APPARATUS AND METHOD FOR TOKENIZED PEER RECOGNITION FACTORING-IN SOCIAL BEHAVIOR

20200394671 ยท 2020-12-17

    Inventors

    Cpc classification

    International classification

    Abstract

    An intra-corporate tokenized recognition system and method are developed by which the employees can send to their co-workers, tokens to show appreciation. One key aspect of this invention is factoring-in the social behavior during token transactions using a social network graph. Doing so, a weight (or significance) is assigned to each token transaction and used a multiplier of the number of the tokens, while maintaining transaction auditability, immutability, publicity and anonymity. The aforementioned weight is determined by a software component penalizing social anomalies such as cliques and dyads. This invention integrates a weighted social network graph representing employee token transactions with a blockchain.

    Claims

    1. A method comprising: (a). receiving a token transaction request to transfer one or more tokens from a first wallet associated with a first employee of a company to a second wallet associated with a second employee of the company; (b). processing the token transaction request of (a), the processing comprising: i. determining a weight associated with the one or more tokens to be transferred; ii. determining a weighted set of tokens based on the determined weight in (b)(i) and the one or more tokens of (a); (c). decrementing the first wallet by the weighted set of tokens determined in (b)(ii) and incrementing the second wallet by the weighted set of tokens determined in (b)(ii); wherein the token transaction request is issued to recognize accomplishment of the second employee by the first employee.

    2. The method of claim 1, wherein the method further comprises the step of recording the token transaction request as a record in a distributed ledger in a blockchain, the record transindicating successful token transfer from the first employee to the second employee to recognize accomplishment of the second employee by the first employee.

    3. The method of claim 1, wherein the step of determining a weighted set of tokens based on the determined weight in (b)(i) and the one or more tokens of (a) comprises determining a weighted set of tokens by multiplying the determined weight in (b)(i) with the one or more tokens of (a).

    4. The method of claim 1, wherein the weight associated with one or more tokens to be transferred is derived from a social network graph, with each node in the social network graph being an employee, and an edge between a pair of nodes of the social network graph being a token transaction, with a calculated weight.

    5. The method of claim 1, wherein the weight associated with one or more tokens to be transferred is algorithmically determined to penalize clique-ness, friendship, or intra-corporation social behavior that are not pertinent to the second employee's quality of work or performance.

    6. The method of claim 1, wherein the first employee receives tokens from a company wallet which may then be transferred to other employees, the company wallet prohibited to receive any tokens from wallets of other employee.

    7. The method of claim 1, wherein the first employee receives tokens from both a company wallet and from wallets of other employees of the company, wherein any tokens received from other employees cannot be transferred subsequently to another employee's wallet.

    8. The method of claim 1, wherein the weight is a number between zero and one.

    9. An article of manufacture comprising a computer usable medium having computer readable program code for performing the method of claim 1.

    10. A method comprising: (a). receiving a token transaction request to transfer one or more tokens from a first wallet associated with a first employee of a company to a second wallet associated with a second employee of the company, wherein the token transaction request is issued to recognize accomplishment of the second employee by the first employee; (b). accessing an electronic smart contract and processing the token transaction request of (a) according to the electronic smart contract, the processing comprising: i. determining a weight associated with the one or more tokens to be transferred; ii. determining a weighted set of tokens based on the determined weight in (b)(i) and the one or more tokens of (a); (c). decrementing the first wallet by the weighted set of tokens determined in (b)(ii) and incrementing the second wallet by the weighted set of tokens determined in (b)(ii); and (d). recording the token transaction request as a record in a distributed ledger in a blockchain, the record indicating successful token transfer from the first employee to the second employee to recognize accomplishment of the second employee by the first employee.

    11. The method of claim 9, wherein the step of determining a weighted set of tokens based on the determined weight in (i) and the one or more tokens of comprises determining a weighted set of tokens by multiplying the determined weight in (i) with the one or more tokens.

