WO2001015002A2 - Methods and systems for presenting information in a distributed computing environment - Google Patents

Methods and systems for presenting information in a distributed computing environment Download PDF

Info

Publication number
WO2001015002A2
WO2001015002A2 PCT/US2000/023193 US0023193W WO0115002A2 WO 2001015002 A2 WO2001015002 A2 WO 2001015002A2 US 0023193 W US0023193 W US 0023193W WO 0115002 A2 WO0115002 A2 WO 0115002A2
Authority
WO
WIPO (PCT)
Prior art keywords
user
content
recited
trust
author
Prior art date
Application number
PCT/US2000/023193
Other languages
French (fr)
Other versions
WO2001015002A3 (en
Inventor
Ramanathan V. Guha
Naval Ravikrant
Vinay Bhargava
Kristin Kueter
Aleksandar Totic
Original Assignee
Epinions, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Epinions, Inc. filed Critical Epinions, Inc.
Priority to AU69314/00A priority Critical patent/AU6931400A/en
Priority to CA002349613A priority patent/CA2349613A1/en
Priority to JP2001519291A priority patent/JP2004500621A/en
Publication of WO2001015002A2 publication Critical patent/WO2001015002A2/en
Priority to GBGB0110027.0A priority patent/GB0110027D0/en
Publication of WO2001015002A3 publication Critical patent/WO2001015002A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • HTML Hypertext Transfer Protocol
  • HTML Hypertext Markup Language
  • 'CTRL Uniform Resource Locator
  • Use of an HTML-compatible browser (e.g., Netscape Navigator) at a client machine involves specification of a link via the URL.
  • the client makes a request to the server identified in the link and receives in return a document formatted according to HTML.
  • search engines In this environment an enormous amount of information is available to a user. First because of the sheer size of the Web environment, and ' second because of the immense amount of individuals having access to the Web environment. These individuals currently author a tremendous amount of content for the Web concerning a vast number of topics. To navigate all this information, users of the Web typically use search engines.
  • a search engine allows a Web user to enter key words which define the content they desire. The search engine then utilizes these key words to rind matches in documents on the Web, and then presents these content matches to the user, typically in the form of a list of content.
  • Another a strategy for search engines is a hierarchical tree of content nodes in which a user can traverse various branches and nodes to find the desired content.
  • the first level of a hierarchical tree may present various high level topics, such as cars or homes.
  • the user may find the content they are looking for at this general level, or they may traverse down the hierarchy to a more specific level, such as exploring the cars topic which may contain various makes of cars, such as Ford or Ferrari. If the user does not find the content they desire at this level, the user may continue down the hierarchy to more specific topics until they obtain the content they are looking for.
  • the content provided to the user includes no correlation to tile an count of trust a user may have for the authors of the content provided.
  • the information may be presented to the user based on the amount of key words found in the content, or based on the number of times a piece of content gets accessed by others, the prior art does not allow content to be based on the trust levels of the individual user. The result is that the user has no way of knowing whether they will personally appreciate the content presented to them. Even though a piece of content includes a high percentage of key words used in a search, or is frequently accessed by others, that does not mean a particular individual will find the content desirable.
  • the present invention fills these needs by providing a computer implemented method that organizes content for a particular user based on the particular user's Trust Levels for various authors of content.
  • the invention relates to a method for organizing a pool of content for a user.
  • the method comprises maintaining a common pool database which includes a plurality of content data, with each piece of content having at least one author associated with it.
  • the method further includes maintaining a user database which includes user trust data.
  • the user trust data includes user Trust Levels for authors of content included in the common pool database.
  • a new content database and content presentation structure are generated for a user based on the user trust data of the user.
  • a distributed computing system for organizing a pool of content is disclosed, lip this embodiment, a common pool data base is used store a plurality of content data with each piece of content having at least one author associated therewith.
  • the system further includes a user database for storing user trust data.
  • the user trust data includes user Trust Levels for authors of content included its the common pool database.
  • the system includes a system process having logic for generating a content database and content presentation structure for a user based on the user trust data of the user.
  • a computer program for organizing a pool of content for a user is disclosed in yet another embodiment of the present invention.
  • the computer program includes a code segment that maintains a common pool database which includes a plurality of content data, with each piece of content having at least one author associated with it.
  • the computer program further includes a code segment that maintains a user database which includes user trust data.
  • the user trust data includes user Trust Levels of authors of content included in the common pool database.
  • the computer program includes a code segment that generates a content database and content presentation structure for a user based on the user trust data of the user.
  • the invention in another embodiment, relates to a method for organizing a listing of performances for a user.
  • the method comprises maintaining a common pool database which includes a plurality of performance data for television/cable shows, with each piece of performance data having at least one author, such as a writer or director, associated with it.
  • the method further includes maintaining a user database which includes user trust data.
  • the user trust data includes user Trust Levels for authors of performance data included in the common pool database.
  • a new performance database and performance listing presentation structure are generated for a user based on the user trust data of the user. In this manner, users are able to easily determine performances they are likely to enjoy.
  • the use of user Trust Levels for authors allows the presentation of content to be structured to specifically suit a particular individual. Content from highly trusted authors may be placed in more prominent positions in the presentation data structure. Furthermore, chat room environments may be structured to simulate the actual experience of having a conversation with friends in a crowded room. Moreover, the use of Trust Levels allows an email presentation to be structured to allow messages from highly trusted individuals to take precedence over messages from lower trusted individuals.
  • Figure 1 is a chart illustrating, components included in the Trust model according to one embodiment of the present invention.
  • FIG. 2 is a chart showing various ways Trust Levels may be created in accordance with another embodiment of the present invention.
  • FIG. 3 is a flowchart showing a method for creation of a Trust Level using explicit declaration by a user, in accordance with yet another embodiment of the present invention
  • Figure 4 is a flowchart showing a method for creation of a Trust Level based on a user making evaluations of content from an author, in accordance with one aspect of the present invention
  • FIG. 5 is a flowchart showing a method for creation of a Trust Level based on transitive assignment with decay, in accordance with another aspect of the present invention
  • Figure 6 is a flowchart showing a method for creation of a Trust Level based on observing commonalties in patterns between two or more users, in accordance with another aspect of the present invention
  • Figure 7 is a flowchart showing a method for creation of a Trust Level based on membership in a group, in accordance with yet another aspect of the present invention
  • Figure 8 is a diagram showing the flow of Trust information, in accordance with one embodiment of the present invention
  • Figure 9 is a flowchart showing a method for organizing a pool of content for a user, according to another embodiment of the present invention.
  • Figure 10 is an illustration showing a common pool default data structure restructured for a user based on the user's Webs of Trust data, in accordance with another embodiment of the present invention;
  • Figure 1 1 is an illustration showing a content presentation structured based on a user's Webs of Trust, in accordance with yet another embodiment of the present invention
  • Figure 12 is an illustration showing the use of Webs of Trust for a chat room, in accordance with another embodiment of the present invention.
  • Figure 13 is an illustration showing a distributed computing system for organizing content data based on Trust relationships, in accordance with another aspect of the present invention.
  • An invention is described for organizing content based on a user's trust level for specific authors.
  • This content may be anything created by an author, and includes, for example, books, articles, art, and/or web pages.
  • numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be obvious, however, to one skilled in the art that the present invention may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order not to unnecessarily obscure the present invention.
  • Trust level is a way of ranking the confidence level a user has for a specific author in relation to a specific topic.
  • Figure 1 is a chart illustrating components included in a preferred trust model of the present invention. As shown in Figure 1 , the relationship between a user 2 and an author 4 is based on a Trust Level 10.
