The background description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventors, to the extent it is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
Relationships are key to one's professional and personal ability to thrive. However, relationships of all types are not easy to discover, vet, and maintain. An individual's critical needs, wants, and opportunities often remain hidden from other individuals/entities who might be eager to engage but lack the openings to transact. As a result, our personal lives, and by extension, our very civilization, operates below their potential to fully thrive.
Normal relationship vetting and testing unfolds one relationship intention at a time. A relationship intention or relationship intent is the broad goal of a relationship. For example, in the context of a romantic relationship, the relationship intent may be a casual relationship or serious relationship. Once a relationship intention between two people is tested—and fails—often more sustainable relationships suffer. (e.g. testing romance at work, testing spirituality with friends, testing politics with family). To be safe, in general, people simply do not test new relationship types often, if at all. As there is no way to safely and quickly test the sustainability/alignment of the many unknown possible relationship intentions at once
Moreover, in current online and application-based social connection platforms, problems stem from users' inability to maintain control and ownership over their own data. Centralized databases of user data are frequently subject to cyber-attacks. User data is commonly sold and shared without the users' knowledge or express consent as to where that data is going or how it may be used. This can lead to more vulnerabilities and opportunities for fraud.
The lack of data security and privacy has an additional quieting effect: Physiological safety is diminished when users do not trust who is viewing their personal data. When users do not feel 100% safe and secure in how their data is captured and shared, the honesty and integrity of their data weakens. Weak and obscure data from users makes digital discovery and alignment or compatibility testing between users, at best, less accurate and more inefficient—and at worst, impossible.
Great inefficiencies exist in the “social marketplaces” where humans live, work, and play. Commodity and stock markets have clear buyers and sellers transacting their needs and wants on secure, stable, and regulated platforms. However, our “social marketplaces” (churches, workplaces, schools, neighborhoods) have no efficient, clear, honest, and safe platforms for the exchange of social needs beyond tradition, habit/bias, and organic happenstance.
A need exists for a safe and secure platform for users to explore relationship intentions and discover alignments.
The following presents a simplified summary of one or more embodiments of the present disclosure in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodiments, nor delineate the scope of any or all embodiments.
The present disclosure, in one or more embodiments, relates to a method for social discovery. The method may include providing a platform on which a user can develop a profile. Developing the profile may comprise creating one or more personas, establishing a relationship intent within each persona, and developing expectations within the relationship intent. The method further includes identifying where a first user and a second user have a matching relationship intent within a matching persona, pairing the first user and the second user upon approval for a connection by both the first user and the second user, identifying where the first user and the second user have aligned expectations within the matching relationship intent, and sharing the aligned expectations with the first user and the second user.
The present disclosure, in one or more embodiments, additionally relates to a system for self and social discovery. The system comprising a self-discovery module for facilitating self-discovery and a social discovery module for facilitating social discovery. The self-discovery module may include a persona manager and an intent manager. The self-discovery module facilitates creating one or more personas, establishing a relationship intent within each persona, and developing expectations within the relationship intent. The social discovery module may include an insight engine, a matching engine, and a connection manager. The social discovery module facilitate identifying where a first user and a second user have a matching relationship intent within a matching persona, pairing the first user and the second user upon approval for a connection by both the first user and the second user, identifying where the first user and the second user have aligned expectations within the matching relationship intent, and sharing the aligned expectations with the first user and the second user.
The present disclosure, in one or more embodiments, further relates to a computer-readable storage medium containing program instructions for a method for self and social discovery, wherein execution of the program instructions by one or more processors of a computer system causes the one or more processors to perform a plurality of steps. This includes developing the profile, wherein developing the profile comprises creating one or more personas, establishing a relationship intent within each persona, and developing expectations within the relationship intent. This further includes identifying where a first user and a second user have a matching relationship intent within a persona, pairing the first user and the second user upon approval for a connection by both the first user and the second user, identifying where the first user and the second user have aligned expectations within the matching relationship intent, and sharing the aligned expectations with the first user and the second user.
While multiple embodiments are disclosed, still other embodiments of the present disclosure will become apparent to those skilled in the art from the following detailed description, which shows and describes illustrative embodiments of the invention. As will be realized, the various embodiments of the present disclosure are capable of modifications in various obvious aspects, all without departing from the spirit and scope of the present disclosure. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not restrictive.
While the specification concludes with claims particularly pointing out and distinctly claiming the subject matter that is regarded as forming the various embodiments of the present disclosure, it is believed that the invention will be better understood from the following description taken in conjunction with the accompanying Figures, in which:
The present disclosure relates to novel and advantageous tools for self-discovery and social discovery. In particular, the present disclosure relates to systems and methods for building a virtual representation and analysis of a user's whole self. Additionally, the present disclosure relates to novel and advantageous tools for social discovery for connecting with other users and, specifically, systems and methods for privately testing mutual relationship possibilities and alignments. In some embodiments, the present disclosure relates to systems and methods for seeking and building a social network of other users in a secure environment in which each user maintains ownership of his or her own user data. The systems and methods disclosed herein may be incorporated in an app, referred to herein as a Discovery App.
The Discovery App is designed to help people learn about themselves, connect intentionally, and build deeper relationships with others. People are complex. Using the Persona feature of the Discovery App, users can choose the aspects of themselves that they wish to explore and share. The Discovery App facilitates Self-Discovery, wherein a user may learn about their own personality—their friendship style, their learning preferences, their romantic tendencies—by taking in-depth self-assessments. The Discovery App further facilitates Social Discovery, wherein the user can share their results with others users to connect on commonalities.
The present disclosure includes, in some embodiments, at least first and second phases. The first phase may be referred to as Self-Discovery and the second phase may be referred to as Alignment and Social Discovery. In the first phase, a user may access tools for determining a virtual representation of the user's whole self. That is, a user may use tools for gathering data representative of the user's personality, likes, dislikes, habits, hobbies, preferences, personal and professional relationship goals, intentions, and expectations. In a second phase, a user may access tools for reaching and connecting with other users. For example, the user may allow portions of her or his data to become discoverable to other users. Tools in the second phase may additionally allow users to create secure and verified relationships and networks with other users. The phases may operate consecutively in some embodiments, such that a user may complete the first phase before moving to the second phase. In other embodiments, however, the phases may operate in tandem, or a user may have the option to selectively use either or both phases at any time. Each phase is described in more detail below.
