EP1725982A4 - Method and apparatus for constructing a networking database and system proactively - Google Patents
Method and apparatus for constructing a networking database and system proactivelyInfo
- Publication number
- EP1725982A4 EP1725982A4 EP05712506A EP05712506A EP1725982A4 EP 1725982 A4 EP1725982 A4 EP 1725982A4 EP 05712506 A EP05712506 A EP 05712506A EP 05712506 A EP05712506 A EP 05712506A EP 1725982 A4 EP1725982 A4 EP 1725982A4
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- content
- viewer
- guest key
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
Definitions
- the present invention relates to a system and method of enabling software interactions including a computer-implemented method and system.
- the invention described here attempts to provide a more rapid procedure for people to extend their network.
- John uploads a photo gallery to a website that uses social software, but he only has one friend on the site and most of his friends are not members of the site.
- the traditional model if he wants his friends to see his gallery they first have to become members, and then one party has to initiate a friend request. After that has been done, the other party must confirm. At this point John can point them to the photo gallery.
- Many social networking sites do employ a process where an individual can invite people to their network, and upon join they will be made friends, but this typically requires the individual to invite the user from within the system.
- the present invention alleviates to a great extent the disadvantages of the known advertising systems by providing an automated mechanism where brand owners can tap into a network of individuals or groups who are willing to represent their brands via their identities as part of a community.
- a system of facilitating growth of an affinity network outside an environment of a social networking tool is provided.
- a guest key system is provided in which a user (whether an individual or company) can become a friend and view another user's content, thereby proactively recruiting friends to join the user's network.
- a user can expand the user's network by sharing his or her guest key with individuals that he wants to join his network and access his content.
- Figure 1 is a block diagram of a system of constructing a networking database proactively (referred to as a "Guest Key system" herein) in accordance with a preferred embodiment of the present invention
- Figure 2 is flow chart depicting how a user might disseminate his or her guest key in order to expand his or her network proactively, in accordance with the present invention
- Figure 3 is a flow chart illustrating how a user can set and change his or her guest key in accordance with the present invention
- Figure 4 is a flow chart illustrating how a Guest Key can be used in accordance with the present invention
- a method of constructing a networking database proactively where, under control of a server system, access to user content is restricted unless the viewer (of the user content) is a member of a group approved for content viewing, or the viewer has submitted a guest key that is associated with the user content - the guest key being preselected by the user.
- a guest key is provided, the correct submission of a guest key triggers a reciprocal friend relationship to be stored in a storage device for both the user and the viewer.
- a preferred embodiment of this invention has the user selecting his/her guest key at sign-up and having the ability to modify this key if it becomes compromised.
- the user is allowed to monitor how rapidly their network is expanding using their guest key and other people's guest keys.
- a system allows a user to deliver a link to a person with the guest key embedded in the link, so that when the link is clicked, the person becomes associated as a friend.
- the service provider can also provide this link for the user, as a convenience.
- a preferred embodiment allows people who are not yet members to click on this link, see a preview of the content that the person has waiting for them, join, and then be redirected to the content, where they will also be made friends with the user, i.e. associated with the user as within an associational group of the user.
- GUIS KEY system 1.0 a system of proactively building an associational network via a communications network in accordance with the present invention
- the GUEST KEY system 1.0 includes a plurality of client devices 1.1 (such as may be accessed by the "users” or “viewers” discussed herein), each of which is coupled to a network 1.2, and, in turn, to a GUEST KEY server system (GKSS) 1.3.
- Each client device 1.1 of which one is shown in some detail and three others are represented in block form, is typically a personal computer, such as a Windows-based personal computer. It should be understood that client devices may also be laptops, PDA's, workstations, mobile phones, Internet enabled TV, etc.
- Each client device 1.1 preferably has an input device such as a keyboard and/or mouse and a display for communication with a user.
- the client device 1.1 has communications software and a modem (or some other form of Internet connectivity, such as a DSL modem, cable modem, T-l line, ISDN line, etc).
- Communications software may be any software suitable for telecommunications, and is preferably browser software.
- the communications software is for communication over network 1.2 with a GKSS 1.3.
- Network 1.2 may be, for example, the internet.
- the GKSS 1.3 is preferably a web application that displays contents authored by agents, where agents are individuals or groups.
- the GKSS 1.3 may be a wholly integrated web application such as a web log and social networking web site that allows users to decorate themselves with brands and that shares the same web server 1.8, database provider, and server side scripts.