  • the Trust Level 10 includes a Topic Relevancy 12 and Confidence Levels 14. Topic Relevancy 12 includes at least one topic 16, while the Confidence Levels 14 include a number of confidence levels 18 associated with the topics 16.
  • each topic 16 has a related confidence level 18 which indicates the confidence the user 2 has for the author 4 in relation to a particular topic 16.
  • the present invention allows the Trust Level 10 a user 2 has for a particular author 4 to be utilized for organizing and ranking content generated by the author 4.
  • different topics 16 may generate different Trust Levels 10 between a user 2 and an author 4. For example, a user may have a very high Trust Level 10 for a specific author in relation to automobiles, and a very low Trust Level 10 for the author in relation to scuba diving.
  • the Trust model of the present invention reflects this by assigning specific confidence levels 18 to specific related topics 16.
  • the collection of Trust Levels 10 a user 2 has for various authors 4 is called the user's "Webs of Trust.”
  • content may be organized to provide content to a user ranked according to the user's trust for various authors, as will be described in more detail below.
  • FIG. 2 is a chart showing various ways Trust Levels may be created, in accordance with another embodiment of the present invention. These include Explicit Declaration By the User 100, Content Evaluations 200, Transitive Assignment 300, Commonalties 400, and Group Membership 500. By using these methods, collectively and/or individually, Webs of Trust may be created for a particular user based on the users selections, actions, and the actions of selected other users. Each of these methods will now be described with reference to Figures 3-7.
  • FIG. 3 is a flowchart showing a method 100 for creation of a Trust Level using explicit declaration by a user, in accordance with one aspect of the present invention.
  • the method 100 begins with a start operation 102, wherein various predeclara ' tion operations take place. These operations may include creation of a user database, user logon, and other operations as will be obvious to those skilled in the art.
  • a user input interface is proved to the user.
  • the input interface is preferably designed to allow the user to input information concerning the amount of confidence the user has for an author.
  • confidence may be a general confidence, i.e., concerning all topics, a particular topic, or a group of topics.
  • the topic, the author, or both may be entered explicitly, or may be inferred from the context in which the user input is obtained. For example, while examining a specific piece of content, the user may explicitly input confidence for the author.
  • the identity of the author could be inferred from the context, i.e., the author of the content.
  • the related topic may also be inferred from the content topic.
  • a receive data operation 106 the information entered by the user is received. This information is then used to update a user database in an update operation 108.
  • the update operation 108 includes updating user trust data included in the user database.
  • the user trust data can be used to organize content ranked according to the user's trust for various authors.
  • Figure 4 is a flowchart showing a Method 200 for creation of a Trust Level based on a user making evaluations of content generated by an author, in accordance with another aspect of the present invention.
  • initial operation 202 various preevaluation operations take place. These operations include creation of a user database, creation of a content pool, and other operations as will be obvious to those skilled in the art.
  • a user input interface is Provided for content evaluation.
  • the input interface is preferably desired to allow the user to input information concerning the users evaluation of selected content.
  • the content may be selected by the user, or inferred from the context in which: the user input is obtained. For example, when a user is examining a particular piece of content, the selected content may be erred to be the content currently being examined.
  • a receive operation 206 the information entered by the user is received.
  • a Trust Level determination operation 208 the Trust Level for an author associated with the selected content is determined.
  • Operation 208 includes first determining an associated author for the selected content. Since an associated author is typically listed with evaluated content, the author can generally be determined by looking up the author listed in the selected content.
  • a Trust Level for the author is determined by determining a topic associated with the content and a confidence level based on the evaluation of the content. As above, the topic associated with the content can be inferred from the context of the content. The evaluation of the content is then used to determine a confidence level for the associated author in relation to the determined topic, the better the evaluation of the content, the higher the related confidence level for the author. This information is then used to update a user database in an update operation 210.
  • the update operation 210 includes updating user trust data included in the user database.
  • trust data can be used to organize content ranked according to the user's trust for various authors.
  • FIG. 5 is a flowchart showing a method 300 for creation of a Trust Level based on transitive assignment with decay, in accordance with another aspect of the present invention.
  • initial operation 302 various pre-declaration operations take place. These operations include author and content evaluations from other users, and other operations as will be obvious to those skilled in the art.
  • a user input interface is proved to a first user.
  • the input interface is preferably designed to allow the first user to input information concerning the Trust Level the user has for a second user.
  • This Trust Level may be a general confidence concerning all topics, a particular topic, or a group of topics.
  • a first Trust Level operation 306 the first user's Trust Levels are determined for authors trusted by the second user. Generally, all authors trusted by the second user are then trusted by the first user. The Trust Levels for each of these authors is based on both the Trust Level the second user has for that author, and on the Trust Level the first user has for the second user. Preferably, these Trust Levels are decayed, resulting in the first user's
  • the first user's Trust Levels are determined for authors trusted by a third user trusted be the second user. Similar to the first
  • Trust Level operation 306 generally all authors trusted by the third user are then trusted by the first user.
  • the Trust Levels for each of these authors is based on: a) the Trust Level the third user has for that author, b) the Trust Level the second user has for the third user, and c) the Trust Level the first user has for the second user.
  • these Trust Levels are decayed, resulting in the first user's Trust Levels for the authors being less than that of the second user's Trust Levels for the authors, which, in turn, is less than that of the third users trust for the authors.
  • Operation 308 is carried out for each user the second user trusts.
  • operation 308 is repeated for each of these further removed users as well, and for users they trust, and so on.
  • the user trust data can be used to organize content ranked according to the user's trust for the various authors.
  • Method 300 simulates word of mouth trust in the real world, when one friend tells another friend, and so on. With each person removed from the current user, the Trust Level lessens, representing higher trust for those close to the user, and lesser trust for those not close to the user.
  • method 300 illustrates one method for updating a user's Webs of Trust through the actions of others, i.e., when others alter their Trust Levels, the Trust Levels of the current user can be altered.
  • Figure 6 a method 400 for creation of a Trust Level based on observing commonalties in patterns between two or more users is shown, in accordance with yet another aspect of the present invention.
  • various preevaluation operations take place. These operations include author and content evaluations from other users, and other operations as will be obvious to those skilled in the art.
  • a user input interface is provided for content evaluation.
  • the input interface is preferably designed to allow a first user to input information concerning the first users evaluation of selected content.
  • the content may be selected by the first user, or inferred from the context in which the user input is obtained. For example, when a user is examining a particular piece of content, the selected content may be inferred to be the content currently being examined.
  • a compare operation 406 the user content evaluations obtained from step 404 and from previous content evaluations by the first user, are compared to content evaluations from a second user.
  • a selecting operation 408 the second user is flagged if a predetermined threshold number of commonalties exist between the first user content evaluations and the second user content evaluations.
  • a selected second user represents a user in which the first user is likely to share points of view with, and the two are likely to trust the same individuals.
  • a Trust determination operation 410 a Trust Levels for authors trusted by second user are determined for the first user. Generally, authors trusted by the second user are then trusted by the first user.
  • these Trust Levels are decayed, resulting in the first user's Trust Levels for the authors being less than that of the second user's Trust Levels for the authors. Furthermore, this operation may be combined with method 300, and further Trust Levels determined by transitive assignment with decay.
  • FIG. 7 is a flowchart showing a method 500 for creation of a Trust Level based on membership in a group, in accordance with another aspect of the present invention.
  • initial operation 502 various pre-declaration operations take place. These operations include author arid content evaluations from other groups, and other operations as will be obvious to those skilled in the art.
  • a user input interface is proved to a first user.
