Great research starts with great data.

Learn More
More >
Patent Analysis of

Management of social network group through the use of embedded limitations

Updated Time 12 June 2019

Patent Registration Data

Publication Number

US10154043

Application Number

US15/397048

Application Date

03 January 2017

Publication Date

11 December 2018

Current Assignee

ROSENFIELD, JEFFREY M.

Original Assignee (Applicant)

ROSENFIELD, JEFFREY M.

International Classification

H04L29/06

Cooperative Classification

H04L63/102,H04L63/104,H04L63/10,H04L63/105,H04W4/21

Inventor

ROSENFIELD, JEFFREY M.

Patent Images

This patent contains figures and images illustrating the invention and its embodiment.

US10154043 Management social network group 1 US10154043 Management social network group 2 US10154043 Management social network group 3
See all images <>

Abstract

A social networking system wherein an individual may set up a personal profile to share with a select group of friends and/or family. The system and method of the present invention implements embedded limitations that maintains a core group of contacts specific to the user's profile, thereby promoting more meaningful exchanges without privacy concerns of personal information being viewed by third parties.

Read more

Claims

1. A social networking system comprising:

an online network in which the social networking system operates via a hardware processor and memory; at least one terminal connected to said social networking system through said online network; an embedded limitation located within the social networking system that defines a range of specified allowable user positive actions; said user positive action being analyzed within the online network in accordance with the embedded limitation to determine whether the user positive action falls within a limitation range of the embedded limitation; a first determination being made within the social networking system that the user positive action falls within the limitation range of the embedded limitation and that the positive user action will be allowed within the social networking system based on the first determination; said user positive action being analyzed within the online network in accordance with a third party allowance to determine whether the third party allowance is required or not;a second determination being made that the user positive action does not require the third party allowance and that the positive user action will be allowed within the social networking system based on the second determination;

said user positive action being added to previously allowed user positive actions based on the first determination and the second determination; said embedded limitation being closed based on the user positive action being added to previously allowed user positive actions; a user negative action being received within the social networking system; said user negative action being analyzed within the online network in accordance with the embedded limitation; said user negative action being subtracted from previously allowed positive actions; and said embedded limitation being opened based on the user negative action being subtracted from previously allowed positive actions.

2. The social networking system of claim 1 wherein:

said range of specified allowable user positive actions forms a select core group of connections with contacts.

3. The social networking system of claim 2 wherein:

said select core group of connections with contacts is limited to a predetermined number of connections.

4. The social networking system of claim 2 wherein:

said select core group of connections with contacts is limited to a specific number of connections.

5. The social networking system of claim 4 wherein:

subsequent to said user positive action being added to previously allowed user positive actions, a resulting sum falls within the allowable range of the embedded limitation and maximizes allowed amount of positive actions allowed within the range of the embedded limitation limited to the predetermined number of connections, then the embedded limitation is closed to prevent further allowance of positive user actions that would result in said predetermined number of connections being proceeded.

6. The social networking system of claim 4 wherein:

subsequent to said user positive action being added to previously allowed user positive actions, a resulting sum falls within the allowable range of the embedded limitation and maximizes allowed amount of positive actions allowed within the range of the embedded limitation limited to the specific number of connections, then the embedded limitation is closed to prevent further allowance of positive user actions that would result in said specific number of connections being proceeded.

7. A social networking system comprising:

an online network in which the social networking system operates via a hardware processor and memory; at least one terminal connected to said social networking system through said online network; an embedded limitation located within the social networking system that defines a range of specified allowable user positive actions; a user positive action being initiated within the social networking system via the at least one terminal; said user positive action being analyzed within the online network in accordance with the embedded limitation to determine whether the user positive action falls within a limitation range of the embedded limitation; a first determination being made within the social networking system that the user positive action falls within the limitation range of the embedded limitation and that the positive user action will be allowed within the social networking system based on the first determination; said user positive action being analyzed within the online network in accordance with a third party allowance to determine whether the third party allowance is required or not;a second determination being made that the user positive action does not require the third party allowance and that the positive user action will be allowed within the social networking system based on the second determination;

said user positive action being added to previously allowed user positive actions based on the first determination and the second determination; said embedded limitation being closed based on the user positive action being added to previously allowed user positive actions; a user negative action being received within the social networking system; said user negative action being analyzed within the online network in accordance with the embedded limitation; said user negative action being subtracted from previously allowed positive action; and said embedded limitation being opened based on the user negative action being subtracted from previously allowed positive actions.