- the GKSS 1.3 may be utilized by third party web applications.
- third party web applications include Blogger, social networking systems such as Friendster, instant messaging systems such as AOL Instant Messenger, and community oriented applications such as Ebay and oPhoto, provided these services are modified to interface with the GKSS 1.3.
- the GKSS 1.3 typically includes, for example, a web server, which is characteristically a programmed computer, preferably one which supports a HyperText Transfer Protocol (HTTP), that handles document requests and provides other services, returning information to the requestor.
- HTTP HyperText Transfer Protocol
- the web server may communicate by exposing web services which communicate XML, etc.
- GKSS 1.3 in addition to a web server, includes a server side scripting engine 1.6, preferably PHP, available from php.net, connected to the web server for pre-processing an output from the web server before it is returned via the communications network.
- the server side scripting engine 1.6 also allows communication with a database server 1.7, preferably Mysql, available from mysql.com, using the Open Database Connectivity (ODBC) protocol.
- ODBC Open Database Connectivity
- Other similar server side scripting products could be used, such as Cold Fusion, ASP.NET technology.
- the database server 1.7 is generally configured as an SQL database, and, besides Mysql, other database systems could be used such as those available from Oracle, Informix, Microsoft, or Sybase.
- the GKSS 1.3 may also be a multi-server system, such as a web farm.
- the database server 1.7 is in communication with a database 1.9 in which the database server 1.7 stores content.
- FIG 2 there is generally shown the high level flow by which a user 2.1 may disseminate his or her guest key in order to expand his or her network proactively using the GKSS 1.3.
- a user 2.1 also may be considered a member 2.1, in which the user has joined the affinity network system.
- a preferred example of this flow involves the user creating a guest key (205) and then the user may share his/her guest key in any desired manner (210).
- the user may use one or more of a plurality of modes (215) to share his/her guest key with one or more viewers (i.e. guests).
- the user may, for example, identify his/her guest key electronically, such as by e-mail or instant messaging, by voice over a over the telephone or a face to face meeting or discussion, by printed communication, such as on a on a business card, etc.
- the GKSS 1.3 enables the user to optionally embed the guest key with a link to specific content.
- the specific content may be any content desired by the user to be accessed by the guests.
- the guests may use the user's guest key to become associated as friends of the user and access the specific content (225).
- FIG 3 there is generally shown the high level flow by which a user 2.1 may set and change his/her guest key in accordance with one embodiment of the present invention.
- a user enters a guest key that he/she uses for expanding their network (illustrated with reference number 305).
- the guest key may be entered within a form that is submitted to a server although other manners of entering the guest key may be used.
- a server processes the form and determines whether the guest key passes minimum security requirements (illustrated with reference number 310).
- the server stores the guest key in a database 320 and associates the guest key with the user (illustrated with reference number 315). Later, or immediately thereafter, the user 2.1 is provide an option of changing the guest key selected (325). If yes, the user may enter the new guest key (305).
- FIG. 4 there is generally shown a high level flow by which a Guest Key is used to access a member's content and associate a guest (i.e. viewer become friends with that member. The flow may start as illustrated with reference number 405. A viewer may access a user's web page (illustrated with reference number 410) using any know mechanism for accessing web pages such as, for example, a web browser.
- the viewer may access the user's web page using a guest key created by the user and provided to the viewer by the user.
- a determination is made regarding whether the guest key has been submitted, such as whether the guest key is embedded in a uniform resource locator (URL) or in a form submitted (415). If a determination is made that the viewer has not submitted the guest key, a determination is made regarding whether the viewer is in the user's network already (420).
- a database 425 optionally is accessed to assist in this determination.
- a permission denied page (as illustrated in Figure 7) that optionally includes a form field in which the viewer may enter a guest key to enable access to the user's web page (430).
- a determination is made regarding whether the viewer has entered a guest key (435). If the viewer has entered a guest key, the system may enable the viewer to access the user's web page (410), or optionally proceed to other processing steps, such as determination whether the guest key submitted is correct 440. Otherwise, the viewer may not be permitted to access the user's web page.
- a determination is made regarding whether the guest key is correct (440). This determination may be made by accessing a database 445 that maintains a database of users and corresponding guest keys. A check is made regarding whether the guest key entered by the viewer matches a guest key for the user. If the guest key is not correct, a permission denied page may be shown as described above (430). If, however, the guest key entered is correct, a mutual relationship may be added in a network database (450). An exemplary database is illustrated with reference number 455. The mutual relationship may be used to associate the viewer with the user whose guest key the viewer used to access the user's web page.
