural holes examines social actors (e.g., individuals and organizations) in unique positions in a social network, where they connect other actors that otherwise would be less connected, if connected at all. In Burt’s (2005) words, “A bridge is a (strong or weak) relationship for which there is no effective indirect connection through third parties. In other words, a bridge is a relationship that spans a structural hole” (p.24). A lack of relationships among social actors, or groups of actors, in a network gives those positioned in structural holes strategic benefits, such as control, access to novel information, and resource brokerage (Burt, 1992, 2001). Actors that fill structural holes are viewed as attractive relationship partners precisely because of their structural position and related advantages (Burt, 1992, 2001). US20130317908A1 relates to a search technology which generates recommendations with minimal user data and participation, and provides interpretation of user data, such as popularity, thus obtaining breadth and quality in recommendations. It is sensitive to the semantic content of natural language terms taken from user profiles at social networking and online dating applications and blogs. The profiles and blogs can include interests, eccentricities, age, gender, and location information associated with the user. The interest information can include music, movies, sports and personality traits. Based on the user's profile information, the system determines which ad from a stock of ads is best suited to a given profile and delivers that ad. The system can enable advertisers to create and manage online advertising campaigns using a campaign manager in which they attach descriptions to ads in their inventory, thereby generating a profile for each ad which is then compared Muriqi-201PCT - 24 - to the profiles in the target online environment. A user interface can be provided to enable the user to fine-tune product and service recommendation results. The system can be used to match user profiles to provide mate-matching in an online dating environment. The ability to consistently match a product or service to a consumer's request for a recommendation is a very valuable tool, as it can result in a high volume of sales for a particular product or company. Unfortunately, effectively accommodating these demands using existing search and recommendation technologies requires substantial time and resources, which are not easily captured into a search engine or recommendation system. The difficulties of this process are compounded by the unique challenges that online stores and advertisers face to make products and services known to consumers in this dynamic online environment. An aspect of the technology seeks to enhance social networks by application of various economic principles and application of existing and novel technology to improve the functioning and economic outcomes of operating social networks and other types of systems using the technologies encompassed herein. See Social Networks references. 2. TARGETED ADVERTISING On aspect of fulfilling both the advertisers’ interest and the user’s interest is intelligent or optimal targeting of advertisements. This may be synopsized as getting the right advertisement, to the right user, for the right price. Recommendation technology exists that attempts to predict items, such as movies, music and books that a user may be interested in, usually based on some information about the user's profile. Often, this is implemented as a collaborative filtering algorithm. Collaborative filtering algorithms typically analyze the user's past behavior in conjunction with the other users of the system. Ratings for products are collected from all users forming a collaborative set of related “interests” (e.g., “users that liked this item, have also like this other one”). In addition, a user's personal set of ratings allows for statistical comparison to a collaborative set and the formation of suggestions. Collaborative filtering is the recommendation system technology that is most common in current e-commerce systems. It is used in several vendor applications and online stores, such as Amazon.com. Unfortunately, recommendation systems that use collaborative filtering are dependent on quality ratings, which are difficult to obtain because only a small set of users of the e-commerce system take the time to accurately rate products. Further, click-stream and buying behavior as ratings are often not connected to interests because the user navigation pattern through the e-commerce portal will not always be a precise indication of the user buying preferences. Additionally, a critical mass is difficult to achieve because collaborative rating relies on a large number of users for meaningful results, and achieving a critical mass limits the usefulness and applicability of these systems to a few vendors. Moreover, new users and new items require time to build history, and the statistical comparison of items relies on user ratings of previous selections. Furthermore, there is limited exposure of the “long tail,” such that the limitation on the growth of human-generated ratings limits the number of products that can be offered and have their popularity measured. The long tail is a common representation of measurements of past consumer behavior. The theory of the long tail is that economy is increasingly shifting away from a focus on a relatively small number of “hits” (e.g., mainstream products and markets) at the head of the demand curve and toward a huge number of niches in the tail. To compound problems, most traditional e-commerce systems make overspecialized recommendations. For instance, if the system has determined the user's preference for books, the system will not be capable of determining the user's preference for songs without obtaining additional data and having a profile extended, thereby constraining the recommendation capability of the system to just a few types of products and services. Muriqi-201PCT - 25 - There are rule-based recommendation systems that rely on user input and a set of pre-determined rules which are processed to generate output recommendations to users. A web portal, for example, gathers input to the recommendation system that focuses on user profile information (e.g., basic demographics and expressed category interests). The user input feeds into an inference engine that will use the pre- determined rules to generate recommendations that are output to the user. This is one simple form of recommendation systems, and it is typically found in direct marketing practices and vendor applications. However, it is limited in that it requires a significant amount of work to manage rules and offers (e.g., the administrative overhead to maintain and expand the set of rules can be considerably large for e-commerce systems). Further, there is a limited number of pre-determined rules (e.g., the system is only as effective as its set of rules). Moreover, it is not scalable to large and dynamic e-commerce systems. Finally, there is limited exposure of the long tail (e.g., the limitation on the growth of a human-generated set of inference rules limits the number of products that can be offered and have their popularity measured). Content-based recommendation systems exist that analyze content of past user selections to make new suggestions that are similar to the ones previously selected (e.g., “if you liked that article, you will also like this one”). This technology is based on the analysis of keywords present in the text to create a profile for each of the documents. Once the user rates one particular document, the system will understand that the user is interested in articles that have a similar profile. The recommendation is created by statistically relating the user interests to the other articles present in a set. Content-based systems have limited applicability, as they rely on a history being built from the user's previous accesses and interests. They are typically used in enterprise discovery systems and in news article suggestions. In general, content-based recommendation systems are limited because they suffer from low degrees of effectiveness when applied beyond text documents because the analysis performed relies on a set of keywords extracted from textual content. Further, the system yields overspecialized recommendations as it builds an overspecialized profile based on history. If, for example, a user has a user profile for technology articles, the system will be unable to make recommendations that are disconnected from this area (e.g., poetry). Further, new users require time to build history because the statistical comparison of documents relies on user ratings of previous selections. A complicated aspect of developing an information gathering and retrieval model is finding a scheme in which the cost-benefit analysis accommodates all participants, i.e., the users, the online stores, and the developers (e.g., search engine providers). The present technology seeks to “optimize” utility of the experience of use of the network, and part of that optimization is selection of ads and other sponsored content for users based on both the objective value of the ad placement, e.g., in terms of driving sales, transactions, or sentiment according to the sponsor’s goals, and subjective value to the recipient according to that recipients need or desire for information or content. Thus, in contrast to many targeted ad systems, the present technology may be quite sensitive to the offense taken by the targeted recipient to inappropriate, repetitive, useless, or offensive advertising. In some cases, the ad placement is in dependent of associated content presented by the network, while in others the ads are selected to be appropriate or integral with a common experience. In the later case, a single algorithm selects content, ads, and other user interface elements, and may perform an economic optimization on the whole, often using the ads to compensate content providers for the associated content in the transaction. On the other hand, since each participant in the network has an account that may be credited or debited over time, there is not a strict need for direct sponsorship of particular content, and rather these may be decoupled, even if part of a common experience. The algorithm may, however, seek to ensure that the available sponsorship covers all costs for a user over a period of time, and provides benefits according to the social network paradigm. A low valued user, i.e., one who is anticipated to produce low returns for advertisers may therefore see a greater number of ads, or be provided with lesser valued content. On the other hand, a higher valued user, may see a fewer number of highly targeted, high value ads, and have access to premium content. For Muriqi-201PCT - 26 - example, a user who is anticipated to purchase a car or jewelry may receive significant subsidies from competing providers of those products, to the exclusion of other advertising of lesser anticipated value. Similarly, after a transaction, the seller may continue to subsidize use of the network by a valued user, with only after-the-transaction appropriate communications. In the market for attention, one ad sponsor may even bid to displace the competitor’s ad, even if the sponsor’s ad is not itself displayed Ad profiles can be created to facilitate the ad selection process. One or more keywords from a candidate ad can be extracted. The frequency with which the one or more extracted keywords from the ad appear in conjunction with a coincident keyword from a plurality of user profiles can be computed. The extracted ad keywords from the ad can be expanded with additional interest related terms using one or more of the coincident keywords identified from the plurality of user profiles. The expanded ad related interest terms can be used to build an ad profile (data model). The expanded ad related interest terms in the ad profile can be compared with the expanded interest terms of the subject user profile to determine which ad to select from the ad inventory. When comparing the expanded ad related interest terms in the ad profile with the expanded interest terms of the subject user profile, no exact match of respective interest related terms is required. When identifying the co-occurring keywords from the user profiles, the frequency with which a keyword appears in conjunction with another keyword is computed in the overall defined population. The degree to which the two keywords tend to occur together can be computed. A ratio indicating the frequency with which the two keywords occur together is determined. A correlation index indicating the likelihood that users interested in one of the keywords will also be interested in the other keyword, is determined. The computed degree, the determined ratio and the correlation index can be processed to determine a percentage of co-occurrence for each keyword. The percentage of co-occurrence for each keyword is used to determine a correlation ratio, which indicates how often a co-occurring keyword is present when another co-occurring keyword is present, as compared to how often it occurs on its own. This information is used in processing keywords in queries to identify matching keywords. The matching keywords can be used to search products, services or Internet sites to generate recommendations. Term frequency-inverse-document frequency (tf-idf) weighing measures can be used to determine how important an identified keyword is to a subject user profile in a collection or corpus of profiles. The importance of the identified keyword can increase proportionally to the number of times it appears in the document, offset by the frequency the identified keyword occurs in the corpus. The tf-idf calculation can be used to determine the weight of the identified keyword (or node) based on its frequency, and it can be used for filtering in/out other identified keywords based on their overall frequency. The tf-idf scoring can be used to determine the value of the identified keyword as an indication of user interest. The tf-idf scoring can employ the topic vector space model (TVSM) to produce relevancy vector space of related keywords/interests. Each identified keyword can be used to generate output nodes and super nodes. The output nodes are normally distributed close nodes around each token of the original query. The super nodes act as classifiers identified by deduction of their overall frequency in the corpus. A super node, for example, would be “rock music” or “hair bands.” However, if the idf value of an identified keyword is below zero, then it is determined not to be a super node. A keyword like “music,” for example is not considered a super node (classifier) because its idf value is below zero, in that it is too popular or broad to yield any indication of user interest. Basic probability, tf-idf, nodes, and concept specific ontology approaches can be used to determine coincident (co-occurring) keywords and terms. It should be noted, however, that any combination of the these methods can be used to determine coincident (co-occurring) keywords and terms. A computer program product can be provided for managing online ad campaigns. Executable software code on a computer useable medium is used to create and manage the online advertising campaigns. Profiles can be associated with ads in an ad inventory. A social Muriqi-201PCT - 27 - networking profile of a user who uses a social networking application can be accessed and processed. The social networking profile can be compared with one or more of the ad profiles. An ad from the ad inventory can be selected for use in connection with the user's use of the social networking application. The ad inventory includes ads that are stored on an ad server. Ads in the ad inventory are queued as candidates to be targeted to the user. Currently, some applications and websites always publish pop-up ads, spam e-mails, and low-quality ads, etc. The proliferation of these ads has brought poor and even unbearable experience to the Internet users. Some ads may contain viruses, which induce users to click on and implant them into user’s devices to steal the user’s private data. These problems reflect that there lacks an effective supervision mechanism for the IDA, and the existing operation mechanism is outdated. Most websites rely on click-through rates to earn ad revenue. Some publishers may try to use fraudulent means to improve click-through rate, which is called “IDA fraud”. Kim, Kyungwon, Eun Kwon, and Jaram Park. "Deep user segment interest network modeling for click-through rate prediction of online advertising." IEEE Access 9 (2021): 9812-9821, discloses modelling of user interest applied in the realm of advertising. Internet (online) advertising is becoming an important direction in the advertising industry with its strengths in diverse users, strong interactions, real-time feedback, and expandability. Internet advertising is mainly divided into search and exhibition ads. Exhibition ads mainly appear in the form of text or images that target web pages, applications, and videos. Search engine ads present advertisement inventory. After the advertiser participates in an auction, it takes up several inventories and exposes advertisements. Comparing with existing advertisements, the two kinds of Internet advertisements rely on the behavior history of users, such as consumers' or netizens' clicks and purchases, and valuable information can be obtained from several promotions. In other words, Internet advertisements can show great marketing ability by processing data from multiple channels to convey information, understanding what users want, and approaching them easily. AI, and in particular, large language model based neural network systems, hold promise for application to targeting advertising. The purpose of the targeted advertising is to increase the efficiency of advertising, ultimately reflected in increased profits of the seller for a typical commercial advertiser. This may be achieved through reduced ad costs per sale, increased conversion of advertising impressions to sales, higher profits sales, and reduced competition. The LLM, or multimodal-enhanced LLM, in a larger system that implements the function, can model the nature of the product or service being conveyed, the characteristics of various users (targets), and the advertising market, to optimize the particular ads delivered to a target, and the valuation of the ad placement. The optimization is an economic optimization employing a value function, based on the desires, needs and value function of the user. In general, the neural networks are pretrained, and the economic optimization algorithm predetermined. The user profile and characteristics are adaptive, and are generic for all advertising and possibly the content targeting as well. Ads fed to the system are processed to extract their salient characteristics, and a metadata file with the characteristics is associated with the ad. In a typical transaction, a user interface has an ad slot available. The nature of the slot and the user characteristics are then processed along with the metadata for the inventory of ads to determine ads that meet logistical and qualitative requirements of the ad slot, and then the algorithm executed to select the most optimal match, or rank the ads according to an optimality metric. The ads may be competitive, i.e., ad sponsors conduct an auction for control over an ad opportunity. However, the system preferably optimizes placement of the ad dependent on the ad characteristics, and not solely based on the economic value to the ad sponsor of the ad placement. This serves to limit display of inappropriate, subjectively offensive, repetitive, irrelevant, fraudulent, or otherwise subjectively undesirable ads to a user, thus increasing user satisfaction with the system, and hence, higher acceptability of appropriate ads. The selected ad then funds the associated transaction. In general, the optimal ad will present a surplus over the minimum required Muriqi-201PCT - 28 - compensation for the content associated with the transaction, but in some cases, there may be a deficiency, to be made up from other sources, such as another ad, the user’s account, etc. Any surplus over the minimum(s) is allocated according to an allocation algorithm, e.g., to the content creator, consuming user, etc. The four metric categories confirming the effectiveness of Internet advertising are cost per mile (CPM), cost per action (CPA), cost per click (CPC), and return on investment (ROI). Currently, most of the ad markets use CPC a lot, and ad revenue is expressed as the product of the probability of a user clicking the ad (click-through rate [CTR]), CPC, and the total number of clicks (N) (N x CTR x CPC). In the end, it directly depends on the number of clicks of users in the structure of the CPC billing of the demand-side platform (DSP). Therefore, predicting CTR is important in DSP [5], and predicting the CTR of an advertisement can increase advertisement revenue and user satisfaction. The model traditionally used to predict CTR is logistic regression (LR). It can be explained and estimated quickly but cannot learn various patterns. In particular, it does not reflect the nonlinear relationship of data for CTR prediction, but the sparser the data and the more high- dimensional features are included, the more performance tends to decrease. Therefore, various algorithms have been developed to use computational complexity and reflect nonlinear characteristics. Factorization machine (FM), field-aware FM (FFM), and gradient boosting decision tree were proposed, but a rather simple algorithm for machine learning was used to reflect the nonlinear classification pattern of advertisement data. In recent years, neural network algorithms have been applied to improve these limitations. Thus, high-dimensional feature interactions can be reflected. To learn nonlinearity, a specific historical feature is converted into a vector of a specific length and combined with other features to form fully connected layers. Researchers have recently proposed interest-based deep networks that can learn static interests from users' historical behaviors. For example, a deep interest network (DIN) improved the diversity of interest representation vectors by using an attention mechanism derived from machine translation. In general, users’ interests change over time and are divided into positive ones with interest and negative ones with no interest. Therefore, the accuracy of CTR prediction may be lower because the real-time interest of the user cannot be reflected. To compensate for these shortcomings, a CTR prediction model that can reflect users’ dynamic interests in past behavior was proposed. Interests are not static but change dynamically according to changes in personal lifestyle or the socioeconomic environment. In this regard, we assume that users’ changes in interests could be predicted by their changes in interests for other elements, specifically, similar users will experience changes in interests in a similar direction. Therefore, tracking how group-level interests evolve as well as individual-level interests is crucial. In this study, we propose a novel model, namely, the deep user segment interest network (DUSIN), to improve CTR prediction by using the recent latent interests of other users (i.e., segment interests) as well as users’ individual interests. The model extracts latent interests at the individual and segment levels and activates the interest information to predict CTR for target advertisements. This study confirms the importance of segment interests to CTR prediction performance as well as the useful design of the segment interest activating layer. Currently, CTR prediction models pay attention to individuals’ “interests” and their evolution. Generally, a sum/average pooling layer is used to learn interests from past click sequences. Users’ interests or feature patterns change constantly, and the fixed-length representation vectors of the pooling layer may have limitations in expressing such information. To solve this problem, efforts were exerted to extract user interests directly based on time-sequence data rather than pooling interest vectors. One such technique is the RNN model, which is employed in GRU4Rec to determine future preferences by using the past click behaviors of users. To extract sequential information effectively, an attention mechanism is used in DIN, which can extract relative and adaptive interests. The DIEN algorithm uses a two-layer RNN structure reflecting the attention framework to estimate the most relative interests of a candidate item. In addition, ATRANK utilizes a transformer, Muriqi-201PCT - 29 - which is an attention-based framework that can improve machine translation performance. A transformer can be a feasible alternative to the RNN for estimating item dependencies and algorithm efficiency. Li et al. developed the attentive capsule network (ACN) algorithm to reflect users’ multiple interests and used a transformer to extract feature interactions and multiple interests. Moreover, the authors proposed a modified dynamic routing algorithm to estimate the sequence representation. Existing studies track changes in interests at the individual level. However, setting the target and segment groups for an advertisement and providing personalized advertisements to the target segments to improve performance are important. Therefore, in traditional marketing methods, audiences are divided into specific user groups through segmentation, and advertisements are presented to potential client groups as the “target,” who are relevant to and interested in the advertisement. One of the most used segmentation methods is interest-based segmentation, which groups users with similar interests. For example, if a user is interested in ingredient analysis for cosmetics or fair-trade products, then we can predict that he/she and other users in a similar group (i.e., segment) may also be interested in organic products. As computational advertising develops, a marketing approach that can comprehensively maximize ROI using information such as user interests, demographics, and geographic locations collected from the Data Management Platform (DMP) may be feasible. Individual users have multiple and diverse interests, and Xiao et al. tried to estimate latent dominant interests by introducing a multi- interest extractor layer. The study estimates the representative evolution of individual users’ dominant interests, whereas the model is focused on representative evolution at the segment and individual levels. Similarly, in a study on user segment extraction, Li et al. reflected the concept of time-aware item behaviors and estimated a user segment interested in a specific item over time. Subsequently, the authors improved recommendation performance by reflecting emerging preferences in a recent period. Therefore, to solve the time evolution problem, the authors developed a deep time-aware item evolution network (TIEN) algorithm using a time-interval attention layer. Moreover, Feng et al. applied the concept of multiplex relation to the algorithm to estimate user segment items. Users exhibit individual interests or item behaviors and are simply “fans of,” “members of,” or “themes of” something other than their interests. In addition, CTR prediction probability is affected by specific segments’ interests or item behaviors. This concept is defined as multiplex relation, and the multiplex target-behavior relation network (MTBRN), which is an algorithm reflecting the “MTBR,” was developed to improve prediction performance. To estimate segment evolution, a knowledge graph (KG) was included in the existing recommender system. Previous works focused on segment interests and their evolution to determine users’ interests and grouped users into segments. However, a main reason for using segment information in the present research is not to segment users but to employ segment interests and evolving information based on predefined segment groups to predict CTR. Finding influencing factors in data analysis is a significant factor in improving analysis performance. An important factor to consider when making recommendations based on interests is that people’s interests evolve over time, and cycles emerge during specific time periods. As information can spread rapidly in social networks through news or events, and users can quickly adapt to such information or recent trends, we assume that the interests of users in the same segments evolve similarly. Therefore, tracking users’ changes in interests at the individual and segment levels is important for accurate target marketing. Inspired by the importance of the segment level and evolution of interests, we propose a model that can predict the click-through rate based on the interest evolution process at the segment and individual levels. According to Kim et al., an algorithm is provided to optimize advertising. Given that the data in advertisement CTR prediction tasks are mostly categorical, the inputs are high-dimensional vectors and are sparse. Therefore, transforming them into low-dimensional dense representations is crucial to reduce dimensional complexity. The embedding layer reduces dimensional complexity and contextualizes the vectors. The categorical feature values are mapped to the integer index values and used as input for the embedding layer. The embedding Muriqi-201PCT - 30 - layer looks up the embedding dictionary (i.e., lookup table), which is updated by a backpropagation algorithm during training. All outputs of embedding vectors are concatenated and fed into the following fully connected layers, except for users’ behavior sequences. Users’ behavior sequence features are fed into the individual user interest extractor layer, which will be presented later in this study. Segment interests are used to improve model performance for predicting advertisement click-through rates as well as individual user interests. Individual user interests are defined as latent user interest vectors extracted from individuals’ sequential user behaviors, such as viewing the web page of a specific brand or product. The types of information that users focus were determined on based on their sequential behavior history. Segment interests are latent interest vectors that are extracted and aggregated from the sequential behavior history of users in a specific group. How individual and segment interests are generated and activated are described in the following sections. The DUSIN model is composed of three main parts, that is, an individual user interest extractor layer, a segment interest extractor layer, and a segment interest activating layer. The model used embedding vectors of historical display sequences, which contain information about advertisements, such as the category and brand of the product. The users’ complete history of advertisement display viewing behavior were focused on, rather than active behavior, such as buying or putting an item into a cart. Thus, the sequence history could be noisy. Therefore, given the enormous information of the users’ history sequence, identifying the essential information for predicting CTR for the users would be better for the model. To save more essential information in historical sequences, gated recurrent unit (GRU) cells are utilized, which have an update and reset gate to efficiently determine the quantity of past information to retain or forget. GRU has four components, namely, zt, the update gate at timestep t, r t , the reset gate at timestep t, h t , and the hidden layer at timestep t. By relying on the GRU, two kinds of individual user interest are present in output. First, the last hidden vector of the GRU is expected to have the accumulated information from the beginning of the user behavior sequence. Therefore, we define the last hidden vector as an individual user’s latent interest. Second, the output sequences of GRU is used for activating segment interest. Through the individual user interest extractor layer, each user obtained their latent interest states at every advertising request for a user. Using this latent interest, segment interest is newly obtained and updated. Based on the segment IDs of users, the segment finder selects the segment to be updated and vertically concatenates the users’ latent interest on the existing segment interest. The embedding vectors of the historical viewing behavior of advertisements are first fed into the GRU layer. The output vectors of the GRU layer are then treated as an individual user’s interest and fed into the segment interest activating layer. The key idea of this layer is based on the DIN local activation unit, which is similar to ideas incorporating attentional methods. The DIN activation unit calculated the activation weight by using the relationship of users’ historical sequence (advertisement information) and target ad information. However, different from the DIN local activation unit, DUSIN calculated activation weight by considering the relationship of users’ historical sequence and the recent latent interest of other users who are assumed to be similar with the user (i.e., segment interest). The obtained segment interest S i is activated in two ways in the segment interest activating module. First, the segment interest is element-wise multiplied by the target ad to represent the relationship between the current segment users’ interests and the target advertisement. Second, the model obtains the weighted sum pooling using the activation weight and historical sequence. Advertisements are exposed to customers through a transaction between the supply side platform, which supplies inventory for posting advertisements to users, and the DSP, which wants to purchase inventory to expose advertisements from the advertiser’s point of view. See Targeted Advertising references. 