WO2006115919A2 - System and method for developing and using trusted policy based on a social model - Google Patents
System and method for developing and using trusted policy based on a social model Download PDFInfo
- Publication number
- WO2006115919A2 WO2006115919A2 PCT/US2006/014657 US2006014657W WO2006115919A2 WO 2006115919 A2 WO2006115919 A2 WO 2006115919A2 US 2006014657 W US2006014657 W US 2006014657W WO 2006115919 A2 WO2006115919 A2 WO 2006115919A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- trust
- social
- relationship
- policy
- instructions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- the present invention relates to the field of trusted networks. More particularly, it relates to systems and methods for developing and using trust policies based on social distance that may be used to enforce computational requests.
- the present invention details the development, management, and use of a trust policy based on social distance in a social network.
- nodes can communicate and interact through a wide range of applications while providing control over the distribution of information between the nodes and the degree to which distributed information may be attributed to a particular node.
- the present invention relates to a system and method for developing and using trust policies based on social distance.
- the present invention provides a simple, powerful, and elegant manner in which social distance may be used to construct a social distance network map and establish a trust policy based upon the constructed map.
- the trust policy may then be used to provide quick and secure access to desired or trusted nodes while providing a measure of security from entities outside the trusted sphere of nodes.
- the trust policy may be established to provide different levels of access, or different degrees of rights, based upon different social distances.
- the present invention enables creation of a social distance map and employs methods to determine the social distance between associated entities who are part of the social network.
- the trust policy determined by the social distance map may be used for various types of applications including SPAM filtering, resource and file sharing, referral querying, advertisement targeting, announcement targeting, access control, and the like. Additionally, the present invention to describe how a trust policy based on the social distance map can be used for various types of applications.
- FIGURE 1 illustrates a simple social network map that involves only four individuals.
- FIGURE 2 illustrates an example social network map in accordance with the present invention.
- FIGURE 3A illustrates a detailed example of a social distance map in accordance with the present invention.
- FIGURE 3B depicts an example of a social distance map as shown in
- FIGURE 3 A in a table for storage in a computer memory device.
- FIGURE 4 is a flow diagram illustrating the calculation of the social distance between two peers within a social network in accordance with the present invention.
- FIGURE 5 illustrates an exemplary system for creating a social network map and a social distance map in accordance with the present invention.
- FIGURE 6 illustrates the creation of a personal trust network through a register/confirm mechanism.
- FIGURE 7 illustrates a method for creating a social distance map through a register/confirm method.
- FIGURE 8 illustrates a social distance network created as the result of a register/confirm method in accordance with the present invention.
- FIGURE 9 provides an example schematic of a SPAM filtering system that uses a social distance map on a remote server to detect SPAM e-mails in accordance with the present invention.
- FIGURE 10 illustrates a method that can be used by SPAM software to filter e-mails according to the policy setting and the social distance queries sent to the server in accordance with the present invention.
- FIGURE 11 illustrates a regulated resource sharing application based on a social network.
- the present invention extends the functionality of current methods and systems used to employ social networks by creating a trust policy that may be used for a variety of applications including unwanted e-mail filtering, resource and file sharing, referral querying, advertisement targeting, announcement targeting, access control, and the like.
- the system and method of the present invention has many advantages over prior systems, because the social distance network maps and their elemental structures provided by the present invention significantly reduce the locating times and processing costs required while providing improved consistency and reliability in optimizing network access methods.
- the present invention uses real-world relationships mapped into computer models to leverage the inherent trust among various members who are part of a social network to provide a trust policy that may be used in applications in a variety of fields, such as digital rights management (DRM), e-mail, access control lists, file sharing, computer service sharing, and the like.
- the trust policy provides a guide for permitting others access to a user node in an effort to manage and control information exchanges.
- the trust policy is based on social distance, or the degree of intimacy that prevails between individual nodes. Likewise, these social distances are mapped into a social network that describes the relationship and information flow between people, groups, businesses, corporations, and other entities that exist as nodes on the network.
- Nodes on the network are the physical devices that represent associated entities such as persons, companies, friends, peers, or the like that form a relationship.
- many applications require a trust model to regulate how, by whom, and when services may be accessed.
- the present invention uses a computer model of real- world relationships to leverage the trust inherent in those relationships to enhance the control of these systems.
- If one individual is socially connected to another individual through one or more friends, there is an inherent trust relationship between the individuals. For example, if Joe is a direct friend of Bob, Joe can trust Bob. If Bob is also a direct friend of Jane, Joe can have some level of trust in Jane, because she is trusted by Bob. This trust relationship, as identified and quantified, may be used in many applications that require a trust policy.
- This invention uses the terms "social” and “friends” in the broadest sense in that "social” is used in social network and social distance as based on any kind of relationship. Trust is inherent in many types of relationships, and the inherent trust relationships encompass social networks in the present invention. For example, the present invention applies to situations where people have a business relationship, a friendship, or any other type of association (such as vendor/vendee relationships, political affiliations, shared hobbies, occupation, geography, academic endeavors, and on the like). The entities that comprise the relationship are "associated entities.”
- “friends” may be two associated entities with a relationship of any kind.
- a “friend” need not be a single individual but may be a set of individuals grouped based on some attribute.
- a “friend” can be all persons who work in a particular company, belong to a common organization, or reside in a certain geographic location.
- a “friend” may be a set composed of all e-mail senders with a certain attribute, such as all senders with an address from mycompany.com.
- the mycompany.com address is the attribute of interest, but the attribute of interest can be any part of the address.
- a Russian person may designate any person with an e-mail address ending in ".ru” as a "friend.”
- a “friend” can be any type of entity, not necessarily a person, and “friend” and “associated entity” are synonymous, as is a “user.”
- an “associated entity” may be a unique device identified in some way (such as a serial number), a kind of device, a set of computing devices operating within a local area network, or a collection of devices identified in some manner.
- a “friend” or “associated entity” or “user” of a social network may be another social network.
- An “associated entity” or “friend” as used in the present invention may be represented as a node on the social network map.
- the amount of trust is quantified, and the amount of trust is then tied to the social distance map, which can be stored on a memory device in various formats.
- the level of trust between two associated entities is determined and a construct of the levels of trust is embodied by the relationships of the nodes evidenced on the social distance map.
- Trust is a key component in each of the applications described above. There are two major aspects to the trust associated with social maps, namely the amount of trust that exists between any two nodes of a social map and the amount of trust that exists between a node of a social map and the server/repository that stores and maintains the social map.
- Each node of the social map typically represents an associated entity such as a user or a business.
- an associated entity such as a user or a business.
- the system of the present invention establishes, measures, and quantifies trust between two nodes of a social map.
- FIGURE 1 illustrates a simple social network map 100 involving four friends, Alice 110, Bob 112, Jane 114, and Tom 116.
- each circle with a caption represents an associated entity in the social network, represented as a node on the social network map.
- the node labeled "Alice” stands for an individual who is known as Alice in this social group.
- a line segment between two circles represents a direct social relationship between the two associated entities in the social network.
- Alice 110 knows Bob 112 directly, Alice 110 knows Jane 114 through Bob 112, and both Alice 110 and Bob 112 know Tom 116 through Jane 114. This social relationship can be described as: Alice — Bob — Jane — Tom
- a system of the present invention registers a list of all associated entities, including a list of all Alice's friends, a list of all Bob's friends, a list of all Jane's friends, and a list of all Tom's friends, resulting in a personal trust network map resembling a star constellation with many nodes and social relationships.
- the system may store that information in a repository, such as a server, that maintains a dynamic list of the trust relationships.
- the e-mail application used by the recipient queries a repository to see if the sender's e-mail address matches anyone in the recipient's personal trust network and determines if the e-mail passes his SPAM filtering criteria. If it does, the e-mail is permitted to pass into the inbox. However, if the e-mail is received from an e-mail address outside the personal trust network of friends, it is more likely to be SPAM. In that case, and in accordance with the recipient's preferences, the e-mail can be dealt with in another way, for example by moving the e-mail to a junk mail folder and the like.
- FIGURE 1 illustrates a situation where individual persons are mapped
- the present invention applies equally to situations where each associated entity of Alice 110, Bob 112, Jane 114, and Tom 116 are devices, collections of devices, organizations, companies, corporations, sets of users, and the like. In this case, each device, organization, and the like would constitute an associated entity.
- the associated entity could be designated based on some attribute.
- the Russian e-mail address is the attribute that defines an associated entity, hi FIGURE 1, for example, the set of all persons with Russian e-mail addresses could be substituted for the associated entity Jane.
- Bob could decide that his friends are Jane and all of Jane's friends who also have a Russian e-mail address, or alternatively, all of Jane's friends who do not have a Russian e-mail address. In this fashion, Bob can decide who are his associated entities.
- FIGURE 2 depicts a social network map 200 of relationships among Alice
- the direct social relationships include Alice 210 and Bob 212, Joe 218 and Bob 212, Bob 212 and Fred 220, Bob 212 and Jane 214, Fred 220 and Tom 216, Jane 214 and Tom 216, and Tom 216 and Ron 222. These direct relationships have an inherent degree of trust.
- FIGURE 2 also depicts several indirect relationships. For example, Alice 210 and Fred 220 are connected socially through Bob 212, their mutual friend. Similarly, Bob 212 and Tom 216 are connected socially through two mutual friends, Jane 214 and Fred 220. The degree of trust between nodes can be determined and quantified by the associated entities of this social network map.
- the notation H(a,b) represents the number of hops between two nodes, a and b, within a social network map. For example, H(Alice, Bob) is equal to one, and H(Alice, Tom) is equal to three.
- Social distance can be used to set a fuzzy trust policy for a variety of applications. It can be a subjective measure. A fuzzy trust policy recognizes more than simple true and false values. With a fuzzy trust policy, propositions may be represented with degrees of trust based upon the social distance.
- Social distance is a value assigned by one associated entity, A, to a directly-connected associated entity, B, within a social network to reflect the degree of trust that A has in B.
- Social distance is directional and asymmetrical.
- the social distance from A to B and the social distance from B to A are not necessarily identical, or even correlated. The former is assigned by A based on his degree of trust in B.
- the latter is assigned by B based on his degree of trust in A.
- Social distance must be measurable and ranked.
- the simplest form of social distance can be specified with numerical values. For example, a system may define its social distance as a value between 1 and 10, where 1 indicates the strongest degree of trust. If a friend, A, is extremely close to his directly-connected friend, B, in a social network map, A may assign a value of 1 as the social distance from A to B. However, if another individual, C, is merely an acquaintance of A, then A may assign a social distance of 10 from A to C.
- the notation $D(A,B) represents the social distance from A to B.
- SD(A 1 B) is equal to 1 and SD(A, C) is equal to 10. More complicated or involved methods of identifying social distance may also be used.
- associated entity A may change social distance. For example, if company A and company B are business partners, company A may assign a social distance of 1 to any e-mail originating from company B. If the two companies cease to be business partners, company A may want to increase the social distance. Indeed, if the relationship becomes hostile, company A may want to ban contact with company B. In the present invention, the degree of trust can be set to designate no trust, with the result of banning all e-mail coming into company ⁇ from company B.
- a third party may assign a social distance between two individuals.
- A assigns a social distance from A to B of 1, and B assigns a social distance from B to C of 1.
- B assigns a social distance from B to C of 1.
- A is dissatisfied with a social distance of 1 from B to C — for example, if A distrusts C-A can set the social distance from B to C to 10. This change would not override B's assignment of 1 for B's social network.
- the social distance set by A would apply only to A's social network.
- a user's assignment of a social distance may be overridden.
- a company could, for instance, decide that the social distance for all systems and users within the company and all systems and users with another company shall be 1, and that designation would override any social distance values assigned by individual users within the company.
