Claims
- 1. A method, performed on a computer system, of regulating a user of a computer-based service, the method comprising:
(a) receiving input about a first user from at least one other user of the computer-based service; (b) determining a degree to which the at least one other user can influence a parameter associated with the first user; (c) modifying the first user's parameter based on the received input and the determined degree of influence.
- 2. The method of claim 1, in which the first user's parameter remains unaffected when the degree of influence is determined to be zero.
- 3. The method of claim 1, in which the determination of the degree of influence comprises considering a type of action engaged in by the first user that caused the at least one other user to provide input.
- 4. The method of claim 3, further comprising determining that the at least one other user can have a high degree of influence on the first user's parameter when the type of action engaged in by the first user that caused the at least one other user to provide input was personally directed at the other user.
- 5. The method of claim 3, further comprising determining that the at least one other user can have a high degree of influence on the first user's parameter when the type of action engaged in by the first user that caused the at least one other user to provide input was an Instant Message.
- 6. The method of claim 1, in which the determination of the degree of influence comprises considering a behavioral index level of the first user or the at least one other user or both.
- 7. The method of claim 6, in which the consideration comprises comparing a user's behavioral index level to a predetermined threshold.
- 8. The method of claim 6, in which the consideration comprises comparing a user's behavioral index level to a dynamically shifting threshold.
- 9. The method of claim 6, in which the consideration comprises comparing the first user's behavioral index level to the at least one other user's behavioral index level.
- 10. The method of claim 1, in which the determination of the degree of influence comprises considering a rate limiting state of the first user or the at least one other user or both.
- 11. The method of claim 10, in which the consideration comprises comparing a user's rate limiting state to a predetermined threshold.
- 12. The method of claim 10, in which the consideration comprises comparing a user's rate limiting state to a dynamically shifting threshold.
- 13. The method of claim 10, in which the consideration comprises comparing the first user's rate limiting state to the at least one other user's rate limiting state.
- 14. The method of claim 1, in which the determination of the degree of influence comprises considering a resource usage level of the first user or the at least one other user or both.
- 15. The method of claim 14, in which the consideration comprises comparing a user's resource usage level to a predetermined threshold.
- 16. The method of claim 14, in which the consideration comprises comparing a user's resource usage level to a dynamically shifting threshold.
- 17. The method of claim 14, in which the consideration comprises comparing the first user's resource usage level to the at least one other user's resource usage level.
- 18. The method of claim 14, in which memory usage by a user affects that user's resource usage level.
- 19. The method of claim 14, in which a number of forums occupied by a user affects that user's resource usage level.
- 20. The method of claim 1, in which the determination of the degree of influence comprises considering an amount of previous input about other users submitted by the first user or the at least one other user or both.
- 21. The method of claim 20, in which the amount of previous input about other users is measured per session, per unit time, or per lifetime.
- 22. The method of claim 1, in which the determination of the degree of influence comprises considering whether the first user, the at least one other user, or both, frequent forums associated with illegal activity.
- 23. The method of claim 22, in which the illegal activity comprises hacker activity.
- 24. The method of claim 1, in which the determination of the degree of influence comprises considering previous complaints against the first user or the at least one other user or both.
- 25. The method of claim 1, in which the determination of the degree of influence comprises considering an amount of revenue generated by the first user or the at least one other user or both.
- 26. The method of claim 25, in which a user's generated revenue comprises subscription revenue, advertising revenue, or e-commerce revenue.
- 27. The method of claim 1, in which the determination of the degree of influence comprises considering messaging patterns of the first user or of the at least one other user or both.
- 28. The method of claim 27, in which a user's messaging pattern includes a number of other users with whom regular contact is maintained.
- 29. The method of claim 27, in which a user's messaging pattern includes an indication of misbehavior by other users with whom regular contact is maintained.
- 30. The method of claim 1, in which modifying a parameter associated with the first user comprises limiting the first user's permissible messaging rates.
- 31. The method of claim 1, in which modifying a parameter associated with the first user comprises limiting the first user's access to one or more forums.