3. DISTRIBUTED LEDGER AND BLOCKCHAIN A distributed ledger is a database that is consensually shared and synchronized across multiple sites, institutions, or geographies, accessible by multiple entities. It allows transactions to have public "witnesses." The participant at each node of the network can access the Muriqi-201PCT - 31 - recordings shared across that network and can own an identical copy of it. Any changes or additions made to the ledger are reflected and copied to all participants in a matter of seconds or minutes. A distributed ledger stands in contrast to a centralized ledger, which is the type of ledger that most companies use. A centralized ledger is more prone to cyber attacks and fraud, as it has a single point of failure. The present technology may be centralized, and employ a traditional structured query language (SQL) or so-called NoSQL technology, implemented in centralized databases, datacenters, and cloud architectures. However, an interesting option arises to permit the system to operate without centralized infrastructure in a decentralized manner. In this case, the content is distributed among node of the database, and is available for communication to a requesting node, in a manner similar to the Torrent network, eDonkey network, or other peer-to-peer file sharing technology (P2P). Similarly, the ads may also be distributed through such a P2P. Further, metadata files for content and ads may also be distributed through P2P, ensuring that nodes have a sufficiently synchronized local database upon which to perform a targeting and optimization. Because influencers are not universal, respective users may receive metadata files associated with preferred influencers through the P2P. Therefore, a respective node of the system may have all of the data available, either stored locally, or accessible within a reasonable period of time, to filter, rank, and present media to a user, along with optimal ads, without involvement of central infrastructure. The availability of data is not the entire issue. In order for the network to be sustainable, e.g., software development, resource availability, media availability, there needs to be a thriving economy. Thus, payments need to be made by or to network participants. The payments are preferably cryptocurrencies transacted through a decentralized ledger that would often be distinct from the distributed databases that include the social media content and metadata, though in some cases it may be within a common system. The transaction of providing content and ads to a user for consumption may be implemented as a smart contract, using cryptocurrency as the “fuel” or gas and the medium of compensation. An advertiser provider advertising collateral, along with targeting data and rules, and cryptocurrency payment to the system, in a smart contract that permits the payment to be drawn upon compliance with the rules and according to the data. The user typically has a live, real- time feed which is updated, as the user interacts with the user interface and consumes the media. In advance of the consumption, the media may be associated with a payment from a media sponsor for favorable placement in a user’s queue, or naturally placed according to the user’s characteristics and profile. When the user seeks to consume the media, a transaction is triggered to compensate the content owner, recommender and/or influencer, network operator, etc., for the use of the network and content. Assuming that the transaction is within the transaction parameters for the ad, then the smart contract executes, drawing the compensation from the advertiser, and crediting the accounts of the network operator, recommender and/or influencer, media owner, and optionally also the users themselves. In some cases, P2P participants, or other infrastructure or service providers may also be compensated for maintaining the information in the distributed database and for communicating that information. A transaction may also be a hybrid transaction, such that some aspects are centralized, while others are distributed. For example, an adserver may provide the ads and ad metadata, or even process the user targeting aspects of the system. In that case, the adserver may also generate payments to the various participants. However, if the system is operated in a decentralized mode, it is preferred that it is fault tolerant, and privacy preserving, so that the adserver is preferably not a critical service of the network such that a failure of the adserver interrupts the network as a whole. In the decentralized paradigm, an unsubsidized transaction may still be processed, though funded by another account, such as the consuming user. Another aspect of this system is that the idea of a sponsor or advertiser may be open to any interest that seeks to pay for a right or privilege on the system. For example, an influencer or would-be influencer may be willing to stake the system and pay for access to users, which can then accept the influencer or reject it. If accepted, the influencer may then recoup the investment based on referral fees. Similarly, a Muriqi-201PCT - 32 - recommender may supply tokens or resources to control aspects of the network, and therefore may be a net source of subsidy, at least at some times. The network operator may control a main automated recommender, and thus receive a share of transactions for this service, but the main automated recommender may be in competition with third party recommenders, which would also be compensated. Thus, a private label social network may be implemented by providing client software that selects a proprietary recommender that filters or ranks content for the users, generally limits access to other recommenders, and optionally controls ad flow. A distributed ledger is a database that is synchronized and accessible across different sites and geographies by multiple participants. The need for a central authority to keep a check against manipulation is eliminated by the use of a distributed ledger. Distributed ledgers may be permissioned or permissionless. This determines if anyone or only approved people can run a node to validate transactions. They also vary between the consensus algorithm – proof of work, proof of stake, voting systems and hashgraph. They may be mineable (one can claim ownership of new coins contributing with a node) or not (the creator of the cryptocurrency owns all at the beginning). All blockchain is considered to be a form of DLT. There are also non-blockchain distributed ledger tables. A blockchain is defined as a chronological arrangement of data blocks in a form similar to a linked list structure. The cryptography technology and consensus mechanisms are employed to ensure that block data cannot be tampered with and forged, and to achieve decentralized ledger. Blockchain is highly related to some traditional technologies such as peer-to-peer network technology, asymmetric cryptography, consensus mechanism, and smart contracts. Blockchain has the characteristics of decentralization, high reliability, anonymity, traceability, and high security. Many blockchain-based application systems with autonomous property have been designed. Blockchain technology uses a number of recent advances of cryptography and security technologies, especially for identity authentication and privacy protection technologies. Some specific techniques include encryption algorithms, hash algorithms, digital signatures, digital certificates, PKI systems, Merkle trees, etc. Hash algorithm and digital signature scheme can ensure the integrity of blockchain structure. Digital signature and digital certificate guarantee non-repudiation of transactions. Merkle tree can organize transaction data in the block structure according to their hash values, which ensures that the transaction data cannot be maliciously falsified. Blockchain can be regarded as a distributed ledger based on trust mechanism. Different nodes can be added to the blockchain network to implement synchronization and decentralization. Compared with traditional distributed storage technology, the blockchain system provides certain fault tolerance performance under the untrusted networks. With Byzantine fault tolerance, each node in an untrusted environment can only know that the majority of nodes in the entire network are honest, and all honest nodes can achieve consistence in the system. The consensus mechanism in the blockchain system allows decentralized nodes to jointly maintain the consistency of the blockchain ledger. Many consensus mechanisms have been proposed, for example, Proof of Work (POW), Proof of Stake (POS), Delegated Proof of Stake (DPOS), Byzantine fault tolerance (BFT). Among them, POW is a mechanism to obtain block construction permissions using computer computing power. POS allocates the accounting right according to the amount of assets held by nodes and the time of holding money. DPOS improves POS greatly in achieving a consensus mechanism of selects the block person through the voting mechanism to complete the trust operation. A Blockchain system can use a smart contract to disseminate, verify, and enforce contracts in an informational manner, so as to achieve trusted transactions without third parties. Blockchain technology provides a trusted execution environment for smart contracts. A blockchain- based smart contract is essentially a piece of unchangeable computer code. Smart contacts ensure the security and efficiency of the system and Muriqi-201PCT - 33 - greatly reduces the transaction cost. A blockchain is a growing list of records, called blocks, that are linked together using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). The timestamp proves that the transaction data existed when the block was published in order to get into its hash. As blocks each contain information about the block previous to it, they form a chain, with each additional block reinforcing the ones before it. Therefore, blockchains are resistant to modification of their data because once recorded, the data in any given block cannot be altered retroactively without altering all subsequent blocks. en.wikipedia.org/wiki/Blockchain Blockchains are typically managed by a peer-to-peer network for use as a publicly distributed ledger, where nodes collectively adhere to a protocol to communicate and validate new blocks. Although blockchain records are not unalterable as forks are possible, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance. A blockchain is a decentralized, distributed, and oftentimes public, digital ledger consisting of records called blocks that is used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks. This allows the participants to verify and audit transactions independently and relatively inexpensively. A blockchain database is managed autonomously using a peer-to-peer network and a distributed timestamping server. In the case of Blockchain and other game theoretic reliance systems, they are authenticated by mass collaboration powered by collective self-interests. Such a design facilitates robust workflow where participants' uncertainty regarding data security is marginal. The use of a blockchain removes the characteristic of infinite reproducibility from a digital asset. It confirms that each unit of value was transferred only once, solving the long-standing problem of double spending. A blockchain has been described as a value-exchange protocol. A blockchain can maintain title rights because, when properly set up to detail the exchange agreement, it provides a record that compels offer and acceptance. Logically, a blockchain can be seen as consisting of several layers: infrastructure (hardware); networking (node discovery, information propagation and verification); consensus (proof of work, proof of stake); data (blocks, transactions); and application (smart contracts/decentralized applications, if applicable). Blocks hold batches of valid transactions that are hashed and encoded into a Merkle tree. Each block includes the cryptographic hash of the prior block in the blockchain, linking the two. The linked blocks form a chain. This iterative process confirms the integrity of the previous block, all the way back to the initial block, which is known as the genesis block. To assure the integrity of a block and the data contained in it, the block is usually digitally signed. Sometimes separate blocks can be produced concurrently, creating a temporary fork. In addition to a secure hash-based history, any blockchain has a specified algorithm for scoring different versions of the history so that one with a higher score can be selected over others. Blocks not selected for inclusion in the chain are called orphan blocks. Peers supporting the database have different versions of the history from time to time. They keep only the highest-scoring version of the database known to them. Whenever a peer receives a higher-scoring version (usually the old version with a single new block added) they extend or overwrite their own database and retransmit the improvement to their peers. There is never an absolute guarantee that any particular entry will remain in the best version of the history forever. Blockchains are typically built to add the score of new blocks onto old blocks and are given incentives to extend with new blocks rather than overwrite old blocks. Therefore, the probability of an entry becoming superseded decreases exponentially as more blocks are built on top of it, eventually becoming very low. For example, bitcoin uses a proof-of-work system, where the chain with the most cumulative proof-of-work is considered the valid one by the network. There are a number of methods that can be used to demonstrate a sufficient level of computation. Within a blockchain the computation is carried out redundantly rather than in the traditional segregated and parallel manner. Muriqi-201PCT - 34 - The block time is the average time it takes for the network to generate one extra block in the blockchain. Some blockchains create a new block as frequently as less than every five seconds. By the time of block completion, the included data becomes verifiable. In cryptocurrency, this is practically when the transaction takes place, so a shorter block time means faster transactions. The block time for Ethereum is set to between 14 and 15 seconds, while for Bitcoin it is on average 10 minutes. A hard fork is a rule change such that the software validating according to the old rules will see the blocks produced according to the new rules as invalid. In case of a hard fork, all nodes meant to work in accordance with the new rules need to upgrade their software. If one group of nodes continues to use the old software while the other nodes use the new software, a permanent split can occur. For example, Ethereum has hard-forked to "make whole" the investors in The DAO, which had been hacked by exploiting a vulnerability in its code. In this case, the fork resulted in a split creating Ethereum and Ethereum Classic chains. Alternatively, to prevent a permanent split, a majority of nodes using the new software may return to the old rules. In the case of smart contracts, and especially those that automatically control transfer of rights or assets, a split is infeasible, unless the rights themselves are present on the old and new blockchains. Since the smart contract was written under the original rules, these should apply to the result, unless all parties to the transaction agree to updating the software/rule set. A sidechain is a designation for a blockchain ledger that runs in parallel to a primary blockchain. Entries from the primary blockchain (where said entries typically represent digital assets) can be linked to and from the sidechain; this allows the sidechain to otherwise operate independently of the primary blockchain (e.g., by using an alternate means of record keeping, alternate consensus algorithm, etc.). By storing data across its peer-to-peer network, the blockchain eliminates a number of risks that come with data being held centrally. The decentralized blockchain may use ad hoc message passing and distributed networking. One risk of a lack of a decentralization is a so-called "51% attack" where a central entity can gain control of more than half of a network and can manipulate that specific blockchain record at will, allowing double-spending. A key advantage to a decentralized blockchain implementation is that the business risk of a central clearing agent is abated, and should the originator no longer be available, smart contracts on the blockchain technically survive. It remains underdetermined what happens if the community supporting the blockchain ceases to operate, though an interested party could maintain a node and process its own transaction, though with greatly diminished distributed consensus protections. Peer-to-peer blockchain networks lack centralized points of vulnerability that computer crackers can exploit; likewise, it has no central point of failure. Blockchain security methods include the use of public-key cryptography.   A public key (a long, random-looking string of numbers) is an address on the blockchain. Value tokens sent across the network are recorded as belonging to that address. A private key is like a password that gives its owner access to their digital assets or the means to otherwise interact with the various capabilities that blockchains now support. Data stored on the blockchain is generally considered incorruptible. Every active mining node in a decentralized system has a copy of at least the last block of the blockchain. Data quality is maintained by massive database replication and computational trust. No centralized "official" copy exists and (in a pure proof of work consensus system) no user is "trusted" more than any other. Transactions are broadcast to the network using software. Messages are delivered on a best-effort basis. Mining nodes validate transactions, add them to the block they are building, and then broadcast the completed block to other nodes.   Blockchains use various time-stamping schemes, such as proof-of-work, to serialize changes. Alternative consensus methods include proof-of- stake. Growth of a decentralized blockchain is accompanied by the risk of centralization because the computer resources required to process larger amounts of data become more expensive. An advantage to an open, permissionless, or public, blockchain network is that guarding against bad actors is not required and no access control is needed. This means that applications can be added to the network without the approval or trust of others, using the blockchain as a Muriqi-201PCT - 35 - transport layer. Bitcoin and other cryptocurrencies currently secure their blockchain by requiring new entries to include a proof of work. To prolong the blockchain, bitcoin uses Hashcash puzzles. While Hashcash was designed in 1997 by Adam Back, the original idea was first proposed by Cynthia Dwork and Moni Naor and Eli Ponyatovski in their 1992 paper "Pricing via Processing or Combatting Junk Mail". Permissioned blockchains use an access control layer to govern who has access to the network. In contrast to public blockchain networks, validators on private blockchain networks are vetted by the network owner. They do not rely on anonymous nodes to validate transactions nor do they benefit from the network effect. It has been argued that permissioned blockchains can guarantee a certain level of decentralization, if carefully designed, as opposed to permissionless blockchains, which are often centralized in practice. A blockchain, if it is public, provides anyone who wants access to observe and analyze the chain data, given one has the know-how. Blockchain-based smart contracts are contracts that can be partially or fully executed or enforced without human interaction. One of the main objectives of a smart contract is automated escrow. A key feature of smart contracts is that they do not need a trusted third party (such as a trustee) to act as an intermediary between contracting entities; the blockchain network executes the contract on its own. This may reduce friction between entities when transferring value and could subsequently open the door to a higher level of transaction automation. Chakravorty, Antorweep, and Chunming Rong. "Ushare: user controlled social media based on blockchain." In Proceedings of the 11th international conference on ubiquitous information management and communication, pp.1-6.2017 relates to Ushare, which allows users to have control over their social interactions. It employs a blockchain that describes assets as data shared or broadcasted to the network. Unlike regular state transition systems that describe ownership status of assets, it describes a state as a depletion of a token value that determines the number of transactions or shares that can be performed with that asset. A Turing complete Relationship System (e.g., an Ethereum-style virtual machine) handles the transition of the states through validation of the tokens until they get completely depleted. Finally, a client based Personal Certificate Authority (PCA) maintains a user’s relationships and ensure that the encrypted assets that have been shared are viewable by only the intended circle of members. Further, the Ushare is anonymous and secure as all stored data would be encrypted off-sight before storing it in the blockchain or any accompanying system. A blockchain-based digital advertising media system (B2DAM) was proposed that uses the Hyperledger Fabric, which is named ad- chains. It applies the blockchain technology to address the issues in the IDA ecosystem. Advertising coins (ad-coins) are employed to realize a reward mechanism, and the interests of roles are clarified in the decentralized system. The ad-coin system provides interests as well as restrictive effects on the roles of the ad market. With the revenue mechanism, users could be motivated to watch ads more actively compared to that in existing IDA systems. The B2DAM system relies on numerous nodes to ensure system stability and security. Therefore, it is necessary to design an effective incentive mechanism to encourage users to build more nodes. During the system initialization phase, new nodes and users can get additional ad-coins as rewards when publishing, pushing, and watching ads. The number of rewards decreases as the number of nodes increases. The users’ privacy exposure is a prominent problem in the IDA market. Budak et al. found that the widespread use of ad- blocking software and third-party platform tracking are the main causes of threats. Users must be rewarded for watching ads. Once a user finished watching an ad, both users and ad publishers are rewarded with ad-coins. ad-coins are issued by the ad-chains, and it can also be obtained through transactions, which can be used in the B2DAM system only. Watching ads can benefit both users and ad publishers. If a low- quality ad is found, the user can close, skip, or score after watching. The transactions of ad-coins must be verified. Both parties of a transaction must have their wallet address with enough ad-coins. The transaction records the transfer of ad-coins from one wallet address to another. Every transaction needs to be verified by the blockchain consensus mechanism. A secure consensus mechanism guarantees the security of Muriqi-201PCT - 36 - currency transactions. The stability of B2DAM system relies on the adchains. The more nodes, the more stable the system is. User’s privacy should be protected. Each user in the B2DAM system has a public wallet address and a private key. A wallet address is distributed by the ad- chains, which can be changed at any time when its holder needs. Users can anonymously conduct transactions of ad-coins and evaluation of ad-related information, while keeping it safe in their wallets. In an early stage, B2DAM system uses the smart contract to set an incentive mechanism, in order to stimulate users to watch ads. A reward mechanism is also implemented to reward each user watching the ads with some ad-coins. Users who join the system in advance can receive additional rewards until the system matures. New users can earn additional adcoins by watching ads on the ad publisher platform constantly, while the ad publisher can also get rewards from advertisers. Advertisers must have enough ad-coins before providing ad-related information in order to ensure that users can get rewards after they watched ad. The ad-chains provide a mechanism which is used to determine whether an advertiser has sufficient funds to cover the costs of ad that they delivered, to ensure that the system works properly. When advertisers’ ad-coins are not enough to pay for the ads publish fees, the system will stop recommending ads and feedback to them. Once an ad is watched, the system will pay the advertiser’s pre-stored ad-coins to the ad publisher and user. Users are able to obtain some ad-coins from the advertiser after they watched ad, and the rest is paid to the ad publisher. Raft is a consensus algorithm with better performance in the consortium blockchain. The raft algorithm consists of three roles: follower, candidate, and leader. A node in a cluster can only be one of these three roles at a time. These three roles are mutually transformed as time and conditions change. There are two main processes in the algorithm: one is the leader election, and the other is log replication, where the log replication process is divided into two stages: logging and submitting data. The fault-tolerant node of the raft algorithm is (N-1)/2, where N is the total number of nodes in the cluster. The Livepeer project provides a live video streaming network protocol that is fully decentralized, highly scalable, crypto token incentivized, and results in a solution which can serve as the live media layer in the decentralized development (web3) stack. In addition, Livepeer is meant to provide an economically efficient alternative to centralized broadcasting solutions for broadcasters. The Livepeer Protocol is a delegated stake based protocol for incentivizing participants in a live video broadcast network in a game-theoretically secure way. Gu et al. provides an autonomous resource request transaction framework based on blockchain in a social network, in which all kinds of resources in the social community can be traded through blockchain technology. When a user needs to acquire some resources from a community, the user may make a transaction with the members from the community through blockchain technology while the members autonomously negotiate each other to reach an agreement. The proposed framework provides an incentive mechanism to encourage community members to disseminate the resources through a smart contract. An incentive mechanism is provided to encourage the community members to disseminate the digital resources through smart contracts, where the community members can both obtain some of payment from resource requesters. Smart contracts are provided for resource uploading and resource request respectively. See Distributed Ledger And Blockchain references. 4. SMART CONTRACTS So-called “Smart Contracts” are legal obligations tied to a computer protocol intended to digitally facilitate, verify, or enforce the negotiation or performance of the contracts. Smart contracts allow the performance of credible transactions without third parties. These transactions are trackable and may be irreversible. See, en.wikipedia.org/wiki/Smart_contract. The phrase "smart contracts" was coined by computer scientist Nick Szabo in 1996. A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on these promises. Recent implementations of smart contracts are based on blockchains, though this is not an intrinsic requirement. Building on this base, some Muriqi-201PCT - 37 - recent interpretations of "smart contract" are mostly used more specifically in the sense of general purpose computation that takes place on a blockchain or distributed ledger. In this interpretation, used for example by the Ethereum Foundation or IBM, a smart contract is not necessarily related to the classical concept of a contract, but can be any kind of computer program. As noted above, the operation of the social network may be through a series of transactions in a distributed ledger, in which tokens are disbursed according to a smart contract based on media access and consumption. In the most generic case, any network participant may fund a transaction, though typically the network has sponsors, who fund network operation, and functionaries and users, who are compensated from proceeds of network operations. The smart contracts in some cases need not follow strict requirements of immutability, and in fact, there may be condition subsequent rules that can alter the token distribution after the transaction. For example, when a user seeks content, and received advertising, the advertising subsidy may be dependent on the user actually viewing the ad. If a user monitoring process reveals that the ad was not actually viewed, the subsidy may be withdrawn. Similarly, if a content owner is compensated for use of content, but the content is not actually used, then the payment to the content owner may be reversed or partially reversed. Byzantine fault tolerant algorithms allowed digital security through decentralization to form smart contracts. Additionally, the programming languages with various degrees of Turing-completeness as a built-in feature of some blockchains make the creation of custom sophisticated logic possible. Notable examples of implementation of smart contracts are Decentralized cryptocurrency protocols are smart contracts with decentralized security, encryption, and limited trusted parties that fit Szabo's definition of a digital agreement with observability, verifiability, privity, and enforceability. Bitcoin provides a Turing-incomplete Script language that allows the creation of custom smart contracts on top of Bitcoin like multisignature accounts, payment channels, escrows, time locks, atomic cross-chain trading, oracles, or multi-party lottery with no operator. Ethereum implements a nearly Turing-complete language on its blockchain, a prominent smart contract framework. Smart contracts have advantages over equivalent conventional financial instruments, including minimizing counterparty risk, reducing settlement times, and increased transparency. Smart contracts deployed on blockchains enable the creation of new types of digital assets, called tokens, that can interact with each other. In general, all kinds of digital information or assets can be customized in the form of tokens, whose process refers to tokenization. After digital assets are tokenized, they can be recorded on the blockchain. Different blockchains may have different tokenization processes. Currently, the most well-known guideline to create a token is a series of Ethereum Request for Comments (ERCs), which describe the fundamental functionalities and provide guidelines that a token should comply with working correctly on the Ethereum network. Within ERCs, various types of tokens are defined regarding the features of assets, e.g., ERC-20 for divisible assets and ERC- 721 for indivisible assets. Once a token representation of a digital asset is created on a blockchain, it can be traded via a process known as an Initial Coin Offering (ICO), the online sale of created tokens. See Smart Contracts references. 