8. The social networking system of claim 7 wherein:

said range of specified allowable user positive actions forms a select core group of connections with contacts.

9. The social networking system of claim 8 wherein:

said select core group of connections with contacts is limited to a predetermined number of connections.

10. The social networking system of claim 8 wherein:

said select core group of connections with contacts is limited to a specific number of connections.

11. The social networking system of claim 9 wherein:

subsequent to said user positive action being added to previously allowed user positive actions, a resulting sum falls within the allowable range of the embedded limitation and maximizes allowed amount of positive actions allowed within the range of the embedded limitation limited to the predetermined number of connections, then the embedded limitation is closed to prevent further allowance of positive user actions that would result in said predetermined number of connections being proceeded.

12. The social networking system of claim 10 wherein:

subsequent to said user positive action being added to previously allowed user positive actions, a resulting sum falls within the allowable range of the embedded limitation and maximizes allowed amount of positive actions allowed within the range of the embedded limitation limited to the specific number of connections, then the embedded limitation is closed to prevent further allowance of positive user actions that would result in said specific number of connections being proceeded.

13. A social networking system comprising:

an online network in which the social networking system operates via a hardware processor and memory; at least one terminal connected to said social networking system through said online network; an embedded limitation located within the social networking system that defines a range of specified allowable user positive actions;a user positive action being initiated within the social networking system via the at least one terminal;

said user positive action being analyzed within the online network in accordance with the embedded limitation to determine whether the user positive action falls within a limitation range of the embedded limitation; a first determination being made within the social networking system that the user positive action falls within the limitation range of the embedded limitation and that the positive user action will be allowed within the social networking system based on the first determination embedded limitation; said user positive action being analyzed within the online network in accordance with a third party allowance to determine whether the third party allowance is required or not;a second determination being made that the user positive action does not require the third party allowance and that the positive user action will be allowed within the social networking system based on the second determination;

said user positive action being added to previously allowed user positive actions based on the first determination and the second determination; said embedded limitation being closed based on the user positive action being added to previously allowed user positive actions; a user negative action being received within the social networking system; said user negative action being analyzed within the online network in accordance with the embedded limitation; said user negative action being subtracted from previously allowed positive actions; and said embedded limitation being opened based on the user negative action being subtracted from previously allowed positive actions.

14. The social networking system of claim 13 wherein:

said range of specified allowable user positive actions forms a select core group of connections with contacts.

15. The social networking system of claim 14 wherein:

said select core group of connections with contacts is limited to a predetermined number of connections.

16. The social networking system of claim 14 wherein: said select core group of connections with contacts is limited to a specific number of connections.

17. The social networking system of claim 15 wherein: subsequent to said user positive action being added to previously allowed user positive actions, a resulting sum falls within the allowable range of the embedded limitation and maximizes allowed amount of positive actions allowed within the range of the embedded limitation limited to the predetermined number of connections, then the embedded limitation is closed to prevent further allowance of positive user actions that would result in said predetermined number of connections being proceeded.

18. The social networking system of claim 16 wherein:

subsequent to said user positive action being added to previously allowed user positive actions, a resulting sum falls within the allowable range of the embedded limitation and maximizes allowed amount of positive actions allowed within the range of the embedded limitation limited to the specific number of connections, then the embedded limitation is closed to prevent further allowance of positive user actions that would result in said specific number of connections being proceeded.