  • the input interface is preferably designed to allow the user to input information concerning the Trust Level the user has for a group.
  • This Trust Level may be a general confidence concerning all topics, a particular topic, or a group of topics. By entering a Trust level for a group, the user is declaring trust for the group.
  • a Trust Level determination operation 506 the user's Trust Levels are determined for authors trusted by the group. Generally, all authors trusted by the group are then trusted by the user. The Trust Levels for each of these authors is based on both the Trust Level the group has for that author, and on the Trust Level the user has for the group. Preferably, these Trust Levels are decayed, resulting in the user's Trust Levels for the authors being less than that of the group's Trust Levels for the authors.
  • the user trust data can be used to organize content ranked according to the user's trust for the various authors.
  • Method 500 simulates a user's similar points of view as that o£ the groups to which the user belongs. Furthermore, since the present invention typically treats groups like individual entities, methods 100-400 may generally use a group as one of the users.
  • the present invention includes a common pool database 50 and a user database 52.
  • the common pool database 50 includes a plurality of content data 54, each associated with at least one author 55.
  • the content data 54 may include the actual authored data, such as an article, or a link to the authored data, such as a URL, post address, or any other means to enable contact with the authored content.
  • content data 54 may represent physical paintings by an artist (author).
  • the actual content data 54 may include a digital picture of the art, a URL to where the art may be ordered, or a post address to order the piece of art.
  • the user database 52 includes a plurality of user trust data 56.
  • Each user trust data 56 includes Trust Levels associated with an individual user.
  • the Trust Levels include Trust Levels for authors 58, and Trust Levels for other users or groups 60.
  • Trust information in the form of Explicit Declarations 100, Content Evaluations 200, Transitive Assignment 300, Commonalties 400, and Group Membership 500, flows into a user database 52.
  • the Trust information is then used to create the various Trust Levels 58 and 60, as explained above with reference to Figures 2-7.
  • the Trust Levels for an individual user are then used to generate a content database and content presentation structure for a the user, as described below.
  • Figure 9 is a flowchart showing a method 600 for organizing a pool of content for a user, according to one embodiment of the present invention.
  • system initialization operations are performed, such as generating a content pool database, generating a user database, and other initial operations that will be obvious to those skilled in the art.
  • contributors transmit content into a common pool database.
  • Preferably all content transmitted to the common pool database includes at least one associated author who generated the content.
  • Authors include, but are not limited to, literary authors, artists, groups, and corporations.
  • the content stored in the common pool database is structured according to a default data structure.
  • This can be any data structure suitable for storing the particular type of content in the common pool database.
  • content may be stored as a list based on temporal priority.
  • content may be stored in a hierarchical tree based on topics.
  • the appropriate default data structure for a particular data type will be obvious to those skilled in the art.
  • a content database is generated from the content in the common pool.
  • the content database is structured specifically for the user based on the user trust data of the user.
  • content generated by an author having a high Trust Level with respect to the user is ranked higher in the data structure than content generated by an author having a lower Trust Level with respect to the user.
  • articles generated by authors having a high Trust Level with respect to the user may be listed before other articles.
  • the user may utilize the structured content presentation to obtained needed information. Since the content presentation is structured such that content from trusted authors takes precedence over other content, the user can easily find and utilize desired information, as illustrated further in Figures 10-12.
  • FIG 10 is an illustration showing a common pool default data structure restructured for a user based on the user's Webs of Trust data, in accordance with another embodiment of the present invention.
  • a common pool default data structure is a hierarchical tree 70 of nodes 72 and directories 74.
  • each node 72 represents a link to an article, however, in other embodiments nodes 72 can represent anything enabling a user to obtain information from an author, as described above.
  • each directory 74 contains links to other, more topic specific directories and nodes.
  • a cars directory may contain links to general articles and directories on cars.
  • Corvettes may be "Corvettes" and lead to articles and directories on the more specific car topic "Corvettes.”
  • the Corvettes directory may lead to a "Convertible Corvettes” directory, which in turn, may lead to an article on "1998" convertible Corvettes.
  • the present invention may restructure the default common pool data structure 70 into a new content database structure 76 to more particularly suit the user. For example, if a particular user had a high Trust Level for the author of the article on "1998 Convertible Corvettes" 78, that article 78 may be placed in a higher level in the content database structure 76, for example, at the level of articles on general Corvettes.
  • FIG 11 is an illustration showing a content presentation structured based on a user's Webs of Trust, in accordance with yet another embodiment of the present invention.
  • a default content presentation 80 based on the default common pool data structure, includes a presentation of nodes 72 at a particular level of the hierarchical tree, in this case the "Corvette" level. As is shown, the nodes 72 concern general information on Corvettes.
  • the present invention may restructure the default common pool data structure 70 into a new content database structure 76 to more particularly suit the user.
  • a new content presentation 82 based on a new content database structure, includes a presentation of nodes 72 as in the default content presentation 80.
  • FIG. 12 an illustration showing the use of Webs of Trust for a chat room is shown, in accordance with one aspect of the present invention.
  • messages received from others in the chat room are all listed for the user, generally, in reverse temporal order, with the newer messages above older messages.
  • messages from the friends 92 will be interlaced with messages from strangers 94, depending on the temporal order in which the messages are received.
  • messages may be listed in an order based on the user's Webs of Trust. For example, if the user sets high Trust Levels for their friends 92, messages from the friends 92 will be listed before messages from strangers 94. Messages from individuals at the same Trust Level typically are listed in reverse temporal order, as in a standard chat environment.
  • a Webs of Trust chat environment is preferably designed such that Trust Level constraints are relaxed over time when no trusted individuals are transmitting messages. In this manner, the Webs of Trust chat environment represents a group of friends talking in a crowded room. As long as someone in the group is talking the other group members hear that person above all others. When no one in the group is talking, group members will start over hearing other conversations.
  • FIG. 13 is an illustration showing a distributed computing system 1300 for organizing content data based on Trust relationships, in accordance with another aspect of the present invention.
  • the distributed computing system 1300 includes a server 1302, client users 1304, and a network 1306, such as the Internet.
  • the server 1302 includes a content database 1308, a system process 1310, and a user database 1312.
  • the content database 1308 includes submitted content wherein each piece of content includes at least one author.
  • the content database 1308 is coupled to the system process 1310 which includes the logic for creating and updating Webs of Trust for users.
  • the system process 1310 also includes logic for generating content databases and content presentation structures for users.
  • Also coupled to the system process 1310 is the user database 1312.
  • the user database 1312 includes user trust information, which is utilized by the system process 1312 to generate content databases and content presentation structures for users.
  • a user 1304 can connect with the server 1302 through the network 1306. This is typically accomplished using a browser and the Internet. Once a connection is established, the user can request information from the system process 1310. The system process 1310 then utilizes the content database 1308 in conjunction with the user database 1312 to generate new content database particularly structured for the individual user 1304. In this manner, a content presentation for user 1 may be completely different from a content presentation for user 2, even though each user requested the same information. Because user 1 and/or 2 may have different Trust Levels for different authors, the content presented to each user may take a different form. In one embodiment of the present invention, the same request from different users will generate the same pool of content, however, the pool of content will be structured differently for each user based on the users Webs of Trust.
  • the Webs of Trust model of the present invention may be used to organize any type data needed by a user. Examples include, but are not limited to, email, search results, marketing, chat rooms, e-commerce listings, and television/cable/satellite performance listings.
  • the Webs of Trust model may be utilized to organize scheduled television/cable performances listings.
  • a Webs of Trust based performance listing may list performances by the most trusted authors before other performance listings.