5. FUNGIBLE TOKENS (FT) AND NON-FUNGIBLE TOKENS (NFT) In the present technology, tokens are employed to facilitate decentralized transactions. In some cases, the token is used in an economic transaction, and a fungible token may be employed which can be used across all types of transactions within the system. On the other hand, specialized tokens may be used that have limiting or defining characteristics that are unique or semi-unique, and have a plurality of different classes. These unique or semi-unique tokens are considered non-fungible because they are not equivalent across classes and are not directly interchangeable. Nonfungible tokens can be associated with individual media files, ads, users, sponsors, investors, affinity groups, etc. NFT Muriqi-201PCT - 38 - have be used in conjunction with smart contracts, such that a particular NFT is linked to a particular contract. A non-fungible token (NFT) is a unique and non-interchangeable unit of data stored on a digital ledger (blockchain). NFTs can be associated with published digital works, and used to distinguish between possession of a copy of the work and rights with respect to the work. The NFT may be used analogously to a certificate of authenticity, and use blockchain technology to give the NFT a public proof of ownership. The lack of interchangeability (fungibility) distinguishes NFTs from blockchain cryptocurrencies, such as Bitcoin. An NFT is a unit of data stored on a digital ledger, transfers of which can be transferred on the digital ledger. The ledger may be distributed, and be implemented as a blockchain. The NFT can be associated with a particular digital or physical asset (such as a file or a physical object). NFTs function like cryptographic tokens, but, unlike cryptocurrencies like Bitcoin, NFTs are not mutually interchangeable, hence not fungible. As a result, tokens have a value associated with the rights linked to the token, and not represented by the token itself. NFTs may be created by recording a record on a blockchain, which is then verifiable dependent on the blockchain. Changes of ownership may be recorded on the blockchain. Ownership of an NFT does not inherently grant copyright or intellectual property rights to whatever digital asset the token represents. While someone may sell an NFT representing their work, the buyer will not necessarily receive any exclusive rights to the underlying work, and so the original owner may be allowed to create more NFTs of the same work. On the other hand, if the original work is itself a creature of the blockchain, then a “rule” may be imposed limiting the number of NFTs that may be issued, or other exclusive rights of the recipient. In that sense, an NFT is merely a proof of ownership that is separate from a copyright. The unique identity and ownership of an NFT is verifiable via the blockchain ledger. Ownership of the NFT is often associated with a license to use the underlying digital asset, but generally does not confer copyright to the buyer, some agreements only grant a license for personal, non-commercial use, while other licenses also allow commercial use of the underlying digital asset. In general, access to particular content may be limited based on availability of a corresponding token, which would then be considered a NFT, since the same token cannot be used for different content. The NFT may be integral to a digital rights management (DRM) system, to unlock the content and compensate the content owner. Thus, a smartcontract transaction results in an NFT being conveyed to the user’s media player, which then consumes the NFT and presents the NFT to the user. The NFT may be generated during the transaction based on an advance authority, or obtained from the content owner through or as a result of the transaction. The NFT does not need to be consumed immediately, and of the NFT is not consumed, it may be returned, exchanged, or sold. This allows market participants to arbitrage inefficiencies within the social network, and as a result, provide incentives for increased efficiency. While there is a social cost in arbitrage, the cost of inefficiency may be much higher. Similarly, each participant may use FTs or NFT for their respective roles. FTs provide liquid present value and a future value based on the health of the social network itself (assuming a utility token is used for generic transactions within the network), while NFTs have a present value based on an immediate transaction, and a future value dependent on a market for a particular feature. NFTs may therefore be used to isolate speculation and arbitrage, and allocate specific rights in the future, whereas FTs follow the economy as a whole. ERC-721 is an inheritable Solidity smart contract standard, meaning that developers can create new ERC-721-compliant contracts by importing them from the OpenZeppelin library. ERC-721 provides core methods that allow tracking the owner of a unique identifier, as well as a permissioned way for the owner to transfer the asset to others. The ERC-1155 standard offers "semi-fungibility", as well as providing a superset of ERC-721 functionality (meaning that an ERC-721 asset could be built using ERC-1155). Unlike ERC-721 where a unique ID represents a single asset, the unique ID of an ERC-1155 token represent a class of assets, and there is an additional quantity field to represent the amount of the class that a particular wallet has. The assets under the same class are interchangeable, and the user can transfer any amount of assets to others. Some more recent NFT technologies use validation protocols distinct from proof of work, such as proof of stake, that have Muriqi-201PCT - 39 - much less energy usage for a given validation cycle. Other approaches to reducing electricity include the use of off-chain transactions as part of minting an NFT. The distinctive feature of ERC1155 is that it uses a single smart contract to represent multiple tokens at once. This is why its balanceOf function differs from ERC20’s and ERC777’s: it has an additional id argument for the identifier of the token that you want to query the balance of. This is similar to how ERC721 does things, but in that standard a token id has no concept of balance: each token is non-fungible and exists or doesn’t. The ERC721 balanceOf function refers to how many different tokens an account has, not how many of each. On the other hand, in ERC1155 accounts have a distinct balance for each token id, and non-fungible tokens are implemented by simply minting a single one of them. This approach leads to massive gas savings for projects that require multiple tokens. Instead of deploying a new contract for each token type, a single ERC1155 token contract can hold the entire system state, reducing deployment costs and complexity. Because all state is held in a single contract, it is possible to operate over multiple tokens in a single transaction very efficiently. The standard provides two functions, balanceOfBatch and safeBatchTransferFrom, that make querying multiple balances and transferring multiple tokens simpler and less gas-intensive. Tokens can represent assets on the blockchain to facilitate transactions, whose representations, tokens, are roughly categorized into fungible tokens (FT) and non-fungible tokens (NFT), based on the fungibility of assets. Fungible tokens are exchangeable and identical in all aspects and generally divisible, while non-fungible tokens cannot be substituted for other tokens even with the same type and (at least to the extent compliant with prior standards) are indivisible. One classic example of fungible tokens is crypto-currencies, in which all the coins generated for crypto-currencies are equivalent and indistinguishable. On the other hand, non-fungible tokens are typically unique and specially identified, which cannot be exchanged in a fungible way, making them suitable for identifying unique assets. Furthermore, with the help of smart contracts on the blockchain, one can easily prove the existence and ownership of digital assets, and the full-history tradability and interoperability of blockchain assets make NFTs become a promising intellectual property protection solution. Digital assets vary in terms of fungibility, which is a characteristic of a token that indicates whether assets can be entirely interchangeable during an exchange process. Fungible tokens of the same type are identical (like coins are identical), being divisible into smaller units (like coins of different values). Non-fungible tokens have been employed to represent unique assets (e.g., collectables, certificates of any kind, any type of access rights, objects, etc.). Thus, an NFT is unique, indivisible, and different from other tokens even with the same type. There exist several well-known crypto-tokens: crypto-coins, asset-tokens, and utility-tokens. From the perspective of fungibility, crypto coins typically belong to fungible tokens, and both asset-tokens and utility-tokens are non-fungible tokens. Crypto coins are commonly referred to as crypto-currencies, with the help of blockchain, which can be used as a medium of exchange of currencies without resorting to any centralized banks. Asset-tokens typically can be used to represent a wide range of assets beyond crypto-currencies, e.g., assets with physical existence (i.e., real properties) or without physical existence (i.e., stock shares). Utility-tokens are typically used to represent a unit of product or service, or tokens that enable future access to a product of service. In general, a token is affected by four operations in its lifecycle. The issuer (often as a seller) first creates the token (e.g., via smart contracts). If traded on a trading market, the buyer then bids upon the token, at which point agreement, the seller transfers the token’s value to the buyer. Finally, the new owner (e.g., the buyer) of a token can redeem the value of the token. This description describes a general model of a token life-cycle. When a token is created on a blockchain, e.g., public blockchain, everyone can see how it was developed and linked to the underlying right or asset. Due to the anonymity or pseudonymity of blockchain, when legal disputes arise from the creation and use of digital assets, it is often not enough to match these assets with the real-life owner or creator of the token, which makes the verification process of assets difficult. (anonymity or pseudonymity are optional, and therefore this may not be a significant problem). Most existing tokens are Muriqi-201PCT - 40 - required to operate with smart contracts to verify their ownership and manage their transferability. Blockchain is a publicly known distributed ledger technology underlying many digital crypto-currencies, such as Bitcoin. In a broad sense, blockchain can be roughly explained as an immutable, decentralized, trusted, and distributed ledger based on decentralized (e.g., peer-to-peer (P2P)) networks. Essentially, blockchain is a distributed data structure and is labelled as a “distributed ledger" in its applications, functioning to record transactions generated within a network. As a distributed and decentralized ledger, the essential component of blockchain is data, alternatively called transaction. The transaction information can be considered a token transferring process occurring in a network or any data exchange. Atomicity Consistency Isolation Durability (ACID) provides general principles for transaction processing systems, e.g., blockchain. A transaction in an ACID system should have the following features for a blockchain system: (a) a transaction (or a transaction block consisting of multiple transactions) is executed as a whole or not at all (e.g., enabling the feature of “all or nothing"); (b) each transaction transforms the system from one consistent and valid state to another, without compromising any validation rules and data integrity constraints; (c) concurrent transactions are executed securely and independently, preventing them from being affected by other transactions; and (d) once a transaction has been successfully executed, all changes generated by it become permanent even in the case of subsequent failures. Some indivisible assets require strong atomicity on the contained information, e.g., as one piece, while others (e.g., most crypto-currencies) can be dividable. The Ethereum platform can be used to create arbitrary smart contracts, whose tokens can be used to represent various digital assets. These tokens can represent anything from both physical objects and virtual objects. They can use them for a variety of purposes, e.g., recording transactional data information or paying to access a network. The mapping process between a token and its representative asset is initially purely fictitious. The token contains the asset model that is certified by a smart contract to guarantee the uniqueness of data. In general, tokens will not depend on operating systems and do not include physical content within, and via the smart contract, it is easy to verify the validity of a token. Tokenization is the transformation process of data/assets into a representation by a random digitized sequence of characters. It simplifies the process of representing physical/virtual assets and provides some protection on sensitive data, e.g., by substituting non-sensitive data into a token. The token serves merely as a reference to the original data or assets for blockchain applications but cannot be utilized to determine those values. A token itself does not include economic value information in it, and the “monetary" value of a token typically is assigned by the market. Thus, we can consider a token as a symbol that is validated by smart contracts of the target blockchain system. As long as validated by the smart contract, the token can be used in numerous applications or be traded in the market. Tokenization of real-world assets is a trend that generates much interest in blockchain research. Tokenization on the blockchain provides many advantages. For instance, tokenization eliminates most financial, legal, and regulatory intermediaries, resulting in significantly lower transaction costs. A fungible asset can be interchangeable with other assets of the same category or type. Fungibility refers to an asset’s capacity to be interchanged with other assets of the same or similar types. In other words, fungibility is one kind of property of a token that specifies whether objects or quantities of a similar type can be freely interchangeable during a trade or utilization. In general, in the finance domain, fungible assets simplify the exchange and trade processes, as fungibility implies equal value among the involved assets. In the token domain, some of them are purely equal (aka. perfectly fungible tokens), while others possess distinct characteristics which ensure their uniqueness (aka. non- fungible tokens). The fungibility of a token refers to the fact that the token has the same or similar content compared to other fungible tokens. Thus, fungible tokens are interchangeable/replaceable with, or equal to, another asset of the same category. For example, A fungible token can be Muriqi-201PCT - 41 - readily substituted by other assets of the same or equivalent value that may be divided or exchanged. They are identical to one another and can be divided into smaller units, which does not affect their values. Furthermore, fungible tokens typically are not unique. For example, a payment token is always fungible, which is exchangeable, divisible, and not unique in nature. From a technical perspective, a fungible token is implemented as a list of blockchain addresses (user accounts) that have a number (quantity) associated with them, together with (1) a set of methods used to manipulate that list, such as ‘transfer ^ tokens from address ^ to address ^’, and (2) rules to determine who can manipulate that list in which way. Under applications of the Ethereum blockchain, ERC-20 (or Ethereum Request for Comments #20) is an example of fungible tokens. It is a specification established upon by the Ethereum community (a community that endorses ERCs) that specifies certain fundamental functionalities and provides criteria for a token to comply with performing correctly on Ethereum blockchains. An ERC-20 token is a token that follows ERC-20 guidelines. They have some inherent feature that makes one token identical to another token in terms of type and value. For example, an ERC-20 token functions similarly to ETH on the Ethereum blockchain, in that one token always have an equal value to all other tokens. Besides, the ERC-20 standard specifies a common interface for fungible tokens that are divisible and not distinguishable, which further ensures interoperability among the Ethereum blockchain community. A non-fungible token (NFT) is a cryptographically unique token, which can be used to keep track of the ownership of individual assets. Non-fungible tokens differ from fungible tokens in terms of interchangeability, uniformity, and divisibility. A non-fungible token cannot be divided in nature, in which each one contains some distinctive information and attributes to identify itself from others uniquely. This feature makes NFTs impossible to interchange with each other. In general, each non-fungible token is unique and differs from others. The ERC-20 standard provides the technological framework and best practices for fungible token creation under Ethereum blockchains. Similarly, the ERC- 721 standard did the same for non-fungible tokens, which allows the developers to create a digital asset representation that can be exchanged and tracked on the blockchain. The establishment of this new standard was prompted by the fact that there exists a significant difference between fungible and non-fungible tokens in nature. For example, the notion of fungible commonly describes the capacity of each piece of a commodity to be interchanged with other pieces of the same or similar commodity. ERC-721 defines that each NFT token must have a universally unique identifier, whose ownership can be identified and transferred with the help of metadata. In general, the ERC-721 standard specifies an interface that each smart contract on Ethereum that wants to create ERC-721 tokens has to implement. The key characteristic of NFTs is that they symbolize ownership of digital or physical assets, which can encompass a wide range of assets. This distinguishes NFTs and allows for individual tracking of their ownership. Furthermore, with the help of blockchain, the NFT, as a token, provides the essential verifiable immutability and authenticity, as well as other characteristics like delegation, transfer of ownership, and revocation. Tokens standards on fungible and non-fungible assets typically facilitate distinct contracts for each token type, which may place some redundant bytecodes on blockchain and limit certain functionality by the nature of separating each token contract. Semi-fungible tokens have the features of both fungible tokens and non-fungible tokens. SFTs provide more flexible interfaces to represent some complex assets or processes. ERC-721 is not the only token standard that exists for NFTs. The Ethereum ERC-1155 standard (Multi Token Standard) is another notable Ethereum variant that offers “semi-fungible" options and the potential to represent both fungible and non-fungible assets. This offers an interface to denote an NFT in a fungible way. For instance, an ERC-1155 token extends the functionality of token identification (“tokenId”), which can offer configurable token types. This type of token may contain customized information, e.g., metadata, timestamp information, supply, and other attributes In general, the ERC-1155 token is a new token proposal standard to create fungible and non-fungible tokens in the same contract. Muriqi-201PCT - 42 - In general, semi-fungible tokens can hold and represent the features of both fungible and non-fungible assets. Thus, semi-fungible tokens may be more efficient to create and bundle token transactions (without requiring a mandate unique token contract for each token created). For example, the ERC-1155 token offers some level of flexibility over the ERC-721 token, e.g., creating flexible, re-configurable, or exchangeable tokens with non-fungible features. Accordingly, the token structures and interfaces of SFTs will also be more complex. Utility-tokens are typically used to represent a unit of product or service or tokens that enable future access to a product of service. Utility- tokens are not like crypto-currencies that are designed for investment or made for exchange purposes, and they are designed as a service that can be purchased. However, in practice, some situations may exist in which the same product or service can be distributed to multiple users and allow them to exchange utility information with each other. Typically, utility tokens belong to fungible tokens. For example, ERC-20 compatible tokens on the Ethereum platform are considered utility tokens. The utility tokens are generally valid between users within a network or community. See FT and NFT references. 6. THE ETHEREUM VIRTUAL MACHINE (EVM) The Ethereum White Paper, Vitalik Buterin, “Ethereum White Paper A Next Generation Smart Contract & Decentralized Application Platform” describes the Ethereum platform. As discussed above, the social network operates as a series of transactions which convey media or rights relating to media, and various compensation. These transactions occur within a decentralized system as smart contracts. Smart contract, in turn, execute in a distributed virtual machine, such as the EVM. The EVM supports smart contracts and transactions of arbitrary complexity, and therefore may support a full range of transaction types. Of course, other virtual machine architectures may be employed. Even without any extensions, the Bitcoin protocol actually does facilitate a weak version of a concept of "smart contracts". UTXO in Bitcoin can be owned not just by a public key, but also by a more complicated script expressed in a simple stack-based programming language. In this paradigm, a transaction spending that UTXO must provide data that satisfies the script. Indeed, even the basic public key ownership mechanism is implemented via a script: the script takes an elliptic curve signature as input, verifies it against the transaction and the address that owns the UTXO, and returns 1 if the verification is successful and 0 otherwise. Other, more complicated, scripts exist for various additional use cases. For example, one can construct a script that requires signatures from two out of a given three private keys to validate ("multisig"), a setup useful for corporate accounts, secure savings accounts and some merchant escrow situations. Scripts can also be used to pay bounties for solutions to computational problems, and one can even construct a script that says something like "this Bitcoin UTXO is yours if you can provide an SPV proof that you sent a Dogecoin transaction of this denomination to me", essentially allowing decentralized cross-cryptocurrency exchange. However, the scripting language as implemented in Bitcoin has several important limitations: Lack of Turing-completeness - that is to say, while there is a large subset of computation that the Bitcoin scripting language supports, it does not nearly support everything. The main category that is missing is loops. This is done to avoid infinite loops during transaction verification; theoretically it is a surmountable obstacle for script programmers, since any loop can be simulated by simply repeating the underlying code many times with an if statement, but it does lead to scripts that are very space-inefficient. For example, implementing an alternative elliptic curve signature algorithm would likely require 256 repeated multiplication rounds all individually included in the code. Value-blindness - there is no way for a UTXO script to provide fine-grained control over the amount that can be withdrawn. For example, one powerful use case of an oracle contract would be a hedging contract, where A and B put in $1000 worth of BTC and after 30 days the script sends $1000 worth of BTC to A and the rest to B. This would require an oracle to determine the value of 1 BTC in USD, but even then it is a Muriqi-201PCT - 43 - massive improvement in terms of trust and infrastructure requirement over the fully centralized solutions that are available now. However, because UTXO are all-or-nothing, the only way to achieve this is through the very inefficient hack of having many UTXO of varying denominations ( e.g., one UTXO of 2k for every k up to 30) and having the oracle pick which UTXO to send to A and which to B. Lack of state - UTXO can either be spent or unspent; there is no opportunity for multi-stage contracts or scripts which keep any other internal state beyond that. This makes it hard to make multi-stage options contracts, decentralized exchange offers or two-stage cryptographic commitment protocols (necessary for secure computational bounties). It also means that UTXO can only be used to build simple, one-off contracts and not more complex "stateful" contracts such as decentralized organizations, and makes meta-protocols difficult to implement. Binary state combined with value-blindness also mean that another important application, withdrawal limits, is impossible. Blockchain-blindness - UTXO are blind to blockchain data such as the nonce and previous hash. This severely limits applications in gambling, and several other categories, by depriving the scripting language of a potentially valuable source of randomness. The intent of Ethereum is to merge together and improve upon the concepts of scripting, altcoins and on-chain meta-protocols, and allow developers to create arbitrary consensus-based applications that have the scalability, standardization, feature-completeness, ease of development and interoperability offered by these different paradigms all at the same time. Ethereum does this by building what is essentially the ultimate abstract foundational layer: a blockchain with a built-in Turing-complete programming language, allowing anyone to write smart contracts and decentralized applications where they can create their own arbitrary rules for ownership, transaction formats and state transition functions. A bare-bones version of Namecoin can be written in two lines of code, and other protocols like currencies and reputation systems can be built in under twenty. Smart contracts, cryptographic "boxes" that contain value and only unlock it if certain conditions are met, can also be built on top of the platform, with vastly more power than that offered by Bitcoin scripting because of the added powers of Turing- completeness, value-awareness, blockchain-awareness and state. In Ethereum, the state is made up of objects called "accounts", with each account having a 20-byte address and state transitions being direct transfers of value and information between accounts. An Ethereum account contains four fields: The nonce, a counter used to make sure each transaction can only be processed once; The account's current ether balance; The account's contract code, if present; and the account's storage (empty by default). "Ether" is the main internal crypto-fuel of Ethereum, and is used to pay transaction fees. In general, there are two types of accounts: externally owned accounts, controlled by private keys, and contract accounts, controlled by their contract code. An externally owned account has no code, and one can send messages from an externally owned account by creating and signing a transaction; in a contract account, every time the contract account receives a message its code activates, allowing it to read and write to internal storage and send other messages or create contracts in turn. An Ethereum message can be created either by an external entity or a contract, whereas a Bitcoin transaction can only be created externally. There is an explicit option for Ethereum messages to contain data. The recipient of an Ethereum message, if it is a contract account, has the option to return a response; this means that Ethereum messages also encompass the concept of functions. The term "transaction" is used in Ethereum to refer to the signed data package that stores a message to be sent from an externally owned account. Transactions contain the recipient of the message, a signature identifying the sender, the amount of ether and the data to send, as well as two values called STARTGAS and GASPRICE. In order to prevent exponential blowup and infinite loops in code, each transaction is required to set a limit to how many computational steps of code execution it can spawn, including both the initial message and any additional messages that get spawned during execution. STARTGAS is this limit, and GASPRICE is the fee to pay to the miner per computational step. If Muriqi-201PCT - 44 - transaction execution "runs out of gas", all state changes revert - except for the payment of the fees, and if transaction execution halts with some gas remaining then the remaining portion of the fees is refunded to the sender. There is also a separate transaction type, and corresponding message type, for creating a contract; the address of a contract is calculated based on the hash of the account nonce and transaction data. An important consequence of the message mechanism is the "first class citizen" property of Ethereum-the idea that contracts have equivalent powers to external accounts, including the ability to send message and create other contracts. This allows contracts to simultaneously serve many different roles: for example, one might have a member of a decentralized organization (a contract) be an escrow account (another contract) between an paranoid individual employing custom quantum-proof Lamport signatures (a third contract) and a co- signing entity which itself uses an account with five keys for security (a fourth contract). The strength of the Ethereum platform is that the decentralized organization and the escrow contract do not need to care about what kind of account each party to the contract is. If there was no contract at the receiving end of the transaction, then the total transaction fee would simply be equal to the provided GASPRICE multiplied by the length of the transaction in bytes, and the data sent alongside the transaction would be irrelevant. Additionally, note that contract-initiated messages can assign a gas limit to the computation that they spawn, and if the sub-computation runs out of gas it gets reverted only to the point of the message call. Hence, just like transactions, contracts can secure their limited computational resources by setting strict limits on the sub-computations that they spawn. The code in Ethereum contracts is written in a low-level, stack-based bytecode language, referred to as "Ethereum virtual machine code" or "EVM code". The code consists of a series of bytes, where each byte represents an operation. In general, code execution is an infinite loop that consists of repeatedly carrying out the operation at the current program counter (which begins at zero) and then incrementing the program counter by one, until the end of the code is reached or an error or STOP or RETURN instruction is detected. The operations have access to three types of space in which to store data: The stack, a last-in-first-out container to which 32-byte values can be pushed and popped; Memory, an infinitely expandable byte array; AND The contract's long-term storage, a key/value store where keys and values are both 32 bytes. Unlike stack and memory, which reset after computation ends, storage persists for the long term. The code can also access the value, sender and data of the incoming message, as well as block header data, and the code can also return a byte array of data as an output. The formal execution model of EVM code is surprisingly simple. While the Ethereum virtual machine is running, its full computational state can be defined by the tuple (block_state, transaction, message, code, memory, stack, pc, gas), where block_state is the global state containing all accounts and includes balances and storage. Every round of execution, the current instruction is found by taking the pc-th byte of code, and each instruction has its own definition in terms of how it affects the tuple. For example, ADD pops two items off the stack and pushes their sum, reduces gas by 1 and increments pc by 1, and SSTO RE pushes the top two items off the stack and inserts the second item into the contract's storage at the index specified by the first item, as well as reducing gas by up to 200 and incrementing pc by 1. Although there are many ways to optimize Ethereum via just-in-time compilation, a basic implementation of Ethereum can be done in a few hundred lines of code. The Ethereum blockchain is in many ways similar to the Bitcoin blockchain, although it does have some differences. The main difference between Ethereum and Bitcoin with regard to the blockchain architecture is that, unlike Bitcoin, Ethereum blocks contain a copy of both the transaction list and the most recent state. Aside from that, two other values, the block number and the difficulty, are also stored in the block. In general, there are three types of applications on top of Ethereum. The first category is financial applications, providing users with more powerful ways of managing and entering into contracts using their money. This includes sub-currencies, financial derivatives, hedging Muriqi-201PCT - 45 - contracts, savings wallets, wills, and ultimately even some classes of full-scale employment contracts. The second category is semi-financial applications, where money is involved but there is also a heavy non-monetary side to what is being done; a perfect example is self-enforcing bounties for solutions to computational problems. Finally, there are applications such as online voting and decentralized governance that are not financial at all. On-blockchain token systems have many applications ranging from sub-currencies representing assets such as USD or gold to company stocks, individual tokens representing smart property, secure unforgeable coupons, and even token systems with no ties to conventional value at all, used as point systems for incentivization. Token systems are surprisingly easy to implement in Ethereum. The key point to understand is that all a currency, or token system, fundamentally is a database with one operation: subtract X units from A and give X units to B, with the proviso that (i) X had at least X units before the transaction and (2) the transaction is approved by A. All that it takes to implement a token system is to implement this logic into a contract. An important feature of the protocol is that, although it may seem like one is trusting many random nodes not to decide to forget the file, one can reduce that risk down to near-zero by splitting the file into many pieces via secret sharing, and watching the contracts to see each piece is still in some node's possession. If a contract is still paying out money, that provides a cryptographic proof that someone out there is still storing the file. The general concept of a "decentralized organization" is that of a virtual entity that has a certain set of members or shareholders which, perhaps with a 67% majority, have the right to spend the entity's funds and modify its code. The members would collectively decide on how the organization should allocate its funds. Methods for allocating a DAO's funds could range from bounties, salaries to even more exotic mechanisms such as an internal currency to reward work. This essentially replicates the legal trappings of a traditional company or nonprofit but using only cryptographic blockchain technology for enforcement. So far much of the talk around DAOs has been around the "capitalist" model of a "decentralized autonomous corporation" (DAC) with dividend-receiving shareholders and tradable shares; an alternative, perhaps described as a "decentralized autonomous community", would have all members have an equal share in the decision making and require 67% of existing members to agree to add or remove a member. The requirement that one person can only have one membership would then need to be enforced collectively by the group. A general outline for how to code a DO is as follows. The simplest design is simply a piece of self-modifying code that changes if two thirds of members agree on a change. Although code is theoretically immutable, one can easily get around this and have de-facto mutability by having chunks of the code in separate contracts, and having the address of which contracts to call stored in the modifiable storage. An alternative model is for a decentralized corporation, where any account can have zero or more shares, and two thirds of the shares are required to make a decision. A complete skeleton would involve asset management functionality, the ability to make an offer to buy or sell shares, and the ability to accept offers (preferably with an order-matching mechanism inside the contract). Delegation would also exist Liquid Democracy- style, generalizing the concept of a "board of directors". Because every transaction published into the blockchain imposes on the network the cost of needing to download and verify it, there is a need for some regulatory mechanism, typically involving transaction fees, to prevent abuse. The default approach, used in Bitcoin, is to have purely voluntary fees, relying on miners to act as the gatekeepers and set dynamic minimums. This approach has been received very favorably in the Bitcoin community particularly because it is "market-based", allowing supply and demand between miners and transaction senders determine the price. The problem with this line of reasoning is, however, that transaction processing is not a market; although it is intuitively attractive to construe transaction processing as a service that the miner is offering to the sender, in reality every transaction that a miner Muriqi-201PCT - 46 - includes will need to be processed by every node in the network, so the vast majority of the cost of transaction processing is borne by third parties and not the miner that is making the decision of whether or not to include it. Hence, tragedy-of-the-commons problems are very likely to occur. However, as it turns out this flaw in the market-based mechanism, when given a particular inaccurate simplifying assumption, magically cancels itself out. The Ethereum virtual machine is Turing-complete; this means that EVM code can encode any computation that can be conceivably carried out, including infinite loops. EVM code allows looping in two ways. First, there is a JUMP instruction that allows the program to jump back to a previous spot in the code, and a JUMPI instruction to do conditional jumping, allowing for statements like while x < 27: x = x * 2. Second, contracts can call other contracts, potentially allowing for looping through recursion. This naturally leads to a problem: can malicious users essentially shut miners and full nodes down by forcing them to enter into an infinite loop? The issue arises because of a problem in computer science known as the halting problem: there is no way to tell, in the general case, whether or not a given program will ever halt. As described relating to state transition section, the system works by requiring a transaction to set a maximum number of computational steps that it is allowed to take, and if execution takes longer computation is reverted but fees are still paid. Messages work in the same way. A review of Ethereum and its vulnerabilities are discussed in Atzei, Nicola, Massimo Bartoletti, and Tiziana Cimoli. "A survey of attacks on ethereum smart contracts (sok)." In International conference on principles of security and trust, pp.164-186. Springer, Berlin, Heidelberg, 2017. See EVM references. 