System and Method for Managing Information Flow Between Members of an Online Social Network

Abstract
An online social network is provided in which members of the online social network control who may view their personal information and who may communicate with them. The members control who may view their personal information by setting a visibility preference. A member may not view another member's full personal profile if the measure of relatedness between the two is greater than the visibility preference of the other member. The members also control who may communicate with them by setting a contactability preference. A member may not communicate with another member if the measure of relatedness between the two is greater than the contactability preference of the other member.
Description
BACKGROUND

1. Technical Field


Particular embodiments generally relate to a system and method for managing information accessible online and, more specifically, to a system and method for managing information flow between members of an online social network based on their user preference settings and their relative positions within the online social network.


2. Description of the Related Art


Over the past several years, the amount of personal information that individuals share online has increased dramatically. Many websites provide an online community that provides content focusing on a common interest or theme (e.g., a “fan site” for a television program or musical artist), and allows people to join the online community and share personal information with other members of the online community.


Online social networking sites have also been rapidly gaining in popularity. Typically, members of an online social network communicate with one another and meet other members based on personal information captured in the other member profiles.


Also, members of online social networks often request their existing friends to join, creating a web of online relationships that mirror offline ones. Operators of online social networking sites typically require that new members provide certain personal information to join, including contact information (e.g., physical and email addresses, telephone numbers, instant messaging nicknames, etc.) and identifying information (e.g. a name, location, personal interests, age, etc.).


A positive consequence of this general trend is the greater ability for groups of friends, families and other acquaintances to communicate online with, and about, each other as members of a social network. For example, a group of friends may share personal information with each other about common interests, individual personal attributes, events, schedules and activity plans and may also access each others' personal information. Another benefit of online social networks is that members can more easily find others who share common interests, goals, lifestyles, etc., without being limited to an online community dedicated to a particular interest. Doing so allows members to expand their social networks.


Many people, however, are reluctant to provide personal information to an online social network. The reasons for this reluctance are varied. Some have experienced undesired communications when submitting personal information online. For example, automated agents may be configured to scour the information available from an online social networking site to harvest email addresses and later send unsolicited email to the harvested addresses, or some members may be deluged by unwanted messages from strangers. Parents are often concerned about allowing their children to provide personal information to an online source out of the fear that it may be subsequently misused by strangers.


SUMMARY

Particular embodiments provide a more appealing online environment for sharing personal information. In this environment, individuals who share their personal information also specify settings that dictate who may view their personal information and who may communicate with them.


Preferably, the environment is an online social network and the individuals are members of the online social network. The members control which other members of the online social network may view their personal information by setting a visibility preference at 1, 2, 3 or ALL. A visibility preference of 1 means that only friends of the member may view that member's personal information. A visibility preference of 2 means that only friends of the member and friends of friends of the member may view that member's personal information. A visibility preference of 3 means that only friends of the member, friends of friends of the member, and friends of friends of friends of the member may view that member's personal information. A visibility preference of ALL means that all members of the online social network may view that member's personal information.


The members also control which other members of the online social network may communicate with them by setting a contactability preference at 1, 2, 3 or ALL. A contactability preference of 1 means that only friends of the member may communicate with that member. A contactability preference of 2 means that only friends of the member and friends of friends of the member may communicate with that member. A contactability preference of 3 means that only friends of the member, friends of friends of the member, and friends of friends of friends of the member may communicate with that member. A contactability preference of ALL means that all members of the online social network may communicate with that member.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a diagram that illustrates the relationships between members in a social network.



FIG. 2 is a block diagram illustrating a system for providing an online social network, according to particular embodiments;



FIG. 3 is a flow diagram illustrating a method for becoming a member of an online social network and setting user preferences for different information blocks, according to particular embodiments.