    12. The method of claim 9, wherein the weight associated with one or more tokens to be transferred is derived from a social network graph, with each node in the social network graph being an employee, and an edge between a pair of nodes of the social network graph being a token transaction, with a calculated weight.

    13. The method of claim 9, wherein the weight associated with one or more tokens to be transferred is algorithmically determined to penalize clique-ness, friendship, or intra-corporation social behavior that are not pertinent to the second employee's quality of work or performance.

    14. The method of claim 9, wherein the first employee receives tokens from a company wallet which may then be transferred to other employees, the company wallet prohibited to receive any tokens from wallets of other employee.

    15. The method of claim 9, wherein the first employee receives tokens from both a company wallet and from wallets of other employees of the company, wherein any tokens received from other employees cannot be transferred subsequently to another employee's wallet.

    16. The method of claim 9, wherein the weight is a number between zero and one.

    17. An article of manufacture comprising a computer usable medium having computer readable program code for performing the method of claim 9.

    18. A system comprising: (a). a first database storing wallet information associated with at least a first wallet associated with a first employee of a company, second wallet associated with a second employee of the company, and a company wallet associated with the company; (b). a second database storing one or more transaction weights; (c). a third database storing at least one electronic smart contract associated with the company; wherein a token transaction request is received to transfer one or more tokens from the first wallet in the first database to the second wallet in the first database, wherein the token transaction request is issued to recognize accomplishment of the second employee by the first employee; wherein the electronic smart contract is accessed from the third database to process the token transaction request according to the electronic smart contract, the processing comprising: (i) determining a weight associated with the one or more tokens to be transferred from the second database; (ii) determining a weighted set of tokens based on the determined weight in (i) and the one or more tokens; and wherein the first wallet in the first database is decremented by the weighted set of tokens determined in (ii) and the second wallet is incremented by the weighted set of tokens determined in (ii).

    19. The system of claim 18, wherein the system further comprises a distributed ledger in a blockchain, the distributed ledger in a blockchain recording the token transaction request as a record, the record indicating successful token transfer from the first employee to the second employee to recognize accomplishment of the second employee by the first employee.

    20. The system of claim 18, wherein the weight associated with one or more tokens to be transferred is derived from a social network graph, with each node in the social network graph being an employee, and an edge between a pair of nodes of the social network graph being a token transaction, with a calculated weight.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0035] The present disclosure, in accordance with one or more various examples, is described in detail with reference to the following figures. The drawings are provided for purposes of illustration only and merely depict examples of the disclosure. These drawings are provided to facilitate the reader's understanding of the disclosure and should not be considered limiting of the breadth, scope, or applicability of the disclosure. It should be noted that for clarity and ease of illustration these drawings are not necessarily made to scale.

    [0036] FIG. 1 shows the time=0 (starting) of exemplary company.

    [0037] FIG. 2 shows time=1 transaction between employees of exemplary company.

    [0038] FIG. 3 depicts the transaction and weight matrices at time=1 according to the present invention.

    [0039] FIG. 4 shows time=2 transactions between employees of exemplary company.

    [0040] FIG. 5 depicts the transaction and weigh matrices at time=2 according to the present invention.

    [0041] FIG. 6 depicts a high level diagram of system components in an embodiment.

    [0042] FIG. 7 depicts an exemplary method between system components.

    [0043] FIG. 8 depicts a token transfer user interface of ECA.

    [0044] FIG. 9 depicts a dashboard of the user interface of ECA.

    [0045] FIG. 10 depicts another dashboard of the user interface of ECA.

    DESCRIPTION OF THE PREFERRED EMBODIMENTS

    [0046] While this invention is illustrated and described in a preferred embodiment, the invention may be produced in many different configurations. There is depicted in the drawings, and will herein be described in detail, a preferred embodiment of the invention, with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention and the associated functional specifications for its construction and is not intended to limit the invention to the embodiment illustrated. Those skilled in the art will envision many other possible variations within the scope of the present invention.