- FIGURE 3 A illustrates a social distance map 300 that corresponds to the social network map 200 depicted in FIGURE 2.
- a social distance map is derived from the social network map by incorporating social distance values. Instead of a line between two nodes to indicate a direct social relationship, a social distance map has two directional arrows between two nodes.
- a social distance value is associated with each directional arrow, hi FIGURE 3 A, the nodes represent associated entities, such as individuals, Alice 310, Bob 312, Jane 314, Tom 316, Joe 318, Fred 320, and Ron 322.
- the directional arrow from Bob 312 to Joe 318 is labeled 5, indicating the social distance that Bob 312 assigned between himself and Joe 318. hi other words, SD(Bob, Joe) is equal to 5.
- the social distance map of FIGURE 3A may be stored in a memory device in various formats, such as a lookup table or a database. An example of one such social distance map lookup table is shown in FIGURE 3B. 3) Determining Trust between Two Nodes in a Social Network
- step 401 User A 1 S and User B's IDs are passed to an agent such as a server.
- step 402 the server is asked to calculate the trust between A and B.
- step 404 the server locates the social network map that contains the Users A and B. The initial trust between two individual nodes on the social network map is zero until a link is found. The calculation and quantization of trust is based on the number of hops, the social distance, or both. The number of hops may be the number of line segments that must be traversed to move from one node (first real world entity) to another node (second real world entity).
- step 406 the server calculates the trust, and the calculated value is communicated back from the server.
- step 408 the degree of trust is returned, and this social distance measure can be used as a trust policy setting in applications such as SPAM control, file sharing, and the like.
- the notation T(a, b) represents the degree of trust that a has in b.
- the degree of trust between the two nodes can be determined based on the number of hops, the social distances, or both the number of hops, H(a,b), and the social distance, SD(a,b), between the two nodes using a variety of mathematical and logical methods, some of which are explained below.
- Bob 312 is directly connected to Fred 320
- Fred 320 is directly connected to Tom 316.
- T(Bob, Tom) can be determined based on the values of R(Bob, Tom), or by SO(Bob, Fred), and SO(Fred, Tom).
- T(Bob,Tom) can be determined based on the values of ⁇ L(Bob, Tom), SD(Bob, Fred), $D(Fred, Tom), SD(Bob, Jane), and SD(Jane, Tom).
- FIGURE 3B an example of one such social distance map lookup table is shown in FIGURE 3B.
- the mathematical method of determining a degree of trust can be instituted globally by using the same method for all nodes in a social network map, or it can be customized based on individual or group preferences, for example.
- a social network or an associated entity may use a wide variety of mathematical methods to determine T( ⁇ , b) when a and b are not directly connected. These mathematical methods include an associated entity determining the degree of trust based solely on the number of hops, H( ⁇ , b), without considering social distances. In the above case, T(a, b) is equal to H( ⁇ , b).
- an associated entity may determine the degree of trust by summing up one set of social distances between two nodes.
- Tom is equal to the sum of SD(Bob, Fred) and SO(Fred, Tom), since Bob 312 is directly connected to Fred 320 and Fred 320 is directly connected to Tom 316.
- An associated entity may also determine the degree of trust based on both the number of hops and social distances.
- a node may be trusted if H( ⁇ , b) is less than a value M AND SD( ⁇ , b) is less than a value N.
- the AND in this formulation represents a logical AND.
- an associated entity may derive a method to manage the situation where multiple intermediate nodes exist, such as the case illustrated in FIGURE 3A where both Fred 320 and Jane 314 are represented as intermediate nodes between Bob 312 and Tom
- T(Bob, Tom) equals to the average of the social distances represented by both alternative routes.
- T(Bob, Tom) equals to the average of the social distances represented by both alternative routes.
- this social distance we first determine the sum of the social distance between Bob 312 and Fred 320 (that is, 4) and the social distance between Fred 320 and Tom 316 (that is, 7). The sum of this first route is
- Tom 316 equals the average of the sum of the two routes. That is, (11+8) ⁇ 2 equals 9.5.
- an associated entity may calculate the degree of trust using
- an associated entity may determine the trust relationships when no trust has been specified. For example, an associated entity may determine the trust relationships when a node does not exist yet on the social map or no path of connection exists between two nodes on the social map.
- a trust model may be established where no e-mail related to the node is trusted regardless of the other determining factors present.
- the handling may be such that all e-mail is deemed trusted regardless of the other determining factors present.
- Embodiments of the present invention may use any mathematical or logical methods to determine degrees of trust based on the number of hops between nodes, the social distances between nodes, both the number of hops and the social distances, or one or both of these parameters in combination with other parameters such as personal preferences or corporate policies.
- a node will be created for an entity who has not agreed to participate in the social network. Typically, this concern is addressed by allowing an associated entity to create only a node that represents him. If an associated entity wishes to map a relationship to an entity that is not part of the system, that relationship is not allowed in the system's trust policy and will not be entered. [0061] For example, suppose User A has a Friend B. Friend B does not want to publish his information, but User A wants to have a complete social network. So User A publishes information about Friend B.
- the database may allow information to be entered, but the information is not made available to anyone, because Friend B's node does not have an authorized owner that has agreed to opt in.
- the social network of the present invention would hold the information but not allow its disclosure until Friend B agrees to opt-in.
- Any social network that is centralized on a given server may not be fully trusted by users. If the owner of the central repository decides to permit "illegal" snooping of the social network map by untrusted outsiders, a user of the social network that has agreed to contribute information may feel that their privacy has been violated.
- a node in the social network may establish policies about the kinds of links that can be made to it. For example, User A may establish a link policy stating that if User B wishes to add User A as a friend on User B's friends list, then User A must approve and declare User B as a friend. In this model, there would be no "one way" friendships. [0065] In addition, a trust policy may state that either User A or User B may remove the friendship link, but that no one else is authorized to eliminate the link. In addition, there would need to be an agreed-upon policy about editing the link parameters that identify information about the relationship. Both User A and User B would need to agree to the policy, as it is considered shared information between them.
- Example link parameters and designations might include "professional,” “real-life friend,” “life-long friend,” “close relative,” “distant relative,” “online buddy,” and the like.
- other associated entities of the social network may want to declare an opinion about the legitimacy of a link or node. Because a social network is a shared system, not all data in the network is going to be legitimate. One way to implement the trust model between nodes is to allow the users of the network to vote on the legitimacy of any link or node.
- a user's decision to accept the authenticity of a node or link may be determined by a policy based on other users' opinions of that link's legitimacy. For example, User A could establish a policy of not trusting any data (that is, not trusting any node or link) that has a legitimacy rating less than 5 on a scale of 1 to 10, based on average votes. A myriad of policies may be established based upon the number of nodes and links and the users' overall degree of trust they have in new nodes.
- a social network repository, social network classes, the effect of multiple social networks, and application-specific trust policies must all be considered when designing a social network.
- Social network data including the social network map, social distance map, hops, social distances, and the degree of trust, may be stored in a repository.
- the data stored in the repository is accessible by the individual, including agents operating on behalf of the individual.
- a repository may be a dedicated Internet service to serve a social network or a single logical service with a physically distributed database.
- a repository may be implemented as a set of distributed personal databases, where a personal database is designated for each node in the social network and the personal databases are sharable with other nodes.
- a repository may be tethered to an existing social network service, such as Friendster ® , LinkedinTM, and Tribe ® . In this case, a new data entry field to query the user for a social distance may be added to the existing social network service's "add friend" screen.
- a trust policy may be established to use all or parts of the hops and social distances from multiple social networks.
- the mathematical method to determine the degree of trust may vary based on network-wide or individual preferences. For example, a trust policy for SPAM filtering may use data from all of the social networks to which an individual belongs.
- a referral querying application for local handymen may use only the data from the residential community network.
- Different trust policies may be used for different applications or for different social network classes. For example, an individual may deploy a more stringent trust policy for a referral querying application and impose higher trust requirements than for an advertisement targeting application.
- the social network repository may store multiple sets of social distances and degrees of trust, one for each application.
- different social distances may be assigned by a user for use in different applications or with different social network classes.
- FIGURE 5 depicts an example of an overall system 500 used to create a social network map that can be further used to assign social distances between two individuals who are part of the social network.
- e-mail accounts are shown as an example, many other applications are possible such as access control lists, file sharing, computer service sharing, and the like. Also, any computational decision may be based upon the trust relationship determined by the present invention.
- the exemplary e-mail system illustrated may be replaced with similar systems configured for the particular application environment.
- the exemplary system 500 illustrated in FIGURE 5 consists of a number of components.
- User A's Computer account 510 represents a computer device used by User A (such as a PC or handheld device) to register with a social network server 580, and to specify his list of friends and the social distance he assigned between himself and each friend.
- User ⁇ l's Computer account 510 is connected to the Social Network Server 580 via Communication Link 550.
- E-mail account 520 represents an e-mail account of
- the Social Network Server 580 is an application server that coordinates the creation of a social network map and also calculates or otherwise determines trust between two individuals upon request.
- the Social Network Server 580 has a web interface to interact with the users and a database interface to access the Data Repository 590 that is used to store the social network map and the social distance map.
- the Data Repository 590 stores the social network map and social distance map resulting from the above method. It is a software/hardware data repository used to store social relationship maps in data structures.
- the Communication Link 550 represents a channel of communication that can be embodied or realized in various forms such as point- to-point connections, intranets, and various private and public communication channels such as the Internet.
- the Social Network Server 580 uses a web interface and registers his list of friends along with their assigned social distances. After registration, the Social Network Server 580 sends e-mails to e-mail accounts of the listed friends, including User 2?'s e-mail account 520, asking them to confirm their relationships with User A and assign a social distance from themselves to User A. When one of User ⁇ 4's friends, such as User B, confirms the relationship, the Social Network Server 580 stores the social distance map in a Data Repository 540. This process of creating a social network map and creating a social distance map is detailed in the sections below.
- a social network map and social distance map may be developed by a wide variety of mathematical methods or rules.
- the social distance may be based on the number of hops between two users in a social network map.
- Social distance also may be assigned using rules based on the number of friends and friends-of-friends in the network. In this case, if two or more direct friends (that is, those friends connected directly to the user's node) have a mutual friend, that mutual friend would be assigned a lower (more trusted) social distance than a person who is the friend of only one direct friend.
- Social distance also may be determined using rules based on some attribute of a friend. For example, company A could be included in the social network of all the users of its computers and all users of company B's computers. In that case, the relationship between an employee of company A and an employee of company B might be assigned a higher (less trusted) social distance than if company A had added a particular individual at company B to its social network.
- FIGURE 6 illustrates an application of this embodiment to an e-mail-based network.
- FIGURE 6 and FIGURE 7 provide two different graphical representations of the following challenge and response registration mechanism.
- FIGURE 7 provides a process flow diagram illustrating the steps necessary to create the social network of FIGURE 6.
- step 610 Bob 612 registers with the Personal Network Server 665.
- Bob 612 provides a list of friends that he trusts (Fred 620 and Jane 614) and assigns a social distance to each of the listed friends.
- the Personal Network Server 665 requests that Fred 620 and Jane
- Fred 620 and Jane 614 each confirm that Bob 612 is indeed their friend, and they each assign a social distance to their relationship.
- the social distance values Bob 612 assigned to his relationships with Fred 620 and Jane 614 may be different from the social distance values that Fred 620 and Jane 614 assign. For instance, Bob 612 may assign a social distance of 2 to his relationship with Jane 614, but Jane 614 may assign a social distance of 6 to her relationship with Bob 612.
- the Personal Network Server 665 uses the inputs from Bob 612, Fred
- FIGURE 3B is a diagrammatic representation of FIGURE 3B.
