WO2004044705A2 - Method and system of searching by correlating the query structure and the data structure - Google Patents

Method and system of searching by correlating the query structure and the data structure Download PDF

Info

Publication number
WO2004044705A2
WO2004044705A2 PCT/US2003/036045 US0336045W WO2004044705A2 WO 2004044705 A2 WO2004044705 A2 WO 2004044705A2 US 0336045 W US0336045 W US 0336045W WO 2004044705 A2 WO2004044705 A2 WO 2004044705A2
Authority
WO
WIPO (PCT)
Prior art keywords
information
category
categories
sub
users
Prior art date
Application number
PCT/US2003/036045
Other languages
French (fr)
Other versions
WO2004044705B1 (en
WO2004044705A3 (en
Inventor
Steven David Lavine
Original Assignee
Transparensee Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Transparensee Systems, Inc. filed Critical Transparensee Systems, Inc.
Priority to AU2003290756A priority Critical patent/AU2003290756A1/en
Priority to EP03783339A priority patent/EP1565844A4/en
Priority to CA2545230A priority patent/CA2545230C/en
Priority to US10/534,627 priority patent/US7461051B2/en
Publication of WO2004044705A2 publication Critical patent/WO2004044705A2/en
Publication of WO2004044705A3 publication Critical patent/WO2004044705A3/en
Publication of WO2004044705B1 publication Critical patent/WO2004044705B1/en
Priority to US12/325,991 priority patent/US8185515B2/en
Priority to US13/450,137 priority patent/US8577867B2/en
Priority to US14/283,659 priority patent/US10242028B2/en
Priority to US16/269,979 priority patent/US11275773B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/954Navigation, e.g. using categorised browsing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99934Query formulation, input preparation, or translation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99935Query augmenting and refining, e.g. inexact access