7. COMPENSATION OF USERS The Basic Attention Token (BAT) provides an advertisement substitution platform based on incentive tokens for viewing of advertisements. The marketplace for online advertising, once dominated by advertisers, publishers and users, has seen a rise in prominence of “middleman” ad exchanges, audience segmentation, complicated behavioral and cross-device user tracking, and cross-party sharing through data management platforms. BAT proposes a decentralized, transparent digital ad exchange based on Blockchain. The first component is Brave, an open source, privacy-focused browser that blocks third party ads and trackers, and builds in a ledger system that measures user attention to reward publishers accordingly. BAT is a token for a decentralized ad exchange. It compensates the browser user for attention while protecting privacy. BAT connects advertisers, publishers, and users and is denominated by relevant user attention, while removing some social and economic costs associated with existing ad networks, e.g., fraud, privacy violations, and malvertising. BAT is a payment system that rewards and protects the user while giving better conversion to advertisers and higher yield to publishers. The BAT system provides users with strong privacy and security when viewing advertisements, improved relevance and performance, and a share of tokens. Publishers see improved revenue, better reporting, and less fraud. Advertisers have less expensive customer attention, less fraud, and better attribution. The present technology permits payments to the media consuming user, based on a subsidy from an advertiser. The BAT system, however, only compensates the user for viewing ads, and does not provide distribution to other members of the network. Further, the BAT system lacks a social network infrastructure. Sales planners currently budgeting for brand advertising are required to account for an excessive number of intermediaries that stand between the ad and the end user. Agencies, trading desks, demand side platforms, desktop and mobile network exchanges, yield optimization, rich media vendors and partnered services often consume significant portions of creative and delivery ad budget. It is also common for agencies in charge of packaging brand campaigns to use data aggregators, data management platforms, data suppliers, Muriqi-201PCT - 47 - analytics, measurement and verification services to fight fraud, enhance targeting, and confirm attribution. These factors add up to a high transaction cost on the efficient provision of attention to brand ad campaigns. Publishers also face a number of costs and intermediaries on the receiving side of the ads served. Publishers pay ad serving fees, operational fees for campaign setup, deployment and monitoring, publisher analytics tools; also they give up substantial revenue to some of the same intermediaries that the brand advertisers use via programmatic ads. Publishers face direct costs of user complaints when malvertising spreads from exchanges to loyal readers, often with little or no idea of origin and with no help from the ad exchanges responsible for allowing such ads to serve from their systems. These diminish net revenue as the overall complexity of the advertising ecosystem raises headcount and expense. There is a cost to this complexity. A single ad unit may bounce across many networks, buy and sell-side ad servers, verification partners and data management platforms. Publishers lose revenue from each middleman transaction. Each one of these transactions also detracts from the user experience. Many of the middle players involve data transfers, which add latency. Any transfers done via script on page eat into the user’s data plan and battery life on mobile. Users often find their experience further diminished when the results finally arrive, confounded by distracting ads the publisher allowed to be placed in hope of greater revenue. The sum total of malvertisements, load times, data costs, battery life, and privacy loss has driven users to adopt ad-blocking software. This further reduces publisher revenues and leaves the remaining ad- viewing audience even harder to target. User attention is valuable, but it hasn’t been properly priced with an efficient and transparent market system. Further, the economic cost and impact of participants other than publisher, advertiser, user and middlemen has not been fully resolved and included in proposed solutions. Ultimately, a publisher provides information which may be of value to the user. Users give attention to the publisher in return for information that they value with their attention. At present, the publisher is paid by monetizing attention via a complex network of intermediary players through ad networks and other such tools. The publisher isn’t paid directly for the attention given by the user. The publisher is actually paid for the indirectly measured attention given by users to ads. Publishers are used to working with this model for print ads, but web ads remain problematic for many of the reasons stated above. Users are subjected to the negative externalities that come with the present advertising ecosystem. Users suffer a form of “electronic pollution” consisting of threats to security, threats to privacy, costs in inefficient download times, financial costs in extra mobile data fees, and in the case of the many ads, excessive costs to their attention. Human attention can be exhausted, until dopamine levels recover. Neurons can and do learn to ignore ad slots (so-called “banner blindness”). Abuse of user attention and permanent loss of users, via ad-slot blindness and ad-blocker adoption, make attention different from substitutable commodities such as pork bellies or crude oil, in the final analysis. While most users may be willing to pay some price for access to the publisher’s information, user attention is mispriced when we sum up the growing negative externalities imposed by the present advertising ecosystem. The BAT is supported by Brave, an open source, privacy-focused browser that blocks invasive ads and trackers, and contains a ledger system that anonymously measures user attention to accurately reward publishers. BAT is a token for the decentralized ad exchange that connects advertisers, publishers, and users, creating a new, efficient marketplace. The token is based on Ethereum technology, an open source, blockchain-based distributed computing platform with smart contracts. These cryptographically secure smart contracts are stateful applications stored in the Ethereum blockchain, fully capable of enforcing performance. The token is derived from – or denominated by – user attention. Attention is really just focused mental engagement – on an advertisement, in this case. The ability to privately monitor user intent at the browser level allows for the development of rich metrics for user attention. For example, it is known whether an impression has been Muriqi-201PCT - 48 - served to an active tab, and measure the seconds of active user engagement. Attention is measured as viewed for content and ads only in the browser’s active tab in real time. The Attention Value for the ad is calculated based on incremental duration and pixels in view in proportion to relevant content, prior to any direct engagement with the ad. In-device machine learning will match truly relevant ads to content from a level that middlemen with cookies and third party tracking are unable to achieve, regardless of how much of the user data is extracted and monitored from external models. These external models are unable to track transactions well enough not to serve ads for products users have often already purchased. User engagement through genuine feedback mechanisms ensures that users that have opted in for BAT are getting the best possible product match that they’re most likely to convert into a transaction. Brave keeps the data on the device only, encrypting the data and shielding the identities of users as a core principle. The high-level concept in payment flow is that the advertiser sends a payment in token along with ads to users in a locked state Xa. As the users view the ads, the flow of payments unlocks, keeping part of the payment for their own wallet (Xu), and passing on shares of the payment to Brave (Xb) and passing the remainder on to the Publisher (Xa-Xu-Xb). Ad fraud is prevented or reduced by cryptographically secure transactions. Ads served to individual browser/users are rate-limited and tied to active windows and tabs. Payments in BAT are sent only to publishers, though a payment for viewing an ad on one publisher may be used at another publisher or kept for some other premium services supplied through the BAT system. Publisher payment is received through the BAT system. As initially conceived, the transactions in BAT take place through the Brave Ledger system, which is an open source Zero Knowledge Proof scheme which allows Brave users to make anonymous donations to publishers using bitcoin as the medium of exchange. The Brave Ledger system uses the ANONIZE algorithm to protect user privacy. All payments in BAT have a publisher endpoint. The “concave” awarding mechanism calculates an attention score based on a fixed threshold value for opening and viewing the page for a minimum of 25 seconds, and a bounded score for the amount of time spent on the page. A synopsis of user behavior is then sent back to the Brave Ledger System for recording and payments made on the basis of the scores. A lottery system may be used, where small payments are made probabilistically, with payments happening essentially in the same way that coin mining works with proof of attention instead of proof of work, BOLT, Zero Knowledge SNARK or STARK algorithms may become part of this stack for guarding privacy of participants. The BAT situation is mitigated by the fact that the privacy of the browser customer is of primary importance; publishers and advertisers have fewer privacy concerns. The transactions in a fully distributed BAT system will almost always be one to many and many to one, therefore novel zero-knowledge transactions may be suggested by this arrangement. Brave is intended to move to a fully distributed micropayment system, allowing other developers to use the free and open source infrastructure to develop their own use cases for BAT. As users are given access to some of the advertising spend in BAT, they become an important and active part of the advertising and publishing economy, rather than the passive participants as initially conceived. An obvious use case is for very specific targeted advertising. Some publishers may have premium content they would ordinarily only offer to subscribers. Since subscription models are not typically favored by users on the internet, this could unlock new revenue for premium content providers. Content may also be bought for friends using the token; if someone likes a premium article, they can make a micropayment to send it to three of their friends. Higher quality content may also be offered to users for a BAT transaction. For example, higher quality video or audio on an entertainment channel, or some kind of summary of headlines in a news source. Video or audio content in a news or other information source may be restricted to people who pay a small micropayment. Comments may be ranked or voted on using BAT tokens. Comment votes backed by BAT may be given more credibility due to the fact that someone cared enough to back the comment with what would be a limited supply of token, as well as the fact that a token Muriqi-201PCT - 49 - transfer can be verified as coming from real people rather than robots. The right to post comments may also be purchased for some minimal payment, to cut down on abusive commenters. BAT might be used to purchase digital goods such as high resolution photos, data services, or publisher applications which are only needed on a one-time basis. Many publishers have access to interesting data sets and tools which they are not able to monetize on a subscription basis, but which individuals may wish to occasionally use. BAT may also be used in games provided by publishers. Custom news alerts may be offered as a service by news providers for a small payment of BAT within the ecosystem. Such news alerts may be very valuable to individuals who are concerned with current events, financial news or some anticipated event. Various proxies have been developed by advertisers and publishers to attempt to measure user attention using indirect techniques of “viewability,” but the advent of adblocking technologies and the increasing problem of fraud from non-human entities have cast doubt on such methods. A more direct technique would be to pay publishers via cryptographically secure methods, and serve the ad directly in the browser. Since the browser ultimately measures how the user interacts with the website better than any indirect meddling by intermediaries, involving the browser software itself in the process provides accurate measures of user attention bestowed on the publisher and advertiser. The browser also provides a much richer data set for understanding what the individual user is interested in. The Brave browser will contain opt-in and transparent machine learning algorithms for assessing user interests. While an ad campaign targeted to a financial publisher may have value to the broad interests of the overall readership of the publisher, individual readers can be given ads tailored to their individual and even private preferences. The idea that user attention should have monetary value is familiar to both publishers and advertisers. The idea of publishers and particularly users being paid directly for attention bestowed on the publisher is more recent. Since the valuable commodity is user attention, it makes economic sense that the user be compensated for their attention. One could justify this as a compensation for the externalities imposed on users by the advertising ecosystem. One could also justify this by the fact that one is more likely to perform an action if one is compensated for it. There is also confirmation that the actual user attention is bestowed on the publisher via the addition of cryptographic contracts built on blockchain to this advertising stack. The code is open source and can be reviewed by researchers and interested parties on the advertiser and publisher sides. Since the transactions for the first deployment of BAT will happen through the Brave Ledger, which has privacy and deterministic user anonymity by design, full transparency can be achieved while user privacy is maintained. While this centralized solution should fulfill economic and technical goals, for further iterations, a decentralized solution could be developed to allow for trustless auditable transactions. While paying a user to look at a publisher content may seem heretical to advertisers, the reality is the advertiser is paying someone. Removing the vast field of middlemen allows for a situation where the user may be compensated for valuable attention (made more valuable and relevant by measures of user interest at the browser) with no impact to advertiser costs and positive impact to publisher revenues. From a financial point of view, this could be seen as a variation on some other kind of short term promotion: advertisers regularly provide coupons and rebates on products. Promotions do not solve the problem of informing the user of the advertiser’s product in the first place. Promotions also don’t induce user loyalty or engagement. Most CMOs agree that short term sales can be improved with promotions, but sustainable competitive advantage can’t be achieved using promotions, hence the use of advertisements. The three-way Coase theorem is a source of much research interest among economists. The existence of “empty cores” in some situations have called into question the applicability of the Coase theorem to real world examples involving multiple distinct players. While there are many more than three participants in the online ad market, we can idealize them as consisting of three participants: the advertiser, the publisher and the user. This analysis is useful for understanding the game theoretic considerations, for addressing any “empty core” arguments Muriqi-201PCT - 50 - against the proposed Coasean bargain, as well as for illustrating the dire state of the publishing industry. The Basic Attention Token (BAT), a cryptographically-secure token, is provided as the medium of exchange for facilitating this Coasean bargain while protecting the privacy of the user. The advertiser wants to purchase user attention. This is broadly analogous to the “cost of production” in the exposition of the Coase theorem, whose notation we follow. The advertiser values the user attention. The publisher wishes to monetize the attention paid to the website. The user who views the website values the content of the website with attention. Advertisers and publishers in the present ecosystem have transaction costs associated with monetization of attention. Publishers are paid by advertisers to provide user attention. The intermediaries of the present system create costs. “Transaction costs” per the Coase theorem refer to the transaction costs for negotiating a deal between the players of the Coasean game, therefore the monetary costs of getting the ad to the publisher is not considered a “transaction cost” per se. The existing present advertising ecosystem produces “social costs” or attention pollution. These social costs are known to be large. For some large fraction of users, the social costs are larger than the attention cost. Every user is different, and of course, the publishers and advertisers vary as well, but the existence and growth of a large population of users for whom the utility is negative indicates that we are approaching the time where this inequality is always violated. The social cost should be decomposed into its constituent parts. The primary components of the social cost are discussed above. Security risk is one component. Hacker networks can place ads in irresponsible ad exchanges, which could have very large costs for individual users as well as the publisher who displays those ads. Privacy loss is a very important social cost associated with the advertising landscape as it presently exists. Privacy invasions are presently required by advertisers to make sure the advertisement is actually viewed by a relevant user. In effect, the advertisers are paying for something which adds value to the attention. Data costs are also a significant part of the social cost of the present day advertising ecosystem. These costs are often borne by the user as a result of the activities of the middlemen who serve the advertiser and publisher. These costs seem most trivial, but for many users, they are among the top causes driving ad blocker adoption. For all viewers of online ad funded content, considerable time is taken in dealing with the cost of downloading and executing all the privacy-violating code. In addition to this cost, for those users who are using mobile devices, the monetary charges can be significant. Finally, there is the cost to attention produced by the ad itself. In most cases, this is not a large cost, but as it is the thing actually valued most by advertisers, it should be accounted for separately. If ads can be made relevant, may even be negative. Some users like looking at certain ads. So, the total social cost as understood by BAT/Brave for the existing online ad ecosystem is the sum of these factors. The societal gain may be improved by better modelling of the social costs (to avoid arbitrage and misallocation), and reducing the transactional costs that do not add intrinsic value to the core transaction. Note that in many cases, middlemen add value by reducing overall transactional costs, and thus the goal is not to reduce transactional intermediaries, but rather to competitively determine their value and function. The exchange rate for BAT tokens is proportional to the volume of services purchased and inversely proportional to the currency not used in transactions during a respective time period. This equation encapsulates the insight that a lack of tokens in circulation will raise the exchange rate. Thus, a restriction in supply in conjunction with a positive demand utility will generally result in a positive (non-zero) token valuation. Tokens may be inactive because of intended withholding and involuntary restriction. The holders of inactive tokens have standard ways of evaluating future utility of the tokens in terms of modern risk management theory. Rational token holders expect future returns from a position in BAT to be proportional to the volatility of the position over the time period in question, scaled by a risk aversion term. The Black Scholes model provides at least an initial basis to consider the future value of tokens. See, en.wikipedia.org/wiki/Black-Scholes_model. See Compensation of Users references. Muriqi-201PCT - 51 - 8. DIGITAL RIGHTS MANAGEMENT (DRM) AND COMPENSATION OF CONTENT PROVIDERS Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. DRM technologies govern the use, modification, and distribution of copyrighted works (such as software and multimedia content), as well as systems that enforce these policies within devices. en.wikipedia.org/wiki/Digital_rights_management The term “Digital Rights Management” (DRM) encompasses the management of legal rights, rightsholders, licenses, sales, agents, royalties and their associated terms and conditions. Copyright law gives the owner of copyright the exclusive right to do and to authorize (1) the reproduction of the copyrighted work; (2) the preparation of derivative works based upon the copyrighted work; (3) the distribution of copies of the copyrighted work to the public by sale or other transfer of ownership or by rental, lease, or lending; (4) the public performance of the copyrighted work; and (5) the public display of the copyrighted work. DRM is all about controlling those rights in consideration for the owner of those rights. See US 2005004416. The rights encompass the privilege, to which one is justly entitled, to perform some action involving the intellectual property of some entity. The owner is the legal entity that owns the rights in some intellectual property by virtue of a copyright, trademark, patent and so on. These rightsholders may enter into legal arrangements whereby they either sell or license those rights or subset of rights to another party. When the rightsholder sells the rights they act as a seller or grantor of rights. When the rightsholder licenses those rights they act as a licensor. The Licensee is the legal entity that has either licensed or purchased rights for some type of content. If the user is licensing the rights, they act as a licensee. A rights transaction is the act of legally transferring rights from one entity to another. These rights transactions can be as simple as purchasing a DVD movie (right to view unlimited times), or complex business-to-business (B2B) transactions where many types of rights with complex provision are exchanged. The media content of the social network may be protected by DRM. As noted above, the DRM may interaction directly with Fungible Tokens or Non-Fungible Tokens, or the GRM may employ separate cryptographic credentials. A product key, typically an alphanumerical string, can represent a license to a particular copy of software. During the installation process or software launch, the user is asked to enter the key; if the key is valid (typically via internal algorithms), the key is accepted, and the user can continue. Product keys can be combined with other DRM practices (such as online "activation"), to prevent cracking the software to run without a product key, or using a keygen to generate acceptable keys. DRM can limit the number of devices on which a legal user can install content. This restriction typically support 3-5 devices. This affects users who have more devices than the limit. Some allow one device to be replaced with another. Without this software and hardware upgrades may require an additional purchase. Always-on DRM checks and rechecks authorization while the content is in use by interacting with a server operated by the copyright holder. In some cases, only part of the content is actually installed, while the rest is downloaded dynamically during use. Encryption alters content in a way that means that it can be used without first decrypting it. Encryption can ensure that other restriction measures cannot be bypassed by modifying software, so DRM systems typically rely on encryption in addition to other techniques. Restrictions can be applied to electronic books and documents, in order to prevent copying, printing, forwarding, and creating backup copies. This is common for both e-publishers and enterprise Information Rights Management. It typically integrates with content management system software. Digital watermarks can be steganographically embedded within audio or video data. They can be used for recording the copyright owner, the distribution chain or identifying the purchaser. They are not complete DRM mechanisms in their own right, but are used as part of a system Muriqi-201PCT - 52 - for copyright enforcement, such as helping provide evidence for legal purposes, rather than enforcing restrictions. When the key value used to encrypt and decrypt the data is the same value, a symmetric key algorithm is being used. The key in this case is termed the ‘shared secret’. Any person or system having access to the shared secret can decrypt and re-encrypt the data. In the asymmetric encryption model, two different keys are used to perform the encryption process. One key, termed the ‘public key’ is provided to the recipient for use in decrypting messages sent from the source system as well as encrypting messages that can only be decrypted by the source system. The second key, termed the ‘private key’ is securely retained by the source system and is never revealed. The private key is used to encrypt the messages for systems possessing the public key and for decrypting messages sent from targets using the public key. These keys are also referred to as a key pair and are generated at the same time by the source system. Another aspect to digital security is the aspect of tampering with data. An algorithm that uses a secret key can be used to create a one- way hash value that represents the exact value of the data. In order to recreate the same one-way hash value, the same data value must be provided again. Message digests don't prevent data from being tampered with, they only alert systems that the data has been altered in some way. A digital signature combines the functionality of the asymmetric cryptography and message digests to mimic the real world handwritten signing of a document. The legal entity performing the signing function must have generated an asymmetric key pair and an associated certificate. The certificate containing the signer's public key is distributed to other entities that will need to verify the digital signature of the signer. The DRM may be tied to a trusted platform module (TPM), to provide high levels of security. Lee, US20210334770 provides a method and system for protecting intellectual property rights on digital content using smart propertization. The above technology may be enhanced using transcription, proxy key cryptography, atomic key cryptography, etc., and especially extensions that include multi-party cryptography. See, US 8,566,247. A number of communications systems and methods are known for dealing with three-party communications, for example, where a third party provides ancillary services to support the communications, such as authentication, accounting, and key recovery. Often, the nature of these communications protocols places the third party (or group of third parties) in a position of trust, meaning that the third party or parties, without access to additional information, can gain access to private communications or otherwise undermine transactional security or privacy. Transactions for which third party support may be appropriate include distribution of private medical records, communication of digital content, and anonymous proxy services. Another aspect of three party communications is that it becomes possible for two (or more) parties to hold portions of a secret or a key to obtain the secret, without any one party alone being able to access the secret. For example, Silvio Micali has developed a mature Fair Encryption scheme in which a number of trustees collaborate to hold portions of a key used to secure privacy of a communication between two principals, but who must act together to gain access to the secret. In Micali’s Fair Encryption scheme, however, cooperation of neither of the principal parties to a communication is required in order to access the secret. The third party trustees, as a group, are trusted with a secret. The basis for this trust is an issue of factual investigation. The Micali Fair Encryption scheme does, however, provide a basis for the generation and use of composite asymmetric encryption keys. See, Eyal Kushilevitz, Silvio Micali & Rafael Ostrovsky, “Reducibility and Completeness in Multi- Party Private Computations”, Proc. of 35th FOCS, pp.478-489, 1994. The Micali Fair Encryption scheme does not, however, allow communication of a secret in which only one party gains access to the Muriqi-201PCT - 53 - content, and in which the third party or parties and one principal operate only on encrypted or secret information. This system is discussed in further detail below. See: Gilboa, N., “Two Party RSA Key Generation”, Proc of Crypto '99, Lecture Notes in Computer Science, Vol.1666, Springer-Verlag, pp.116- 129, 1999; D. Boneh, J. Horwitz, “Generating a product of three primes with an unknown factorization", Proc. of the third Algorithmic Number Theory Symposium (ANTS), 1998, pp.237-251; Lin, Cun-Li, Sun, Hung-Min, and Hwang, Tzonelih, “Three Party Key Exchange: Attacks and a Solution”. Micali, S., Fair Public-Key Cryptosystems. Advances in Cryptology - Proceedings of CRYPTO'92 (E. F. Brickell, ed.) Lecture Notes in Computer Science 740, SpringerVerlag (1993) pages 113—138; S Micali, Fair cryptosystems, MIT Technical Report, MIT/LCS/TR-579, November 1993, MIT Laboratory for Computer Science, November 1993. Encryption technologies, particularly public key encryption systems, seek to minimize some of these weaknesses by reducing the need to share secrets amongst participants to a secure or private communication. Typical public key encryption technologies, however, presume that a pair of communications partners seek to communicate directly between each other, without the optional or mandatory participation of a third party, and, in fact, are designed specifically to exclude third party monitoring. Third parties, however, may offer valuable services to the participants in a communication, but existing protocols for involvement of more than two parties are either inefficient or insecure. Traditional encryption algorithm schemes rely on use of one or more finite keys which are provided to an algorithm which generates a data string which is apparently random, called pseudorandom, but which can be predicted based on a knowledge of both the algorithm and the key(s), allowing extraction of a superimposed data message. Optimality of an algorithm for a given set of circumstances is based on a number of factors, and therefore many different cryptographic schemes coexist. Essentially, the key should be sufficiently long and stochastic that an extraordinarily long period of time would be necessary to attempt a brute force attack on the algorithm, while only a reasonable amount of time is required to generate keys, encrypt and decrypt messages. In addition, the key should be sufficiently long that observation of pseudorandom (encrypted) datastreams does not permit one to determine the key to the algorithm. Public Key Encryption is a concept wherein two keys are provided. The keys form a pair, such that a message encrypted with one key of the pair may be decrypted only by the corresponding key, but knowledge of the public key does not impart effective knowledge of the private key. Typically, one of the keys is made public, while the other remains secret, allowing use for both secure communications and authentication. Communications may include use of multiple key pairs, to provide bilateral security. The public key pair may be self-generated, and therefore a user need not transmit the private key. It must, however, be stored. The basis for Diffie Hellman and RSA-type public key encryption methods is the large disparity in computational complexity between decrypting the public key created cipher text with the public key encryption private key, which is very rapid and simple to do, and working through the possibilities without the key, which takes a very long time through all known means. Modern public-key data encryption was originally suggested by Diffie and Hellman, "New Directions In Cryptography," I.E.E.E. Transactions on Information Theory (November 1976), and was further developed by Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman: "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM 21(2):120-126 (Feb.1978). See also, US 4,351,982. The basic reason for public-key encryption system is to ensure both the security of the information transferred along a data line, and to guarantee the identity of the transmitter and to ensure the inability of a receiver to "forge" a transmission as being one from a subscriber on the data line. Both of these desired results can be accomplished with public-key data encryption without the need to maintain a list of secret Muriqi-201PCT - 54 - keys specific to each subscriber on the data line, and without requiring the periodic physical delivery or the secure electronic transmission of secret keys to the various subscribers on the data line. According to the Diffie Hellman scheme, two hosts can create and share a secret key without ever communicating the key. Each host receives the "Diffie-Hellman parameters". A prime number, 'p' (larger than 2) and "base", 'g', an integer that is smaller than 'p'. The hosts each secretly generate their own private number, called 'x', which is less than "p - 1". The hosts next generate a respective public key, 'y'. They are created with the function: y = g x Mod p. The two hosts now exchange their respective public keys ('y') and the exchanged numbers are converted into a secret key, 'z' by the following function: z = y x Mod p. 