The present invention pertains to a method and apparatus for sharing information over a network such as the Internet. More particularly, the present invention pertains to the creation and use of a person-to-person network of individuals. For example, through such a network, a first subscriber may obtain an introduction to or referral to a “contact” (e.g., a person, corporation, etc.) which is maintained in the database of a second subscriber.
A personal network is a valuable and underutilized asset. Building personal connections in business, professional and social life is a lifelong process. The foundation of this network is based on trusted relationships. Current methods of expanding and keeping an individual trust network are slow, time consuming and require great personal effort. As is well-known, the most successful people have personal trust networks with exceptional depth and strength that integrate lifetime business and personal relationships into a seamless whole. Business and personal success depends greatly upon the ability to enhance the depth, strength and span of trust networks.
In today's world of information overload it is difficult to rise above the noise of the competition, identify the right economic decision makers and have the opportunity to meet with them in timely manner. Traditional sales and marketing methods and processes are costly and do not provide any guarantee that a message has reached the right person. Personal trust networks are a much more effective method of getting to the right person in time, with relevance. A methodology and technology for rapidly enhancing the depth, strength, and span of a trust network is needed to solve this obvious predicament.
An existing personal trust network has tremendous untapped potential. Accordingly, there is a need to improve the effectiveness of a personal trust network.
Embodiments of the present invention include an information sharing system that provides an online business service from a provider that uses the Internet to enable individuals and organizations to link together contact databases that reside in multiple desktop applications and create a unified meta-database. This database can be searched by individual subscribers in order to locate a specific entity (such as an organization or a person, by name, title or organization, such as an executive in a target organization), identify if a path to the executive exists through a chain of contacts across the linked contact databases, and request a referral based introduction to the specific executive.
a-b are flow diagrams for implementing a method of extracting contact candidates according to an embodiment of the present invention.
a-b are flow diagrams for implementing a method of generating a networked contact management system according to an embodiment of the present invention.
a-c are flow diagrams of a method for creating and searching an index for contacts in the network system according to an embodiment of the present invention.
a-d are flow diagrams of a method for creating/removing a high trust level relationship and for displaying contacts of a high trust level member according to an embodiment of the present invention.
The present invention is based on the concept of selective sharing of trust networks. A subscriber to the present system has the ability to expand a network immediately by sharing it with the subscriber's closest associates, friends and confidants. In turn, they are encouraged to share their trust networks with the subscriber. This process can enable the subscriber to almost exponentially increase the depth, strength and span of a trust network over a relatively short time frame.
According to an embodiment of the present invention, a person-to-person network is created that allows a first subscriber to obtain a referral from or introduction to “contacts” of a second subscriber. This network is a secure, online solution that makes the selective sharing of trust networks a reality.
To become a subscriber to the system according to an embodiment of the present invention, there are two options. The first option is to be invited by an already-existing subscriber. That option allows the potential subscriber to have access (as a subscriber) to the trust network established by the already-existing subscriber. The second option is for a potential subscriber to contact the service provider (such as by going to the provider's web site) and creating a trust network, to which the potential subscriber invites close associates and confidants to also become subscribers. In furtherance of this second option, once the potential subscriber has been approved by the service provider, the potential subscriber is provided with an unique, secure ID that is used to access the service. At this point, the potential subscriber decides which contacts and which information from the potential subscriber's personal computer contact database will be included in the secure online network. Once the potential subscriber has been provided with the secure IUD (thus becoming a subscriber) and has created an online trust network, other members of this trust network who are identified in the subscriber's contact database can be invited to join the system as subscribers and share their respective contact databases with the first named subscriber. The network provider supplies the technology to conduct searches across expanded trust networks while maintaining complete confidentiality of the names and contact information of the search target. The trust network members (subscribers) can also conduct searches across the network of people listed in the database and the system provides for an automated maintenance of changes of contact information within the trust network.
Examples of the features of the present invention can be broadly understood as follows:
First, streamlining and accelerating the process of analyzing the contacts stored in desktop applications, determining the important contacts based on proprietary algorithms, presenting these contacts (typically in a hierarchy) to the individual subscriber for review and enabling the subscriber to upload the selected contacts to a custom networked contact manager, which may be operated by the provider, that is auto-generated on the fly to store the subscribers contacts.
