WO2008088903A2 - Outil de conseil expert communautaire - Google Patents

Outil de conseil expert communautaire Download PDF

Info

Publication number
WO2008088903A2
WO2008088903A2 PCT/US2008/000733 US2008000733W WO2008088903A2 WO 2008088903 A2 WO2008088903 A2 WO 2008088903A2 US 2008000733 W US2008000733 W US 2008000733W WO 2008088903 A2 WO2008088903 A2 WO 2008088903A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
users
mentor
implemented method
computer implemented
Prior art date
Application number
PCT/US2008/000733
Other languages
English (en)
Other versions
WO2008088903A3 (fr
Inventor
Vishwanath Goda
Saroja Goda
Original Assignee
Webgen Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Webgen Corporation filed Critical Webgen Corporation
Publication of WO2008088903A2 publication Critical patent/WO2008088903A2/fr
Publication of WO2008088903A3 publication Critical patent/WO2008088903A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • the present invention generally relates to a web-based system, method and program product for providing an online social network. Specifically, the present invention relates to systems that match users of an online social network according to specific attributes in a secure environment. Discussion of the Related Art
  • Online and mobile social networking applications are known in the art. These applications are typically operated as managed services by application service providers (ASPs) and share several common characteristics.
  • ASPs application service providers
  • users typically create unique personal profiles that include basic information including identity, interests, profession, history, testimonials and information about their network. Users map their relationship with other members, either by inviting other members to join their network, or by using software to scan existing relationships recorded in computer contact software.
  • the present invention provides a method for an online expert guidance tool that obviates one or more of the aforementioned problems due to the limitations of the related art.
  • one advantage of the present invention is it provides a , more secure environment for students and business professionals.
  • Another advantage of the present invention is that it matches mentors and mentees based on a number of personality attributes.
  • Another advantage of the present invention is that it reduces the chances of online predators and identity theft.
  • Another advantage of the present invention is that it provides a more self-sustaining system for an on-line community.
  • the computer implemented method comprises registering a first user with the system; determining the first user's personality attributes via the first user's responses to a first series of predetermined questions; registering a plurality of users with the system, such that the plurality of users indicate particular personality attributes in response to a second series of predetermined questions; comparing the personality attributes of the plurality of users with the first user and providing the first user with a list of the plurality of users who responded to the series of predetermined questions similarly to the first user; and the first user selecting at least one of the plurality of users and initiating an online dialog with the selected one of plurality of users.
  • the aforementioned and other advantages are achieved by computer implemented method for enabling a secure interaction between users in a system for implementing an online community.
  • the computer implemented method comprises registering a first plurality of users with the system; registering a second plurality of users with the system; comparing personality attributes of the plurality of users with the first user and matching individual users from the first plurality of users with individual user from the second plurality of users based on the similarity of personality attributes between the first and second plurality of users; and registering a third plurality of users with the system, such that the third plurality of users monitor the online communications between the first and second plurality of users.
  • a computer implemented method for enabling interaction between users in an online environment which comprises registering a mentor; verifying the mentor's personal and professional information; registering a mentee; matching the mentor and mentee based on response information; providing a online communications link between the mentor and mentee; monitoring communications between the mentor and mentee on the online communications link; receiving payment from the mentee; and providing compensation to the mentor, such that the compensation depends on the communications between the mentor and mentee.
  • the aforementioned and other advantages are achieved by a computer implemented method of completing a financial transaction.
  • the computer implemented method comprises generating an identification key in accordance with the financial transaction; providing a first portion of the identification key to a subscriber at a point of sale; verifying subscriber identification at the point of sale; providing a second portion of the identification key to the subscriber; receiving first and second portion of the identification key from the subscriber; and transferring a final payment to the payee, wherein the final payment corresponds to the amount of the financial transaction.
  • the aforementioned and other advantages are achieved by a computer implemented method of secured online private communications between users in an online environment.