FIG. 4 is a flow diagram illustrating a method for processing a request by one member to view the profile of another member in the system of FIG. 2;



FIG. 5 is a flow diagram illustrating a method for determining whether a member can be contacted by another member in the system of FIG. 2;



FIG. 6 is a flow diagram illustrating a method for processing a search request in the system of FIG. 2;



FIG. 7 illustrates a sample interface used in inputting member information including an interface for setting visibility and contactability preferences; and



FIG. 8 illustrates a sample interface used in initiating a search request and selecting from search results.





DETAILED DESCRIPTION

A social network is generally defined by the relationships among groups of individuals, and may include relationships ranging from casual acquaintances to close familial bonds. A social network may be represented using a social graph structure. Each node of the graph corresponds to a member of the social network. Edges connecting two nodes represent a relationship between two individuals. In addition, the degree of separation between any two nodes is defined as the minimum number of hops required to traverse the graph from one node to the other. A degree of separation between two members is a measure of relatedness between the two members.



FIG. 1 is a social graph representation of a social network centered on a given individual (ME). Other members of this social network include A-U whose position, relative to ME's, is referred to by the degree of separation between ME and each other member. Friends of ME, which includes A, B, and C, are separated from ME by one degree of separation (1 d/s). A friend of a friend of ME is separated from ME by 2 d/s. As shown, D, E, F and G are each separated from ME by 2 d/s. A friend of a friend of a friend of ME is separated from ME by 3 d/s. FIG. 1 depicts all nodes separated from ME by more than 3 degrees of separation as belonging to the category ALL.


Degrees of separation in a social network are defined relative to an individual. For example, in ME's social network, H and ME are separated by 2 d/s, whereas in G's social network, Hand G are separated by only 1 dis. Accordingly, each individual will have their own set of first, second and third degree relationships.


As those skilled in the art understand, an individual's social network may be extended to include nodes to an Nth degree of separation. As the number of degrees increases beyond three, however, the number of nodes typically grows at an explosive rate and quickly begins to mirror the ALL set.



FIG. 2 is a block diagram illustrating a system for managing an online social network. As shown, FIG. 2 illustrates a computer system 100, including an application server 200 and distributed graph servers 300. The computer system 100 is connected to a network 400, e.g., the Internet, and accessible over the network by a plurality of computers, which are collectively designated as 500.


The application server 200 manages a member database 210, a relationship database 220 and a search database 230. The member database 210 contains profile information for each of the members in the online social network managed by the computer system 100. The profile information may include, among other things: a unique member identifier, name, age, gender, location, hometown, references to image files, listing of interests, attributes, etc. The profile information also includes VISIBILITY and CONTACTABILITY settings, the uses of which are described below in connection with FIGS. 4 and 5.


The relationship database 220 stores information relating to the first degree relationships between members. In addition, the contents of the member database 210 are indexed and optimized for search, and stored in the search database 230. The member database 210, the relationship database 220, and the search database 230 are updated to reflect inputs of new member information and edits of existing member information that are made through the computers 500.


The member database 210, the relationship database 220, and the search database 230 are depicted separately in the block diagram of FIG. 2 to illustrate that each performs a different function. The databases 210, 220, 230 may each represent a different database system, module, or software; or any two of the three or all three may be parts of the same database system, module, or software.


The application server 200 also receives and processes information exchange requests received from the remote computers 500. An information exchange request may be a request to create a new member profile, (FIG. 3), a request to view another member's profile (FIG. 4), a request to send messages to a member (FIG. 5), or a search request (FIG. 6). The application server 200 relies on the distributed graph servers 300 to process certain CPU-intensive tasks required to process the information exchange request.


The graph servers 300 receive a query from the application server 200, process the query and return the query results to the application server 200. The graph servers 300 manage a representation of the social network for all the members in the member database. Detailed examples of graph servers and related components are described in detail in U.S. patent application Ser. No. 10/854,054, titled “System and Method for Managing an Online Social Network” and filed on May 26, 2004, the contents of which are hereby incorporated by reference.