- an affinity network database is constructed proactively by registering a first user via a registration process (this first user is the "viewer" described in reference to Figure 4). In the registration process the first user selects a guest key associated with the first user during the registration process. This same user can seek access to other users' content.
- the server system can receive a request from this first user (now acting as a "viewer") to access another user's content (i.e. 410).
- the system determines whether the first user is pennitted access to the second user's content, such as by accessing the affiliation database 425 (or 455). If yes, access is granted and the second user's content is presented to the first user.
- Figures 5 and 6 illustrate database schema 500 for a plurality of data objects 505.
- the data objects 505 may include objects relating to, for example, blog entries, blogs, class gallery, class cache, class blog entry, class picture, class list item, class list, class blog, electronic mail confirmations, friends, second degree friends, gallery rows, gallery images, galleries, gallery image instances, gallery directories, errors, lists mind, list mind items, reaction blogs, reaction blog entry, reaction gallery, reaction list, reaction list item, reaction picture, reaction user, session browse paths, sessions, user contact settings, user profiles, users, page views, messages, invites, interests, and last viewed friend requests.
- Each data object 505 may include a data object name 510, data object identifier 515, and data object information 520.
- the data object name 510 may be a name assigned by a programmer, administrator or other user of a system for constructing a networking database and system proactively.
- the data object identifier 515 may be an identifier that is used by the system for retrieving that data object.
- the data object information 520 may include information relating to that data object 505.
- an errors data object 505 may include a data object name 510 titled errors.
- the data object identifier 515 may be titled errorsID.
- the data object information 520 may be information relating to errors encountered while the system is being used.
- the data object information 520 for an errors data object 505 may include an error description, code, location, date, and sessionlD.
- FIG 7 is an illustration of a permission denied page 700 that includes a guest key form field 705 according to one embodiment of the invention.
- the permission denied page 700 may include the guest key form field 705 that enables the viewer to enter a guest key for that particular user's web page. Upon entering a correct guest key for that user, the viewer may be presented with the user's web page.
- FIG 8 is an exemplary illustration of a user's content, presented in one of the possible formats, namely a web page 800 that may be presented to a viewer upon entering a valid guest key according to one embodiment of the invention.
- the web page 800 may include one or more selectable tabs 805 that, when selected, present different information and/or options to a viewer.
- the tabs 805 may be selected using, for example, a convention keyboard, mouse, touch-screen, voice recognition software, etc.
- the web page 800 may also include a web page identifier 810 that identifies which web page or portion of a web page the viewer is viewing.
- the web page 800 may include an information section 820 that provides information that corresponds to the tab 805 selected.
- the information section 820 may include biographical information pertaining to the user.
- the biographical information may include information such as first name, birthday, hometown, current residence, gender, etc. Additional information may also be included such as interests and messages posted by the user. Any other type of information may also be presented.
- a message field 825 may also be included in the web page 800. The message field 825 enables the viewer to post a message to the user whose web page the viewer is viewing. The message field 825 may enable the viewer to share the message with only the user, the user and his network or possibly other options.
- the web page 800 may also include a status field 830.
- the status field 830 may indicate a type of relationship between the viewer and the user, number of messages exchanged between the viewer and the user, number of times the viewer and user commented about each other's content, number of pieces of content grabbed from each other, etc.
- An association field 835 may also be presented in the web page 800.
- the association field 835 may indicate each manner in which the viewer and user are associated. For example, the association field 835 may include images of' common friends that the viewer and user have.
- a connection field 840 may be provided to indicate whether the viewer is logged- in. If the viewer is logged-in, the connection field 840 may include a log-out option. If the viewer is not logged-in, the connection field 840 may include a log-in option.
- a links field 845 may also be included in the web page 800.