Abstract

Disclosed is a method for organizing content from a common pool of content data based on a users level of trust for authors of the content data. The method includes maintaining a common pool database of content, with each piece of content having an author. In addition, a user database is maintained which includes user trust data. The user trust data includes user trust levels for the authors of content in the common pool database. Finally, a new content database and content presentation structure are generated based on the user trust data of the user. Advantageously, content can be structured to more particularly suit the interest of an individual user.

Description

METHODS AND SYSTEMS FOR PRESENTING INFORMATION IN A DISTRIBUTED COMPUTING ENVIRONMENT
BACKGROUND OF THE INVENTION
The World Wide Web of the Internet is the most successful distributed application in the history of computing. In the Web environment, client machines effect transactions to Web servers using the Hypertext Transfer Protocol (HTTP), which is a known Application protocol providing users access to files (e.g., text, graphics, images, sound, video, etc.) using a standard page description language known as Hypertext Markup Language (HTML). HTML provides basic document formatting and allows the developer to specify "links" to other servers and files. In the Internet paradigm, a network path to a server is identified by a so-called Uniform Resource Locator ('CTRL) having a special syntax for defining a network connection. Use of an HTML-compatible browser (e.g., Netscape Navigator) at a client machine involves specification of a link via the URL. In response, the client makes a request to the server identified in the link and receives in return a document formatted according to HTML.
In this environment an enormous amount of information is available to a user. First because of the sheer size of the Web environment, and'second because of the immense amount of individuals having access to the Web environment. These individuals currently author a tremendous amount of content for the Web concerning a vast number of topics. To navigate all this information, users of the Web typically use search engines. A search engine allows a Web user to enter key words which define the content they desire. The search engine then utilizes these key words to rind matches in documents on the Web, and then presents these content matches to the user, typically in the form of a list of content. Another a strategy for search engines is a hierarchical tree of content nodes in which a user can traverse various branches and nodes to find the desired content. For example, the first level of a hierarchical tree may present various high level topics, such as cars or homes. The user may find the content they are looking for at this general level, or they may traverse down the hierarchy to a more specific level, such as exploring the cars topic which may contain various makes of cars, such as Ford or Ferrari. If the user does not find the content they desire at this level, the user may continue down the hierarchy to more specific topics until they obtain the content they are looking for.
One problem with both of these search strategies is that the content provided to the user includes no correlation to tile an count of trust a user may have for the authors of the content provided. Although the information may be presented to the user based on the amount of key words found in the content, or based on the number of times a piece of content gets accessed by others, the prior art does not allow content to be based on the trust levels of the individual user. The result is that the user has no way of knowing whether they will personally appreciate the content presented to them. Even though a piece of content includes a high percentage of key words used in a search, or is frequently accessed by others, that does not mean a particular individual will find the content desirable. On the other hand, if the particular user trusts an author for providing a certain type of information, it is highly likely the user will find other content authored by that author very desirable. What is needed is a method for providing content to a user which has a high likelihood it will be appreciated by a particular user. The method would need to keep track of individual users to provide content structured based on the individual user preferences. In addition, the method would need to be able to present content to a user in such a .fashion as to allow the user to immediately identify content having a high likelihood of being desirable to the user.
SUMMARY OF THE INVENTION
The present invention fills these needs by providing a computer implemented method that organizes content for a particular user based on the particular user's Trust Levels for various authors of content. In one embodiment, the invention relates to a method for organizing a pool of content for a user. The method comprises maintaining a common pool database which includes a plurality of content data, with each piece of content having at least one author associated with it. The method further includes maintaining a user database which includes user trust data. The user trust data includes user Trust Levels for authors of content included in the common pool database. Next, a new content database and content presentation structure are generated for a user based on the user trust data of the user. In another embodiment, a distributed computing system for organizing a pool of content is disclosed, lip this embodiment, a common pool data base is used store a plurality of content data with each piece of content having at least one author associated therewith. The system further includes a user database for storing user trust data. The user trust data includes user Trust Levels for authors of content included its the common pool database. Finally, the system includes a system process having logic for generating a content database and content presentation structure for a user based on the user trust data of the user.
A computer program for organizing a pool of content for a user is disclosed in yet another embodiment of the present invention. The computer program includes a code segment that maintains a common pool database which includes a plurality of content data, with each piece of content having at least one author associated with it. The computer program further includes a code segment that maintains a user database which includes user trust data. The user trust data includes user Trust Levels of authors of content included in the common pool database. Finally, the computer program includes a code segment that generates a content database and content presentation structure for a user based on the user trust data of the user.
In another embodiment, the invention relates to a method for organizing a listing of performances for a user. The method comprises maintaining a common pool database which includes a plurality of performance data for television/cable shows, with each piece of performance data having at least one author, such as a writer or director, associated with it. The method further includes maintaining a user database which includes user trust data. The user trust data includes user Trust Levels for authors of performance data included in the common pool database. Next, a new performance database and performance listing presentation structure are generated for a user based on the user trust data of the user. In this manner, users are able to easily determine performances they are likely to enjoy.
Advantageously, the use of user Trust Levels for authors allows the presentation of content to be structured to specifically suit a particular individual. Content from highly trusted authors may be placed in more prominent positions in the presentation data structure. Furthermore, chat room environments may be structured to simulate the actual experience of having a conversation with friends in a crowded room. Moreover, the use of Trust Levels allows an email presentation to be structured to allow messages from highly trusted individuals to take precedence over messages from lower trusted individuals. These and other advantages of the present invention will become apparent upon reading the following detailed descriptions and studying the various figures of the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention, together with further advantages thereof, may best be understood by reference to the following description taken in conjunction with the accompanying drawings in which:
Figure 1 is a chart illustrating, components included in the Trust model according to one embodiment of the present invention;
Figure 2 is a chart showing various ways Trust Levels may be created in accordance with another embodiment of the present invention;
Figure 3 is a flowchart showing a method for creation of a Trust Level using explicit declaration by a user, in accordance with yet another embodiment of the present invention;
Figure 4 is a flowchart showing a method for creation of a Trust Level based on a user making evaluations of content from an author, in accordance with one aspect of the present invention;
Figure 5 is a flowchart showing a method for creation of a Trust Level based on transitive assignment with decay, in accordance with another aspect of the present invention;
Figure 6 is a flowchart showing a method for creation of a Trust Level based on observing commonalties in patterns between two or more users, in accordance with another aspect of the present invention; Figure 7 is a flowchart showing a method for creation of a Trust Level based on membership in a group, in accordance with yet another aspect of the present invention; Figure 8 is a diagram showing the flow of Trust information, in accordance with one embodiment of the present invention;
Figure 9 is a flowchart showing a method for organizing a pool of content for a user, according to another embodiment of the present invention; Figure 10 is an illustration showing a common pool default data structure restructured for a user based on the user's Webs of Trust data, in accordance with another embodiment of the present invention;
Figure 1 1 is an illustration showing a content presentation structured based on a user's Webs of Trust, in accordance with yet another embodiment of the present invention;
Figure 12 is an illustration showing the use of Webs of Trust for a chat room, in accordance with another embodiment of the present invention; and
Figure 13 is an illustration showing a distributed computing system for organizing content data based on Trust relationships, in accordance with another aspect of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
An invention is described for organizing content based on a user's trust level for specific authors. This content may be anything created by an author, and includes, for example, books, articles, art, and/or web pages. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be obvious, however, to one skilled in the art that the present invention may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order not to unnecessarily obscure the present invention.