'z' can now be used as an encryption key in a symmetric encryption scheme. Mathematically, the two hosts should have generated the same value for 'z', since according to mathematical identity theory, z = (g x Mod p) x' Mod p = (g x' Mod p) x Mod p. A method of public-key encryption developed by Rivest, Shamir & Adelman, and now generally referred to as RSA, is based upon the use of two extremely large prime numbers which fulfill the criteria for the "trap-door, one-way permutation." Such a permutation function enables the sender to encrypt the message using a non-secret encryption key, but does not permit an eavesdropper to decrypt the message by crypto-analytic techniques within an acceptably long period of time. This is due to the fact that for a composite number composed of the product of two very large prime numbers, the computational time necessary to factor this composite number is unacceptably long. A brute force attack requires a sequence of putative keys to be tested to determine which, if any, is appropriate. Therefore a brute force attack requires a very large number of iterations. The number of iterations increases geometrically with the key bit size, while the normal decryption generally suffers only an arithmetic-type increase in computational complexity. In the RSA encryption algorithm, the message (represented by a number M) is multiplied by itself (e) times (called "raising (M) to the power (e)"), and the product is then divided by a modulus (n), leaving the remainder as a ciphertext (C): C = M e mod n. In the decryption operation, a different exponent, (d) is used to convert the ciphertext back into the plain text: M = C d mod n. The modulus (n) is a composite number, constructed by multiplying two prime numbers, (p) and (q), together: n = p * q. The encryption and decryption exponents, (d) and (e), are related to each other and the modulus (n) in the following way: d = e -1 mod ((p-1) (q-1)), or equivalently, d * e = 1 mod ((p-1) (q-1)). The RSA ciphertext is thus represented by the expression C = M e mod n. The associated decryption function is M = C d mod n. Therefore, M = C d mod n = (M e mod n) d mod n, indicating that the original message, encrypted with one key, is retrieved as plain text using the other key. To calculate the decryption key, one must know the numbers (p) and (q) (called the factors) used to calculate the modulus (n). The RSA Algorithm may be divided, then, into three steps: (1) key generation: in which the factors of the modulus (n) (the prime numbers (p) and (q)) are chosen and multiplied together to form (n), an encryption exponent (e) is chosen, and the decryption exponent (d) is calculated using (e), (p), and (q). (2) encryption: in which the message (M) is raised to the power (e), and then reduced modulo (n). (3) decryption: in which the ciphertext (C) is raised to the power (d), and then reduced modulo (n). Micali, U.S. Patent Nos.6,026,163 and 5,315,658, teach a number of split key or so-called fair cryptosystems designed to allow a secret key to be distributed to a plurality of trusted entities, such that the encrypted message is protected unless the key portions are divulged by all of the trusted entities. Thus, a secret key may be recovered, through cooperation of a plurality of parties. These methods were applied in three particular fields; law enforcement, business auctions, and financial transactions. Essentially, the Micali systems provide that the decryption key is split between a number (n) of trusted entities, meeting the following functional criteria: (1) The private key can be reconstructed given knowledge of all n of the pieces held by the plurality of trusted entities; (2) Muriqi-201PCT - 55 - The private key cannot be guessed at all if one only knows less than all (<n-1) of the special pieces; and (3) For i-1, ... n, the i th special piece can be individually verified to be correct. The special pieces are defined by a simple public algorithm which itself exploits the difficulty in factoring large numbers as a basis for asymmetric security. Micropayments are often preferred where the amount of the transaction does not justify the costs of complete financial security. In the micropayment scheme, typically a direct communication between creditor and debtor is not required; rather, the transaction produces a result which eventually results in an economic transfer, but which may remain outstanding subsequent to transfer of the underlying goods or services. The theory underlying this micropayment scheme is that the monetary units are small enough such that risks of failure in transaction closure is relatively insignificant for both parties, but that a user gets few chances to default before credit is withdrawn. On the other hand, the transaction costs of non-real time transactions of small monetary units are substantially less than those of secure, unlimited or potentially high value, real time verified transactions, allowing and facilitating such types of commerce. Thus, the rights management system may employ applets local to the client system, which communicate with other applets and/or the server and/or a vendor/rights-holder to validate a transaction, at low transactional costs. Often, a micropayment involves a cryptographic function which provides a portable, self-authenticating cryptographic data structure, and may involve asymmetric cryptography. As will be clear from the discussion below, such characteristics may permit micropayments to be integrated as a component of the embodiments, or permit aspects of the embodiments to operate as micropayments. See Digital Rights Management (Drm) And Compensation Of Content Providers references 9. TRANSCRYPTION AND INTERMEDIATED TRANSACTIONS An intermediary may perform a requisite function with respect to the transaction without requiring the intermediary to be trusted with respect to the private information or cryptographic keys for communicated information. This system and method employ secure cryptographic schemes, which reduce the risks and liability for unauthorized disclosure of private information, while maintaining efficient and robust transactions. The third party may account for secure data transactions, by maintaining a critical logical function in data communication. Thus, during each such transaction, the intermediary may force or require a financial accounting for the transaction. Further, by exerting this control over the critical function outside the direct communication channel, the intermediary maintains a low communication bandwidth requirement and poses little risk of intrusion on the privacy of the secure communication. Further, the intermediary never possesses sufficient information to unilaterally intercept and decrypt the communication. Ancillary services may be provided with respect to communicating information. These ancillary services encompass, for example, applying a set of rules governing an information communication transaction. For example, the rules limit access based on recipient authentication, define a financial accounting, role or class of an intended recipient, or establish other limits. These services may also include logging communications or assisting in defining communications counter-parties. The access control is implemented by an intermediary to the underlying transaction, which facilitates the transaction by removing the necessity for a direct and contemporaneous communication with the equitable holder of a pertinent right for each transaction. The intermediary maintains a set of rights-associated rules. In order to enforce rights- based restrictions, the trustee may hold, associated with the rights information, a key, for example an encryption key, necessary for access or use of the information. The intermediary may be trusted to implement the rules, but not necessarily trusted with access to, or direct and sole access control over the information. According to a preferred embodiment, the intermediary, acting alone, cannot access or eavesdrop on the private information or a communication stream including the information. Further, in accordance with the Micali split key escrow scheme, the intermediary may Muriqi-201PCT - 56 - be implemented as a set of entities, each holding a portion of a required key. A conduit may be provided for authorized transmission of records, while maintaining the security of the records against unauthorized access. A preferred communications network is the Internet, a global interconnected set of public access networks, employing standardized protocols. Thus, the records may be transmitted virtually anywhere on earth using a single infrastructure. Alternately, private networks or virtual private networks may be employed. Often, when seeking to move secret information through an infrastructure, it is necessary to alter the cryptographic transform between a form accessible for general purpose usage, and a form suitable for specific usage by an intended recipient. For example, a database may be encrypted, but the database system must possess sufficient access privileges to search that database and retrieve results. Further, these privileges typically encompass the entire database, which may include records that have varying security attributes and release criteria. The release of the cryptographic keys employed by the database system would, at least in theory, compromise the security of the database as a whole, and therefore as the data is returned from the database server, the cryptographic transform must be changed, so that the keys representing root level access are protected. In some cases, it is desired to search and retrieve data based on metadata, which may differ from an index of the data. That is, the search and retrieval may have limited release of the data being searched. For example, a record may be retrieved by user identifier, without revealing the content of the record. In conveying that record, it may be desired to encode the record with a cryptographic transform specific to the intended user, while avoiding release of the basic cryptographic transform keys representing the original storage format. The present technology has, according to an embodiment, a P2P data distribution system. In many cases, the data being distributed is public, and there is no particular need to protect it. On the other hand, some data is private, for example, proprietary content and messages, and must be protected. Further, while symmetric or asymmetric key cryptography is usable if the source and destination can negotiate in advance the cryptographic credentials, in some cases, the source and destination do not have direct communications. This can be addressed through transcryption, also known as proxy key cryptography or atomic key cryptography, in which encrypted keys in transit are re-keyed to a different cryptographic decryption key. Therefore, according to the present technology, a message or other data is communicated in an encrypted form, to a peer, non-destination node. The peer node then negotiates a relay of the information to the destination (or other intermediary node), and “transcrypts” or rekeys the information, in a process that does not involve decryption or risk of release of the information. At the destination, the recipient has a key that reveals the contents of the message. In a decentralized architecture, this alleviates the need for a central management authority or trusted intermediaries. A type of cryptographic algorithm is known, called “proxy key cryptography”, which provides means for converting a cryptographic transform between a first transform associated with a first set of keys, and a second cryptographic transform associated with a second set of keys, without requiring an intermediate decryption of the information. Therefore, for example, such an algorithm could be used to convert the decryption key of a secret record from an original format to a distribution format. In typical proxy key systems, a proxy receives a private key from a sender of an asymmetrically encrypted message, and a public key from a recipient of the transformed encrypted message, and computes a transform key (e.g., a product of p and q in an RSA type PKI algorithm) which is applied to the asymmetrically encrypted message. The application of the transform key allows the recipient to use its private key to decrypt the message. As discussed in U.S.6,937,726, other types of algorithms and cryptographic schemes may also be applied with similar function. In these architectures, the proxy is provided with the decryption key for the original message, and thus is in a position to delegate its right and authority to decrypt the message to the recipient. On the other hand, an intermediary may also be deprived of sufficient information Muriqi-201PCT - 57 - to decrypt the message, and therefore be unprivileged. This, in turn, opens potentially different roles for the intermediary than the proxy according to U.S.6,937,726. Another class of problem involves distribution of content separate from a control over access to content. It is well known to distribute content protected by a digital rights management (DRM) system through peer to peer networks or publicly available forums, and then separately control and administer usage through a player or renderer. For example, Microsoft Windows Media Player supports such an architecture. However, this scheme requires that the content be distributed with a single decryption key, which is protected by a “branded” player. The branded player then retrieves a key for the content after authenticating itself to a server, which is stored in a protected key cache. If the security of the player itself becomes compromised, all of the keys in the cache are potentially compromised. Likewise, this scheme limits portability of media between players, which have to separately negotiate licenses, and requires a centralized architecture or direct communications between source and destination. In some cases, each use is monitored, or the duration of usage limited. Since the server provides the keys to the content, it must be privileged to decrypt that content. According to one embodiment, a user provides the intermediary with necessary transactional information relating to private information, in a manner that discloses little or no private information to the intermediary. In like manner, private information may be supplied to a user after the user has supplied necessary transactional information to the intermediary, without in the process disclosing the private information to the intermediary. These techniques may be extended to allow personally identifying information to be removed from a communication by substitution with a non-personally identifying code, supplied by the intermediary. Again, this anonymous process may take place without providing the intermediary with the private information. In some embodiments, the two principals to the communication remain anonymous with respect to each other, while in other instances, they are known to each other. In the former case, a proxy is provided to avoid divulging the address (e.g., logical or physical address) of the recipient, and, depending on communication protocol, the identity of the sender. The communication channel may remain secure between the two principals, although the proxy becomes trusted with respect to identities of the principals. The proxy cryptography or transcryption techniques provide enhanced opportunities for control and accounting for content or information usage. Content can be readily distributed or transformed into a format specific for an intended recipient. Using a combination of system architecture and controls, as well as adjunct techniques, such as key exchange, complex, multiple level or composite transcryption keys, and Kerberos type techniques, for example, attributes of the transcryption technique may be added to attributes of other techniques, and deficiencies of the various techniques may be remedied. The technology encompasses monetary transactions involving the information usage and/or communication. According to one embodiment, digital signatures may be employed in monetary transactions that, after authentication, become anonymous. A personally identifying digital signature may be substituted by the intermediary with an anonymous transaction or session identifier. In this case, while the transaction becomes anonymous, it is not necessary for the intermediary to be a direct party to the exchange of value between the principals involved in the communication, and thus the intermediary does not necessarily become privy to the exchange details. The security and privacy scheme may be employed to convey content to users while ensuring compensation for rights-holders in the content. An architecture is provided which allows accounting and implementation of various rules and limits on communications between two parties. Further, an intermediary becomes a necessary part of the negotiation for communication, and thus has opportunity to apply the rules and limits. Each use of a record may trigger an accounting/audit event, thus allowing finely granular transactional records, which may reduce the risks of security and privacy breach in connection with record transmission. Usage-based financial accounting may be used for the Muriqi-201PCT - 58 - information, imposing a financial burden according to a value and/or consumption of system resources. For example, the cost to a user could be a flat fee, depend on a number of factors, be automatically calculated, or relate to volume of usage. The accounting may also compensate a target of an electronic message for receipt thereof. Thus, a marketer may seek to send an advertisement to a user. The user may then compel the marketer to send the electronic message through an intermediary, providing compensation to the user. It is noted that the system may permit multiple concurrent types of advertisements, such as sequential video ads, banner ads, overlaid ads, sponsored product placement, etc. In establishing a secure communications session between the user and the intermediary, it may be useful in some circumstances to employ a challenge-response authentication scheme, for example by passing messages back and forth between the user and the intermediary, the user and the data repository, or the data repository and the intermediary. The user’s “role” may be checked for consistency with a set of role-based usage rules. The reported role may be accepted, or verified with resort to an authentication database. Based on the role of the user and the identification of the content, the authority of the user to receive records may be determined. In one embodiment, a user is required to identify the specific records sought, and therefore the authorization matrix representing correspondence of record content and user role may be associated with each record, and may be verified by the data repository as a part of a local authentication process prior to transmitting any portion of a record. Thus, the matrix may represent a metadata format describing the content of the record and the level or type of authority of the user to access that record. This metadata may, of course, itself be privileged information. In the event that the distribution of metadata or its application at a site is impermissible, a separate metadata processing facility may be provided. This facility may process the metadata in an anonymous index format, thus reducing or eliminating the risks of a privacy or security breach. The user authority matrix may be protected using the composite session key format, and therefore made secure even from the intermediary, which, in this case, may communicate the authority matrix and transactional request details to the metadata processing facility using a composite of a user session key and a metadata session key. The results of the authorization may be transmitted directly from the metadata processing facility directly to the data repository, in the form of a prefiltered specific record request. The intermediary may account for the transaction either on a request-made basis or subscription basis, or communicate accounting information with the data repository, for example to properly exchange required keys and complete the transaction. In order to provide further security for the records and the use of the system, various techniques are available. For example, dummy content records may be added to the database and index therefore. Any access of these records is presumably based on an attempt for unauthorized access. Thus, the existence of these records, with access tracking, allows detection of some unauthorized uses of the system. Another method of securing the system is the use of steganographic techniques, for example embedding watermarks in audio and images, pseudorandom dot patterns in scanned page images, random insertion of spaces between words, formatting information, or the like, in text records. Therefore, records obtained through the system may be identified by their characteristic markings. In fact, every authorized record may be subjected to a different set of markings, allowing a record to be tracked from original authorized access to ultimate disposition. An explicit bar code, watermark or other type of code may also be provided on the document for this purpose. It is noted that such markings cannot be implemented on encrypted data at the point of transmission, and thus this type of security requires access to the raw content. However, this may be implemented at the point of decryption, which may be in a sufficiently secure environment. For example, a secure applet may be provided, employing a securely delivered session key, which processes records to test for existing watermarks and to add or substitute a Muriqi-201PCT - 59 - new watermark. A system for the decryption and watermarking of data is provided in one embodiment, in a content (or content type)-specific manner. An online handshaking event may occur on decryption, to provide confirmation of the process, and indeed may also authenticate the user of the system during decryption. Asymmetric key encryption may be employed to provide the establishment of secure communications channels involving an intermediary, without making the intermediary privy to the decryption key or the message. Thus, by transmitting only relatively unprivileged information, such as respective public keys, the information and integrity of the system remains fairly secure. In order to provide a three party transaction in which the intermediary is a necessary party, the information sought to be transmitted is subjected to a secret comprehension function (e.g., a cryptographic or steganographic function) with the key known only to the intermediary. In establishing the communication channel, the information is transcoded between a first comprehension function and a second comprehension function without ever being publicly available. Modulo arithmetic is both additive and multiplicative, thus, using the same modulo n: mod n= A x + y mod n ( ( A ) mod n+ ( B ) mod n ) m od n = ( A + B ) m o d n ( ( A ) mod ni ( B ) mod n ) mod n= ( A i B ) m od n (A x mod n ) y mod n= ( A y mod n ) x mod n = A xy mod n A preferred algorithm relies on the multiplicative property of modulo arithmetic; in other words, Amod B * C mod B= ( A* C ) mo d B mod B . However, this property is not “reversible”, in that knowledge of and either A or C does not yield the other, unless the product A * is less than B , since the modulo function always limits the operand to be less than the modulus value. M = C d mod n = e d it is seen that in an RSA scheme, ( M mod n mod n Thus, ) . Therefore, in order to communicate the intermediary private information to the intended recipient, the recipient public key ‘e1’ and intermediary private key ‘d2’ are defined using the same modulus n, multiplied, and provided to the sender. At the sender, the ciphertext C2= Me 2 mod n , previously encrypted with the intermediary’s public key e2, is subjected to the function: mod n = M e mod n . The recipient may then apply its private key d1 to decrypt the message: M = C1d 1 m od n . It should be understood that the algorithm described herein represents merely a portion of an RSA-type public key infrastructure, and that generally all known techniques for preparing the message, maintaining a public key directory, and the like, may be employed in conjunction therewith, to the extent not inconsistent. Thus, the transcoding algorithm should be considered as a generally interchangeable part of the entire cryptographic system, which may be substituted in various known techniques, to achieve the advantages recited herein. In general, only small changes will be necessary to the systems, for example, accommodating the larger composite key length. It is also particularly noted that there are a number of known barriers to exploits that are advantageously employed to improve and maintain the security of the present system and method. See, David Chaum, "Blind Signatures for Untraceable Payments", Proceedings of Crypto 82, Aug.1982, p.199-203. According to the Chaum scheme, a server assists a user in decrypting a message without releasing its secret key or gaining access to the encrypted message. The Muriqi-201PCT - 60 - user communicates a symmetric function of the ciphertext to the server, which is then processed with the secret key, and the resulting modified ciphertext returned to the user for application of an inverse to the symmetric function. See, U.S. Patent No.6,192,472. This technique, however, requires a communication of the complete message in various encrypted forms to and from the server, a potentially burdensome and inefficient task, and is not adapted to communicate a secret file from a first party to a second party. The transcryption scheme may be employed to securely communicate cryptographic codes between parties to a communication, for example a symmetric encryption key. For example, the Advanced Encryption Standard (AES) employs the Rijndael algorithm, which may provide highly efficient encryption and decryption. Thus, the asymmetric key encryption may be directed principally toward key exchange. According to another embodiment, an encrypted message (ciphertext) is “transcoded” from a first encryption type to a second encryption type, without ever passing through a state where it exists as a plaintext message. Thus, for example, an intermediary to the transaction who negotiates the transaction, need not be privileged to the information transferred during the transaction. In the case of medical records, therefore, this means that the intermediary need not be “trusted” with respect to this information. A system embodiment using the algorithm has three properties of particular relevance: (a) while an intermediary may be a necessary party to the transaction, the protocol does not provide the intermediary with sufficient information to eavesdrop, thus, the intermediary is not trusted with the secret communication; (b) due to the transcryption, the sender of the message may maintain an encrypted repository, and also need not be trusted with the secret communication; and (c) that neither the decryption key for the message, nor the message, is transmitted at any stage in the process in an analytic form. Therefore, the message is provided only to an authorized and actively authenticated recipient. One basic mechanism for implementing this scheme is transcryption, in some cases using technology known as proxy key encryption, which permits encrypted information to be transformed from a state corresponding to one set of cryptographic keys to a state corresponding to another set of cryptographic keys. The information provided to perform the transcryption need not inherently leak any decryption key, and the transcryption process itself may be integral such that it may be performed under insecure conditions. In its most basic form, an RSA-styled transcryption employs a composite key, such that if one of the composite elements is known, the other can be derived. This leads to a possible collusion of two parties to reveal the data. Of course, in a three-party model, the source of the information typically possesses the information, and the recipient of the transcrypted information is typically granted a right to decrypt, so that the collusion itself represents one party passing a right it possesses to another party. On the other hand, if a party seeks to reuse its private key in multiple transactions, or the source and/or destination are not themselves authorized, then this collusion becomes at least theoretically problematic. The present technology therefore provides another layer, wherein a composite key is a function of multiple elements, at least one of which is dynamically generated and intended for single use, such that potential for leakage of persistent secrets is reduced. For example, a second party acting in an intermediary capacity may be provided within the infrastructure. Similarly, there are other techniques to remedy this and other shortcomings of the simplest transcryption implementations, to achieve the desired properties for the system with high efficiency. See, U.S.7,181,017. In operation, the user generates, on a session basis, a key pair, and provides one portion to the intermediary, the other is maintained in secrecy for the duration of the transaction. The intermediary receives the session key and multiplies it with the secret decryption key for the message held by the data repository. Both the session key and the decryption key individually are held in secrecy by the intermediary. The data repository further receives from the intermediary an identification of the user, which is used to query a certification authority for an appropriate public key. The data repository “transcrypts” the encrypted message with a composite key (resulting from the multiplicative combination of the Record Private Key, the User Public Session Key and the Intermediary Private Session Key) as well as the User (persistent) Public Key to yield Muriqi-201PCT - 61 - a new encrypted message, which is transmitted to the user. The user then applies the retained portion of the session key, as well as its persistent private key, resulting in the original plaintext message. Likewise, the composite encryption key used by the data repository results from the combination of the Record Public Key, Intermediary Private Session Key, and User Public Session Key. When data is added to the Encrypted Record Database, it may be advantageous to provide the user with a confirmation comprising a hash function performed on the received data, either in its Composite Session Key format (allowing immediate verification by the user) or in its Record Key format (allowing persistent verification of the transaction), or both. Further, it may also be advantageous for the intermediary to receive or act as conduit for these verification communications, allowing an accounting to take place on such confirmation. When data is communicated from the Encrypted Record Database to a user, it may likewise be advantageous to provide the data repository with a confirmation comprising a hash function performed on data received by the user. This confirmation may advantageously be communicated through the intermediary, allowing an accounting to take place on such confirmation. In one scenario, the Data Repository receives the information from the Intermediary, and recalls the identified record from an Encrypted Database. The database record remains encrypted with a Record Public Key, originally generated by the Key Pair Generator. The Record Public and Private Keys, in this case, is stored in the Secure Record Key Database. An Encryption Processor may be provided to carry the cryptographic processing burden of the Intermediary, for example implementing a secure socket layer (SSL) and/or TLS protocol. The encrypted database record from the Encrypted Record Database, is presented to the Remote Key Handler, a privileged processing environment having both high security and substantial cryptographic processing capacity. The Remote Key Handler implements the algorithm: C * = Cdrecord i dintermediary i euser m o d n , wherein: d record is the Record Private Key, is the Intermediary Private Session Key, e user is the User Public Session Key, C is the ciphertext message stored in the Encrypted Record Database, encrypted with the e record , the Record Public Key, and C * is the ciphertext message in a composite-key transcrypted format for transmission to the User. Likewise, for record accession into the Encrypted Record Database from the User, the Remote Key Handler implements the algorithm: C = C *erecord i dintermediary i euser mod n , wherein: e record is the Record Public Key, d intermediary is the Intermediary Private Session Key, e user is the User Public Session Key, C is the ciphertext message to be stored in the Encrypted Record Database, encrypted with the erecord, the Record Public Key, and C * is the ciphertext message in a composite-key transcrypted format, received from the User. It is noted that, while the public key generally corresponds to the encryption key (e), and the private key generally corresponds to the decryption key (d), in the present example, the Remote Key Handler 33 is considered privileged, and therefore receives a key containing the key component designated private. Since the encryption and decryption functions are complementary, the results are the same. The user therefore always applies its own private session key and the intermediary’s public session key, regardless of the transaction type. In another scenario, the User transmits a Data Record to the Data Repository. In this case, the Data Record is encrypted with the User Private Session Key, the Intermediary Public Session Key (received from the