  • the method comprises registering a mentor; registering at least one subscriber sponsor, wherein the subscriber sponsor indicates a desire to enter into the secured communications with a given mentor; selecting the mentor from a list of mentors based on predetermined factors; generating a unique group identifier; associating the unique group identifier with the mentor; transmitting the unique group identifier to the mentor; transmitting the unique group identifier to the subscriber sponsor and indicting a desire to enter into secured communications with a subscriber sponsor; and commencing secured communications between the mentor and the subscriber sponsor.
  • the aforementioned and other advantages are achieved by a computer implemented method of matching individuals based objective similarities between the users.
  • the method comprises registering a first user with a system; registering a second user with the system; providing the first user with a plurality of predetermined questions; receiving from the first user, and storing responses to the plurality of predetermined questions; providing the second user with the plurality of predetermined questions; receiving from the second user, and storing responses to the predetermined questions; matching the first user with the second user based on a similarity of responses to the predetermined questions, wherein the responses to each of the plurality of predetermined questions is weighted by a category corresponding to the question.
  • FIG. 1 illustrates an exemplary system for a community expert guidance tool
  • FIG. 2 illustrates an exemplary system of the registration program
  • FIG. 3 (a) illustrates an exemplary process for registering a mentor
  • FIG. 3(b) illustrates an exemplary process for registering a subscriber sponsor
  • FIG. 3(c) illustrates an exemplary process for testing a mentor
  • FIG. 4 depicts a flow diagram of a monitor registration process
  • FIG. 5 depicts a flow diagram of a mentee registration and private mentoring process
  • FIG. 6(a) illustrates an exemplary security system diagram
  • FIG. 6(b) illustrates a security tier progression chart
  • FIG. 7(a) is a system diagram of an exemplary revenue distribution system
  • FIG. 7(b) is a system diagram of different revenue tracks.
  • FIG. 8 depicts a flow diagram for the payment system.
  • FIG. 1 illustrates an exemplary system 100 for providing a community based expert guidance tool.
  • users 105 A-C operate clients 110 A-C to communicate with each other over a computerized network, via server 120.
  • the computerized network can be any type of public network such as the Internet, or any type of private network such as a local area network (LAN), a wide area network (WAN), a virtual private network (VPN), etc.
  • LAN local area network
  • WAN wide area network
  • VPN virtual private network
  • communications between clients 110 A-C and server 120 could occur via direct hardwired connection (e.g., serial port), or via an addressable connection that may utilize any combination of wireline and/or wireless transmission methods.
  • Server 120 and clients 110 A-C may utilize conventional network connectivity, such as Token Ring, Ethernet, WiFi or other conventional communications standards.
  • server 120 can be any type of server that fosters electronic interaction between users 105 A-C.
  • server 120 can be a web server, an application server, an electronic server or the like.
  • server 120 includes central processing unit (CPU) 130, memory 200, input/output (I/O) interfaces 140 and a bus (not shown) connecting the CPU 130, memory 200 and the I/O interfaces 140.
  • the CPU 130 may comprise a single processing unit, or may be distributed across one or more processing units in one or more locations, e.g., on a client and computer system.
  • Memory 200 may comprise any known type of computer readable data storage and/or transmission media, including magnetic media, optical media, random access memory (RAM), read-only memory (ROM), a data cache, a data object, etc.
  • memory 200 may reside at a single physical location, comprising one or more types of data storage, or be distributed across a plurality of physical systems in various forms.
  • I/O interfaces 140 may comprise any system for exchanging information to/from an external source.
  • External devices/resources 160 may include any known type of external device, including speakers, a CRT, LCD screen, handheld device, keyboard, mouse, voice recognition system, speech output system, printer, monitor/display, facsimile, pager, etc.
  • Bus (not shown) provides a communication link between each of the components in server 120 and likewise may comprise any known type of transmission link, including electrical, optical, wireless, etc.
  • Storage unit 180 can be any system (e.g., a database) capable of providing storage of information under the present invention. Such information could include, among other things, statistics such as electronic interaction quantities and dates, etc.
  • storage unit 180 could include one or more storage devices, such as a magnetic disk drive or an optical disk drive.
  • the storage drive 180 may be implemented as a tier-storage system, having separate storage drives for predetermined types of memory.
  • storage unit 180 could include data distributed across, for example, a local area network (LAN), a wide area network (WAN) or a storage area network (SAN) (not shown).
  • LAN local area network
  • WAN wide area network
  • SAN storage area network
  • clients 110 A-C will typically include computerized components (e.g., CPU, memory, etc.) similar to server 120. Such components have not been shown for brevity purposes.
  • registration program 210 represents programs which allows a user 105 A-C to interact electronically with online services associated with the present invention, as well as with other users 105 A-C.
  • Security program 220 represents programs which limit and regulate users 105 A-C access to information stored on the storage drive 180 or in memory 200.