- FIGURE 7 illustrates a challenge and response registration mechanism in a flow diagram showing registration of friends and social distances by an initiating node in step
- step 710 querying of potential friends to provide confirmation e-mails regarding their relationship with the initiating node (challenge) in step 720, confirming the queried node's relationship with the initiator by replying via e-mail (response) in step 730, and constructing and storing the social distance map in step 740.
- FIGURE 8 shows the social network map 800 created using the process illustrated in FIGURE 6 and FIGURE 7.
- the social network map 800 is drawn with the assigned social distances between the pairs Bob — Fred (4), Fred — Bob (1), and Bob — Jane
- a social network map is created based on rules.
- rules can be defined in various ways, depending on the needs of the individuals within the social network.
- the rules used to assign social distance may interact to refine the social distances that are assigned.
- the rules may be stored on a computer-readable medium as data structures and may be applied by a computer in an automated manner to construct the social network maps.
- a rule may assign social distances based on the security features offered by various devices at each node. Specifically, a device with a low security level gets a high (untrusted) social distance and a secure device gets a low (trusted) social distance. However, a different rule that assigns social distances based on another device attribute could interact with this rule. For instance, if the secure device has another attribute such as the capability to export digital content to which this different rule applies, the secure device maybe assigned a higher social distance, decreasing the amount of trust in that device. [0091] Additionally, a rule may stipulate a low (trusted) social distance between the president of a company and each company employee, which results in communication from the president to the employees receiving high priority.
- individual users or groups of users may be allowed to refine general rules to create more specific rules that assign different social distances between themselves and others within their own social networks.
- Computer-modeled social maps have many different applications. They may be used to create real-world relationships, to generate new customers for a business, to create new relationships between people who live near each other, to allow privileged access to computing services and digital goods, and the like.
- a user joins a service as a consumer and provides relationship information to the server.
- the server then adds this information to a social network map and makes the social network map available to subscribers.
- the subscribers then may use the map to find new relationships based on existing relationships.
- these services may facilitate the creation of the social network map by providing communication tools and information about the user.
- the method of the present invention may be used to extend applications of computer-modeled social maps whose purpose is to establish real-world relationships.
- a social map may include businesses that a given participant patronizes, and a business may list its customers. This enables a number of mechanisms for bringing new customers to a business including consumers finding new businesses to patronize by exploring the businesses that their friends use as well as businesses identifying new customers by attempting to contact friends of customers with whom the business has good relationships as determined by the method of the present invention.
- An application that may employ this methodology is advertisement targeting.
- An individual may distribute advertisement or distribution materials to his closest circle of trusted peers. He may then expand the distribution to a wider circle of trusted peers as required.
- An additional example is an online auction application that evaluates the seller's trustworthiness based on feedback from previous buyers.
- the trustworthiness may be more deterministic and personalized by overlaying a trust policy based on social distance as constructed by the present invention.
- Another scenario that may capitalize on the method of the present invention is product recommendations. It is natural for an individual to place a higher value on a referral from a trustworthy source. For example, if a trustworthy peer recommends a movie, a music album, an electrician, or a stock, it is more likely for another individual to accept such a referral and acquire the referred resources or services than they would if there were no referral or if the referral came from an anonymous source. Therefore, a referral is a well- suited scenario for a trust policy based on social distance as performed by the present invention. An individual may query peers within a certain degree of trust for a referral. In addition, an individual may evaluate a referral based upon the degree of trust in the person making that referral. For example, if an individual receives referrals to multiple service providers for the same service, the one recommended by the peer with the highest degree of trust is most likely to be accepted.
- social maps need to include business or corporate nodes, and users would associate themselves with a new relationship marker, such as "client of.”
- This relationship may have parameters such as age of the relationship, quality of the relationship, and the like.
- Social maps can also serve as a way to meet real-world neighbors. The goal of this application is to find ways to improve relationships between people that live and work near each other.
- users query the social map for information such as who would be a good candidate for carpooling, or if there any people that live near each other that enjoy fishing as a hobby. Additionally, users may query the social map to obtain e-mail addresses of the people that live in their community.
- this application may disseminate information about community concerns such as local hazards, local politics, lost animals, services available in the neighborhood, block parties, opportunities for collective purchases, and the like.
- a social map includes work location, home location, hours of work, hobbies, e-mail addresses, phone number, and the like, the social network map may provide relevant information to interested parties.
- a computer-modeled social network map enables users to regulate access to their networked services and digital works. With a reliable social network map, a user may expand his ability to govern the use of digital works and services that they own by permitting or denying access based on a social network map.
- Example digital works and services are printers, e-mail boxes, telephones, instant messaging, files/file shares, virtual environments such as games, and digital works including MP3 files, MP4 files, Windows Media files, and other computer documents and files.
- a computer-modeled social network map may instantiate social distances to provide different levels of rights based upon the social distance of the node.
- a node with a short social distance may have rights to view, edit, copy, and print a digital work while a node with a higher social distance (lower degree of trust) may have only the right to view the digital work.
- system and method of the present invention may be applied to applications that focus on using social network maps to control access to computing services and digital goods.
- the present invention provides a mechanism to combat SPAM (unwanted e- mail). E-mail sent by a friend, or a friend-of-a-friend, or a friend-of-a-friend-of-a-friend, and so on, is less likely to be SPAM than e-mail received from an unknown source.
- the present invention may be used to filter e-mail so that messages are treated differently depending on whether they are from a source within a specified degree of trust or outside a specified degree of trust. For example, e-mail from a source within a trust circle may be accepted and those from outside the circle may be automatically moved to a junk e-mail folder.
- FIGURE 9 illustrates an example schematic of a SPAM filtering system that uses a social distance map on a remote server to detect SPAM e-mails.
- a social distance map 999 of a network of friends comprising Joe 918, Bob 912, Alice 910, Fred 920, Jane 914, Tom 916, and Ron 922 is stored in a social network repository 990 accessible by the social network server 980.
- Joe's Computer 940 is the computer Joe 918 uses to access his e-mail.
- the computer 940 houses the SPAM Software 942 and a policy configuration setting 944.
- Joe's Computer 940 is connected to the Social Network Server 980 via a Communication Link 950.
- the SPAM Software 942 monitors an e-mail account to which the Social Network Server 980 sends a confirmation query.
- the policy 944 represents a policy setting by the user (Joe in this example) regarding the trust policy for determining whether an e-mail is SPAM.
- Joe 918 has set a strict trust policy dictating that an e-mail is SPAM if it is from any individual or node more than three hops away or has a social distance value greater than ten.
- the Social Network Server 980 is an application server that interfaces with the
- Social Network Repository 990 that stores the social distance map 999.
- the Social Network Server 980 responds to queries from the SPAM Software 942 concerning the social distance and degree of trust between two nodes.
- Social Network Repository 990 stores the social network map, social distance map 999, hops, social distances, and the degree of trust.
- Communication Link 950 is a channel of communication that could be embodied or realized in various forms such as a point to point connection, an intranet, or an external network such as the Internet, and the like.
- the trust policy regarding unsolicited email is based upon the social distance between nodes. The distance may be determined in many ways as previously described above. Alternatively, individuals may set policies on their e-mail clients so that only e-mails from nodes within a certain number of hops are allowed. AU messages from nodes more than n hops away are considered SPAM. Thus, as shown in FIGURE 9, if Joe 918 decides to implement an alternative policy and to accept only e-mails from nodes less than three hops away, he will not accept e-mail from Ron 922.
- FIGURE 10 illustrates a method that can be used by the SPAM software 942 to filter e-mails according to the policy setting 944 and the social distance queries sent to the server 980 in a system such as that of FIGURE 9.
- the process begins in step 1010 where Joe's email account 918 receives an email from Jane 914.
- Joe's SPAM Software 942 sends a query to the Social Network Server 980, querying about the degree of trust between Joe 918 and Jane 914.
- step 1030 the Social Network Server 980 determines the degree of trust based on the social distance map 999 from the Social Network Repository 990.
- step 1040 the Social Network Server 980 sends this information to the SPAM Software 942 on Joe's computer 940.
- step 1050 Joe's SPAM Software 942 determines whether the degree of trust is less than the limit stated in Joe's policy setting 944.
- step 1060 If the degree of trust is greater than the limit stated in Joe's policy setting 944, in step 1060 the e-mail is blocked as SPAM. If the degree of trust is not greater than the limit stated in Joe's policy setting 944, the e-mail is not considered to be SPAM, and in step 1070 it is delivered to Joe's inbox.
- the present invention may be applied to manage and control access to a resource.
- a user may want to allow a certain friend and friends of that friend to remotely access the user's computer and to use his computer files.
- a candidate for office may want to allow any of his party's campaign contributors to access his web site and post comments.
- the candidate may want to allow any friend of any contributor to access the site and view comments but not post comments.
- the friends of the user have different usage rights to the digital resource based upon their relationship to the user.
- the relationship is embodied by the social distance between the user and each friend, where shorter social distances are indicative of higher degrees of trust and are therefore permitted greater usage rights. Conversely, relationships with larger social distances are indicative of lower degrees of trust and are therefore afforded lesser usage rights.
- a social network map may be used to manage access to shared services or products, such as devices. For instance, a user may want to allow his friends or friends of his friends to use his printer.
- FIGURE 11 illustrates the nodes of the network 1100 with client applications running on each machine.
- the node labeled Tom 1116 represents a client application running on Tom's machine that maintains a direct connection with his friend Jane's client application.
- Tom 1116 is connected to his friend Jane 1114, who is connected to her friend Bob 1112, and Jane's friend 1111.
- Bob 1112 maintains a persistent connection with his friends Alice 1110 and Joe 1118.
- a shared folder 1196 resides on Tom's machine that is exposed to this social network 1100.
- Tom 1116 may control sharing of his files using a policy 1186.
- the nodes in a conventional peer-to-peer file sharing network are anonymous and are connected in a random way.
- the network topology in the social network 1100 illustrated in FIGURE 11 is governed using a trust policy based on social distance.
- a trust policy based on social distance may be used in other types of resource-sharing scenarios. For example, an individual may leverage the trust policy to govern the sharing of his privacy information or personal data. Also, in a grid computing environment, which enables multiple computers to collaborate on a computing project, the trust policy may be used to govern the participating computers.