FIG. 3 is a flow diagram illustrating a method for processing a request from a potential new member to join an online social network. In Step 310, the application server 200 receives a request from the potential new member (NM1) to join the online social network. As an example, this may occur when NM1 clicks on a hyperlink navigating to the online social network's website. Potential new members may also request to join the online social network in response to a message from another existing member.


In Step 320, the application server 200 responds to NM1's request by providing NM1 with an interface to enter personal information and corresponding user preferences. FIG. 7 illustrates a webpage that allows NM1 to enter identifying information, including NM1's first and last name, email address and username. The interface may also allow NM1 to enter other personal information (e.g., affiliations, employers, locations, contact information for other potential new members etc.).


At Step 330, NM1 enters the information in the fields provided by the interface. As illustrated, FIG. 5 the web page also includes a set of radio buttons allowing NM1 to select VISIBILITY and CONTACTABILITY preferences giving NM1 greater control over the personal information that NM1 provides to the online social networking site.


At Step 340, NM1 sets VISIBILITY and CONTACTABILITY preferences for the information entered in Step 330. As the two identifiers suggest, the VISIBILITY and CONTACTABILITY preferences refer, respectively, to the flow of NM1's personal information to others and to the flow of information to NM1. As further described below in conjunction with FIGS. 4-5, the VISIBILITY setting defines the elements of NM1's personal information (e.g., member profile) that others may view, based on their degree of separation from NM1. On the other hand, the CONTACTABILITY setting limits who may communicate with NM1 (e.g., bye-mail, text messaging, voicemail, instant messaging, chat, or other similar means), also based on their degree of separation from NM1.


For some embodiments, the personal information collected by the online social networking site may be subdivided into different groups, and NM1 may selectively set the VISIBILITY and CONTACTABILITY preferences for each group. Accordingly, after Step 350, NM1 may repeat Steps 320 through 340 for additional information groups.


At Step 360, NM1 identifies relationships with other members (e.g., M2) of the online social network. For example, if NM1 is joining the online social network in response to a request from M2, NM1 may confirm that M2 is, in fact, NM1's friend (Le., NM1 is separated from the requestor by 1 d/s). NM1 identifies any other relationships by specifying email addresses of NM 1's friends.


In the preferred embodiment, before updating the databases 210, 220, 230 to reflect a new 1 d/s relationship between NM1 and another member, the other member is required to confirm that NM1 is a friend. Doing so prevents NM1 from falsely claiming that a first degree relationship exists with the other member when one does not. At Step 370, the application server 200 updates the databases 210, 220, 230 to reflect the new relationships in the social graph.


As those skilled in the art will recognize, once NM1 has joined the social networking site, NM1 may add additional first degree relationships to NM1's social network at any time using the operations described above. Moreover, NM1 may be updating his or her social network as new 1 d/s connections are made. For example, NM1 may uncover an unknown third degree relationship with M3 by browsing through member profiles on the online social network site. Depending on such M3's contact preferences, NM1 may then contact and begin exchanging messages with M3. Later, NM1 may update the social network to indicate that he or she now has a first degree relationship with M3.



FIG. 4 is a flow diagram illustrating a method for processing a request by one member (e.g., M1) to view the profile of another member (e.g., M2) in the system of FIG. 2. As M1 interacts with the social network web site, M1 may request to view the profiles of other members. For example, M1 may view the profiles a member with whom M has a 1 d/s relationship (e.g., M1's friend MA). MA's profile may include references to MA's 1 d/s relationships (which are also among M1's 2 d/s relationships). M may view successive member profiles, each time traversing an edge between two nodes in the social network. As M1 does so, M1 makes serial requests of the application server to view member profiles.


In Step 610, the application server 200 receives a request by member M1 to view the profile of member M2. If the d/s between M1 and M2 is less than or equal to M2's VISIBILITY preference or if M2's VISIBILITY preference is set to ALL, then the full profile of member M2 will be displayed. M2's VISIBILITY setting may be set at 1, 2, 3 or ALL, and settings 1, 2 and 3 correspond to degrees of separation, 1 d/s, 2 d/s and 3 d/s and ALL corresponds to all members, regardless of degree of separation.