The present disclosure refers to a user's whole self and a user's meta-personas. When presenting oneself to others, people tactically/strategically highlight or submerge relevant traits of their whole self according to the perceptions of the present relationship. The typical way a person presents oneself is a meta-personal approach. That is, a person typically presents different facets of their persona—different personas and intents—based on the other person with whom they are engaging.
Users may use the Discovery App to define and leverage their meta-personas. The Discovery App enables two users to quickly define and safely compare compatibility over a multitude of possible relationships, in parallel if desired. Traditionally, a person may test another person for only one possible relationship type at a time—e.g. Short-term Romance, Best Friends, Casual Chit-Chat, or Study Buddy. Using the Discovery App, a user can review another user's compatibility over a multitude of possible relationship types quickly, safely, and securely. These possible relationship types are referred to herein as Relationship Intents, and help define the broad goals of how two people approach a relationship. In some embodiments, the Discovery App reveals to users only where they align with another user. This provides a starting point for meaningful conversation and connection.
In some embodiments, the system and tools disclosed herein may ensure user ownership of the data. This may be done by using a Self Sovereign Identity (SSI) platform, discussed more fully below. It is to be appreciated that self-discovery, alignment, and social discovery may alternatively done on more traditional platforms.
Lastly, discussion will be made of a user experience through Self-Discovery, Alignment, and Social Discovery using the Discovery App.
Self-Discovery
In a first phase, which may be referred to as a self-discovery phase, tools may be presented to a user for developing a virtual representation of the user's whole self. The user's whole self comprises the deep, holistic, and private values, traits, beliefs, thoughts, expectations, dreams, and experiences that live within an individual's mind. The user's whole self may include indications regarding the user's personality traits, preferences, habits, likes, dislikes, hobbies, goals, and/or other data relating to the user's personas.
The user's whole self may be thought of as the evolving sum of all traits of a user's life in the real world the user's whole self may include a variety of different personas, each persona including identity characteristics within a general context of the user's whole self. For example, a user's whole self may include a Friendship Persona, a Romance Persona, an Academia Persona, and an Industry Persona, as well as many others. Some personas may relate to, or depend from, other personas. In the Discovery app, core profile traits or information may be associated with multiple personas, for example a user's home postal code and birthday may be associated with all of a user's personas.
In general, a user's self-discovery may include discovering tens, hundreds, or even thousands of different personas. In some embodiments, a user may select different personas to define or complete, or decline to complete, as part of the defining the user's whole self. For example, a user may elect to provide data representative of the user's core and industry personas, but may elect not to provide data representative of a friendship persona. In some embodiments, personas may be created automatically based upon data provided by the user.
Systems and methods for secure self and social discovery as disclosed herein may utilize a hierarchy of developing the self to facilitate alignment with others:
Summary Insights may be developed from traits uncovered in self-discovery. For example, Summary Insights may be developed based on Interest Dimensions. Interest Dimensions may have high-level Summary Insights that general compare the overlap of two paired users' dimension traits. Additionally or alternatively, Summary Insight may display information that is good to know but does not overlap with a paired user.
In one example, a user may have both a Romance Persona and an Industry Persona. The Romance Persona may include details, traits, preferences, and other data related to the user's desire in seeking a romantic partner. The user's Romance Persona may include both a Something Long-Term relationship intent and a Something Casual relationship intent, each of which may depend from and thus draw characteristics from the romance persona. However, each of the Something Long-Term relationship intent and the Something Casual relationship intent may have different traits, preferences, or other data contained therein, reflecting the user's different preferences in seeking a long-term romantic partner and in seeking a casual romantic partner.
In addition to the Romance Persona, the user may have an Industry Persona, which may include data different than what is contained in the Romance Persona. The Industry Persona may include, for example, an Entrepreneur relationship intent, Career relationship intent, and Mentor relationship intent (not shown in
Accordingly, personas may relate to other personas by dimensions. For example, as shown for example in
The exploration aspect may be based on the ability to develop personas and relationship intents to identify alignments. As discussed, under each Relationship Intent 112 a plurality of Must Have Expectations 134, Nice to Have Expectations 136, and Good to Know traits 138 may be developed. Questions or aspects associated with Must Have Expectations and Nice to Have Expectations may be the same or may be different. The user may categorize a specific aspect a Must Have or as a Nice to Have. Good to Know traits 138 may comprise a plurality of Interest Dimensions 140. For example, Interest Dimensions may include spirituality 142, sports 144, politics 146, sexuality 148, games 150, romance 152, travel 154, music 156, or parenting 158. These Interest Dimensions 140 may be explored in any suitable Persona 104 or Relationship Intent 112 and are not generally limited to a single Persona or Relationship Intent. Some Relationship Intents 112 may not have Must Have Expectations or Nice To Have Expectations. For example, in
The Must Have Expectations, Nice to have Expectations, Good to Know traits, and Interest Dimensions are explored and developed using the systems and methods disclosed herein. One tool for collecting data representative of the user's personas may be a survey or a questionnaire. A survey may present one or more questions to the user that are configured to gather and evaluate aspects of the user's whole self. Survey questions may inquire about a user's preferences or traits using a variety of methodologies. For example, survey questions may be binary, asking the user for one of two possible responses (i.e., the user may select yes or no, or in another embodiment the user may select agree or disagree). Other survey questions may provide a continuum, asking the user to rate a level of agreement or disagreement on a scale, such as a numerical scale. Other survey questions may be polyadic, providing a user with a variety of options from which the user may choose one or more responses. For example, a polyadic survey question may ask a user to select from five answer choices, may ask the user to select “up to 3” or up to another number of the five answer choices, or may ask the user to select “all that apply” with respect to the five possible answer choices. Of course a polyadic survey question may provide any other suitable number of answer choices as well. Still other survey questions may be freeform, allowing a user to respond in the user's own words, within suitable constraints such as word limits. Other survey questions may provide a list, allowing a user to select from a list of one or more predefined statements.