Read more

Claim Tree

  • 1
    1. A social networking system comprising:
    • an online network in which the social networking system operates via a hardware processor and memory
    • at least one terminal connected to said social networking system through said online network
    • an embedded limitation located within the social networking system that defines a range of specified allowable user positive actions
    • said user positive action being analyzed within the online network in accordance with the embedded limitation to determine whether the user positive action falls within a limitation range of the embedded limitation
    • a first determination being made within the social networking system that the user positive action falls within the limitation range of the embedded limitation and that the positive user action will be allowed within the social networking system based on the first determination
    • said user positive action being analyzed within the online network in accordance with a third party allowance to determine whether the third party allowance is required or not
    • a second determination being made that the user positive action does not require the third party allowance and that the positive user action will be allowed within the social networking system based on the second determination
    • said user positive action being added to previously allowed user positive actions based on the first determination and the second determination
    • said embedded limitation being closed based on the user positive action being added to previously allowed user positive actions
    • a user negative action being received within the social networking system
    • said user negative action being analyzed within the online network in accordance with the embedded limitation
    • said user negative action being subtracted from previously allowed positive actions
    • and said embedded limitation being opened based on the user negative action being subtracted from previously allowed positive actions.
    • 2. The social networking system of claim 1 wherein
      • : said range of specified allowable user positive actions forms a select core group of connections with contacts.
  • 7
    7. A social networking system comprising:
    • an online network in which the social networking system operates via a hardware processor and memory
    • at least one terminal connected to said social networking system through said online network
    • an embedded limitation located within the social networking system that defines a range of specified allowable user positive actions
    • a user positive action being initiated within the social networking system via the at least one terminal
    • said user positive action being analyzed within the online network in accordance with the embedded limitation to determine whether the user positive action falls within a limitation range of the embedded limitation
    • a first determination being made within the social networking system that the user positive action falls within the limitation range of the embedded limitation and that the positive user action will be allowed within the social networking system based on the first determination
    • said user positive action being analyzed within the online network in accordance with a third party allowance to determine whether the third party allowance is required or not
    • a second determination being made that the user positive action does not require the third party allowance and that the positive user action will be allowed within the social networking system based on the second determination
    • said user positive action being added to previously allowed user positive actions based on the first determination and the second determination
    • said embedded limitation being closed based on the user positive action being added to previously allowed user positive actions
    • a user negative action being received within the social networking system
    • said user negative action being analyzed within the online network in accordance with the embedded limitation
    • said user negative action being subtracted from previously allowed positive action
    • and said embedded limitation being opened based on the user negative action being subtracted from previously allowed positive actions.
    • 8. The social networking system of claim 7 wherein
      • : said range of specified allowable user positive actions forms a select core group of connections with contacts.
  • 13
    13. A social networking system comprising:
    • an online network in which the social networking system operates via a hardware processor and memory
    • at least one terminal connected to said social networking system through said online network
    • an embedded limitation located within the social networking system that defines a range of specified allowable user positive actions
    • a user positive action being initiated within the social networking system via the at least one terminal
    • said user positive action being analyzed within the online network in accordance with the embedded limitation to determine whether the user positive action falls within a limitation range of the embedded limitation
    • a first determination being made within the social networking system that the user positive action falls within the limitation range of the embedded limitation and that the positive user action will be allowed within the social networking system based on the first determination embedded limitation
    • said user positive action being analyzed within the online network in accordance with a third party allowance to determine whether the third party allowance is required or not
    • a second determination being made that the user positive action does not require the third party allowance and that the positive user action will be allowed within the social networking system based on the second determination
    • said user positive action being added to previously allowed user positive actions based on the first determination and the second determination
    • said embedded limitation being closed based on the user positive action being added to previously allowed user positive actions
    • a user negative action being received within the social networking system
    • said user negative action being analyzed within the online network in accordance with the embedded limitation
    • said user negative action being subtracted from previously allowed positive actions
    • and said embedded limitation being opened based on the user negative action being subtracted from previously allowed positive actions.
    • 14. The social networking system of claim 13 wherein
      • : said range of specified allowable user positive actions forms a select core group of connections with contacts.
See all independent claims <>

Description

FIELD OF THE INVENTION

This invention relates to social network services and more particularly to a system and method for creation of a targeted group of contacts through the use of limitations within an online social network service.

BACKGROUND OF THE INVENTION

Online social network services bring individuals together in communities based on common access to the same online social network service. These online communities may facilitate communication among individual users of an online social network service based on pre-established relationships between the individual users. Such connections may be based on common interests, circumstances, friendships, family relationships, business relationships, and the like. Many online social network services allow users to enter personal information to establish a profile that is visible to other users of the online social network service. A user's profile may be made public or private by manually entering a myriad of commands that can be confusing, easily forgotten after being set and/or easily circumvented by third parties with a desire to view the user's profile. In either case, the user is hesitant to share personal information as they are unsure which connections and/or third parties will be able to access the information.

