Traditionally, chain emails have been used to spread a message by asking each recipient to forward the message to one or more of his/her friends. This invention has following advantages over chain emails:
This invention combines concepts from existing fields uniquely to create a software service. It solves the problem of spreading a message of common interest in an efficient and ethical way. The following table summarizes the concepts used and the fields of origin:
A private network of friends: The private network includes some of the features of a social network likes members and friends but it also bas system wide privacy restrictions. The system is restricted by not exposing a member's social connections to any other member. That is, a member can only see his/hers own friends and cannot see his/her friends' friends. Because of this restriction, members cannot contact/solicit a friend's friend in the system. These restrictions allow the system to model a grassroots social network without compromising on the privacy of its members and their connections.
The message, its creation and its properties: A member of the system can create a message and thereby become its author. A message is just like a web page and it can have links, forms, links to downloadable documents and embedded audio and video files. It can be in common internet formats like HTML, XHTML, DHTML and XML. Also, a message can have several parts including a title, summary and a description.
A message author can place the message into different categories. He can also specify keywords in the message. The system itself will create a search index on the message. These methods allow efficient searching of the message by other members using categories and keywords. It also allows the system to compare two messages for closeness of content and warn message authors of duplicate messages. A message author can mark a message as private, thus making it unsearchable by other members in the system.
Message recommending: Once a member creates a message in the system, he/she can ask the system to show the message to one or more of his/her friends in the social network. This act is called recommending the message. All those friends would then be able to view the message when they subsequently connect to the system. If those friends are already connected to the system might automatically refresh their screen and show the new message. The system does not lose the context of the message as it gets recommended. The system maintains an unique identifier to a single copy of the message and it serves that same copy every time a member requests for the message.
Member actions on a message: A member that sees a message is called a viewer of the message.
A viewer can take one or more of the following actions on each message he views:
(1) Endorse the message content.
(2) Add a reason for endorsement.
Success metrics of the message: The system records each above action of a message viewer on a message. For video and audio files, the system maintains how long the viewer watched or listened to the content. Based on these data, the system calculated the metrics related to the overall success of a message. Some of the possible message metrics are number of members (and percentage of total members that this message was recommended to ) that have
Message promotion: A message author can ask the system to promote the message to other members that are not directly connected to her.
The system also uses collaborative filtering technique to show other messages to a message viewer. This technique looks at a subset of messages that a viewer acted on, then selects other members that acted on all the same messages the same way. Among the selected members, the system picks other messages that they acted on. It then shows these messages to the message viewer.
A message author can submit the message and the keywords in the message to one or more internet search engines like Google and Yahoo, so that, internet users searching on those keywords would find the message in this social network. The author can also ask the system to place advertisements for the message in other internet websites.
Soliciting messages with additional system functionality: A message author can use enhanced messages to solicit message viewers to conduct an online transaction or send an online communication by submitting a web form embedded in the message, These enhanced messages are defined by the system using message templates and it will include web form fields that are necessary to conduct a particular transaction or send a certain communication. The author and viewers of the message can recommend these soliciting messages just liked other messages. When a member views this message, one or more fields in the form might get filled automatically from the viewer's profile in the system. When the viewer submits the form to the system. the system will conduct an online transaction or send an online communication depending on the message template.
Some such soliciting messages are:
Grassroots advocacy example: An author creates a message using the Grassroots Advocacy template which solicits the message viewer to email his legislators. The template provides placeholders for the author to fill up the message title, a description and the body of the email that would be sent to the legislator. The author used these fields to write about Global warming and he recommends the message to some of his friends who recommend it to others. When the message viewers click on the submit button in this message, the system uses the viewer's name and home address to match him to his legislator and emails a letter to the legislator on his behalf.
Fundraising example: An author creates a message using the Fundraising template that solicits message viewers to contribute money to an organization. The author used the placeholder fields to write about The Ted Cross organization and the suggested contribution amounts and recommends it to her friends. Message viewers can use a drop down box in the message to select one of several contribution amounts that the author picked and enter their credit cared information,. when a viewer submits this form, the system uses the viewer's credit card information and the dollar amount she chose to make a contribution to the Red Cross organization on the viewer's behalf.
Product/Service purchase example: An author uses the online transaction template to crate a message. The template will provide a placeholder for the product or service and a placeholder for the online store that will fulfill that request. The author will choose his product or service from those lists and recommend the message to his friends. The viewers of this message can use a textbox to fill a quantity of the product that they want to purchase and also credit card information. When the message viewer submits the form, the system will use the member's credit card to place an order for the product with the online store on the viewer's behalf.
Number | Name | Date | Kind |
---|---|---|---|
5454213 | Gola | Oct 1995 | A |
5636292 | Rhoads | Jun 1997 | A |
5793497 | Funk | Aug 1998 | A |
5913212 | Sutcliffe et al. | Jun 1999 | A |
5941947 | Brown et al. | Aug 1999 | A |
6209100 | Robertson et al. | Mar 2001 | B1 |
6279124 | Brouwer et al. | Aug 2001 | B1 |
6345288 | Reed et al. | Feb 2002 | B1 |
6549957 | Hanson et al. | Apr 2003 | B1 |
6748422 | Morin et al. | Jun 2004 | B2 |
6779022 | Horstmann et al. | Aug 2004 | B1 |
6865715 | Uchino et al. | Mar 2005 | B2 |
6952406 | Procopio | Oct 2005 | B2 |
6980983 | Banerjee et al. | Dec 2005 | B2 |
7013290 | Ananian | Mar 2006 | B2 |
7027463 | Mathew et al. | Apr 2006 | B2 |
7028001 | Muthuswamy et al. | Apr 2006 | B1 |
7130807 | Mikurak | Oct 2006 | B1 |
7188153 | Lunt et al. | Mar 2007 | B2 |
7218921 | Mendiola et al. | May 2007 | B2 |
7305436 | Willis | Dec 2007 | B2 |
7310676 | Bourne | Dec 2007 | B2 |
7386517 | Donner | Jun 2008 | B1 |
7437429 | Pardikar et al. | Oct 2008 | B2 |
7472110 | Achlioptas | Dec 2008 | B2 |
20040148503 | Sidman | Jul 2004 | A1 |
20050120084 | Hu et al. | Jun 2005 | A1 |
20050159970 | Buyukkokten et al. | Jul 2005 | A1 |
20060069732 | Shannon et al. | Mar 2006 | A1 |
20060143068 | Calabria | Jun 2006 | A1 |
20060242554 | Gerace et al. | Oct 2006 | A1 |
20060282304 | Bedard et al. | Dec 2006 | A1 |
20070043766 | Nicholas et al. | Feb 2007 | A1 |
20070121843 | Atazky et al. | May 2007 | A1 |
20070150603 | Crull et al. | Jun 2007 | A1 |
20070161382 | Melinger et al. | Jul 2007 | A1 |
20070218900 | Abhyanker | Sep 2007 | A1 |
20070220092 | Heitzeberg et al. | Sep 2007 | A1 |
20070250585 | Ly et al. | Oct 2007 | A1 |
20080005064 | Sarukkai | Jan 2008 | A1 |
20080177846 | Feng | Jul 2008 | A1 |
20080235339 | Lurey et al. | Sep 2008 | A1 |
Number | Date | Country | |
---|---|---|---|
20070271336 A1 | Nov 2007 | US |