In accordance with one aspect of the present invention, the aforementioned problem of individualized trust based content organization is addressed by the use of a "Trust" level model. Trust level, as used in the present application, is a way of ranking the confidence level a user has for a specific author in relation to a specific topic. Figure 1 is a chart illustrating components included in a preferred trust model of the present invention. As shown in Figure 1 , the relationship between a user 2 and an author 4 is based on a Trust Level 10. The Trust Level 10 includes a Topic Relevancy 12 and Confidence Levels 14. Topic Relevancy 12 includes at least one topic 16, while the Confidence Levels 14 include a number of confidence levels 18 associated with the topics 16. In this manner, each topic 16 has a related confidence level 18 which indicates the confidence the user 2 has for the author 4 in relation to a particular topic 16. The present invention allows the Trust Level 10 a user 2 has for a particular author 4 to be utilized for organizing and ranking content generated by the author 4. Moreover, different topics 16 may generate different Trust Levels 10 between a user 2 and an author 4. For example, a user may have a very high Trust Level 10 for a specific author in relation to automobiles, and a very low Trust Level 10 for the author in relation to scuba diving. The Trust model of the present invention reflects this by assigning specific confidence levels 18 to specific related topics 16. The collection of Trust Levels 10 a user 2 has for various authors 4 is called the user's "Webs of Trust." Thus, by utilizing a user's 2 Webs of Trust, content may be organized to provide content to a user ranked according to the user's trust for various authors, as will be described in more detail below.
Figure 2 is a chart showing various ways Trust Levels may be created, in accordance with another embodiment of the present invention. These include Explicit Declaration By the User 100, Content Evaluations 200, Transitive Assignment 300, Commonalties 400, and Group Membership 500. By using these methods, collectively and/or individually, Webs of Trust may be created for a particular user based on the users selections, actions, and the actions of selected other users. Each of these methods will now be described with reference to Figures 3-7.
Figure 3 is a flowchart showing a method 100 for creation of a Trust Level using explicit declaration by a user, in accordance with one aspect of the present invention. The method 100 begins with a start operation 102, wherein various predeclara'tion operations take place. These operations may include creation of a user database, user logon, and other operations as will be obvious to those skilled in the art.
In an interface operation 104, a user input interface is proved to the user. The input interface is preferably designed to allow the user to input information concerning the amount of confidence the user has for an author. Thus confidence may be a general confidence, i.e., concerning all topics, a particular topic, or a group of topics. Furthermore, either the topic, the author, or both may be entered explicitly, or may be inferred from the context in which the user input is obtained. For example, while examining a specific piece of content, the user may explicitly input confidence for the author. The identity of the author could be inferred from the context, i.e., the author of the content. In addition, the related topic may also be inferred from the content topic. Next, in a receive data operation 106, the information entered by the user is received. This information is then used to update a user database in an update operation 108. The update operation 108 includes updating user trust data included in the user database. Finally, in operation 110, the user trust data can be used to organize content ranked according to the user's trust for various authors.
Figure 4 is a flowchart showing a Method 200 for creation of a Trust Level based on a user making evaluations of content generated by an author, in accordance with another aspect of the present invention. In an initial operation 202, various preevaluation operations take place. These operations include creation of a user database, creation of a content pool, and other operations as will be obvious to those skilled in the art.
In an input operation 204, a user input interface is Provided for content evaluation. The input interface is preferably desired to allow the user to input information concerning the users evaluation of selected content. The content may be selected by the user, or inferred from the context in which: the user input is obtained. For example, when a user is examining a particular piece of content, the selected content may be erred to be the content currently being examined. Then, in a receive operation 206, the information entered by the user is received.
Next, in a Trust Level determination operation 208, the Trust Level for an author associated with the selected content is determined. Operation 208 includes first determining an associated author for the selected content. Since an associated author is typically listed with evaluated content, the author can generally be determined by looking up the author listed in the selected content. Second, a Trust Level for the author is determined by determining a topic associated with the content and a confidence level based on the evaluation of the content. As above, the topic associated with the content can be inferred from the context of the content. The evaluation of the content is then used to determine a confidence level for the associated author in relation to the determined topic, the better the evaluation of the content, the higher the related confidence level for the author. This information is then used to update a user database in an update operation 210.
The update operation 210 includes updating user trust data included in the user database. Finally, in operation 212, the user, trust data can be used to organize content ranked according to the user's trust for various authors.
Figure 5 is a flowchart showing a method 300 for creation of a Trust Level based on transitive assignment with decay, in accordance with another aspect of the present invention. In an initial operation 302, various pre-declaration operations take place. These operations include author and content evaluations from other users, and other operations as will be obvious to those skilled in the art.
In an input operation 304, a user input interface is proved to a first user. The input interface is preferably designed to allow the first user to input information concerning the Trust Level the user has for a second user. This Trust Level may be a general confidence concerning all topics, a particular topic, or a group of topics. By entering a Trust level for a second user, the first user is declaring trust for the second user.
In a first Trust Level operation 306, the first user's Trust Levels are determined for authors trusted by the second user. Generally, all authors trusted by the second user are then trusted by the first user. The Trust Levels for each of these authors is based on both the Trust Level the second user has for that author, and on the Trust Level the first user has for the second user. Preferably, these Trust Levels are decayed, resulting in the first user's
Trust Levels for the authors being less than that of the second user's Trust Levels for the authors. Next, in a subsequent Trust Level operation 308, the first user's Trust Levels are determined for authors trusted by a third user trusted be the second user. Similar to the first
Trust Level operation 306, generally all authors trusted by the third user are then trusted by the first user. The Trust Levels for each of these authors is based on: a) the Trust Level the third user has for that author, b) the Trust Level the second user has for the third user, and c) the Trust Level the first user has for the second user. Preferably, these Trust Levels are decayed, resulting in the first user's Trust Levels for the authors being less than that of the second user's Trust Levels for the authors, which, in turn, is less than that of the third users trust for the authors. Operation 308 is carried out for each user the second user trusts.
Furthermore, operation 308 is repeated for each of these further removed users as well, and for users they trust, and so on.
Finally, in operation 310, the user trust data can be used to organize content ranked according to the user's trust for the various authors. Method 300 simulates word of mouth trust in the real world, when one friend tells another friend, and so on. With each person removed from the current user, the Trust Level lessens, representing higher trust for those close to the user, and lesser trust for those not close to the user. Furthermore, method 300 illustrates one method for updating a user's Webs of Trust through the actions of others, i.e., when others alter their Trust Levels, the Trust Levels of the current user can be altered. Turning next to Figure 6, a method 400 for creation of a Trust Level based on observing commonalties in patterns between two or more users is shown, in accordance with yet another aspect of the present invention. In an initial operation 402, various preevaluation operations take place. These operations include author and content evaluations from other users, and other operations as will be obvious to those skilled in the art.
In an input operation 404, a user input interface is provided for content evaluation. The input interface is preferably designed to allow a first user to input information concerning the first users evaluation of selected content. The content may be selected by the first user, or inferred from the context in which the user input is obtained. For example, when a user is examining a particular piece of content, the selected content may be inferred to be the content currently being examined.
In a compare operation 406, the user content evaluations obtained from step 404 and from previous content evaluations by the first user, are compared to content evaluations from a second user. Next', in a selecting operation 408, the second user is flagged if a predetermined threshold number of commonalties exist between the first user content evaluations and the second user content evaluations. A selected second user represents a user in which the first user is likely to share points of view with, and the two are likely to trust the same individuals. In a Trust determination operation 410, a Trust Levels for authors trusted by second user are determined for the first user. Generally, authors trusted by the second user are then trusted by the first user. Preferably, these Trust Levels are decayed, resulting in the first user's Trust Levels for the authors being less than that of the second user's Trust Levels for the authors. Furthermore, this operation may be combined with method 300, and further Trust Levels determined by transitive assignment with decay.
Finally, in operation 412, the user trust data can be used to organize content ranked according to the user's trust for the various authors. Figure 7 is a flowchart showing a method 500 for creation of a Trust Level based on membership in a group, in accordance with another aspect of the present invention. In an initial operation 502, various pre-declaration operations take place. These operations include author arid content evaluations from other groups, and other operations as will be obvious to those skilled in the art.
In an input operation 504, a user input interface is proved to a first user. The input interface is preferably designed to allow the user to input information concerning the Trust Level the user has for a group. This Trust Level may be a general confidence concerning all topics, a particular topic, or a group of topics. By entering a Trust level for a group, the user is declaring trust for the group.