  • Revenue program 230 includes programs which pertain to revenue collection and distribution.
  • FIG. 2 is a more detailed diagram of the different segments of the memory 200, security program 220, and revenue programs 230 stored on memory 200.
  • registration program 210 includes a mentor registration program 240, a monitor registration program 250, and a parent/child registration program 260
  • Security program 220 includes a Community Oriented Security System And Access Levels (COSSAL ) program 270, which will be discussed in greater detail later.
  • Revenue program 230 includes an Automated Revenue Distribution For Community Sustenance (ARDICOS) program 280, and an Internet Cash program 290, both will be discussed in more detail later.
  • search program 295 also included in memory 200 is a search program 295, this program used to match users 105 A-C based on specific traits. The search program 295 will be discussed in more detail later.
  • FIG. 3(a) is a flow diagram 300 of a method according to the present invention is shown.
  • a given user 105 A-C registers with system 100 to be a mentor (hereinafter "mentor user"). This may be accomplished via an Internet based graphical user interface, such as a web browser running on client 110 A-C.
  • the registration process involves user 105 A-C inputting personal and/or professional information into registration program 210. Also, user 105 A-C may upload media files and online widgets to system 100.
  • User 105 A-C may input data and media in accordance with a series of career mentor templates (not shown) which are shown to the user 105 A-C in an intuitive question and answer format, prompting user 105 A-C for professional and personal information.
  • the server 120 transmits via the client 1 10 A-C using a web-browser or other known programs in the art of web- based communication.
  • the client 110 A-C displays question and/or scenarios and prompt user 105 A-C for specific answers.
  • mentor user 105 A-C inputs the references of other professionals practicing in the same profession or field of endeavor as the user 105 A- C into client 1 10 A-C, in order to verify the user's 105 A-C professional credentials. Also, in response to prompts by the server 120 and client 110 A-C, the user inputs billing rates and other preferences into system 100.
  • mentor registration program 210 verifies the credentials of the user registering with the system.
  • Server 120 via the external devices 160 may query the database of credit reporting agencies, corporate databases, the better business bureau and other local and national agencies.
  • the mentor user 105 A-C is registered with the system 100, as shown in step 320. Once the mentor user 105 A-C is registered, the mentor user's 105 A-C information is stored in the storage device 180 and the mentor user 105 A-C is allowed to display a profile in the online community. If there are issues verifying the mentor user's credentials then the mentor user's 105 A-C registration is denied, as shown in step 325.
  • the registered mentor user 105 A-C is subjected to tests which are designed to extract responses and reactions from mentor user 105 A-C about business, academic, social and personal scenarios and situations. This process will be discussed in greater detail with regards to FIG. 3(b) and 3(c).
  • the mentor user may set a preference to be a private mentor.
  • the system 100 provides two different online environments for users to collaborate, a private environment or a public environment.
  • the mentor user may decide operate in a private environment, the mentor sets a group identifier and invites specific users. This will be discussed in more detail with regards to Fig. 3(b).
  • step 345 if the mentor sets the preferences to public and the mentor's profile and data is displayed to the entire online community.
  • FIG. 3(b) is a flow diagram 301 of a method according to the present invention is shown.
  • the subscriber registers with system 100.
  • users 105 A-C can select specific users to interact with, e.g., family, friends, colleagues, separate and apart from the general users of the system.
  • a non-mentor user or "subscriber sponsor” invites private mentors to their community.
  • the subscriber sponsor assigns a unique group id for invitations.
  • the inviting non-mentor users (not shown) electronically transmit a private group identifier (not shown) to the subscriber sponsors.
  • This private group identifier may be a character string of numeral and/character values.
  • the identifier can be predetermined or randomly selected by the server 120.
  • invited mentors register as private mentors and include the group identifier.
  • the invited mentors add the private group identifier to their profiles on the server 120 via the client 110 A-C.
  • the invited mentors must set their preferences to private, which can be done automatically or by the user via a link to a webpage sent to them electronically.
  • the profile and data content created by the invited mentor can then be added to the inviting subscriber sponsor's list of mentors stored in storage 180.
  • mentees locate and add invited mentors using the group identifier.
  • mentors can invite non-mentor users and other mentors into a private setting. The invited non-mentor users and invite mentors are required to set their visibility to private and create a group identifier in a manner described above.
  • FIG. 3(c) is a flow diagram 302 of a method according to the present invention is shown.
  • the mentor user 105 A-C takes a test (not shown) designed to determine the mentor's personality attributes.
  • the scenario(s) and/or question(s) are designed to illicit various responses from the test taker.
  • step 380 the responses from mentor user 105 A-C tests are saved in storage device 180 without being judged as correct or incorrect.