Second, a subscriber can then invite contacts from the subscriber's contact database to join the system and link their contact networks to the contact network of the subscriber. As more and more individuals join the network and become subscribers, the search space of paths to people through trusted referrals grows dramatically.
Features of embodiments of the present invention include the following:
(a) Automated Analysis of E-mails to extract Important Contacts: The subscriber software (such as that used with Microsoft® Outlook) automatically analyzes the “Sent Messages” folder in the subscribers' E-mail systems on desk-top applications and determines the most important contacts in a contact database. An algorithm uses frequency and recentness of communications divided by a time-series to determine the most important contacts over a specified time-frame. The software then prepares and presents this list of contacts to the subscriber for upload (such as to the database maintained by the provider) and to be invited to join the information sharing network. This process reduces the time taken to analyze large data-sets of tens of thousands of contacts to a matter of minutes.
(b) Auto-generation of a Networked Contact Management System through a bulk-upload of contacts from a desktop application. Once the subscriber has uploaded contacts to the system, the system or the provider automatically generates a web based contact management system that is accessible through any web device.
(c) Auto Synchronization of Contacts from a Networked Contact Manager to a Desktop Application: Once a contact database has been created, a subscriber can invite any one of the contacts to join the system. When one of the contacts does accept the invitation and joins the system, the system, preferably under control of the provider, automatically synchronizes the contacts' latest contact information with the existing record in the subscriber's desk-top contact manager. This can be done automatically or on pre-defined intervals. This dramatically reduces the time a user needs to keep his desk-top contact database current and synchronized with the overall contact database.
(d) Searches: The information sharing system includes a number of search processes and search result presentation styles. A subscriber can search for a target executive or organization from within Microsoft® Outlook by entering the search criteria in the information sharing system search box. Searches can also be conducted in the information sharing system's web application. In summary, the search process allows for a search to be initiated from a desktop application through a series of networked (Internet) based contact databases and presents the results back to the subscriber inside the desktop applications. Search results are presented in a number of different formats. Subscribers can then request introductions to their targets directly from within the search result window. Searches are as follows:
A typical search for a target may yield the following results:
General Search: First subscriber John Doe Confidential (Target). The subscriber can then request John Doe to provide an introduction to the target.
Inner Circle Search: First Subscriber John Doe to James Smith, Manager, Target Company. The first subscriber can then request an introduction to Mr. Smith from Mr. Doe. If the First Subscriber and Mr. Doe are members of each other's Inner Circle, there is an explicit advance agreement to allow each other access to the detailed contact information of the contacts in the system contact database.
Confidential Squared Search: First Subscriber->Confidential->Confidential (Target Company). This search indicates that there is someone in the subscriber's own network who can make an introduction to the Target Company, but they want to keep their name private. The First Subscriber can still send the person under the Confidential label an introduction request and get a reply.
Concept of Inner Circle i.e. Reciprocity: The present system has also pioneered the concept of the “Inner Circle” when it connects contact databases of subscribers over the Internet. The inner circle concept allows subscribers to take their relationship to a higher level of trust by enabling them to selectively invite other subscribers to not only search across their contact database but also browse in real time and view detailed contact information on the contacts in their individual databases.
Concept of Groups: The present system also pioneered the concept of search and browse groups in the networked contact database world. In other words, a subscriber may set up a group of contacts that is a sub-set of the subscriber's entire contact database. The subscriber can then provide selective access to the subscriber's contact database by limiting the access of other subscribers to specific groups. This is especially useful in the case where a Senior Executive may want to open up parts of a network database selectively e.g. groups by Account, by project etc.
1. Concept of Gatekeepers: The system may include a search and communication filtering processes embodied in its service. For example, an individual may limit access to his network by setting any number of personal preferences. These include a gatekeeper function where a subscriber designates a second subscriber to screen all search requests that require access to the first subscriber's network.
As another example, a subscriber may impose access filters such as an election to receive search requests only from specific individuals, on predesignated topics and on a pre-specified frequency per month.
A third feature of the present system is referred to as subscriber agent/affinity matching. One of the biggest challenges in social networks is to match individuals based on fuzzy profiles and interests. The present system pioneers the use of Semantic Agents that perform the following tasks:
Profiling and Intelligent Matching of People: The present invention will create profiles of members based on their personal and business information and the connections they are making in the system. The system will then use these rich profiles to create recommendations for introductions between subscribers or contacts who may be working on similar projects, facing similar personal challenges, experiencing similar life transitions, etc. The system will connect members with people they should know based on shared values, vision, goals, etc., and will make the auto-matching of individuals across wide-area networks a reality.
Business Intelligence and Targeted Introductions: Subscribers will have the ability to instruct the system to observe specific industries and companies by mining public and private sources of information. The system would then report back with recommendations on Executives that a subscriber needs to know in a target company based on unique and personalized criteria e.g., a subscriber could make inquiry through the system to ferret out and report back all the senior executives involved in WiFi strategy and investment at a target company. The subscriber could also query the system to find me a path to these Executives through the information sharing system network.
Inferred Networks: The system includes the ability to mine public and private data sources and automatically infer network paths and connections between Executives, Investors, Board Members, Regulatory Officials and Academia. This will enable the system to proactively create high-value specialized network segments to include in its larger network service offering.
The present invention will be described with reference to a network system. In one embodiment, the network system is the Internet, but the present invention can be extended to other types of network systems including local area networks (LANs), wide area networks (WANs), Intranets, etc.
Referring to
Referring to
In this example, user computer 12 is coupled to the network via a web server 13 and an application server 15. As can be seen from
According to an embodiment of the present invention, automated analysis of E-mails is performed to order them in relative importance to the user and extract contact information. Example flow diagrams for implementing such a method are shown in
Once the user authorizes a search of contacts from E-mail (block 34), control passes to block 35 where execution of the program accesses a plurality of E-mail messages at the user's computer. For example, the E-mail messages in the “Sent Messages” folder for the Microsoft® Outlook program may be accessed. In block 36, the E-mail addresses in the “To:” field are read. Other information may be collected as well, in particular timing information (i.e., when the E-mail message was sent). The collected data from the folder are then analyzed locally at the user computer, transmitted back to the server system for analysis, etc. In block 37, the collected addresses are weighted based on relevance. In this embodiment, the weighting is performed based on frequency of occurrences and total number of occurrences. More weight may be placed on contacts appearing more recently. In block 38, the contact information for each E-mail address is read. For example, the address in the “To:” field is matched to the additional information provided for that address in the “Contacts” folder of the Microsoft® Outlook program. This information may include, the contact's name, telephone and fax numbers, address, etc. In blocks 39 and 40, the weight values are matched to the contact information, and stored.
In the example of
According to an embodiment of the present invention, a web-based contact management system may be automatically generated for subsequent access by a user. Referring to
In block 56 a list of contacts for the user is generated (e.g., through the method described in
If the contact is not a member (decision block 67), then control passes to block 75, where the E-mail address for the contact is retrieved along with invite data and a “contact invite” template. In blocks 76-77, an E-mail message is generated for the contact and sent out (see block 78, and an example of this E-mail message is shown in
Referring back to decision block 63, if the contact does not exist in the network database, then control passes to block 64 where a contact entry is created for the network database. The entry would include the contact's information (e.g., E-mail address, office address, phone number, etc.) and also a unique identifier in the system. In block 65, the contact is added to the network database. In both cases a person's contact information is added and related to the member as each member can have a different view of a contact. (e.g., individual users may have different contact information for a different person/entity). In this case, the system will save this person/entity two separate contacts in the individual users' network.) As seen from the above, once the user has identified a collection of contacts, the system is able to automatically generate a networked contact management system. In this embodiment, the system is able to:
At the completion of the method of
According to an embodiment of the present invention, once a contact database has been created for a user, a subscriber may invite any one of the contacts to join the system. When one of the contacts does accept the invitation and joins the system, the system, preferably under control of the provider, automatically synchronizes the contacts' latest contact information with the existing record in the user's contact manager at his/her computer. This can be done automatically or on pre-defined intervals.