- the links field 845 may include links to other pages on the web site that hosts the user's web page. For example, links may be provided to one or more of the following web pages: frequently asked questions, help, terms of use, about us, copyright information, send feedback, report a bug, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Game Theory and Decision Science (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US48195504P | 2004-01-26 | 2004-01-26 | |
US10/997,121 US8762206B2 (en) | 2003-11-26 | 2004-11-24 | Method and system for word of mouth advertising via a communications network |
PCT/US2005/003086 WO2005072436A2 (en) | 2004-01-26 | 2005-01-26 | Method and apparatus for constructing a networking database and system proactively |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1725982A2 EP1725982A2 (en) | 2006-11-29 |
EP1725982A4 true EP1725982A4 (en) | 2009-03-04 |
Family
ID=34830319
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05712506A Withdrawn EP1725982A4 (en) | 2004-01-26 | 2005-01-26 | Method and apparatus for constructing a networking database and system proactively |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1725982A4 (en) |
WO (1) | WO2005072436A2 (en) |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6175831B1 (en) * | 1997-01-17 | 2001-01-16 | Six Degrees, Inc. | Method and apparatus for constructing a networking database and system |
US7047202B2 (en) * | 2000-07-13 | 2006-05-16 | Amit Jaipuria | Method and apparatus for optimizing networking potential using a secured system for an online community |
US7069308B2 (en) * | 2003-06-16 | 2006-06-27 | Friendster, Inc. | System, method and apparatus for connecting users in an online computer system based on their relationships within social networks |
-
2005
- 2005-01-26 EP EP05712506A patent/EP1725982A4/en not_active Withdrawn
- 2005-01-26 WO PCT/US2005/003086 patent/WO2005072436A2/en active Application Filing
Non-Patent Citations (1)
Title |
---|
"STATEMENT IN ACCORDANCE WITH THE NOTICE FROM THE EUROPEAN PATENT OFFICE DATED 1 OCTOBER 2007 CONCERNING BUSINESS METHODS - EPC / ERKLAERUNG GEMAESS DER MITTEILUNG DES EUROPAEISCHEN PATENTAMTS VOM 1.OKTOBER 2007 UEBER GESCHAEFTSMETHODEN - EPU / DECLARATION CONFORMEMENT AU COMMUNIQUE DE L'OFFICE EUROP", JOURNAL OFFICIEL DE L'OFFICE EUROPEEN DES BREVETS.OFFICIAL JOURNAL OF THE EUROPEAN PATENT OFFICE.AMTSBLATTT DES EUROPAEISCHEN PATENTAMTS, OEB, MUNCHEN, DE, 1 November 2007 (2007-11-01), pages 592 - 593, XP007905525, ISSN: 0170-9291 * |
Also Published As
Publication number | Publication date |
---|---|
EP1725982A2 (en) | 2006-11-29 |
WO2005072436A3 (en) | 2007-02-01 |
WO2005072436A2 (en) | 2005-08-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8452811B2 (en) | Method and apparatus for constructing a networking database and system proactively | |
AU2020203752B2 (en) | Authentication of service requests initiated from a social networking site | |
US10264095B2 (en) | Control for inviting an unauthenticated user to gain access to display of content that is otherwise accessible with an authentication mechanism | |
US7639672B2 (en) | System and method for peer-to-peer internet communication | |
US9282090B2 (en) | Methods and systems for identity verification in a social network using ratings | |
US7627608B2 (en) | Sharing of media using contact data | |
AU2008261648B2 (en) | Personalized social networking application content | |
US8176131B2 (en) | Viral engine for network deployment | |
US6175831B1 (en) | Method and apparatus for constructing a networking database and system | |
US20130262984A1 (en) | System and Method for Identifying Other Users After a Termination of a Relationship | |
US9654595B2 (en) | Dynamically aggregating and configuring access to social networking contacts | |
US20130159527A1 (en) | System and method for electronic social networking | |
US20090216859A1 (en) | Method and apparatus for sharing content among multiple users | |
US20140188944A1 (en) | Relationship Confirmation in an Online Social Network | |
US20050044157A1 (en) | Universal encrypted internet messaging | |
WO2005048078A2 (en) | Web page monitoring and collaboration system | |
US20180013764A1 (en) | Systems and methods for enabling dialog amongst different participant groups with expandable membership | |
US20110030046A1 (en) | Guardian management system | |
EP1725982A2 (en) | Method and apparatus for constructing a networking database and system proactively | |
KR20050086106A (en) | Method of automatic log-in for web sites and method to hold the log-in information in common | |
KR20010106698A (en) | Method for proceeding the personal meeting through Internet and the system | |
WO2007124762A1 (en) | System and method for facilitating the organization of activities among users in a virtual community | |
WO2008056352A2 (en) | A method for connecting disparate forums and socially connecting their members |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20060811 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
PUAK | Availability of information related to the publication of the international search report |
Free format text: ORIGINAL CODE: 0009015 |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20090204 |
|
17Q | First examination report despatched |
Effective date: 20111116 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20130801 |