The following is a tabulation of some prior art that presently appears relevant to this application:
Analysis of user keyword similarity in online social networks—Bhattacharyya et al., Jun. 3, 2010
Over the past few years, the Internet has seen a rise in the number of websites available. One type of such websites are online dating and social networking websites. These websites are designed to allow human users to post information about themselves, in what is called a profile. The profile typically contains one or more traits that the user has. Such traits include but are not limited to: age, gender, pictures of the user, and possibly profession, work experience and physical address. We interchangeably refer to those user traits hereafter as characteristics or properties. Those profiles can serve a variety of purposes: in online dating, the profiles give other users of the website a general idea of what the user looks like and allows those other people to decide whether they think the user would be a good romantic match for them. In social networking, the profile is put up to allow friends and family to see it, and let them keep in touch with the user through e-mail, messaging, or other means. In business online networks, the profile can serve as a resume to allow other professionals, recruiters or companies to evaluate the user and potentially consider him as a candidate for a job opening.
In nearly all of the situations described above, the human user creates a page that he believes will best portray him in the online community that he joined, and allow him to achieve certain goals: for example, finding a romantic partner in online dating, getting a job offer in business networks, and so on. There are several other situations where websites are advertising users' profiles, and several websites where the users are the main product of the website. With the rise of social networking, these websites are becoming more and more dominant.
One issue that a lot of users seem to suffer from is crafting well targeted and interesting messages when trying to communicate with another user of the website who they have not or rarely interacted with. This is particularly prevalent in online dating and in business networking, where a lack of experience can result in the user sending subpar messages to their target.
In many of these cases, a user trying to message a second user, can benefit from having a third user, who is similar to the second user, review the message before it is sent.
We use the words critique, feedback and reviews interchangeably throughout the text to mean the act of one user C looking at a second user A's message, and C giving user A information about how C believes that A can improve his message to better help him reach his target audience. A critique can be numeric such as a grading system associated with a question, textual or both. For example, a piece of critique information on a business site that user C could give about user A's message, could be: “Your message is good but a little unoriginal—try talking more about why you think you're a good fit for this job”.
We will also be referring to social networking website below but the method applies to all kinds of websites where it is possible for a user to message another user from within the website.
We use the word website to denote the set of all links contained within the same internet web domain. For example foo.com is a website associated with the URL http://foo.com/user1 or with URL http://mail.foo.com/otherlink/somethingelse.
This summary is meant to introduce a few concepts in a simplified form that are further described below in the Detailed Description. It is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The premise of this application is that for social networking websites, online dating sites, business networking websites, it would be useful if there was a simple way to get a message from user A to user B reviewed by a user C who is similar to user B, before it was delivered to user B's inbox.
One embodiment for solving this problem follows: we propose a method by which a user can request feedback about his message before it is delivered to its target recipient, by another user who is similar to the target recipient.
We describe several other embodiments in the detailed description and claims.
The advantages of such a system is that it allows users to avoid common pitfalls when sending message to people that they are not used sending to, while getting more experienced individuals to review them.
In the first step 101, user A logs into the website under consideration W. This can be a social networking website, an online dating website, a business networking website, or any other website where users can communicate with other users from within the website.
User A then visits User B′s profile as shown in 102. This is a task that is common in today's websites.
User A then writes and sends a message M to user B using the website W's interface as shown in 103. The message is stored in W's server database or it can be stored in an external database, and user B may be at this time notified that a message has arrived in his inbox. In some websites, it is also possible for user B not to be notified of the arrival of a message. Either way the message M is now delivered into user B's inbox as in 104.
User B then logs into his inbox using the website and sees a message is waiting for him, as shown in 105. He may then choose to open and read that message.
This flow is the well-known flow used by many websites that are currently in existence. They allow direct messaging from one user to another without any intermediate review.
As before, the user A first logs into the website W as shown in 201, then navigates to user B's profile as shown in 202. At that point, user A decides to send a message to user B.
After writing and entering the message, user A may be prompted whether he would like someone to review said message before it is actually delivered to user B, as shown in 203. If the user declines, then the message is immediately delivered to user B's inbox as was done in
In 204, the server has available to it: who the sending user is (user A), who the receiving user is (user B), and what the message is (message M). By looking through its database, the server attempts to locate a user C who is similar to user B. In the main embodiment, any such user C will do but in another embodiment, only users meeting certain criteria and who have not opted out of reviewing messages can be considered. By similar, we mean: within the same age range, or in the same industry, or same gender, or with similar descriptions about themselves. By similar description we refer to any of the techniques that are currently available for comparing the similarity between two documents. A similarity score is computed based on the above factors—the means of calculating said similarity scores are well documented in the literature. We've referenced one such published paper that's used to compute user similarity by Bhattacharyya in the non-patent literature section above, but the techniques are explained in other books and papers that have been published.
Once a user C who's similar to user B has been located, the server S modifies the message M to make it clear that this message is intended for someone else (user B) and that it is being sent to user C in order to get reviews, as shown in 205. There are several ways to modify the message but one simple option could be to add the following header: “User A would like your feedback on this message that he is sending to user B”, and then additionally include a link to user A's profile, user B's profile and the message itself. There are many other variants and sentences that can be used to achieve this. It is then delivered to user C's inbox instead of user B's inbox as shown in 206. At this point, user C is notified by electronic mail or messaging that a message is pending his review. In another embodiment, user C would not be notified.