Definitions

  • the present invention relates generally to data searching methods and systems and, more particularly concerns systems utilizing them.
  • search engines are software programs and information systems that are specifically designed to assist users in finding information. While existing search engines have been adequate, they are limited in their ability to uncover useful information when users are searching. The primary reason is that search engines tend to be language based, and a searcher is not always familiar with the common terminology in his field of search. Also, there may be useful information available which does not conform to the common terminology. It also takes substantial skill or experience to formulate queries that will produce meaningful results.
  • search results are achieved that are broader and more intelligent than basic keyword searching. This is achieved by imposing a structure on d ata being searched and utilizing the same structure for search queries. Relevant information is then uncovered by correlating the structure of the data being searched and the structure of the query. Items to be searched can include anything: messages, discussions, articles, polls, transcripts, or anything else that can be linked to or pulled from a database. Search results can be included that are less than 100% relevant, and not just 100% relevant. In the absence of, or in addition to, results that would be generated by a Boolean keyword-only-search, users can retrieve results of some relevance, for example as determined by a set of selectable filter criteria. Consequently, merchants can sell inventory which might otherwise be unseen and/or users can find information which might otherwise stay hidden in an overly strict Boolean search.
  • the method of the present invention is the glue that holds online speakers together as they seek to use the Worldwide Web to communicate as they do in life. It lets users speak without seeing the spam that fills most message boards; allows interesting conversations to take place without interruption; and gives users the anonymity to talk candidly without fear that their identities may be revealed.
  • the present invention transforms ordinary sites into profitable "para-sites."
  • Para-sites are sites that feed off the work of their own users.
  • a para-site powered by the present invention collects interesting, relevant information by harnessing users to post and organize content, at no cost to the site-operator. Methods and systems embodying the present invention will hereafter be referred to by use of the assignee's trademark T RANSPARENSEETM. Users find sites stickier than other sites because of the high quality of information generated by the present invention. Site owners can restrict access to this information in different ways, allowing the most valuable information to be repackaged and resold to different markets at different price points.
  • TRANSPARENSEETM sites attract users with specific interests. Users who speak intelligently about subjects they know soon find that their opinions on that subject carry more weight - and are heard by more people - than the opinions of others. The weight given to a particular user's thoughts on a subject is quantified as the user's "reputation" for knowing that subject.
  • TRANSPARENSEETM sites allow users to develop and maintain complex, multi -variable reputations for a wide variety of different subjects. As users develop high reputations for knowing a particular subject, they gain privileges on the site as a result; as they gain privileges, their investment in the site grows. High-reputation users become reluctant to move conversations off-site because, by leaving, they'll lose the benefits they've gained as high-reputation users.
  • TRANSPARENSEETM site reputations are portable. Reputation values are stored at and administered from a central location, allowing users to carry their reputations with them from TRANSPARENSEETM site to TRANSPARENSEETM site. In other embodiments, reputation values are stored in a partly or wholly distributed fashion.
  • the present invention fills a demand which, though strong, has not been met by any other product.
  • the invention is equally unique in the way that it allows licensees to precisely target users based on detailed information without invading their individual privacy.
  • the present invention provides several immediate benefits. It promotes the disclosure of superior information, then ranks and organizes that information in a way that allows it to be easily packaged and sold to different audiences at different price points. It makes sites stickier while at the same time allowing licensees to provide advertisers with far more narrowly targeted advertisements than they otherwise could, substantially increasing advertising revenues. And it allows companies to lessen (or eliminate) the cost of hiring moderators to monitor online discussion.
  • Fig. 1 illustrates an embodiment of a typical static system wherein boards are grouped by firms, industries and topics;
  • Fig. 2 illustrates one embodiment of a system running utilizing the reputation aspect of the present invention
  • Fig. 3 illustrates examples of relationships
  • Fig. 4 illustrates an embodiment of a simple dynamic system
  • Fig. 5 illustrates an example of selected categories of content and user selected categories being used as inputs to generate relevances
  • Fig. 6 illustrates an embodiment of a complex dynamic system
  • Fig. 7 illustrates an example flow chart for updating a user's rating
  • Fig. 8 shows an example of calculating an aggregate reputation
  • Fig. 9 illustrates an embodiment of threshold filtering wherein a palette contains a scatterplot. And each dot represents s message
  • Fig. 10 illustrates an embodiment of a scatterplot wherein the user has chosen to view messages of high message quality without much regard to the reputation of the poster;
  • Fig. 11 illustrates an embodiment of a scatterplot wherein the user has chosen to view messages posted by users with high reputations without much regard to message quality
  • Fig. 12 illustrates an embodiment of a scatterplot wherein the user has chosen to view messages of high quality written by people with high reputations
  • Fig. 13 illustrates an embodiment of a scatterplot wherein the average combination of reputation and message rating is selected by users of a certain filter set
  • Fig. 14 illustrates an embodiment of related filters
  • Fig. 15 illustrates an example flow chart of annotation posting
  • Fig. 16 illustrates an embodiment of tagged content.
  • Fig. 17 illustrates an embodiment of annotated tagged content
  • Fig. 18 illustrates an example flow chart of posting at different levels of anonymity
  • Fig. 19 illustrates key features of different levels of anonymity
  • Fig. 20 illustrates an example of onion routing
  • Fig. 21 illustrates an example of determining a discussion rating based on multiple factors
  • Figure 22 is a functional block diagram illustrating the preferred environment for the present invention.
  • Figure 23 is an exemplary partial screen shot presented to a searcher in the dating service database
  • Figure 24 is a screen shot representing the results of an exemplary search
  • FIGS. 25a and 25b together illustrate the results of an enhanced search
  • Figures 26a and 26b are screen shots of a page of the online dating service which permits a searcher to review a candidate's long answers and a summary of the multiple choice answers;
  • Figure 27 is a screen shot of a summary page for a user;
  • Figure 28 is a multi-level tree representing a category with a hierarchical structure
  • Figure 29 illustrates a scalar category as represented by a tree with a single top node
  • Figure 30 is a tree diagram illustrating a process for determining relevance of a category having a hierarchical data structure
  • Fig. 31 is a tree diagram illustrating a process for determining the relevance value of a category having a scalar structure.
  • Figure 22 is a functional block diagram illustrating the preferred environment for the present invention.
  • a plurality of users' computers U access a content server C via a network I, preferably the Internet.
  • Server C provides the users U access to a content database CD.
  • Database CD may provide various types of information. For example, it may maintain the information used by an online dating service. Alternatively, it could provide the information for a restaurant survey service or wine survey service, or numerous other special interest services. Database CD could also include, in addition to surveys, product reviews and articles of interest on various subjects.
  • a web server W which cooperates with a system S, in accordance with the present invention, to manage users' access to information in database CD.
  • a query and search module 20 in accordance with the present invention interfaces with users, permitting them to formulate requests for information from d atabase CD.
  • M odule 20 c reates, m anages a nd m aintains a s corture database 10, which contains information describing the structural relationship between various pieces of information in database CD.
  • Database 10 also contains information relating to the structural relationship between various portions of information in a query in a format comparable to the structural relationship of information in database CD.
  • information in the database 10 is used to correlate the data structure of a query to the structure of database CD, in order to determine that information in database CD which needs to be provided to a user in response to a query.
  • Server W then connects the user to server C, with instructions to server C regarding what information is to be provided to the user from database CD.
  • system S also includes a user information module.
  • This module is particularly useful in systems in which users access information in database CD which has been provided by other users. Module 30 could then, for example, include information about the reputation of various users with respect to the information which they have furnished. A user accessing information in database CD which has been provided by other users is then able to gauge the reliability of that information.
  • server W could be combined in a single server.
  • server W and system S could accommodate access to different, independent content databases CD relating to different subject matter. The user could thereby be offered access to information in a plurality of databases of different content through a single query generated via web server W.
  • a dating service in which persons seeking potential mates (candidates) populate a database with information relating to themselves. Potential mates (searchers) can then access that database, providing various search criteria, in order to locate appropriate, potential mates.
  • searchers can then access that database, providing various search criteria, in order to locate appropriate, potential mates.
  • Figure 23 is an exemplary screen shot presented to a searcher in the dating service database. The searcher is presented with a plurality of multiple choice menus 40 from which he is to select desirable traits of a potential mate. For example, the top three menus on the left of Fig.
  • FIG. 23 relate to the gender, height and weight of a potential mate, while the top three menus 40 on the right relate to the age, marital status and education of the potential mate.
  • a searcher need not make a selection in every menu 40, but only those which he considers important. Upon making those selections, the searcher clicks on the search button 42, and the search commences. Although not shown specifically on this screen, the searcher may be offered an opportunity to assign a relative weight to the different menus prior to activating the search.
  • Figure 24 is a screen shot representing the results of an exemplary search.
  • the user has made selections in menus 40 relating to gender, age, height, martial status, weight, education, eye color, and hair color. That search has produced two candidates, Heidildtch and Bobou, both of which are exact matches to the selected criteria.
  • a searcher is also able to click on the button 44 in order to obtain an enhanced search.
  • Figures 25a and 25b together illustrate the results of an enhanced search.
  • the candidates are listed in decreasing order of relevance as defined by the user's selected criteria. The listing of users with different weights above those which are older reflects a relative higher menu weighting imposed on the weight sub-category than on the age sub-category.
  • a candidate also provides long answers to preset questions.
  • Figures 26a and 26b are screen shots of a page of the online dating service which permits a searcher to review a candidate's long answers (Fig. 26a) and a summary of the multiple choice answers (Fig. 26b).
  • the searcher is also offered a list of the candidates most similar to this one. At this point, the searcher may click on any of the other candidates in column 50, and he will be able to access the data for that candidate.
  • the present invention is not limited to text searching, but can find relevant information even when text does not match. This is accomplished by establishing the relevance of data based upon correlating a searcher's selected data with the data structure of database 10.
  • database 10 must contain information representing the structural relationship of information in database CD, and that information must be updated as the content of database CD is changed.
  • each of menus 40 could represent a separate category.
  • each of the categories is "scalar", in that there are a set of unique selections without subcategories. It is also possible to have a "dual scalar" or two-dimensional scalar category. For example, a geographical d atabase m ight h ave 1 ongitude a nd 1 atitude. T riple o r h igher o rder sc alar categories are also possible (e.g., a geographical database could include altitude).
  • Another structure for categories might be a "hierarchical" structure.
  • This structure has the form of a tree.
  • the dating database could include a category for religion. That category could include a first level of subcategories, such as Christian, Jewish, and Moslem. Each of these religions would then be divided into further subcategories.
  • the Christian category could be sub-divided into Vietnamese and dormitor, with each of those being further subdivided into different sects.
  • each record e.g., the information relating to a single candidate
  • the database 10 would retain information regarding the structure of each category.
  • the searcher's selections in each category would be correlated to the structure of that category in order to arrive at a value representing the relevance of that category.
  • All of the categories in the record would then be processed, for example, by averaging, in order to arrive at a quantity representing the relevance of the record. In this manner, a relevance value is obtained for each record.
  • a character with a hierarchical structure could be represented as a multi-level tree as illustrated in Figure 28.
  • the category is represented by the top node 60
  • the sub-categories are represented by the nodes 62a-62b
  • the level of information below that is represented by the nodes 64a-64d.
  • a scalar category could be represented by a tree with a single top node, 70, representing the category and one secondary level of nodes 72a-72e representing the sub-categories.
  • Other forms of data structures are possible and could be similarly represented by a tree structure with nodes.
  • the invention is not limited to categories and sub-categories that can be represented by a tree structure.
  • the concepts of the invention are equally applicable to data structures that can be represented as a set of scalar values.
  • a searcher might designate his address by latitude and longitude (or street and avenue) in order to locate dating candidates within a certain distance.
  • the structure of this date is a multi-dimensional vector.
  • Fig. 30 illustrates the process for determining relevance of a category having a hierarchical data structure. This involves generating a selection tree TS and a data structure tree TD. In each tree, corresponding nodes are similarly numbered. This is only necessary to assure consistent treatment of corresponding nodes so that the numbering may be somewhat arbitrary.
  • the selection tree TS each node has a binary weighting next to it. A node which is selected by the searcher is given a weight of 1 and a node which is not selected is given a weight of 0.
  • node weights are assigned starting at the lowest level nodes, which are assigned a weight of 1.0, and decreasing weights are assigned to each successively higher level of nodes.
  • each successively higher level of node be provided a weight which is 90% of the weight of the next lower level node.
  • nodes at the second level from the bottom are assigned a weight of .9
  • nodes at the third level from the bottom are assigned a weight of .81, and so forth.
  • corresponding nodes weight values are correlated to arrive at a category relevance value.
  • the well known cosine coefficient algorithm be used for relevancy determination. That algorithm could be represented by the equation 1 :
  • R A (S,D) is the relevance value of the category
  • Di and Si are the weighting categories assigned to the node i of the trees TD and TS, respectively (the nodes are simply processed pair- wise)
  • N is the total number of nodes.
  • Fig. 31 illustrates the preferred process for determining the relevance value of a category having a scalar structure.
  • binary node weights are assigned to tree TS based upon whether a node is selected.
  • a weight of 1.0 is assigned to the selected sub-node.
  • Progressively lower weights are than assigned to the remaining sub-nodes, depending upon their distance from the selected sub-node. It is presently preferred that the weight of a sub-node be multiplied by .9 for each position that it is removed from the selected sub-node.
  • these values can than be combined, for example by averaging, in order to arrive at a relevance value for the entire record. If such averaging is utilized, it is preferred to ignore all unselected categories in the evaluation process.
  • the process for generating a relevance value for a record is summarized in the flow chart of Fig. 32.
  • the process starts at block 100 and, at block 102, the first category in the record is selected.
  • the relevance algorithm utilized is determined, based upon the data structure of the category.
  • the weights of the respective nodes of the selection tree TS and the data structure tree TD are correlated using the selected relevance algorithm.
  • the algorithms discussed above are utilized.
  • a test is made to determine whether all categories in the record have been processed and, if not, the next unprocessed category is selected at block 110 and control returns to block 104 to process the next category. If it is determined at block 108 that all categories have been processed, control transfers to block 112, where the relevance values of the categories are combined to produce the relevance value of the record. Preferably, this is done by averaging, as described above. At this point the process terminates, since the relevance value of the record has been determined.
  • the Greedy Associates board was wildly popular, receiving up to 80,000 hits per day. As soon as a firm decided to give (or not to give) a bonus, news went out immediately. A ssociates s ometimes 1 earned t hat t hey had r eceived b onuses o n G reedy Associates before receiving an official memo from their firms. Greedy Associates became the new grapevine, and before long associates at most firms were checking the board several times a day.
  • Greedy Associates was popular in spite the incredibly poor quality of its underlying technology. "This board sucks,” was the message most commonly posted to Greedy Associates. And it did. The fact that Greedy Associates became so popular is a testament to the enormous demand for the service, not the quality of the site. Three problems stood out:
  • Greedy Associates secretly recorded information about its users and would disclose this information if served with a court order or subpoena. As a result, people who might otherwise have contributed to the conversation remained silent for fear of revealing their identity.
  • the present invention created a process and system to allow Web sites of any kind to implement the solutions discovered.
  • Vault.com a premier message board for job seekers.
  • boards are grouped into three categories: Firms, Industries and Topics. This appears logical and would seem to provide a clear framework for posting messages. But it doesn't.
  • Firm 3 board the "Law” board or the "Salary Information” board. Whichever board the information is posted to, however, it's virtually certain that many users who would find it interesting will never see it. In some embodiments, it would not be posted to the "Firm 3" board ( or o ther b oards r esulting from t he filter selection o f o ther firms that a re n either "Firm 1 " nor "Firm 2"). In other embodiments, it would be posted to one or more other boards resulting from the filter selection of other firms that are neither "Firm 1 " nor "Firm 2").
  • Figure 2 shows one embodiment of a system utilizing the present invention.
  • Other embodiments can remove, add to, change, and/or rearrange the shown components.
  • messages are not situated in individual areas with clear boundaries. No clearly defined "boards" exist. Instead, the user selects filters which the system uses to generate "boards" from a message database.
  • Topics Salary Information Although the user has not selected a filter for Industries, this filter will automatically be set to "Law” because "Firm 1 " is a law firm. If the user had selected a banking firm, the Industries filter would automatically have been set to "Banking.”
  • the database understands the relationships between filters and fills in unselected filter boxes with appropriate information. This understanding can be either “hardwired” into the system, or can be dynamically generated. Some examples of relationships generally are shown in Figure 3. Thus, even though the user has left Industries blank:
  • the Industries filter will automatically be set to "Law" because the firms selected are all law firms.
  • the Present invention will sort through the database and pull out all messages, articles and other content related to "Firm 1 ", “Firm 2", “Firm 3” or Salary Information. Some embodiments pull out content related to law firm information for law firms that are none of “Firm 1 ", “Firm 2", and “Firm 3”. Some embodiments pull out content related to the law industry. It will then order the data so that the most relevant information will be displayed first.
  • Figure 5 shows an example of selected categories of content and user selected categories being used as inputs to generate relevances.
  • the first messages to be displayed will be those tagged with "Firm 1 ", "Firm