    [0047] Note that in this description, references to one embodiment or an embodiment mean that the feature being referred to is included in at least one embodiment of the invention. Further, separate references to one embodiment in this description do not necessarily refer to the same embodiment; however, neither are such embodiments mutually exclusive, unless so stated and except as will be readily apparent to those of ordinary skill in the art. Thus, the present invention can include any variety of combinations and/or integrations of the embodiments described herein.

    [0048] An electronic device stores and transmits (internally and/or with other electronic devices over a network) code (composed of software instructions) and data using machine-readable media, such as non-transitory machine-readable media (e.g., machine-readable storage media such as magnetic disks; optical disks; read only memory; flash memory devices; phase change memory) and transitory machine-readable transmission media (e.g., electrical, optical, acoustical or other form of propagated signalssuch as carrier waves, infrared signals). In addition, such electronic devices include hardware, such as a set of one or more processors coupled to one or more other componentse.g., one or more non-transitory machine-readable storage media (to store code and/or data) and network connections (to transmit code and/or data using propagating signals), as well as user input/output devices (e.g., a keyboard, a touchscreen, and/or a display) in some cases. The coupling of the set of processors and other components is typically through one or more interconnects within the electronic devices (e.g., busses and possibly bridges). Thus, a non-transitory machine-readable medium of a given electronic device typically stores instructions for execution on one or more processors of that electronic device. One or more parts of an embodiment of the invention may be implemented using different combinations of software, firmware, and/or hardware.

    [0049] FIG. 1 illustrates an exemplary small company with six employees that will be used to explain in more details the aspects of the aforementioned embodiments. Each employee starts with eight (8) tokens in his/her employee wallet. This wallet is used as the keeper of all tokens. Each wallet has a pair of private and public encryption key pairs. The public key of the wallet is public (known to others), but only the owner of the wallet knows the private key. Each wallet has a wallet ID that is a unique sequence of numbers and letters, which identifies the wallet. The wallet keeps the history of all token transactions associated with that wallet, meaning all the transactions of sending tokens to other wallets, and of receiving tokens from other wallets.

    [0050] At the beginning (time=0), no token exchange has so far occurred between employees. Each token sender uses the public key of the token receiver's wallet to encrypt the token transaction, which can then be opened only with the token receiver's wallet's private key. The sender of a token may stay anonymous, however the receiver can't be anonymous. In order to send a token, the sender must obtain the public key and wallet ID of the receiver, in which case the receiver can't be kept anonymous.

    [0051] FIG. 2 illustrates the first phase of token transactions between some of the employees illustrated in FIG. 1. Since there is no social networking graph yet, the weights of all transactions are the same and equal to one. Sue sends a token to Liz. Now, Liz has one more token (total of 9 tokens) in her wallet, and Sue has one less (total of 7 tokens) in her wallet. Liz may not know who sent the token. Similarly, Barb sends a token to Tom. Now, Tom has one more (total of 9 tokens) in his wallet, and Barb has one less (total of 7 tokens) in her wallet, and so on. The edges in the graph illustrate each token transaction and marked with the number of tokens and associated weight determined by the system of this invention.

    [0052] FIG. 3 illustrates a simple transaction matrix corresponding to the graph of FIG. 2 at time=J. The .sub.ijth entry of the matrix is 1 if there is a transaction from i.sup.th wallet to j.sup.th wallet, and 0 otherwise. This matrix is an input to the specific algorithm of this invention that derives a corresponding weight matrix (output of the algorithm). The .sub.ijth entry of the matrix is the weight of the transaction from i.sup.th wallet to j.sup.th wallet. Note that at this starting point all W.sub.ij(t)=1 in the weight matrix, meaning when a token-giver sends one token to a token-receiver, the equivalent transaction is one token.