  • step 385 it is determined whether the mentor user 105 A-C retakes a test or takes a different test.
  • the plurality of tests are stored on storage device 180 and that each mentor user 105 A-C is offered one of the plurality of tests selected at random from the storage device 180 from the CPU 130. If the mentor user 105 A-C takes another test, then the results of that examination is stored in storage device 180. If the mentor user 105 A-C does not take another test, then the search program 290 finds a match with a mentee, as shown in step 390.
  • the search program 290 processes these responses to find other users or respondent with similar responses and determines that these individuals have similar personality attributes. Specifically, the search program 290 uses the response to the tests by a registered mentor user 105 A-C as a source of reference and then compares those responses with other registered mentor users 105 A-C who have responded similarly, ranking the responses in degree of match. The outcome is that mentor users 105 A-C are matched based on responses to similar situations and simulations. The rankings are stored in storage 180.
  • FIG. 4 is a flow diagram of a process 400 associated with the present invention.
  • a user 105 A-C registers with the system as a monitor, hereinafter "monitor-users".
  • Monitors-users are users 105 A-C who use specific tools within the system to monitor and police the activity and content created by other users in the system.
  • the monitor user 105 A-C is prompted by a series of web-based internet scripts transmitted by the server 120 to the client 110 A-C to input both personal and professional information in the system 100 via a series of templates.
  • the templates are stored in the storage device 180 and transmitted to the clients 110 A-C via server 120.
  • the monitor user's personal and professional information is verified by the local and national authorities.
  • the monitor is assigned tasks as mandatory by the system and other tasks that are optional.
  • the mandatory tasks are: review and approve user profiles, mentor stories; ranking mentor stories; review user activity; approve monitor profiles; check references; forum and chat moderation if requested by system; submitted for approval and queued to the monitor based on matching profession, industry, region or just availability.
  • the optional tasks are defined as: review and rank stories not queued to their dashboard; user referrals; daily activity; subscriptions; taking tests (for mentors and mentees); forum participation; narration; content creation.
  • the revenue program 230 Built into system 100 is the revenue program 230, which may include an evaluation tool that constantly awards monitor compensation points, which will be discussed in more detail further below. These points are accumulated periodically and used to compute monetary awards for monitors.
  • FIG. 5 is a flow diagram of a mentee registration process 500 associated with the present invention.
  • the mentee registration process 500 is implemented by the parent/child registration system 260.
  • a user 105 A-C registers with the system as a mentee, hereinafter "mentee user.”
  • the (Parent/Guardian or as we call here, Subscriber Sponsor registers and then adds a mentee) mentee user inputs his/her personal information into the system 100 via client 110 A-C and determines whether to subscribe to and enroll in particular services.
  • the mentee user selects via predetermined software scripts, stored on the storage device 180, particular types of services such as: mentor story subscription; private messaging option with mentor; private mentor story viewing; chat participation option; communication by phone option; communication by personal interaction option; and mentor forum participation option, if they wish to purchase or participate in.
  • particular types of services such as: mentor story subscription; private messaging option with mentor; private mentor story viewing; chat participation option; communication by phone option; communication by personal interaction option; and mentor forum participation option, if they wish to purchase or participate in.
  • the mentee user takes a series of tests via the client 110 A- C and the parent/child registration system 260 to determine personality attributes. Similar to mentor registration process 300, the mentee user is subjected to at least one test specifically designed to extract responses and reactions from users about common business, academic, social and personal case studies and scenarios.
  • the parent/child registration system stores the responses on storage device 180. The mentee user can take the same test, or different tests, may times, with only the results of the most recent response for each test being stored in the storage device 180.
  • the search program 295 determines a match for the mentee user based on the mentee's test responses.
  • the search program 295 matches mentee users with mentor users in accordance with their test responses, via a matching algorithm implemented by the registration program 210.
  • the degree of match is determined by a matching algorithm which takes into account the number of tests that the mentee has taken, the categories that the tests are grounded under and the number of matched and unmatched responses of the mentee and the potential mentor to match potential users.
  • the matching algorithm employs the responses by a target responder as a source of reference and matches users who have responded to the test(s) in a similar manner.
  • the target respondent is defined by the matching algorithm as a user for whom other matching respondents are being sought, i.e., the mentor.
  • the matching algorithm determines the total responses (TR), responses by category (CRcategory), and weight of each category for target respondent, (CWcategory).