  • a message relating to firm 1, firm 2, and salary is rated higher than a message relating to firm 1, firm 2, and firm 3.
  • a message relating to firm 1, firm 2, and salary is rated lower than a message relating to firm 1, firm 2, and firm 3.
  • the next messages to be displayed will be those labeled "B.”
  • the Present invention will combine messages about "Firm 1 " & "Firm 2", “Firm 1 " &”Firm 3" and “Firm 2" &”Firm 3" (all of which are also about Salary Information) and will sort them using a number of factors.
  • these factors can include a fuzzy math algorithm.
  • these factors can include an algorithm combining scalar values.
  • the Present invention will display messages labeled "C,” which deal solely with “Firm 1 ", “Firm 2” or “Firm 3” and the messages labeled "D,” which deal with Salary Information and Law Firms, but not with “Firm 1 ", “Firm 2” or” Firm 3" specifically.
  • the above order can be changed; for example, including messages which do not deal with salary information.
  • some embodiments of the invention allow searches to yield results which may not be 100%> on point but still have relevance.
  • a customer can find products with varying degrees of relevance to the filters, and not just the 100% relevant products. If the merchant does not have one or more of the products sought by the customer, at least the merchant can present related products of interest to the customer.
  • a u ser can find information which may not be 100%> on point but still have relevance.
  • Every piece of content in a TRANSPARENSEETM system is tagged with a set of weighted categories. Any query made to the system is also translated into a set of weighted categories. Our system assigns a numerical value to the degree of similarity (or difference) between these two sets of weighted categories through the use of our
  • Step 2 When a selection is passed into the algorithm, the weight on each category is either 1 or 0: 1 if the category has been explicitly selected and 0 if it has not.
  • the Similarity Algorithm uses the relationships (links) between categories to assign weights to categories that are related to the explicitly selected categories. These relationships (links) could be sibling relationships, parent/child relationships, cross-linked relationships(links to categories under other root categories) or any other type of relationship. Weights assigned to categories as links are traversed based on the weight of the originating category in the link.
  • the modifier used to assign weights to linked-to categories is adjustable.
  • Step 3a If desired, certain root categories can be ignored.
  • Step 3aa) The method of comparison between the category weights in the selection and the category weights in the content is customizable.
  • One method of comparison that can be used is a Cosine Coefficient algorithm.
  • Step 3b) The aggregation algorithm can take into account weights or rankings of the root categories, since certain root categories may be more importantthan other root categories.
  • the dynamic model described in Section A provides a powerful tool for organizing content. Used in conjunction with a sophisticated rating system, it is capable of far more.
  • a dynamic system automatically captures "metadata" each time a user posts a message.
  • metadata are the filters set when a message is posted and ratings information. Because we know which filters are set when a message is posted, we know
  • This profile allows the system to do two things that can't be done on static systems: users can screen content so that people with poor reputations on this subject are ignored; and ratings given to specific messages can be weighted by the user's knowledge of the subject.
  • Each user builds a reputation over time. This reputation is not a single number, but a profile made up of many numbers. Users build reputation ratings for each filter value of every message they've ever posted or rated on the system.
  • Figure 7 shows an example flow chart for updating a user's rating. Steps can be added, removed, changed, and/or rearranged.
  • posting messages Posting a message gives the system substantial data to evaluate. Reputations gained through posting are therefore difficult to influence once established.
  • rating a message gives the system limited data to evaluate. Reputations gained by rating are therefore easier to influence.
  • posting allows users to build "strong" reputations which can't easily be changed while rating messages allows users to build "weak" reputations which can be changed quite easily.
  • the rater has a reputation of seven for "Firm 1 ". He is an expert on the subject. Since an expert on "Firm 1" gave a message involving "Firm 1 " a top score, the poster's reputation on "Firm 1 " will go up substantially. The rating of seven will be averaged into the poster's reputation on "Firm 1 " and will be heavily weighted.
  • the rater has a reputation of four for "Firm 2". This means that, while not entirely unaware, he isn't an expert. Although he gave the message a seven, we shouldn't trust his opinion on "Firm 2 " as much as we did his opinion on "Firm 1 ". The rating of seven will be averaged into the poster's reputation for "Firm 2", but will not be weighted as heavily as his rating of "Firm I ". The poster's reputation for "Firm 2" will rise, but not as much as his reputation for "Firm 1 ". As for "Firm 3", the rater has a reputation of one. He knows nothing about "Firm
  • the rater gave this message a seven, the rating will have no weight and will not affect the poster's reputation.
  • the weight has nonzero but low weight.
  • a reputation built in this way is "weak” in the sense that it may rapidly be changed by the strong form of reputation-building. For example, a user may build up a reputation for ""Firm 1 "” over time using the weak method. Eventually this user may decide to post a message about "Firm 1 ". If the message receives a good rating from high-reputation users, the user's reputation for knowing about "Firm 1 " will be reinforced. But if the message receives a bad rating, the user's reputation for knowing about "Firm 1" will quickly be eroded.
  • One or two bad "strong” ratings of posted messages are enough to destroy a "weak” reputation built up over a period of months. In other embodiments, more than two such messages are enough to destroy the reputation.
  • Message Ratings Just as users have reputations, messages have ratings. Message ratings are determined by the scores users give them, weighted by the relevant reputation of the raters.
  • the rater has given this message a seven. But the rater does not have a perfect reputation for all the relevant filters. He knows quite a bit about "Firm 1 ", but only a little about “Firm 2" and nothing at all about "Firm 3".
  • the system aggregates the rater's reputation in these fields using a mathematical formula.
  • the rater's aggregate reputation for "Firm 1 ", "Firm 2" and "Firm 3" is four.
  • the system will average the rating of seven into the message's rating, giving it a weighting of four.
  • Figure 8 shows an example of calculating an aggregate reputation.
  • nonuniform weights are given to the multiple rater's reputations.
  • the scale of 1-7 is rescaled to 0-1. Other embodiments rescale ratings to different continuous or discrete ranges.
  • the weighting would have been a seven. In that case the user's rating of seven would have been averaged into the message rating with a weighting of seven. The message rating would count twice as much as it did in the prior example.
  • the weight of a message has a linear relationship with the rating of the message. In other embodiments, the weight of a message has a nonlinear relationship with the rating of the message. In some embodiments, a message has one rating. In other embodiments, a message has multiple ratings, for example different ratings for different filters or sets of filters.
  • the rating system works hand in hand with a system to filter rated messages.
  • the filtering s ystem a Hows u sers t o s elect a r ating t hreshold a nd v iew o nly those m essages with ratings above that threshold. Other messages are not seen. i. Method of Threshold Filtering.
  • a palette appears, containing a scatterplot as in Figure 9.
  • Other embodiments use an interface other than a scatterplot, such as one or more selectors of reputation and/or message rating. Each dot represents a message. In other embodiments, dots represent approximations of messages and do not have a one-to-one correspondence.
  • users can choose any combination of message quality and reputation quality. In some embodiments where messages have multiple ratings, such as for different filters, a user can select ratings directly or indirectly. Other embodiments permit selection of just reputation or just message rating. Suppose, for example, that a user selects the point on the scatterplot as in Figure 10.
  • This user wants to see only those messages of high-quality which were written by people with high reputations. By selecting this threshold, this user will likely see only the very best messages that have been posted.
  • this method of threshold filtering allows people to build communities of self-validating experts. These experts are encouraged to post good content and to rate content they see accurately.
  • Average Threshold represents the average combination of reputation and message rating selected by users of a certain filter-set (such as ""Firm 1 "" and "Salary Information").
  • Other embodiments use an interface other than a scatterplot, such as one or more selectors of reputation and/or message rating..
  • the Present invention formalizes a process that takes place informally all the time: people who speak intelligently and often become recognized as authorities.
  • the system provides disincentives for posting bad information. People are encouraged to say good things and discouraged from speaking if they have nothing good to say.
  • FIG. 15 shows an example flow chart of annotation posting. Steps can be added, removed, changed, and/or rearranged.
  • Proprietary content is first tagged, sentence by sentence, with appropriate filters by the site operator.
  • tagging occurs more frequently, for example word by word, or group of words.
  • tagging occurs less frequently, such as in multi-sentence blocks or paragraphs.
  • the user cannot see the filter values attached to each sentence. These are invisible. All he can see are the sentences about "Firm 1 ". In other embodiments, the user can see one or more filters.
  • the filter values come into play when the user decides to annotate a sentence.
  • the user decides to comment on the third sentence in the above paragraph. They select the sentence to annotate, then enter their comments, as in Figure 17. Since we know that the sentence being annotated is about John Doe, a partner at
  • annotation format There are two ways to view annotations: annotation format and message format, a. Annotation Format.
  • annotations are rated and filtered. Annotations that fall above a user's threshold are displayed. Annotations below the threshold are not seen. Thus by selecting any sentence in a description, a user can immediately read the best comments on that sentence. Comments by users with reputations for knowing the subject matter are more likely to be seen than comments by less knowledgeable users, and good messages are more likely to be seen than bad.
  • the order in which they are displayed can be influenced by relevance and/or rating.
  • annotations can also be viewed as messages, persuading users to annotate content will seed the system with initial messages and get conversations started. As long as the site starts with content users want to respond to, discussions will be started and placed into the system with enough filters attached so that appropriate messages appear during any related search. Because each message will have many filters attached, users will perceive the boards on the system to be full even though only a few messages may h ave been posted.
  • Anonymity provides a powerful incentive to speak about sensitive subjects online. Indeed, the mere perception of anonymity felt by online speakers has contributed to an enormous outpouring of gossip on the Web. But as Time Magazine reports: Although the sites give their posters - who generally use pseudonyms - a feeling of anonymity, they're usually not anonymous at all.
  • the Present invention's rating and filtering systems solve these problems by creating accountability for anonymous speech. Users who speak poorly or spam the system will receive low ratings. Their messages will not be seen and they will discover that their speech has become invisible to others. On the other hand, users with good reputations will be able to speak anonymously with the knowledge that their speech will be heard, although their names remain unknown.
  • the Present invention protects people's identity in two ways: its four levels of anonymity and its use of onion routing.
  • the Present invention provides four different levels of anonymity. Users can change their anonymity level before posting messages in order to ensure that sensitive messages receive as much protection as they deserve.
  • Figure 18 shows an example flow chart of posting at different levels of anonymity. Steps can be added, changed, removed, and/or rearranged.
  • Figure 19 summarizes key features of different levels of anonymity. Levels can be added, removed, or changed.
  • First level anonymity allows users to post messages using a pseudonym. Unlike other message boards, the software does not ask for information about the user that could link the message to their true identity. No e-mail address, credit card information or other information that could connect a user to the site is recorded. Information about a user's Internet service provider or IP address is not logged. All that the system requests from a user - and all it knows about a user - is their username and password.
  • Second level anonymity allows users to post messages as "Anonymous.” Although other users cannot tell who posted an anonymous message, the Present invention keeps track a nd continues t o 1 ink a u ser's reputation t o t he m essages t hey p ost. A nonymous messages may therefore benefit from a poster's high reputation, and ratings given to anonymously posted messages affect the poster's reputation.
  • Messages posted using level-two anonymity are sometimes called “anonymous linked” messages because although the identity of the poster is hidden to other users, the Present invention keeps track of links between messages and their authors. The software "knows” who wrote which message, although other users don't. This makes the “private reply” possible.
  • Daffodil decides to post a message critical of 'Mr. Big,' a partner at "Firm 7 ".
  • Daffodil has posted messages about "Firm 1 " before, and has a high reputation for knowing about the firm. She realizes, however, that readers will be able to determine her identity if they read this message in the context of other messages she's written. For this reason Daffodil decides to post her message anonymously.
  • Her high reputation for knowing about "Firm 1 " is linked to the message, so many people will read it. And if they give it a high rating, her reputation for "Firm 1 " will go up even further.
  • Mr. Big The most the site could give Mr. Big would be Daffodil's username. But even this might be enough to unmask Daffodil. By putting her message together with other messages posted by Daffodil in the past, Mr. Big may be able to determine Daffodil's true identity.
  • Level Three Anonymous Unlinke ⁇ .
  • Level three messages are also referred to as "anonymous unlinked.” Like level two messages, they are posted under the username “Anonymous.” But unlike level two, the system does not keep track of links between messages and their authors. When a message is posted, the system immediately stamps the message with a user's relevant reputation scores; it then severs the link between the user and the message and "forgets" the poster's identity. After a level three message has been posted, even the site operator is unable to determine who the author was.
  • the message has been stamped with the reputation values of the poster, it can be filtered like any other. Messages posted by high reputation users will be seen and those posted by low reputation users will not. But users feel secure posting level three messages because they know that although their messages can benefit from their reputation scores, their identities are completely protected - even from the site operators themselves.
  • level four anonymity allows users to post messages without even logging in. Users are not required to give any information at all. Since they have not given any information to the system, and since the Present invention does not record IP addresses, information about ISPs or place cookies on a user's machine, users can be assured of complete anonymity when using level four anonymity.
  • a disadvantage to level four anonymity is that since the system doesn't know who the user is, they are unable to take advantage of their reputation. As a result, few people are likely to see messages posted using level four anonymity. This problem is not insurmountable, however.
  • a user who posts a particularly interesting message using level four anonymity can simply log in at a later date, find their message, and give it a high rating (or, if they're to scared to risk themselves this way, they can tell a friend about the message t hey "read" a nd g ive t hem e nough i nformation to e asily 1 ocate it). O ne g ood rating will not be sufficient to ensure that the message is widely read. But it will give the message enough of a boost that a few more people will see it. I f the m essage is truly interesting and deserves to be read, it's rating will quickly soar and it will be injected into the mainstream of conversation.
  • Figure 20 shows an example of onion routing.
  • the present invention avoids this problem through the use of packet wrapping.
  • another site as a proxy server and "wrapping" our EP packets with theirs, we can disguise the source of our packets. If we have a partnership with Yahoo!, for instance, we could route our signal through Yahoo!, which would cause employers to believe that their employees are using that site, not ours.
  • the present invention makes a system highly organic.
  • the filter-set, and thus the board itself responds to the demands of high-reputation users. By responding to users in real-time and shaping itself to their needs, the system collects and verifies information more rapidly and accurately than even a large staff could.
  • Figure 21 shows an example of determining a discussion rating based on multiple factors. Fewer, more, and/or different factors can be used. Such factors can also be used to rate filters and other features of the software.
  • the Present invention supports polls, articles, transcripts, faxes, Word files, photos, audio and video clips and any other type of data. These types of content c an b e p osted t o the s ystem, i ndexed, se arched for, filtered and r ated, j ust 1 ike messages.
  • Posting an interesting fax, photo or Word file would result in a substantial boost to a user's reputation. Indeed, certain types of content are more likely to result in a reputation boost than others. If a user posts an internal memo about bonuses at "Firm 1 " to the "'Firm 7 "" and "Salary Information” board, his reputation in those areas will skyrocket. It will be clear to everyone using the board that this person works at "Firm 1 " and is doing his best to feed good information to others. This effect creates a strong incentive for people to post information proving that they are "insiders.” Polls can only be posted to the system by high-reputation users. At the discretion of the poster, they may be seen only by other high-reputation users.
  • Users who achieve a high reputation may also publish articles.
  • An article is more complex than a message, and can contain images (such as graphs) and other complex attachments. More importantly, an article is posted in a prominent and fixed position on a page, making users more likely to read articles than messages.
  • polls allowing only users with high reputations to write articles enhances people's desire to obtain a high reputation. Since people raise their reputation by posting good content to the site, this encourages the posting of interesting content.
  • the Present invention has a "chat" option, but with a difference. Any user party to a chat can choose to push the "record" button at any time. If a chat is being recorded, a red light appears in a corner of the chat window. Recorded chats can be posted to the system just like messages. Chats may be restricted to only high reputation users. Other users won't even be aware that a chat is taking place. Furthermore, when a chat is posted, it may take on the average reputation values of the users party to the chat. This encourages users to invite only high reputation people to chat with them if they want their transcripts to be widely seen.
  • the software can easily be modified to accept faxes. If this function is implemented, users will be able to fax documents to TRANSPARENSEETM sites from any location. After the fax goes through, the user's fax machine will print a slip containing a confirmation number. The next time the user goes to the site they can receive the fax that they sent by clicking the "Receive Fax" button and entering the confirmation number. The fax will then appear on the user's screen and can be posted to the system. It is not necessary to login to receive a fax, and faxes can be posted to the system using any level of anonymity.
  • the software can be modified to accept Word files, photos, and video clips. Just as posting a fax can demonstrate one's insider status and raise one's reputation, so can posting an interesting file, photo, or clip.
  • One of the greatest advantages of the Present invention lies in the filter selection mechanism. It feeds information to users as they make choices, allowing them to extract information from the database on areas they may know little about.
  • the Present invention has been built to accommodate multiple front-ends.
  • wireless PDAs such as Palm Pilots and Blackberries
  • a front-end can be provided to make TRANSPARENSEETM sites accessible from such devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Information regarding the structure of information in a content database (CD) is maintained in a structure database (10). The structure database (10) is used to correlate the data structure of a query to the structure of the content database (CD), in order to determine that information in the content database which needs to be provided to a searcher in response to the query. In one embodiment, this search method is used in an online forum, and the forum maintains a reputation score for users with respect to given subject matter. The reputation score is dependent upon the quality of user’s participation in the forum. A user’s reputation score depends upon the evaluation by other of information he posts and upon the user evaluating information posted by others.