    [0053] In FIG. 3, the exemplary blocks in the blockchain are also illustrated. There have been only four token transactions. All transaction weights are 1. Two transactions are assumed to be in a new block. Each transaction record in the block indicates at least the token-receiver, the number of equivalent tokens (weighted), and the token-sender. Now, these transactions are on the blockchain and thus visible by all employees on the ledger/dashboard. Furthermore, each wallet keeps the history of its own transactions.

    [0054] FIG. 4 illustrates additional transactions that occur at a later time (time=2). The previous transactions that occurred at time1 are drawn with solid lines and the new transactions that occurred at time=2 with dotted lines. Sue sends three new tokens to Liz. Now, Liz has one more token from the previous transaction, and (30.8) new tokens from the new transaction in her wallet, while Sue has four tokens remaining in her wallet. Sue has not received any tokens yet. Note that the weight of 0.8 representing the dyad behavior is an exemplary weight of the transaction for merely illustrative purposes (and not based on a real calculation). Similarly, Bob sends two tokens to Jon and one token to Tom. Bob now has five tokens remaining, and so on. The edges in the graph illustrate each token transaction marked with the number of tokens and the associated weight algorithmically determined by the system of this invention.

    [0055] FIG. 5 illustrates the corresponding transaction matrix, weight matrix and the new blocks in the blockchain at time=2. There are four new transactions that are appended to the blockchain. Each transaction shows the transaction details including the weight calculated by the system.

    [0056] Note that as the social network graph evolves in time, the system of invention updates the weights of token transactions accordingly, and appends the blockchain with new blocks, each block recording a sequence of new transactions. The structure of each block as to how many transactions are recorded as a block and the precise content of each transaction is dependent on the application of the concepts of this invention. Such various possible embodiments are assumed as trivial extensions of the main concepts and assumed covered by this invention.

    [0057] FIG. 6 illustrates a simple block diagram of the system showing key actors, interactions and system components. The token transactions are recorded on a blockchain ledger that is on each employee's computer (also known as nodes) shown as 150a, 150b, 150c, . . . , 150n, which includes a user friendly dashboard. Illustrated in the diagram are Employee i's Client Application (ECA) 180 and electronic wallet, and Employee j's Client Application (ECA) 190 and electronic wallet. ECA is a downloadable or web-based application that allows an employee to send/receive tokens, view the contents of his/her own wallet, and access the dashboard to see information on wallets of his/her colleagues.

    [0058] In each wallet, the employee has two types of tokens: (i) those received from the company wallet (these are to be sent to other employee wallets), and (ii) those received from other employee wallets (these can or can't be sent to other employee wallets depending on implementation). The tokens in the second category are the employee's performance tokens. Because all transactions are traceable, the differentiation between these two categories can easily be made and the performance tokens can be reported separately from those received directly from the electronic company wallet. The employee may choose not to send any tokens to anyone, to send some of his/her tokens, or to send all his/her tokens. The balance of initial pool of tokens received from the company wallet, received tokens from employees and sent tokens to employees are recorded on the blockchain per wallet since each individual transaction is recorded and immutably stored in a block.

    [0059] The token transaction request first goes to smart contract 111, which has software code that executes to complete the transaction. Smart Contract 111 checks to determine the weight of the token transaction from employee i to employee j. In order to make the determination, Smart Contract 111 sends the specific transaction to subsystem 110 that has several components. Weights Database 100 contains the most up to date weights of all transactions. Transactions Database 101 contains all the token transaction requests between employees to date that are used to determine the weights. Wallets Database 102 contains the wallet IDs and associated public keys. Policies Database 103 contains specific rules/policies that the company applies to each transaction. This database includes other employee related data as it pertains to token transactions. Subsystem 110 contains company wallet 144 that transfers a number of tokens to each employee wallet according to company policies, and two main software blocks: Social Network Grapher 120 that generates an up to date graph of transactions. It is important to note that the tokens in company wallet are not mined tokens. Weight Optimizer 130 is the main engine of Subsystem 110 that takes the input from various databases such as the policies 103, transactions 101, and updates weights database 100 according to an algorithm. Smart Contract 111 sends a new transaction to Social Network Grapher 120 that updates the transactions matrix in the database and feeds that information to Weight Optimizer 130 for determining the weight associated with aforementioned transaction. Once the new weight is available, Smart Contract 111 completes the transaction, updates wallets 180 and 190 accordingly, and hands over the new transaction to blockchain 115, which adds the new transaction to blockchain. Note that special mining nodes and proof of work that are needed in other public blockchain implementations are not needed in a private blockchain architecture as all nodes are within the company and therefore assumed as trusted nodes. FIG. 7 illustrates the steps of the aforementioned interactions between various components of this invention in chronological order.