In Step 620, the application server 200 retrieves M2's VISIBILITY setting from the member database 210. If M2's VISIBILITY setting is ALL, the full profile of M2 will be transmitted to M1 for display at M1's computer (Steps 630 and 640). If not, the application server 200 queries the graph servers 300 to determine the d/s between member M1 and member M2 (Steps 630 and 650). The graph servers 300 process the query and return the d/s between M1 and M2 to the application server 200.


If the d/s between M1 and M2 is greater than M2's VISIBILITY setting (or if M1 and M2 are not connected in the social network), only the mini-profile of member M2 will transmitted to M1's computer for display. (Steps 660 and 670). In the preferred embodiment, every member of the online social network has a mini-profile that includes a limited set of the personal information provided by each member as described above regarding FIG. 3. For example, the mini-profile may include only an image, first name and location. In some embodiments, the member may specify what's to be included in his or her mini-profile.


Otherwise, when the d/s between M1 and M2 is less than or equal to M2's VISIBILITY preference, the application server retrieves M2's full profile and transmits it to M1 for display at M1's computer (Steps 660 and 640). For some embodiments where the VISIBILITY and CONTACTIBILITY preferences are set for different elements within each member's profile, the application server 200 may return only some elements of M2's profile but not others.


Alternatively, for some embodiments, an online social network may not provide any information about M2 to M1 when the d/s between them is outside of M2's VISIBILITY preference. In such an embodiment, the application server 200 respond to M1's request to view M2's member profile by displaying an error message, or by displaying a “no profile found” message, and the application server 200 would also exclude M2's member profile from any search results displayed to M1.



FIG. 5 is a flow diagram illustrating a method for managing information flow to a member based on the member's CONTACTIBILITY preference. The following example assumes that member M1 is viewing the full profile of another member M2. When the application server transmits M2's full profile to M1 according to the operations of FIG. 4, the application server 200 may also determine whether M1 may initiate communications with M2.


In Step 710, the application server 200 retrieves the CONTACTABILITY setting of member M2. (e.g., CONTACTABILITY setting may be set as 1, 2, 3 or ALL.) If M2's CONTACTABILITY setting is ALL, M2 will permit contact from anyone, and consequently, when M1 views M2's profile, a “Send Message” hyperlink will appear which member M1 may click to send messages to member M1 (Steps 720 and 730).


If M2's CONTACTABILITY setting is less than ALL, the application server 200 queries the graph servers 300 to determine the d/s between member M1 and member M2 (Steps 720 and 740). The graph servers 300 process the query and return the d/s between M1 and M2 to the application server 200. If M2's CONTACTABILITY setting is less than the computed d/s (or if M1 and M2 are not connected), than M2 is not permitting contact from member M1 and the “Send Message” hyperlink will not be displayed when member M1 views member M2's profile (Steps 750 and 760). Conversely, if M2's CONTACTABILITY setting is greater than or equal to the computed d/s, this then M1 may send messages to M2, and consequently, when member M1 views M2's profile, a “Send Message” hyperlink, (or other mechanism allowing M1 to initiate contact with M2) may be displayed which member M1 clicks to send messages to member M1 (Steps 750 and 730).