Intermediary during a handshaking communications), as well as the User Persistent Private Key corresponding to the certificate stored by the Certification Authority in the public key database. The Data Repository then receives the communication, first decrypts it with the User Persistent Public Key received from the Certification Authority from the Public Key Database in the Encryption Processor, and then passes it to the Remote Key Handler, which securely receives a composite User Public Session Key · Intermediary Private Session Key · Record Public Key product from the Intermediary. This is employed by the Remote Key Handler to produce a transcrypted Data Record, encrypted with the Record Public Key (generated by the Intermediary in the Key Pair Generator). This Record (encrypted with the Record Public Key) is then passed to the Data Repository and stored in the Encrypted Database. It is Muriqi-201PCT - 62 - noted that in anonymous communications, a proxy may be employed to blind the address of the User from the Data Repository. In this case, a modified scheme is employed which may not use a Certification Authority, although the Intermediary may provide anonymous certificate services. It is also noted that each communication channel may itself be secure, for example using 128 bit secure socket layer (SSL) communications or other secure communications technologies. In particular, it is important that only the Intermediary be in possession of the transcryption key (e.g., composite key) and the session key (e.g., Intermediary Private Session Key), since this will allow recovery of the private encryption key. As noted above, the release of private keys may be limited by having both the Intermediary and User each generate a respective session key pair. In this case, the Intermediary transmits the public portion of its session key pair to the User, which is then employed to decrypt the message from the Data Repository. The key provided by the Intermediary to the Remote Key Handler, in this case, is the product: Record Private Key · User Public Session Key · Intermediary Private Session Key. The resulting transcrypted record from the Data Repository is encrypted with the product of the two session keys. Because the transmitted key is a triple composite, the Record Private Key is protected against factorization. The User then uses the User Private Session Key and Intermediary Public Session Key in order to decrypt the Data Record. In the case of a Data Record transmission from the User to Data Repository, the User transmits a record encrypted with the product: User Private Session Key · Intermediary Public Session Key. Intermediary transmits to the Remote Key Handler, the product: Public Record Key · User Public Session Key · Intermediary Private Session Key, which is used to transcrypt the encrypted Data Record with the Public Record Key. In like manner, the Data Repository may also generate a session key pair, used to sign and authenticate transmissions. In order to decrypt the message, the Data Repository communicates with the Intermediary, provides the unique identifier of the message, and receives the Intermediary Private Session Key. The Data Repository then computes the composite decryption key from Data Repository Private Key * Intermediary Private Session Key, and decrypts the message using this composite key. The session key pair generated by the Intermediary is used once, and may be expired or controlled based on a set of rules. Thus, the Intermediary may have a policy of destroying keys after a set time period or upon existence of a condition. Since the security of the encryption is analogous to RSA-type encryption, it can be made relatively secure. Since the Intermediary has no access to the Data Repository Private Key, the message cannot be decrypted based on information available to it. In addition, higher order composite keys may be implemented, for example composites formed of three or more RSA-type keys, some of which may be enduring keys (for example to provide digital signature capability) and other session keys. A further limit may be placed on decryption by imposing a key escrow with a time limit or other contingent release of a key. In order for the recipient to obtain the necessary decryption information, accounting, authentication, and logging are implemented. According to a preferred embodiment, the decryption is preferably implemented by controlled application software, which prevents export of the message, such as by printing, disk storage, or the like. Therefore, within a reasonable extent, the message is isolated within the controlled application. The right of the user to access a comprehensible version of the message may be temporally limited, for example with an expiration date. These rights may also be limited based on a specified condition. Further use would require either a new transmission of the message, or a further accounting and logging of activity. Further, this allows control over the message on a per use basis, potentially requiring each user of the controlled application to authenticate himself or herself, and provide accounting information. Each use and/or user may then be logged. It is also possible to permit anonymity of one party, for example a sender of a message, by employing anonymous cryptographic protocols, such as a employed in micropayment technology. Thus, a sender of a message may provide an anonymous accounting by employing an anonymous micropayment to account for the message transmission. Muriqi-201PCT - 63 - This technique therefore provides client-side security for messages, including medical records. By employing a third party for key management, burden on the sender is reduced. Various known proxy cryptographic schemes derived from Wang, U.S.6,937,726, may be used in conjunction with the present schemes, in place of, or in conjunction with, the algorithms and techniques described herein. Indeed, the above document distribution approach has the proxy encryption flavor; the owner encrypts the document first using a private-key scheme and then grants the decryption right, upon request, to its recipients via a public-key scheme. It turns out that, either one of the two new proxy encryption schemes can be used to combine the best features of the approach into a single, normal encryption scheme. As described above, an adaptation of the present technology is also applicable to a file protection application. Usually, file protection in insecure systems such as laptops and networked hardware involves long-term encryption of files. Thus, encryption keys used for file encryption have much longer lifetimes than their communication counterparts. While a user's primary, long-term, secret key may be the fundamental representation of a network identity of the user, there is a danger that it might get compromised if it is used for many files over a long period of time. If the primary key is lost or stolen, not only are contents of the files encrypted with it disclosed, but also the user loses personal information based on the key such as credit card account, social security number, and so on. Therefore, it is often preferable to use an on-line method in which a new decryption key is derived from the primary key every time a file needs to be encrypted and gets updated on a regular basis. With the proxy encryption schemes set forth herein, new decryption keys can be generated and constantly updated through self- delegation to keep them fresh. Once a new key is created and a corresponding proxy key generated, the old secret key can be destroyed, with the new key and proxy key maintaining the ability to decrypt the file. Although the foregoing examples and algorithms all employ various adaptations of the ElGamal cryptosystem, it should be noted that other cryptosystems can also be adapted. For example, the Cramer-Shoup public-key cryptosystem is a recently proposed cryptosystem that is the first practical public-key system to be provably immune to the adaptive chosen ciphertext attack. See R. Cramer and V. Shoup, "A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack," Proceedings of CRYPTO '98, Springer Verlag LNCS, vol. 1462, pp.13-25 (1998). The transcription technologies, in their various forms, permit end-to-end encrypted communications, without risk of intermediary access to the communicated information, thus preserving privacy. The technology nevertheless involves an intermediary, who can be instrumental in completing the communication, with necessary knowledge of the communication participants, unless cloaking technology is employed, or a pair of intermediaries, each with knowledge of one participant only. As part of a social network, these technologies permit some degree of moderation of social network communications, without content- based censorship. For example, personal messages may be protected from intrusion by others within the system or government agents. See Transcryption And Intermediated Transactions references. 10. HOMOMORPHIC ENCRYPTION Homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without first decrypting it. These resulting computations are left in an encrypted form which, when decrypted, result in an identical output to that produced had the operations been performed on the unencrypted data. Homomorphic encryption can be used for privacy-preserving outsourced storage and computation. This allows data to be encrypted and out-sourced to commercial cloud environments for processing, all while encrypted. For sensitive data, homomorphic encryption can be used to enable new services by removing privacy barriers inhibiting data sharing or Muriqi-201PCT - 64 - increase security to existing services. For example, predictive analytics in health care can be hard to apply via a third party service provider due to medical data privacy concerns, but if the predictive analytics service provider can operate on encrypted data instead, these privacy concerns are diminished. Moreover, even if the service provider's system is compromised, the data would remain secure. Homomorphic encryption may be used to preserve privacy while permitting some degree of external monitoring and control. For example, various mathematical and Boolean functions may be effected on encrypted files without decryption. One common way to perform operations on encrypted data (such as, for example, performing machine learning operations) is to decrypt the encrypted data, perform the desired operations, and then re-encrypt the data, so that the data is decrypted during use, but encrypted as stored. While this may preserve the privacy of data in some cases, it leaves the data vulnerable to possible attack or disclosure while it is in use, and an entity attempting to breach the data would need only to change its target from the data in storage to the machine learning applications using the data. Further, the device performing the desired operations on the unencrypted data may be running additional applications accessed by multiple individuals or other entities, which increases the exposure of the unencrypted data. US 11,374,736 discusses a system and method for fully homomorphic encryption in the context of blockchain transactions. Homomorphic computation software may contain if-statements, for-loops and while-loops, with the limitation that the number of times that the for-loops and while-loops are executed can be upper bounded by numbers that do not depend on encrypted data. In order to ensure privacy of records in the distributed social network, fully homomorphic encryption (FHE) may be employed to interrogate and apply characteristics of record without revealing the content of the records. See Homomorphic Encryption references. 11. DATA CLUSTERING Data clustering is a process of grouping together data points having common characteristics. In automated processes, a cost function or distance function is defined, and data is classified is belonging to various clusters by making decisions about its relationship to the various defined clusters (or automatically defined clusters) in accordance with the cost function or distance function. Therefore, the clustering problem is an automated decision-making problem. The science of clustering is well established, and various different paradigms are available. After the cost or distance function is defined and formulated as clustering criteria, the clustering process becomes one of optimization according to an optimization process, which itself may be imperfect or provide different optimized results in dependence on the particular optimization employed. For large data sets, a complete evaluation of a single optimum state may be infeasible, and therefore the optimization process subject to error, bias, ambiguity, or other known artifacts. In some cases, the distribution of data is continuous, and the cluster boundaries sensitive to subjective considerations or have particular sensitivity to the aspects and characteristics of the clustering technology employed. In contrast, in other cases, the inclusion of data within a particular cluster is relatively insensitive to the clustering methodology. Likewise, in some cases, the use of the clustering results focuses on the marginal data, that is, the quality of the clustering is a critical factor in the use of the system. The ultimate goal of clustering is to provide users with meaningful insights from the original data, so that they can effectively solve the problems encountered. Clustering acts to effectively reduce the dimensionality of a data set by treating each cluster as a degree of freedom, with a distance from a centroid or other characteristic exemplar of the set. In a non-hybrid system, the distance is a scalar, while in systems that retain some flexibility at the cost of complexity, the distance itself may be a vector. Thus, a data set with 10,000 data points, potentially has 10,000 degrees of freedom, that is, each data point represents the centroid of its own cluster. However, if it is clustered into 100 groups of 100 data points, the degrees of freedom is reduced to 100, with the remaining differences expressed as a distance from the cluster definition. Muriqi-201PCT - 65 - Cluster analysis groups data objects based on information in or about the data that describes the objects and their relationships. The goal is that the objects within a group be similar (or related) to one another and different from (or unrelated to) the objects in other groups. The greater the similarity (or homogeneity) within a group and the greater the difference between groups, the “better” or more distinct is the clustering. In some cases, the dimensionality may be reduced to one, in which case all of the dimensional variety of the data set is reduced to a distance according to a distance function. This distance function may be useful, since it permits dimensionless comparison of the entire data set, and allows a user to modify the distance function to meet various constraints. Likewise, in certain types of clustering, the distance functions for each cluster may be defined independently, and then applied to the entire data set. In other types of clustering, the distance function is defined for the entire data set, and is not (or cannot readily be) tweaked for each cluster. Similarly, feasible clustering algorithms for large data sets preferably do not have interactive distance functions in which the distance function itself changes depending on the data. Many clustering processes are iterative, and as such produce a putative clustering of the data, and then seek to produce a better clustering, and when a better clustering is found, making that the putative clustering. However, in complex data sets, there are relationships between data points such that a cost or penalty (or reward) is incurred if data points are clustered in a certain way. Thus, while the clustering algorithm may split data points which have an affinity (or group together data points, which have a negative affinity, the optimization becomes more difficult. Thus, for example, a semantic database may be represented as a set of documents with words or phrases. Words may be ambiguous, such as “apple”, representing a fruit, a computer company, a record company, and a musical artist. In order to effectively use the database, the multiple meanings or contexts need to be resolved. In order to resolve the context, an automated process might be used to exploit available information for separating the meanings, i.e., clustering documents according to their context. This automated process can be difficult as the data set grows, and in some cases the available information is insufficient for accurate automated clustering. On the other hand, a human can often determine a context by making an inference, which, though subject to error or bias, may represent a most useful result regardless. In supervised classification, the mapping from a set of input data vectors to a finite set of discrete class labels is modeled in terms of some mathematical function including a vector of adjustable parameters. The values of these adjustable parameters are determined (optimized) by an inductive learning algorithm (also termed inducer), whose aim is to minimize an empirical risk function on a finite data set of input. When the inducer reaches convergence or terminates, an induced classifier is generated. In unsupervised classification, called clustering or exploratory data analysis, no labeled data are available. The goal of clustering is to separate a finite unlabeled data set into a finite and discrete set of “natural,” hidden data structures, rather than provide an accurate characterization of unobserved samples generated from the same probability distribution. In semi-supervised classification, a portion of the data are labeled, or sparse label feedback is used during the process. Non-predictive clustering is a subjective process in nature, seeking to ensure that the similarity between objects within a cluster is larger than the similarity between objects belonging to different clusters. Cluster analysis divides data into groups (clusters) that are meaningful, useful, or both. If meaningful groups are the goal, then the clusters should capture the “natural” structure of the data. In some cases, however, cluster analysis is only a useful starting point for other purposes, such as data summarization. However, this often begs the question, especially in marginal cases; what is the natural structure of the data, and how do we know when the clustering deviates from “truth”? Many data analysis techniques, such as regression or principal component analysis (PCA) are not generally considered practical for large data sets. However, instead of applying the algorithm to the entire data set, it can be applied to a reduced data set consisting only of cluster prototypes. Depending on the type of analysis, the number of prototypes, and the accuracy with which the prototypes represent the data, the results can be comparable to those that would have been obtained if all the data could have been used. The entire data set may then be assigned to the clusters based on a distance function. Muriqi-201PCT - 66 - Clustering algorithms partition data into a certain number of clusters (groups, subsets, or categories). Important considerations include feature selection or extraction (choosing distinguishing or important features, and only such features); Clustering algorithm design or selection (accuracy and precision with respect to the intended use of the classification result; feasibility and computational cost; etc.); and to the extent different from the clustering criterion, optimization algorithm design or selection. Finding nearest neighbors can require computing the pairwise distance between all points. However, clusters and their cluster prototypes might be found more efficiently. Assuming that the clustering distance metric reasonably includes close points, and excludes far points, then the neighbor analysis may be limited to members of nearby clusters, thus reducing the complexity of the computation. There are generally three types of clustering structures, known as partitional clustering, hierarchical clustering, and individual clusters. The most commonly discussed distinction among different types of clusterings is whether the set of clusters is nested or unnested, or in more traditional terminology, hierarchical or partitional. A partitional clustering is simply a division of the set of data objects into non-overlapping subsets (clusters) such that each data object is in exactly one subset. If the clusters have sub-clusters, then we obtain a hierarchical clustering, which is a set of nested clusters that are organized as a tree. Each node (cluster) in the tree (except for the leaf nodes) is the union of its children (sub-clusters), and the root of the tree is the cluster containing all the objects. Often, but not always, the leaves of the tree are singleton clusters of individual data objects. A hierarchical clustering can be viewed as a sequence of partitional clusterings and a partitional clustering can be obtained by taking any member of that sequence; i.e., by cutting the hierarchical tree at a particular level. A density-based cluster is a dense region of objects that is surrounded by a region of low density. A density-based definition of a cluster is often employed when the clusters are irregular or intertwined, and when noise and outliers are present. DBSCAN is a density-based clustering algorithm that produces a partitional clustering, in which the number of clusters is automatically determined by the algorithm. Points in low- density regions are classified as noise and omitted; thus, DBSCAN does not produce a complete clustering. A prototype-based cluster is a set of objects in which each object is closer (more similar) to the prototype that defines the cluster than to the prototype of any other cluster. For data with continuous attributes, the prototype of a cluster is often a centroid, i.e., the average (mean) of all the points in the cluster. When a centroid is not meaningful, such as when the data has categorical attributes, the prototype is often a medoid, i.e., the most representative point of a cluster. For many types of data, the prototype can be regarded as the most central point. These clusters tend to be globular. K-means is a prototype-based, partitional clustering technique that attempts to find a user-specified number of clusters (K), which are represented by their centroids. Prototype-based clustering techniques create a one-level partitioning of the data objects. There are a number of such techniques, but two of the most prominent are K-means and K-medoid. K-means defines a prototype in terms of a centroid, which is usually the mean of a group of points, and is typically applied to objects in a continuous n-dimensional space. K-medoid defines a prototype in terms of a medoid, which is the most representative point for a group of points, and can be applied to a wide range of data since it requires only a proximity measure for a pair of objects. While a centroid almost never corresponds to an actual data point, a medoid, by its definition, must be an actual data point. In the K-means clustering technique, we first choose K initial centroids, the number of clusters desired. Each point in the data set is then assigned to the closest centroid, and each collection of points assigned to a centroid is a cluster. The centroid of each cluster is then updated based on the points assigned to the cluster. We iteratively assign points and update until convergence (no point changes clusters), or equivalently, until the centroids remain the same. For some combinations of proximity functions and types of centroids, K-means always converges to a solution; i.e., K-means reaches a state in which no points are shifting from one cluster to another, and hence, the centroids don’t change. Because convergence tends to b asymptotic, the end condition may be set as a maximum change between iterations. Because of the Muriqi-201PCT - 67 - possibility that the optimization results in a local minimum instead of a global minimum, errors may be maintained unless and until corrected. Therefore, a human assignment or reassignment of data points into classes, either as a constraint on the optimization, or as an initial condition, is possible. Hierarchical clustering techniques are a second important category of clustering methods. There are two basic approaches for generating a hierarchical clustering: Agglomerative and divisive. Agglomerative clustering merges close clusters in an initially high dimensionality space, while divisive splits large clusters. Agglomerative clustering relies upon a cluster distance, as opposed to an object distance. For example, the distance between centroids or medioids of the clusters, the closest points in two clusters, the further points in two clusters, or some average distance metric. Ward’s method measures the proximity between two clusters in terms of the increase in the sum of the squares of the errors that results from merging the two clusters. Agglomerative Hierarchical Clustering refers to clustering techniques that produce a hierarchical clustering by starting with each point as a singleton cluster and then repeatedly merging the two closest clusters until a single, all-encompassing cluster remains. Agglomerative hierarchical clustering cannot be viewed as globally optimizing an objective function. Instead, agglomerative hierarchical clustering techniques use various criteria to decide locally, at each step, which clusters should be merged (or split for divisive approaches). This approach yields clustering algorithms that avoid the difficulty of attempting to solve a hard combinatorial optimization problem. Furthermore, such approaches do not have problems with local minima or difficulties in choosing initial points. Agglomerative hierarchical clustering algorithms tend to make good local decisions about combining two clusters since they can use information about the pair-wise similarity of all points. However, once a decision is made to merge two clusters, it cannot be undone at a later time. This approach prevents a local optimization criterion from becoming a global optimization criterion. In supervised classification, the evaluation of the resulting classification model is an integral part of the process of developing a classification model. Being able to distinguish whether there is non-random structure in the data is an important aspect of cluster validation. U.S.11,216,428 discusses a technology for identifying a reference-user, which exploits human interactions with an automated database system to derive insights about the data structures that are difficult, infeasible, or impossible to extract in a fully automated fashion, and to use these insights to accurately assess a risk adjusted value or cluster boundaries. The system monitors or polls a set of users, actively using the system or interacting with the outputs and providing inputs. The inputs may be normal usage, i.e., the user is acting in a goal directed manner, and providing inputs expressly related to the important issues, or explicit feedback, in which the user acts to correct or punish mistakes made by the automated system, and/or reward or reinforce appropriate actions. Through automated historical and action-outcome analysis, a subset of users, called “reference-users” are identified who demonstrate superior insight into the issue or sub-issue important to the system or its users. After the reference-users are identified, their actions or inputs are then used to modify or influence the data processing, such as to provide values or cluster the data. The adaptive algorithm is also able to demote reference-users to regular users. Additionally, because reference-user status may give rise to an ability to influence markets, some degree of random promotion and demotion is employed, to lessen the incentive to exploit an actual or presumed reference-user status. Indeed, the system may employ a genetic algorithm to continuously select appropriate reference-users, possibly through injection of “spikes” or spurious information, seeking to identify users that are able to identify the spurious data, as an indication of users who intuitively understand the data model and its normal and expected range. Thus, the system is continuously or sporadically doing three things – learning from reference-users and learning who is a reference-user, requesting more granulation/tagging and using that learning to cluster/partition the dataset for the ordinary users for the most contextually relevant insight. Muriqi-201PCT - 68 - Often, the reference-user’s insights will be used to prospectively update the analytics, such as the distance function, clustering initial conditions or constraints, or optimization. However, in some cases, the adaptivity to the reference-user will only occur after verification. That is, a reference-user will provide an input which cannot contemporaneously be verified by the automated system. That input is stored, and the correspondence of the reference-user’s insight to later reality then permits a model to be derived from that reference-user which is then used prospectively. This imposes a delay in the updating of the system, but also does not reveal the reference-user’s decisions immediately for use by others. Thus, in a financial system, a reference-user might wish to withhold his insights from competitors while they are competitively valuable. However, after the immediate value has passed, the algorithm can be updated to benefit all. In an investment system, often a reference-user with superior insight would prefer that others follow, since this increases liquidity in the market, giving greater freedom to the reference-user. A key issue is that a fully automated database analysis may be defined as an NP problem and in a massive database, the problem becomes essentially infeasible. However, humans tend to be effective pattern recognition engines, and reference-users may be selected that are better than average, and capable of estimating an optimal solution to a complex problem “intuitively”, that is, without a formal and exact computation, even if computationally infeasible. As stated above, some humans are better than others at certain problems, and once these better ones are identified, their insights may be exploited to advantage. In clustering the database, a number of options are available to define the different groups of data. One option is to define persons who have a relationship to the data. That is, instead of seeking to define the context as an objective difference between data, the subjective relationships of users to data may define the clusters. This scenario redefines the problem from determining a cluster definition as a “topic” to determining a cluster definition as an affinity to a person. Note that these clusters will be quite different in their content and relationships, and thus have different application. According to the present technology, the reference user may be considered an influencer, that is, one who provides recommendations or guidance to others. The clustering technology allows automated determination of optimal influencers for a respective user. Optimal clustering is only one aspect of the use of a reference-user. More generally, the reference-user is a user that demonstrates uncommon insight with respect to an issue. For example, insight may help find clusters of data that tend to gravitate toward or away from each other and form clusters of similarity or boundaries. Clustering is at the heart of human pattern recognition, and involves information abstraction, classification and discrimination. In some cases, a user wishes only results with high relevance, while in other cases, a user may wish to see a ranked list which extends to low relevance/low yield results. A list, however, is not the only way to organize results, and, in terms of visual outputs, these may be provided as maps (see 7,113,958 (Three-dimensional display of document set); 6,584,220 (Three-dimensional display of document set); 6,484,168 (System for information discovery); 6,772,170 (System and method for interpreting document contents), three or higher dimensional representations, or other organizations and presentations of the data. Thus, the distinction between the query or input processing, to access selected information from a database, and the presentation or output processing, to present the data to a user, is important. In some cases, these two functions are interactive, and for example, a context may be used preferentially during presentation rather than selection. The user context may be determined in various ways, but in the case of persistent contexts, a user profile may be developed, and a reference-user selected with whom the user has some affinity, i.e., overlapping or correlated characteristics. There are multiple ways to designate the reference-user – the system designates the reference-user based on filtering a set of users to which reference-user best represents the responses and preferences of the set. This designation of reference-user comes from affinity, which could be network-affinity Muriqi-201PCT - 69 - (users that are closely connected in the network in that context), knowledge-affinity (users that have superior expertise in that context), or skill-affinity (users possessing specialized skills in that context). It is noted that the reference-user is discussed as an actual single human user, but may be a hybrid of multiple users, machine assisted humans, or even paired guides. The problem of defining the context of a user is then translated to the problem of finding a suitable reference-user or set of reference- users. In fact, the set of reference-users for a given user may have a high consistency, and as known in the field of social networking. That is, assuming that the word “friend” is properly defined, the universe of contexts for a user may be initially estimated by the contexts of interest to his or her identified friends. Such an estimation technology is best exploited in situations where error is tolerable, and where leakage of user- specific contexts is acceptable. The value of an asset (poorly valued because of an inefficient market) is the actually realized value at duration of the final exit for a party, as opposed to price, which is the transaction value attributed at the trade or transaction today. When we use this in the context of digital assets such as domain names, Google rankings, ad placement etc. all of which classify as alternatives because they are traded in an inefficient market, then the price is the price paid by the advertiser. If the search engine makes its advertising placement decision based on the highest advertising price only, over the long term this results in poorer placement of items and attrition of eyeballs, in effect reduceng the value of the asset. Thus, understanding the difference between price and value, even directionally is critical. Accordingly, another aspect of the technology is to optimize advertisement placement into a natural result (that is, not influenced by the advertising) by referring to the clustering of the data as well as the context, such that the advertising is appropriate, inoffensive, and likely to increase the overall value of the enterprise, based on both the short term revenues from advertising, and the long term reputation and future cash flows that may be influenced. For example, an inappropriately placed ad will generate advertising revenue, but may disincentivize the advertiser to place ads in the future. An appropriately placed ad, which is contextually appropriate and topically appropriate, is more likely to result in a consumer-advertiser transaction, and thus lead to higher future advertising revenues, even if the present value of the ad is not the highest possible option. A reference-user in this context may be a user who transacts with an advertiser. By matching users with a reference-user, within the appropriate context, it is more likely that the users will also transact with that advertiser, as compared to users in a different context. The ads may therefore be clustered as artificial insertions into the data universe, and clustered accordingly. When a user’s corresponding reference- user(s) and cluster(s) of interest are identified, the advertisements within those clusters may then be considered for delivery to the user. A user may seek a recommendation from a recommendation engine. The recommendation engine contains identifications and profiles of users who have posted recommendations/ratings, as well as profiles for users and usage feedback for the system. A user seeking to use the engine is presented (at some time) with a set of questions or the system otherwise obtains data inputs defining the characteristics of the user. In this case, the user characteristics generally define the context which is used to interpret or modify the basic goal of the user, and therefore the reference-user(s) for the user, though the user may also define or modify the context at the time of use. Thus, for example, a user seeks to buy a point-and-shoot camera as a gift for a friend. In this case, there are at least four different contexts to be considered: the gift, the gift giver, the gift receiver, and the gifting occasion. The likelihood of finding a single reference-user appropriate for each of these contexts is low, so a synthetic reference-user may be created, i.e., information from multiple users and gifts processed and exploited. The issues for consideration are: what kinds of cameras have people similarly situated to the gift giver (the user, in this case) had good experiences giving? For the recipient, what kinds of cameras do similar recipients like to receive? Based on the occasion, some givers and recipients may be filtered. Price may or may not be considered an independent context, or a modifier to the other contexts. The various considerations are used in a cluster analysis, in which recommendations relevant to the contexts may be presented, with a ranking according to the distance function from the “cluster Muriqi-201PCT - 70 - definition”. As discussed above, once the clustering is determined, advertisements may be selected as appropriate for the cluster, to provide a subsidy for operation of the system, and also to provide relevant information for the user about available products. Once again, the context is specific to the particular user and thus the right kind of camera for a first user to give a friend is not the same as the right kind of camera for a second user to give to a different friend; indeed, even if the friend is the same, the “right” kind of camera may differ between the two users. For example, if the first user is wealthier or other context differences. See Data Clustering references. 