Each survey, or a collection of surveys, or other list of questions, may provide insights about individual dimensions, interest dimensions, or personas of the user's whole self or about a user's relationship intents within a persona. For example, a survey may be directed at gathering data about a user's interest dimensions. With specific reference to
One example of an individual dimension is a physical activity dimension. Individual questions may relate to the user's current daily or weekly physical activity level, the user's desired activity level, types of activities the user participates in or in which the user likes to participate, and other information related to the user's physical activity. Data gathered or extracted from the user's survey responses may be used to define at least a portion of the user's fitness persona, sports persona, and friendship persona.
In some embodiments, each survey, or each survey question, may correspond with one or more axes to evaluate the user's responses. An axis may represent a continuum between two opposing positions or extremes. The axis may include values plotted between the two opposing positions. Positions along the axis between the two extremes may correspond with numerical values, for example. A user's survey responses may indicate that the user aligns with a particular position along the axis, between the two extremes. As a particular example, an axis may be a free thinking axis, and may extend between the two extremes of “stay the course” and “ride the wind.” Survey questions may be configured or tailored to determine where the user falls along the free thinking axis, between the two extremes of “stay the course” and “ride the wind.”
Axes may be grouped to define coordinate spaces. One example of such a coordinate space may be, or may be similar to, a Nolan Chart.
In some embodiments, a coordinate space may be defined by other coordinate spaces. That is, for example, a user's plot location within two coordinate spaces may be used to generate a third coordinate space. As another example, surveys and survey questions may be configured to correspond to the axes. For example, surveys and survey questions could correspond to friendliness, gregariousness, cheerfulness, assertiveness, activity level, and excitement-seeking. One coordinate space that may be defined from these axes may be an enthusiasm coordinate space, defined by the friendliness, gregariousness, and cheerfulness axes. A second coordinate space that may be defined by these axes may be an assertiveness space, defined by the assertiveness, activity level, and excitement-seeking axes. A third coordinate space may be an extraversion coordinate space, which may be defined by the enthusiasm coordinate space and the assertiveness coordinate space. To create the extraversion space, the user's data associated with the assertiveness and enthusiasm spaces may be projected onto a one-dimensional axis, for example.
Turning now to
In some embodiments, a survey module may be provided as part of the Discovery App and may be responsible for formulating and/or presenting surveys and/or other self-discovery tools to a user. The survey module may include software and/or hardware for formulating and/or presenting surveys to users. In general, the survey module may pull surveys and survey questions from a survey database. The survey module may select or formulate surveys to present to a particular user based on the user's preferences, based on the user's responses to previous questions, and/or based on pre-defined parameters. For example, the survey module may present a batch of surveys or questions to a user to begin developing the user's core persona and to determine basic information about the user. The survey module may additionally prompt the user to provide a photo, location information, and/or other basic or profile information. Additionally, based on the user's selection of personas to complete, the survey module may present surveys corresponding to those particular personas. Moreover, the survey module may dynamically formulate or present surveys based on the user's responses. The survey module may be configured to evaluate user responses to determine user positions along axes and/or within coordinate spaces.
The survey module may present surveys and/or other data to a user via a user interface, such that the user may interact with the surveys to provide responses through the user interface. The user interface may include, for example, software such as application software. In some embodiments, the user interface may include web-based software. The user interface may be provided to the user via a user device, such may include a smartphone, notebook computer, desktop computer, tablet computer, smart watch, and/or other electronic device.
In some embodiments, a user's data, including the user's responses to survey questions and insights, dimensions, and personas determined or developed from the survey data, may be stored as private data objects in a self-assessment library. The self-assessment library may be, or may include, a database that is selected by the user, and in some embodiments owned and/or maintained by the user. For example, the user's data may be stored locally on the user's device, or may be stored in another local or remote database that is generally owned, maintained, and/or designated by the user. In this way, each use may maintain control over her or his own data, without the need to transfer the data to a third-party for storage or processing. Additionally, user data may be stored in an encrypted form in some embodiments. In some embodiments, the survey module, or portions thereof, may be stored on the user device or otherwise in a database designed, maintained, and/or owned by the user. Through local storage of the survey module, analyses of a user's survey responses, such as to determine where a user fits along an axis, may be performed locally on the user's device. In this way, sensitive user data may be maintained under each user's control.
In some embodiments, a user's data may be stored in the self-assessment library in encrypted form. Each user's encryption keys may be used to decrypt user data. Encryption keys may be stored separately in some embodiments, but still may be owned and maintained by each user.
A content administrator, maintained remotely from the user device, may be configured for updating the survey database and/or for pushing updates to the survey module. It is to be appreciated that the user's data may be maintained entirely separately from the content administrator and the survey database in some embodiments of the first phase, such that the user may maintain control over the user's data.
A user's insights, dimensions, and persona data stored in the self-assessment library may be presented to the user via the user interface. These insights, dimensions, persona data, and other data developed from or related to the user's survey responses may help the user learn more about herself or himself. The user's data may be presented to the user as canonical insights. An example of a canonical insight may be “self-reliant” or “community-minded.” Canonical insights may be used to present user-facing revelations, such as: “You are an independent person who is always up for a challenge. You don't let the small things in life get in your way.”
In general, the more surveys a user responds to, the more complete the user's insights, dimensions, personas, and whole self will be. In some embodiments, a user may need to complete at least a minimum quantity or percentage of surveys or questions associated with an axis or coordinate space in order to obtain an insight, dimension, or persona associated with that axis or coordinate space.
In some embodiments, a user may be required to complete a minimum quantity of surveys or survey questions before moving to the social discovery phase. In some embodiments, the user may be required to complete certain types or categories of surveys or survey questions, or a minimum quantity in certain categories. Moreover, a user may have the ability to proceed to the social discovery phase with respect to one or more particular personas. In such embodiments, the user may be required to complete a particular quantity or percentage of surveys or questions with respect to the one or more personas through which the user wishes to pursue the social discovery phase. Additionally or alternatively, a user may be required to complete other initial requirements before moving to the social discovery phase.
In the second phase, which may be a social discovery phase, the user may have the option to securely share a portion of the user's data so as to connect with other users. Importantly, however, during the social discovery phase, the user may still maintain control and ownership of the user's data. In general, a user may permit access for limited and secure use of the user's data such that a matching module may match the user with compatible users based on user data. The matching module may determine matching users for different types of relationship models, such as friendships, romantic relationships, and professional networking.