At a later point in time, user C logs into the website and views the request to review a message, as shown in 207. That review request includes user A's profile, user B's profile as well as the message content. In some embodiments, user A and user B's profiles have both been stripped of any identifying information such as name, pictures, addresses, or user IDs. In other embodiments, only user B's profile has been anonymized, and in other embodiments none of the users have been anonymized.
User C may then choose to read the message and review it (208), or he may ignore it entirely. If user C does choose to review it, then he will rate the quality of the message on a score scale, and optionally give additional text feedback about how to improve the message. The score scale can be similar to a star-rating system (i.e. one to five stars), or a simple yes/no grade, as well as any of the equivalent well-known ways to grade scores. The feedback that user C gives is intended to attempt to improve the quality of message M, and since user C is selected so that he is similar to user B, he may have more insight as to how to improve said message.
At this point, user C knows whether he finds the message acceptable (209) and whether he subjectively believes that user B will like the message. If he believes that user B will like message (210), then by marking it as acceptable or scoring it highly, the server understands that this is a message that can now be forwarded to user B with no further modifications. In another embodiment, user A may request that the message not be forwarded to user B even if user C found it acceptable, in which case the flow would continue to step 211.
If user C did not like the message sent by user A, as is the case in 211, the server will send back a notification to user A along with the feedback given by user C, and will not forward message M to user B.
To summarize the above flow, user C acts as a gatekeeper for user B's inbox and user A's reputation by ensuring that only messages that he believes are of high quality make it through from user A to user B.
In the context of professional business networking for example, let's say user A has recently graduated college and has only two years of work experience. User A wants to contact the CEO of a company and crafts his own message. He can then request that somebody in a similar position to that CEO review his message before it is sent, to improve his chances of getting said CEO's attention.
In the context of online dating for example, let's say user A is trying to find a romantic partner on website W. User A has messaged a few other users, but has received little to no interest. User A can then request his message to be reviewed by another user C before it reaches his intended recipient user B, so that user C can notify him of anything blatantly wrong with his message. The server would then be responsible for automatically finding a user which is suitable to give such feedback, in this case user C.
A scenario with this architecture would be that user 405 through his use of computing device 403, connects to the server 402 and interfaces with his device to send a message M to user 406. The device in turn relays information over the network 401 and such information is stored on the database of the server. The server then looks through the database for users similar to 406. Let's assume in this case that user 407 was the user who was very similar to 406 and who was found in the database. The server notifies the computing devices of 407, typically through e-mail or instant messaging. 407, through the use of his computing device will then be able to read the profile of user 405, the profile of user 406, as well as the message M, and enter feedback about said message into his terminal. Once 407 is done writing his feedback, he would submit it electronically through the use of the terminal, and that feedback would be sent over the internet back to server 402 and stored into the database. At that point, user 405 would be notified by said server that a review for his message is available, and would be able to view said review using his terminal. If said review was positive in nature, the message M would also be forwarded to user 406 as it was originally intended to do—otherwise, the message would not be forwarded.
The above described the preferred embodiment, but there are several alternate embodiments which are described hereafter.
We believe there are several ways to implement the overall system described above. The common factors are that a user on website W wants a simplified way to get his message reviewed by someone before it arrives at his intended recipient.
One such embodiment is described in
In particular, if user C does like the message as shown in 309, then the message will be delivered to the original intended recipient user B (as in 311), otherwise if user C does not like the message, the feedback given by user C will be sent back to user A (310). The next step is where the difference is—at this point, user C may be compensated for his efforts. To explain further, user C may be rewarded for submitting his review about user A's message, or he can be rewarded if user A deems user C's review to be above a certain quality or helpfulness threshold. For example, in one embodiment, a user whose message was reviewed can have the option of selecting whether the review was useful, or to grade it on a scale from one to five, and those would serve as thresholds. Such rewards may be purely virtual, such as points on the website, or they may be monetary. For example of a virtual reward, people who have done the highest number of useful message reviews may get a higher ranking in web searches or higher profile placements within the website, or may even redeem the points to get gifts or free website subscription months. By useful reviews here we mean a review that was submitted to user A that user A later accepted as being useful through the website. The review reward could be monetary with user A offering money to website S and website S distributing this money to message reviewers while potentially keeping a commission.
In another embodiment, the server may only select intermediary users (we use intermediary users here to describe a user who is not the intended recipient of the message but who reads it and has the option to review it before said message is sent to its actual intended recipient) who are similar to the target user but also unlikely to actually know the target user. For example, if user A is e-mailing the CEO of a company in the US, a possible intermediate user might be the CEO of an unrelated company in Canada.
In yet another embodiment, a user can require anyone who messages him to have his message undergo a review—for example, highly influential individuals on business networks, or highly desirable individuals on online dating websites might prefer not to waste their time dealing with subpar messages and would prefer to have someone else review their messages first.
In another embodiment, the user may ask for his intermediary reviewer to be geographically distant from his intended user, and then the server would make sure that said intermediary is at least a specified number of miles away.
Thus the reader will see that at least one embodiment of the message review system described above will allow users to easily get valuable feedback about their messages from people who are well suited to give such feedback, before said messages are allowed to reach their intended recipients.
While the above description contains many specificities, these should not be construed as limitations on the scope but rather as an exemplification of one or several embodiments thereof. Many other variations are possible. For example, it may be possible for the review requests to be sent on a separate website—i.e. for a messages M sent within a website W, website R can be used to request reviews of M.
Accordingly, the scope should be determined not by the embodiments illustrated, but by the appended claims and their legal equivalents.