12. EYE TRACKING U.S.8,885,882 discloses a system for determining gaze direction using a 3D eyeball model, and in conjunction with a computer screen, determining what a subject is looking at. The overwhelming majority of gaze estimation approaches rely on glints (the reflection of light off the cornea) to construct 2D or 3D gaze models. Alternatively, eye gaze may be determined from the pupil or iris contours using ellipse fitting approaches. One can also leverage the estimated iris center directly and use its distance from some reference point (e.g., the eye corners) for gaze estimation. Indeed, the entire eye region may be segmented into the iris, sclera (white of the eye), and the surrounding skin; the resulting regions can then be matched pixel-wise with 3D rendered eyeball models (with different parameters). However, different subjects, head pose changes, and lighting conditions could significantly diminish the quality of the segmentation. U.S.8,077,217 provides an eyeball parameter estimating device and method, for estimating, from a camera image, as eyeball parameters, an eyeball central position and an eyeball radius which are required to estimate a line of sight of a person in the camera image. An eyeball parameter estimating device includes: a head posture estimating unit for estimating, from a face image of a person photographed by a camera, position data corresponding to three degrees of freedom (x-, y-, z-axes) in a camera coordinate system, of an origin in a head coordinate system and rotation angle data corresponding to three degrees of freedom (x-, y-, z-axes) of a coordinate axis of the head coordinate system relative to a coordinate axis of the camera coordinate system, as head posture data in the camera coordinate system; a head coordinate system eyeball central position candidate setting unit for setting candidates of eyeball central position data in the head coordinate system based on coordinates of two feature points on an eyeball, which are preliminarily set in the head coordinate system; a camera coordinate system eyeball central position calculating unit for calculating an eyeball central position in the camera coordinate system based on the head posture data, the eyeball central position candidate data, and pupil central position data detected from the face image; and an eyeball parameter estimating unit for estimating an eyeball central position and an eyeball radius based on the eyeball central position in the camera coordinate system so as to minimize deviations of position data of a point of gaze, a pupil center, and an eyeball center from a straight line joining original positions of the three pieces of position data. U.S.7,306,337, determines eye gaze parameters from eye gaze data, including analysis of a pupil-glint displacement vector from the center of the pupil image to the center of the glint in the image plane. The glint is a small bright spot near the pupil image resulting from a reflection of infrared light from a an infrared illuminator off the surface of the cornea. U.S. Pat. Pub.2011/0228975 determines a point-of-gaze of a user in three dimensions, by presenting a three-dimensional scene to both eyes of the user; capturing image data including both eyes of the user; estimating line-of-sight vectors in a three-dimensional coordinate system for the user's eyes based on the image data; and determining the point-of-gaze in the three-dimensional coordinate system using the line-of-sight vectors. It is assumed that the line-of-sight vector originates from the center of the cornea estimated in space from image data. The image data may be processed to analyze multiple glints (Purkinje reflections) of each eye. U.S.6,659,611 provides eye gaze tracking without calibrated cameras, direct measurements of specific users' eye geometries, or requiring Muriqi-201PCT - 71 - the user to visually track a cursor traversing a known trajectory. One or more uncalibrated cameras imaging the user's eye and having on-axis lighting, capture images of a test pattern in real space as reflected from the user's cornea, which acts as a convex spherical mirror. Parameters required to define a mathematical mapping between real space and image space, including spherical and perspective transformations, are extracted, and subsequent images of objects reflected from the user's eye through the inverse of the mathematical mapping are used to determine a gaze vector and a point of regard. U.S.5,818,954 provides a method that calculates a position of the center of the eyeball as a fixed displacement from an origin of a facial coordinate system established by detection of three points on the face, and computes a vector therefrom to the center of the pupil. The vector and the detected position of the pupil are used to determine the visual axis. U.S.7,963,652 provides eye gaze tracking without camera calibration, eye geometry measurement, or tracking of a cursor image on a screen by the subject through a known trajectory. See also U.S.7,809,160. One embodiment provides a method for tracking a user's eye gaze at a surface, object, or visual scene, comprising: providing an imaging device for acquiring images of at least one of the user's eves: modeling, measuring, estimating, and/or calibrating for the user's head position: providing one or more markers associated with the surface, object, or visual scene for producing corresponding glints or reflections in the user's eyes; analyzing the images to find said glints or reflections and/or the pupil: and determining eye gaze of the user upon a said one or more marker as indicative of the user's eye gaze at the surface, object, or visual scene. By incorporating eye tracking into a display, broadcasters and/or advertisers can determine what (aspects of) advertisements are viewed by, and hence of interest to, a subject. Advertisers may verify attention to the advertisement, and/or use this information to focus their message on a particular subject or perceived interest of that subject, or to determine the cost per view of the advertisement, for example, but not limited to, cost per minute of product placements in television shows. For example, this method may be used to determine the amount of visual interest in an object or an advertisement, and that amount of interest used to determine a fee for display of the object or advertisement. The visual interest of a subject looking at the object or advertisement may be determined according to the correlation of the subject's optical axis with the object over a percentage of time that the object is on display. In addition, the method may be used to change the discourse with the television, or any appliance, by channeling user commands to the device or part of the display currently observed. In particular, keyboard or remote control commands can be routed to the appropriate application, window or device by looking at that device or window, or by looking at a screen or object that represents that device or window. In addition, TV content may be altered according to viewing patterns of the user, most notably by incorporating multiple scenarios that are played out according to the viewing behavior and visual interest of the user, for example, by telling a story from the point of view of the most popular character. Alternatively, characters in paintings or other forms of visual display may begin movement or engage in dialogue when receiving fixations from a subject user. Alternatively, viewing behavior may be used to determine what aspects of programs should be recorded, or to stop, mute or pause playback of a content source such as DVD and the like. Eye contact sensing objects provide context for action, and therefore a programmable system may employ eye tracking or gaze estimation to determine context. A display may be presented, optimized to present different available contexts, from which the user may select by simply looking. When there are multiple contexts, or hybrid contexts, the user may have a complex eye motion pattern which can be used to determine complex contexts. Eye tracking may also be used to control a user interface, and automatically acquire user interest, attention, and serve as inputs to the social network and/or adapt the user interface to the users visual interaction with the presentation. See Eye Tracking references. Muriqi-201PCT - 72 - 13. BIOMETRIC AUDITING US 20200257877 provides a method and apparatus for recognizing different users in a household without having the users to register or enroll their biometric features are provided. The apparatus may leverage sensors integrated with a remote-control device or connected to a media device and create pseudo-identity of a user when the user is consuming the content services from media device. When pseudo-identity is created, user's content preference, user's viewing habit, and user's viewing behavior with respect to the content, may be associated with more than one pseudo-identity to better identify the same user. In subsequent usage, personalized services, such as personalized guide & programs, user-selected preferences, targeted advertisement, or content recommendation, may be provided by service provider to user in a subtle and natural manner. Oracle provides Moat analytics to provide analytics to publishers and advertisers. See, docs.oracle.com/en/cloud/saas/data- cloud/moat.html and linked pages. A smartphone, Chromebook, laptop, desktop computer, etc., can also employ a biometric sensor, such as a video camera, fingerprint sensor, touchscreen, etc., to verify that a human viewer is available to receive the advertisement. In the case of a video camera, facial recognition software can identify the viewer, and or human recognition software can verify a moving human face. A higher level analysis may look for pulsatile variations from heartbeat, and gaze direction adjustment based on displaced objects. See Biometric Auditing references. 14. SENTIMENT ANALYSIS Sentiment analysis (also known as opinion mining or emotion AI) is the use of natural language processing, text analysis, computational linguistics, and biometrics to systematically identify, extract, quantify, and study affective states and subjective information. Sentiment analysis is widely applied to voice of the customer materials such as reviews and survey responses, online and social media, and healthcare materials for applications that range from marketing to customer service to clinical medicine. With the rise of deep language models, such as RoBERTa, also more difficult data domains can be analyzed, e.g., news texts where authors typically express their opinion/sentiment less explicitly. A basic task in sentiment analysis is classifying the polarity of a given text at the document, sentence, or feature/aspect level—whether the expressed opinion in a document, a sentence or an entity feature/aspect is positive, negative, or neutral. Advanced, "beyond polarity" sentiment classification looks, for instance, at emotional states such as enjoyment, anger, disgust, sadness, fear, and surprise. Precursors to sentimental analysis include the General Inquirer, which provided hints toward quantifying patterns in text and, separately, psychological research that examined a person's psychological state based on analysis of their verbal behavior. Subsequently, the method described in a patent by Volcani and Fogel, looked specifically at sentiment and identified individual words and phrases in text with respect to different emotional scales. A current system based on their work, called EffectCheck, presents synonyms that can be used to increase or decrease the level of evoked emotion in each scale. Even though in most statistical classification methods, the neutral class is ignored under the assumption that neutral texts lie near the boundary of the binary classifier, several researchers suggest that, as in every polarity problem, three categories must be identified. Moreover, it can be proven that specific classifiers such as the Max Entropy and SVMs can benefit from the introduction of a neutral class and improve the overall accuracy of the classification. There are in principle two ways for operating with a neutral class. Either, the algorithm proceeds by first identifying the neutral language, filtering it out and then assessing the rest in terms of positive and negative sentiments, or it builds a three- way classification in one step. This second approach often involves estimating a probability distribution over all categories (e.g., naive Bayes classifiers as implemented by the NLTK). Whether and how to use a neutral class depends on the nature of the data: if the data is clearly Muriqi-201PCT - 73 - clustered into neutral, negative and positive language, it makes sense to filter the neutral language out and focus on the polarity between positive and negative sentiments. If, in contrast, the data are mostly neutral with small deviations towards positive and negative affect, this strategy would make it harder to clearly distinguish between the two poles. It is noted that in many cases, a sentiment is subjective, and without knowing the subjective context or bias, the sentiment analysis (SA) is potentially ambiguous or wrong. SA for social media data targeting therefore may include an analysis of the media to determine a vector of sentiment-sensitive classes, which can then be processed with a user sentiment profile, to determine affinity or aversion. For example, mention of political figures is polarizing, and evokes positive or negative sentiments from different people. A different method for determining sentiment is the use of a scaling system whereby words commonly associated with having a negative, neutral, or positive sentiment with them are given an associated number on a −10 to +10 scale (most negative up to most positive) or simply from 0 to a positive upper limit such as +4. This makes it possible to adjust the sentiment of a given term relative to its environment (usually on the level of the sentence). When a piece of unstructured text is analyzed using natural language processing, each concept in the specified environment is given a score based on the way sentiment words relate to the concept and its associated score. This allows movement to a more sophisticated understanding of sentiment, because it is now possible to adjust the sentiment value of a concept relative to modifications that may surround it. Words, for example, that intensify, relax or negate the sentiment expressed by the concept can affect its score. Alternatively, texts can be given a positive and negative sentiment strength score if the goal is to determine the sentiment in a text rather than the overall polarity and strength of the text. Subjectivity/objectivity identification is commonly defined as classifying a given text (usually a sentence) into one of two classes: objective or subjective. This problem can sometimes be more difficult than polarity classification. The subjectivity of words and phrases may depend on their context and an objective document may contain subjective sentences (e.g., a news article quoting people's opinions). Moreover, as mentioned by Su, results are largely dependent on the definition of subjectivity used when annotating texts. However, Pang showed that removing objective sentences from a document before classifying its polarity helped improve performance. Emotions and sentiments are subjective in nature. The degree of emotions/sentiments expressed in a given text at the document, sentence, or feature/aspect level—to what degree of intensity is expressed in the opinion of a document, a sentence or an entity differs on a case-to-case basis. However, predicting only the emotion and sentiment does not always convey complete information. The degree or level of emotions and sentiments often plays a crucial role in understanding the exact feeling within a single class (e.g., 'good' versus 'awesome'). Some methods leverage a stacked ensemble method for predicting intensity for emotion and sentiment by combining the outputs obtained and using deep learning models based on convolutional neural networks, long short-term memory networks and gated recurrent units. Existing approaches to sentiment analysis can be grouped into three main categories: knowledge-based techniques, statistical methods, and hybrid approaches. Knowledge-based techniques classify text by affect categories based on the presence of unambiguous affect words such as happy, sad, afraid, and bored. Some knowledge bases not only list obvious affect words, but also assign arbitrary words a probable "affinity" to particular emotions. Statistical methods leverage elements from machine learning such as latent semantic analysis, support vector machines, "bag of words", "Pointwise Mutual Information" for Semantic Orientation, semantic space models or word embedding models, and deep learning. More sophisticated methods try to detect the holder of a sentiment (i.e., the person who maintains that affective state) and the target (i.e., the entity about which the affect is felt). To mine the opinion in context and get the feature about which the speaker has opined, the grammatical relationships of words are used. Grammatical dependency relations are obtained by deep parsing of the text. Hybrid approaches leverage both machine learning and elements from knowledge representation such as ontologies and semantic networks in order Muriqi-201PCT - 74 - to detect semantics that are expressed in a subtle manner, e.g., through the analysis of concepts that do not explicitly convey relevant information, but which are implicitly linked to other concepts that do so. For a recommender system, sentiment analysis has been proven to be a valuable technique. A recommender system aims to predict the preference for an item of a target user. Mainstream recommender systems work on explicit data set. For example, collaborative filtering works on the rating matrix, and content-based filtering works on the meta-data of the items. In many social networking services or e-commerce websites, users can provide text review, comment or feedback to the items. These user-generated text provide a rich source of user's sentiment opinions about numerous products and items. Potentially, for an item, such text can reveal both the related feature/aspects of the item and the users' sentiments on each feature. The item's feature/aspects described in the text play the same role with the meta-data in content-based filtering, but the former are more valuable for the recommender system. Since these features are broadly mentioned by users in their reviews, they can be seen as the most crucial features that can significantly influence the user's experience on the item, while the meta-data of the item (usually provided by the producers instead of consumers) may ignore features that are concerned by the users. For different items with common features, a user may give different sentiments. Also, a feature of the same item may receive different sentiments from different users. Users' sentiments on the features can be regarded as a multi-dimensional rating score, reflecting their preference on the items. Based on the feature/aspects and the sentiments extracted from the user-generated text, a hybrid recommender system can be constructed. There are two types of motivation to recommend a candidate item to a user. The first motivation is the candidate item have numerous common features with the user's preferred items, while the second motivation is that the candidate item receives a high sentiment on its features. For a preferred item, it is reasonable to believe that items with the same features will have a similar function or utility. So, these items will also likely to be preferred by the user. On the other hand, for a shared feature of two candidate items, other users may give positive sentiment to one of them while giving negative sentiment to another. Clearly, the high evaluated item should be recommended to the user. Based on these two motivations, a combination ranking score of similarity and sentiment rating can be constructed for each candidate item. See Sentiment Analysis references. 15. VIRTUAL PRIVATE NETWORK A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers. Encryption is common, although not an inherent part of a VPN connection. en.wikipedia.org/wiki/Virtual_private_network A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely. The present social network may employ VPN technology to secure communications between user, and also in communications involving central servers and infrastructure components. Tunnel endpoints must be authenticated before secure VPN tunnels can be established. User-created remote-access VPNs may use passwords, biometrics, two-factor authentication or other cryptographic methods. Network-to-network tunnels often use passwords or digital certificates. Depending on the VPN protocol, they may store the key to allow the VPN tunnel to establish automatically, without intervention from the administrator. Data packets are secured by tamper proofing via a message authentication code (MAC), which prevents the message Muriqi-201PCT - 75 - from being altered or tampered without being rejected due to the MAC not matching with the altered data packet. Tunneling protocols can operate in a point-to-point network topology that would theoretically not be considered a VPN because a VPN by definition is expected to support arbitrary and changing sets of network nodes. But since most router implementations support a software-defined tunnel interface, customer-provisioned VPNs often are simply defined tunnels running conventional routing protocols. Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points without dropping the secure VPN session or losing application sessions. See Virtual Private Network references. 16. ARTIFICIAL INTELLIGENCE The various elements of the system may be analyzed and processed using artificial intelligence (AI). The AI may be used to determine media content, characteristics, biases, and parameters that may have no corresponding linguistic label, that are nevertheless relevant for use in the network. Likewise, users may be profiled, and their preference and non-preference characteristics, and value functions determined. AI (alone, or in conjunction with a coprocessor) may perform optimizations, including economic optimizations of various types. In general, a significant task of the social network is to form relationships between people, and exploit those relationships to present content and ads to users. The AI may be used to create content, characterize content, characterize ads, characterize users, characterize influencers, recommend ads, content, and linkages, optimize pricing, and the like. Interesting options arise when the AI assumes multiple roles, such as generation of content, recommending content, and pricing of content. If one seeks objective results, this overlap may be a significant conflict of interest and problematic. In an entertainment context, however, a paramount issue is user satisfaction, not objective truth. A large language model (LLM) is a computerized language model, embodied by an artificial neural network using an enormous amount of "parameters" ("neurons" in its layers with up to tens of millions to billions "weights" between them), that are (pre-)trained on many GPUs in relatively short time due to massive parallel processing of vast amounts of unlabeled texts containing up to trillions of tokens (parts of words) provided by corpora such as Wikipedia Corpus and Common Crawl, using self-supervised learning or semi-supervised learning, resulting in a tokenized vocabulary with a probability distribution. LLMs can be upgraded by using additional GPUs to (pre-)train the model with even more parameters on even vaster amounts of unlabeled texts. The transformer algorithm, either unidirectional (such as used by GPT models) or bidirectional (such as used by BERT model), allows for such massively parallel processing. In an implicit way, LLMs have acquired an embodied knowledge about syntax, semantics and "ontology" inherent in human language corpora, but also inaccuracies and biases present in the corpora. en.wikipedia.org/wiki/Large_language_model. The basic idea of LLMs, which is to start with a neural network as black box with randomized weights, using a simple repetitive architecture and (pre-)training it on a large language corpus, was not feasible until the 2010s when use of GPUs had enabled massively parallelized processing, which has gradually replaced the logical AI approach that has relied on symbolic programs. All transformers have the same primary components: Tokenizers, which convert text into machine-readable symbols known as tokens; Embedding layers, which convert the machine-readable symbols into semantically meaningful representations; and Transformer layers, which carry out the reasoning capabilities of the models. Transformer layers come in two types known as encoders and decoders. While the transformer from the original paper was composed of both encoder layers and decoder layers, subsequent work has also explored encoder- Muriqi-201PCT - 76 - only architectures (BERT) and decoder-only architectures (GPT) as well. While all three have their benefits and uses, decoder-only models are the dominant form at very large scales due to being substantially more efficient to train at scale. LLMs are mathematical functions whose input and output are lists of numbers. Consequently, words must be converted to numbers. In general, a LLM uses a separate tokenizer. A tokenizer maps between texts and coded tokens (e.g., lists of integers). The tokenizer is generally adapted to the entire training dataset first, then frozen, before the LLM is trained. A common choice is byte pair encoding. Another function of tokenizers is text compression, which saves compute. Common words or phrases like "where is" can be encoded into one token, instead of 7 characters. The OpenAI GPT series uses a tokenizer where 1 token maps to around 4 characters, or around 0.75 words, in common English text. Uncommon English text is less predictable, thus less compressible, thus requiring more tokens to encode. The output of a LLM is a probability distribution over its vocabulary. This is usually implemented as follows: Upon receiving a text, the bulk of the LLM outputs a vector, which is passed through a softmax function. An LLM is a language model, which is not an agent as it has no goal, but it can be used as a component of an intelligent agent. The ReAct ("Reason+Act") method constructs an agent out of an LLM, using the LLM as a planner. The LLM is prompted to "think out loud". Specifically, the language model is prompted with a textual description of the environment, a goal, a list of possible actions, and a record of the actions and observations so far. It generates one or more thoughts before generating an action, which is then executed in the environment. The Reflexion method constructs an agent that learns over multiple episodes. At the end of each episode, the LLM is given the record of the episode, and prompted to think up "lessons learned", which would help it perform better at a subsequent episode. These "lessons learned" are given to the agent in the subsequent episodes. Monte Carlo tree search can use an LLM as rollout heuristic. When a programmatic world model is not available, an LLM can also be prompted with a description of the environment to act as world model. For open-ended exploration, an LLM can be used to score observations for their "interestingness", which can be used as a reward signal to guide a normal (non-LLM) reinforcement learning agent. Alternatively, it can propose increasingly difficult tasks for curriculum learning. Instead of outputting individual actions, an LLM planner can also construct "skills", or functions for complex action sequences. The skills can be stored and later invoked, allowing increasing levels of abstraction in planning. LLM-powered agents can keep a long-term memory of its previous contexts, and the memory can be retrieved in the same way as Retrieval Augmented Generation. Multiple such agents can interact socially. Multimodality means "having several modalities", and a "modality" means a type of input, such as video, image, audio, text, proprioception, etc. There have been many AI models trained specifically to ingest one modality and output another modality, such as AlexNet for image to label, visual question answering for image-text to text, and speech recognition for speech to text. A common method to create multimodal models out of an LLM is to "tokenize" the output of a trained encoder. See Artificial Intelligence references. BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 shows the home screen according to a preferred embodiment. Figure 2 shows a user profile screen according to the preferred embodiment. Figure 3 shows an analytics home page according to a preferred embodiment. Figure 4 shows a schematic view of an exemplary system according to the prior art. Muriqi-201PCT - 77 - DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT EXAMPLE 1 A social network system is provided. A feature of a preferred embodiment of the social network is that users of the network are compensated based on their role and value added to the network. Each user has an account, associated with a cryptocurrency token wallet. That wallet is authenticated per user, preferably with a user biometric identification option to authenticate transactions, i.e., incoming payment and outbound payments. Another feature of a preferred embodiment is that it is built on a hybrid centralized control/decentralized ledger transactional basis. This means that should the centralized control fail, such as might occur during an outage, upgrade, or high usage, the social network would still operate, though without certain functions. Likewise, in some cases, an open API permits modes of operation in a totally decentralized fashion, or in a totally centralized fashion. In the centralized use case, the social network may operate similarly to Meta (FaceBook), YouTube, Twitter, Instagram, etc., with one difference being an economic distribution formula that provides compensation to users for “excess” advertising revenues, and to referrers/influencers for their role in the network. When the social network operates in a decentralized mode, payments are made using a decentralized cryptocurrency, with smart contracts or similar technology used to ensure collection and distribution of revenues according to an algorithm. In the decentralized case, the system operate off a decentralized content