- the present invention may be implemented by a general purpose computer programmed to accomplish the disclosed functions. Accordingly, the modules described herein may be implemented as computer hardware and/or computer software. Various devices may be used to provide the computer or computer system for effecting the invention. [00123] While the present invention has been described in connection with a number of exemplary embodiments and implementations, the present invention is not so limited but rather covers various modifications and equivalent arrangements which fall within the purview of the appended claims.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2006240147A AU2006240147A1 (en) | 2005-04-28 | 2006-04-19 | System and method for developing and using trusted policy based on a social model |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/116,432 US20060248573A1 (en) | 2005-04-28 | 2005-04-28 | System and method for developing and using trusted policy based on a social model |
US11/116,432 | 2005-04-28 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006115919A2 true WO2006115919A2 (en) | 2006-11-02 |
WO2006115919A3 WO2006115919A3 (en) | 2007-11-01 |
Family
ID=37215245
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/014657 WO2006115919A2 (en) | 2005-04-28 | 2006-04-19 | System and method for developing and using trusted policy based on a social model |
Country Status (5)
Country | Link |
---|---|
US (2) | US20060248573A1 (en) |
KR (1) | KR20080011217A (en) |
CN (1) | CN101167093A (en) |
AU (1) | AU2006240147A1 (en) |
WO (1) | WO2006115919A2 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2077522A1 (en) * | 2007-12-24 | 2009-07-08 | France Telecom | Method for valuing relationships between users of a social networking system |
CN102130904A (en) * | 2011-01-20 | 2011-07-20 | 武汉大学 | Blood relationship description system for entity trust in information system |
WO2011046847A3 (en) * | 2009-10-12 | 2011-07-21 | Microsoft Corporation | Pre-fetching content items based on social distance |
AT506453B1 (en) * | 2008-03-03 | 2012-01-15 | Andreas Kreiner | CONTROLLING DEVICES ON THE INTERNET USING CONFLICT CONDITIONS IN A SOCIAL NETWORK |
EP2447874A1 (en) * | 2010-10-27 | 2012-05-02 | Sony Ericsson Mobile Communications AB | Digital rights management (DRM) domain recommendation and selection based on a user's social graphs |
WO2012056092A1 (en) * | 2010-10-29 | 2012-05-03 | Nokia Corporation | Method and apparatus for granting rights for content on a network service |
US8234688B2 (en) | 2009-04-03 | 2012-07-31 | International Business Machines Corporation | Managing privacy settings for a social network |
CN103544237A (en) * | 2013-10-07 | 2014-01-29 | 宁波芝立软件有限公司 | General genetic relationship information base traversal improvement method |
US9444846B2 (en) | 2014-06-19 | 2016-09-13 | Xerox Corporation | Methods and apparatuses for trust computation |
US9704203B2 (en) | 2009-07-31 | 2017-07-11 | International Business Machines Corporation | Providing and managing privacy scores |
WO2017161446A1 (en) * | 2016-03-24 | 2017-09-28 | Www.Trustscience.Com Inc. | Learning an entity's trust model and risk tolerance to calculate a risk score |
US9922134B2 (en) | 2010-04-30 | 2018-03-20 | Www.Trustscience.Com Inc. | Assessing and scoring people, businesses, places, things, and brands |
US10055466B2 (en) | 2016-02-29 | 2018-08-21 | Www.Trustscience.Com Inc. | Extrapolating trends in trust scores |
US10127618B2 (en) | 2009-09-30 | 2018-11-13 | Www.Trustscience.Com Inc. | Determining connectivity within a community |
US10180969B2 (en) | 2017-03-22 | 2019-01-15 | Www.Trustscience.Com Inc. | Entity resolution and identity management in big, noisy, and/or unstructured data |
US10187277B2 (en) | 2009-10-23 | 2019-01-22 | Www.Trustscience.Com Inc. | Scoring using distributed database with encrypted communications for credit-granting and identification verification |
US10380703B2 (en) | 2015-03-20 | 2019-08-13 | Www.Trustscience.Com Inc. | Calculating a trust score |
WO2021113882A3 (en) * | 2021-02-11 | 2021-11-11 | Futurewei Technologies, Inc. | System and method of social authentication and data synchronization in a network |
US11386129B2 (en) | 2016-02-17 | 2022-07-12 | Www.Trustscience.Com Inc. | Searching for entities based on trust score and geography |
Families Citing this family (245)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6832245B1 (en) | 1999-12-01 | 2004-12-14 | At&T Corp. | System and method for analyzing communications of user messages to rank users and contacts based on message content |
US7774711B2 (en) | 2001-09-28 | 2010-08-10 | Aol Inc. | Automatic categorization of entries in a contact list |
US8590013B2 (en) | 2002-02-25 | 2013-11-19 | C. S. Lee Crawford | Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry |
US7636755B2 (en) | 2002-11-21 | 2009-12-22 | Aol Llc | Multiple avatar personalities |
US8037150B2 (en) | 2002-11-21 | 2011-10-11 | Aol Inc. | System and methods for providing multiple personas in a communications environment |
US7949759B2 (en) * | 2003-04-02 | 2011-05-24 | AOL, Inc. | Degrees of separation for handling communications |
US7263614B2 (en) | 2002-12-31 | 2007-08-28 | Aol Llc | Implicit access for communications pathway |
US7945674B2 (en) | 2003-04-02 | 2011-05-17 | Aol Inc. | Degrees of separation for handling communications |
US7913176B1 (en) | 2003-03-03 | 2011-03-22 | Aol Inc. | Applying access controls to communications with avatars |
US7484176B2 (en) | 2003-03-03 | 2009-01-27 | Aol Llc, A Delaware Limited Liability Company | Reactive avatars |
US7908554B1 (en) | 2003-03-03 | 2011-03-15 | Aol Inc. | Modifying avatar behavior based on user action or mood |
US7603417B2 (en) | 2003-03-26 | 2009-10-13 | Aol Llc | Identifying and using identities deemed to be known to a user |
US7882360B2 (en) * | 2003-12-19 | 2011-02-01 | Aol Inc. | Community messaging lists for authorization to deliver electronic messages |
US8635273B2 (en) | 2004-03-05 | 2014-01-21 | Aol Inc. | Announcing new users of an electronic communications system to existing users |
US8595146B1 (en) | 2004-03-15 | 2013-11-26 | Aol Inc. | Social networking permissions |
US7673003B2 (en) * | 2004-04-28 | 2010-03-02 | Microsoft Corporation | Social network email filtering |
US8060566B2 (en) | 2004-12-01 | 2011-11-15 | Aol Inc. | Automatically enabling the forwarding of instant messages |
US7730143B1 (en) | 2004-12-01 | 2010-06-01 | Aol Inc. | Prohibiting mobile forwarding |
US9002949B2 (en) | 2004-12-01 | 2015-04-07 | Google Inc. | Automatically enabling the forwarding of instant messages |
US9652809B1 (en) | 2004-12-21 | 2017-05-16 | Aol Inc. | Using user profile information to determine an avatar and/or avatar characteristics |
US20070143128A1 (en) * | 2005-12-20 | 2007-06-21 | Tokarev Maxim L | Method and system for providing customized recommendations to users |
US7590698B1 (en) | 2005-03-14 | 2009-09-15 | Symantec Corporation | Thwarting phishing attacks by using pre-established policy files |
US7647381B2 (en) | 2005-04-04 | 2010-01-12 | Aol Llc | Federated challenge credit system |
US8346950B1 (en) * | 2005-05-19 | 2013-01-01 | Glam Media, Inc. | Hosted application server |
US7603352B1 (en) | 2005-05-19 | 2009-10-13 | Ning, Inc. | Advertisement selection in an electronic application system |
WO2007002820A2 (en) * | 2005-06-28 | 2007-01-04 | Yahoo! Inc. | Search engine with augmented relevance ranking by community participation |
US7761400B2 (en) | 2005-07-22 | 2010-07-20 | John Reimer | Identifying events |
US10390212B2 (en) | 2016-09-15 | 2019-08-20 | Proximity Grid, Inc. | Tracking system having an option of not being trackable |
US10015630B2 (en) | 2016-09-15 | 2018-07-03 | Proximity Grid, Inc. | Tracking people |
US7756945B1 (en) | 2005-08-02 | 2010-07-13 | Ning, Inc. | Interacting with a shared data model |
GB2430771A (en) * | 2005-09-30 | 2007-04-04 | Motorola Inc | Content access rights management |
US8571999B2 (en) | 2005-11-14 | 2013-10-29 | C. S. Lee Crawford | Method of conducting operations for a social network application including activity list generation |
US7802290B1 (en) * | 2005-12-08 | 2010-09-21 | At&T Intellectual Property Ii, L.P. | Digital social network trust propagation |
US7945653B2 (en) * | 2006-10-11 | 2011-05-17 | Facebook, Inc. | Tagging digital media |
US7827208B2 (en) | 2006-08-11 | 2010-11-02 | Facebook, Inc. | Generating a feed of stories personalized for members of a social network |
US8402094B2 (en) | 2006-08-11 | 2013-03-19 | Facebook, Inc. | Providing a newsfeed based on user affinity for entities and monitored actions in a social network environment |
US8296373B2 (en) * | 2007-02-02 | 2012-10-23 | Facebook, Inc. | Automatically managing objectionable behavior in a web-based social network |
US8549651B2 (en) * | 2007-02-02 | 2013-10-01 | Facebook, Inc. | Determining a trust level in a social network environment |
US8171128B2 (en) * | 2006-08-11 | 2012-05-01 | Facebook, Inc. | Communicating a newsfeed of media content based on a member's interactions in a social network environment |
US20080189292A1 (en) * | 2007-02-02 | 2008-08-07 | Jed Stremel | System and method for automatic population of a contact file with contact content and expression content |
US8204952B2 (en) * | 2007-02-02 | 2012-06-19 | Facebook, Inc. | Digital file distribution in a social network system |
US20090049127A1 (en) * | 2007-08-16 | 2009-02-19 | Yun-Fang Juan | System and method for invitation targeting in a web-based social network |
US7797256B2 (en) * | 2006-08-02 | 2010-09-14 | Facebook, Inc. | Generating segmented community flyers in a social networking system |
US7809805B2 (en) * | 2007-02-28 | 2010-10-05 | Facebook, Inc. | Systems and methods for automatically locating web-based social network members |
US8027943B2 (en) * | 2007-08-16 | 2011-09-27 | Facebook, Inc. | Systems and methods for observing responses to invitations by users in a web-based social network |
US8225376B2 (en) | 2006-07-25 | 2012-07-17 | Facebook, Inc. | Dynamically generating a privacy summary |
US7669123B2 (en) | 2006-08-11 | 2010-02-23 | Facebook, Inc. | Dynamically providing a news feed about a user of a social network |
WO2007070676A2 (en) | 2005-12-14 | 2007-06-21 | Facebook, Inc. | Systems and methods for social mapping |
US20070218900A1 (en) * | 2006-03-17 | 2007-09-20 | Raj Vasant Abhyanker | Map based neighborhood search and community contribution |
JP2009521752A (en) | 2005-12-23 | 2009-06-04 | フェイスブック,インク. | System and method for generating a social timeline |
US8874489B2 (en) * | 2006-03-17 | 2014-10-28 | Fatdoor, Inc. | Short-term residential spaces in a geo-spatial environment |
US9459622B2 (en) | 2007-01-12 | 2016-10-04 | Legalforce, Inc. | Driverless vehicle commerce network and community |
KR100678967B1 (en) * | 2006-01-25 | 2007-02-06 | 삼성전자주식회사 | Apparatus and method for providing relationship according to user on the basis of sharing information |
WO2007089951A1 (en) * | 2006-02-04 | 2007-08-09 | Tn20 Incorporated | Trusted acquaintances network system |
US7779004B1 (en) | 2006-02-22 | 2010-08-17 | Qurio Holdings, Inc. | Methods, systems, and products for characterizing target systems |
US7764701B1 (en) | 2006-02-22 | 2010-07-27 | Qurio Holdings, Inc. | Methods, systems, and products for classifying peer systems |
US9037516B2 (en) | 2006-03-17 | 2015-05-19 | Fatdoor, Inc. | Direct mailing in a geo-spatial environment |
US9098545B2 (en) | 2007-07-10 | 2015-08-04 | Raj Abhyanker | Hot news neighborhood banter in a geo-spatial social network |