Description

SEARCH METHOD AND SYSTEM AND SYSTEMS USING THE SAME
Field of the Invention
The present invention relates generally to data searching methods and systems and, more particularly concerns systems utilizing them.
Background of the Invention
The Internet, and particularly the Worldwide Web, has caused a virtual information explosion. An average user, making use of a conventional web browser, now has available to him a mass of information that would have been unimaginable just a few years ago. This includes information available from professional and commercial sources, individuals, and message boards or forums, where users "congregate" to discuss every imaginable topic, and some that are not. With the wealth of information that is available, a new problem has arisen: How can that information be found?
This problem has been addressed by a plethora of "search engines", which are software programs and information systems that are specifically designed to assist users in finding information. While existing search engines have been adequate, they are limited in their ability to uncover useful information when users are searching. The primary reason is that search engines tend to be language based, and a searcher is not always familiar with the common terminology in his field of search. Also, there may be useful information available which does not conform to the common terminology. It also takes substantial skill or experience to formulate queries that will produce meaningful results.
In accordance with the present invention, search results are achieved that are broader and more intelligent than basic keyword searching. This is achieved by imposing a structure on d ata being searched and utilizing the same structure for search queries. Relevant information is then uncovered by correlating the structure of the data being searched and the structure of the query. Items to be searched can include anything: messages, discussions, articles, polls, transcripts, or anything else that can be linked to or pulled from a database. Search results can be included that are less than 100% relevant, and not just 100% relevant. In the absence of, or in addition to, results that would be generated by a Boolean keyword-only-search, users can retrieve results of some relevance, for example as determined by a set of selectable filter criteria. Consequently, merchants can sell inventory which might otherwise be unseen and/or users can find information which might otherwise stay hidden in an overly strict Boolean search.
The method of the present invention is the glue that holds online speakers together as they seek to use the Worldwide Web to communicate as they do in life. It lets users speak without seeing the spam that fills most message boards; allows interesting conversations to take place without interruption; and gives users the anonymity to talk candidly without fear that their identities may be revealed.
Where message board sites or forums are concerned, the present invention transforms ordinary sites into profitable "para-sites." Para-sites are sites that feed off the work of their own users. A para-site powered by the present invention collects interesting, relevant information by harnessing users to post and organize content, at no cost to the site-operator. Methods and systems embodying the present invention will hereafter be referred to by use of the assignee's trademark T RANSPARENSEE™. Users find sites stickier than other sites because of the high quality of information generated by the present invention. Site owners can restrict access to this information in different ways, allowing the most valuable information to be repackaged and resold to different markets at different price points.
As repositories of filtered information, TRANSPARENSEE™ sites attract users with specific interests. Users who speak intelligently about subjects they know soon find that their opinions on that subject carry more weight - and are heard by more people - than the opinions of others. The weight given to a particular user's thoughts on a subject is quantified as the user's "reputation" for knowing that subject.
TRANSPARENSEE™ sites allow users to develop and maintain complex, multi -variable reputations for a wide variety of different subjects. As users develop high reputations for knowing a particular subject, they gain privileges on the site as a result; as they gain privileges, their investment in the site grows. High-reputation users become reluctant to move conversations off-site because, by leaving, they'll lose the benefits they've gained as high-reputation users.
As a result, high-reputation users tend to remain on TRANSPARENSEE™ sites, and communities develop. These communities are deeply rooted in the site due to the investments their members have made by building reputations. For this reason, community members (and communities) cannot easily be lured away to non-
TRANSPARENSEE™ sites.
A sticky community of experts sharing information in a highly accessible way attracts new users. New users generate content, develop reputations, and become community members, thus adding to the attractive pull of the community.
These network effects feed upon themselves, building small communities into large ones. The larger a community grows, the more information it has under discussion, the greater the number and expertise of its users, and the stronger a pull it exerts on new members. When a community grows large enough and vibrant enough, it becomes the only logical place for a new user to go in order to learn about or discuss a subject.
Because the present invention makes it easier for people to communicate, sites that use the present invention quickly attract users. As these users gain reputations they develop into communities that are hard to displace. Network effects cause these communities to grow quickly. Taken together, this means that the first company to use the reputation feature of the present invention in any particular market has a substantial first- mover advantage. The bulk of users in that market will end up on TRANSPARENSEE™ sites, and will form deep-rooted communities
TRANSPARENSEE™ site reputations are portable. Reputation values are stored at and administered from a central location, allowing users to carry their reputations with them from TRANSPARENSEE™ site to TRANSPARENSEE™ site. In other embodiments, reputation values are stored in a partly or wholly distributed fashion.
As the number of TRANSPARENSEE™ sites grows, the company's proprietary database of reputations also grows. When this database has reached a critical mass it will have tremendous value. Companies that choose to power their sites with the present invention will automatically become members of the TRANSPARENSEE™ Network, allowing them access to a large user base of individuals who may start using their pre-built reputations on the new site right away.
(ΛjrΛ nrM By allowing Web-site operators to inexpensively gather and distribute
"insider speech," the present invention fills a demand which, though strong, has not been met by any other product. The invention is equally unique in the way that it allows licensees to precisely target users based on detailed information without invading their individual privacy.
The present invention provides several immediate benefits. It promotes the disclosure of superior information, then ranks and organizes that information in a way that allows it to be easily packaged and sold to different audiences at different price points. It makes sites stickier while at the same time allowing licensees to provide advertisers with far more narrowly targeted advertisements than they otherwise could, substantially increasing advertising revenues. And it allows companies to lessen (or eliminate) the cost of hiring moderators to monitor online discussion.
Brief Description of the Drawinfis The foregoing brief description, as well as further objects, features, and advantages of the present invention will be understood more completely from the following detailed description of a presently preferred, but nonetheless illustrative embodiment, with reference being had to the accompanying drawings, in which:
Fig. 1 illustrates an embodiment of a typical static system wherein boards are grouped by firms, industries and topics;
Fig. 2 illustrates one embodiment of a system running utilizing the reputation aspect of the present invention;
Fig. 3 illustrates examples of relationships; Fig. 4 illustrates an embodiment of a simple dynamic system; Fig. 5 illustrates an example of selected categories of content and user selected categories being used as inputs to generate relevances;
Fig. 6 illustrates an embodiment of a complex dynamic system; Fig. 7 illustrates an example flow chart for updating a user's rating; Fig. 8 shows an example of calculating an aggregate reputation; Fig. 9 illustrates an embodiment of threshold filtering wherein a palette contains a scatterplot. And each dot represents s message; Fig. 10 illustrates an embodiment of a scatterplot wherein the user has chosen to view messages of high message quality without much regard to the reputation of the poster;
Fig. 11 illustrates an embodiment of a scatterplot wherein the user has chosen to view messages posted by users with high reputations without much regard to message quality;
Fig. 12 illustrates an embodiment of a scatterplot wherein the user has chosen to view messages of high quality written by people with high reputations;
Fig. 13 illustrates an embodiment of a scatterplot wherein the average combination of reputation and message rating is selected by users of a certain filter set;
Fig. 14 illustrates an embodiment of related filters;
Fig. 15 illustrates an example flow chart of annotation posting;
Fig. 16 illustrates an embodiment of tagged content.;
Fig. 17 illustrates an embodiment of annotated tagged content; Fig. 18 illustrates an example flow chart of posting at different levels of anonymity;
Fig. 19 illustrates key features of different levels of anonymity;
Fig. 20 illustrates an example of onion routing;
Fig. 21 illustrates an example of determining a discussion rating based on multiple factors;
Figure 22 is a functional block diagram illustrating the preferred environment for the present invention;
Figure 23 is an exemplary partial screen shot presented to a searcher in the dating service database; Figure 24 is a screen shot representing the results of an exemplary search;
Figures 25a and 25b, together illustrate the results of an enhanced search;
Figures 26a and 26b are screen shots of a page of the online dating service which permits a searcher to review a candidate's long answers and a summary of the multiple choice answers; Figure 27 is a screen shot of a summary page for a user;
Figure 28 is a multi-level tree representing a category with a hierarchical structure;
Figure 29 illustrates a scalar category as represented by a tree with a single top node; Figure 30 is a tree diagram illustrating a process for determining relevance of a category having a hierarchical data structure; and
Fig. 31 is a tree diagram illustrating a process for determining the relevance value of a category having a scalar structure.
Detailed Description of the Preferred Embodiments
Figure 22 is a functional block diagram illustrating the preferred environment for the present invention. A plurality of users' computers U access a content server C via a network I, preferably the Internet. Server C provides the users U access to a content database CD. Database CD may provide various types of information. For example, it may maintain the information used by an online dating service. Alternatively, it could provide the information for a restaurant survey service or wine survey service, or numerous other special interest services. Database CD could also include, in addition to surveys, product reviews and articles of interest on various subjects. Also connected to the network I is a web server W which cooperates with a system S, in accordance with the present invention, to manage users' access to information in database CD. Within system S, a query and search module 20 in accordance with the present invention interfaces with users, permitting them to formulate requests for information from d atabase CD. M odule 20 c reates, m anages a nd m aintains a s tructure database 10, which contains information describing the structural relationship between various pieces of information in database CD. Database 10 also contains information relating to the structural relationship between various portions of information in a query in a format comparable to the structural relationship of information in database CD.
In accordance with the present information, information in the database 10 is used to correlate the data structure of a query to the structure of database CD, in order to determine that information in database CD which needs to be provided to a user in response to a query. Server W then connects the user to server C, with instructions to server C regarding what information is to be provided to the user from database CD.
In some embodiments of the invention, system S also includes a user information module. This module is particularly useful in systems in which users access information in database CD which has been provided by other users. Module 30 could then, for example, include information about the reputation of various users with respect to the information which they have furnished. A user accessing information in database CD which has been provided by other users is then able to gauge the reliability of that information.
Those skilled in the art will appreciate that the functions of servers C and
W could be combined in a single server. Alternatively, server W and system S could accommodate access to different, independent content databases CD relating to different subject matter. The user could thereby be offered access to information in a plurality of databases of different content through a single query generated via web server W.
The invention will best be understood through the detailed description of a number of preferred embodiments. In accordance with a first embodiment, a dating service is provided in which persons seeking potential mates (candidates) populate a database with information relating to themselves. Potential mates (searchers) can then access that database, providing various search criteria, in order to locate appropriate, potential mates. Those skilled in the art will appreciate that a similar model is applicable for numerous other services, such as, employment agency services. Figure 23 is an exemplary screen shot presented to a searcher in the dating service database. The searcher is presented with a plurality of multiple choice menus 40 from which he is to select desirable traits of a potential mate. For example, the top three menus on the left of Fig. 23 relate to the gender, height and weight of a potential mate, while the top three menus 40 on the right relate to the age, marital status and education of the potential mate. A searcher need not make a selection in every menu 40, but only those which he considers important. Upon making those selections, the searcher clicks on the search button 42, and the search commences. Although not shown specifically on this screen, the searcher may be offered an opportunity to assign a relative weight to the different menus prior to activating the search. Figure 24 is a screen shot representing the results of an exemplary search.
In this case, the user has made selections in menus 40 relating to gender, age, height, martial status, weight, education, eye color, and hair color. That search has produced two candidates, Heidildtch and Bobou, both of which are exact matches to the selected criteria.
In this embodiment, a searcher is also able to click on the button 44 in order to obtain an enhanced search.
Figures 25a and 25b, together illustrate the results of an enhanced search. In addition to the two exact matches, there are a number of approximate matches. For example, "Landdecker" has a weight in excess of the selected category, but otherwise matches. Similarly, starting with "Helena", the weight is below the selected range. Similarly, the remaining entries in Fig. 25a all relates to weight which are in excess of the selection and Fig. 25b relates to candidates which are older. The present invention is therefore able to locate matches which are close, but are not exact. The candidates are listed in decreasing order of relevance as defined by the user's selected criteria. The listing of users with different weights above those which are older reflects a relative higher menu weighting imposed on the weight sub-category than on the age sub-category.
In accordance with the present embodiment, a candidate also provides long answers to preset questions. Figures 26a and 26b are screen shots of a page of the online dating service which permits a searcher to review a candidate's long answers (Fig. 26a) and a summary of the multiple choice answers (Fig. 26b). In the column 50 of Fig. 26a, the searcher is also offered a list of the candidates most similar to this one. At this point, the searcher may click on any of the other candidates in column 50, and he will be able to access the data for that candidate.
For e xample, s hould t he u ser c lick " LubaO" i n c olumn 50, h e w ould b e transferred to a summary page for that user, illustrated by the screen shot of Fig. 27.
As explained above, the present invention is not limited to text searching, but can find relevant information even when text does not match. This is accomplished by establishing the relevance of data based upon correlating a searcher's selected data with the data structure of database 10. In order to achieve this, database 10 must contain information representing the structural relationship of information in database CD, and that information must be updated as the content of database CD is changed.
In creating database 10, it is first necessary to define categories of information in database CD. For example, in the database represented by the screen of Fig. 23, each of menus 40 could represent a separate category. In Fig. 23, each of the categories is "scalar", in that there are a set of unique selections without subcategories. It is also possible to have a "dual scalar" or two-dimensional scalar category. For example, a geographical d atabase m ight h ave 1 ongitude a nd 1 atitude. T riple o r h igher o rder sc alar categories are also possible (e.g., a geographical database could include altitude).
Another structure for categories might be a "hierarchical" structure. This structure has the form of a tree. For example, the dating database could include a category for religion. That category could include a first level of subcategories, such as Christian, Jewish, and Moslem. Each of these religions would then be divided into further subcategories. For example, the Christian category could be sub-divided into Catholic and Protestant, with each of those being further subdivided into different sects.
In accordance with the present invention, it has been found that better search results can be obtained by using a correlation procedure which is different for different types of data structures. In creating the structure database 10, each record (e.g., the information relating to a single candidate) would be parsed into categories, and the database 10 would retain information regarding the structure of each category. Thereafter, in determining the relevance of a particular record, the searcher's selections in each category would be correlated to the structure of that category in order to arrive at a value representing the relevance of that category. All of the categories in the record would then be processed, for example, by averaging, in order to arrive at a quantity representing the relevance of the record. In this manner, a relevance value is obtained for each record.
As an aid to understanding the relevance determination process, it is convenient to characterize categories in terms of a tree structure. For example, a character with a hierarchical structure could be represented as a multi-level tree as illustrated in Figure 28. Here, the category is represented by the top node 60, while the sub-categories are represented by the nodes 62a-62b, and the level of information below that is represented by the nodes 64a-64d. Similarly, as illustrated in Fig. 29, a scalar category could be represented by a tree with a single top node, 70, representing the category and one secondary level of nodes 72a-72e representing the sub-categories. Other forms of data structures are possible and could be similarly represented by a tree structure with nodes. However, those skilled in the art will appreciate that the invention is not limited to categories and sub-categories that can be represented by a tree structure. For example, the concepts of the invention are equally applicable to data structures that can be represented as a set of scalar values. In the dating site example, a searcher might designate his address by latitude and longitude (or street and avenue) in order to locate dating candidates within a certain distance. The structure of this date is a multi-dimensional vector.
Fig. 30 illustrates the process for determining relevance of a category having a hierarchical data structure. This involves generating a selection tree TS and a data structure tree TD. In each tree, corresponding nodes are similarly numbered. This is only necessary to assure consistent treatment of corresponding nodes so that the numbering may be somewhat arbitrary. In the selection tree TS each node has a binary weighting next to it. A node which is selected by the searcher is given a weight of 1 and a node which is not selected is given a weight of 0. In the data structure tree, node weights are assigned starting at the lowest level nodes, which are assigned a weight of 1.0, and decreasing weights are assigned to each successively higher level of nodes. It is presently preferred that each successively higher level of node be provided a weight which is 90% of the weight of the next lower level node. Thus, nodes at the second level from the bottom are assigned a weight of .9, nodes at the third level from the bottom, are assigned a weight of .81, and so forth. In order to obtain a relevance value for the category represented by these trees, corresponding nodes weight values are correlated to arrive at a category relevance value. It is presently preferred that for a hierarchical data structure, the well known cosine coefficient algorithm be used for relevancy determination. That algorithm could be represented by the equation 1 :
Figure imgf000011_0001
Where RA(S,D) is the relevance value of the category, Di and Si are the weighting categories assigned to the node i of the trees TD and TS, respectively (the nodes are simply processed pair- wise), and N is the total number of nodes.
Fig. 31 illustrates the preferred process for determining the relevance value of a category having a scalar structure. Once again, binary node weights are assigned to tree TS based upon whether a node is selected. In the Tree TD, a weight of 1.0 is assigned to the selected sub-node. Progressively lower weights are than assigned to the remaining sub-nodes, depending upon their distance from the selected sub-node. It is presently preferred that the weight of a sub-node be multiplied by .9 for each position that it is removed from the selected sub-node. By assigning weights in this manner, it is possible to attribute value to a sub-node in the database based upon how close it is to the selected value. Thus, a record in which the selected node does not correspond to the value in the record will still be given effect in the relevance determination, depending upon how close the value in that record is to that selected value. It has been found that the cosine algorithm is unreliable when used with scalar categories, because it eliminates the contribution of any unselected node to the relevance value. Accordingly, it is more desirable to use a relevance algorithm which does not do this. For example, the algorithm represented by equation 2 is presently preferred for scalar categories.
Figure imgf000012_0001
Once a relevance value has been obtained for each category, these values can than be combined, for example by averaging, in order to arrive at a relevance value for the entire record. If such averaging is utilized, it is preferred to ignore all unselected categories in the evaluation process.
The process for generating a relevance value for a record is summarized in the flow chart of Fig. 32. The process starts at block 100 and, at block 102, the first category in the record is selected. At block 104, the relevance algorithm utilized is determined, based upon the data structure of the category. In block 106, the weights of the respective nodes of the selection tree TS and the data structure tree TD are correlated using the selected relevance algorithm. Preferably, the algorithms discussed above are utilized.
At block 108 a test is made to determine whether all categories in the record have been processed and, if not, the next unprocessed category is selected at block 110 and control returns to block 104 to process the next category. If it is determined at block 108 that all categories have been processed, control transfers to block 112, where the relevance values of the categories are combined to produce the relevance value of the record. Preferably, this is done by averaging, as described above. At this point the process terminates, since the relevance value of the record has been determined.
Having a relevance value for each record, it is now possible to produce a report for the searcher, preferably in the order of relevance value.
Further aspects of the present invention will be described in the context of an alternate embodiment, which realizes an improved message board or user forum and also exemplifies the user reputation aspect of the invention.
In late 1998, a law firm "Firm 1 " was losing associates faster than it could hire them. To stem the tide, "Firm 1 " decided to give all associates a year-end "boom- year bonus" of $15,000.
At o ther firms, c onfusion r eigned. Law firms h ad 1 ong m ade a p oint o f paying associates the same amount from firm to firm. Should all firms now raise salaries to match "Firm 1 "1 Or could they get away with leaving things as they stood? Firms responded inconsistently: some matched the "Firm 1 " bonus, a few increased it, and others paid nothing. Associates who hadn't received bonuses were resentful, but there was little they could do.