FIG. 6 is a flow diagram illustrating the method for processing a search request in the system of FIG. 2. In Step 810, the application server 200 receives a search query entered by member M1. The search query may be divided into two parts. The first part specifies search limitations, if any, for categories such as gender, age, interests and location. The second part specifies a d/s setting, which may be set at 1, 2, 3 or ALL. For example, the search query may be: [gender (female), age (less than 30), d/s (at most 2)]. The first part of this search query is [gender (female), age (less than 30)] and the second part of this search query is [d/s (at most 2)]. In Step 820, the application server 200 issues the first part of the search query to the search database 230 to obtain a set of member identifiers that includes the members whose profiles meet the specified criteria. In Step 830, the application server 200 may query to the graph servers 300 to obtain a set of member identifiers of members that are within the d/s specified in the second part of the search query. The application server 200 merges the results from the search database 230 and the graph servers 300 (Step 840), and transmits the merged results to member M1 (Step 850). After the application server 200 delivers the merged results to member M1, the member may click on any of the results to view that member's profile according to the methods illustrated in FIGS. 4 and 5.


Additionally, for some embodiments, the merged results may be further limited based on the VISIBILITY preference of each member included in the merged set. Some embodiments may not display mini-profiles in response to a request to a view a member's profile if the degree of separation between that member and the requesting member exceeds the VISIBILITY preference of that member. In such an embodiment, the search results may be further limited based on each matching members' VISIBILITY preference. For example, if M1 makes queries the application server 200 as described above with the following query: [gender (female), age (less than 30), d/s (at most 2)], the application 200 server would further limit the merged results by removing the profile of any member included in the merged results whose VISIBILITY preference is set to 1.



FIGS. 7 and 8 illustrate two sample interfaces served on computers 500 for inputting information. FIG. 7 represents interface elements that may be used to input new member information. A new member may enter information using text fields 5101 and 5102. In addition, radio buttons 520 are provided to allow the new member to specify CONTACTABILITY and VISIBILITY preferences by a degree of separation of one, two, three or ALL.



FIG. 8 represents interface elements that a member may use to search the member profiles stored in the online social network according to the method of FIG. 6. Specifically, FIG. 8 illustrates an interface allowing a user to enter the search query described above, according to particular embodiments. The interface shows a member that has entered the search criteria of [gender (female), age (less than 30), d/s (at most 2)]. Additionally, search results show a list of members of the online social network that satisfy all of the search criteria. Member profile shows the details of profile associated with one member included in the search results.


In the embodiments described above, the ALL setting is used to signify all members within the online social network. Alternatively, the ALL setting could be used to signify anyone and everyone, such that, if a member has a VISIBILITY preference set at ALL, anyone, even those who are not members of the online social network, could access the member's personal information.


Furthermore, the preference settings of 1, 2, 3, or ALL can be generically viewed as permission levels, specified by a member of the online network, for any type of activity involving the member and another person. For example, a preference setting for SEARCHABILITY may be included as an item in the member's profile. When this setting is used, a member will not appear in another member's search results unless the other member is within the degree of separation specified in the SEARCHABILITY setting.


While particular embodiments of the invention have been illustrated and described above, those skilled in the art understand that the invention can take a variety of forms and embodiments within the scope of the appended claims.

