1. Field of the Invention
The present invention relates to methods of finding people over the internet.
2. Background Art
The world wide nature of the Internet has allowed information to be searched with such breadth that previously could not have been imagined. On-line searching services such as those provided by Yahoo, Google, Ask Jeeves, and the like allow information to be obtained from millions of different sources and websites. Such information ranges from technical documents to cooking recipes. On-line shopping providers and auction services such as Ebay allow people to find virtually any desired new or used object. The success of these internet-based information locating service at least in part owe their success and utility to the large number of internet websites currently available, the ever increasing number of internet users, and the increasing speed with which information is shared over the internet.
A number of service providers provide internet based tools or services for locating a lost people. Typically, these lost person locators are electronic “White Pages” in which a large database of individual with related contact information such as telephone number and addresses are provided. In other person locator services, various public records are searched in order to find the missing person. Although use of these prior art people locator services has been extremely successful, each method of locating a person is subject to a number of problems that diminish their effectiveness. For example, if the person being sought has changed their name these prior art methods are likely to fail. If a person has an unlisted phone number, which is becoming increasingly common with the use of cell phones as one exclusive phone service, “White Page” searches are ineffective. If the person being sought has a common name, the prior art locators may provide too many hits to be useful Moreover, those methods searching public records depend on the accuracy and age of those records.
Accordingly, there exists a need for improved methods of specifically locating lost persons.
The present invention solves one or more problems of the prior art by providing in at least one embodiment a method of locating a lost person. The method of this embodiment comprises providing search information that identifies a lost party to a search engine. This search information is obtained from a posting party that seeks to contact the lost party. The search engine is accessible to a plurality of searching users over a network of computers, and in particular over the Internet. The present embodiment advantageously takes advantage of the fact that internet users tend to search the names of individuals that they know and in particular, internet users tend to search for their own names over the internet to see what information about themselves is available. The present invention provides a searching user performing such search with a public message indicating that someone (i.e., the posting party) is looking for the lost party. A message from the searching user providing personal information regarding the lost party is received. The identity of the searching user is validated. Finally, at least one of the posting party or searching user is provided with contact information to enable direct communication between the posting party and the searching user.
a and 4b is a flowchart illustrating a specific implementation of the method of the invention.
Reference will now be made in detail to presently preferred compositions or embodiments and methods of the invention, which constitute the best modes of practicing the invention presently known to the inventors.
With reference to
The present embodiment advantageously takes advantage of the fact that Internet users tend to search the names of individuals that they know and in particular, internet users tend to search for their own names over the internet to see what information about themselves is available. As indicated by step 12, a searching user performs such search while accessing the Internet. The searching user may accessible the Internet by any suitable means. For example, the searching user may access the Internet with a personal computer, a web enabled mobile phone, a terminal, a web enabled PDA, a web enabled television, and the like. Typically, but not necessarily, the searching party is the lost party. If the search criteria used by the searching user in step 12 is sufficiently similar to the posted lost party information to constitute a “hit” or match (i.e., the search criteria include the lost party's name, variations of the lost party's name, synonym of the lost party's name, common misspellings of the lost party's name, or derivative thereof), a public message indicating that someone (i.e., the posting party) is looking for the lost party is provided by at least one Participating Entity (step 14). The public message may be stored at the search service provider or provided via a link to the lost party database. Optionally, the public message may include a photograph (i.e., a digital image). For example, the photograph may be of the lost party or the posting party or of anything useful in identifying the lost party. The “hit” information can be transmitted to the lost party database which then sends the public message to the searching user while logging the event. Typically, the public message will include a least a portion of the search information provided in step 10. Such a public message is provided by a microprocessor based system maintained by at least one Participating Entity. A response message from the searching user providing personal information regarding the lost party is received by at least one Participating Entity if the searching party desires to provide such information (step 16). After reviewing the public message the identity of the searching user is validated by at least one Participating Entity (step 20). As part of the validation process, the posting party is optionally provided with at least a portion of the personal information received from the searching user by at least one Participating Entity (step 22). Finally, at least one of the posting party or searching user is provided by at least one Participating Entity with contact information to enable direct communication between the posting party and the searching user (step 24) if the validation process is sufficiently successful or if the Posting party so desires. Typically, this information is only provided when payment of a match fee has been confirmed. In a variation of this embodiment, one or more of the steps set forth above that are implemented by a Participating Entity are executing by microprocessor-based systems in communication with suitable digital storage media (e.g., on a hard disks, magnetic tape storage system, CDs, DVDs, optical drive, RAM, and the like) as needed. In another variation, each of the steps implemented by a Participating Entity are executed by a microprocessor based system in communication with suitable digital storage media maintained by a single Participating Entity.