These privacy concerns cause many users to limit their use of a social network and/or cease use altogether. This is a problem specific to online computer networks wherein the sharing of information is conducted.

Therefore, a need exists for a system and method for managing a social network profile through the use of embedded limitations to ensure a user's privacy from the creation of the profile and throughout the life of the profile, thereby encouraging greater sharing of personal information and use of the social network.

SUMMARY OF THE INVENTION

The primary object of the present invention is to provide a system and method for managing a social network profile through the use of embedded limitations to ensure a user's privacy from the creation of the profile and throughout the life of the profile, thereby encouraging greater sharing of personal information and use of the social network.

The present invention fulfills the above and other objects by providing a social networking system wherein an individual may set up a personal profile to share with a select group of friends and/or family. The system and method of the present invention implements embedded limitations that maintains a core group of contacts specific to the user's profile, thereby promoting more meaningful exchanges without privacy concerns of personal information being viewed by third parties.

The privacy concerns that cause many users to limit their use of a social network and/or cease use altogether is a problem specific to online computer networks wherein the sharing of information is conducted. The system and method of the present invention implements embedded limitations. The use of these embedded limitations or rules by a computer operating in an online environment sets particular animation parameters that may only be accomplished by operation of the computer or other equivalent electronic device within the online environment.

In an exemplary embodiment, actions by profile owners or users and third parties in relation to a specific social network profile are accounted for and analyzed in comparison with one or more embedded limitations to determine if the actions should be allowed or denied. The actions may be positive or negative to allow the social networking system to identify the actions within specified ranges and adjust the ranges in accordance with the embedded limitation. Actions of a user may close an embedded limitation, thereby disallowing further actions to be taken, or open an embedded limitation, thereby allowing further actions to be taken. For example, the positive action of adding a contact to a core group may maximize a predetermined range and close an embedded limitation, thereby preventing the further addition of contacts to the core group. Likewise, the negative action of a removal of a contact from core group will open a predetermined range and open an embedded limitation. In addition, the positive action of a third party, such as a request, may force a user or profile owner to take a negative action to open an embedded limitation, thereby allowing the newly opened embedded limitation to allow the third party request.

The above and other objects, features and advantages of the present invention should become even more readily apparent to those skilled in the art upon a reading of the following detailed description in conjunction with the drawings wherein there is shown and described illustrative embodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

In the following detailed description, reference will be made to the attached drawings in which:

FIG. 1 is a schematic diagram showing an online social network in which the system and method of the present invention operates;

FIG. 2 is a flow chart showing the steps of a processing a user positive action within a limit of an embedded limitation of the present invention;

FIG. 3 is a flow chart showing the steps of a closed embedded limitation being opened by a user negative action;

FIG. 4 is a flow chart showing the steps of a processing a third party positive action a limit of an embedded limitation of the present invention; and

FIG. 5 is a flow chart showing the steps of a closed embedded limitation being opened by a third party negative action.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

With reference to FIG. 1, a schematic diagram showing an online social network 100 in which the system and method of the present invention operates is illustrated. A social networking system 101 is accessed by a user 102 though a terminal 103, such as a computer, smart phone, tablet or equivalent device, over a computer network 104 in order to exchange information with third parties 105 that are members of the user's 102 contact group 106. The social networking system 101 comprises at least one embedded limitation 107 that prevents one or more actions by the user 102.

With reference to FIG. 2, a flow chart showing the steps of processing a user positive action within a limit of an embedded limitation of the present invention are illustrated. First, a user positive action 201 is created by initiating a request within the social networking system. An embedded limitation 202 of the present invention may comprise a range of allowable specified positive actions. The user positive action is added to a number of previously allowed positive actions 203. If the sum falls within the allowable range of the embedded limitation 204, then the user positive action will be checked for any required third party allowances 205. If a third party allowance is required 206, then the positive user request will be analyzed as a third party request of another user's at least one embedded limitation 207 (as illustrated in FIG. 4).

Then the user positive action will either be denied 208 or allowed 210 based on the other user's at least one embedded limitation 207. If a third party allowance is not required 209, then the user positive action will be allowed 210. If the user positive action is allowed 210 and the resulting sum falls within the allowable range of the embedded limitation 204, maximizes the allowed amount of positive actions allowed within the range of the embedded limitation 211, and then the embedded limitation is closed to preventing future further allowance of positive user actions 212. If the resulting sum of the user positive action being added to the number of previously allowed positive actions 203 falls outside of the allowable range of the embedded limitation 213, then the user positive action is denied 214.