  • the weight is computed based on target respondent participation in each category. For example, the target respondent completes 100 tests, out of which 20 were from a social relationships category, 30 from a personal aptitude category, and 50 from a business acumen category and 0 from a career aptitude category.
  • the system will assign a category weight of .3 for social relationships category, .2 for personal aptitude test and .4 for business acumen test.
  • TR Total responses
  • CRcategory is the category wise breakup of responses by the target respondent
  • CWcategory CRcategory/TR.
  • CWcategory is the metric for determining the preferences of the target respondent with respect to each category.
  • the matching algorithm retrieves test information from memory 200 corresponding to the mentee and computes the following metrics:
  • Matching responses per user per category is the number of matching responses from user 105 A-C in each category of tests taken by the target respondent;
  • Unmatched response per user per category is defined as the number of unmatched responses from user 105 A-C in each category of tests taken by the target respondent;
  • Miss ratio per category per user URUcategory/CRcategory (computed for each matching respondent);
  • Weighted match points per user is defined as the sum of (CWcategory * HITRcategory - MISSRcategory)) for all participating categories.
  • the search program 290 determines a match to the target respondent by ordering the mentees in descending order of weighted match points. The highest weighted match points reflects the closest match. Once the highest match is identified, the mentee can select the mentor (mentee is free to select any mentor, the ordering and ranking by matching responses, is only suggestive) via the client 110 A- C and subscribe to career and life story of mentor as well as begin an on-line dialog via client to client, electronic mail, instant messaging or any other type of electronic communications.
  • system 100 monitors the communication and activity between mentor and mentee and awards points and compensation.
  • Mentor award points are incremented with each subscription.
  • Mentee award points are also incremented with each subscription of their story. Mentee award points also incremented by activity, reviews and referrals.
  • FIG. 6(a) illustrates an exemplary system 600 for providing data security, from security program 220.
  • the present invention includes a security system 600 designed to identify and filter out criminal behavior from the user community.
  • Security system 600 interfaces with federal and state authorities using the external devices 160 and provides an internal evaluation and examination process.
  • FIG. 6(a) is an illustration of the internal data security and access system.
  • the data storage device 180 stores user information and data for all the users on the system. As stated above with regards to FIG. 1, the storage device may be implemented as a tier storage system having different storage devices for various type of data. As shown in FIG.
  • storage device 180 includes separate storage areas for mentor stories and narratives, as well as, test results.
  • Users 105 A-C are categorized by the security program 220 into various security tiers 620, 630, 640, 650 corresponding to the level of security access they have been granted by security system 600. Users 105 A-C are associated with a particular tier and access data in accordance with the rules of the tier. With regards to data ownership, users 105 A-C can create and/or view data via client 110 A-C. Every user 105 A-C that creates data has access to that data, however, whether or not another user's data may be view depends on the tier level assigned to the user.
  • Tier one 620 users are defined as users appointed directly by the site administrators and are known directly to the site administrators, other tier one users, or are otherwise well known.
  • Tier two 630 users are users who have registered giving at least one tier one 620 user as a reference and at least two other references. Tier two 630 users have to be approved from the registration process 200 for tier two users 630 before getting accepted into the online community.
  • Tier three 640 users are uses who have been referred to the system 600 by tier two users 630 and at least two other references. Tier three users 640 have to clear the approval process from the registration process 200 for tier three users 640 before getting accepted into the online community.
  • NonTier users 650 are users that are registered in the system without belonging to any tier.
  • FIG. 6(b) illustrates a tier progression chart 660.
  • the tier progression chart 660 is a tracking mechanism maintained by the security program 220 which charts the performance and activity of all users 105 A-C on the system. As shown, chart 660 is divided by tier. Every user starts at a specific position on their assigned tier and based on various factors, which will be discussed later, their position will shift either to the left or the right. If the position moves more than a predetermined amount the user's tier level is either increased or decreased.
  • the factors that affect a users index position include an efficiency score, peer review scores, verification of credentials score, referable reference score, discredit scores, approval scores and an activity and longevity score.
  • the efficiency score is calculated using an inspection capability study which determines if an inspection method or equipment or person produces, acceptable, marginal or unacceptable results.
  • an inspection capability study is for illustrative purposely only and not meant to limited the invention.
  • Peer review scores reflect the review and evaluation of the performance by other users.