In a Trust Level determination operation 506, the user's Trust Levels are determined for authors trusted by the group. Generally, all authors trusted by the group are then trusted by the user. The Trust Levels for each of these authors is based on both the Trust Level the group has for that author, and on the Trust Level the user has for the group. Preferably, these Trust Levels are decayed, resulting in the user's Trust Levels for the authors being less than that of the group's Trust Levels for the authors.
Finally, in operation 508, the user trust data can be used to organize content ranked according to the user's trust for the various authors. Method 500 simulates a user's similar points of view as that o£ the groups to which the user belongs. Furthermore, since the present invention typically treats groups like individual entities, methods 100-400 may generally use a group as one of the users.
Referring next to Figure 8, a diagram showing the flow of Trust information is shown, in accordance with one embodiment of the present invention. As the diagram shows, the present invention includes a common pool database 50 and a user database 52. The common pool database 50 includes a plurality of content data 54, each associated with at least one author 55. The content data 54 may include the actual authored data, such as an article, or a link to the authored data, such as a URL, post address, or any other means to enable contact with the authored content. For example, content data 54 may represent physical paintings by an artist (author). In this case, the actual content data 54 may include a digital picture of the art, a URL to where the art may be ordered, or a post address to order the piece of art. The user database 52 includes a plurality of user trust data 56. Each user trust data 56 includes Trust Levels associated with an individual user. The Trust Levels include Trust Levels for authors 58, and Trust Levels for other users or groups 60. Trust information, in the form of Explicit Declarations 100, Content Evaluations 200, Transitive Assignment 300, Commonalties 400, and Group Membership 500, flows into a user database 52. The Trust information is then used to create the various Trust Levels 58 and 60, as explained above with reference to Figures 2-7. The Trust Levels for an individual user are then used to generate a content database and content presentation structure for a the user, as described below. Figure 9 is a flowchart showing a method 600 for organizing a pool of content for a user, according to one embodiment of the present invention. In an initial operation 602, system initialization operations are performed, such as generating a content pool database, generating a user database, and other initial operations that will be obvious to those skilled in the art. In a contribution operation 604, contributors transmit content into a common pool database. Preferably all content transmitted to the common pool database includes at least one associated author who generated the content. Authors include, but are not limited to, literary authors, artists, groups, and corporations.
Next, in operation 606, the content stored in the common pool database is structured according to a default data structure. This can be any data structure suitable for storing the particular type of content in the common pool database. For example, in the case of a chat database, content may be stored as a list based on temporal priority. In the case an article database, content may be stored in a hierarchical tree based on topics. The appropriate default data structure for a particular data type will be obvious to those skilled in the art.
In a content structuring operation 608, a content database is generated from the content in the common pool. The content database is structured specifically for the user based on the user trust data of the user. Preferably, content generated by an author having a high Trust Level with respect to the user is ranked higher in the data structure than content generated by an author having a lower Trust Level with respect to the user. For example, when organizing a content database of articles, articles generated by authors having a high Trust Level with respect to the user may be listed before other articles. Finally, in operation 610, the user may utilize the structured content presentation to obtained needed information. Since the content presentation is structured such that content from trusted authors takes precedence over other content, the user can easily find and utilize desired information, as illustrated further in Figures 10-12. Figure 10 is an illustration showing a common pool default data structure restructured for a user based on the user's Webs of Trust data, in accordance with another embodiment of the present invention. One example of a common pool default data structure is a hierarchical tree 70 of nodes 72 and directories 74. In this example each node 72 represents a link to an article, however, in other embodiments nodes 72 can represent anything enabling a user to obtain information from an author, as described above. In addition, each directory 74 contains links to other, more topic specific directories and nodes. For example, a cars directory may contain links to general articles and directories on cars. One of these directories may be "Corvettes" and lead to articles and directories on the more specific car topic "Corvettes." Continuing with the example, the Corvettes directory may lead to a "Convertible Corvettes" directory, which in turn, may lead to an article on "1998" convertible Corvettes.
Using Webs of Trust for a specific user, the present invention may restructure the default common pool data structure 70 into a new content database structure 76 to more particularly suit the user. For example, if a particular user had a high Trust Level for the author of the article on "1998 Convertible Corvettes" 78, that article 78 may be placed in a higher level in the content database structure 76, for example, at the level of articles on general Corvettes.
Figure 11 is an illustration showing a content presentation structured based on a user's Webs of Trust, in accordance with yet another embodiment of the present invention. A default content presentation 80, based on the default common pool data structure, includes a presentation of nodes 72 at a particular level of the hierarchical tree, in this case the "Corvette" level. As is shown, the nodes 72 concern general information on Corvettes. As described above, using the Using Webs of Trust for a specific user, the present invention may restructure the default common pool data structure 70 into a new content database structure 76 to more particularly suit the user. A new content presentation 82, based on a new content database structure, includes a presentation of nodes 72 as in the default content presentation 80. However, as in Figure 10, if the user has a high Trust Level for the author of the article on "1998 Convertible Corvettes" 78, that article 78 may be placed in a higher level in the content presentation structure 82, for example, at the level of articles on general Corvettes.
Referring next to Figure 12, an illustration showing the use of Webs of Trust for a chat room is shown, in accordance with one aspect of the present invention. In a standard chat environment 90, messages received from others in the chat room are all listed for the user, generally, in reverse temporal order, with the newer messages above older messages. Thus, if a chat user has friends 92, messages from the friends 92 will be interlaced with messages from strangers 94, depending on the temporal order in which the messages are received.
In a chat environment based on Webs of Trust 96, messages may be listed in an order based on the user's Webs of Trust. For example, if the user sets high Trust Levels for their friends 92, messages from the friends 92 will be listed before messages from strangers 94. Messages from individuals at the same Trust Level typically are listed in reverse temporal order, as in a standard chat environment. Furthermore, a Webs of Trust chat environment is preferably designed such that Trust Level constraints are relaxed over time when no trusted individuals are transmitting messages. In this manner, the Webs of Trust chat environment represents a group of friends talking in a crowded room. As long as someone in the group is talking the other group members hear that person above all others. When no one in the group is talking, group members will start over hearing other conversations.
Figure 13 is an illustration showing a distributed computing system 1300 for organizing content data based on Trust relationships, in accordance with another aspect of the present invention. The distributed computing system 1300 includes a server 1302, client users 1304, and a network 1306, such as the Internet. The server 1302 includes a content database 1308, a system process 1310, and a user database 1312. The content database 1308 includes submitted content wherein each piece of content includes at least one author. The content database 1308 is coupled to the system process 1310 which includes the logic for creating and updating Webs of Trust for users. The system process 1310 also includes logic for generating content databases and content presentation structures for users. Also coupled to the system process 1310 is the user database 1312. The user database 1312 includes user trust information, which is utilized by the system process 1312 to generate content databases and content presentation structures for users.
In use, a user 1304 can connect with the server 1302 through the network 1306. This is typically accomplished using a browser and the Internet. Once a connection is established, the user can request information from the system process 1310. The system process 1310 then utilizes the content database 1308 in conjunction with the user database 1312 to generate new content database particularly structured for the individual user 1304. In this manner, a content presentation for user 1 may be completely different from a content presentation for user 2, even though each user requested the same information. Because user 1 and/or 2 may have different Trust Levels for different authors, the content presented to each user may take a different form. In one embodiment of the present invention, the same request from different users will generate the same pool of content, however, the pool of content will be structured differently for each user based on the users Webs of Trust. It should be noted that the Webs of Trust model of the present invention may be used to organize any type data needed by a user. Examples include, but are not limited to, email, search results, marketing, chat rooms, e-commerce listings, and television/cable/satellite performance listings. For example, the Webs of Trust model may be utilized to organize scheduled television/cable performances listings. In this case, a Webs of Trust based performance listing may list performances by the most trusted authors before other performance listings.
While this invention has been described in terms of several preferred embodiments, there are many alterations, permutations, and equivalents which fall within the scope of this invention. It should also be noted that there are many alternative ways of implementing the methods and apparatuses of the present invention. It is therefore intended that the following appended claims be interpreted as including all such alterations, permutations, and equivalents as fall within the true spirit and scope of the present invention