US9071367B2 (en) * | 2006-03-17 | 2015-06-30 | Fatdoor, Inc. | Emergency including crime broadcast in a neighborhood social network |
US9070101B2 (en) | 2007-01-12 | 2015-06-30 | Fatdoor, Inc. | Peer-to-peer neighborhood delivery multi-copter and method |
US9373149B2 (en) | 2006-03-17 | 2016-06-21 | Fatdoor, Inc. | Autonomous neighborhood vehicle commerce network and community |
US8738545B2 (en) * | 2006-11-22 | 2014-05-27 | Raj Abhyanker | Map based neighborhood search and community contribution |
US8732091B1 (en) | 2006-03-17 | 2014-05-20 | Raj Abhyanker | Security in a geo-spatial environment |
US9064288B2 (en) | 2006-03-17 | 2015-06-23 | Fatdoor, Inc. | Government structures and neighborhood leads in a geo-spatial environment |
US9002754B2 (en) | 2006-03-17 | 2015-04-07 | Fatdoor, Inc. | Campaign in a geo-spatial environment |
US8965409B2 (en) | 2006-03-17 | 2015-02-24 | Fatdoor, Inc. | User-generated community publication in an online neighborhood social network |
EP2911071A1 (en) | 2006-04-20 | 2015-08-26 | Veveo, Inc. | User interface methods and systems for selecting and presenting content based on user navigation and selection actions associated with the content |
US7865551B2 (en) * | 2006-05-05 | 2011-01-04 | Sony Online Entertainment Llc | Determining influential/popular participants in a communication network |
WO2007135931A1 (en) * | 2006-05-24 | 2007-11-29 | Nihon University | Communication network designing method, program, and recording medium |
US8612483B2 (en) | 2006-05-31 | 2013-12-17 | Red Hat, Inc. | Link swarming in an open overlay for social networks and online services |
US9165282B2 (en) * | 2006-05-31 | 2015-10-20 | Red Hat, Inc. | Shared playlist management for open overlay for social networks and online services |
US7873988B1 (en) * | 2006-09-06 | 2011-01-18 | Qurio Holdings, Inc. | System and method for rights propagation and license management in conjunction with distribution of digital content in a social network |
US7992171B2 (en) | 2006-09-06 | 2011-08-02 | Qurio Holdings, Inc. | System and method for controlled viral distribution of digital content in a social network |
US7801971B1 (en) | 2006-09-26 | 2010-09-21 | Qurio Holdings, Inc. | Systems and methods for discovering, creating, using, and managing social network circuits |
US7925592B1 (en) * | 2006-09-27 | 2011-04-12 | Qurio Holdings, Inc. | System and method of using a proxy server to manage lazy content distribution in a social network |
US8554827B2 (en) | 2006-09-29 | 2013-10-08 | Qurio Holdings, Inc. | Virtual peer for a content sharing system |
US8249903B2 (en) * | 2006-10-10 | 2012-08-21 | Accenture Global Services Limited | Method and system of determining and evaluating a business relationship network for forming business relationships |
US8863245B1 (en) | 2006-10-19 | 2014-10-14 | Fatdoor, Inc. | Nextdoor neighborhood social network method, apparatus, and system |
US20140230030A1 (en) * | 2006-11-22 | 2014-08-14 | Raj Abhyanker | Method and apparatus for geo-spatial and social relationship analysis |
US20080270158A1 (en) * | 2007-04-30 | 2008-10-30 | Fatdoor, Inc. | Method and apparatus for geo-spatial and social relationship analysis |
US7886334B1 (en) | 2006-12-11 | 2011-02-08 | Qurio Holdings, Inc. | System and method for social network trust assessment |
US7730216B1 (en) * | 2006-12-14 | 2010-06-01 | Qurio Holdings, Inc. | System and method of sharing content among multiple social network nodes using an aggregation node |
US7698380B1 (en) | 2006-12-14 | 2010-04-13 | Qurio Holdings, Inc. | System and method of optimizing social networks and user levels based on prior network interactions |
US9195996B1 (en) | 2006-12-27 | 2015-11-24 | Qurio Holdings, Inc. | System and method for classification of communication sessions in a social network |
US8135800B1 (en) * | 2006-12-27 | 2012-03-13 | Qurio Holdings, Inc. | System and method for user classification based on social network aware content analysis |
US8321449B2 (en) * | 2007-01-22 | 2012-11-27 | Jook Inc. | Media rating |
US20080177596A1 (en) * | 2007-01-23 | 2008-07-24 | Hongtao Austin Yu | Personal referral online advertisement system |
WO2008094155A1 (en) * | 2007-02-02 | 2008-08-07 | Facebook, Inc. | System and method for determining a trust level in a social network environment |
WO2008094168A1 (en) * | 2007-02-02 | 2008-08-07 | Facebook, Inc. | System and method for giving gifts and displaying assets in a social network environment |
WO2008103447A2 (en) | 2007-02-21 | 2008-08-28 | Facebook, Inc. | Implementation of a structured query language interface in a distributed database |
WO2008112293A1 (en) | 2007-03-13 | 2008-09-18 | Facebook, Inc. | Systems and methods for network authentication |
US7827265B2 (en) * | 2007-03-23 | 2010-11-02 | Facebook, Inc. | System and method for confirming an association in a web-based social network |
US8321462B2 (en) * | 2007-03-30 | 2012-11-27 | Google Inc. | Custodian based content identification |
US7730017B2 (en) * | 2007-03-30 | 2010-06-01 | Google Inc. | Open profile content identification |
US20080243607A1 (en) * | 2007-03-30 | 2008-10-02 | Google Inc. | Related entity content identification |
US8150928B2 (en) * | 2007-04-02 | 2012-04-03 | Chin Fang | Spam resistant e-mail system |
US20080255976A1 (en) * | 2007-04-10 | 2008-10-16 | Utbk, Inc. | Systems and Methods to Present Members of a Social Network for Real Time Communications |
US8356035B1 (en) | 2007-04-10 | 2013-01-15 | Google Inc. | Association of terms with images using image similarity |
US8141133B2 (en) * | 2007-04-11 | 2012-03-20 | International Business Machines Corporation | Filtering communications between users of a shared network |
US8116323B1 (en) | 2007-04-12 | 2012-02-14 | Qurio Holdings, Inc. | Methods for providing peer negotiation in a distributed virtual environment and related systems and computer program products |
US8196206B1 (en) | 2007-04-30 | 2012-06-05 | Mcafee, Inc. | Network browser system, method, and computer program product for scanning data for unwanted content and associated unwanted sites |
US8601067B2 (en) | 2007-04-30 | 2013-12-03 | Mcafee, Inc. | Electronic message manager system, method, and computer scanning an electronic message for unwanted content and associated unwanted sites |
US7904461B2 (en) | 2007-05-01 | 2011-03-08 | Google Inc. | Advertiser and user association |
US8055664B2 (en) * | 2007-05-01 | 2011-11-08 | Google Inc. | Inferring user interests |
CA2687089C (en) | 2007-05-24 | 2015-07-07 | Facebook, Inc. | Systems and methods for providing privacy settings for applications associated with a user profile |
BRPI0811720A2 (en) | 2007-05-24 | 2014-11-04 | Facebook Inc | METHOD AND SYSTEM FOR PROVIDING CUSTOM PLATFORM TO ACCESS THE INTERNET APPLICATION THROUGH SOCIAL NETWORK AND COMPUTER PROGRAM. |
WO2008147572A1 (en) * | 2007-05-31 | 2008-12-04 | Facebook, Inc. | Systems and methods for auction based polling |
US8918864B2 (en) | 2007-06-05 | 2014-12-23 | Mcafee, Inc. | System, method, and computer program product for making a scan decision during communication of data over a network |
CA2687520C (en) * | 2007-06-12 | 2015-07-28 | Facebook, Inc. | Personalized social networking application content |
US8433656B1 (en) | 2007-06-13 | 2013-04-30 | Qurio Holdings, Inc. | Group licenses for virtual objects in a distributed virtual world |
CN101809580B (en) * | 2007-07-23 | 2014-01-08 | 英特托拉斯技术公司 | Dynamic media zones systems and methods |
US20090037529A1 (en) * | 2007-07-31 | 2009-02-05 | Samsung Electronics Co., Ltd. | Data sharing in a group of peers with limited resources |
US8732846B2 (en) | 2007-08-15 | 2014-05-20 | Facebook, Inc. | Platform for providing a social context to software applications |
US9183596B2 (en) * | 2007-10-12 | 2015-11-10 | International Business Machines Corporation | System and method for managing access rights to a project team area for a community development asset |
US8214883B2 (en) | 2007-10-22 | 2012-07-03 | Microsoft Corporation | Using social networks while respecting access control lists |
US8397168B2 (en) | 2008-04-05 | 2013-03-12 | Social Communications Company | Interfacing with a spatial virtual communication environment |
US7991841B2 (en) * | 2007-10-24 | 2011-08-02 | Microsoft Corporation | Trust-based recommendation systems |
US7853622B1 (en) | 2007-11-01 | 2010-12-14 | Google Inc. | Video-related recommendations using link structure |
US8041082B1 (en) | 2007-11-02 | 2011-10-18 | Google Inc. | Inferring the gender of a face in an image |
US20120203831A1 (en) | 2011-02-03 | 2012-08-09 | Kent Schoen | Sponsored Stories Unit Creation from Organic Activity Stream |
US9990652B2 (en) | 2010-12-15 | 2018-06-05 | Facebook, Inc. | Targeting social advertising to friends of users who have interacted with an object associated with the advertising |
US8799068B2 (en) * | 2007-11-05 | 2014-08-05 | Facebook, Inc. | Social advertisements and other informational messages on a social networking website, and advertising model for same |
US9123079B2 (en) | 2007-11-05 | 2015-09-01 | Facebook, Inc. | Sponsored stories unit creation from organic activity stream |
US10043201B2 (en) * | 2008-01-31 | 2018-08-07 | Bill.Com, Inc. | Enhanced invitation process for electronic billing and payment system |
US20110196786A1 (en) * | 2008-01-31 | 2011-08-11 | Rene Lacerte | Determining trustworthiness and familiarity of users of an electronic billing and payment system |
US9141991B2 (en) | 2008-01-31 | 2015-09-22 | Bill.Com, Inc. | Enhanced electronic data and metadata interchange system and process for electronic billing and payment system |
US10769686B2 (en) | 2008-01-31 | 2020-09-08 | Bill.Com Llc | Enhanced invitation process for electronic billing and payment system |
US20110184843A1 (en) * | 2008-01-31 | 2011-07-28 | Bill.Com, Inc. | Enhanced electronic anonymous payment system |
WO2009102501A2 (en) | 2008-02-15 | 2009-08-20 | Your Net Works, Inc. | System, method, and computer program product for providing an association between a first participant and a second participant in a social network |
US8229413B2 (en) * | 2008-02-18 | 2012-07-24 | Research In Motion Limited | Message filter program for a communication device |
US20090234573A1 (en) * | 2008-03-17 | 2009-09-17 | Emory University Office Of Technology Transfer | Travel Partner Matching Using Selectable Map Interface |
US8676854B2 (en) * | 2008-03-18 | 2014-03-18 | International Business Machines Corporation | Computer method and apparatus for using social information to guide display of search results and other information |
US8887066B1 (en) | 2008-04-02 | 2014-11-11 | Facebook, Inc. | Communicating plans for users of a social networking system |
WO2009146130A2 (en) | 2008-04-05 | 2009-12-03 | Social Communications Company | Shared virtual area communication environment based apparatus and methods |
US20090265319A1 (en) * | 2008-04-17 | 2009-10-22 | Thomas Dudley Lehrman | Dynamic Personal Privacy System for Internet-Connected Social Networks |
US20090265326A1 (en) * | 2008-04-17 | 2009-10-22 | Thomas Dudley Lehrman | Dynamic personal privacy system for internet-connected social networks |
US20090287707A1 (en) * | 2008-05-15 | 2009-11-19 | International Business Machines Corporation | Method to Manage Inventory Using Degree of Separation Metrics |
US8271516B2 (en) * | 2008-06-12 | 2012-09-18 | Microsoft Corporation | Social networks service |
WO2009151134A1 (en) * | 2008-06-13 | 2009-12-17 | Kddi株式会社 | Method for calculating resource points of resource information and distributing points |