    [0060] Note that these system components and the steps of interactions are simply included to improve the understanding of the concepts of this invention. Many other trivial extensions and implementation variations are possible and covered by this invention.

    [0061] FIG. 8 depicts a simple panel of Employee Client Application 180, which is a software component (a computer program) to send a token reward. This panel is inspired by the email paradigm and can easily be provided via a web page or a using a simple downloadable application. The employee electronic wallet application is a software subcomponent of Employee Client Application 180. FIG. 9 depicts a simple screen of the reward dashboard 150a. FIG. 10 depicts another screen of the dashboard showing the token distribution of the employee by year. These screens are only to improve the understanding of the overall system. Many other trivial alternatives of providing the same functionality are possible, and therefore assumed as covered by this invention.

    [0062] In one embodiment, the present invention provides a method comprising: (a) receiving a token transaction request to transfer one or more tokens from a first wallet associated with a first employee of a company to a second wallet associated with a second employee of the company; (b) processing the token transaction request of (a), the processing comprising: (i) determining a weight associated with the one or more tokens to be transferred; (ii) determining a weighted set of tokens based on the determined weight in (b)(i) and the one or more tokens of (a); (c) decrementing the first wallet by the weighted set of tokens determined in (b)(ii) and incrementing the second wallet by the weighted set of tokens determined in (b)(ii); wherein the token transaction request is issued to recognize accomplishment of the second employee by the first employee.

    [0063] In another embodiment, the present invention provides a method comprising: (a) receiving a token transaction request to transfer one or more tokens from a first wallet associated with a first employee of a company to a second wallet associated with a second employee of the company, wherein the token transaction request is issued to recognize accomplishment of the second employee by the first employee; (b) accessing an electronic smart contract and processing the token transaction request of (a) according to the electronic smart contract, the processing comprising: (i) determining a weight associated with the one or more tokens to be transferred; (ii) determining a weighted set of tokens based on the determined weight in (b)(i) and the one or more tokens of (a); (c) decrementing the first wallet by the weighted set of tokens determined in (b)(ii) and incrementing the second wallet by the weighted set of tokens determined in (b)(ii); and (d) recording the token transaction request as a record in a distributed ledger in a blockchain, the record indicating successful token transfer from the first employee to the second employee to recognize accomplishment of the second employee by the first employee.

    [0064] In yet another embodiment, the present invention provides a system comprising: (a) a first database storing wallet information associated with at least a first wallet associated with a first employee of a company, second wallet associated with a second employee of the company, and a company wallet associated with the company; (b) a second database storing one or more transaction weights; (c) a third database storing at least one electronic smart contract associated with the company; wherein a token transaction request is received to transfer one or more tokens from the first wallet in the first database to the second wallet in the first database, wherein the token transaction request is issued to recognize accomplishment of the second employee by the first employee; wherein the electronic smart contract is accessed from the third database to process the token transaction request according to the electronic smart contract, the processing comprising: (i) determining a weight associated with the one or more tokens to be transferred from the second database; (ii) determining a weighted set of tokens based on the determined weight in (i) and the one or more tokens; and wherein the first wallet in the first database is decremented by the weighted set of tokens determined in (ii) and the second wallet is incremented by the weighted set of tokens determined in (ii).