Alignment and Social Discovery
Based on the presented alignments, the user can decide whether to unveil Unaligned Expectations 230. If yes, the process flow returns to the top and reveals the unaligned Must Have Expectations, Nice to Have Expectations, and Good to Know traits. If no, the user has the option of exiting the pairing 232.
If the pairing continues, the user is given the option of exploring Interest Dimensions 234. Dimension examples may include, for example, nutrition, politics, sexuality, or sports. If the user chooses not to explore Interest Dimensions, the user is given the option to exit the pairing 232. If the user choose to explore Interest Dimensions, and the paired user also chooses to explore Interest Dimensions, Summary Insights regarding a Dimension may are unveiled to the other user 236. The Summary Insight is a high-level summary that, in some embodiments, compares the overlap of the paired user's dimension traits.
Based on the Summary Insights, the user may be given the option of unveiling specific traits of a dimension 238. If both users agree to unveil specific traits of a dimension, the dimension traits will be revealed 240. If one or both users do not agree to unveil specific traits of a dimension, the process flow may return to exploring Interest Dimensions of another dimension.
When proceeding to the social discovery phase, after completing at least part of the self-discovery phase, a user may give permission to, for example, an administrator to access the user's data, including the user's survey responses, personas, insights, dimensions, and/or other user data. The user may selectively give permission with respect to data corresponding to particular personas in some embodiments. With the user's permission, the user's data may be used to facilitate discovery or connection with other users, as described below.
Once a user gives permission, or otherwise allows an administrator or other entity to access the user's data, the user's data may be sent or communicated in an encrypted format. User data may be encrypted using encryption keys, which may be stored and/or sent separately from the encrypted user data. In some embodiments, user data may be decrypted only while being acted upon, and may otherwise remain in encrypted form.
User data may be encrypted using encryption keys, which may be stored and/or sent separately from the encrypted user data. In some embodiments, user data may be decrypted only while being acted upon, and may otherwise remain in encrypted form. In one embodiment, user data may first be encrypted on the user's phone (agent), using the user's private key. A corresponding public key is provided to the recipient agent via Sovrin protocols for DPKI (decentralized public key infrastructure). In some embodiments, unencrypted user data may exist only in volatile memory and never persisted.
In some embodiments, a user may set one or more privacy levels for the user's data to which the user will allow access. Privacy levels may affect when and if the user's data becomes viewable or discoverable to others. For example, a user may wish to allow some data to be publicly viewable, allow some data to be viewable only to matched or connected users, and may wish to keep some data hidden. Such data may include particular survey responses, insights, dimensions, personas, or other information about the user.
In the social discovery phase, a user may discover, or become discoverable to, other users in a variety of ways. A discovery engine may determine when and whether users are discoverable to one another based on the users' defined privacy settings and other social discovery parameters. For example, in some embodiments, a user may have or may generate a unique QR code or other computer readable code. Other users may scan the code to access information about the user or to become connected to the user. Alternatively or additionally, geo-location discovery may allow a user to view information about nearby users. Users within a particular range or distance of one another may have the option of connecting. A referral option may additionally allow a user to suggest known users to others for potential connection. A user may generally select one or more personas to be discoverable in different ways or using different discovery modes.
Additionally, in some embodiments, a correlation engine may operate to analyze correlations among users so as to suggest potential user matches. A user may generally select different personas for correlation. For example, a user may wish to receive suggested matches with respect to a business networking persona, but may not wish to receive suggested matches with respect to a romance persona.
The correlation engine may determine matches or suggested matches based on user data, such as survey responses, insights, and dimensions, as well as user-defined parameters, filters, and expectations. For example, a user may wish to form multiple relationships within a particular persona. Each potential new relationship may be defined through relationship channel parameters, filters, and expectations. Within a particular relationship channel, a user may set expectations for the type of relationship that the user is seeking. As an example, the user may select a relationship channel with the expectation that the user is seeking a long-term romantic partner. This expectation may help the correlation engine to match the user with other users who have similar expectations. The user may additionally set filters or other parameters on the type of individual they are seeking within a relationship channel. For example, a user may select particular personality traits, characteristics, hobbies, interests, or other parameters that the user would like to find (or would like to avoid) in a potential match. Another potential parameter or filter may relate to distance or geographic location. A user wishing to make connections with individuals located nearby may designate this via a relationship channel parameter or filter. The Discovery App may be provided with a hyper-local scanning capability such that users who designate such a filter will only match with people who are nearby.
The correlation engine may use a screening step or process to apply a user's expectations, filters, and/or other parameters prior to determining correlations. The screening process may help to narrow the pool of other users with which a match may be made. In addition to screening, the correlation engine may analyze user data using one or more correlation algorithms to determine correlating data among users. In particular, the correlation engine may apply a correlation algorithm within a coordinate space to determine whether users' positions within that coordinate space correlate with one another. Based on a quantity, percentage, type, and/or strength of correlations within various coordinate spaces, the correlation engine may suggest potential user matches.
In some embodiments, a user may have the ability to soften screening parameters or filters. That is, a user may select a softness factor, which may be a percentage, with respect to one or more filters or parameters. For example, a user may select a personality trait as a parameter for desired matches. The user may select a softness factor of 100% for the parameter. Thus, only individuals who have this particular personality trait would be potential matches. However, the user may choose to lower the softness factor to, for example, 50%. With the modified softness factor, the particular personality trait may be considered merely a desirable trait of potential matches, rather than a requirement of potential matches. Softness factors may allow a user to narrow or broaden potential match pools.
A correlation algorithm may be based on one or more factors. In at least one embodiment, four factors may be used, including agreement, coherence, alignment, and archetype. An agreement factor may be calculated or determined by analyzing whether two users' survey responses contain matching or similar terms. More matching responses may result in a higher agreement factor. This may be particularly applicable with respect to freeform or list survey responses. A coherence factor may examine user positions within canonical subsections of a coordinate space. For example,
In general, each user's zone may be defined by the aggregated average (typically mean) of user's survey responses in the subject area. The distance calculation may be the linear distance between the centroid of respective zones. In some embodiments, zone shape may not be considered, and the distance may be the simple distance between each user's aggregated mean location in the subject area.