The following year, an anonymous associate started a message board on Yahoo ! c ailed " Greedy Associates." A ssociates u sing t his b oard h oped t hat b y t alking about their firms online, they could put pressure on law firm partners to match "Firm J " if boom-year bonuses were given a second time.
The logic was that an online message board would create a ccountability. Firms that hadn't matched "Firm 1 " in 1998 thought they could get away with it because nobody would know. Law students considering working at those firms w ould have no way of learning whether, or how much, those firms had paid. By creating an online message board to talk about salaries and bonuses publicly, lawyers could create a repository for this kind of information and force their firms to match market leaders. Firms that chose not to would be taken to task, and would have a harder time recruiting new attorneys.
The Greedy Associates board was wildly popular, receiving up to 80,000 hits per day. As soon as a firm decided to give (or not to give) a bonus, news went out immediately. A ssociates s ometimes 1 earned t hat t hey had r eceived b onuses o n G reedy Associates before receiving an official memo from their firms. Greedy Associates became the new grapevine, and before long associates at most firms were checking the board several times a day.
The b oard m ade t he front p age o f t he N ew Y ork T imes w hen g ossip o n Greedy Associates led New York law firms to pay large bonuses in order to match California firms. In the past, the California raises might have been ignored. B ut with Greedy Associates publicizing the buzz among lawyers, law firms felt they were under a microscope. They could no longer ignore what people were saying about them online without putting their reputation at risk.
For the first time lawyers had been given a conduit to exchange information, and the information they exchanged was not limited to salaries: firm culture, clients, layoffs, and general gossip were all discussed. Before the Internet, this would have been impossible. Now it was easy.
Greedy Associates was popular in spite the incredibly poor quality of its underlying technology. "This board sucks," was the message most commonly posted to Greedy Associates. And it did. The fact that Greedy Associates became so popular is a testament to the incredible demand for the service, not the quality of the site. Three problems stood out:
• Spam. Most messages weren't worth reading. They ranged from long rants to advertisements to messages like "Right on!" Users looking for specific information or good conversation were forced to wade through huge amounts of spam before finding what they wanted.
• Static Boards. Although there was only one Greedy Associates board, all kinds of different people, with different interests, were reading it. California litigators were thrown in with New York corporate lawyers; ambulance chasers from Alaska were grouped with tax lawyers from Texas. As a result, most users were forced to read messages about subjects they weren't interested in. This was just as bad as making them read spam. If a message doesn't apply to you and you're not interested in it, it may as well be spam.
Because of the divergent interests of its users, the original Greedy Associates b oard e ventually fractured i nto a lmost fifty se parate b oards with n ames 1 ike Greedy NY Associates, Greedy SF Associates and Greedy NY Tax Associates. Every variation on the theme was played. And of course, because they were far smaller than the original Greedy Associates board, each subsidiary board was far less useful.
• No Real Anonymity. One of the chief reasons for the popularity of Greedy Associates was the anonymity it offered. B y speaking under a pseudonym, people felt they could reveal more than if their identity were known.
But as many people realized, the anonymity offered by Greedy Associates was limited. As most sites do, Greedy Associates secretly recorded information about its users and would disclose this information if served with a court order or subpoena. As a result, people who might otherwise have contributed to the conversation remained silent for fear of revealing their identity.
The present inventor originally set out to solve the problems observed on Greedy Associates. Efforts were focused on four discrete issues:
• Dynamic. Static boards are clearly problematic, yet no message boarά proάuct provides a non-staticsolution. A dynamic product, in which the contours of a "board" can expand or contract as users desire, is required. • Self-Regulating. Spam and low-quality messages choke off meaningful conversation before it ever has a c hance to start. A self-regulating board in which messages that users don't want to see vanish before others are forced to read them results in less spam and more high-quality dialogue. • Anonymous. Valuable information about the intimate details of specific firms attracted people to Greedy Associates, but the lack of true anonymity prevented the most interesting information from ever being posted. The option of posting information with true anonymity is necessary to give users the freedom to post the kind of information that others want to see. • Organic. Certain areas of message boards are heavily used and deserve to be expanded. Others are rarely used and fall into neglect. A good product should be organic: it should respond naturally to the demands that users place on it. Areas that are heavily used should automatically expand; areas that are rarely used should automatically contract (or even vanish). Solutions Have Wide Application. It soon became apparent that the problems observed on Greedy Associates are endemic to message boards generally, and that the solutions have widespread application to virtually any kind of online community.
As a result, instead of designing a better version of Greedy Associates, the present invention created a process and system to allow Web sites of any kind to implement the solutions discovered.
A. Dynamic Model. i. The Problems With Static Models.
Online speech is stored using static methods. A post might be found on a specific "board," an article in a "section" of a magazine, or a photograph as part of an "album." These storage models separate content into individual spaces with fixed boundaries. People know that messages about Honda Accords, for example, are found on the Accord bulletin board in the Honda section, or that messages about Cisco Systems are found on the Cisco bulletin board in the Companies section. The path to a specific item is always the same, and follows a simple categorization scheme.
This is a bad system. To understand why it is bad, it is useful to understand how a static system is structured. Consider Vault.com, a premier message board for job seekers. A simplified structural model of Vault.com's message boards relating to "Law" appears in Figure 1. In the system of Figure 1, boards are grouped into three categories: Firms, Industries and Topics. This appears logical and would seem to provide a clear framework for posting messages. But it doesn't.
a. Bonuses at "Firm 1 ": A Simple Example.
Suppose a user wants to post information about bonuses at "Firm 1 ". Where should he post the message so that others will find it? There are three possibilities: The ""Firm I "" board, the "Law" board or the "Salary Information" board.
Few users would take the time to post their message to all three relevant boards, and if they did it would simply create another problem. People who read all three boards would find themselves reading the same message over and over again. Thus, there is no one logical place for a user of the above system to post a message about bonuses at "Firm
I ", and no obvious solution to this problem.
The lack of a clear answer to the question of where a message on a specific subject should go creates difficulties for users. In the above example, users may read the "Firm 1 " board w ithout e ver r ealizing t hat m essages a bout "Firm 1 " a re a lso p osted o n b oth t he "Law" board and the "Salary Information" board. For these users, the system is under- inclusive because it fails to show them all the messages that they want to see. But users who look for messages about "Firm 1 " bonuses on the "Firm 1 " board have the opposite problem. These users may be forced to read through numerous messages about "Firm 1 " that don't deal with bonuses. For these users, the system is over-inclusive because it shows them many messages that they don't want to see.
b. Comparisons Within Groups: A Complex Example. Problems with static systems are even greater for users who want to post messages about several different subjects within the same group. Suppose, for instance, that a user wants to compare the bonus given at "Firm 1 " with the bonuses given at another specific firm (Firm 2"). Where should he post this message?
There are five boards where this message could reasonably be posted, but none of them are precisely right. It could be posted to the "Firm 1 " board, the ""Firm 2"" board, the
"Firm 3" board, the "Law" board or the "Salary Information" board. Whichever board the information is posted to, however, it's virtually certain that many users who would find it interesting will never see it. In some embodiments, it would not be posted to the "Firm 3" board ( or o ther b oards r esulting from t he filter selection o f o ther firms that a re n either "Firm 1 " nor "Firm 2"). In other embodiments, it would be posted to one or more other boards resulting from the filter selection of other firms that are neither "Firm 1 " nor "Firm 2"). Even if the poster feels sure that he should post his message to one of the boards grouped under "Firms," there's no clear answer as to which is best. Since no answer is clearly correct, any selection is sure to confuse users to some extent. The only board which would be clearly correct would be one dedicated specifically to comparisons of "Firm V', "Firm 2" and "Firm 3". And no such board exists. In some embodiments, it would not be posted to the "Firm 3" board (or other boards resulting from the filter selection of other firms that are neither "Firm 1 " nor "Firm 2"). In other embodiments, it would be posted to one or more other boards resulting from the filter selection of other firms that are neither "Firm 1 " nor "Firm 2").
ii. The Advantages of Dynamic Boards.
The present invention allows companies to create dynamic message boards. Figure 2 shows one embodiment of a system utilizing the present invention. Other embodiments can remove, add to, change, and/or rearrange the shown components. In a dynamic system, messages are not situated in individual areas with clear boundaries. No clearly defined "boards" exist. Instead, the user selects filters which the system uses to generate "boards" from a message database. Consider how the two problems discussed in the previous section would be solved by a dynamic system.
a. Bonuses at "Firm 1 ": Solving the Simple Example. If a company like Vault.com were using the present invention, it might use filter categories such as "Firms," "Industries," and "Topics." In some embodiments, the filter categories are "hardwired" into the system. In other embodiments, the filters are dynamically generated. A user interested in bonuses at "Firm 1 " would select the following filters:
Firms="Etr«- 1 "
Topics=Salary Information Although the user has not selected a filter for Industries, this filter will automatically be set to "Law" because "Firm 1 " is a law firm. If the user had selected a banking firm, the Industries filter would automatically have been set to "Banking." The database understands the relationships between filters and fills in unselected filter boxes with appropriate information. This understanding can be either "hardwired" into the system, or can be dynamically generated. Some examples of relationships generally are shown in Figure 3. Thus, even though the user has left Industries blank:
Industries=Law
10 Now t hat t he filters h ave b een s et, t he u ser c licks " Apply." T he s oftware s orts through the database and pulls out all messages, articles and other content related to both
"Firm 1 " and Salary Information (area A in Figure 4). This information will be displayed first, in a format indistinguishable from an ordinary message board. The Present invention next pulls out all information related to Law Firms (other than "Firm 1 ") and Salary
Information (Area B). This information will be displayed next.
b. Comparisons Within Groups: Solving the Complex Example.
The advantages to this system become clearer if we reconsider the complex example, in which the user wanted to post a message comparing bonuses at "Firm 1 ", "Firm 2" and' irm 3". In a dynamic system, the user would select the following filters:
¥iτms="Firm 1 " "Firm 2" "Firm 3"
Topics=S alary Information
As in the previous example, the Industries filter will automatically be set to "Law" because the firms selected are all law firms. Thus:
Industries=Law
The Present invention will sort through the database and pull out all messages, articles and other content related to "Firm 1 ", "Firm 2", "Firm 3" or Salary Information. Some embodiments pull out content related to law firm information for law firms that are none of "Firm 1 ", "Firm 2", and "Firm 3". Some embodiments pull out content related to the law industry. It will then order the data so that the most relevant information will be displayed first. Figure 5 shows an example of selected categories of content and user selected categories being used as inputs to generate relevances.
The first messages to be displayed will be those tagged with "Firm 1 ", "Firm
2","Firm 3" and Salary Information (labeled "A" in Figure 6). These messages will be most likely to contain the content that the user is looking for. By selecting these filters the user has, in effect, created a custom "board" designed specifically for him on precisely the subject he is most interested in.
In one embodiment, a message relating to firm 1, firm 2, and salary is rated higher than a message relating to firm 1, firm 2, and firm 3. In another embodiment, a message relating to firm 1, firm 2, and salary is rated lower than a message relating to firm 1, firm 2, and firm 3.
The next messages to be displayed will be those labeled "B." The Present invention will combine messages about "Firm 1 " & "Firm 2", "Firm 1 " &"Firm 3" and "Firm 2" &"Firm 3" (all of which are also about Salary Information) and will sort them using a number of factors. In some embodiments, these factors can include a fuzzy math algorithm. In some embodiments, these factors can include an algorithm combining scalar values. After these messages have been displayed, the Present invention will display messages labeled "C," which deal solely with "Firm 1 ", "Firm 2" or "Firm 3" and the messages labeled "D," which deal with Salary Information and Law Firms, but not with "Firm 1 ", "Firm 2" or" Firm 3" specifically. In some embodiments, the above order can be changed; for example, including messages which do not deal with salary information.
Allowing users to display messages in this way solves the problem described in the last section. Users who wish to pull up information on "Firm 1 ", "Firm 2", "Firm 3" and Salary Information will see, first and foremost, the information most interesting to them. If, while looking at this "board," they choose to post a message, their message will automatically be tagged with "Firm 1 ", "Firm 2", "Firm 3" and "Salary Information." It will be among the messages likely to be displayed when another user performs a search using the same filters.
Unlike a search that uses only Boolean keyword searching, some embodiments of the invention allow searches to yield results which may not be 100%> on point but still have relevance. For example, in an embodiment managing products, a customer can find products with varying degrees of relevance to the filters, and not just the 100% relevant products. If the merchant does not have one or more of the products sought by the customer, at least the merchant can present related products of interest to the customer. In embodiments such as the discussed embodiment, a u ser can find information which may not be 100%> on point but still have relevance.
In order to match data in a database with a given query, we take advantage of relationships (also known as "links") that we establish between the data and the query. These relationships are often, but not always, segmented across several different categories (such as age, height, weight, location, price, etc.).
Every piece of content in a TRANSPARENSEE™ system is tagged with a set of weighted categories. Any query made to the system is also translated into a set of weighted categories. Our system assigns a numerical value to the degree of similarity (or difference) between these two sets of weighted categories through the use of our
"Similarity Algorithm".
The steps of the Similarity Algorithm are as follows:
1) Determine the weights of an element of content's tagged categories.
2) Determine the weights of the categories used in the selection (or query). 3) For each piece of tagged content:
3 a) For each category (such as age, height, weight, location, price, etc.).
3aa) Find the similarity of the content's category weights to selection's category weights. 3b) Aggregate the similarities across all root categories for this piece of content. The output of this calculation is a mapping of content object to relevance value. The Similarity Algorithm can be customized in several ways: Step 2) When a selection is passed into the algorithm, the weight on each category is either 1 or 0: 1 if the category has been explicitly selected and 0 if it has not. The Similarity Algorithm uses the relationships (links) between categories to assign weights to categories that are related to the explicitly selected categories. These relationships (links) could be sibling relationships, parent/child relationships, cross-linked relationships(links to categories under other root categories) or any other type of relationship. Weights assigned to categories as links are traversed based on the weight of the originating category in the link. The modifier used to assign weights to linked-to categories is adjustable.
Step 3a) If desired, certain root categories can be ignored.
Step 3aa) The method of comparison between the category weights in the selection and the category weights in the content is customizable. One method of comparison that can be used is a Cosine Coefficient algorithm.
Another method of comparison that can be used is the "Smithgate Algorithm", which we developed ourselves. Any other algorithm can be used to determine the degree of similarity between two pieces of tagged content.
Step 3b) The aggregation algorithm can take into account weights or rankings of the root categories, since certain root categories may be more importantthan other root categories.
B. Rating Messages
The dynamic model described in Section A provides a powerful tool for organizing content. Used in conjunction with a sophisticated rating system, it is capable of far more.
A dynamic system automatically captures "metadata" each time a user posts a message. Examples of metadata are the filters set when a message is posted and ratings information. Because we know which filters are set when a message is posted, we know
(in broad terms) what the message is about. As users rate messages, the system therefore develops a sophisticated profile on which subjects users are experts on.
This profile allows the system to do two things that can't be done on static systems: users can screen content so that people with poor reputations on this subject are ignored; and ratings given to specific messages can be weighted by the user's knowledge of the subject.
From a user's perspective things are simple: just point and click to give a message a rating between one and seven. Other rating systems use other scales. Some embodiments can have discrete and/or continuous rating systems. But the Present invention manages to do subtle and complex things with this simple rating.
i. Reputation System
Each user builds a reputation over time. This reputation is not a single number, but a profile made up of many numbers. Users build reputation ratings for each filter value of every message they've ever posted or rated on the system. Figure 7 shows an example flow chart for updating a user's rating. Steps can be added, removed, changed, and/or rearranged. There are two ways of building a reputation: posting messages and rating messages. Posting a message gives the system substantial data to evaluate. Reputations gained through posting are therefore difficult to influence once established. In contrast, rating a message gives the system limited data to evaluate. Reputations gained by rating are therefore easier to influence. Thus, posting allows users to build "strong" reputations which can't easily be changed while rating messages allows users to build "weak" reputations which can be changed quite easily.
a. Builάing a Reputation by Posting: Strong Form. Consider an example in which a poster posts a message comparing "Firm 1 ",
"Firm 2" anά'Firm 3". For the moment, let's contemplate only the "Firms" filter, which is set as follows:
Firms=E7rm 1 Firm 2 Firm 3
In this case our rater, thinking the poster's message brilliant, gives it a 7. Our rater has already built a reputation, and his reputation for the selected firms is:
"Firm 1 " =7 (high)
"Firm 2" =4 (medium) "Firm 3" -1 (low)
The situation now looks like this:
Figure imgf000022_0001
For each filter the rating of seven will be weighted by the rater's reputation and then averaged into the poster's reputation. Let's go through this example to see how this would work.
The rater has a reputation of seven for "Firm 1 ". He is an expert on the subject. Since an expert on "Firm 1" gave a message involving "Firm 1 " a top score, the poster's reputation on "Firm 1 " will go up substantially. The rating of seven will be averaged into the poster's reputation on "Firm 1 " and will be heavily weighted.
The rater has a reputation of four for "Firm 2". This means that, while not entirely ignorant, he isn't an expert. Although he gave the message a seven, we shouldn't trust his opinion on "Firm 2 " as much as we did his opinion on "Firm 1 ". The rating of seven will be averaged into the poster's reputation for "Firm 2", but will not be weighted as heavily as his rating of "Firm I ". The poster's reputation for "Firm 2" will rise, but not as much as his reputation for "Firm 1 ". As for "Firm 3", the rater has a reputation of one. He knows nothing about "Firm
3", so we shouldn't trust his opinion at all. Even though the rater gave this message a seven, the rating will have no weight and will not affect the poster's reputation. In other embodiments, the weight has nonzero but low weight.
b. Builάing a Reputation by Rating: Weak Form.
Not all users are comfortable posting messages. For this reason, a weak form of building reputation that does not depend upon posting is also available.
All that is required of users to build this type of reputation is that they rate messages. Each time a user rates a message, the system performs a "cluster analysis" on the rating. In alternative embodiments, the reputation of the user is adjusted less frequently than every time the user posts a message.
This involves comparing the user's rating with ratings given that message by people with high reputations. If, over time, a user's ratings on a particular subject tend to correlate with the ratings of high reputation people on the same subject, we can assume that the user is trying to rate messages honestly and fairly and that he knows something about the subject. His reputation in this area will rise. But if the user's ratings tend to disagree with the ratings of people with high reputations, his reputation will fall.
A reputation built in this way is "weak" in the sense that it may rapidly be changed by the strong form of reputation-building. For example, a user may build up a reputation for ""Firm 1 "" over time using the weak method. Eventually this user may decide to post a message about "Firm 1 ". If the message receives a good rating from high-reputation users, the user's reputation for knowing about "Firm 1 " will be reinforced. But if the message receives a bad rating, the user's reputation for knowing about "Firm 1" will quickly be eroded. One or two bad "strong" ratings of posted messages are enough to destroy a "weak" reputation built up over a period of months. In other embodiments, more than two such messages are enough to destroy the reputation.
ii. Message Ratings. Just as users have reputations, messages have ratings. Message ratings are determined by the scores users give them, weighted by the relevant reputation of the raters.
Let us go back to our example of the previous section. The situation was as follows:
Figure imgf000024_0001
The rater has given this message a seven. But the rater does not have a perfect reputation for all the relevant filters. He knows quite a bit about "Firm 1 ", but only a little about "Firm 2" and nothing at all about "Firm 3".
The system aggregates the rater's reputation in these fields using a mathematical formula. In this case, the rater's aggregate reputation for "Firm 1 ", "Firm 2" and "Firm 3" is four. The system will average the rating of seven into the message's rating, giving it a weighting of four. Figure 8 shows an example of calculating an aggregate reputation. In other embodiments, nonuniform weights are given to the multiple rater's reputations. In one embodiment, the scale of 1-7 is rescaled to 0-1. Other embodiments rescale ratings to different continuous or discrete ranges.
If the user had had a perfect reputation for knowing about "Firm 7 ", "Firm 2" and "Firm 3", the weighting would have been a seven. In that case the user's rating of seven would have been averaged into the message rating with a weighting of seven. The message rating would count twice as much as it did in the prior example. In some embodiments, the weight of a message has a linear relationship with the rating of the message. In other embodiments, the weight of a message has a nonlinear relationship with the rating of the message. In some embodiments, a message has one rating. In other embodiments, a message has multiple ratings, for example different ratings for different filters or sets of filters.
C. Threshold Filtering.