In a variation of the invention, the information provided in step 10 is made available to the search engine by its inclusion on a web page with the web page being indexed such that it is accessible to the search engine. In another variation of the invention, the information provided in step 10 is included in an index utilized by the search engine without a web site also including the information. In this latter variation, the information is directly entered into the index utilized by the search engine. Similarly, in a variation of the invention, the public message provided in step 14 is provided to the searching user via a web page. The search information includes any information that is useful to identify the lost party including for example, the name of the lost party. Optionally, the search information further includes one or more identifying characteristics of the lost party. Such characteristics include, for example, the lost party's education history, the lost party's marital history, nicknames for the lost party, the lost party's relatives, the lost party's employment history, and combinations thereof.
As set forth above, a response message is received in step 16. This response information may be provided by any number of methods. For example, the response message may be provided by filling out a form on a web page, by email, by phoning a central processing location, by land mail, or the like. In a variation, when a form is used, the form includes one or more question related to characteristics selected from the group consisting of the lost party's education history, the lost party's marital history, nicknames for the lost party, the lost party's relatives, the lost party's employment history, and combinations thereof.
The identity of the searching user is optionally validated by the searching user successfully answering one or more questions further identifying the lost party. The identity of the searching user may also be validated by the searching user making a payment with a verifiable personal account. Such a verifiable personal account includes, for example, credit cards, debit cards, internet payment services such as PayPal, and the like.
Ultimately, the posting party is provided personal information in step 22 and optionally one or both of the posting party and searching user are provided with contact information in step 24. Again, any number of methods may be used to provide such information. For example, e-mail, a posting on a website, telephoning of the posting party, land-base mail, and the like may be used to provide the personal information or contact information.
With reference to
Alternatively, only the search criteria is provided to the Internet-based search services. Once a search hit occurs the information is automatically transmitted to the lost party database who directly responds to the searching user. Prior to transmitting the public message the searching user's email address can be screened and logged into order to avoid improper searches and SPAM attacks. Storing the private and preferable public messages only on the lost party database reduces the number of sites containing highly confidential information and in turn reduces the risk of unauthorized access by hackers.
In a variation of this embodiment, a message is forwarded from the lost party to the posting party. Specifically, contact information is forwarded from the searching user to the posting party. Such contact information may be provided by any method reasonably fashioned to reach the posting party. Such methods include, but at not limited to, email, land-base mail, instant messaging (“IM”), a posting on a website, and the like. Typically, if the information is posted on a website, the website is private requiring a successful logon by the posting party for the contact information to be accessed.
As set forth above, the search information provided in step 50 is made available to the search engine by its inclusion on a web page with the web page being indexed such that it is accessible to the search engine. In another variation of the invention, the information provided in step 50 is included in an index utilized by the search engine without a web site also including the information. In this latter variation, the information is directly entered into the index utilized by the search engine. Similarly, in a variation of the invention, the public message provided in step 56 is provided to the searching uses a web page. The search information includes any information that is useful to identify the lost party including for example, the name of the lost party. Optionally, the search information further includes one or more identifying characteristics of the lost party. Such characteristics include, for example, the lost party's education history, the lost party's marital history, nicknames for the lost party, the lost party's relatives, geographic information, the lost party's employment history, and combinations thereof.
The mechanism for validated the identity of the searching user in step 58 is the same as those set forth above. For example, the identity of the searching user is validated by the searching user successfully answering one or more questions that further identify the lost party. In another variation, personal information derived from the searching party is forwarded to the posting party. In still other variations, the identity of the searching user may also be validated by the searching user making a payment with a verifiable personal account. Such a verifiable personal account includes, for example, credit cards, debit cards, internet payment services such as PayPal, and the like. This same mechanism can be used to verify the identity of the posting party in order to deter misuse of the system by persons assuming a false identity.