An “Insight” may occupy a specific location within the subject area, and a user's Insight within that area may be calculated by selecting the Insight with the closest linear distance to the user's aggregated mean. It is also possible to create “tie” Insights, used when the user's mean location is sufficiently similar to more than one Insight.
An alignment factor may be calculated or determined based on a cosine similarity between vectors for each use within the coordinate space. For example,
An archetype factor may be calculated or determined based on similarities in users' canonical matches. An archetype factor may involve similarity between two user's calculated Insights within a subject area. For example, if two users had the same Insight from a given subject area, the Discovery App may surmise they have compatibility, even if their aggregated mean locations were not sufficiently proximal to be considered for matching.
The agreement, coherence, alignment, and archetype factors may be combined mathematically to determine a correlation between two users. In other embodiments, alternative and/or additional factors may be used. Correlations may be used to determine particular interpersonal insights. Some examples of an interpersonal insight may be that User A and User B are both politically conservative, that they are diametrically opposed when it comes to foods they like, that they both love fly fishing and kiteboarding, that they both dislike gin drinks, or that they have complimentary yet differing tastes in music.
Once correlations are determined, the correlation engine may provide a list of suggested matches to a user. In some embodiments, interpersonal insights may additionally be presented to a user to provide a more complete picture of why particular individuals are potential matches. When two users are found to have correlating traits, each of the two users may receive an indication of their potential match. In some embodiments, two correlating users may choose to connect with one another. Each of the two users may be required to approve of or permit the connection. Once the users are connected, they may have more view access to each other's information and/or they may have the ability to contact one another.
In some embodiments, users may have levels of visibility or accessibility for potential matches and connections. For example, where the correlation engine determines that two users are potential matches, the users may agree that their mutual compatibilities—that is, traits that they have in common—may be visible to one another. Once the users are connected, both users may agree to reveal non-compatibilities. In some embodiments, both users may need to agree before incompatibilities are revealed. In some embodiments, matched or connected users may additionally agree to a third level of visibility where any otherwise hidden incompatibilities or other hidden data is revealed. In other embodiments, matched or connected users may select or agree to different levels of visibility. In some embodiments, visibility levels may be based on the users' privacy settings and/or other user defined parameters.
In some embodiments, a chat engine may allow users to communicate in real time via text, audio, and/or video. In some embodiments, users may need to be matched or connected before having the option to chat with one another. Additionally or alternatively, users may have the option to accept or deny chat requests. With messaging, users may remotely ask each other to unveil deeper levels of their profile (non-aligned traits, traits users declare a “sensitive,” or other traits). Users may ask to pair on other Intents available to each other, for example, if the hard or Must Have Expectations of those intents align. In some embodiments, if another user's Intent is unavailable to a first user, the two users may mutually opt-in to receive alerts if that Intent ever enters a mutual alignment of Must Have Expectations between those two users.
In some embodiments, a user may accumulate a reputation. For example, a user may develop a reputation within each of the user's discoverable personas. A user's reputation may be a result of trends in the user's usage or behavior, and/or feedback from other users. In some embodiments, a user may have both a canonical reputation and an interpersonal reputation.
User Experience
The system components 320 may be infrastructure or may be on an operating system, such as iOS. The systems managing the Discovery App may vary depending on the platform and specific implementation. Those shown in
The system components 320 may be thought of as existing within a self-discovery module 321 and a social discovery module 323. The self-discovery module 321 comprises the portions of the system related to developing personas and relationship types, including surveys and queries. The social discovery module 323 comprises the portions of the system related to discovery and pairing of users and comparing expectations.
d illustrate the steps of user experience of a system and method according to the current disclosure.
The forgot password process 420 may comprise requesting a reset email and using a link in the email to go to a landing page prompting password reset.
b relate generally to self-discovery within the Discovery App, in accordance with one embodiment.
After selecting a persona, the user can manage the personas 470 by toggling personas on and off 472 or by clearing persona data 474. The persona and relationship expectations and intents within a persona are developed by the user, as described herein. When developed, the user may put the persona in “discovery mode” to enable social discovery.
As an initial step, the user selects the persona 512 for which they are establishing a relationship type. Within each persona, there may be intents. The intents establish the basic goals of the relationship intent/type. The user activates the intent correlating with the goal of the selected relationship intent/type of the persona 514. The user establishes Must Have Expectations 516, also referred to as deal-breakers. The user is alerted when deal-makers are unlocked and the user completes the deal-makers 518. After deal-breakers and deal-makers are completed, the user is alerted that a discovery is unlocked 520.
In parallel with the input of deal-breakers and deal-makers, the user may choose to answer one-off questions 522 associated with the intent. The answers to these questions may influence the relationship type intent. Based on the deal-breakers, deal-makers, and one-off questions, Intent Details may be displayed to the user 524.
The user may set Must Have Expectations, or hard expectations, for the relationship type, or for the intent within the relationship type. The Must Have Expectations may generally correlate with the deal-breakers. Must Have Expectations are concepts nested within each intent. It is a limited set of queries that ask users to define “hard stop traits” that start or stop a relationship intention. For example, Must Have Expectations for a Longterm Romantic Relationship Intent may relate to sexual orientation, age, or power dynamics. Must Have Expectations for an Academic Tutor Relationship Intent may relate to availability, subject matter, or in person vs. remote. In some embodiments, users may not be able to pair on an intent if their Must Have Expectations do not align.
The user may further set Nice to Have Expectations, or soft expectations, for the relationship type, or for the intent within the relationship type. The Nice to Have Expectations may correlate with the deal-breakers and the deal-makers. Nice to Have Expectations are expectations that follow Must Have Expectations within an intent but help define boundaries of a relationship intention. Nice to Have Expectations are important traits but ones that are less critical and not automatic deal-breakers. For example, possible Nice to Have Expectations for Short-term Romantic Relationship Intent may include: “Can you drive?” and “Do you smoke?” Possible soft expectations for Friendship Pals Relationship Intent may include: “What sports do you like?” and “What music do you like?”