- 32. The method of claim 1, in which modifying a parameter associated with the first user comprises modifying the first user's cost of using the computer-based service.
- 33. The method of claim 1, in which modifying a parameter associated with the first user comprises varying a degree of influence that the first user has over another user of the computer-based service.
- 34. The method of claim 1, further comprising:
(d) displaying information related to a current state of the first user's modified parameter.
- 35. The method of claim 33, in which displaying information comprises updating a state of a graphical abstraction.
- 36. The method of claim 34, in which the graphical abstraction comprises a power bar.
- 37. The method of claim 1, in which the determination of the degree of influence comprises capping the degree of influence to a maximum amount.
- 38. The method of claim 37, in which the capping of the degree of influence comprises applying a ceiling function.
- 39. The method of claim 37, in which the capping of the degree of influence comprises applying a time-out function.
- 40. The method of claim 37, in which the capping of the degree of influence comprises applying a function based on an elapsed time since an occurrence of an action engaged in by the first user that caused the at least one other user to provide input.
- 41. The method of claim 37, in which the capping of the degree of influence comprises applying a temporally based function.
- 42. The method of claim 37, in which the capping of the degree of influence comprises applying a quantitatively based function.
- 43. The method of claim 1, in which determining the degree of influence comprises considering an interpersonal context between the first user and the at least one other user.
- 44. The method of claim 43, in which considering the interpersonal context comprises applying a function based on an ordering of events during an interaction of the first user and the at least one other user.
- 45. The method of claim 1, in which modifying a parameter associated with the first user comprises temporarily limiting the first user's ability to use the computer-based service if the input received from the at least one other user constitutes a first occurrence of input about the first user.
- 46. The method of claim 45, in which the temporary limitation on the first user's ability to use the computer-based service comprises a short-term limitation.
- 47. A computer program, residing on a computer-readable medium, for regulating a user of a computer-based service, comprising instructions for causing a computer to perform the following operations:
(a) receive input about a first user from at least one other user of the computer-based service; (b) determine a degree to which the at least one other user can influence a parameter associated with the first user; (c) modify the first user's parameter based on the received input and the determined degree of influence.
- 48. The computer program of claim 47, in which the first user's parameter remains unaffected when the degree of influence is determined to be zero.
- 49. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions to consider a type of action engaged in by the first user that caused the at least one other user to provide input.
- 50. The computer program of claim 49, in which the instructions determine that the at least one other user can have a high degree of influence on the first user's parameter when the type of action engaged in by the first user that caused the at least one other user to provide input was personally directed at the other user.
- 51. The computer program of claim 49, in which the instructions determine that the at least one other user can have a high degree of influence on the first user's parameter when the type of action engaged in by the first user that caused the at least one other user to provide input was an Instant Message.
- 52. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering a behavioral index level of the first user or the at least one other user or both.
- 53. The computer program of claim 52, in which the instructions for considering a behavioral index level comprise instructions for comparing a user's behavioral index level to a predetermined threshold.
- 54. The computer program of claim 52, in which the instructions for considering comprise instructions for comparing a user's behavioral index level to a dynamically shifting threshold.
- 55. The computer program of claim 52, in which the instructions for considering comprise instructions for comparing the first user's behavioral index level to the at least one other user's behavioral index level.
- 56. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering a rate limiting state of the first user or the at least one other user or both.
- 57. The computer program of claim 56, in which the instructions for considering comprise instructions for comparing a user's rate limiting state to a predetermined threshold.
- 58. The computer program of claim 56, in which the instructions for considering comprise instructions for comparing a user's rate limiting state to a dynamically shifting threshold.
- 59. The computer program of claim 56, in which the instructions for considering comprise instructions for comparing the first user's rate limiting state to the at least one other user's rate limiting state.
- 60. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering a resource usage level of the first user or the at least one other user or both.
- 61. The computer program of claim 60, in which the instructions for considering comprise instructions for comparing a user's resource usage level to a predetermined threshold.
- 62. The computer program of claim 60, in which the instructions for considering comprise instructions for comparing a user's resource usage level to a dynamically shifting threshold.