Referring to
In decision block 85 it is determined whether user synchronization preferences allow for automatic overwrite of the user's local database of contact. If it does allow automatic overwrite, then in block 86, the contact data in the user's local database is updated. If it does not, then control passes to block 87 and the discrepancy is ignored. Such information may be forwarded to the user so that he/she may make explicit decisions as to whether to update his/her database. Using this method may dramatically reduce the time a user needs to keep his/her local contact database current and synchronized with the overall contact database of the network (as kept by the server system).
Once a user has created his/her contact database, the resulting network database of contacts may be searched in a variety of ways. For example, the system of the present invention may include a number of search processes and search result presentation styles. A subscriber to the network system may search for a target executive or organization from within Microsoft® Outlook by entering the search criteria in the information sharing system search box. Searches may also be conducted in the information sharing system's web application. In summary, the search process allows for a search to be initiated from a desktop application through a series of networked (e.g., Internet) based contact databases and presents the results back to the subscriber inside the desktop applications. Search results are presented in a number of different formats. Subscribers can then request introductions to their targets directly from within the search result window.
Referring to
In block 99, the program loops for all members to find “friends” (as described above) in block 100. Then, in block 101 and 102, the program loops through each friend to collect the contacts associated with that friend. In block 103, the relationships between friends and contacts is formed in a relationship graph. In other words, the relationship graph represents the user's relationship to its friends and contacts as well as the contacts of the user's friends. In block 104, the relationship graph is stored.
Referring to
In block 119, the program loops through the results set and for each match, retrieves the contact/member ID (block 120) and the data associated with the contact/member ID is retrieved (block 121). In block 122, the data from the database on the matched contact/member is binded with the search results. A result data set is created (block 123). Then for each result set, the program looks through the matches to rank the results (block 124). In this embodiment, the results are ranked first by shortest path. In other words, if the matching contact is a “friend” of the user, then such a path would be shorter compared to a matching contact that was only a contact of a “friend” of the user. The results can also be ranked by a trust level of the matching contact. In this embodiment, “inner circle” contacts (block 126) are ranked higher than “friend” contacts (block 127) and general contacts (block 128). In block 129, the result data set is created.
Referring to
According to one embodiment of the present invention, if the matching contact is not a confidential member (decision block 141), then control passes to block 143 to determine if the relationship path between the matching contact and the user includes an “inner circle” contact. If so, then control passes to decision block 144 to determine the number of degrees between the user and the matched contact (i.e., how many people are between the user and the matched contact in the relationship graph). If there is one degree of separation, then control passes to block 145, and the name, title, and company of the inner circle friend can be displayed as will as the matching contact's information (block 146), and control passes to blocks 148 and 150. If the matching contact is more than 1 degree separated from the user, then only the title and company of the matching contact (block 147) can be displayed.
If there are no inner circle members between the user and the matching contact, then control passes to decision block 149 to determine whether there is a “friend” between the user and the matching contact. If there is, then control passes to decision block 144 to determine the number of degrees between the user and the matching contact, as with the “inner circle” example, in this embodiment, if there is only the “friend” between the matching contact and the user, the contact information for the friend and the contact is shown. If there is no friend in the relationship path between the user and the matching contact, then the matching contact is simply a contact and only the title and company of the matching contact is shown (block 147) in this embodiment.
Referring to
As discussed above, a trust level may be assigned to each contact in a subscriber's contact list. According to an embodiment of the present invention, the “inner circle” trust level is the highest level that can be assigned to a contact. The inner circle trust level allows subscribers to selectively invite other subscribers to not only search across their contact database but also browse in real time and view detailed contact information on the contacts in their individual databases.
Referring to
Referring to
Referring to
As described above, setting the trust level to a high level (e.g., “inner circle”) allows a user to see more information on the contacts for the member having such a high trust level. In the example of
Although several embodiments are specifically illustrated and described herein, it will be appreciated that modifications and variations of the present invention are covered by the above teachings and within the purview of the appended claims without departing from the spirit and intended scope of the invention.
The present application claims priority to U.S. Provisional Patent Application No. 60/491,561 filed on Aug. 1, 2003, the disclosure of which is incorporated herein in its entirety.
Number | Date | Country | |
---|---|---|---|
60491561 | Aug 2003 | US |