In addition, information from the surveys and queries of
Social discovery and alignment using the Discovery App culminates in Profile Unveiling to a connected or paired user. Paired users generally experience each other's profiles along a careful progression, and not all at once. In one embodiment, two paired users see aligned Must Have Expectations and Nice to Have Expectations, within a single Intent at a time, on a temporary basis, as is described more fully below (Profile Level I). Either user may seek approval (within an Intent) to view non-aligned expectations (Profile Level II). Eventually, when users trust one another, they have the opportunity to ask/approve viewing within an Intent, any non-aligned traits pre-defined by either user as secret (Profile Level III). Secret traits would have been shown earlier in Profile Level I if they were aligned. Either user may unilaterally rollback profile level depth, or unpair from a relationship Intent altogether, without removing the overall connection between the two users.
In general:
In other embodiments, users may have not met in person before engaging in social discovery. The Discovery App may alert the user of potential matches based on a match on at least one relationship type defined by mutual alignments of Must Have Expectations for the relationship intent Each of a user's Relationship Intents can be independently discoverable to other users, via any suitable device discovery method. Users may independently activate or inactivate a Relationship Intent on multiple discovery methods at once.
Further, a relationship discovery may be based on another user's patterns that align with the user's patterns. For example, an alert may be generated if another user frequents the same establishment as the user. Users may also receive an alert after opting-into “relationship intent tracking,” where two users are nudged together when a user's Relationship Intent newly activates or evolves into alignment, when previously unavailable. In some embodiments, users may manually pair on a Relationship Intent regardless of Must Have Expectation alignment. This allows the users to see where they disconnect in that relationship intent.
Users may connect on one persona at a time. To connect on multiple personas, the users initiate the process of approving each persona. In initial connection screens of the Discovery App, users see the personas for which they have discovery mode, or pairing mode, activated. A list of to the user of other users who have pairing mode activated, who have connected with the user on at least one relationship intent and Must Have Expectation for that persona and relationship intent. These are the only personas that can be matched on. The user can select one of the other users for potential pairing and send an invitation to the other user. If the other user accepts the invitation, the connected users proceed to expectation viewing.
Expectation staging 550 is done before expectation viewing and comparison. Expectation staging 550 may comprise viewing a list of personas and relationship types/intents 552 toggling on or off the relationship types/intents 554. The user then may select to have the information be seen 556 and can view authorized information from the paired user 558.
Process flow 560 sets forth viewing of expectations 568. If there are matching relationship intents, a user is given a list of aligned personas 570 and an indication of matching intents within the persona 572. A connection may be made based on the matching intents within the persona. If a connection is made, the user is shown aligned Must Have Expectations and Nice to Have Expectations 574.
Users may choose to unveil deeper levels of a Relationship Intent by mutually approving to view non-aligned expectations traits within the Relationship Intent. Additionally, users may mutually approve to view previously defined secret traits within a Relationship Intent. At any time, either user paired within a Relationship Intent may unilaterally disconnect from the relationship or roll back a level. Two users may pair along many Relationship Intents. Disconnecting from one Relationship Intent does not disconnect from all Relationship Intents shared with that user unless specifically requested by the disconnecting user.
When two users compare their expectations within a Relationship Intent, a thoughtful social Alignment defines the “compatibility” of traits. Often, a similarity between two expectation traits suggests compatibility. Some compatibilities may demand a strict match. Other compatibilities allow for a soft match. Other compatibilities may be based on a connection between opposites (for example, who pays on the first date). It is to be appreciated that compatibility and alignment of traits, expectations, and relationship intents is never a guarantee that: a) traits are 100% honestly defined by each user, b) that these user traits (even if 100% honest) will not change in the future, c) that an aligned Relationship Intent is actually sustainable in the real world outside of the Discovery App, or d) that the Discovery App knows or includes everything that makes a relationship aligned or compatible.
Before individual expectations may be viewed and compared, the user may stage which of their Relationship Intents are available for viewing in a pairing session for a specific other user. To preserve privacy, the staging concept is introduced to enable a user to set what information to share. Each user views their list of Personas and Relationship Intents. They can toggle the Persona and Relationship Intents on or off and can set what information can be seen. The user may be prompted for whether they are ready for the connection to be established.
Once a connection between users is established, the expectations may be viewed. An initial query in seeking a connection is whether there are matching relationship intents. If there is not at least one matching relationship intent, the users are alerted of poor alignment. If there is at least one matching relationship intent, the user is presented with a list of Connections Personas—personas with matching relationship intents. The user selects a persona and views a list of relationship intents within the persona. The user can select a relationship intent and send an invitation to connect, as discussed with respect to
Once users have completed expectation viewing, the in-person peer-to-peer discovery process is ended. Users can decide to connect on other personas if they have a connection, or disconnect from the current connection to explore other users to pair with.
In some embodiments, users may mutually choose to save their temporary pairing as a connection, and mutually approve which Relationship Intents to continue connection with outside of the temporary P2P discovery session. Secure communication lines and other advanced profile interactions (and discovery methods) may be possible along each relationship intent held between the two users. Either user may unilaterally disconnect from a Relationship Intent without affecting other Relationship Intent connections shared with that same user.
User Ownership of Data
Discussion now will be made of user ownership and control of the data. This may be achieved, for example, using a Self Sovereign Identity (SSI) platform. It is to be appreciated that in alternative embodiments, the tools for building a virtual representation and or alignment and social discovery may be done on other platforms where user ownership and control of data is not provided.
A central construct to the SSI platform is using unique identifiers for each person with whom a user interacts. In prior technology, all contacts may know a person by the same identifier. For example, by the same phone number. Using SSI, each contact knows the person by a unique identifier. This identifier is a decentralized identifier (DID).
In some embodiments, a unique decentralized identifiers (DID) may be assigned to each user relationship. A DID may include a numerical or alpha-numerical identifier. DIDs may be generated, in part, using a hash function, and may be added to a blockchain ledger. For example, the DID may comprise:
Each relationship or connection between users may be associated with a unique DID. Each DID may be a two-party lifetime encrypted communication channel that does not rely on a third party.
In general, DIDs establish secure and private connectivity between two parties. Every relationship uses a different encryption key as well as a different DID. These may be created automatically when a user adds a new contact. The user owns their own keys. DIDs are trustworthy because of what the person/organization/thing on the other side can prove about themselves. Using a DID, a user is not just able to prove their identity but also to exchange verifiable digital credentials.