database, which may have different records than a centralized database. Typically, because of delays in distribution and potential orphan records due to attrition, the decentralized database may be effectively incomplete for a user at a given time. On the other hand, new content may be released into the P2P network, and not immediately acquired and indexed by the central social network database, so the P2P may have newer content. Ads more typically are syndicated through a central provider, and newer campaigns may be dominated by the central database. Older campaigns may still be maintained on the decentralized system, but may become stale and unfunded. One advantage of a decentralized system is that it can operate without providing a central repository of personal information. Therefore, users may be more willing to permit use of personal information if that information is not amassed in a central database. As a result, the user profiles used by the decentralized system implementation may be richer and more accurate than the corresponding central database records. In a decentralized system, some aspects of the system may be implemented at the destination node, or in a nearby node using homomorphic encryption. Thus, detailed and accurate profiles may be exploited without high risk of privacy breach. On the other hand, a centralized user profile may have limited and inaccurate information, and therefore ad targeting and content links and recommendations may differ. Both central and distributed implementations may coexist, and their results merged, with deduplication and consistency enhanced. On the other hand, a centralized system facilitates use of large language models (LLM), that would be infeasible for a distributed network and processing system. The LLM, such as a GPT, can target ads and content to a user, synthesize entertainment content, perform complex sentiment analysis, assist a user in composing media, assist a user in comprehending media (e.g., translation, summarization, simplification, complexification, etc.), and form (discover) links between new users and media. The LLM can be provided by third parties, and therefore are centralized in the sense that the function is performed by a service provider on behalf of multiple users, and need not be controlled by the social network provider. Ad views are preferably verified both for view/consumption of the ad, and identification of the user experiencing the ad. For example, a camera facing the user may capture face (for biometric authentication) and attention (e.g., eye gaze direction). Muriqi-201PCT - 78 - The users initially authenticate themselves with a certification authority, which may be a financial institution, professional authentication organization (PAO), professional employment organization (PEO), or other organization. Typically, the certification authority will also be responsible for tax compliance reporting, though this may be a separate function. A user may be biometrically authenticated with an image, video, iris pattern, blood vessel pattern, photoplethysmographic pattern, fingerprint, voice pattern, keystroke temporal pattern, etc. The user authentication serves an additional purpose from transactions. That is, assuring advertisers or sponsors that the target of the message corresponds to the profile targeted. Further, user authentication also ensures accountability for user activity within the social network. The social network provides content for the user, in the form of premium media (i.e., media for which the creator seeks compensation), advertising/sponsored segments, non-premium media (media for which the creator does not particularly demand compensation), messages between users, and other types of content. The user interface has an open API, and therefore is not limited to predetermined media types and usage models. The social media platform operates using tokens, which represent values of a cryptocurrency, which are authenticated. The tokens may be locked into use only in the social media platform, or a freely transferrable cryptocurrency. While a central implementation of the system does not require use of cryptocurrencies, since a central ledger may suffice, a hybrid or system benefits from use of a decentralized ledger. As an alternate to a typical cryptocurrency, points issued as part of an incentive program may be used as a medium of exchange. However, since these must be transacted electronically in a system that supports decentralized operation, this embodiment corresponds to an asset-backed stablecoin. The tie-in to commercial transaction systems provides another dimension to the system, distinct from advertising, i.e., commercial transactions engaged in by users regardless of promotions. The platform may provide users with opportunities to engage in transactions, and receive a commission for sales or other transactions. The commission may be allocated between the network operator, and a portion of the user’s network, in the manner of a multilevel marketing (MLM) system allocation, or on another basis. Payment back to the user is not required, since it simply amounts to a discount. In some cases, there may be an interaction between an advertiser and a transaction, especially where the advertiser is unrelated to the transaction counterparty. That is, an advertiser may obtain credit for “inspiring” a user to engage in a transaction, even if the transaction is not with the advertiser. While all aspects of the system may operate on a distributed ledger, and financial transactions adopt the typical attributes of a cryptocurrency blockchain—immutability, protection against double spending, pseudonomy, etc. On the other hand, the social network data may violate one or more of these precepts, and in particular the immutability factor may be reconsidered. One way to achieve this is to host encrypted information or external references on the blockchain, so that the recordation on the blockchain does not irrevocably reveal the referenced information. The social network has a proprietor, which seeks compensation for usage of the social media platform, and exercises some control over its nature and operation. Therefore, the proprietor has access to the wallet (or transactions involving the wallet), and can deduct a portion based on its terms of service. In other cases, the sponsor compensates the user, and adds to the wallet balance. The social network has an interface for content providers to present premium media content for use within the network. This may be stored in a central server, in a decentralized database, a hybrid store, or in any other fashion. The user interface includes a media player that implements a DRM system, and limits consumption or export of premium media content based on compliance with a smart contract. The Muriqi-201PCT - 79 - smart contract is typically a token payment for use of the media, though there may be other types of smart contracts. The smart contract is executed based on a gas fee or other pre-paid or post-paid basis. Typically, the key for unlocking usage of the premium content is provided or enabled in a blockchain transaction, though a central server may also release the content. The unlocking blockchain event typically provides payment to the respective content, though in some cases the compensation to the content provider is made after completion of the playback, or dependent on an amount of content consumed. Typically, the content provider establishes a fixed fee for content consumption, but in other cases, the cost is dependent on the user characteristics (e.g., per a user profile), amount of subsidy or commission on the payment (which may be established in a competitive process between advertisers), time, location, etc. An oracle may provided needed information for the smart contract to execute for the correct transaction amount. The ad price may be predetermined for all users, dependent ion user characteristics, dependent on context (i.e., media content consumed in proximity to the ad), dependent on consummation of a transaction with the advertiser, or other basis. The social network has a sponsor interface that permits interested parties, such as advertisers, to promote content or messages, and pay a subsidy for operation of the system. Advertising is not the only model, and for example, an employer may seek to avoid all advertising and simply pay for desirable content usage by employees. The typical sponsor does have a message for presentation to a user, in consideration of a token transaction which will be discussed in more detail below. The sponsor typically presents its messages as part of a campaign, with defined budget, target demographics or profiles, restrictions on linked content, and the like. The campaign is typically implemented as a prefunded smart contract, with a declining token balance until exhaustion. Alternately, a sponsor may individually process and serve ads to users. The social network has a user interface, typically associated with a content browser/media player, and the user wallet, which stores user preferences and manages a user profile. The user profile is typically adaptively defined based on usage, along with demographic characteristics. In order to preserve privacy, the user profile may be used by third parties, or the advertiser campaign definition may be used by the user interface, in a homomorphic or fully homomorphic encryption (FHE) system, which permits testing of the profile for certain characteristics, without release of the profile itself in unencrypted form. This FHE system can be implemented in the media player if the encrypted campaign profile is distributed to the users, in a distributed virtual machine, or at a sponsor platform if the encrypted user profile is conveyed to the sponsor. A typical advertisement will target users based on a set of criteria, and a valuation of the sponsorship may depend on the user, the targeted advertisement, the sponsored content, and competitive pressures. The targeting of a user by data is similar to a content addressable memory (CAM). en.wikipedia.org/wiki/Content-addressable_memory. The user interface may perform a combinatorial optimization to optimize various metrics, for example, system revenues, network operator revenues, user revenues, user satisfaction/satiation, etc. To the extent that user revenues are optimized (maximized), and to the extent that the subsidies exceed the payments to others, the user’s wallet token balance will increase. The user may also permit a deficit, if the acceptable advertisements do not fully pay for the content consumed. A user interface screen permits the user to adjust parameters of the compensation scheme. In the social network, users form social relationships, which are stored in a metadata profile by the sponsor, content player, central server (e.g., the proprietor platform), and/or within a blockchain or distributed database. The social relationships are used in a recommender or collaborative filter, to present proposals to the user for various types of content, information, or messages, and accepting explicit or implicit feedback from the user to update the user preference profile and social relationship profile. As mentioned, the distributed database may be distinct from a cryptocurrency blockchain. On the other hand, some information may reside on the blockchain. For example, public portions or encrypted private portions of a user profile may reside on blockchain. Ad targeting Muriqi-201PCT - 80 - information, or a hash of such information, for a user (distinct from a user profile) may also be on-blockchain. According to a typical blockchain, data is immutable. However, user profiles and targeting information may change over time. Therefore, rather than including the user profile or targeting information within the blockchain, an reference to a file repository may be provided, wherein the file repository may be updated in an authenticated manner or marked as invalid/superseded. The advantage of an integration of blockchain and various profiles is that they may be used in conjunction, and therefore the distributed ledger transaction authorization process may be consolidated, with a single set of transactions employed instead of a plurality of distinct transactions. When one user promotes content to another user, and the user the promoting user is preferably compensated for its referral. While for regular users, the referral fees are likely small, but for so-called influencers, the fees may be significant. The incentive for influencers is to reliably promote content which is preferred by users, since users who dislike content from an influencer will demote them on their ranking, and users who like content promoted by an influencer will consume more of the promoted content. Where multiple referrers promote content to a user, an algorithm may be used to distribute the share, i.e., first to promote only, pro rata share, weighting based on relationship to user, etc. When the user interacts with the media player/browser social network interface, he or she logs in, and a biometric monitoring process is initiated, to ensure that content, especially advertisements, are actually viewed by the user. If the advertisement is not perceived by the user, the subsidy fails. If a user is not present for premium content, the smart contract may include a rule that reduces or eliminates payment. The user interface includes, among other social network functions, a ranked or prioritized list of content to be selected by the user. The interface may include other elements, such as static ads, and unranked content, along with icons, chat features, wallet management, etc. The ranked list is derived from available content and metadata associated with the content, which is then processed along with a user preference profile and user demographic profile to determine a ranking, which may result from a biased weighting according to a subjective distance function or clustering process. The ranking is adaptive to user action, predicted mood, diurnal variations, group settings (multiple concurrent viewers); available content and sponsorship opportunities, and social trends. The user interaction typically includes a selection of particular content to view. The metadata for the content specifies the transaction value for viewing of the content, which may be fixed or variable. The client software receives a user control parameter that determines acceptability of advertising, amount of advertising, etc. A mini-automated auction occurs between competing advertisers with acceptable advertisements, for sponsored content acceptable to the advertisers, and the advertisement is delivered to the user. Upon delivery, or upon play/verified viewing, a blockchain transaction is consummated and payment made to the user’s wallet or to an intermediate wallet or maintained in escrow within a smart contract. The premium content playback triggers another transaction, which draws from the user’s wallet or the escrow. In each transaction, a portion, e.g., 25%, is provided to the proprietor. A further portion is allocated to the referrer. In the typical case, the advertising subsidy balances the premium content cost plus shares for proprietor and referrer. Another option is a subscription, in which the content provider, or an aggregator that licenses from content providers, charge a fee for a term of service. In that case, the aggregator or content provider charges a fee before or after the term, to either the user wallet or advertising syndicator. The subscription model works with referrals also, with the referral fee paid from gross transaction value proceeds. In order to preserve privacy, communications throughout the system may be encrypted end-to-end, preferably with two-layer security with a TLS style transport layer encryption and an application layer encryption. The security may also be performed using transcription (untrusted intermediary). Kerberos-style authentication and key exchange may be employed. en.wikipedia.org/wiki/Kerberos_(protocol) Muriqi-201PCT - 81 - The system allows various degrees of external control, e.g., censorship, from none at all (e.g., prohibition of limitations) to strict control. This may be implemented by way of a mask or rule set which is implemented in parallel or within the DRM platform. Content filtering may also implemented using AI, such as an LLM, to classify the themes of the message or content, and limit all or a portion of the message or content from reaching the user. The AI may be use to amplify or suppress selected topics, and reformulate communications (exploiting the transformer component of the GPT). As a censor, GPT may provide a flexible and nuanced guardian for a user, and is especially useful in the context of fiction and entertainment. Hallucination propensity of transformer architecture makes application to non-fiction and news problematic. Note that typically, the DRM platform operates after accessing the protected content, while censorship is best applied before links to the content are provided, i.e., within the recommender or display formatter. For example, while freedom from censorship and anonymizing virtual private network communications are features desired by some users, others prefer or require a walled garden with curated content and centrally controlled interactions. For example, where the system and method is deployed in a business environment, and especially a regulated business, all communications may be authenticated and logged, content filtered for malicious content, secret exfiltration attempts, user time-wasting, phishing attempts, etc. The business may prefer to avoid all third party advertising, and simply pay (self-subsidize) network usage. Another example are religious or social groups that wish to implement a biased system toward their own beliefs or norms, and to exclude, tag, or diminish opposing beliefs. While as a general feature for all users, such control is undesired, a user or group of users may voluntarily accept external limitations. A still further example are persons or groups for which the embedded payment scheme is unacceptable. For example, business employees should normally not be paid by third parties for work supposedly on behalf of the employer. Likewise, some persons may wish to remain anonymous on the network, and regulations in the US for users which accept payment transactions require compliance with know-your-customer regulations. Therefore, a user may simply wish to opt-out of accepting payments, and therefore heightened authentication requirements. The user interface software is preferably modular, with a rich API, that allows extensions of the functionality and customization of both functionality and aesthetics. The modules are preferably cryptographically signed and authenticated with a closed and secure supervisor, which acts as a hypervisor that executes a virtual machine and associated operating system isolated from other processes executing on the same platform. This helps avoid malicious additions and helps protect the system from other malicious processes, especially those modules that directly or indirectly influence the distributed ledger transactions. The supervisor, in turn, may be authenticated by a trusted platform module. The system architecture may provide a hypervisor executing on a host platform, which in turn executes an operating system such as Linux or Android, which in turn provide security features and execute modules or apps. The memory access, interrupts, and I/O requests all pass through the hypervisor. In an exemplary embodiment, the user interface has a number of elements: Views: display will show the number of views for the content. Likes: This will display the number of likes. This will also be a button that will be clickable. Use of the like button may be associated with a cost or fee, to incentivize a genuine like, and disincentivize fraudulent manipulation of ratings. This also allows the content creator that has uploaded the original content to gain rewards from likes, in addition to referrals to new viewers. The cost of “likes” and corresponding “dislikes” if supported may be at the marginal cost according to an economic analysis, above or below. At the marginal cost, the user has no economic incentive to shade or bias the review. With a cost above or below the marginal cost, there may economic incentives distinct from the truthfulness of the label. Likes and dislikes may carry different costs. A user may also be economically incentivized to review content. In order to avoid spurious reviews, the user may have an associated Muriqi-201PCT - 82 - reputation that has an economic value dependent on the reliability of reviews and applied labels. If the user maintains a good reputation, the reviews are more valuable, and the reputation score increases. A user with a poor reputation may receive no incentive, or may be charged to present its opinion. The reliability of the review, and therefore the reputation may be assessed after the review is published, by other users, or by an automated process. A penalty may be imposed on misreporting users by reducing the reputation, and/or forfeiting the economic incentive previously provided. A user with a poor prior reputation, but who is later determined to be reliable may receive a retroactive incentive. The reliability of a review may be subjective, and therefore the issue of a subjective classification by a user is not whether the review or classification is validated by all other users, but rather whether there are a substantial class of users for whom the label is predictive of later outcome. Unlike: This will show how many users have not liked or have actively disliked the content. Note that this may be a consolidated score, the disliked and not liked may be separately provided. Share: This will allow the users of the platform to share any content and earn a split or commission. The users that shares the content is able to earn rewards from likes/shares/comments/views. There may be a cost or fee associated with using the share button. Note that the shared content may lead to later revenues for the sharing user based on referral commissions. Profile: This button takes the user to their personal account profile for editing and viewing including biography, description, profile picture, and other editable features. Duration: This shows the duration of the content if applicable. Comment: This button allows the users to comment on content and reply. Use of this button incurs a cost or fee. Comment will have a like/unlike/share buttons to allow the uploader to earn rewards. Ads may be placed on the comment pages. This allows rewards to be earned from viral comments. Figure 1 shows the home screen. A content frame provides users with the selected feed, such as short clips, full length content, ads, images, text, comments and replies (blog), etc. Filters are available, both explicit and intelligent. The feed/search pane allows user to select desired content feeds, but name or label, style, social relationships, recommender, social recommendations, etc. Figure 2 shows the profile screen. On this screen user may edit and manage access to their user profile, including image, text, affinity groups, biography, demographics, and curriculum vitae, etc. The user profile generally represents an explicit basis for targeting of content and ads, and may include the ability to test sensitivity of system at large to changes in the profile. The user may therefore tweak explicit profile settings to favor desirable content and disfavor undesirable content. In some cases, the profile is authenticated. For example, the profile may indicate that the user is a qualified investor under SEC rules, and the data that backs this determination may be authenticated to ensure regulatory compliance. In the more general sense, an originator of communications may designate communications (and the economic streams associated with the communications) to be limited to authenticated recipients. Authentication may derive from objective data sources, such as government demographic databases, third party authentication, and internal system authentication. Figure 3 shows the analytics home page that permits a user to understand usage of the services. In this case, the user may conduct various investigations, some of which are free, and others which incur usage fees. For example, active searches of other users’ profiles may be discouraged by a fee, and also provide a revenue stream for users whose profiles or other activity are accessed or used. The analytics home page also provides access to implicit user profiles, which are typically statistical in nature, such as metrics, statistical distributions, clustering with other users, e.g., for implementing a collaborative filter, etc. The analytics page may also inform the user regarding personal or population Muriqi-201PCT - 83 - trends, revenue opportunities within the network, and overcompetitive opportunities which may have reduced revenues due to competitive forces. This may help maintain diversity within the network, and reduce duplication and emulation of prior trends, making use of the network services more interesting. Hardware Overview Figure 1 (see US 7,702,660, issued to Chan, expressly incorporated herein by reference), shows a block diagram that illustrates a computer system 400 upon which an embodiment may be implemented. Computer system 400 includes a bus 402 or other communication mechanism for communicating information, and a processor 404 coupled with bus 402 for processing information. Computer system 400 also include a main memory 406, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 402 for storing information and instructions to be executed by processor 404. Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 404. Computer system 400 further may also include a read only memory (ROM) 408 or other static storage device coupled to bus 402 for storing static information and instructions for processor 404. A storage device 410, such as a magnetic disk or optical disk, is provided and coupled to bus 402 for storing information and instructions. Computer system 400 may be coupled via bus 402 to a display 412, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 414, including alphanumeric and other keys, is coupled to bus 402 for communicating information and command selections to processor 404. Another type of user input device is cursor control 416, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 404 and for controlling cursor movement on display 412. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. According to one embodiment, those techniques are performed by computer system 400 in response to processor 404 executing one or more sequences of one or more instructions contained in main memory 406. Such instructions may be read into main memory 406 from another machine-readable medium, such as storage device 410. Execution of the sequences of instructions contained in main memory 406 causes processor 404 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions. Thus, embodiments are not limited to any specific combination of hardware circuitry and software. The term "machine-readable medium" as used herein refers to any medium that participates in providing data that causes a machine to operation in a specific fashion. In an embodiment implemented using computer system 400, various machine-readable media are involved, for example, in providing instructions to processor 404 for execution. Such a medium may take many forms, including but not limited to, non- volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 410. Volatile media includes dynamic memory, such as main memory 406. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 402. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine. Non-transitory information is stored as instructions or control information. Common forms of machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from Muriqi-201PCT - 84 - which a computer can read. Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 404 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 400 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 402. Bus 402 carries the data to main memory 406, from which processor 404 retrieves and executes the instructions. The instructions received by main memory 406 may optionally be stored on storage device 410 either before or after execution by processor 404. Computer system 400 also includes a communication interface 418 coupled to bus 402. Communication interface 418 provides a two- way data communication coupling to a network link 420 that is connected to a local network 422. For example, communication interface 418 may be an Integrated Services Digital Network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information. Network link 420 typically provides data communication through one or more networks to other data devices. For example, network link 420 may provide a connection through local network 422 to a host computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426. ISP 426 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the "Internet" 428. Local network 422 and Internet 428 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 420 and through communication interface 418, which carry the digital data to and from computer system 400, are exemplary forms of carrier waves transporting the information. Computer system 400 can send messages and receive data, including program code, through the network(s), network link 420 and communication interface 418. In the Internet example, a server 430 might transmit a requested code for an application program through Internet 428, ISP 426, local network 422 and communication interface 418. The received code may be executed by processor 404 as it is received, and/or stored in storage device 410, or other non-volatile storage for later execution. In this description, several preferred embodiments were discussed. Persons skilled in the art will, undoubtedly, have other ideas as to how the systems and methods described herein may be used. It is understood that this broad invention is not limited to the embodiments discussed herein. Rather, the invention is limited only by the following claims. The system may be implemented by a hardware component, a software component and/or a combination of a hardware component and a software component. For example, the device and components described in the embodiments may be implemented using one or more general-purpose computers or special-purpose computers, like a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable gate array (FPGA), a programmable logic unit (PLU), a microprocessor or any other device capable of executing or responding to an instruction. The processor may perform an operating system (OS) and one or more software applications executed on the OS. See, 11636475; 20230066272; 20230069223; 20210176202; 20210042854; 20200342546; 20200294135; 20200151270; 20200074566; 20190019208; 20180225693; 20160321676. Muriqi-201PCT - 85 - Furthermore, the processor may access, store, manipulate, process and generate data in response to the execution of software. For convenience of understanding, one processing device has been illustrated as being used, but a person having ordinary skill in the art may understand that the processor may include a plurality of processing elements and/or a plurality of types of processing elements. For example, the processor may include a plurality of processors or a single processor and a single controller. Furthermore, a different processing configuration, such as a parallel processor, is also possible. Software may include a computer program, code, an instruction or a combination of one or more of them and may configure a processor so that it operates as desired or may instruct the processor independently or collectively. The software and/or data may be embodied in a machine, component, physical device, virtual equipment or computer storage medium or device of any type in order to be interpreted by the processor or to provide an instruction or data to the processor. The software may be distributed to computer systems connected over a network and may be stored or executed in a distributed manner. The software and data may be stored in one or more computer-readable recording media. The method according to the embodiments may be implemented in the form of a program instruction executable by various computer means and stored in a computer-readable recording medium. In this case, the medium may continue to store a program executable by a computer or may temporarily store the program for execution or download. Furthermore, the medium may be various recording means or storage means of a form in which one or a plurality of pieces of hardware has been combined. The medium is not limited to a medium directly connected to a computer system, but may be one distributed over a network. An example of the medium may be one configured to store program instructions, including magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as CD-ROM and a DVD, magneto-optical media such as a floptical disk, ROM, RAM, and flash memory. Furthermore, other examples of the medium may include an app store in which apps are distributed, a site in which other various pieces of software are supplied or distributed, and recording media and/or store media managed in a server. The invention may be used as a method, system or apparatus, as programming codes for performing the stated functions and their equivalents on programmable machines, and the like. The aspects of the invention are intended to be separable, and may be implemented in combination, subcombination, and with various permutations of embodiments. Therefore, the various disclosure herein, including that which is represented by acknowledged prior art, may be combined, subcombined and permuted in accordance with the teachings hereof, without departing from the spirit and scope of the invention. As described above, although the embodiments have been described in connection with the limited embodiments and drawings, those skilled in the art may modify and change the embodiments in various ways from the description. For example, proper results may be achieved although the above descriptions are performed in order different from that of the described method and/or the aforementioned elements, such as the system, configuration, device, and circuit, are coupled or combined in a form different from that of the described method or replaced or substituted with other elements or equivalents. Other embodiments will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with a true scope of the invention being indicated by the following claims. What is claimed is: