The present invention relates generally to methods and systems for identifying connections between users and links between articles. For example, embodiments of the present invention relate generally to methods and systems for using social networks to identify connections between users, such as members in the social networks, and correlating such connections with links between articles.
Online advertising and search engines are ubiquitous on the Internet and World Wide Web. Online advertising in such forms as banner ads and pop-up ads include links that implore viewers to click on the ads and be directed to a linked website for further information on the advertised products or services. Advertisers entice websites to host ads by, for example, paying a flat periodic fee or a set fee per each click through (i.e., a click on the ad to be directed to an advertiser's site). Such financial structure for online advertising is susceptible to ad spamming. For example, webmasters of ad-hosting websites can attempt to increase their financial gains from advertisers by collaborating with one another to excessively click on ads hosted on their websites to increase the number of click-throughs or give the appearance that such ads enjoy high traffic.
A search engine, such as the Google™ search engine, returns a result set in response to an input query submitted by a user. Such search engine may use one or more various methods for performing information retrieval. For example, one known method, described in an article entitled “The Anatomy of a Large-Scale Hypertextual Search Engine,” by Sergey Brin and Lawrence Page, assigns a degree of importance to a document, such as a web page, based on the link structure of the web page. The search engine ranks or sorts the individual articles or documents in the result set based on a variety of measures. For example, the search engine may rank the results based on a popularity score. The search engine generally places the most popular results at the beginning of the result set.
Search methods that rely on link structures also can be susceptible to search spamming. For example, a plurality of webmasters or web administrators can collaborate and link their websites with one another to increase the links to each website, or a single particular website, in order to increase the website's ranking and/or chance of appearance in a search result set returned by the search methods.
Social networking websites such as those hosted on Orkut™, Friendster™ Tribe™, or other websites, allow users to form social networks and become network members. Such networks on the social networking websites allow members of each social network to communicate with each other and list announcements associated with the social network. Generally, these social networks do not communicate with search engines and online advertisers, particularly those that rely on web link structures for searching queries, in order to correlate connections between users and links between websites or web documents and identify ad and search spammings.
Embodiments of the present invention provide methods and systems for correlating connections between users and links between articles. In one embodiment of the present invention, there is provided a method comprising: identifying first associations between a plurality of users in a network of associated users; identifying second associations between one or more users and one or more articles; identifying third associations between at least some of the articles or between some of the users and access to some of the articles; and determining at least one of the third associations is correlated with one or more of the first associations.
The aforementioned embodiment is mentioned not to limit or define the invention, but to provide an example of embodiments of the invention to aid understanding thereof. Such an exemplary embodiment is discussed in the Detailed Description, and further description of the invention is provided there. Advantages offered by the various embodiments of the present invention may be further understood by examining this specification.
The embodiments of the present invention are illustrated by way of example in, and not limited to, the following figures:
Overview
As referred herein, search spamming includes any unauthorized or “unnatural” manipulation or exploitation of a search engine's searching methodology and/or search result sets in order to affect the listing and/or ranking of article identifiers in the search result sets. Likewise, as referred herein, ad spamming includes any unnatural manipulation of accesses to ads or the monitoring of ad access (e.g., an unnatural manipulation may include clicks on ads that are driven by some motive other than genuine consumer interest in the content of the ad).
Also, as referred herein, a search result set comprises one or more identifiers of articles that are relevant to a search query. Articles include, for example: word processor, spreadsheet, presentation, e-mail, instant messenger, database, and other client application program content files or groups of files; web pages of various formats (e.g., HTML, XML, XHTML); portable document format (PDF) files; audio files; video files; or any other documents or groups of documents or information of any type whatsoever. Articles can be used as ads to advertise products or services. An article identifier may be, for example, a uniform resource locator (URL), a uniform resource identifier (URI), an Internet Protocol (IP) address, a file name, a link, an icon, a path for a local file, or anything else that identifies an article.
Further, as referred herein, each article has an article administrator that is responsible for the design, implementation, and/or maintenance of the article. Each article administrator can be identified by one or more administrator identifiers, which may be, for example, a name of an article administrator, an e-mail address of an article administrator, or anything else that can identify an article administrator.
Embodiments of the present invention provide methods and systems for identifying connections between users and links between articles and correlating the connections and links to determine the independence of such links. In one embodiment, the method begins with a determination of connections between users based on personalization information obtained from a social network to which the users belong. The connections information is then stored in a database. Next, desired articles are located from a network to test the independence of any links to and/or from such articles. The administrators of such articles, links to and from the articles, and the administrators of such links are also identified and stored in an article index. Next, the connections information is retrieved from the database for correlation with the information stored in the article index to determine whether the links to and from the articles are independent, e.g., such links are not based on existing relationships/associations found between the users in the social network.
System Architecture
Various systems in accordance with the present invention may be constructed.
Referring now to the drawings in which like numerals indicate like elements throughout the several figures,
Each of the client devices 102a-n includes a memory 108, which can be a computer-readable medium (CRM), such as a random access memory (RAM), coupled to a processor 110. The processor 110 executes computer-executable program instructions stored in the client device, such as memory 108, as program code. Such processor may include a microprocessor, an ASIC, and state machines. Such processors include, or may be in communication with, media, for example computer-readable media, which stores instructions that, when executed by the processor, cause the processor to perform the methods described herein. Moreover, the processor 110 can be any of a number of computer processors, such as processors from Intel Corporation of Santa Clara, Calif. and Motorola Corporation of Schaumburg, Ill. Embodiments of computer-readable media include, but are not limited to, an electronic, optical, magnetic, or other storage or transmission device capable of providing a processor, such as the processor 110 of client 102a, with computer-readable instructions. Other examples of suitable media include, but are not limited to, a floppy disk, CD-ROM, DVD, magnetic disk, memory chip, ROM, RAM, an ASIC, a configured processor, all optical media, all magnetic tape or other magnetic media, or any other medium from which a computer processor can read instructions. Also, various other forms of computer-readable media may transmit or carry instructions to a computer, including a router, switch, private or public network, or other transmission device or channel, both wired and wireless. The instructions may include code from any suitable computer-programming language, including, for example, C, C++, C#, Visual Basic, Java, Python, Perl, and JavaScript.
Client devices 102a-n can also include a number of external or internal devices such as a mouse, a CD-ROM drive, a DVD drive, a keyboard, a display, or other input or output devices. Examples of client devices 102a-n are personal computers, digital assistants, personal digital assistants (PDAs), cellular phones, mobile phones, smart phones, pagers, digital tablets, laptop computers, Internet appliances, and other processor-based devices. In general, the client devices 102a-n can be any type of processor-based platform that operates on any operating system capable of supporting one or more client application programs. Client devices 102a-n may operate on any operating system capable of supporting a browser or browser-enabled application, such as Microsoft® Windows® or Linux. The client devices 102a-n shown include, for example, personal computers executing a browser application program such as Microsoft Corporation's Internet Explorer™, Netscape Communication Corporation's Netscape Navigator™, and Apple Computer, Inc.'s Safari™.
Through the client devices 102a-n, users 112a-n can communicate over the network 106 with each other and with other sites, systems and devices coupled to the network 106. As shown in
The search site 150 shown includes a server device 152 executing a search application program. Similar to the client devices 102a-n, the server device 152 shown includes a processor 154 coupled to a CRM 156. Server device 152, depicted as a single computer system, may be implemented as a network of computer processors. Examples of the server device 162 are servers, mainframe computers, networked computers, a processor-based device, and similar types of systems and devices. The server processor 154 can be any of a number of computer processors, such as processors from Intel Corporation of Santa Clara, Calif. and Motorola Corporation of Schaumburg, Ill.
Memory 156 contains a search application program, also known as a search engine 158. The search engine 158 locates relevant information in response to a search query from one of the client devices 102a-n, e.g., the client device 102a. The search engine 158 then provides a search result set to the client device 102a via the network 106. The search result set comprises one or more identifiers of articles that are relevant to the search query. Articles include, for example: word processor, spreadsheet, presentation, e-mail, instant messenger, database, and other client application program content files or groups of files; web pages or websites of various formats (e.g., HTML, XML, XHTML); portable document format (PDF) files; audio files; video files; or any other documents or groups of documents or information of any type whatsoever. Articles can be used as ads to advertise products or services. An article identifier may be, for example, a uniform resource locator (URL), a uniform resource identifier (URI), an Internet Protocol (IP) address, a file name, a link, an icon, a path for a local file, or anything else that identifies an article.
The social network site 160 shown includes a social network database 170 and a server device 162 executing a social network engine application program. Similar to the client devices 102a-n, the server device 162 shown includes a processor 164 coupled to a CRM 166. The server device 162 is in communication with a social network database 170. Server device 162, depicted as a single computer system, may be implemented as a network of computer processors. Examples of the server device 162 are servers, mainframe computers, networked computers, a processor-based device, and similar types of systems and devices. The server processor 164 can be any of a number of suitable computer processors, such as processors from Intel Corporation of Santa Clara, Calif. and Motorola Corporation of Schaumburg, Ill.
Memory 166 in the server device 162 contains a social network engine application program, also known as a social network engine 168. The social network engine 168 allows users, such as user 112a, to interact with and participate in a social network. A social network can refer to a network connecting people or organization by a set of relationships, such as social relationships like friendship, co-working, or information exchange. A social network can include profiles that can be associated with other profiles. Each profile may represent a member and a member can be, for example, a person, an organization, a business, a corporation, a community, a fictitious person, or other entity. Each profile can contain entries, and each entry can include information associated with a profile. Examples of entries for a person profile can include information regarding relationship status, birth date, age, children, ethnicity, religion, political view, sense of humor, sexual orientation, fashion preferences, smoking habits, drinking habits, pets, hometown location, passions, sports, activities, favorite books, music, television, or movie preferences, favorite cuisines, email addresses, location information, IM name, phone number, address, skills, career, or any other information describing, identifying, or otherwise associated with a profile. Entries for a business profile can include market sector, customer base, location, supplier information, net profits, net worth, number of employees, stock performance, or other types of information associated with the business profile.
Additionally, entries within a profile can include associations with other profiles. Associations between profiles within a social network can include, for example, friendships, business relationships, acquaintances, community or group associations, activity partner associations, common interest associations, common characteristic associations, or any other suitable type of relationship connection (e.g., social relationship connection). Members can set up new associations or join existing associations in the social network as desired. For example, a member can set up a “Computer Science community” for those members who are interested or work in the computer science field. Likewise, a member can join an existing “Baseball community” if the member is interested in baseball and/or sport in general. Associations between profiles can also have various levels. For example, friendship levels can include, for example, a “haven't met” level, an “acquaintance” level, a “friend” level, a “good friend” level, a “best friend” level, and other suitable levels.
A degree of separation based on associations between profiles can also be determined. For example, a degree of separation can be determined based on the fewest number of associations between two profiles. Thus, if profile A is a friend of profile B, and profile B is a friend of profile C, there can be a degree of separation of two between profiles A and C. A degree of separation can be type specific or type neutral. Type specific degrees of separation only count relationships of a certain type. Thus, for example, in the case above where A is a friend of B, and B is a friend of C, there is a friendship degree separation of two, even if A is directly associated with C by a business association, which would otherwise produce a degree of separation of 1.
Server device 162 of the social network site 160 also provides access to storage elements, such as a social network storage element, in the example shown in
In operation, the social network engine 168 stores connections information of members in the social network database 170. Next, the search engine 158, or related devices, can perform a crawl of the network 106 to identify: desired articles, administrators of the articles, links to and/or from the articles, and administrators of such links. Such information, once identified, can be stored in an article index for storage in memory 156 or any suitable data storage device. The search engine can subsequently retrieve the information in the article index and correlate with the connections information stored in the social network database 170 to fine tune future searches and/or identify ad spamming.
It should be noted that the present invention may include systems having different architecture than that which is shown in
Each member profile can contain entries, and each entry can comprise information associated with a profile. For example, a person's member profile can contain: personal information, such as relationship status, birth date, age, children, ethnicity, religion, political view, sense of humor, sexual orientation, fashion preferences, smoking habits, drinking habits, pets, hometown location, passions, sports, activities, favorite books or music, television or movie preferences, and favorite cuisines; contact information, such as email addresses, location information, instant messenger name, telephone numbers, and address; professional information, such as job title, employer, and skills; educational information, such as schools attended and degrees obtained, and any other suitable information describing, identifying, or otherwise associated with a person. A business' member profile can, for example, contain a description of the business, and information about its market sector, customer base, location, suppliers, net profits, net worth, number of employees, stock performance, contact information, and other types of suitable information associated with the business.
A member profile can also contain rating information associated with the member. For example, the member can be rated or scored by other members of the social network 200 in specific categories, such as humor, intelligence, fashion, trustworthiness, sexiness, and coolness. A member's category ratings can be contained in the member's profile. In one embodiment of the social network, a member can have fans. Fans can be other members who have indicated that they are “fans” of the member. Rating information can also include the number of fans of a member and identifiers of the fans. Rating information can also include the rate at which a member accumulated ratings or fans and how recently the member has been rated or acquired fans.
A member profile can also contain membership information associated with the member. Membership information can include information about a member's login patterns to the social network, such as the frequency that the member logs in to the social network and the member's most recent login to the social network. Membership information can also include information about the rate and frequency that a member profile gains associations to other member profiles. In a social network that comprises advertising or sponsorship, a member profile may contain consumer information. Consumer information may include the frequency, patterns, types, or number of purchases the member makes, information about which web sites the member has accessed or used, or information about which advertisers or sponsors the member has accessed, patronized, or used.
A member profile may comprise data stored in memory. The profile, in addition to comprising data about the member, can also comprise data relating to others. For example, a member profile can contain an identification of associations or virtual links with other member profiles. In one embodiment, a member profile includes an identification of association(s) to which the member belongs. For example, a member profile can indicate that the member belongs to the Computer Science community. In another embodiment, a member profile may comprise a hyperlink associated with another member's profile. In one such association, the other member's profile may contain a reciprocal hyperlink associated with the first member's profile. A member's profile may also contain information excerpted from another associated member's profile, such as a thumbnail image of the associated member, his or her age, marital status, and location, as well as an indication of the number of members with which the associated member is associated. In one embodiment, a member's profile may comprise a list of other members' profiles with which the member wishes to be associated.
An association may be designated manually or automatically. For example, a member may designate associated members manually by selecting other profiles and indicating an association that can be recorded in the member's profile. Also, an association between two profiles may comprise an association automatically generated in response to a predetermined number of common entries, aspects, or elements in the two members' profiles. In one embodiment, a member profile may be associated with all of the other member profiles comprising a predetermined number or percentage of common entries, such as interests, hobbies, likes, dislikes, employers and/or habits.
Associations between profiles within a social network can be of a single type or can be multiple types and can include, for example, friendship associations, business associations, family associations, community associations, school associations, or any other suitable type of link between profiles. Associations can further be weighted to represent the strength of the association. For example, a friendship association can be weighted more than a school association. Each type of association can have various levels with different weights associated with each level. For example, a friendship association can be classified according to which of a plurality of friendship association levels it belongs to. In one embodiment, a friendship association may be assigned a level by the member from a list of levels comprising: a best friend, a good friend, a regular friend, an acquaintance, and a friend the member has not met.
In
Referring to
Each member represented by the profiles A, B, C, D, E, F, and G comprising the vertices 202, 204, 206, 208, 210, 212, and 214, respectively, for purposes of illustration, comprises a person. Other types of members can be in social network 200. For example, communities, special interest groups, organizations, political parties, universities, and legal persons, such as corporations and business partnerships may be members of the social network 200. The associations 218, 220, 222, 224, 226, 228, 230, 232, and 234 illustrated in
Other embodiments of the present invention may comprise directed associations or other types of associations. Directed associations can associate a first profile with a second profile while not requiring the second profile to be associated with the first profile. For example, profile A can be associated by a friendship association with profile B, and profile B can be unassociated with profile A, or profile B can be associated with profile A through a different type of association, such as a business association. Thus a display of profile A's friends would include profile B, but a display of profile B's friends would not include profile A.
Within a social network, a degree of separation can be determined for associated profiles. In one embodiment, a degree of separation between two profiles can be determined by the fewest number of edges of a certain type separating the associated profiles. In another embodiment, a type-specific degree of separation may be determined. A type-specific degree of separation comprises a degree of separation determined based on one particular type of association. For example, a profile A has a friend association degree of separation of two from profile E. The fewest number of friendship associations between profile A and profile E is two—the friendship association comprising edge 222 between profiles A and D and the friendship association comprising edge 234 between profiles D and E. Thus, for the associated profiles A and E, the degree of friendship separation, determined according to one aspect of one embodiment of the present invention, is two.
Another type-specific degree of separation can also be determined for profiles A and E. For example, a common characteristic degree of separation can be determined by determining the fewest number of common characteristic associations separating profile A and profile E. According to the embodiment depicted in
According to other aspects of certain embodiments of the present invention, the degree of separation may be determined by use of a weighting factor assigned to each association. For example, close friendships can be weighted higher than more distant friendships. According to certain aspects of embodiments using a weighting factor, a higher weighting factor for an association can reduce the degree of separation between profiles and lower weighting factors can increase the degree of separation. This can be accomplished, for example, by establishing an inverse relationship between each associations and a corresponding weighting factor prior to summing the associations. Thus, highly weighted associations would contribute less to the resulting sum than lower weighted associations.
Process
Various methods or processes in accordance with the present invention may be constructed. For example, in one embodiment, the method begins with the social network engine 168 determining connections information between members in a social network and storing the connections information in the memory 156 or any suitable memory device or database. Next, the search engine 158 locates the desired articles for review, e.g., for search or ad spamming, and identifies the administrator responsible for such articles. The search engine 158 also identifies links to or from the desired articles based on a content search of such articles or a back tracing or tracking of accesses to such articles. The search engine 158 further identifies the administrator of each link so that it can correlate such information with the connections information and determine the independence of each link. In an alternative embodiment, a search site or search engine is not required. Instead, a crawl or any other method can be used to retrieve the contents of desired web sites to locate desired articles for review, links to and from those desired articles, and administrators of such links.
Referring now to the method depicted in
At 320, the social network engine 168 stores the connections information in the social network database 170, or another data storage device, at the social network site 160 or any other desired site. The connections information for each connection includes: 1) information identifying the members that are connected to or associated with one another; 2) the type or types of connection/association between the members, including the degree of separation between the members and any virtual links between the members; and 3) the level and weight assigned to each type of association.
Each member can be identified by the member's name, e-mail address, telephone number, address, and/or any other information that can uniquely identify the member and is maintained by the social network. As mentioned earlier in the exemplary social network description, the types of connection or association include: friendships, business relationships, family associations, acquaintances, community or group associations, activity partner associations, common interest associations, common characteristic associations, or any other suitable type of relationship connections (e.g., social relationship connection). For example, referring to the social network 200 in
Likewise, the connections information determined and stored in the social network database 170 for the connection/association between profile A (vertex 202) and profile G (vertex 214) would include: 1) information identifying a member A to which the profile A belongs and a member G to which the profile G belongs; 2) the two-degree-of-separation friendship association (edges 232 and 236) between members A and G; and 3) a lower weight assigned to such friendship association, relative to the weight assigned to the friendship association (edge 232) between members A and C.
Referring back to the method shown in
Next, at 340, also from the network crawl, the search engine 158 identifies the webmaster, web administrator, the owner, or any other entity responsible for the design, implementation, operation, and/or maintenance of each article in order to associate an administrator identifier with each of desired articles that have been located. The article administrator can be identified through a search of the content of each article for any information that can identify the administrator. For example, an article such as a website can be searched for contact or authorship information (e.g., name, e-mail address, postal address and/or telephone number). In another example, an article administrator can be identified from a domain name registration service that provides registration for the particular article or the web site that hosts the article. In another example, an article administrator may be inferred from access patterns; for example, it can be inferred that a user is likely to be the administrator of a site based on the frequency or uniformity of accesses to articles on the site (e.g., other users may access specific pages while the administrator may access more of the pages when testing their site, or the administrator may regularly check certain pages). In another example, an article administrator may be identified by analyzing a news group of bulletin board postings where the administrator refers to the article or an associated entity such as a web site.
At 350, also from the network crawl, the search engine 158 searches the content of each desired article to determine if it provides links to other articles. For example, the content of a first desired article (hereinafter, “linking article”) is searched to determine if it provides links to one or more other articles (hereinafter, “destination articles”). Furthermore, the search engine 158 can search the contents of the destination articles to determine whether they provide links back to the first linking article. It should be noted that the destination articles can include the desired articles located at 330 or other articles.
At 360, assuming that the linking article provides links to one or more destination articles, the search engine 158 also obtains administrator identifiers for such destination articles in the same manner as explained at 340.
At 370, the search engine 158 indexes the desired articles (i.e., linking articles) by their article identifiers, administrator identifiers, links to other destination articles, the administrator identifiers for the destination articles, and any links from the destination articles back to the linking articles in an article index for storage in memory 156 or any suitable data storage device. The article index can be in a spreadsheet or table format, or any other format, that allows a search for an article, and its associated administrator through an administrator identifier. In other embodiments, the desired articles can be processed in some order, without being indexed, for storage in and subsequent retrieval from memory 156 or any suitable data storage device. Further, the processing of the desired articles may occur anywhere at the search site 150 or any other location(s), and on one or more machines, servers, or systems.
At 380, the search engine 158 communicates with the social network engine 168 to: 1) look up the stored connections information in the social network database 170; 2) correlate the connections information with the information found in the article index to determine types of association, including association levels and weights given, between administrators of linking articles and those of destination articles; and 3) assign searching weights or importance of each links between articles for future searches at the search site 150 with the search engine 158. For example, referring back to the social network 200 in
Referring now to the method depicted in
At 420, the social network engine 168 also stores the connections information in the social network database 170, or another data storage device, at the social network site 160 or any other desired site. The connections information for each connection includes: 1) information identifying the members that are connected to or associated with one another; 2) the type or types of connection/association between the members, including the degree of separation between the members and any virtual links between the members; and 3) the level and weight assigned to each type of association.
As mentioned earlier, each member can be identified by the member's name, e-mail address, telephone number, address, and/or any other information that can uniquely identify the member and is maintained by the social network. As mentioned earlier in the exemplary social network description, the types of connection or association include: friendships, business relationships, family associations, acquaintances, community or group associations, activity partner associations, common interest associations, common characteristic associations, or any other suitable type of relationship connections (e.g., social relationship connection). Examples of the connection/association are as provided earlier with reference to 320 in
At 430, the search engine 158, or related devices, also performs a crawl of the network 106 to locate one or more desired articles stored at other devices or systems coupled to the network 106. The desired articles to be located are based on requests to correlate such articles with connections between members in a social network. For example, an administrator of the search site 150 or search engine 158 may request a review of a plurality of websites X, Y, Z to down-weigh or up-weigh links to and from such websites for future searches.
Next, at 440, also from the network crawl, the search engine 158 identifies the webmaster, web administrator, or any other entity responsible for the design, implementation, and/or maintenance of each article in order to associate an administrator identifier with each of desired articles that have been located. The article administrator can be identified through a search of the content of each article for any information that can identify the administrator. For example, an article such as a website can be searched for contact or authorship information (e.g., name, e-mail address, postal address and/or telephone number). In another example, an article administrator can be identified from a domain name registration service that provides registration for the particular article or the web site that hosts the article. In another example, an article administrator may be inferred from access patterns; for example, it can be inferred that a user is likely to be the administrator of a site based on the frequency or uniformity of accesses to articles on the site (e.g., other users may access specific pages while the administrator may access more of the pages when testing their site, or the administrator may regularly check certain pages). In another example, an article administrator may be identified by analyzing a news group of bulletin board postings where the administrator refers to the article or an associated entity such as a web site.
At 450, if authorized or provided by the administrators of each desired article (or any other entity with authority over such article), the search engine 158 can obtain information regarding access to each desired article and identify the points of access to the article. For example, when an access is made to the article, such access can be traced back from the article to the point of access to identify the corresponding IP address and the user associated with such IP address. In another example, the point of access has embedded cookie(s) for identification, and the access can be traced back to retrieve the embedded cookie(s) to identify the user accessing the article. In another example, the user accessing an article may be known by the service provider, for example, a user may have an account with an ISP and when they connect to the network the ISP knows the user and which articles they access. Further, the search engine 158 can search the desired articles to determine whether it also provides links back to the points of access, for example, when such points of access are also articles (hereinafter, “accessing articles”). It should be noted that the accessing articles can include the desired articles located at 430 or other articles.
At 460, assuming that there are one or more points of access identified, the search engine 158 also obtains administrator/user identifiers at such points of access in the same manner described earlier at 340.
At 470, the search engine 158 indexes the desired articles (i.e., linking articles) by their article identifiers, administrator identifiers, their points of access, the administrator identifiers or users at the points of access, and any links from each desired article back to its accessing articles in an article index for storage in memory 156 or any suitable data storage device. The article index can be in a spreadsheet or table format, or any other format, that allows a search for an article, and its associated administrator through an administrator identifier.
At 480, the search engine 158 communicates with the social network engine 168 to: 1) look up the stored connections information in the social network database 170; 2) correlate the connections information with the information found in the article index to determine types of association, including association levels and weights given, between administrators of desired articles and those administrators/users at the points of access; and 3) assign searching weights or importance of each link between articles for future searches at the search site 150 with the search engine 158. For example, referring back to the social network 200 in
Referring now to the method depicted in
At 520, the social network engine 168 stores the connections information in the social network database 170, or another data storage device, at the social network site 160 or any other desired site. The connections information for each connection includes: 1) information identifying the members that are connected to or associated with one another; 2) the type or types of connection/association between the members, including the degree of separation between the members and any virtual links between the members; and 3) the level and weight assigned to each type of association.
As mentioned earlier, each member can be identified by the member's name, e-mail address, telephone number, address, and/or any other information that can uniquely identify the member and is maintained by the social network. As mentioned earlier in the exemplary social network description, the types of connection or association include: friendships, business relationships, family associations, acquaintances, community or group associations, activity partner associations, common interest associations, common characteristic associations, or any other suitable type of relationship connections (e.g., social relationship connection). Examples of the connection/association are as provided earlier with reference to 320 in
At 530, the search engine 158, or related devices, performs a crawl of the network 106 to locate one or more desired articles that are ads on the network 106. The desired ads to be located are based on requests to correlate such ads with connections between members in a social network. The desired ads, which can be all ads, can be located as identified by advertisers of such ads or others who wish to detect spamming of the ads. For example, an advertiser of an ad hosted at a website is suspicious of the click-through rate (CTR) it receives from the ad and wishes to verify that the CTR is independent from the hosted website.
Next, at 540, also from the network crawl, the search engine 158 identifies the advertiser, or any other entity responsible for the design, implementation, and/or maintenance of each ad, in order to associate an administrator identifier with each of desired ads that have been located. The advertiser can be identified from information provided by the advertiser itself. Alternatively, the advertiser can be identified from a search of the ad content for any information that can identify the ad administrator, the content of the article to which the ad is linked, and/or a domain name registration service that provides registration of the ad and/or the ad-linked-to article.
At 550, as authorized or provided by the ad administrators of each desired article (or any other entity with authority over such article), the search engine 158 can obtain information regarding access to each desired ad and identify the points of access to the ad. For example, when an access is made to the ad, such access can be traced back from the ad to the point of access to identify the corresponding IP address and the user associated with such IP address. In another example, the point of access has embedded cookie(s) for identification, and the access can be traced back to retrieve the embedded cookie(s) to identify the user accessing the ad (or an ISP may know the user as mentioned earlier). Further, the search engine 158 can search the hosted article (e.g., hosted website) of the ad to determine whether such hosted article also provides links back to the points of access, for example, when such points of access are also articles (hereinafter, “accessing articles”).
At 560, assuming that there are one or more points of access identified, the search engine 158 also obtains administrator identifiers or users at such points of access as described above.
At 570, the search engine 158 indexes the desired ads by their article identifiers, administrator identifiers, their points of access, the administrator identifiers or users at the points of access, and any link from each hosted article of each ad back to a point of access in an ad index for storage in memory 156 or any suitable data storage device. Similar to the article index, the ad index can be in a spreadsheet or table format, or any other format, that allows a search for an article, and its associated administrator through an administrator identifier.
At 580, the search engine 158 communicates with the social network engine 168 to: 1) look up the stored connections information in the social network database 170; 2) correlate the connections information with the information found in the ad index to determine types of association, including association levels and weights given, between administrators of desired articles and those administrators/users at the points of access; and 3) determine whether ad spamming exists between members based on, e.g., click through rates from associated members. For example, referring back to the social network 200 in
General
Although the invention has been described with reference to these embodiments, other embodiments could be made by those in the art to achieve the same or similar results. Variations and modifications of the present invention will be apparent to one skilled in the art based on the present disclosure, and the present invention encompasses all such modifications and equivalents.
This application is continuation of and claims priority to U.S. application Ser. No. 13/973,583, filed Aug. 22, 2013, which is a continuation of U.S. application Ser. No. 13/270,930, filed Oct. 11, 2011, which is a continuation of U.S. application Ser. No. 11/026,681, filed Dec. 31, 2004, each of which is incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5537586 | Amram et al. | Jul 1996 | A |
5796393 | MacNaughton et al. | Aug 1998 | A |
6073138 | de l'Etraz et al. | Jun 2000 | A |
6130938 | Erb | Oct 2000 | A |
6192119 | Wilson | Feb 2001 | B1 |
6285999 | Page | Sep 2001 | B1 |
6327590 | Chidlovskii et al. | Dec 2001 | B1 |
6366962 | Teibel | Apr 2002 | B1 |
6389372 | Glance et al. | May 2002 | B1 |
6421678 | Smiga et al. | Jul 2002 | B2 |
6442567 | Retallick et al. | Aug 2002 | B1 |
6526440 | Bharat | Feb 2003 | B1 |
6529903 | Smith et al. | Mar 2003 | B2 |
6594673 | Smith et al. | Jul 2003 | B1 |
6615209 | Gomes et al. | Sep 2003 | B1 |
6658423 | Pugh et al. | Dec 2003 | B1 |
6697478 | Meldrum et al. | Feb 2004 | B1 |
6725259 | Bharat | Apr 2004 | B1 |
6754322 | Bushnell | Jun 2004 | B1 |
6754873 | Law et al. | Jun 2004 | B1 |
6799176 | Page | Sep 2004 | B1 |
6867733 | Sandhu et al. | Mar 2005 | B2 |
6895406 | Fables et al. | May 2005 | B2 |
6895551 | Huang | May 2005 | B1 |
7069308 | Abrams | Jun 2006 | B2 |
7080117 | de Pinto et al. | Jul 2006 | B2 |
7092821 | Mizrahi et al. | Aug 2006 | B2 |
7106848 | Barlow et al. | Sep 2006 | B1 |
7117254 | Lunt et al. | Oct 2006 | B2 |
7118153 | Kitayama et al. | Oct 2006 | B2 |
7130777 | Garg | Oct 2006 | B2 |
7130844 | Elder et al. | Oct 2006 | B2 |
7155608 | Malik et al. | Dec 2006 | B1 |
7269590 | Hull et al. | Sep 2007 | B2 |
7275068 | Huberman et al. | Sep 2007 | B2 |
7343335 | Olliphant | Mar 2008 | B1 |
7360080 | Camnisch et al. | Apr 2008 | B2 |
7366990 | Pitroda | Apr 2008 | B2 |
7418268 | Cabano et al. | Aug 2008 | B1 |
7433832 | Bezos et al. | Oct 2008 | B1 |
7454464 | Puthenkulam et al. | Nov 2008 | B2 |
7478078 | Lunt et al. | Jan 2009 | B2 |
7555110 | Dolan et al. | Jun 2009 | B2 |
7610287 | Dean et al. | Oct 2009 | B1 |
7742468 | Vegelos | Jun 2010 | B2 |
20010039500 | Johnson | Nov 2001 | A1 |
20010054020 | Barth et al. | Dec 2001 | A1 |
20020002445 | Doliov | Jan 2002 | A1 |
20020042791 | Smith et al. | Apr 2002 | A1 |
20020059130 | Cheng et al. | May 2002 | A1 |
20020059201 | Work | May 2002 | A1 |
20020103682 | Stemmer | Aug 2002 | A1 |
20020116458 | Bricklin | Aug 2002 | A1 |
20020116466 | Trevithick et al. | Aug 2002 | A1 |
20020137490 | Gallant | Sep 2002 | A1 |
20020143874 | Marquette et al. | Oct 2002 | A1 |
20020169835 | Paul, Jr. et al. | Nov 2002 | A1 |
20030020977 | Smith et al. | Jan 2003 | A1 |
20030083898 | Wick et al. | May 2003 | A1 |
20030154213 | Ahn | Aug 2003 | A1 |
20030163530 | Ribak et al. | Aug 2003 | A1 |
20030233650 | Zaner et al. | Dec 2003 | A1 |
20040041836 | Zaner et al. | Mar 2004 | A1 |
20040042599 | Zaner et al. | Mar 2004 | A1 |
20040088325 | Elder et al. | May 2004 | A1 |
20040122681 | Ruvolo et al. | Jun 2004 | A1 |
20040122803 | Dom et al. | Jun 2004 | A1 |
20040148275 | Achlioptas | Jul 2004 | A1 |
20040162830 | Shirwadkar et al. | Aug 2004 | A1 |
20040167794 | Shostack | Aug 2004 | A1 |
20040221309 | Zaner et al. | Nov 2004 | A1 |
20040225681 | Chaney et al. | Nov 2004 | A1 |
20040249811 | Shostack et al. | Dec 2004 | A1 |
20040258220 | Levine et al. | Dec 2004 | A1 |
20040260781 | Shostack et al. | Dec 2004 | A1 |
20050015432 | Cohen | Jan 2005 | A1 |
20050021750 | Abrams | Jan 2005 | A1 |
20050050158 | Solari | Mar 2005 | A1 |
20050060297 | Najork | Mar 2005 | A1 |
20050071741 | Acharya et al. | Mar 2005 | A1 |
20050131894 | Vuong | Jun 2005 | A1 |
20050152521 | Lijestrand | Jul 2005 | A1 |
20050159998 | Buyukkokten et al. | Jul 2005 | A1 |
20050165785 | Malkin et al. | Jul 2005 | A1 |
20050171832 | Hull et al. | Aug 2005 | A1 |
20050171954 | Hull et al. | Aug 2005 | A1 |
20050193054 | Wilson et al. | Sep 2005 | A1 |
20050197846 | Pezaris et al. | Sep 2005 | A1 |
20050209999 | Jou | Sep 2005 | A1 |
20050210409 | Jou | Sep 2005 | A1 |
20050216300 | Appleman et al. | Sep 2005 | A1 |
20050246420 | Little, II | Nov 2005 | A1 |
20050256866 | Lu et al. | Nov 2005 | A1 |
20050267766 | Galbreath et al. | Dec 2005 | A1 |
20050267940 | Galbreath et al. | Dec 2005 | A1 |
20050283497 | Nurminen et al. | Dec 2005 | A1 |
20060004748 | Ramarathnam | Jan 2006 | A1 |
20060026288 | Acharya et al. | Feb 2006 | A1 |
20060036746 | Davis | Feb 2006 | A1 |
20060077957 | Reddy et al. | Apr 2006 | A1 |
20060136419 | Brydon et al. | Jun 2006 | A1 |
20060206604 | O'Neil et al. | Sep 2006 | A1 |
20060282336 | Huang | Dec 2006 | A1 |
20070127631 | Difiglia | Jun 2007 | A1 |
20070171898 | Salva | Jul 2007 | A1 |
20070173236 | Vishwanathan et al. | Jul 2007 | A1 |
20070248077 | Mahle, Jr. et al. | Oct 2007 | A1 |
20080004941 | Calabria | Jan 2008 | A1 |
20080056475 | Brannick et al. | Mar 2008 | A1 |
20080133716 | Rao et al. | Jun 2008 | A1 |
20080192656 | Vagelos | Aug 2008 | A1 |
20090013386 | Puthenkulam et al. | Jan 2009 | A1 |
20110098156 | Ng et al. | Apr 2011 | A1 |
Number | Date | Country |
---|---|---|
1949220 | Apr 2007 | CN |
1288795 | Mar 2003 | EP |
11265369 | Sep 1999 | JP |
0068860 | Nov 2000 | WO |
0124551 | Apr 2001 | WO |
0184266 | Nov 2001 | WO |
0279984 | Oct 2002 | WO |
Entry |
---|
“Web Document Searching Using Enhanced Hyperlink Semantics Based on XML”. I. Varlamis, M. Vazirgiannis. Athens University of Economics & Business. IEEE, 2001. (Year: 2001). |
“An Electronic Nightmare”. InternetIWeb/Online Service Information. Lent, Anne Fischer. Ent , v 11 , n 2 , p. 42. Jul. 16,1997. |
Adamic et al., “A Social Network Caught in the Web,” Internet Journal, First Monday, Jun. 2, 2003, vol. 8, No. 6, pp. 1-22. |
Agarwal et al., “Enabling Real-Time User Interests for Next Generation Activity-Oriented Social Networks,” Thesis submitted to the Indian Institute of Technology Delhi, Department of Computer Science & Engineering, 2005, 70 pgs. |
Anwar et al., “Leveraging ‘Social-Network’ Infrastructure to Improve Peer-to Peer Overlay Performance: Results from Orkut,” University of Illinois at Urbana-Champaign USA, 2005, 9 pgs. |
AT&T Personal Reach Service: Benefits and Features, Mar. 29, 2010, 7 pgs. |
AT&T Personal Reach Service: Personal Reach Service, Mar. 29, 2010, 2 pgs. |
Baird et al., “Neomillennial User Experience Design Strategies: Utilizing Social Networking Media to Support “Always On” Learning Styles,” J. Educational Technology Systems, vol. 34(1),2005-2006, Baywood Publishing Co., Inc., pp. 5-32. |
Boyd, et al., “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication, International Communication Association, 2008, pp. 210-230. |
Churchill et al., “Social Networks and Social Networking,” IEEE Computer Society, Sep.-Oct. 2005, pp. 14-19. |
Cohen et al.. “Social Networks for Creative Collaboration.” C&C '05, Apr. 12-15, 2005, London, United Kingdom, pp. 252-255. |
Decker et al., “The Social Semantic Desktop,” Digital Enterprise Research Institute, DERI Galway, Ireland, DERI Innsbruck, Austria, DERI Technical Report, May 2, 2004,7 pgs. |
Dukes-Schlossberg et al., “Battlefield Awareness and Data Dissemination Intelligent Information Dissemination Server,” Air Force Research Laboratory, Rome Research Site, Rome, NY, Nov. 1, 1999,31 pgs. |
Eagle et al., “Social Serendipity: Proximity Sensing and Cueing,” MIT Media Laboratory Technical Note 580, May 2004, 18 pgs. |
Erickson et al., “Social Translucence: Using Minimalist Visualizations of Social Activity to Support Collective Interaction,” Designing Information Spaces: The Social Navigation Approach, Springer-verlag: London, 2003, pp. 1-19. |
Gross et al., “Information Revelation and Privacy in Online Social Networks,” WPES '05, Alexandria, Virginia, Nov. 7, 2005, pp. 71-80. |
Hammond et al., “Social Bookmarking Tools (I),” D-Lib Magazine, Apr. 2005, vol. II, No. 4, ISSN 1082-9873,23 pgs. |
Heer et al., “Vizster: Visualizing Online Social Networks,” University of California, Berkeley, Oct. 25, 2005, 8 pgs. |
International Search Report, International Application No. PCT/US2008/005118, dated Sep. 30, 2008, 2 pgs. |
Leonard, “You Are Who You Know,” Internet, retrieved at http://www.salon.com, Jun. 15, 2004,15 pgs. |
Tan, PN., et al., “Introduction to Data Mining,” Chapter 8 Cluster Analysis: Basic Concept and Algorithms (Section 8.3.3—The Lance-Williams Formula for Cluster Proximity, p. 524), 2006, p. 487-568. |
Marwick. “Selling Your Self: Online Identity in the Age of a Commodified Internet.” University of Washington, 2005, 192 pgs. |
MediaSift Lid., DataSift: Realtime Social Data Mining Platform, Curate and Data Mine the Real Time Web with DataSift, Dedipower, Managed Hosting, [Retrieved on May 13, 2011], 1 pg. |
Metcalf et al., “Spatial Dynamics of Social Network Evolution,” 23rd International Conference of the System Dynamics Society, Jul. 19, 2005, pp. 1-13. |
Mori et al., “Real-world Oriented Information Sharing Using Social Networks,” Group '05, Sanibel Island, Florida, USA, Nov. 6-9, 2005, pp. 81-84. |
O'Murchu et al., “Online Social and Business Networking Communities,” Digital Enterprise Research Institute DERI Technical Report, National University of Ireland, Aug. 11, 2004,22 pgs. |
Nardi et al., “Blogging as Social Activity, or, Would You Let 900 Million People Read Your Diary?” CSCW'04, Nov. 6-10, 2004, vol. 6, Issue 3, Chicago, Illinois, pp. 222-231. |
Neumann et al., “Semantic social network portal for collaborative online communities,” Journal of European Industrial Training, 2005, Emerald Group Publishing, Limited, vol. 29, No. 6, pp. 472-487. |
Ring Central, Inc., Internet, retrieved at http://www.ringcentral.com, Apr. 19, 2007, 1 pg. |