With reference to
With reference to
Posting users may directly contact the lost party system at step 10 or alternatively, the posting party may be directed to the lost party system via a link from an affiliate web site. In the case of a referral from an affiliate's web site an affiliate ID code will be transmitted automatically by the posing user via a “cookie” stored on the posting user's computer at the time of accessing a lost party system advertisement on the affiliate's site. When the posting user contacts the lost party system the “cookie” will be transmitted and logged with a created file.
In step 86, the lost party system processes the payment and verifies the identification and email address of the posting party. At this point, the search service provider may apply various screening techniques to block certain types of persons, organizations, or web addresses from utilizing the searching method of the invention. For example, various criminal databases can be accessed to minimize the utilization of the invention for criminal purposes. If the processing is successful, the search information is included into a lost party database or placed in a form accessible by an internet search engine. If a distinct lost party database is used, this database is optionally linked to other search service provider's search engines or search databases. A public message including at least at portion of this search information is included in this step.
When by happenstance, someone (i.e., the searching user) searches for “John E. Doe” on a website providing access to the lost party database or on a website providing access to a search engine that has access to at least a portion of the search information, a “hit” occurs and a public message is provided (step 88). An example of such a message is: “If you are John E. Doe click here someone is looking for you.” If an affirmative reply is provided in step 88, the searching user is asked to identify his identity and relationship to “John E. Doe.” Verification of the searching users identity is accomplished in the manner set forth above and in particular by using a verifiable personal electronic account to pay a fee. For example, the searching party is asked to verify that they are “John E. Doe” (step 90). In addition, the public message is provided to the searching user.
The lost party system in step 92 attempts to verify the searching users identity with the information provided in step 90. If the verification process succeeds, the searching party is asked if they are the lost party or if they have information regarding the lost party (step 94). Optionally, if the searching party is not the lost party, the posting party is provided the option of not having the private message provided to the searching user. If the searching party is the lost party, the private message is provided to the searching party. If verification cannot be accomplished, the posting party is asked if they desire to proceed anyway (step 96).
If the searching user is not the lost party, the posting party is notified in step 98 and given to option to send a modified private message. If the identity of the lost party is successfully verified in step 94, the searching party is invited in step 100 to submit a response message to be forwarded to the posting party and to indicate if they are ready to proceed to the match stage. The message of step 100 is forwarded to the posting party and the posting party is asked if they are ready to proceed to the match stage. If both parties are ready to proceed, the match stage is executed in step 102. At this stage, an optional match fee may be paid by one or both of the searching party or the posting party (104). A second private message may also be sent from the posting party to the lost party. Similarly, a series of messages between the lost party and posting party may be solicited and forwarded as indicated by loop 106. Finally, contact information between the parties is exchanged in step 108.
When a searching party is directed to the lost party system via a search service provider a search source ID is transmitted to the lost party system and logged in the lost party file. The lost party system tracks fees received attributable to the referring affiliate for the posting user and the search service provider responsible for linking the searching party to the system.
The lost party database administrator may automatically or periodically provide a hit report to the posting party of “hits” resulting in the transmission of public messages to posting parties. These reports can if desired by the lost party database administrator include internet address information of the searching user. The lost party database administrator will also log all financial payments along with information identifying the search service provider which caused the original “hit”, and the source of the posting party listing. Referrals from advertisers can be managed using a system of advertiser “cookies” to identify where a posting party learned of the lost party database. In a variation of the invention, a participating internet search provider is provided with a revenue report and a payment related to revenue derived users originating from a Internet service provider. The lost party database administrator can periodically provide “hit” reports to the participating internet search providers and share a portion of the revenue received attributable to advertiser referrals and internet search providers in the period.
While embodiments of the invention have been illustrated and described, it is not intended that these embodiments illustrate and describe all possible forms of the invention. Rather, the words used in the specification are words of description rather than limitation, and it is understood that various changes may be made without departing from the spirit and scope of the invention.