With reference to FIG. 3, a flow chart showing the steps of a closed embedded limitation being opened by a user negative action are illustrated. After an embedded limitation is closed, the user may initiate a user negative action 301 which reverses a previous specified user positive action to open the closed embedded limitation 302 range by reversing a previous specified positive action, thereby allowing a future specified positive action to fall within the range of allowable specified positive actions after the user negative action is subtracted from the previously allowed positive actions 303. After the user negative action is subtracted from the previously allowed positive actions 303, the embedded limitation is opened 304, thereby causing the user to only exchange information with contacts within the parameters set forth by the at least one embedded limitation of the present system and method.

With reference to FIG. 4, a flow chart showing the steps of processing a third party positive action a limit of an embedded limitation of the present invention are illustrated. First, a third party positive action 401 directed toward a specified user is received within the social networking system 402. The user may deny the third party positive action 412 or accept the third party positive action 403. An embedded limitation 404 of the present invention may comprise a range of allowable specified positive user actions. The third party positive action is added to a number of previously allowed positive actions 405. If the sum falls within the allowable range of the embedded limitation 406, then the third party positive action is allowed 407.

If the third party positive action is allowed and the resulting sum falls within the allowable range of the embedded limitation 406, maximizes the allowed amount of positive actions allowed within the range of the embedded limitation 408, and then the embedded limitation is closed to prevent further allowance of positive actions 409. If the resulting sum of the third party positive action being added to the number of previously allowed positive actions 405 falls outside of the allowable range of the embedded limitation 410, then the user positive action is denied 411.

With reference to FIG. 5, a flow chart showing the steps of a closed embedded limitation being opened by a third party negative action are illustrated. After an embedded limitation is closed, a third party negative action 501 may reverse a previous specified positive action to open the closed embedded limitation 502 of a user within the social network system by reversing a previous specified positive action, thereby allowing a future specified positive action to fall within the range of allowable specified positive actions after the third party negative action is subtracted from the previously allowed positive actions 503. After the third party negative action is subtracted from the previously allowed positive actions 503, the embedded limitation is opened 504, thereby causing the user to only exchange information with contacts within the parameters set forth by the at least one embedded limitation of the present system and method.

It is to be understood that while a preferred embodiment of the invention is illustrated, it is not to be limited to the specific form or arrangement of parts herein described and shown. It will be apparent to those skilled in the art that various changes may be made without departing from the scope of the invention and the invention is not to be considered limited to what is shown and described in the specification and drawings.

Read more
PatSnap Solutions

Great research starts with great data.

Use the most comprehensive innovation intelligence platform to maximise ROI on research.

Learn More

Citation

Patents Cited in This Cited by
Title Current Assignee Application Date Publication Date
Competitive friend ranking for computerized social networking INTERNATIONAL BUSINESS MACHINES CORPORATION 02 February 2007 07 August 2008
Top Friend Prediction for Users in a Social Networking System FACEBOOK, INC. 25 April 2011 25 October 2012
Methods and systems for the display and navigation of a social network GOOGLE LLC 26 August 2004 06 September 2011
Cross-population of virtual communities XYSTAR TECHNOLOGIES,INC 22 October 2007 28 September 2010
Selective Content Accessibility in a Social Network FACEBOOK, INC. 21 November 2014 19 March 2015
See full citation <>

More Patents & Intellectual Property

PatSnap Solutions

PatSnap solutions are used by R&D teams, legal and IP professionals, those in business intelligence and strategic planning roles and by research staff at academic institutions globally.

PatSnap Solutions
Search & Analyze
The widest range of IP search tools makes getting the right answers and asking the right questions easier than ever. One click analysis extracts meaningful information on competitors and technology trends from IP data.
Business Intelligence
Gain powerful insights into future technology changes, market shifts and competitor strategies.
Workflow
Manage IP-related processes across multiple teams and departments with integrated collaboration and workflow tools.
Contact Sales
Clsoe
US10154043 Management social network group 1 US10154043 Management social network group 2 US10154043 Management social network group 3