Claims

WHAT IS CLAIMED IS:
1. A computer implemented method for organizing a pool of content for a user, the method suitable for use in a distributed computing environment, the method comprising the acts of: maintaining a common pool database including a plurality o£ content data, wherein each content data includes at least one associated author of the content; maintaining a user database including at least one user trust data, wherein each user trust data is associated with a user, and wherein each user trust data includes a user trust level for at least one of the authors of content; and generating a content database and content presentation structure for a user based on the user trust data for the user
2. A computer implemented method as recited in claim 1, further comprising the act of determining a user trust level for an author based on a rating the user assigns to the author.
3. A computer implemented method as recited in claim 1 , further comprising the act of determining a user trust level for an author based on a rating the user assigns to content data associated with the author.
4. A computer implemented method as recited in claim 1 , further comprising the act of determining a first user trust level associated with a first user and an author based on a second user trust level a second user has for the author and a trust level the first user has for the second user.
5. A computer implemented method as recited in claim 1, further comprising the act of determining a first user trust level associated with a first user and an author based on commonalties between the first user and a second user.
6. A computer implemented method as recited in claim 1 , further comprising the act of determining a user trust level associated with a first user and an author based on the group membership of the user.
7. A computer implemented method as recited in claim 1 , wherein the user is a group entity.
8. A computer implemented method as recited in claim 1, wherein the content presentation structure concerns articles evaluating of products.
9. A computer implemented method as recited in claim 1, wherein the content presentation structure concerns a chat environment.
10. A computer implemented method as recited in claim 1, wherein the content presentation structure concerns search results.
11. A computer implemented method as recited in claim 1 , wherein the content presentation structure concerns a email.
12. A distributed computing system for organizing a pool of content for a user, the system comprising: a common pool database including a plurality of content data, wherein each content data includes at least one associated author of the content; a user database including at least one user trust data, wherein each user trust data is associated with a user, and wherein each user trust data includes a user trust level for at least one of the authors of content; and a system process having logic for generating a content database and content presentation structure for a user based on the user trust data for the user.
13. A distributed computing system as recited in claim 12, wherein the system process further includes logic for determining a user trust level for an author based on a rating the user assigns to the author.
14. A distributed computing system as recited in claim 12, wherein the system process further includes logic for determining a user trust level for an author based on a rating the user assigns to content data associated with the author.
15. A distributed computing system as recited in claim 12, wherein the system process further includes logic for determining a first user trust level associated with a first user and an author based on a second user trust level a second user has for the author and a trust level the first user has for the second user.
16. A distributed computing system as recited in claim 12, wherein the system process further includes logic for determining a first user trust level associated with a first user and an author based on commonalties between the first user and a second user.
17. A distributed computing system as recited in claim 12, wherein the system process further includes logic for determining a user trust level associated with a first user and an author based on the group membership of the user.
18. A distributed computing system as recited in claim 12, wherein the user is a group entity.
19. A distributed computing system as recited in claim 12, wherein the content presentation structure concerns articles evaluating of products.
20. A distributed computing system as recited in claim 12, wherein the content presentation structure concerns a chat environment.
21. A distributed computing system as recited in claim 12, wherein the content presentation structure concerns search results.
22. A distributed computing system as recited in claim 12, wherein the content presentation structure concerns a email.
23. A computer program embodied on a computer readable medium for organizing a pool of content for a user, the computer program suitable for use in a distributed computing environment, the computer program comprising: a code segment that maintains a common pool database including a plurality of content data, wherein each content data includes at least one associated author of the content; a code segment that maintains a user database including at least one user trust data, wherein each user trust data is associated with a user, and wherein each user trust data includes a user trust level for at least one of the authors of content; and, a code segment that generates a content database and content presentation structure for a user based on the user trust data for the user.
24. A computer program as recited in claim 23, further comprising a code segment that determines a user trust level for an author based on a rating the user assigns to the author.
25. A computer program as recited in claim 23, further comprising a code segment that determines a user trust level for an author based on a rating the user assigns to content data associated with the author.
26. A computer program as recited in claim 23, further comprising a code segment that determines a first user trust level associated with a first user and an author based on a second user trust level a second user has for the author and a trust level the first user has for the second user.
27. A computer program as recited in claim 23, further comprising a code segment that determines a first user trust level associated with a first user and an author based on commonalties between the first user and a second user.
28. A computer program as recited in claim 23, further comprising a code segment that determines a user trust level associated with a first user and an author based on the group membership of the user.
29. A computer program as recited in claim 23, wherein the user is a group entity.
30. A computer program as recited in claim 23, wherein the content presentation structure concerns articles evaluating of products.
31. A computer program as recited in claim 23, wherein the content presentation structure concerns a chat environment.
32. A computer program as recited in claim 23, wherein the content presentation structure concerns search results.
33. A computer program as recited in claim 23, wherein the content presentation structure concerns an email.
34. A method for organizing a listing of performances for a user, the method suitable for use in a visual communication environment, the method comprising the acts of: maintaining a common pool database including a plurality of performance data, wherein each performance data includes at least one associated author of the performance; maintaining a user database including at least one user trust data, wherein each user trust data is associated with a user, and wherein each user trust data includes a user trust level for at least one of the authors of performance data; and generating a performance database and performance listing presentation structure for a user based on the user trust data for the user, whereby the user may easily determine performances the user is likely to enjoy.
35. A method as recited in claim 34, further comprising the act of recording performances chosen based on the performance listing presentation structure.
36. A method as recited in claim 34, wherein the performance data includes television show listings.
37. A method as recited in claim 34, wherein the performance data includes cable performance listings.
38. A method as recited in claim 34, wherein the performance data includes satellite performance listings.
39. A method as recited in claim 1 wherein each user trust data further includes at least one qualification of the area of trust.
PCT/US2000/023193 1999-08-25 2000-08-23 Methods and systems for presenting information in a distributed computing environment WO2001015002A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU69314/00A AU6931400A (en) 1999-08-25 2000-08-23 Methods and systems for presenting information in a distributed computing environment
CA002349613A CA2349613A1 (en) 1999-08-25 2000-08-23 Methods and systems for presenting information in a distributed computing environment
JP2001519291A JP2004500621A (en) 1999-08-25 2000-08-23 Systems and methods for presenting information in a distributed computing environment
GBGB0110027.0A GB0110027D0 (en) 1999-08-25 2001-04-24 Methods and sytems for presenting information in a distributed computing environment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US38256599A 1999-08-25 1999-08-25
US09/382,565 1999-08-25

Publications (2)

Publication Number Publication Date
WO2001015002A2 true WO2001015002A2 (en) 2001-03-01
WO2001015002A3 WO2001015002A3 (en) 2004-02-19

Family

ID=23509533

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/023193 WO2001015002A2 (en) 1999-08-25 2000-08-23 Methods and systems for presenting information in a distributed computing environment

Country Status (5)

Country Link
JP (1) JP2004500621A (en)
AU (1) AU6931400A (en)
CA (1) CA2349613A1 (en)
GB (1) GB0110027D0 (en)
WO (1) WO2001015002A2 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7310612B2 (en) 2003-08-13 2007-12-18 Amazon.Com, Inc. Personalized selection and display of user-supplied content to enhance browsing of electronic catalogs
US7433832B1 (en) 1999-11-19 2008-10-07 Amazon.Com, Inc. Methods and systems for distributing information within a dynamically defined community
US7769594B2 (en) 2003-09-05 2010-08-03 France Telecom Evaluation of reputation of an entity by a primary evaluation centre
US7991650B2 (en) 2008-08-12 2011-08-02 Amazon Technologies, Inc. System for obtaining recommendations from multiple recommenders
US7991757B2 (en) 2008-08-12 2011-08-02 Amazon Technologies, Inc. System for obtaining recommendations from multiple recommenders
US8001003B1 (en) 2007-09-28 2011-08-16 Amazon Technologies, Inc. Methods and systems for searching for and identifying data repository deficits
US8108255B1 (en) 2007-09-27 2012-01-31 Amazon Technologies, Inc. Methods and systems for obtaining reviews for items lacking reviews
US8122020B1 (en) 2005-11-17 2012-02-21 Amazon Technologies, Inc. Recommendations based on item tagging activities of users
US8140380B2 (en) 2001-04-24 2012-03-20 Amazon.Com, Inc. Creating an incentive to author useful item reviews
US8180689B2 (en) 1999-04-09 2012-05-15 Amazon.Com, Inc. Services for enabling users to share information regarding E-commerce transactions
US8260787B2 (en) 2007-06-29 2012-09-04 Amazon Technologies, Inc. Recommendation system with multiple integrated recommenders
US20130014266A1 (en) * 2011-07-07 2013-01-10 Mitel Networks Corporation Collaboration privacy
US8751507B2 (en) 2007-06-29 2014-06-10 Amazon Technologies, Inc. Recommendation system with multiple integrated recommenders