Singh et al., “CINEMA: Columbia InterNet Extensible Multimedia Architecture,” Department of Computer Science, Columbia University, May 2002, pp. 1-83. |
Steen et al., “Development of we-centric, context-aware, adaptive mobile services requires empathy and dialogue,” Freeband FRUX, Oct. 17, 2005, Internet Journal, Netherlands, pp. 1-4. |
Superfeedr Track, Internet, retrieved at http://blog.superfeedr.com/tracklfilter/xmpp/pubsubhubbub/track, May 13, 2011,8 pgs. |
Twitter Blog: Tracking Twitter. Internet, retrieved at http://blog.twitter.com/2007/09/tracking-twitter.html, May 13, 2011,2 pgs. |
Twitter Announces Fire Hose Marketplace: Up to 10K Keyword Filters for 30 Cents, Internet, retrieved at http://www.readywriteweb.com/archives/twitter_announces_fire_hose_marketplace_up_to_I0k.php, May 13, 2011, 7 pgs. |
Van Eijk et al., “We-centric, context-aware, adaptive mobile service bundles,” Freeband, Telematica Instituut, TNO telecom, Nov. 30, 2004, 48 pgs. |
Wenger et al., “Technology for Communities,” CEFRIO Book Chapter v 5.2, Jan. 18, 2005, p. 1-15. |
Doctorow copy, “Running Notes From Revenge of the User: Lessons from Creator/User Battles,” web page at http://craphound.com/danahetcon04.1xt, as available via the Internet and printed Jul. 28, 2004. |
Jensen, C., et al., “Finding Others Online: Reputation Systems for Social Online Spaces,” Group Spaces, CHI 2002, Apr. 20-25, 2002, vol. 4, Iss. 1, pp. 447-454. |
Sullivan, Danny, “Is It Really Personalized Search?” http://searchenginewatch.com, printed May 13, 2004. |
Multiply, “About Multiply,” web page at http://multiply.com/info/about, as available via the Internet and printed May 3, 2004. |
Multiply, “Help,” web page at http://multiply.comlinfo/help, as available via the Internet and printed May 3, 2004. |
Multiply, “Multiply Privacy Policy,” web page at http://multiply.com/info/privacy, as available via the Internet and printed on May 3, 2004. |
Multiply, “Multiply Terms of Service,” web page at http://multiply.com/infollos, as available via the Internet and printed on printed May 3, 2004. |
“PlanetAll,” From Internet Archive Wayback Machine on Nov. 1997, [online] [Retrieved on Mar. 17, 2004] Retrieved from the Internet <URL: Internet Archive Wayback Machine: www.archive.org/www/planetall.com>, 19 pgs. |
Google, Inc., “Google Answers,” Google, 2004, [online] [retrieved on Jul. 29, 2004] retrieved from the internet <URL: http://answers.google.com/answers/>, 1 pg. |
Google, Inc., “Google Answers: Frequently Asked Questions,” Google, 2003, [online] [retrieved on Jul. 29, 2004] retrieved from the Internet <URL:http://answers.google.com/answers/faq.html>, 9 pgs. |
Yahoo! Inc., “Yahoo! Groups,” Yahoo! Inc., 2004, [online] [retrieved on Jul. 29, 2004] retrieved from the internet <URL: http://groups.yahoo.com>, 2 pgs. |
Yahoo! Inc., “Yahoo! Help—Groups,” Yahoo! Inc., 2004, [online] [retrieved on Jul. 29, 2004] retrieved from the internet <URL:http://help.yahoo.com/help/us/groups/groups-OI.html>, 12 pgs. |
Yahoo! Inc., “Yahoo! Help—Groups Database,” Yahoo! Inc., 2004, [online] [retrieved on Jul. 29, 2004] retrieved from the internet <URL:http://help.yahoo.com/help/us/groups/database>, 9 pgs. |
Yahoo! Groups, “Customize LostDrive-In,” web page at http://groups.yahoo.com/group/lostdrivein/conwiz, as available via the Internet and printed Jun. 2, 2004. |
NomadNet, “Nomad Net News,” web page at http://www.netnomad.com/, as available via the Internet and printed Dec. 1, 2004. |
PC World, “PCWorld-ICQ Builds a Social Network,” web page at http://www.gcworld.com/news/article/O,aid,115084, OO.asg, as available via the Internet and printed Dec. 1, 2004. |
The secret of unstructured data. Rao Ramana. Sep./Oct. 2002. E-Doc. V16n5. pp. 14-15. |
Livejournal syndicated accounts (2004), last updated Jan. 6, 2004, can be retrieved at <URL:http://www.lifejournal.com/syn/>, 2 pages. |
Lance, G.N., et al., “Computer programs for hierarchical polythetic classification (“similarity analyses”),” The Computer Journal, C.S.I.R.O. Computing Research Section, 1966, p. 60-64, vol. 9. |
Lance, G.N., et al., “A Generalized Sorting Strategy for Computer Classifications,” Nature, Oct. 8, 1966, p. 218, vol. 212. |
Lance, G.N., et al., “A General Theory of Classificatory Sorting Strategies 1. Hierarchical Systems,” The Computer Journal, C.S.I.R.O Computing Research Section, 1967, pp. 373-380, vol. 9, No. 4. |
Lance, G.N., et al., “Mixed-data classificatory programs. I. Agglomerative Systems,” Austral. Comput. J., 1967, pp. 15-20, vol. 1. |
Milligan, G., “Ultrametric Hierarchical Clustering Algorithms,” Psychometrika, Sep. 1979, pp. 343-346, vol. 44, No. 3. |
Number | Date | Country | |
---|---|---|---|
Parent | 13973583 | Aug 2013 | US |
Child | 15006887 | US | |
Parent | 13270930 | Oct 2011 | US |
Child | 13973583 | US | |
Parent | 11026681 | Dec 2004 | US |
Child | 13270930 | US |