Claims
  • 1. A method comprising: by one or more computing devices, receiving a request from a first user to view a user profile of a second user;by the one or more computing devices, determining, based on information associated with a social graph, an authorization level of the first user with respect to contacting the second user; andby the one or more computing devices, if the authorization level of the first user meets or exceeds an authorization requirement for contacting the second user, then providing for display a contactable version of the user profile of the second user, the contactable version of the user profile of the second user comprising an interface for the first user to initiate contact with the second user.
  • 2. The method of claim 1, wherein the authorization requirement comprises a value specifying a maximum degree of separation between the second user and a requesting user connected to the second user within the social graph.
  • 3. The method of claim 1, wherein the authorization level comprises a value representing the degree of separation between the first user and the second user within the social graph.
  • 4. The method of claim 1 wherein the interface for the first user to initiate contact with the second user comprises an interface to send an instant message to the second user.
  • 5. The method of claim 1, wherein the authorization level of the first user meets or exceeds the authorization requirement, further comprising providing for display a full user profile of the second user to the first user.
  • 6. The method of claim 1, wherein the authorization level of the first user does not meet or exceed the authorization requirement, further comprising providing for display a mini-profile of the second user to the first user, wherein the mini-profile of the second user is a predetermined subset of the full user profile of the second user.
  • 7. The method of claim 1, wherein the interface for the first user to initiate contact with the second user comprises a hyperlink for the first user to initiate contact with the second user.
  • 8. A system, comprising: a data store comprising a social network graph, wherein the social network graph comprises a plurality of nodes, each node corresponding to a respective user, and edge data identifying connections between nodes of the plurality of nodes, wherein a degree of separation between a first node and a second node in the social network graph is a minimum number of hops required to traverse from the first node to the second node; the data store further comprising user profile information including authorization requirements for accessing user profiles of one or more users; andone or more application servers, each operative to: receive a request from a first user to view a user profile of a second user,determine, based on information associated with a social graph, an authorization level of the first user with respect to contacting the second user; andif the authorization level of the first user meets or exceeds an authorization requirement for contacting the second user, then provide for display a contactable version of the user profile of the second user, the contactable version of the user profile of the second user comprising an interface for the first user to initiate contact with the second user.
  • 9. The system of claim 8, wherein the authorization requirement comprises a value specifying a maximum degree of separation between the second user and a requesting user connected to the second user with the social graph.
  • 10. The system of claim 8, wherein the authorization level comprises a value representing the degree of separation between the first user and the second user within the social graph.
  • 11. The system of claim 8, wherein the interface for the first user to initiate contact with the second user comprises an interface to send an instant message to the second user.
  • 12. The system of claim 8, wherein the authorization level of the first user meets or exceeds the authorization requirement, further comprising providing for display a full user profile of the second user to the first user.
  • 13. The system of claim 8, wherein the authorization level of the first user does not meet or exceed the authorization requirement, further comprising providing for display a mini-profile of the second user to the first user, wherein the mini-profile of the second user is a predetermined subset of the full user profile of the second user.
  • 14. The system of claim 8, further comprising a social graph server, which transmits, in response to a request from the one or more application servers, social graph information to the requesting application server, wherein the application server utilizes the received social graph information to determine an authorization level for the first user.
  • 15. One or more computer-readable non-transitory storage media embodying software operable when executed by one or more computer systems to: receive a request from a first user to view a user profile of a second user;determine, based on information associated with a social graph, an authorization level of the first user with respect to contacting the second user; andif the authorization level of the first user meets or exceeds an authorization requirement for contacting the second user, then provide for display a contactable version of the user profile of the second user, the contactable version of the user profile of the second user comprising an interface for the first user to initiate contact with the second user.
  • 16. The media of claim 15, wherein the authorization requirement comprises a value specifying a maximum degree of separation between the second user and a requesting user connected to the second user within the social graph.
  • 17. The media of claim 15, wherein the authorization level comprises a value representing the degree of separation between the first user and the second user within the social graph.
  • 18. The media of claim 15, wherein the interface for the first user to initiate contact with the second user comprises an interface to send an instant message to the second user.
  • 19. The media of claim 15, wherein the authorization level of the first user meets or exceeds the authorization requirement, further comprising provide for display a full user profile of the second user to the first user.
  • 20. The media of claim 15, wherein the authorization level of the first user does not meet or exceed the authorization requirement, further comprising providing for display a mini-profile of the second user to the first user, wherein the mini-profile of the second user is a predetermined subset of the full user profile of the second user.
Parent Case Info

The present application is a continuation of U.S. patent application Ser. No. 12/976,518, filed Dec. 22, 2010, entitled “System and method for managing information flow between members of an online social network,” which is currently pending, which is a continuation of U.S. patent application Ser. No. 10/854,057, filed May 26, 2004, entitled “System and method for managing information flow between members of an online social network,” now U.S. Pat. No. 8,010,458, issued Aug. 30, 2011.

Continuations (2)
Number Date Country
Parent 12976518 Dec 2010 US
Child 13918649 US
Parent 10854057 May 2004 US
Child 12976518 US