  • the security program 230 captures and accumulates and weights based on the number of people who scored and the number of times they have scored, to give the final score.
  • the verification of credentials score indicates the whether a mentor user's professional and personals achievements, certifications and recognitions have been verified by the system.
  • Referable references score indicates the number of referable references associated with a particular member.
  • Referable references are references of people in positions of authority in government or business, who have certified the character and history of the mentor user.
  • Discredit scores are negative scores assigned to users as a result of some negative behavior, e.g., problems with the law or complaints from other users.
  • Approval scores are given to users as result of recognition from the community or society as a result of positive actions, e.g., general acts of bravery, honesty, personal and community accomplishments.
  • the activity and longevity score is based on the length of activity and the type of activity the user has involved with the online community.
  • Each tier level has specific access privileges, for example, tier one users 620 will have all inclusive access to their data as well as other member's data. Tier one users 620 can invite mentors and monitors, can rank, create and rate other monitors, qualifies for communication and interaction, also can review and update own account information. All members of the online community are assigned a tier level.
  • Tier two users 630 can create profiles, can rank profiles, edit own account information, approved information which is available for viewing, can rate and rank other mentors and profiles.
  • Tier three users 640 can access into the system, can create profiles, own account information, but their information is not available for others to view except monitors even on approval for content. They can view other public information.
  • NonTier users 650 can access system, can create their account information but cannot view any other information available for registered users, they can view only public information.
  • FIG. 7(a) illustrates the revenue distribution system 700 in accordance with the present invention as implemented by revenue program 230.
  • revenue 705 generated during the ordinary course of business of system 100 is distributed to corporate sponsors 715, monitors 725 and subscribers 740.
  • Each user 105 A-C active in the system 100 is entitled to a share of the revenue based on their level and type of activity.
  • mentors receive a share of the subscription fees. If the mentors 725 are sponsored by a corporate entity, then the corporate sponsor 715 receives the share of the subscription fees. Subscribers 735 may receive revenues by through the use of coupons and other discounts.
  • FIG. 7(b) is a system diagram 750 illustrating exemplary user activity in the system 100.
  • every user 150 A-C activity may be categorized into the three different tracks: a security track 770, a revenue track 775 and activities that are not tracked 780.
  • Each user 150 A-C may receive revenue based on specific tasks user 150 A-C performs.
  • the tasks assigned to each to each user 150 A-C from the security program 220 or revenue program 230 depends on skill level, experience and training, the user's tier level and index position on the tier progression chart.
  • the ARDICOS program 280 maintains several metrics in the storage 180 which are used to determine points.
  • a user 150A-C receives revenue in relation to the number of points associated with their profile.
  • the metrics computed by the revenue program are the skill rating (S), the expected duration to complete the task (H), the average hourly rate (R), minimum recommended number of times (M) the activity needs to be repeated, computed activity weighted points (WPtask), computed cumulative weighted points per member (WP(member)), computed cumulative weighted points per profile (WP(profile)).
  • Skill rating is defined as the level of ability needed to accomplish a specific activity, on a scale of 0-10, 0 being no skills and 10 being highly skilled. Skill levels are determined by the revenue program based on the level of education, literacy, experience and formal training required in order to accomplish the task in a reasonable amount of time. Expected duration in hours (H) is defined as the time to complete each task. Average hourly rate (R) is defined as the number of points assigned for the task. This is determined by matching the skill level against a rate table stored in storage 180. There is a specific rate for each skill level, as determined by the community. Minimum recommended number of times (M) is defined as the amount of times that the activity needs to be repeated or performed.
  • Computed Activity Weighted Points (WP(task)) is defined as the expected duration in hours (H) multiplied by the hourly rate (R) (H * R).
  • Computed Cumulative Weighted Points Per member (WP(member)) is defined as the sum of the computed activity weighted points WP(task) for each activity.
  • Computed Cumulative Weighted Points Per profile (WP(profile)) is defined as the sum of the computed activity weighted points WP(task) for each activity per profile.
  • Points are accumulated for the user 150 A-C as revenue while they accrue against the profile as a cost, if they are directly applicable to the review, approval and subscription of a mentor and associated communications.
  • Weighted Points WP(profile) for each profile creation (points value) is defined as (Nminmentorapprovals * WP(TASKmentorreview)) + minstoryreviews * WP(TASKstoryreview)) + (Nrefchksbyphone * WP(TASKmentorrefchkbyphone)) + (Nrefchksinperson * WP(TASKmentorrefchkinperson)).
  • Weighted Points WP(profile) is computed by the revenue 230, specifically the ARIDCOS program 280.
  • Cost of profile creation in dollars is defined as (WP(profile) in points/CashEquivalentPoints) * CostPerCashUnit;
  • CashEquivalentPoints is Number of points per CashUnit. This is a fixed number per period, configured into the system.
  • CashUnit is the currency of the system and is worth real money. It's a whole number and the dollar amount corresponding to 1 CashUnit is determined by the value of CostPerCashUnit.
  • ProfileCashUnit WP(profile) in points/CashEquivalentPoints.
  • a ProfileCashUnit is the CashUnit earned for profile and mentor reviews related activities only.
  • CostPerCashPoint is defined as Dollar Amount Per Cash Unit - which will be the greater amount of the site minimum and the amount computed from site revenues. [0083] Average Production Cost Per Profile will consist of the following costs:
  • HC Hosting Cost
  • PC Videographing, Editing, Camera, Time and Materials
  • Unit Testing Cost is a fixed percentage as a percent of total cost.
  • Unit Maintenance Cost is defined as the editing, file management, database management, backups, replication costs.
  • RC Average Recurring Costs
  • Average Content Creation per Profile is defined as (PC + TC + QC + RC/100*(PC+TC+QC).
  • Total Cost Per Profile (TCpp) is defined as ACCp + CCCprofile.
  • the system maintains and calculates the amount of revenue for each user 105 A-C registered as a mentor. The following is a computation of the amount of revenue earned per mentor.
  • SALREVpppp Sales Revenue/Profile/Period
  • Nsubpp the number of subscriptions for profiles per period
  • STDSUBRATE the standard subscription rate
  • MENSHRREVpp Mentor Revenue Per Period
  • MenPC MenPC is defined as mentorPoolPercent or mentor share of the subscription revenues.
  • TOTSLSREVpp Total Revenues From Subscription Sales Per Period
  • Net Revenue From Sales For Distribution per period (NETREVDISTpp) is defined as (TOTSLSREVpp - Sum of MENSHRREVpp for each mentor with active subscriptions minus the Operating Expenses (not including Monitor Costs ) (OPEXPpp)).
  • monitor activities which generate revenue for a particular user.
  • the following activities contribute toward revenue for monitors:
  • TASKmonrefchkphonepp Monitor Reference Check By Phone Per Period
  • TASKcommonitoringpp Communications Monitoring per period
  • MONCASHPONcumpp is defined as the sum of MONCASHPONpp for all monitors accumulated per period.
  • CostPerCashUnit for period is defined as ( NETMONREVpp / MONCASHUNITSpp).
  • Revenue/Monitor/Period is equal to ((MONCASHPONpp / CashEquivalentPoints)) whole number value * CostPerCashUnit per period), where CostPerCashUnit per period is the greater of the standard fixed cost or the cost calculated based on revenue. This ensures that the monitors always get the higher share of the profits.
  • FIG. 8 is a flow diagram illustrating an exemplary financial transaction process 800 associated with the present invention.
  • a user or subscriber intends to pay make a financial transaction, such as a cash transaction.
  • Internet cash system 290 generates a two part identification key (ID key) for the particular transaction.
  • ID key the Internet cash system 290 provides the first half of the ID key to the user, either electronically or physically at the point of sale.
  • the user completes a purchase, paying a business the cash amount of the purchase plus a nominal commission.
  • the business may be a retail establishment or other known corporate entity. Also, the business acts a user 105 A-C to access the server 120.
  • the business verifies the personal information of the user, e.g., the name and address of the user.
  • the system will match the personal information and processes the payment.
  • the system supplies the second half of the two part ID key to the business.
  • the business gives the second half of the two part ID key to the user.
  • step 865 the user makes purchases using the transaction key.
  • the user enters the entire key into a payment screen on a computer which is connects to the server 120 and apply payment in the system.
  • step 875 the transaction is completed by the business transmitting payment back to the system. After the user makes completes the purchase, the business diverts the payment through the credit card system or some other electronic means, keeping its share of the transaction fees.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un procédé pour permettre une interaction entre des utilisateurs dans une communauté en ligne, le procédé implémenté sur ordinateur comportant les étapes consistant à connecter un premier utilisateur au système ; à déterminer les attributs de personnalité du premier utilisateur via les réponses du premier utilisateur à une série de questions prédéterminées ; à connecter une pluralité d'utilisateurs au système, de sorte que la pluralité d'utilisateurs indiquent des attributs de personnalité particuliers en réponse à une série de questions prédéterminées ; à comparer les attributs de personnalité de la pluralité d'utilisateurs au premier utilisateur et à fournir au premier utilisateur une liste d'utilisateurs dont les attributs de personnalité correspondent au premier utilisateur ; et le premier utilisateur sélectionne au moins un parmi la pluralité d'utilisateurs et le premier utilisateur initie un dialogue en ligne avec celui qui est sélectionné parmi la pluralité d'utilisateurs. Le procédé comprend également des mesures de sécurité en attribuant à chaque utilisateur un niveau de sécurité particulier. Le procédé comprend également un procédé de répartition de revenus parmi les utilisateurs, ainsi qu'un procédé de recouvrement de paiement.
PCT/US2008/000733 2007-01-19 2008-01-22 Outil de conseil expert communautaire WO2008088903A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US88117707P 2007-01-19 2007-01-19
US60/881,177 2007-01-19

Publications (2)

Publication Number Publication Date
WO2008088903A2 true WO2008088903A2 (fr) 2008-07-24
WO2008088903A3 WO2008088903A3 (fr) 2008-10-23

Family

ID=39636605

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/000733 WO2008088903A2 (fr) 2007-01-19 2008-01-22 Outil de conseil expert communautaire

Country Status (1)

Country Link
WO (1) WO2008088903A2 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9251259B2 (en) 2009-12-07 2016-02-02 International Business Machines Corporation Harmonizing webpage information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002005153A2 (fr) * 2000-07-07 2002-01-17 2020Me Holdings Ltd. Systeme, procede et support facilitant des transactions sur un reseau
US20050005168A1 (en) * 2003-03-11 2005-01-06 Richard Dick Verified personal information database
US20050055232A1 (en) * 2003-05-23 2005-03-10 Philip Yates Personal information system and method
US20060155558A1 (en) * 2005-01-11 2006-07-13 Sbc Knowledge Ventures, L.P. System and method of managing mentoring relationships

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002005153A2 (fr) * 2000-07-07 2002-01-17 2020Me Holdings Ltd. Systeme, procede et support facilitant des transactions sur un reseau
US20050005168A1 (en) * 2003-03-11 2005-01-06 Richard Dick Verified personal information database
US20050055232A1 (en) * 2003-05-23 2005-03-10 Philip Yates Personal information system and method
US20060155558A1 (en) * 2005-01-11 2006-07-13 Sbc Knowledge Ventures, L.P. System and method of managing mentoring relationships

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9251259B2 (en) 2009-12-07 2016-02-02 International Business Machines Corporation Harmonizing webpage information

Also Published As

Publication number Publication date
WO2008088903A3 (fr) 2008-10-23

Similar Documents

Publication Publication Date Title
US20180075393A1 (en) System and method for tracking and validating social and environmental performance
Lu et al. Improving data quality using Amazon mechanical Turk through platform setup
US8856019B2 (en) System and method of storing data related to social publishers and associating the data with electronic brand data
US7487104B2 (en) Automated system and method for managing a process for the shopping and selection of human entities
US8560344B2 (en) Behavior monitoring and reinforcement system and method
US6778807B1 (en) Method and apparatus for market research using education courses and related information
US20090299993A1 (en) Candidate Recruiting
US11189187B2 (en) Online personality testing providing individual contextual assessments in a secure integrated environment
US20070027746A1 (en) Method and system for online sales information exchange
US20030093322A1 (en) Automated system and method for managing a process for the shopping and selection of human entities
US20090307129A1 (en) Community-based work value system and method
US20100241573A1 (en) Conducting Customized Market Surveys with Transactional Data
US20140162240A1 (en) Assessment method and apparatus
US20140032428A1 (en) Systems and methods for network-based issue resolution
US9256895B2 (en) Specially programmed computer processors and methods of use thereof
US20110184742A1 (en) Methods and apparatus for incenting behavior
US20150287148A1 (en) Mobile application for volunteer service tracking, promotion, and participation
EP4128096A1 (fr) Stage en un clic
Achen Relationship marketing in United States professional sport: Attitudes, opinions, and viewpoints of sport professionals
Bennie et al. Parties, movements and the 2014 Scottish independence referendum: Explaining the post-referendum party membership surges
Blagg et al. Rethinking consumer information in higher education
US20140095399A1 (en) Competition-based method of ranking job candidates
KR100959817B1 (ko) 온라인 외국어 학습회원의 교육성취도 평가 및 온라인프랜차이즈 운영이 가능한 교육포탈시스템 및 그 관리방법
Mbiti et al. Health workers’ behavior, patient reporting and reputational concerns: lab-in-the-field experimental evidence from Kenya
WO2008088903A2 (fr) Outil de conseil expert communautaire

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08724659

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08724659

Country of ref document: EP

Kind code of ref document: A2