User private information may not be stored on the Discovery App. Users may use keys that only they control to prove ownership over their devices, their data, and their relationships. Identity owners can prove ownership over ownership over Credentials and DIDs with their keys, such as a verkey and a private key. Users can use these same keys to login to the Discovery App without username or password. Identity owners can use their DID with the Discovery App to login by proving ownership of keys. The verkey can be attached to a biometric such as fingerprints. Further, users' friends and family can recover an account when keys are lost or stolen. Social key recovery relies on trustee recovery policy when is managed by the User.
It is to be appreciated that with respect to systems and methods described in the present disclosure, each user may own and maintain control over the user's data. This includes maintaining control over sensitive information and user-created data. With users storing and authenticating their own data, a risk of data breaches may be significantly reduced, as compared with systems and methods in which users do not own their own data or where user data is maintained in a central database. Moreover, empowering users with data autonomy may greatly reduce the users' digital footprints. By allowing users to interact using non-correlatable DIDs, the users may interact online without frequently sharing their personal names, contact information, and/or other personal information. Additionally, user-controlled data allows users to determine access rights of others. In contrast to systems and methods that frequently monetize user data without their knowledge or express consent, in systems and methods of the present disclosure, users may have the ability to allow or refuse access or use of their data. Moreover, users may have the ability to revoke access to their data at any time. For example, a user may be given the option of opting out of Discovery App analytics. In some embodiments, shared user data may be erased from a paired user's access once a P2P connection is made (described more fully below). Using an SSI platform, a user can remain anonymous while connecting with strangers. The Discovery App uses information to build a User profile. From User Insights, the Discovery App can generate Zero Knowledge Proofs (shared via Agent-to-Agent communication such as DID. This attests to various aspect of a User's data without actually sharing the private data. The Discovery App can collect metadata about the User in a private way—including Location, IP Address/Mac Address, and Discovery Preferences. This information can be sent via private encrypted Agent-to-Agent communication (DID).
An SSI platform is compatible with all discovery methods, including code connect Users can skip discovery opt-in (discussed below) and connect directly with another person using an auto-generated private communication channel. Using QR codes, a new DID can be generated that allows users to immediately share a private encrypted channel with whomever they want.
SSI enables private, controlled communication between users (once users are connected). Users can mutually consent to their relationships and communicate P2P. DIDs are 2-party lifetime encrypted communication channels that do not require a third party to access. DIDs can be used to send credentials, proofs, and messages. Both parties have to mutually consent to the relationship. SSI is more secure than the current industry standard of end-to-end encryption. End-to-end encryption requires a third party server. P2P using DID does not require a third party server.
Using an SSI platform, users can have multiple Personas which are not correlatable. There may be pairwise DIDs for every relationship. Users may be permitted to indicate what information they want to share and at which phase, without the Discovery App seeing the information.
For purposes of this disclosure, any system described herein may include any instrumentality or aggregate of instrumentalities operable to compute, calculate, determine, classify, process, transmit, receive, retrieve, originate, switch, store, display, communicate, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, a system or any portion thereof may be a minicomputer, mainframe computer, personal computer (e.g., desktop or laptop), tablet computer, embedded computer, mobile device (e.g., personal digital assistant (PDA) or smart phone) or other hand-held computing device, server (e.g., blade server or rack server), a network storage device, or any other suitable device or combination of devices and may vary in size, shape, performance, functionality, and price. A system may include volatile memory (e.g., random access memory (RAM)), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory (e.g., EPROM, EEPROM, etc.). A basic input/output system (BIOS) can be stored in the non-volatile memory (e.g., ROM), and may include basic routines facilitating communication of data and signals between components within the system. The volatile memory may additionally include a high-speed RAM, such as static RAM for caching data.
Additional components of a system may include one or more disk drives or one or more mass storage devices, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as digital and analog general purpose I/O, a keyboard, a mouse, touchscreen and/or a video display. Mass storage devices may include, but are not limited to, a hard disk drive, floppy disk drive, CD-ROM drive, smart drive, flash drive, or other types of non-volatile data storage, a plurality of storage devices, a storage subsystem, or any combination of storage devices. A storage interface may be provided for interfacing with mass storage devices, for example, a storage subsystem. The storage interface may include any suitable interface technology, such as EIDE, ATA, SATA, and IEEE 1394. A system may include what is referred to as a user interface for interacting with the system, which may generally include a display, mouse or other cursor control device, keyboard, button, touchpad, touch screen, stylus, remote control (such as an infrared remote control), microphone, camera, video recorder, gesture systems (e.g., eye movement, head movement, etc.), speaker, LED, light, joystick, game pad, switch, buzzer, bell, and/or other user input/output device for communicating with one or more users or for entering information into the system. These and other devices for interacting with the system may be connected to the system through I/O device interface(s) via a system bus, but can be connected by other interfaces such as a parallel port, IEEE 1394 serial port, a game port, a USB port, an IR interface, etc. Output devices may include any type of device for presenting information to a user, including but not limited to, a computer monitor, flat-screen display, or other visual display, a printer, and/or speakers or any other device for providing information in audio form, such as a telephone, a plurality of output devices, or any combination of output devices.
A system may also include one or more buses operable to transmit communications between the various hardware components. A system bus may be any of several types of bus structure that can further interconnect, for example, to a memory bus (with or without a memory controller) and/or a peripheral bus (e.g., PCI, PCIe, AGP, LPC, I2C, SPI, USB, etc.) using any of a variety of commercially available bus architectures.
One or more programs or applications, such as a web browser and/or other executable applications, may be stored in one or more of the system data storage devices. Generally, programs may include routines, methods, data structures, other software components, etc., that perform particular tasks or implement particular abstract data types. Programs or applications may be loaded in part or in whole into a main memory or processor during execution by the processor. One or more processors may execute applications or programs to run systems or methods of the present disclosure, or portions thereof, stored as executable programs or program code in the memory, or received from the Internet or other network. Any commercial or freeware web browser or other application capable of retrieving content from a network and displaying pages or screens may be used. In some embodiments, a customized application may be used to access, display, and update information. A user may interact with the system, programs, and data stored thereon or accessible thereto using any one or more of the input and output devices described above.
A system of the present disclosure can operate in a networked environment using logical connections via a wired and/or wireless communications subsystem to one or more networks and/or other computers. Other computers can include, but are not limited to, workstations, servers, routers, personal computers, microprocessor-based entertainment appliances, peer devices, or other common network nodes, and may generally include many or all of the elements described above. Logical connections may include wired and/or wireless connectivity to a local area network (LAN), a wide area network (WAN), hotspot, a global communications network, such as the Internet, and so on. The system may be operable to communicate with wired and/or wireless devices or other processing entities using, for example, radio technologies, such as the IEEE 802.xx family of standards, and includes at least Wi-Fi (wireless fidelity), WiMax, and Bluetooth wireless technologies. Communications can be made via a predefined structure as with a conventional network or via an ad hoc communication between at least two devices.
Hardware and software components of the present disclosure, as discussed herein, may be integral portions of a single computer, server, controller, or message sign, or may be connected parts of a computer network. The hardware and software components may be located within a single location or, in other embodiments, portions of the hardware and software components may be divided among a plurality of locations and connected directly or through a global computer information network, such as the Internet. Accordingly, aspects of the various embodiments of the present disclosure can be practiced in distributed computing environments where certain tasks are performed by remote processing devices that are linked through a communications network. In such a distributed computing environment, program modules may be located in local and/or remote storage and/or memory systems.
As will be appreciated by one of skill in the art, the various embodiments of the present disclosure may be embodied as a method (including, for example, a computer-implemented process, a business process, and/or any other process), apparatus (including, for example, a system, machine, device, computer program product, and/or the like), or a combination of the foregoing. Accordingly, embodiments of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, middleware, microcode, hardware description languages, etc.), or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product on a computer-readable medium or computer-readable storage medium, having computer-executable program code embodied in the medium, that define processes or methods described herein. A processor or processors may perform the necessary tasks defined by the computer-executable program code. Computer-executable program code for carrying out operations of embodiments of the present disclosure may be written in an object oriented, scripted or unscripted programming language such as Java, Perl, PHP, Visual Basic, Smalltalk, C++, or the like. However, the computer program code for carrying out operations of embodiments of the present disclosure may also be written in conventional procedural programming languages, such as the C programming language or similar programming languages. A code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, an object, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
In the context of this document, a computer readable medium may be any medium that can contain, store, communicate, or transport the program for use by or in connection with the systems disclosed herein. The computer-executable program code may be transmitted using any appropriate medium, including but not limited to the Internet, optical fiber cable, radio frequency (RF) signals or other wireless signals, or other mediums. The computer readable medium may be, for example but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples of suitable computer readable medium include, but are not limited to, an electrical connection having one or more wires or a tangible storage medium such as a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a compact disc read-only memory (CD-ROM), or other optical or magnetic storage device. Computer-readable media includes, but is not to be confused with, computer-readable storage medium, which is intended to cover all physical, non-transitory, or similar embodiments of computer-readable media.
Various embodiments of the present disclosure may be described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products. It is understood that each block of the flowchart illustrations and/or block diagrams, and/or combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-executable program code portions. These computer-executable program code portions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a particular machine, such that the code portions, which execute via the processor of the computer or other programmable data processing apparatus, create mechanisms for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. Alternatively, computer program implemented steps or acts may be combined with operator or human implemented steps or acts in order to carry out an embodiment of the invention.
Additionally, although a flowchart or block diagram may illustrate a method as comprising sequential steps or a process as having a particular order of operations, many of the steps or operations in the flowchart(s) or block diagram(s) illustrated herein can be performed in parallel or concurrently, and the flowchart(s) or block diagram(s) should be read in the context of the various embodiments of the present disclosure. In addition, the order of the method steps or process operations illustrated in a flowchart or block diagram may be rearranged for some embodiments. Similarly, a method or process illustrated in a flow chart or block diagram could have additional steps or operations not included therein or fewer steps or operations than those shown. Moreover, a method step may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
As used herein, the term “substantially” refers to the complete or nearly complete extent or degree of an action, characteristic, property, state, structure, item, or result. For example, an object that is “substantially” enclosed would mean that the object is either completely enclosed or nearly completely enclosed. The exact allowable degree of deviation from absolute completeness may in some cases depend on the specific context. However, the nearness of completion will be so as to have generally the same overall result as if absolute and total completion were obtained. The use of “substantially” is equally applicable when used in a negative connotation to refer to the complete or near complete lack of an action, characteristic, property, state, structure, item, or result. For example, an element, combination, embodiment, or composition that is “substantially free of” an element may still actually contain such element as long as there is generally no significant effect thereof.
To aid the Patent Office and any readers of any patent issued on this application in interpreting the claims appended hereto, applicants wish to note that they do not intend any of the appended claims or claim elements to invoke 35 U.S.C. § 112(f) unless the words “means for” or “step for” are explicitly used in the particular claim.
Additionally, as used herein, the phrase “at least one of [X] and [Y],” where X and Y are different components that may be included in an embodiment of the present disclosure, means that the embodiment could include component X without component Y, the embodiment could include the component Y without component X, or the embodiment could include both components X and Y. Similarly, when used with respect to three or more components, such as “at least one of [X], [Y], and [Z],” the phrase means that the embodiment could include any one of the three or more components, any combination or sub-combination of any of the components, or all of the components.
In the foregoing description various embodiments of the present disclosure have been presented for the purpose of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obvious modifications or variations are possible in light of the above teachings. The various embodiments were chosen and described to provide the best illustration of the principals of the disclosure and their practical application, and to enable one of ordinary skill in the art to utilize the various embodiments with various modifications as are suited to the particular use contemplated. All such modifications and variations are within the scope of the present disclosure as determined by the appended claims when interpreted in accordance with the breadth they are fairly, legally, and equitably entitled.
This application is a Continuation of U.S. patent application Ser. No. 16/995,708 filed Aug. 17, 2020, which claims priority to U.S. Provisional Application 62/888,403 filed Aug. 16, 2019, the contents of which are incorporated by reference herein their entireties. The present disclosure relates to novel and advantageous tools for self-discovery. In particular, the present disclosure relates to systems and methods for building a virtual representation and analysis of a user's whole self. Additionally, the present disclosure relates to novel and advantageous tools for social discovery for connecting with other users. In particular, the present disclosure relates to systems and methods for privately testing mutual relationship possibilities and alignment.
Number | Date | Country | |
---|---|---|---|
62888403 | Aug 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16995708 | Aug 2020 | US |
Child | 17962279 | US |