- 63. The computer program of claim 60, in which the instructions for consideration comprise instructions for comparing the first user's resource usage level to the at least one other user's resource usage level.
- 64. The computer program of claim 60, in which memory usage by a user affects that user's resource usage level.
- 65. The computer program of claim 60, in which a number of forums occupied by a user affects that user's resource usage level.
- 66. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering an amount of previous input about other users submitted by the first user or the at least one other user or both.
- 67. The computer program of claim 66, in which the amount of previous input about other users is measured per session, per unit time, or per lifetime.
- 68. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering whether the first user, the at least one other user, or both, frequent forums associated with illegal activity.
- 69. The computer program of claim 68, in which the illegal activity comprises hacker activity.
- 70. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering previous complaints against the first user or the at least one other user or both.
- 71. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering an amount of revenue generated by the first user or the at least one other user or both.
- 72. The computer program of claim 71, in which a user's generated revenue comprises subscription revenue, advertising revenue, or e-commerce revenue.
- 73. The computer program of claim 47, in which the instructions to determine the degree of influence comprise instructions for considering messaging patterns of the first user or the at least one other user or both.
- 74. The computer program of claim 73, in which a user's messaging pattern includes a number of other users with whom regular contact is maintained.
- 75. The computer program of claim 73, in which a user's messaging pattern includes an indication of misbehavior by other users with whom regular contact is maintained.
- 76. The computer program of claim 47, in which the instructions for modifying a parameter associated with the first user comprise instructions for limiting the first user's permissible messaging rates.
- 77. The computer program of claim 47, in which the instructions for modifying a parameter associated with the first user comprise instructions for limiting the first user's access to one or more forums.
- 78. The computer program of claim 47, in which the instructions for modifying a parameter associated with the first user comprise instructions for modifying the first user's cost of using the computer-based service.
- 79. The computer program of claim 47, in which the instructions for modifying a parameter associated with the first user comprise instructions for modifying a degree of influence that the first user has over another user of the computer-based service.
- 80. The computer program of claim 47, further comprising instructions to:
(d) display information related to a current state of the first user's modified parameter.
- 81. The computer program of claim 80, in which the instructions for displaying information comprise instructions for updating a state of a graphical abstraction.
- 82. The computer program of claim 81, in which the graphical abstraction comprises a power bar.
- 83. The computer program of claim 47, in which the instructions for determining the degree of influence comprise instructions for capping the degree of influence to a maximum amount.
- 84. The computer program of claim 83, in which the instructions for capping the degree of influence comprise instructions for applying a ceiling function.
- 85. The computer program of claim 83, in which the instructions for capping the degree of influence comprise instructions for applying a time-out function.
- 86. The computer program of claim 83, in which the instructions for capping the degree of influence comprise instructions for applying a function based on an elapsed time since an occurrence of an action engaged in by the first user that caused the at least one other user to provide input.
- 87. The computer program of claim 83, in which the instructions for capping the degree of influence comprise instructions for applying a temporally based function.
- 88. The computer program of claim 83, in which the instructions for capping the degree of influence comprise instructions for applying a quantitatively based function.
- 89. The computer program of claim 47, in which the instructions for determining the degree of influence comprise instructions for considering an interpersonal context between the first user and the at least one other user.
- 90. The computer program of claim 89, in which the instructions for considering the interpersonal context comprise instructions for applying a function based on an ordering of events during an interaction of the first user and the at least one other user.
- 91. The computer program of claim 47, in which the instructions for modifying a parameter associated with the first user comprise instructions for temporarily limiting the first user's ability to use the computer-based service if the input received from the at least one other user constitutes a first occurrence of input about the first user.
- 92. The computer program of claim 91, in which the temporary limitation on the first user's ability to use the computer-based service comprises a short-term limitation.
Parent Case Info
[0001] This application is a continuation of provisional application number 60/047,235 filed May 20, 1997, which is incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60047235 |
May 1997 |
US |
Continuations (1)
|
Number |
Date |
Country |
| Parent |
09076483 |
May 1998 |
US |
| Child |
09968540 |
Oct 2001 |
US |