    [0065] The above-described features and applications can be implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Embodiments within the scope of the present disclosure may also include tangible and/or non-transitory computer-readable storage media for carrying or having computer-executable instructions or data structures stored thereon. Such non-transitory computer-readable storage media can be any available media that can be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor. By way of example, and not limitation, such non-transitory computer-readable media can include flash memory, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions, data structures, or processor chip design. The computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.

    [0066] Computer-executable instructions include, for example, instructions and data which cause a general-purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps.

    [0067] Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for performing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer need not have such devices. Moreover, a computer can be embedded in another device, e.g., a mobile telephone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device (e.g., a universal serial bus (USB) flash drive), to name just a few.

    [0068] In this specification, the term software is meant to include firmware residing in read-only memory or applications stored in magnetic storage or flash storage, for example, a solid-state drive, which can be read into memory for processing by a processor. Also, in some implementations, multiple software technologies can be implemented as sub-parts of a larger program while remaining distinct software technologies. In some implementations, multiple software technologies can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software technology described here is within the scope of the subject technology. In some implementations, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.

    [0069] A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment. A computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.

    [0070] These functions described above can be implemented in digital electronic circuitry, in computer software, firmware or hardware. The techniques can be implemented using one or more computer program products. Programmable processors and computers can be included in or packaged as mobile devices. The processes and logic flows can be performed by one or more programmable processors and by one or more programmable logic circuitry. General and special purpose computing devices and storage devices can be interconnected through communication networks.

    [0071] Some implementations include electronic components, for example microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic or solid state hard drives, read-only and recordable Blu-Ray discs, ultra density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media can store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, for example is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.

    [0072] While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some implementations are performed by one or more integrated circuits, for example application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some implementations, such integrated circuits execute instructions that are stored on the circuit itself.

    [0073] It is understood that any specific order or hierarchy of steps in the processes disclosed is an illustration of example approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged, or that all illustrated steps be performed. Some of the steps may be performed simultaneously. For example, in certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components illustrated above should not be understood as requiring such separation, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.

    [0074] Various modifications to these aspects will be readily apparent, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, where reference to an element in the singular is not intended to mean one and only one unless specifically so stated, but rather one or more. Unless specifically stated otherwise, the term some refers to one or more. Pronouns in the masculine (e.g., his) include the feminine and neuter gender (e.g., her and its) and vice versa. Headings and subheadings, if any, are used for convenience only and do not limit the subject technology.

    [0075] A phrase, for example, an aspect does not imply that the aspect is essential to the subject technology or that the aspect applies to all configurations of the subject technology. A disclosure relating to an aspect may apply to all configurations, or one or more configurations. A phrase, for example, an aspect may refer to one or more aspects and vice versa. A phrase, for example, a configuration does not imply that such configuration is essential to the subject technology or that such configuration applies to all configurations of the subject technology. A disclosure relating to a configuration may apply to all configurations, or one or more configurations. A phrase, for example, a configuration may refer to one or more configurations and vice versa.

    [0076] The various embodiments described above are provided by way of illustration only and should not be construed to limit the scope of the disclosure. Those skilled in the art will readily recognize various modifications and changes that may be made to the to principles described herein without following the example embodiments and applications illustrated and described herein, and without departing from the spirit and scope of the disclosure.

    [0077] While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features that may be specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.

    [0078] Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.

    [0079] As noted above, particular embodiments of the subject matter have been described, but other embodiments are within the scope of the following claims. For example, the actions recited in the claims can be performed in a different order and still achieve desirable results. As one example, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In certain implementations, multitasking and parallel processing may be advantageous.

    CONCLUSION

    [0080] A system and method have been shown in the above embodiments for the effective implementation of a system and method for tokenized peer recognition factoring-in social behavior. While various preferred embodiments have been shown and described, it will be understood that there is no intent to limit the invention by such disclosure, but rather, it is intended to cover all modifications falling within the spirit and scope of the invention, as defined in the appended claims. For example, the present invention should not be limited by software/program, computing environment, or specific computing hardware.