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9812046B2 (en) * 2013-01-10 2017-11-07 Microsoft Technology Licensing, Llc Mixed reality display accommodation
JP2022021099A (en) * 2020-07-21 2022-02-02 ソニーグループ株式会社 Information processing program, information processing apparatus and information processing method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5867799A (en) * 1996-04-04 1999-02-02 Lang; Andrew K. Information system and method for filtering a massive flow of information entities to meet user information classification needs
WO1999035830A1 (en) * 1998-01-08 1999-07-15 Thomson Licensing S.A. Video program guide apparatus and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5867799A (en) * 1996-04-04 1999-02-02 Lang; Andrew K. Information system and method for filtering a massive flow of information entities to meet user information classification needs
WO1999035830A1 (en) * 1998-01-08 1999-07-15 Thomson Licensing S.A. Video program guide apparatus and method

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8180689B2 (en) 1999-04-09 2012-05-15 Amazon.Com, Inc. Services for enabling users to share information regarding E-commerce transactions
US9747629B2 (en) 1999-04-09 2017-08-29 Amazon.Com, Inc. Services for enabling users to share information regarding E-commerce transactions via user created communities
US8744929B2 (en) 1999-04-09 2014-06-03 Amazon.Com, Inc. Services for enabling users to share information regarding E-commerce transactions
US7433832B1 (en) 1999-11-19 2008-10-07 Amazon.Com, Inc. Methods and systems for distributing information within a dynamically defined community
US7664669B1 (en) 1999-11-19 2010-02-16 Amazon.Com, Inc. Methods and systems for distributing information within a dynamically defined community
US8229782B1 (en) 1999-11-19 2012-07-24 Amazon.Com, Inc. Methods and systems for processing distributed feedback
US7778890B1 (en) 1999-11-19 2010-08-17 Amazon Technologies, Inc. Methods and systems for distributing information within a dynamically defined community
US8140380B2 (en) 2001-04-24 2012-03-20 Amazon.Com, Inc. Creating an incentive to author useful item reviews
US7536320B2 (en) 2003-08-13 2009-05-19 Amazon.Com, Inc. Method, system, and computer readable medium for the selection of content items for presentation to users
US7765130B2 (en) 2003-08-13 2010-07-27 Amazon.Com, Inc. Personalization using multiple personalized selection algorithms
US7310612B2 (en) 2003-08-13 2007-12-18 Amazon.Com, Inc. Personalized selection and display of user-supplied content to enhance browsing of electronic catalogs
US7769594B2 (en) 2003-09-05 2010-08-03 France Telecom Evaluation of reputation of an entity by a primary evaluation centre
US8122020B1 (en) 2005-11-17 2012-02-21 Amazon Technologies, Inc. Recommendations based on item tagging activities of users
US8577880B1 (en) 2005-11-17 2013-11-05 Amazon Technologies, Inc. Recommendations based on item tagging activities of users
US8260787B2 (en) 2007-06-29 2012-09-04 Amazon Technologies, Inc. Recommendation system with multiple integrated recommenders
US8751507B2 (en) 2007-06-29 2014-06-10 Amazon Technologies, Inc. Recommendation system with multiple integrated recommenders
US8108255B1 (en) 2007-09-27 2012-01-31 Amazon Technologies, Inc. Methods and systems for obtaining reviews for items lacking reviews
US8290811B1 (en) 2007-09-28 2012-10-16 Amazon Technologies, Inc. Methods and systems for searching for and identifying data repository deficits
US8566178B1 (en) 2007-09-28 2013-10-22 Amazon Technologies, Inc. Methods and systems for searching for and identifying data repository deficits
US9633388B2 (en) 2007-09-28 2017-04-25 Amazon Technologies, Inc. Methods and systems for searching for and identifying data repository deficits
US8001003B1 (en) 2007-09-28 2011-08-16 Amazon Technologies, Inc. Methods and systems for searching for and identifying data repository deficits
US8249948B1 (en) 2008-08-12 2012-08-21 Amazon Technologies, Inc. System for obtaining recommendations from multiple recommenders
US7991757B2 (en) 2008-08-12 2011-08-02 Amazon Technologies, Inc. System for obtaining recommendations from multiple recommenders
US8533067B1 (en) 2008-08-12 2013-09-10 Amazon Technologies, Inc. System for obtaining recommendations from multiple recommenders
US7991650B2 (en) 2008-08-12 2011-08-02 Amazon Technologies, Inc. System for obtaining recommendations from multiple recommenders
US20130014266A1 (en) * 2011-07-07 2013-01-10 Mitel Networks Corporation Collaboration privacy

Also Published As

Publication number Publication date
WO2001015002A3 (en) 2004-02-19
AU6931400A (en) 2001-03-19
GB0110027D0 (en) 2001-06-13
CA2349613A1 (en) 2001-03-01
JP2004500621A (en) 2004-01-08

Similar Documents

Publication Publication Date Title
US7321889B2 (en) Authoring and managing personalized searchable link collections
US7860852B2 (en) Systems and apparatuses for seamless integration of user, contextual, and socially aware search utilizing layered approach
RU2367997C2 (en) Improved systems and methods of document ranging based on structurally interrelated information
US9094472B2 (en) Web-based services for querying and matching likes and dislikes of individuals
US8589373B2 (en) System and method for improved searching on the internet or similar networks and especially improved MetaNews and/or improved automatically generated newspapers
US9189479B2 (en) Semantic web portal and platform
KR101150095B1 (en) Method, system, apparatus, and computer-readable storage medium for maintaining user privacy in a knowledge interchange system
US7428533B2 (en) Automatic generation of taxonomies for categorizing queries and search query processing using taxonomies
KR100936568B1 (en) Method and system for generating recommendations
US20110275047A1 (en) Seeking Answers to Questions
US20070255702A1 (en) Search Engine
WO2007044549A2 (en) Social discovery systems and methods
US8762394B1 (en) Method and apparatus for obtaining recommendations from trusted sources
US20060048047A1 (en) Online annotation management system and method
US20090228482A1 (en) Network search method, system and device
JP2014112407A (en) Search system and method integrating user judgement including trust network
WO2001015002A2 (en) Methods and systems for presenting information in a distributed computing environment
KR20060050486A (en) Method, system, and apparatus for creating a knowledge interchange profile
KR20060050484A (en) Method, system, and apparatus for receiving and responding to knowledge interchange queries
JP2002304419A (en) System and computer-based method for providing information converted in response to client search request
CN1157965A (en) System and method for automatically adding informational hypertext links to received documents
US20030149580A1 (en) Customized interaction with computer network resources
JPH113304A (en) Improved type discussion technique system
Macedo et al. Automatically sharing web experiences through a hyperdocument recommender system
US20100114989A1 (en) Automatic gleaning of semantic information in social networks

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AU CA CN DE ES GB IN JP

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): FR IT

ENP Entry into the national phase in:

Ref document number: 2349613

Country of ref document: CA

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2000957740

Country of ref document: EP

Ref document number: GB0110027.0

Country of ref document: GB

121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase in:

Ref document number: 2001 519291

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 200150033

Country of ref document: ES

Ref document number: P200150033

Country of ref document: ES

Ref document number: IN/PCT/2001/580/CHE

Country of ref document: IN

WWW Wipo information: withdrawn in national office

Ref document number: 2000957740

Country of ref document: EP

WWR Wipo information: refused in national office

Ref document number: 200150033

Country of ref document: ES

Kind code of ref document: A

122 Ep: pct application non-entry in european phase