The rating system works hand in hand with a system to filter rated messages. The filtering s ystem a Hows u sers t o s elect a r ating t hreshold a nd v iew o nly those m essages with ratings above that threshold. Other messages are not seen. i. Method of Threshold Filtering.
To set a threshold, users click the "threshold" button. A palette appears, containing a scatterplot as in Figure 9. Other embodiments use an interface other than a scatterplot, such as one or more selectors of reputation and/or message rating. Each dot represents a message. In other embodiments, dots represent approximations of messages and do not have a one-to-one correspondence. By selecting a point on the scatterplot, users can choose any combination of message quality and reputation quality. In some embodiments where messages have multiple ratings, such as for different filters, a user can select ratings directly or indirectly. Other embodiments permit selection of just reputation or just message rating. Suppose, for example, that a user selects the point on the scatterplot as in Figure 10.
By selecting this point the user has chosen to view messages of high message quality without much regard to the reputation of the poster. A different user might have selected the point on the scatterplot as in Figure 11.
This user has chosen to view messages posted by users with high reputations without much regard to message quality. Many users will, of course, select a point like in Figure 12:
This user wants to see only those messages of high-quality which were written by people with high reputations. By selecting this threshold, this user will likely see only the very best messages that have been posted.
ii. Results of Threshold Filtering.
In combination with the reputation system, this method of threshold filtering allows people to build communities of self-validating experts. These experts are encouraged to post good content and to rate content they see accurately.
By posting good content or rating content accurately, users build high reputations. People with high reputations become community leaders because their voices are heard by others. People without high reputations are excluded from the community because their voices cannot be heard.
In the diagram of Figure 13, "Average Threshold" represents the average combination of reputation and message rating selected by users of a certain filter-set (such as ""Firm 1 "" and "Salary Information"). Other embodiments use an interface other than a scatterplot, such as one or more selectors of reputation and/or message rating..
Users whose quality of speech places them above the average threshold will be heard. In this way, the Present invention formalizes a process that takes place informally all the time: people who speak intelligently and often become recognized as authorities.
But the system does something more. Users whose quality of speech places them below the average threshold will, on average, not be heard. Their speech is never seen by the average user.
People who say foolish things or post spam will find it difficult to post messages which fall above the Average Threshold. They will quickly establish a poor reputation.
Thus, in addition to providing incentives to post good content, the system provides disincentives for posting bad information. People are encouraged to say good things and discouraged from speaking if they have nothing good to say.
D. Implicit Reputation. Filters often have clear relationships between them. ""Firm 1 "," for instance, is a law firm. Thus, as described in Section πi(A)(ii), when ""Firm 7 "" is selected (for
"Firms") "Law" is automatically selected (for "Industries").
This means that as people build reputations in specific categories, they automatically build reputations in other related categories. The relationships between related categories can be "hardwired" and/or dynamically determined. A person who builds a reputation for "Firm 1 " simultaneously builds a reputation for Law. See Figure
14.
If, after speaking well about Salaries at "Firm 1 " a person decides to speak about
Salaries at Law Firms generally, they will already have established a reputation for both "Law" and "Salaries." Their advice on Law Firms will be trusted because, by demonstrating that they know about "Firm 7 ", they've shown that they know about Law
Firms generally.
If they say bad things about Law Firms, their reputation for Law Firms will decline but their reputation for "Firm 7 " will be unaffected. In other embodiments, their reputation is affected poorly. In other embodiments, good messages raise their reputation for "Firm 7". After all, they've already established that they know about "Firm 1 ". The fact that they don't know about other firms doesn't diminish that. E. Annotation System
The use of filters as described permits a unique annotation system. This system lets users annotate content with their comments, which are appropriately tagged and filed by the Present invention. In this way proprietary content becomes the seed from which thousands of related messages sprout, filling the database with interesting, pre-sorted messages. Figure 15 shows an example flow chart of annotation posting. Steps can be added, removed, changed, and/or rearranged.
i. Creating Annotations. Proprietary content is first tagged, sentence by sentence, with appropriate filters by the site operator. In other embodiments, tagging occurs more frequently, for example word by word, or group of words. In other embodiments, tagging occurs less frequently, such as in multi-sentence blocks or paragraphs.
As shown in the paragraph of Figure 16, the user cannot see the filter values attached to each sentence. These are invisible. All he can see are the sentences about "Firm 1 ". In other embodiments, the user can see one or more filters.
The filter values come into play when the user decides to annotate a sentence. Suppose that the user decides to comment on the third sentence in the above paragraph. They select the sentence to annotate, then enter their comments, as in Figure 17. Since we know that the sentence being annotated is about John Doe, a partner at
"Firm 1", we can feel reasonably sure that the annotation is about the same subject. The system therefore automatically tags the annotation with the same filters as the original sentence and files the annotation in the database using those filters. In other embodiments, filters can be added, changed, and/or subtracted, automatically or by selection.
ii. Viewing Annotations.
There are two ways to view annotations: annotation format and message format, a. Annotation Format.
When viewing annotated text, users can select a sentence to view its annotations. Thus, a user reading a description of "Firm 1 " would simply select any sentence for more detail.
Like messages, annotations are rated and filtered. Annotations that fall above a user's threshold are displayed. Annotations below the threshold are not seen. Thus by selecting any sentence in a description, a user can immediately read the best comments on that sentence. Comments by users with reputations for knowing the subject matter are more likely to be seen than comments by less knowledgeable users, and good messages are more likely to be seen than bad.
Since annotations are filed in the message database, they can also be pulled up as messages.
The annotation in diagram seven, for instance, is tagged with the following filters:
¥irms="Firm 7 "
Topics=Hours
Partners
Partners=John Doe
This annotation will therefore come up a s a m essage w henever a u ser se ts their filters in a way that substantially overlaps with these filters. Thus, if a user sets their filters to ""Firm 1 "" and "Hours," this message is likely to be displayed. It would also be displayed during a search for ""Firm 7 "" and "Partners" or "Law Firms" and "Partners."
And it's almost certain to be displayed in a search for "John Doe."
For both annotations and other messages, the order in which they are displayed can be influenced by relevance and/or rating.
F. Since annotations can also be viewed as messages, persuading users to annotate content will seed the system with initial messages and get conversations started. As long as the site starts with content users want to respond to, discussions will be started and placed into the system with enough filters attached so that appropriate messages appear during any related search. Because each message will have many filters attached, users will perceive the boards on the system to be full even though only a few messages may h ave been posted. Anonymity provides a powerful incentive to speak about sensitive subjects online. Indeed, the mere perception of anonymity felt by online speakers has contributed to an enormous outpouring of gossip on the Web. But as Time Magazine reports: Although the sites give their posters - who generally use pseudonyms - a feeling of anonymity, they're usually not anonymous at all. Faced with a subpoena, most sites will readily divulge a poster's name to the authorities. Although a lack of anonymity can create a chilling effect on speech, giving users anonymity causes other problems. Anonymous speakers are not accountable for their speech and feel free to post spam and low-quality messages because speech can't be traced back to them.
The Present invention's rating and filtering systems solve these problems by creating accountability for anonymous speech. Users who speak poorly or spam the system will receive low ratings. Their messages will not be seen and they will discover that their speech has become invisible to others. On the other hand, users with good reputations will be able to speak anonymously with the knowledge that their speech will be heard, although their names remain unknown. The Present invention protects people's identity in two ways: its four levels of anonymity and its use of onion routing.
i. Four Levels of Anonymity.
The Present invention provides four different levels of anonymity. Users can change their anonymity level before posting messages in order to ensure that sensitive messages receive as much protection as they deserve. Figure 18 shows an example flow chart of posting at different levels of anonymity. Steps can be added, changed, removed, and/or rearranged. Figure 19 summarizes key features of different levels of anonymity. Levels can be added, removed, or changed.
a. Level One: Use ofPseuάonyms.
First level anonymity allows users to post messages using a pseudonym. Unlike other message boards, the software does not ask for information about the user that could link the message to their true identity. No e-mail address, credit card information or other information that could connect a user to the site is recorded. Information about a user's Internet service provider or IP address is not logged. All that the system requests from a user - and all it knows about a user - is their username and password.
This means that if a site using the Present invention is subpoenaed to turn over the identity of someone who posted a particular message, it can't. Even if site operators cooperate to the best of their ability, the limited information they have will be useless. Asked who posted a particular message, the most they will be able to say is, "that message was posted by a person calling themselves 'Daffodil.' It was read by other users because Daffodil has a good reputation for knowing about the subject."
b. Level Two: Anonymous Linkeά.
Second level anonymity allows users to post messages as "Anonymous." Although other users cannot tell who posted an anonymous message, the Present invention keeps track a nd continues t o 1 ink a u ser's reputation t o t he m essages t hey p ost. A nonymous messages may therefore benefit from a poster's high reputation, and ratings given to anonymously posted messages affect the poster's reputation.
Messages posted using level-two anonymity are sometimes called "anonymous linked" messages because although the identity of the poster is hidden to other users, the Present invention keeps track of links between messages and their authors. The software "knows" who wrote which message, although other users don't. This makes the "private reply" possible. Suppose Daffodil decides to post a message critical of 'Mr. Big,' a partner at "Firm 7 ". Daffodil has posted messages about "Firm 1 " before, and has a high reputation for knowing about the firm. She realizes, however, that readers will be able to determine her identity if they read this message in the context of other messages she's written. For this reason Daffodil decides to post her message anonymously. Her high reputation for knowing about "Firm 1 " is linked to the message, so many people will read it. And if they give it a high rating, her reputation for "Firm 1 " will go up even further.
Suppose Mr. Big reads the message. He disagrees with Daffodil, but doesn't want to speak out publicly. He can click a button on the message marked "private reply" and send a private reply to Daffodil's internal mailbox on the system. He can send this reply to D affodil e ven t hough h e d oesn't k now t hat " Daffodil" i s t he p erson h e's w riting t o. And if Daffodil replies to him, she can choose to do so anonymously. If this correspondence continues a private, detailed e-mail conversation can take place between these two without ever risking Daffodil's identity. And if she eventually becomes convinced that she wronged Mr. Big in her original message, she may decide to retract it. What if Daffodil decides not to retract her message? Mr. Big may become upset enough to serve the site with a subpoena demanding Daffodil's true identity.
The most the site could give Mr. Big would be Daffodil's username. But even this might be enough to unmask Daffodil. By putting her message together with other messages posted by Daffodil in the past, Mr. Big may be able to determine Daffodil's true identity.
c. Level Three: Anonymous Unlinkeά. For this reason, the Present invention offers a third level of anonymity. Level three messages are also referred to as "anonymous unlinked." Like level two messages, they are posted under the username "Anonymous." But unlike level two, the system does not keep track of links between messages and their authors. When a message is posted, the system immediately stamps the message with a user's relevant reputation scores; it then severs the link between the user and the message and "forgets" the poster's identity. After a level three message has been posted, even the site operator is unable to determine who the author was.
Because the message has been stamped with the reputation values of the poster, it can be filtered like any other. Messages posted by high reputation users will be seen and those posted by low reputation users will not. But users feel secure posting level three messages because they know that although their messages can benefit from their reputation scores, their identities are completely protected - even from the site operators themselves.
d. Level Four: Complete Anonymity.
For each of levels one, two and three, users are required to log on with a username and password before posting messages. Although their identities are protected, some users may feel uncomfortable providing even this limited information just prior to posting particularly sensitive messages. For this reason level four anonymity allows users to post messages without even logging in. Users are not required to give any information at all. Since they have not given any information to the system, and since the Present invention does not record IP addresses, information about ISPs or place cookies on a user's machine, users can be assured of complete anonymity when using level four anonymity.
A disadvantage to level four anonymity is that since the system doesn't know who the user is, they are unable to take advantage of their reputation. As a result, few people are likely to see messages posted using level four anonymity. This problem is not insurmountable, however. A user who posts a particularly interesting message using level four anonymity can simply log in at a later date, find their message, and give it a high rating (or, if they're to scared to risk themselves this way, they can tell a friend about the message t hey "read" a nd g ive t hem e nough i nformation to e asily 1 ocate it). O ne g ood rating will not be sufficient to ensure that the message is widely read. But it will give the message enough of a boost that a few more people will see it. I f the m essage is truly interesting and deserves to be read, it's rating will quickly soar and it will be injected into the mainstream of conversation.
Employers sometimes keep track of the sites their employees have been to. As a result, people are often afraid to access particular sites from work.
Figure 20 shows an example of onion routing. The present invention avoids this problem through the use of packet wrapping. By using another site as a proxy server and "wrapping" our EP packets with theirs, we can disguise the source of our packets. If we have a partnership with Yahoo!, for instance, we could route our signal through Yahoo!, which would cause employers to believe that their employees are using that site, not ours.
Since filters are u sed to o rganize T RANSPARENSEE™ s ites, i t i s i mportant t o ensure that sites have complete and current filter-sets. But it is difficult and expensive for sites to keep their filters up to date in real-time. This would require sites about law firms to know the name of every new law firm, and sites about restaurants to know the name of every new restaurant, as soon as they come into existence.
An easier way is to give users the ability to add new filters. If the user of a job site doesn't see their firm listed, or the user of a restaurant site doesn't see a new bistro, they can add it to the filter set. Allowing users who know a subject best to find and repair weak spots in the system is the best and most cost-effective way to keep filters current.
The potential disadvantage is that some users may insert incorrect filters into the filter-set. This can be prevented with TRANSPARENSEE™'s reputation system.
Suppose a user notices that their law firm, "Firm 4" is not listed on a TRANSPARENSEE™ job site. The user would request that Firm 4 be added to the filter set and would fill out a form containing basic information about the firm.
Since the user claims that Firm 4 is a. New York law firm, it stands to reason that users with high reputations for "New York" and "Law Firm" will be in a position to know whether Firm 4 is real or not. The next time such users log into the system, they will see a poll in the corner of their screen asking:
Which of these is a New York law firm? I I Simpson, Thatcher & Bartlett I I Dewey Cheatem & Howe I I Bwahahahahaha :-)
Users with high reputations for "New York" and "law firms" might be expected to answer this question correctly. But some may not. A malicious minority of users may check the wrong box. These users can be caught through cluster analysis. A simple algorithm allows us to determine what answers the majority of users gave and highlights those users whose answers differed substantially. Their entries can be disregarded and their reputations diminished. If their reputations go down enough, they will no longer be asked to answer polls of this type. In this way the filter-set can grow in response to the needs of users. It can also shrink. If users fail to use certain filters over a period of time, those filters are removed from the filter-set.
We term the ability to grow and shrink in response to user demand an "organic" element. The present invention makes a system highly organic. The filter-set, and thus the board itself, responds to the demands of high-reputation users. By responding to users in real-time and shaping itself to their needs, the system collects and verifies information more rapidly and accurately than even a large staff could. Figure 21 shows an example of determining a discussion rating based on multiple factors. Fewer, more, and/or different factors can be used. Such factors can also be used to rate filters and other features of the software. In addition to messages, the Present invention supports polls, articles, transcripts, faxes, Word files, photos, audio and video clips and any other type of data. These types of content c an b e p osted t o the s ystem, i ndexed, se arched for, filtered and r ated, j ust 1 ike messages.
Posting an interesting fax, photo or Word file would result in a substantial boost to a user's reputation. Indeed, certain types of content are more likely to result in a reputation boost than others. If a user posts an internal memo about bonuses at "Firm 1 " to the "'Firm 7 "" and "Salary Information" board, his reputation in those areas will skyrocket. It will be clear to everyone using the board that this person works at "Firm 1 " and is doing his best to feed good information to others. This effect creates a strong incentive for people to post information proving that they are "insiders." Polls can only be posted to the system by high-reputation users. At the discretion of the poster, they may be seen only by other high-reputation users.
Thus, a user with a high reputation for ""Firm 1 "" could create a poll asking other "Firm 1 " people questions about the firm. After all, who better to know the best questions to ask than someone who works there? People with high reputations for "Firm 1 " might see the following poll the next time they login:
Daffodil asks: "What's the worst thing about Firm 1 's new offices?
I I not enough closet space
I [ horrible shag carpeting I I other
When enough people have answered this poll, Daffodil will have the option of allowing others to see poll results.
Allowing only users with high reputations to post and answer polls gives people a substantial incentive to try to obtain a high reputation. Giving them the discretion to send such polls only to other high reputation users provides a way for high reputation users to communicate only among themselves, thus enhancing the prestige - and reward - of having a high reputation.
Users who achieve a high reputation may also publish articles. An article is more complex than a message, and can contain images (such as graphs) and other complex attachments. More importantly, an article is posted in a prominent and fixed position on a page, making users more likely to read articles than messages. As with polls, allowing only users with high reputations to write articles enhances people's desire to obtain a high reputation. Since people raise their reputation by posting good content to the site, this encourages the posting of interesting content.
The Present invention has a "chat" option, but with a difference. Any user party to a chat can choose to push the "record" button at any time. If a chat is being recorded, a red light appears in a corner of the chat window. Recorded chats can be posted to the system just like messages. Chats may be restricted to only high reputation users. Other users won't even be aware that a chat is taking place. Furthermore, when a chat is posted, it may take on the average reputation values of the users party to the chat. This encourages users to invite only high reputation people to chat with them if they want their transcripts to be widely seen.
Pending consideration of copyright-related concerns, the software can easily be modified to accept faxes. If this function is implemented, users will be able to fax documents to TRANSPARENSEE™ sites from any location. After the fax goes through, the user's fax machine will print a slip containing a confirmation number. The next time the user goes to the site they can receive the fax that they sent by clicking the "Receive Fax" button and entering the confirmation number. The fax will then appear on the user's screen and can be posted to the system. It is not necessary to login to receive a fax, and faxes can be posted to the system using any level of anonymity.
Again, pending consideration of copyright-related concerns, the software can be modified to accept Word files, photos, and video clips. Just as posting a fax can demonstrate one's insider status and raise one's reputation, so can posting an interesting file, photo, or clip.
One of the greatest advantages of the Present invention lies in the filter selection mechanism. It feeds information to users as they make choices, allowing them to extract information from the database on areas they may know little about.
Consider a law student trying to decide which firms to interview with. The student knows nothing about law firms, but knows that he would like to work at a firm with offices in New York, Palo Alto and London.
To obtain information, the student would set his filters as follows:
Industries=Law
Locations=New York Palo Alto London
If h e n ow s elects t he " Firms" filter, t he sy stem will s how h im a 1 ist o f law firms w ith offices in New York, Palo Alto and London. The list might look like this:
Firms=Brobeck, Phleger Coudert Brothers Davis Polk Gibson Dunn Morrison & Foerster Shearman & Sterling Skadden Arps White & Case
These are all law firms with offices in New York, Palo Alto and London. On a conventional bulletin-board system the user would have had to determine for himself which firms have offices in all three locations. This could take hours, but only after doing this research would he know which boards are of interest to him. On a
TRANSPARENSEE™ system, the relevant firms are pre-selected.
J. Wireless Clients Supported
The Present invention has been built to accommodate multiple front-ends. Thus, as wireless PDAs (such as Palm Pilots and Blackberries) become more commonly available, a front-end can be provided to make TRANSPARENSEE™ sites accessible from such devices.
The p resent i nvention w ill b e p articularly u seful for P DA u sers, s ince t he s mall screen and low bandwidth of PDAs places a premium on the ability to retrieve high quality information quickly. Discussion boards, in their current form, will be virtually inaccessible from PDAs due to the amount of time it takes to find worthwhile information on them, even when using a high bandwidth client. By eliminating low quality information from such boards, the Present invention will make PDAs a viable device for the exchange of information between large numbers of online users. Although preferred embodiments of the invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that many additions, modifications and substitutions are possible without departing from the scope and spirit of the invention as defined by the accompanying claims.