US7961986B1 (en) | 2008-06-30 | 2011-06-14 | Google Inc. | Ranking of images and image labels |
US8677254B2 (en) * | 2008-07-24 | 2014-03-18 | International Business Machines Corporation | Discerning and displaying relationships between avatars |
US8010602B2 (en) * | 2008-08-28 | 2011-08-30 | Microsoft Corporation | Leveraging communications to identify social network friends |
US9224172B2 (en) * | 2008-12-02 | 2015-12-29 | Yahoo! Inc. | Customizable content for distribution in social networks |
WO2010065909A2 (en) * | 2008-12-05 | 2010-06-10 | Social Communications Company | Managing interactions in a network communications environment |
US9100435B2 (en) | 2009-04-02 | 2015-08-04 | International Business Machines Corporation | Preferred name presentation in online environments |
US20100280965A1 (en) * | 2009-04-30 | 2010-11-04 | Nokia Corporation | Method and apparatus for intuitive management of privacy settings |
US20100332669A1 (en) * | 2009-06-30 | 2010-12-30 | Nokia Corporation | Method and apparatus for creating trusted communication using co-experience data |
US8661050B2 (en) * | 2009-07-10 | 2014-02-25 | Microsoft Corporation | Hybrid recommendation system |
US8752186B2 (en) * | 2009-07-23 | 2014-06-10 | Facebook, Inc. | Dynamic enforcement of privacy settings by a social networking system on information shared with an external system |
US20110066507A1 (en) * | 2009-09-14 | 2011-03-17 | Envio Networks Inc. | Context Enhanced Marketing of Content and Targeted Advertising to Mobile Device Users |
US8311950B1 (en) | 2009-10-01 | 2012-11-13 | Google Inc. | Detecting content on a social network using browsing patterns |
US8306922B1 (en) | 2009-10-01 | 2012-11-06 | Google Inc. | Detecting content on a social network using links |
US8606792B1 (en) | 2010-02-08 | 2013-12-10 | Google Inc. | Scoring authors of posts |
US8434128B2 (en) * | 2010-02-22 | 2013-04-30 | Avaya Inc. | Flexible security requirements in an enterprise network |
US20110209207A1 (en) * | 2010-02-25 | 2011-08-25 | Oto Technologies, Llc | System and method for generating a threat assessment |
US8275771B1 (en) | 2010-02-26 | 2012-09-25 | Google Inc. | Non-text content item search |
US9152969B2 (en) | 2010-04-07 | 2015-10-06 | Rovi Technologies Corporation | Recommendation ranking system with distrust |
US8392508B2 (en) | 2010-06-11 | 2013-03-05 | International Business Machines Corporation | Selectively controlling information flow in a collaborative environment |
CN103221967A (en) | 2010-09-11 | 2013-07-24 | 社会传播公司 | Relationship based presence indicating in virtual area contexts |
US8607146B2 (en) * | 2010-09-30 | 2013-12-10 | Google Inc. | Composition of customized presentations associated with a social media application |
US9185469B2 (en) | 2010-09-30 | 2015-11-10 | Kodak Alaris Inc. | Summarizing image collection using a social network |
US20130204398A1 (en) * | 2010-10-04 | 2013-08-08 | Nec Corporation | Access control device, access control system, access control method, and computer readable medium |
US8412771B2 (en) * | 2010-10-21 | 2013-04-02 | Yahoo! Inc. | Matching items of user-generated content to entities |
US20120158935A1 (en) * | 2010-12-21 | 2012-06-21 | Sony Corporation | Method and systems for managing social networks |
US9727886B2 (en) | 2010-12-23 | 2017-08-08 | Facebook, Inc. | Predicting real-world connections based on interactions in social networking system |
US9626725B2 (en) | 2010-12-23 | 2017-04-18 | Facebook, Inc. | Using social graph for account recovery |
US9288744B2 (en) | 2011-05-27 | 2016-03-15 | Nokia Technologies Oy | Method and apparatus for sharing connectivity settings via social networks |
US9928375B2 (en) * | 2011-06-13 | 2018-03-27 | International Business Machines Corporation | Mitigation of data leakage in a multi-site computing infrastructure |
JP5623345B2 (en) * | 2011-06-17 | 2014-11-12 | 日本電信電話株式会社 | Conversation data analysis apparatus, method, and program |
US8943131B2 (en) * | 2011-06-29 | 2015-01-27 | International Business Machines Corporation | Predictive collaboration management |
US9092491B2 (en) * | 2011-07-11 | 2015-07-28 | International Business Machines Corporation | Searching documentation across interconnected nodes in a distributed network |
US9195679B1 (en) * | 2011-08-11 | 2015-11-24 | Ikorongo Technology, LLC | Method and system for the contextual display of image tags in a social network |
US8965974B2 (en) * | 2011-08-19 | 2015-02-24 | Board Of Regents, The University Of Texas System | Systems and methods for determining user attribute values by mining user network data and information |
US9047606B2 (en) * | 2011-09-29 | 2015-06-02 | Hewlett-Packard Development Company, L.P. | Social and contextual recommendations |
US9836721B2 (en) | 2011-11-21 | 2017-12-05 | Facebook, Inc. | Defining future plans in connection with objects in a social networking system |
US8745738B2 (en) | 2012-01-15 | 2014-06-03 | Microsoft Corporation | Vouching for user account using social networking relationship |
US8819789B2 (en) * | 2012-03-07 | 2014-08-26 | Bill.Com, Inc. | Method and system for using social networks to verify entity affiliations and identities |
US20130254699A1 (en) * | 2012-03-21 | 2013-09-26 | Intertrust Technologies Corporation | Systems and methods for managing documents and other electronic content |
US20150074716A1 (en) * | 2012-04-30 | 2015-03-12 | Thomson Licensing | Method And Apparatus For Advertising In A Social, Distributed Content Viewing System |
US9419933B2 (en) * | 2012-05-18 | 2016-08-16 | University Of Florida Research Foundation, Incorporated | Maximizing circle of trust in online social networks |
US20140096200A1 (en) * | 2012-05-31 | 2014-04-03 | ThymeVine LLC | Shared Level Networking |
US20130346516A1 (en) * | 2012-06-26 | 2013-12-26 | International Business Machines Corporation | Prioritizing electronic messages based on community values |
US10193887B2 (en) * | 2012-07-10 | 2019-01-29 | Oath Inc. | Network appliance |
US9378528B2 (en) * | 2012-10-15 | 2016-06-28 | Nokia Technologies Oy | Method and apparatus for improved cognitive connectivity based on group datasets |
US9565194B2 (en) * | 2012-10-19 | 2017-02-07 | Mcafee, Inc. | Utilizing a social graph for network access and admission control |
US9870554B1 (en) | 2012-10-23 | 2018-01-16 | Google Inc. | Managing documents based on a user's calendar |
US20140189010A1 (en) * | 2012-11-27 | 2014-07-03 | ThymeVine LLC | Scrapbooking |
US9166961B1 (en) * | 2012-12-11 | 2015-10-20 | Amazon Technologies, Inc. | Social networking behavior-based identity system |
US20150012442A1 (en) | 2013-03-14 | 2015-01-08 | Bill.Com, Inc. | Enhanced system and method for scanning and processing of payment documentation |
US10417674B2 (en) | 2013-03-14 | 2019-09-17 | Bill.Com, Llc | System and method for sharing transaction information by object tracking of inter-entity transactions and news streams |
US10115137B2 (en) | 2013-03-14 | 2018-10-30 | Bill.Com, Inc. | System and method for enhanced access and control for connecting entities and effecting payments in a commercially oriented entity network |
US9332032B2 (en) | 2013-03-15 | 2016-05-03 | International Business Machines Corporation | Implementing security in a social application |
US20140304646A1 (en) * | 2013-04-04 | 2014-10-09 | Klip, Inc. | Sliding side menu gui with menu items displaying indicia of updated content |
KR101393159B1 (en) * | 2013-04-10 | 2014-05-30 | 숭실대학교산학협력단 | Method and apparatus for controlling access based on key in social network service |
US10467235B2 (en) | 2013-04-11 | 2019-11-05 | The Boeing Company | Identifying contextual results within associative memories |
US10572921B2 (en) | 2013-07-03 | 2020-02-25 | Bill.Com, Llc | System and method for enhanced access and control for connecting entities and effecting payments in a commercially oriented entity network |
GR20130100414A (en) * | 2013-07-12 | 2015-02-20 | Ανδρεας-Λεωνιδας Κυπριανου Προδρομιδης | Method and system for the transport of items through trusted networks |
US9602460B2 (en) | 2013-07-23 | 2017-03-21 | International Business Machines Corporation | Social mail response enhancement |
US9842113B1 (en) | 2013-08-27 | 2017-12-12 | Google Inc. | Context-based file selection |
US9094389B2 (en) * | 2013-09-04 | 2015-07-28 | Facebook, Inc. | Systems and methods for authenticating nodes |
US9762562B2 (en) * | 2013-09-13 | 2017-09-12 | Facebook, Inc. | Techniques for multi-standard peer-to-peer connection |
US9973462B1 (en) | 2013-10-21 | 2018-05-15 | Google Llc | Methods for generating message notifications |
US9390288B2 (en) | 2013-11-01 | 2016-07-12 | Intuit Inc. | Method and system for validating a virtual asset |
US9418236B2 (en) * | 2013-11-13 | 2016-08-16 | Intuit Inc. | Method and system for dynamically and automatically managing resource access permissions |
CN103746978A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | Content viewing method and server |
US20150304343A1 (en) | 2014-04-18 | 2015-10-22 | Intuit Inc. | Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment |
US9439367B2 (en) | 2014-02-07 | 2016-09-13 | Arthi Abhyanker | Network enabled gardening with a remotely controllable positioning extension |
US10121007B2 (en) | 2014-02-21 | 2018-11-06 | Intuit Inc. | Method and system for providing a robust and efficient virtual asset vulnerability management and verification service |
US10757133B2 (en) | 2014-02-21 | 2020-08-25 | Intuit Inc. | Method and system for creating and deploying virtual assets |
US9298927B2 (en) | 2014-02-27 | 2016-03-29 | Intuit Inc. | Method and system for providing an efficient vulnerability management and verification service |
US11294700B2 (en) | 2014-04-18 | 2022-04-05 | Intuit Inc. | Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets |
US9516044B2 (en) | 2014-07-31 | 2016-12-06 | Intuit Inc. | Method and system for correlating self-reporting virtual asset data with external events to generate an external event identification database |
US9457901B2 (en) | 2014-04-22 | 2016-10-04 | Fatdoor, Inc. | Quadcopter with a printable payload extension system and method |
US9004396B1 (en) | 2014-04-24 | 2015-04-14 | Fatdoor, Inc. | Skyteboard quadcopter and method |
US9022324B1 (en) | 2014-05-05 | 2015-05-05 | Fatdoor, Inc. | Coordination of aerial vehicles through a central server |
US9330263B2 (en) | 2014-05-27 | 2016-05-03 | Intuit Inc. | Method and apparatus for automating the building of threat models for the public cloud |
CN104050589B (en) * | 2014-06-03 | 2017-07-14 | 江苏省东方世纪网络信息有限公司 | The method and system that a kind of social public platform ad click conversion ratio is assessed |
CN105278802A (en) * | 2014-06-13 | 2016-01-27 | 好爸爸高科技集团有限公司 | Method and system for recalling and worship dead |
US9971985B2 (en) | 2014-06-20 | 2018-05-15 | Raj Abhyanker | Train based community |
US9441981B2 (en) | 2014-06-20 | 2016-09-13 | Fatdoor, Inc. | Variable bus stops across a bus route in a regional transportation network |
US9860281B2 (en) * | 2014-06-28 | 2018-01-02 | Mcafee, Llc | Social-graph aware policy suggestion engine |
US9451020B2 (en) | 2014-07-18 | 2016-09-20 | Legalforce, Inc. | Distributed communication of independent autonomous vehicles to provide redundancy and performance |
US9846687B2 (en) * | 2014-07-28 | 2017-12-19 | Adp, Llc | Word cloud candidate management system |
US10102082B2 (en) | 2014-07-31 | 2018-10-16 | Intuit Inc. | Method and system for providing automated self-healing virtual assets |
US9558244B2 (en) * | 2014-10-22 | 2017-01-31 | Conversable, Inc. | Systems and methods for social recommendations |
