Online user accounts are now a fact of everyday life. The typical Internet user must manage 20, 30 or perhaps more user accounts, each of which entails a varying array of password/authentication methods, user-selectable settings and options, favorites lists, payment information and the like. The mental overhead associated with establishing a new user account is often enough to dissuade a user from proceeding, even where the eventual account would have provided a rewarding consumption experience.
Accordingly, the disclosure provides for a system and method for setting up user accounts based on the accounts or experiences of other users or archetypes, which will be referred to in some respects as a process by which the new or modified accounts are “seeded” using information from other accounts. One example method includes determining that a first user wants to set up or modify an account for the consumption of digital content items. Then an account profile is identified which is associated with a second user that has an affinity with the first user, with the account profile being based on an account of the second user. Underlying protected information in the source account/profile is then protected to ensure that the account profile is safe to share without compromising security. The account profile is then made available and used to set up or modify an account for the target user.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure.
In a first example, the desire for a new/modified account or consumption experience is explicitly asserted by the user, as shown at 302a of the exemplary method shown at 300 in
The explicit desire indicated by the user at step 302 in
In a second example, interest is inferred as shown at 302b. Inferences may be based on past or current consumption behavior, on social network activity, on expressions of preferences or tastes, or through collaborative filtering or other appropriate techniques. For example, an inferred best profile match may be based on an inference drawn from asking a user targeted questions and/or asking a user to rate specific content. These are but examples, appropriate inferences may be achieved through a wide range of techniques.
Regardless, the method 300 may then proceed to identification of an appropriate account profile, as shown at 304. The identified profile in many cases is associated with an underlying account of an actual user (e.g., friend, coworker, etc.). In other examples, a profile associated with an archetype may be employed—e.g., “Hip-Hop Fan,” “French Cinema Buff,” etc., with the interests, preferences, settings and other features one might expect to be associated with such a user. To identify a suitable actual or archetype profile, the user may also be polled to assess their preferences or other information that can be used in identifying a suitable account profile.
In either case, the profile may be housed and managed within a profile manager database 222 which interacts with accounts 224 (or copies thereof) to generate the profiles. It should be understood here and with respect to the rest of this disclosure that various modules, components and the like may be described as being discrete (e.g., database 222) but which can easily be distributed and/or spanned across multiple physical or logical locations. The discussion should be understood to encompass all desirable and practicable implementations, whether distributed, discrete or otherwise.
In some cases, generating profiles may include a masking function 226 (306 in
Furthermore, in some cases, a source user may customize or select information, portions of a profile, and/or portions of an account to be selectively masked for different users or groups of users. For example, a user may customize a profile mask setting to share a portion of their profile with a group of friends, but mask that portion of the profile from being shared with other members of a social network. It is to be understood that any suitable information, aspects, portions, user experience components, and the like related to an account or profile may be customized by an account/profile owner to be shared or masked from being shared to different users or groups of users.
The method 300 may then proceed by making the retrieved account profile available for use for the purpose of setting, up or modifying an account for the target user, as shown at 308. The presentation of the profile or the user interface via which it is shared with the target user may occur in various ways. Presentation may occur through a desktop, mobile or set-top-box (SIB) computing device, and/or be communicated through social networks or other channels. Again, these are but a few non-limiting examples.
Method 300 may then proceed at 310 with making use of the account profile to set up or modify the account of the target user. In the example of
Account setup or modification may also include signing up for subscriptions (310c) or other mechanisms for paying for and receiving digital content. Pointers may be established to existing digital content items, and/or a mechanism may be provided for license procurement (308d) and DRM-type management.
In addition to or instead of the other features described herein, establishing a new or modified account may include seeding an account to establish account preferences. For example, in a travel website, the methods herein may be employed to set preferred destinations or types of travel. Further, establishing or modifying an account may include using the seeding methods discussed herein to customize what the user shares with other users or groups of users.
In the example of
As indicated above with respect to
The example computing system includes a processing subsystem, as indicated above. Processing, subsystem 202 may include one or more physical devices configured to execute one or more instructions. For example, the processing subsystem may be configured to execute one or more instructions that are part of one or more applications, services, programs, routines, libraries, objects, components, data structures, or other logical constructs. Such instructions may be implemented to perform a task, implement a data type, transform the state of one or more devices, or otherwise arrive at a desired result.
The processing subsystem 202 (also referred to herein as a logic subsystem) may include one or more processors that are configured to execute software instructions. Additionally or alternatively, the logic subsystem may include one or more hardware or firmware logic machines configured to execute hardware or firmware instructions. Processors of the logic subsystem may be single core or multicore, and the programs executed thereon may be configured for parallel or distributed processing. The logic subsystem may optionally include individual components that are distributed throughout two or more devices, which may be remotely located and/or configured for coordinated processing. One or more aspects of the logic subsystem may be virtualized and executed by remotely accessible networked computing devices configured in a cloud computing configuration.
Data-holding subsystem 204 may include one or more physical, non-transitory, devices configured to hold data and/or instructions executable by the logic subsystem to implement the herein described methods and processes. When such methods and processes are implemented, the state of data-holding subsystem may be transformed (e.g., to hold different data).
Data-holding subsystem 204 may include removable media and/or built-in devices. Data-holding subsystem 204 may include optical memory devices (e.g., CD, DVD, Blu-Ray Disc, etc.), semiconductor memory devices (e.g., RAM, EPROM, EEPROM, etc.) and/or magnetic memory devices (e.g., hard disk drive, floppy disk drive, tape drive, MRAM, etc.), among others. Data-holding subsystem 204 may include devices with one or more of the following characteristics: volatile, nonvolatile, dynamic, static, read/write, read-only, random access, sequential access, location addressable, file addressable, and content addressable. In some embodiments, processing subsystem 202 and data-holding subsystem 204 may be integrated into one or more common devices, such as an application specific integrated circuit or a system on a chip. Removable computer-readable storage media may also form part of the data-holding subsystem.
The terms “module,” “program,” and “engine” may be used to describe an aspect of computing system 200 that is implemented to perform one or more particular functions. In some cases, such a module, program, or engine may be instantiated via processing subsystem 202 executing instructions held by data-holding subsystem 204, it is to be understood that different modules, programs, and/or engines may be instantiated from the same application, service, code block, object, library, routine, API, function, etc. Likewise, the same module, program and/or engine may be instantiated by different applications, services, code blocks, objects, routines, APIs, functions, etc. The terms “module,” “program,” and “engine” are meant to encompass individual or groups of executable files, data files, libraries, drivers, scripts, database records, etc.
It is to be appreciated that a “service”, as used herein, may be an application program executable across multiple user sessions and available to one or more system components, programs, and/or other services. In some implementations, a service may run on a server responsive to a request from to client.
It is to be understood that the configurations and/or approaches described herein are exemplary in nature, and that these specific embodiments or examples are not to be considered in a limiting sense, because numerous variations are possible. The specific routines or methods described herein may represent one or more of any number of processing strategies. As such, various acts illustrated may be performed in the sequence illustrated, in other sequences, in parallel, or in some cases omitted. Likewise, the order of the above-described processes may be changed.
The subject matter of the present disclosure includes all novel and nonobvious combinations and subcombinations of the various processes, systems and configurations, and other features, functions, acts, and/or properties disclosed herein, as well as any and all equivalents thereof.