Claims

I Claim:
1. A method for searching a content database stored in computer storage, the database including a plurality of records each containing multiple fields of information, the method comprising the steps of: maintaining a structure database in computer storage in which each record is parsed into a plurality of categories containing multiple fields of information, each category having at least one sub-category, the sub-categories being structured in at least one sub-level based upon a relationship between the information in sub-categories, the structure database containing category structure information defining the data structure of each category; receiving a search query containing a subset of the categories contained in a record, which subset may include all of the categories, the query containing selection information indicating those sub-categories that should be present in records being sought by the query; for categories present in the query subset, performing a correlation between the selection information and information from the structure database representing the sub- category structure in a subset of the records, which subset may contain all of the records, to produce a relevance value for a record; and as a response to the query, selecting information from records in the content database based upon the relevance value of the records.
2. The method of claim 1 wherein the correlation step is performed by correlating selection information for a chosen category with information from the structure database representing the sub-category structure of the same category in a subset of the records, which subset may contain all of the records, to produce a relevance value for the chosen category in each record of the subset, this correlating step being performed for a plurality of chosen categories; and, for a record, combining the relevance values of the plurality of chosen categories to produce a relevance value for the record.
3. The method of any preceding claim wherein the correlating step is different for two categories that have different data structures.
4. The method of any p receding c laim wherein performing a c orrelation includes assigning a weight to a sub-category in a record depending on whether that sub- category is present in the selection information, and using the assigned weight in the correlating step.
5. The method of any p receding c laim wherein performing a correlation includes assigning a weight to a sub-category in a record depending upon its level, and using the assigned weight in the correlating step.
6. A system for searching a content database stored in computer storage, the database including a plurality of records each containing multiple fields of information, the method comprising: a structure database in computer storage in which each record is parsed into a plurality of categories containing multiple fields of information, each category having at least one sub-category, the sub-categories being structured in at least one sub-level based upon a relationship between the information in sub-categories, the structure database containing category structure information defining the data structure of each category; a receiver for a search query containing a subset of the categories contained in a record, which subset may include all of the categories, the query containing selection information indicating those sub-categories that should be present in records being sought by the query; a correlation device set performing a correlation between the selection information, for categories present in the query subset, and information from the structure database representing the sub-category structure in a subset of the records, which subset may contain all of the records, to produce a relevance value for a record; and a unit responding to the query by selecting and providing information from records in the content database based upon the relevance value of the records.
7. The system of claim 6 wherein the correlation device correlates selection information for a chosen category with information from the structure database representing the sub-category structure of the same category in a subset of the records, which subset may contain all of the records, to produce a relevance value for a chosen category in each record of the subset, this correlation being performed for a plurality of chosen categories; and, a correlation device including a component combining the relevance values of the plurality of chosen categories to produce a relevance value for the record.
8. The system of claim 6 or 7 wherein the correlation device is performs a different operation for two categories that have different data structures.
9. The system of any of claims 6-8 wherein the correlation device includes a component which assigns a weight to a sub-category in a record depending on whether that sub-category is present in the selection information, and the correlation unit uses the assigned weight in performing the correlation.
10. The system of any of claims 6-9 wherein the correlation unit includes a component which assigns a weight to a sub-category in a record depending upon its level, and the correlation unit uses the assigned weight in performing the correlation.
11. The system of any of claims 6-10 provided with access to a network, the content database being accessible from the network, the receiver and responding unit communicating over the network.
12. The system of claim 11 wherein the content database is accessed through the network.
13. In an online user forum of the type permitting communication among a plurality of users and also permitting users to post information content for access by users, the improvement comprising a reputation module storing a reputation rating for a user in association with information content, a user's reputation being a function of the degree his participation in the forum.
14. The forum of claim 13 wherein the reputation module is constructed so that a first user's reputation rating is dependent upon the evaluation by other users of the information posted by the first user.
15. The forum of claim 13 or 14 wherein the reputation module is constructed so that a first user's reputation rating is dependent upon his evaluation of information posted by other users.
16. The forum of claim 14 or 15 wherein the reputation module is constructed so that a first user's reputation rating is dependent more the evaluation by other users of the information posted by the first user than upon the first user's evaluation of information posted by other users.
17. In combination with the forum of any one of claims 13-16, a system for searching a content database stored in computer storage, the database including a plurality of records each containing multiple fields of information, the method comprising: a structure database in computer storage in which each record is parsed into a plurality of categories containing multiple fields of information, each category having at least one sub-category, the sub-categories being structured in at least one sub-level based upon a relationship between the information in sub-categories, the structure database containing category structure information defining the data structure of each category; a receiver for a search query containing a subset of the categories contained in a record, which subset may include all of the categories, the query containing selection information indicating those sub-categories that should be present in records being sought by the query; a correlation device set performing a correlation between the selection information, for categories present in the query subset, and information from the structure database representing the sub-category structure in a subset of the records, which subset may contain all of the records, to produce a relevance value for a record; and a unit responding to the query by selecting and providing information from records in the content database based upon the relevance value of the records.
18. The combination of claim 17 wherein the correlation device correlates selection information for a chosen category with information from the structure database representing the sub-category structure of the same category in a subset of the records, which subset may contain all of the records, to produce a relevance value for a chosen category in each record of the subset, this correlation being performed for a plurality of chosen categories; and, a correlation device including a component combining the relevance values of the plurality of chosen categories to produce a relevance value for the record.
19. The combination of claim 17 or 18 wherein the correlation device is performs a different operation for two categories that have different data structures.
20. The combination of any of claims 17-19 wherein the correlation device includes a component which assigns a weight to a sub-category in a record depending on whether that sub-category is present in the selection information, and the correlation unit uses the assigned weight in performing the correlation.
21. The combination of any of claims 17-20 wherein the correlation unit includes a component which assigns a weight to a sub-category in a record depending upon its level, and the correlation unit uses the assigned weight in performing the correlation.
22. T he c ombination o f a ny o f c laims 1 2-21 p rovided w ith a ccess t o a network, the content database being accessible from the network, the receiver and responding unit communicating over the network.
23. The system of claim 22 wherein the content database is accessed through the network.
24. A method for improving an online user forum of the type permitting communication among a plurality of users and also permitting users to post information content for access by users, the method comprising maintaining a reputation rating for a user in association with information content, a user's reputation being a function of the degree of his participation in the forum.
25. The method of claim 24 wherein a first user's reputation rating is dependent upon the evaluation by other users of information posted by the first user.
26. The method of claim 24 or 25 wherein a first user's reputation rating is dependent upon his evaluation of information posted by other users.
27. The method of anyone of claims 24-26 wherein a first user's reputation rating is dependent more the evaluation by other users of information posted by the first user than upon the first user's evaluation of information posted by other users.
PCT/US2003/036045 2002-11-11 2003-11-10 Method and system of searching by correlating the query structure and the data structure WO2004044705A2 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
AU2003290756A AU2003290756A1 (en) 2002-11-11 2003-11-10 Method and system of searching by correlating the query structure and the data structure
EP03783339A EP1565844A4 (en) 2002-11-11 2003-11-10 Search method and system and systems using the same
CA2545230A CA2545230C (en) 2002-11-11 2003-11-10 Search method and system and systems using the same
US10/534,627 US7461051B2 (en) 2002-11-11 2003-11-10 Search method and system and system using the same
US12/325,991 US8185515B2 (en) 2002-11-11 2008-12-01 Method and system for managing message boards
US13/450,137 US8577867B2 (en) 2002-11-11 2012-04-18 Method and system for expanding a website
US14/283,659 US10242028B2 (en) 2002-11-11 2014-05-21 User interface for search method and system
US16/269,979 US11275773B2 (en) 2002-11-11 2019-02-07 User interface for search method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US42536102P 2002-11-11 2002-11-11
US60/425,361 2002-11-11

Related Child Applications (3)

Application Number Title Priority Date Filing Date
US10/534,627 A-371-Of-International US7461051B2 (en) 2002-11-11 2003-11-10 Search method and system and system using the same
US12011408A Continuation-In-Part 2002-11-11 2008-05-13
US12/325,991 Continuation US8185515B2 (en) 2002-11-11 2008-12-01 Method and system for managing message boards

Publications (3)

Publication Number Publication Date
WO2004044705A2 true WO2004044705A2 (en) 2004-05-27
WO2004044705A3 WO2004044705A3 (en) 2004-09-02
WO2004044705B1 WO2004044705B1 (en) 2005-02-17

Family

ID=32312976

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/036045 WO2004044705A2 (en) 2002-11-11 2003-11-10 Method and system of searching by correlating the query structure and the data structure

Country Status (5)

Country Link
US (3) US7461051B2 (en)
EP (1) EP1565844A4 (en)
AU (1) AU2003290756A1 (en)
CA (1) CA2545230C (en)
WO (1) WO2004044705A2 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1650679A1 (en) * 2004-10-21 2006-04-26 Ricoh Company, Ltd. System, device, method, program, and storage medium for human resources registration and retrieval
EP1643394A3 (en) * 2004-09-30 2006-05-17 Avaya Technology Corp. Method and apparatus for data mining within communication information using an entity relationship model
US7936863B2 (en) 2004-09-30 2011-05-03 Avaya Inc. Method and apparatus for providing communication tasks in a workflow
US8078880B2 (en) 2006-07-28 2011-12-13 Microsoft Corporation Portable personal identity information
US8087072B2 (en) 2007-01-18 2011-12-27 Microsoft Corporation Provisioning of digital identity representations
US8104074B2 (en) 2006-02-24 2012-01-24 Microsoft Corporation Identity providers in digital identity system
US8107401B2 (en) 2004-09-30 2012-01-31 Avaya Inc. Method and apparatus for providing a virtual assistant to a communication participant
US8117459B2 (en) * 2006-02-24 2012-02-14 Microsoft Corporation Personal identification information schemas
US8270320B2 (en) 2004-09-30 2012-09-18 Avaya Inc. Method and apparatus for launching a conference based on presence of invitees
US8407767B2 (en) 2007-01-18 2013-03-26 Microsoft Corporation Provisioning of digital identity representations
US8689296B2 (en) 2007-01-26 2014-04-01 Microsoft Corporation Remote access of digital identities