US9785781B2 (en) | 2014-12-08 | 2017-10-10 | Dotalign, Inc. | Method, apparatus, and computer-readable medium for data exchange |
US10506065B2 (en) | 2014-12-27 | 2019-12-10 | Intel Corporation | Technologies for managing social relationships of a computing device social group |
CN104519141B (en) * | 2015-01-12 | 2018-07-20 | 张树人 | Quantitative model and method based on relationship evaluation transmission in social relation network |
US9872061B2 (en) | 2015-06-20 | 2018-01-16 | Ikorongo Technology, LLC | System and device for interacting with a remote presentation |
US10505756B2 (en) | 2017-02-10 | 2019-12-10 | Johnson Controls Technology Company | Building management system with space graphs |
JP2017204054A (en) * | 2016-05-10 | 2017-11-16 | コニカミノルタ株式会社 | Compatibility calculation device, compatibility calculation method, and computer program |
US10887306B2 (en) * | 2017-05-11 | 2021-01-05 | International Business Machines Corporation | Authenticating an unknown device based on relationships with other devices in a group of devices |
US10623389B2 (en) | 2017-05-11 | 2020-04-14 | International Business Machines Corporation | Authenticating a device based on communication patterns in a group of devices |
US20180330325A1 (en) | 2017-05-12 | 2018-11-15 | Zippy Inc. | Method for indicating delivery location and software for same |
US10846387B2 (en) | 2017-07-12 | 2020-11-24 | At&T Intellectual Property I, L.P. | Managing access based on activities of entities |
WO2019018304A1 (en) | 2017-07-17 | 2019-01-24 | Johnson Controls Technology Company | Systems and methods for agent based building simulation for optimal control |
US10387487B1 (en) | 2018-01-25 | 2019-08-20 | Ikorongo Technology, LLC | Determining images of interest based on a geographical location |
WO2019194794A1 (en) | 2018-04-03 | 2019-10-10 | Vydia, Inc. | Social media content management |
US10715471B2 (en) * | 2018-08-22 | 2020-07-14 | Synchronoss Technologies, Inc. | System and method for proof-of-work based on hash mining for reducing spam attacks |
US11269967B1 (en) * | 2019-03-14 | 2022-03-08 | Snap Inc. | Automated surfacing of historical social media items |
JP7279441B2 (en) * | 2019-03-20 | 2023-05-23 | 富士フイルムビジネスイノベーション株式会社 | E-mail display device and program |
US11894944B2 (en) | 2019-12-31 | 2024-02-06 | Johnson Controls Tyco IP Holdings LLP | Building data platform with an enrichment loop |
US20210200807A1 (en) * | 2019-12-31 | 2021-07-01 | Johnson Controls Technology Company | Building data platform with a graph change feed |
WO2022115846A1 (en) * | 2020-11-25 | 2022-06-02 | Beijing Didi Infinity Technology And Development Co., Ltd. | Ride-sharing connection system |
US20230083952A1 (en) * | 2021-09-14 | 2023-03-16 | Juniper Networks, Inc. | Inferring trust in computer networks |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040122803A1 (en) * | 2002-12-19 | 2004-06-24 | Dom Byron E. | Detect and qualify relationships between people and find the best path through the resulting social network |
US20050177385A1 (en) * | 2004-01-29 | 2005-08-11 | Yahoo! Inc. | Method and system for customizing views of information associated with a social network user |
US7069308B2 (en) * | 2003-06-16 | 2006-06-27 | Friendster, Inc. | System, method and apparatus for connecting users in an online computer system based on their relationships within social networks |
US7080019B1 (en) * | 2001-03-04 | 2006-07-18 | Ducktrip, Llc | Ride share contact system |
Family Cites Families (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CH624877A5 (en) * | 1977-05-13 | 1981-08-31 | Idc Chemie Ag | |
US4159468A (en) * | 1977-11-17 | 1979-06-26 | Burroughs Corporation | Communications line authentication device |
US4361851A (en) * | 1980-01-04 | 1982-11-30 | Asip William F | System for remote monitoring and data transmission over non-dedicated telephone lines |
US4429385A (en) * | 1981-12-31 | 1984-01-31 | American Newspaper Publishers Association | Method and apparatus for digital serial scanning with hierarchical and relational access |
EP0148235B1 (en) * | 1983-06-30 | 1988-10-05 | Independent Broadcasting Authority | Encrypted broadcast television system |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4621321A (en) * | 1984-02-16 | 1986-11-04 | Honeywell Inc. | Secure data processing system architecture |
LU86203A1 (en) * | 1985-12-11 | 1987-07-24 | Cen Centre Energie Nucleaire | METHOD AND APPARATUS FOR VERIFYING THE AUTHENTICITY OF DOCUMENTS LINKED TO A PERSON AND THE IDENTITY OF THEIR CARRIERS |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US4937863A (en) * | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
US5247575A (en) * | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US4953209A (en) * | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
US5129083A (en) * | 1989-06-29 | 1992-07-07 | Digital Equipment Corporation | Conditional object creating system having different object pointers for accessing a set of data structure objects |
US5138712A (en) * | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
GB9004901D0 (en) * | 1990-03-05 | 1990-05-02 | Space Communications Sat Tel L | Television scrambler |
JPH05134957A (en) * | 1990-10-10 | 1993-06-01 | Fuji Xerox Co Ltd | Data management system |
AU2247092A (en) * | 1991-05-08 | 1992-12-21 | Digital Equipment Corporation | License management system |
US5260999A (en) * | 1991-06-28 | 1993-11-09 | Digital Equipment Corporation | Filters in license management system |
US5204897A (en) * | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5276444A (en) * | 1991-09-23 | 1994-01-04 | At&T Bell Laboratories | Centralized security control system |
US5453601A (en) * | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
EP0622003B1 (en) * | 1992-01-08 | 2001-10-17 | Broadband Innovations, Inc. | Multichannel television signal scrambling and descrambling system and method |
US5293422A (en) * | 1992-09-23 | 1994-03-08 | Dynatek, Inc. | Usage control system for computer software |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5386369A (en) * | 1993-07-12 | 1995-01-31 | Globetrotter Software Inc. | License metering system for software applications |
US6135646A (en) * | 1993-10-22 | 2000-10-24 | Corporation For National Research Initiatives | System for uniquely and persistently identifying, managing, and tracking digital objects |
US5504816A (en) * | 1994-02-02 | 1996-04-02 | Gi Corporation | Method and apparatus for controlling access to digital signals |
US5787172A (en) * | 1994-02-24 | 1998-07-28 | The Merdan Group, Inc. | Apparatus and method for establishing a cryptographic link between elements of a system |
US5799087A (en) * | 1994-04-28 | 1998-08-25 | Citibank, N.A. | Electronic-monetary system |
US5636346A (en) * | 1994-05-09 | 1997-06-03 | The Electronic Address, Inc. | Method and system for selectively targeting advertisements and programming |
US5694546A (en) * | 1994-05-31 | 1997-12-02 | Reisman; Richard R. | System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list |
US5557678A (en) * | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5838792A (en) * | 1994-07-18 | 1998-11-17 | Bell Atlantic Network Services, Inc. | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US6189037B1 (en) * | 1994-09-30 | 2001-02-13 | Intel Corporation | Broadband data interface |
US5727065A (en) * | 1994-11-14 | 1998-03-10 | Hughes Electronics | Deferred billing, broadcast, electronic document distribution system and method |
US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
JPH08263438A (en) * | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US5715403A (en) * | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5485577A (en) * | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
CA2683230C (en) * | 1995-02-13 | 2013-08-27 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US5530235A (en) * | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US6246767B1 (en) * | 1995-04-03 | 2001-06-12 | Scientific-Atlanta, Inc. | Source authentication of download information in a conditional access system |
US6424717B1 (en) * | 1995-04-03 | 2002-07-23 | Scientific-Atlanta, Inc. | Encryption devices for use in a conditional access system |
US5790677A (en) * | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
FR2736783B1 (en) * | 1995-07-13 | 1997-08-14 | Thomson Multimedia Sa | METHOD AND APPARATUS FOR RECORDING AND PLAYBACK WITH LARGE CAPACITY RECORDING MEDIUM |
US5764807A (en) * | 1995-09-14 | 1998-06-09 | Primacomp, Inc. | Data compression using set partitioning in hierarchical trees |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5825876A (en) * | 1995-12-04 | 1998-10-20 | Northern Telecom | Time based availability to content of a storage medium |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
WO1997025798A1 (en) * | 1996-01-11 | 1997-07-17 | Mrj, Inc. | System for controlling access and distribution of digital property |
US5987134A (en) * | 1996-02-23 | 1999-11-16 | Fuji Xerox Co., Ltd. | Device and method for authenticating user's access rights to resources |
JP2001507529A (en) * | 1996-03-18 | 2001-06-05 | ニューズ・データコム・リミテッド | Smart card chain in pay television systems |
FR2752655B1 (en) * | 1996-08-20 | 1998-09-18 | France Telecom | METHOD AND EQUIPMENT FOR ALLOCATING A COMPLEMENTARY CONDITIONAL ACCESS TO A TELEVISION PROGRAM ALREADY WITH CONDITIONAL ACCESS |
US5812664A (en) * | 1996-09-06 | 1998-09-22 | Pitney Bowes Inc. | Key distribution system |
US5825879A (en) * | 1996-09-30 | 1998-10-20 | Intel Corporation | System and method for copy-protecting distributed video content |
US6175831B1 (en) * | 1997-01-17 | 2001-01-16 | Six Degrees, Inc. | Method and apparatus for constructing a networking database and system |
CN1135852C (en) * | 1997-01-27 | 2004-01-21 | 皇家菲利浦电子有限公司 | Method and system for transferring content information and supplemental information relating thereto |
GB9703193D0 (en) * | 1997-02-15 | 1997-04-02 | Philips Electronics Nv | Television |
JP3613929B2 (en) * | 1997-05-07 | 2005-01-26 | 富士ゼロックス株式会社 | Access credential authentication apparatus and method |
US20010011276A1 (en) * | 1997-05-07 | 2001-08-02 | Robert T. Durst Jr. | Scanner enhanced remote control unit and system for automatically linking to on-line resources |
US6112239A (en) * | 1997-06-18 | 2000-08-29 | Intervu, Inc | System and method for server-side optimization of data delivery on a distributed computer network |
GB9714227D0 (en) * | 1997-07-04 | 1997-09-10 | British Telecomm | A method of scheduling calls |
JP3613936B2 (en) * | 1997-07-07 | 2005-01-26 | 富士ゼロックス株式会社 | Access qualification authentication device |
JP3622433B2 (en) * | 1997-08-05 | 2005-02-23 | 富士ゼロックス株式会社 | Access credential authentication apparatus and method |
US6523745B1 (en) * | 1997-08-05 | 2003-02-25 | Enix Corporation | Electronic transaction system including a fingerprint identification encoding |
JP3671611B2 (en) * | 1997-08-05 | 2005-07-13 | 富士ゼロックス株式会社 | Access credential authentication apparatus and method |
US6091777A (en) * | 1997-09-18 | 2000-07-18 | Cubic Video Technologies, Inc. | Continuously adaptive digital video compression system and method for a web streamer |
IL121862A (en) * | 1997-09-29 | 2005-07-25 | Nds Ltd West Drayton | Distributed ird system for pay television systems |
US6141754A (en) * | 1997-11-28 | 2000-10-31 | International Business Machines Corporation | Integrated method and system for controlling information access and distribution |
JP4113274B2 (en) * | 1998-02-05 | 2008-07-09 | 富士ゼロックス株式会社 | Authentication apparatus and method |
JP3867388B2 (en) * | 1998-02-12 | 2007-01-10 | 富士ゼロックス株式会社 | Conditional authentication apparatus and method |
US6189146B1 (en) * | 1998-03-18 | 2001-02-13 | Microsoft Corporation | System and method for software licensing |
US6216112B1 (en) * | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6219652B1 (en) * | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
AU5781599A (en) * | 1998-08-23 | 2000-03-14 | Open Entertainment, Inc. | Transaction system for transporting media files from content provider sources tohome entertainment devices |
US6397333B1 (en) * | 1998-10-07 | 2002-05-28 | Infineon Technologies Ag | Copy protection system and method |
FR2796183B1 (en) * | 1999-07-07 | 2001-09-28 | A S K | CONTACTLESS ACCESS TICKET AND MANUFACTURING METHOD THEREOF |
US6796555B1 (en) * | 1999-07-19 | 2004-09-28 | Lucent Technologies Inc. | Centralized video controller for controlling distribution of video signals |
US20020056118A1 (en) * | 1999-08-27 | 2002-05-09 | Hunter Charles Eric | Video and music distribution system |
US6289455B1 (en) * | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
US6401211B1 (en) * | 1999-10-19 | 2002-06-04 | Microsoft Corporation | System and method of user logon in combination with user authentication for network access |
US6738901B1 (en) * | 1999-12-15 | 2004-05-18 | 3M Innovative Properties Company | Smart card controlled internet access |
US20020002586A1 (en) * | 2000-02-08 | 2002-01-03 | Howard Rafal | Methods and apparatus for creating and hosting customized virtual parties via the internet |
US7428505B1 (en) * | 2000-02-29 | 2008-09-23 | Ebay, Inc. | Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility |
US20010037447A1 (en) * | 2000-04-19 | 2001-11-01 | Mukherjee Shubhendu S. | Simultaneous and redundantly threaded processor branch outcome queue |
US7225231B2 (en) * | 2000-09-20 | 2007-05-29 | Visto Corporation | System and method for transmitting workspace elements across a network |
US6839769B2 (en) * | 2001-05-31 | 2005-01-04 | Intel Corporation | Limiting request propagation in a distributed file system |
US7472110B2 (en) * | 2003-01-29 | 2008-12-30 | Microsoft Corporation | System and method for employing social networks for information discovery |
US20050091202A1 (en) * | 2003-10-22 | 2005-04-28 | Thomas Kapenda J. | Social network-based internet search engine |
US20050198031A1 (en) * | 2004-03-04 | 2005-09-08 | Peter Pezaris | Method and system for controlling access to user information in a social networking environment |
US20050203929A1 (en) * | 2004-03-09 | 2005-09-15 | Devapratim Hazarika | System, method and computer program product for prioritizing contacts |
US7743145B2 (en) * | 2004-04-19 | 2010-06-22 | Microsoft Corporation | Verifying measurable aspects associated with a module |
US7673003B2 (en) * | 2004-04-28 | 2010-03-02 | Microsoft Corporation | Social network email filtering |
US8332947B1 (en) * | 2006-06-27 | 2012-12-11 | Symantec Corporation | Security threat reporting in light of local security tools |
-
2005
- 2005-04-28 US US11/116,432 patent/US20060248573A1/en not_active Abandoned
-
2006
- 2006-04-19 AU AU2006240147A patent/AU2006240147A1/en not_active Abandoned
- 2006-04-19 KR KR1020077027720A patent/KR20080011217A/en not_active Application Discontinuation
- 2006-04-19 WO PCT/US2006/014657 patent/WO2006115919A2/en active Application Filing
- 2006-04-19 CN CNA2006800146469A patent/CN101167093A/en active Pending
-
2014
- 2014-05-08 US US14/273,078 patent/US20140245382A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7080019B1 (en) * | 2001-03-04 | 2006-07-18 | Ducktrip, Llc | Ride share contact system |
US20040122803A1 (en) * | 2002-12-19 | 2004-06-24 | Dom Byron E. | Detect and qualify relationships between people and find the best path through the resulting social network |
US7069308B2 (en) * | 2003-06-16 | 2006-06-27 | Friendster, Inc. | System, method and apparatus for connecting users in an online computer system based on their relationships within social networks |
US20050177385A1 (en) * | 2004-01-29 | 2005-08-11 | Yahoo! Inc. | Method and system for customizing views of information associated with a social network user |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2077522A1 (en) * | 2007-12-24 | 2009-07-08 | France Telecom | Method for valuing relationships between users of a social networking system |
AT506453B1 (en) * | 2008-03-03 | 2012-01-15 | Andreas Kreiner | CONTROLLING DEVICES ON THE INTERNET USING CONFLICT CONDITIONS IN A SOCIAL NETWORK |
US8234688B2 (en) | 2009-04-03 | 2012-07-31 | International Business Machines Corporation | Managing privacy settings for a social network |
US10789656B2 (en) | 2009-07-31 | 2020-09-29 | International Business Machines Corporation | Providing and managing privacy scores |
US9704203B2 (en) | 2009-07-31 | 2017-07-11 | International Business Machines Corporation | Providing and managing privacy scores |
US11323347B2 (en) | 2009-09-30 | 2022-05-03 | Www.Trustscience.Com Inc. | Systems and methods for social graph data analytics to determine connectivity within a community |
US10127618B2 (en) | 2009-09-30 | 2018-11-13 | Www.Trustscience.Com Inc. | Determining connectivity within a community |
WO2011046847A3 (en) * | 2009-10-12 | 2011-07-21 | Microsoft Corporation | Pre-fetching content items based on social distance |
US8539161B2 (en) | 2009-10-12 | 2013-09-17 | Microsoft Corporation | Pre-fetching content items based on social distance |
US10812354B2 (en) | 2009-10-23 | 2020-10-20 | Www.Trustscience.Com Inc. | Parallel computational framework and application server for determining path connectivity |
US11665072B2 (en) | 2009-10-23 | 2023-05-30 | Www.Trustscience.Com Inc. | Parallel computational framework and application server for determining path connectivity |
US10348586B2 (en) | 2009-10-23 | 2019-07-09 | Www.Trustscience.Com Inc. | Parallel computatonal framework and application server for determining path connectivity |
US10187277B2 (en) | 2009-10-23 | 2019-01-22 | Www.Trustscience.Com Inc. | Scoring using distributed database with encrypted communications for credit-granting and identification verification |
US9922134B2 (en) | 2010-04-30 | 2018-03-20 | Www.Trustscience.Com Inc. | Assessing and scoring people, businesses, places, things, and brands |
EP2447874A1 (en) * | 2010-10-27 | 2012-05-02 | Sony Ericsson Mobile Communications AB | Digital rights management (DRM) domain recommendation and selection based on a user's social graphs |
US9449154B2 (en) | 2010-10-29 | 2016-09-20 | Nokia Technologies Oy | Method and apparatus for granting rights for content on a network service |
US9135664B2 (en) | 2010-10-29 | 2015-09-15 | Nokia Corporation | Method and apparatus for granting rights for content on a network service |
WO2012056092A1 (en) * | 2010-10-29 | 2012-05-03 | Nokia Corporation | Method and apparatus for granting rights for content on a network service |
CN102130904A (en) * | 2011-01-20 | 2011-07-20 | 武汉大学 | Blood relationship description system for entity trust in information system |
CN103544237A (en) * | 2013-10-07 | 2014-01-29 | 宁波芝立软件有限公司 | General genetic relationship information base traversal improvement method |
US9444846B2 (en) | 2014-06-19 | 2016-09-13 | Xerox Corporation | Methods and apparatuses for trust computation |
US11900479B2 (en) | 2015-03-20 | 2024-02-13 | Www.Trustscience.Com Inc. | Calculating a trust score |
US10380703B2 (en) | 2015-03-20 | 2019-08-13 | Www.Trustscience.Com Inc. | Calculating a trust score |
US11386129B2 (en) | 2016-02-17 | 2022-07-12 | Www.Trustscience.Com Inc. | Searching for entities based on trust score and geography |
US11341145B2 (en) | 2016-02-29 | 2022-05-24 | Www.Trustscience.Com Inc. | Extrapolating trends in trust scores |
US10055466B2 (en) | 2016-02-29 | 2018-08-21 | Www.Trustscience.Com Inc. | Extrapolating trends in trust scores |
WO2017161446A1 (en) * | 2016-03-24 | 2017-09-28 | Www.Trustscience.Com Inc. | Learning an entity's trust model and risk tolerance to calculate a risk score |
US11640569B2 (en) | 2016-03-24 | 2023-05-02 | Www.Trustscience.Com Inc. | Learning an entity's trust model and risk tolerance to calculate its risk-taking score |
US10121115B2 (en) | 2016-03-24 | 2018-11-06 | Www.Trustscience.Com Inc. | Learning an entity's trust model and risk tolerance to calculate its risk-taking score |
US10180969B2 (en) | 2017-03-22 | 2019-01-15 | Www.Trustscience.Com Inc. | Entity resolution and identity management in big, noisy, and/or unstructured data |
WO2021113882A3 (en) * | 2021-02-11 | 2021-11-11 | Futurewei Technologies, Inc. | System and method of social authentication and data synchronization in a network |
Also Published As
Publication number | Publication date |
---|---|
US20060248573A1 (en) | 2006-11-02 |
AU2006240147A1 (en) | 2006-11-02 |
US20140245382A1 (en) | 2014-08-28 |
WO2006115919A3 (en) | 2007-11-01 |
CN101167093A (en) | 2008-04-23 |
KR20080011217A (en) | 2008-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20140245382A1 (en) | System and method for developing and using trusted policy based on a social model | |
US10540515B2 (en) | Consumer and brand owner data management tools and consumer privacy tools | |
US11074639B2 (en) | Cloud-based item storage system | |
US8707394B2 (en) | System and method for creating a secure trusted social network | |
US8682995B1 (en) | Methods and apparatus for targeting communications using social network metrics | |
US7730539B2 (en) | Authenticating third party products via a secure extensibility model | |
US9990660B2 (en) | Dynamic group formation for electronically collaborative group events | |
US8763150B2 (en) | Correlating private affinities | |
US20190253431A1 (en) | Intelligent personal information management system | |
US9148419B2 (en) | User administering a trustworthy workspace | |
KR20110131166A (en) | System and method for managing digital interactions | |
WO2006084205A2 (en) | Methods and apparatus for optimizing identity management | |
Steinbrecher | Design options for privacy-respecting reputation systems within centralised internet communities | |
Park et al. | Acon: Activity-centric access control for social computing | |
Carminati et al. | Privacy-aware access control in social networks: Issues and solutions | |
Gal-Oz et al. | TRIC: An infrastructure for trust and reputation across virtual communities | |
Laurent et al. | Privacy management and protection of personal data | |
EP3465525A1 (en) | Consumer and brand owner data management tools and consumer privacy tools | |
Elser et al. | Group management in p2p networks | |
KR101199339B1 (en) | Server, device and the method for providing community services based on co-ownership | |
Deriaz | What is trust? My own point of view | |
CA2673316C (en) | System and method for creating a secure trusted social network | |
Genkina et al. | Re-embedding existing social networks into online experiences to aid in trust assessment | |
Seigneur et al. | User-centric identity, trust and privacy | |
Al Shareef | A Collaborative Access Control Model for Shared Items in Online Social Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680014646.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006240147 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1979/MUMNP/2007 Country of ref document: IN |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077027720 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: 2006240147 Country of ref document: AU Date of ref document: 20060419 Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06750648 Country of ref document: EP Kind code of ref document: A2 |