Families Citing this family (84)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7693830B2 (en) 2005-08-10 2010-04-06 Google Inc. Programmable search engine
US7743045B2 (en) * 2005-08-10 2010-06-22 Google Inc. Detecting spam related and biased contexts for programmable search engines
US7716199B2 (en) 2005-08-10 2010-05-11 Google Inc. Aggregating context data for programmable search engines
AU2003290756A1 (en) 2002-11-11 2004-06-03 Transparensee Systems, Inc. Method and system of searching by correlating the query structure and the data structure
GB2401206A (en) * 2003-04-29 2004-11-03 Infinite Reason Ltd Object orientated data processing system
US7599938B1 (en) 2003-07-11 2009-10-06 Harrison Jr Shelton E Social news gathering, prioritizing, tagging, searching, and syndication method
US8554601B1 (en) 2003-08-22 2013-10-08 Amazon Technologies, Inc. Managing content based on reputation
US7676739B2 (en) * 2003-11-26 2010-03-09 International Business Machines Corporation Methods and apparatus for knowledge base assisted annotation
US20080163075A1 (en) * 2004-01-26 2008-07-03 Beck Christopher Clemmett Macl Server-Client Interaction and Information Management System
US7831581B1 (en) 2004-03-01 2010-11-09 Radix Holdings, Llc Enhanced search
US7979492B2 (en) * 2004-11-16 2011-07-12 International Business Machines Corporation Time decayed dynamic e-mail address
US7912806B2 (en) * 2005-02-21 2011-03-22 Brother Kogyo Kabushiki Kaisha System and device for providing contents
WO2006094275A2 (en) * 2005-03-02 2006-09-08 Markmonitor, Inc. Trust evaluation systems and methods
US7904473B2 (en) * 2005-04-04 2011-03-08 Aol Inc. Community-based parental controls
US20060282396A1 (en) * 2005-06-09 2006-12-14 Civil Foundation, Llc Multi-jurisdictional electronic-commerce legal products, methods of production and methods of conducting business therewith
US8249915B2 (en) * 2005-08-04 2012-08-21 Iams Anthony L Computer-implemented method and system for collaborative product evaluation
US7827052B2 (en) * 2005-09-30 2010-11-02 Google Inc. Systems and methods for reputation management
US20070078670A1 (en) * 2005-09-30 2007-04-05 Dave Kushal B Selecting high quality reviews for display
US8438469B1 (en) 2005-09-30 2013-05-07 Google Inc. Embedded review and rating information
US8010480B2 (en) * 2005-09-30 2011-08-30 Google Inc. Selecting high quality text within identified reviews for display in review snippets
US8141148B2 (en) 2005-11-28 2012-03-20 Threatmetrix Pty Ltd Method and system for tracking machines on a network using fuzzy GUID technology
US8763113B2 (en) 2005-11-28 2014-06-24 Threatmetrix Pty Ltd Method and system for processing a stream of information from a computer network using node based reputation characteristics
US7844603B2 (en) * 2006-02-17 2010-11-30 Google Inc. Sharing user distributed search results
US8706560B2 (en) 2011-07-27 2014-04-22 Ebay Inc. Community based network shopping
US20070288602A1 (en) * 2006-06-09 2007-12-13 Ebay Inc. Interest-based communities
JP4768537B2 (en) * 2006-07-18 2011-09-07 株式会社リコー Content browsing system and program
US8055639B2 (en) * 2006-08-18 2011-11-08 Realnetworks, Inc. System and method for offering complementary products / services
US8176178B2 (en) 2007-01-29 2012-05-08 Threatmetrix Pty Ltd Method for tracking machines on a network using multivariable fingerprinting of passively available information
US9444839B1 (en) 2006-10-17 2016-09-13 Threatmetrix Pty Ltd Method and system for uniquely identifying a user computer in real time for security violations using a plurality of processing parameters and servers
US7493330B2 (en) * 2006-10-31 2009-02-17 Business Objects Software Ltd. Apparatus and method for categorical filtering of data
US7912875B2 (en) * 2006-10-31 2011-03-22 Business Objects Software Ltd. Apparatus and method for filtering data using nested panels
US20080183815A1 (en) * 2007-01-30 2008-07-31 Unger Assaf Page networking system and method
US8027975B2 (en) * 2007-01-31 2011-09-27 Reputation.Com, Inc. Identifying and changing personal information
US20080275761A1 (en) * 2007-04-26 2008-11-06 1821 Wine Company, Inc. Wine database and recommendation system
US8626771B2 (en) * 2007-06-29 2014-01-07 Microsoft Corporation Container reputation
US20090006451A1 (en) * 2007-06-29 2009-01-01 Microsoft Corporation Web Page-Container Interactions
US8838729B2 (en) * 2007-06-29 2014-09-16 Microsoft Corporation Gathering statistics based on container exchange
US8849909B2 (en) * 2007-07-06 2014-09-30 Yahoo! Inc. Real-time asynchronous event aggregation systems
US20090063248A1 (en) * 2007-08-31 2009-03-05 Ebay Inc. Education system to improve online reputation
KR100925376B1 (en) * 2007-09-12 2009-11-09 엔에이치엔(주) Method for controlling display of replies, and system and computer-readable recording medium for implementing same method
US8150842B2 (en) 2007-12-12 2012-04-03 Google Inc. Reputation of an author of online content
US8296245B2 (en) * 2008-01-03 2012-10-23 Kount Inc. Method and system for creation and validation of anonymous digital credentials
US8364605B2 (en) * 2008-07-13 2013-01-29 Tros Interactive Ltd. Calculating connectivity, social proximity and trust level between web user
US20100042422A1 (en) * 2008-08-15 2010-02-18 Adam Summers System and method for computing and displaying a score with an associated visual quality indicator
US20100235311A1 (en) * 2009-03-13 2010-09-16 Microsoft Corporation Question and answer search
US20100235343A1 (en) * 2009-03-13 2010-09-16 Microsoft Corporation Predicting Interestingness of Questions in Community Question Answering
US20100241893A1 (en) * 2009-03-18 2010-09-23 Eric Friedman Interpretation and execution of a customizable database request using an extensible computer process and an available computing environment
US8868439B2 (en) * 2009-05-15 2014-10-21 Microsoft Corporation Content activity feedback into a reputation system
EP2494464A4 (en) * 2009-10-29 2016-04-27 Google Inc Ranking user generated web content
US9886681B2 (en) 2009-11-24 2018-02-06 International Business Machines Corporation Creating an aggregate report of a presence of a user on a network
US8429098B1 (en) 2010-04-30 2013-04-23 Global Eprocure Classification confidence estimating tool
US20110314028A1 (en) * 2010-06-18 2011-12-22 Microsoft Corporation Presenting display characteristics of hierarchical data structures
US8931048B2 (en) 2010-08-24 2015-01-06 International Business Machines Corporation Data system forensics system and method
US8800029B2 (en) 2010-10-04 2014-08-05 International Business Machines Corporation Gathering, storing and using reputation information
US9304614B2 (en) * 2010-10-20 2016-04-05 Salesforce.Com, Inc. Framework for custom actions on an information feed
US20120109745A1 (en) * 2010-10-29 2012-05-03 Yahoo! Inc. News comment related online advertising
US8122061B1 (en) * 2010-11-10 2012-02-21 Robert Guinness Systems and methods for information management using socially constructed graphs
US9092491B2 (en) * 2011-07-11 2015-07-28 International Business Machines Corporation Searching documentation across interconnected nodes in a distributed network
US10813630B2 (en) 2011-08-09 2020-10-27 Corquest Medical, Inc. Closure system for atrial wall
US10314594B2 (en) 2012-12-14 2019-06-11 Corquest Medical, Inc. Assembly and method for left atrial appendage occlusion
US10307167B2 (en) 2012-12-14 2019-06-04 Corquest Medical, Inc. Assembly and method for left atrial appendage occlusion
US20130086170A1 (en) * 2011-09-29 2013-04-04 Sidebar, Inc. Method and system to identify content tastemakers
US9021056B2 (en) * 2011-12-13 2015-04-28 Facebook, Inc. Metadata prediction of objects in a social networking system using crowd sourcing
US8886651B1 (en) 2011-12-22 2014-11-11 Reputation.Com, Inc. Thematic clustering
US9697490B1 (en) 2012-03-05 2017-07-04 Reputation.Com, Inc. Industry review benchmarking
US10636041B1 (en) 2012-03-05 2020-04-28 Reputation.Com, Inc. Enterprise reputation evaluation
CN104380690B (en) * 2012-06-15 2018-02-02 阿尔卡特朗讯 Framework for the intimacy protection system of recommendation service
US11093984B1 (en) 2012-06-29 2021-08-17 Reputation.Com, Inc. Determining themes
US20140142689A1 (en) 2012-11-21 2014-05-22 Didier De Canniere Device and method of treating heart valve malfunction
US8744866B1 (en) 2012-12-21 2014-06-03 Reputation.Com, Inc. Reputation report with recommendation
US8805699B1 (en) 2012-12-21 2014-08-12 Reputation.Com, Inc. Reputation report with score
US8925099B1 (en) 2013-03-14 2014-12-30 Reputation.Com, Inc. Privacy scoring
US9465505B1 (en) * 2013-05-14 2016-10-11 Google Inc. Reputation based collaboration session
US9275291B2 (en) 2013-06-17 2016-03-01 Texifter, LLC System and method of classifier ranking for incorporation into enhanced machine learning
US9566443B2 (en) 2013-11-26 2017-02-14 Corquest Medical, Inc. System for treating heart valve malfunction including mitral regurgitation
US20150169622A1 (en) * 2013-12-06 2015-06-18 Zaius, Inc. System and method for storing and retrieving data in different data spaces
US20150278447A1 (en) * 2014-03-26 2015-10-01 Mario Quintanillo System and Method for Updating Medical Records of a Third-party Medical Provider over a Computer Network
US9819618B2 (en) * 2014-06-18 2017-11-14 Microsoft Technology Licensing, Llc Ranking relevant discussion groups
JP6509507B2 (en) * 2014-07-17 2019-05-08 任天堂株式会社 Game system, terminal device, computer program and information display method
US10842626B2 (en) 2014-12-09 2020-11-24 Didier De Canniere Intracardiac device to correct mitral regurgitation
JP6481463B2 (en) * 2015-03-30 2019-03-13 富士通株式会社 Management support program, method and apparatus
US10216800B2 (en) * 2015-06-18 2019-02-26 Rocket Apps, Inc. Self expiring social media
US11119763B2 (en) * 2018-11-27 2021-09-14 International Business Machines Corporation Cognitive selection of software developer for software engineering task
WO2021163521A1 (en) * 2020-02-13 2021-08-19 Verity Platforms Inc. Information platform systems and methods

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001022287A1 (en) 1999-09-22 2001-03-29 Infoglide Corporation System and method for performing similarity searching

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US161601A (en) * 1875-04-06 Improvement in broilers
US5642502A (en) * 1994-12-06 1997-06-24 University Of Central Florida Method and system for searching for relevant documents from a text database collection, using statistical ranking, relevancy feedback and small pieces of text
US5983220A (en) * 1995-11-15 1999-11-09 Bizrate.Com Supporting intuitive decision in complex multi-attributive domains using fuzzy, hierarchical expert models
US6460034B1 (en) * 1997-05-21 2002-10-01 Oracle Corporation Document knowledge base research and retrieval system
EP0883069A1 (en) * 1997-06-06 1998-12-09 Matsushita Electric Industrial Co., Ltd. A retrieval menu creation device and method, and a recording medium storing a retrieval menu creation program
US6098066A (en) * 1997-06-13 2000-08-01 Sun Microsystems, Inc. Method and apparatus for searching for documents stored within a document directory hierarchy
US6055540A (en) * 1997-06-13 2000-04-25 Sun Microsystems, Inc. Method and apparatus for creating a category hierarchy for classification of documents
US5953718A (en) * 1997-11-12 1999-09-14 Oracle Corporation Research mode for a knowledge base search and retrieval system
US6275811B1 (en) * 1998-05-06 2001-08-14 Michael R. Ginn System and method for facilitating interactive electronic communication through acknowledgment of positive contributive
US6356899B1 (en) * 1998-08-29 2002-03-12 International Business Machines Corporation Method for interactively creating an information database including preferred information elements, such as preferred-authority, world wide web pages
AU2595300A (en) * 1998-12-31 2000-07-31 City Of Hope Method for detecting mutations in nucleic acids
US6493703B1 (en) * 1999-05-11 2002-12-10 Prophet Financial Systems System and method for implementing intelligent online community message board
US6988138B1 (en) * 1999-06-30 2006-01-17 Blackboard Inc. Internet-based education support system and methods
AUPQ138199A0 (en) * 1999-07-02 1999-07-29 Telstra R & D Management Pty Ltd A search system
US7181438B1 (en) * 1999-07-21 2007-02-20 Alberti Anemometer, Llc Database access system
AU1927401A (en) * 1999-11-26 2001-06-12 High Regard, Inc. Expertise-weighted group evaluation of user content quality over computer network
AU4712601A (en) 1999-12-08 2001-07-03 Amazon.Com, Inc. System and method for locating and displaying web-based product offerings
US6691108B2 (en) * 1999-12-14 2004-02-10 Nec Corporation Focused search engine and method
JP2001167087A (en) * 1999-12-14 2001-06-22 Fujitsu Ltd Device and method for retrieving structured document, program recording medium for structured document retrieval and index preparing method for structured document retrieval
US8290809B1 (en) * 2000-02-14 2012-10-16 Ebay Inc. Determining a community rating for a user using feedback ratings of related users in an electronic environment
US20010047353A1 (en) * 2000-03-30 2001-11-29 Iqbal Talib Methods and systems for enabling efficient search and retrieval of records from a collection of biological data
WO2002013049A1 (en) * 2000-08-04 2002-02-14 Infoglide Corporation System and method for comparing heterogeneous data sources
US20020059088A1 (en) * 2000-08-16 2002-05-16 David Whalen Method and system for providing six sigma consulting services over a computer network
US7185065B1 (en) * 2000-10-11 2007-02-27 Buzzmetrics Ltd System and method for scoring electronic messages
WO2002041190A2 (en) * 2000-11-15 2002-05-23 Holbrook David M Apparatus and method for organizing and/or presenting data
US20020111847A1 (en) * 2000-12-08 2002-08-15 Word Of Net, Inc. System and method for calculating a marketing appearance frequency measurement
US6594670B1 (en) * 2000-12-22 2003-07-15 Mathias Genser System and method for organizing search criteria match results
US20020156668A1 (en) * 2001-02-16 2002-10-24 Morrow Martin E. Remote project development method and system
JP3842577B2 (en) * 2001-03-30 2006-11-08 株式会社東芝 Structured document search method, structured document search apparatus and program
US6782383B2 (en) * 2001-06-18 2004-08-24 Siebel Systems, Inc. System and method to implement a persistent and dismissible search center frame
US7082365B2 (en) * 2001-08-16 2006-07-25 Networks In Motion, Inc. Point of interest spatial rating search method and system
US7231395B2 (en) * 2002-05-24 2007-06-12 Overture Services, Inc. Method and apparatus for categorizing and presenting documents of a distributed database
AU2003290756A1 (en) * 2002-11-11 2004-06-03 Transparensee Systems, Inc. Method and system of searching by correlating the query structure and the data structure
US20110119262A1 (en) * 2009-11-13 2011-05-19 Dexter Jeffrey M Method and System for Grouping Chunks Extracted from A Document, Highlighting the Location of A Document Chunk Within A Document, and Ranking Hyperlinks Within A Document

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001022287A1 (en) 1999-09-22 2001-03-29 Infoglide Corporation System and method for performing similarity searching

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1643394A3 (en) * 2004-09-30 2006-05-17 Avaya Technology Corp. Method and apparatus for data mining within communication information using an entity relationship model
US7936863B2 (en) 2004-09-30 2011-05-03 Avaya Inc. Method and apparatus for providing communication tasks in a workflow
US8107401B2 (en) 2004-09-30 2012-01-31 Avaya Inc. Method and apparatus for providing a virtual assistant to a communication participant
US8180722B2 (en) 2004-09-30 2012-05-15 Avaya Inc. Method and apparatus for data mining within communication session information using an entity relationship model
US8270320B2 (en) 2004-09-30 2012-09-18 Avaya Inc. Method and apparatus for launching a conference based on presence of invitees
EP1650679A1 (en) * 2004-10-21 2006-04-26 Ricoh Company, Ltd. System, device, method, program, and storage medium for human resources registration and retrieval
US8104074B2 (en) 2006-02-24 2012-01-24 Microsoft Corporation Identity providers in digital identity system
US8117459B2 (en) * 2006-02-24 2012-02-14 Microsoft Corporation Personal identification information schemas
US8078880B2 (en) 2006-07-28 2011-12-13 Microsoft Corporation Portable personal identity information
US8087072B2 (en) 2007-01-18 2011-12-27 Microsoft Corporation Provisioning of digital identity representations
US8407767B2 (en) 2007-01-18 2013-03-26 Microsoft Corporation Provisioning of digital identity representations
US8689296B2 (en) 2007-01-26 2014-04-01 Microsoft Corporation Remote access of digital identities

Also Published As

Publication number Publication date
WO2004044705B1 (en) 2005-02-17
CA2545230A1 (en) 2004-05-27
EP1565844A2 (en) 2005-08-24
EP1565844A4 (en) 2007-03-07
AU2003290756A8 (en) 2004-06-03
CA2545230C (en) 2014-01-28
US20120278411A1 (en) 2012-11-01
US20060149708A1 (en) 2006-07-06
US8185515B2 (en) 2012-05-22
US7461051B2 (en) 2008-12-02
US20090089264A1 (en) 2009-04-02
AU2003290756A1 (en) 2004-06-03
WO2004044705A3 (en) 2004-09-02
US8577867B2 (en) 2013-11-05

Similar Documents

Publication Publication Date Title
CA2545230C (en) Search method and system and systems using the same
US10242028B2 (en) User interface for search method and system
US6983282B2 (en) Computer method and apparatus for collecting people and organization information from Web sites
Drèze et al. Measurement of online visibility and its impact on Internet traffic
Nicholas et al. Re‐appraising information seeking behaviour in a digital environment: Bouncers, checkers, returnees and the like
US9087129B2 (en) Methods, systems, and software for automated growth of intelligent on-line communities
US7058516B2 (en) Computer implemented searching using search criteria comprised of ratings prepared by leading practitioners in biomedical specialties
JP5238074B2 (en) Online reference collection and scoring
US20080160490A1 (en) Seeking Answers to Questions
US20060122974A1 (en) System and method for a dynamic content driven rendering of social networks
US20070136234A1 (en) Methods and systems for generating query and result-based relevance indexes
Nicholas et al. What deep log analysis tells us about the impact of big deals: case study OhioLINK
US20060161353A1 (en) Computer implemented searching using search criteria comprised of ratings prepared by leading practitioners in biomedical specialties
Martzoukou Students' Attitudes Towards Web Search Engines–Increasing Appreciation of Sophisticated Search Strategies
US11275773B2 (en) User interface for search method and system
Päivinen et al. Better access to information on forests
Madle et al. Lessons learned from evaluation of the use of the National electronic Library of Infection
Kritzinger The effect webpage body keywords location has on ranking in search engines results: an empirical study
Rackley Navigating the Web Archives: A Study of Users' Understanding of Context
Morgan et al. Impact of individual differences on web searching performance: Issues for design and the digital divide
Doan et al. Collaborative Development of Information Integration Systems.
JP2004341888A (en) User information acquisition management system
Christ Lay internet usage: an empirical study with implications for electronic commerce and public policy
Engelbrecht The Role of Cybermarketing in the Marketing Process of an Organization
Detlor et al. Tips for Tracking Web Information Seeking Behavior

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
B Later publication of amended claims

Effective date: 20040830

WWE Wipo information: entry into national phase

Ref document number: 2003783339

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2003783339

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2006149708

Country of ref document: US

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 10534627

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2545230

Country of ref document: CA

WWP Wipo information: published in national office

Ref document number: 10534627

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP