Method and apparatus for internet-based human network brokering
First Claim
1. A computer-implemented method, comprising:
- autonomously, through one or more software agents, brokering matches between searchers and targets, said software agents being capable of finding one or more of said matches through chains of mutually trusted connections of said searchers and said targets; and
reporting said matches according to access control instructions provided to said software agents by said searchers and targets concerning levels of details of personal information of said searchers and targets and contacts thereof which may be revealed to others.
1 Assignment
0 Petitions
Accused Products
Abstract
Matches between search queries and potential targets of such search queries are automatically brokered by (i) comparing search criteria specified in the search queries with profile criteria describing the potential targets, and (ii) reporting instances of acceptable correspondence between the search criteria and the profile criteria, provided that access controls associated with the profile criteria of the targets permit such reporting in light of access levels assigned to the search inquiries. Initiators, using client applications at various remote locations, may formulate the search queries and the brokering may be performed at one or more server locations communicatively coupled (e.g., via the Internet) thereto. The profile criteria may include portions of rich descriptive profiles of the potential targets.
-
Citations
75 Claims
-
1. A computer-implemented method, comprising:
-
autonomously, through one or more software agents, brokering matches between searchers and targets, said software agents being capable of finding one or more of said matches through chains of mutually trusted connections of said searchers and said targets; and
reporting said matches according to access control instructions provided to said software agents by said searchers and targets concerning levels of details of personal information of said searchers and targets and contacts thereof which may be revealed to others. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
-
46. A computer network comprising:
-
one or more clients configured with client applications, said client applications each configured to permit users thereof to initiate search queries for potential targets specified by profile criteria including some or all of an individual'"'"'s capabilities, history, values, interests, style, goals, projects, human networks, contacts, profiles of said contacts, employment history, education history, organizational activities, organizations, profiles of said organizations, or compensation requirements; and
one or more servers communicatively coupled to some or all of said clients and to one or more of each other, and some or all thereof including a network broker configured to autonomously search for matches between said search queries and said potential targets of said search queries by comparing search criteria specified in said search queries with said profile criteria describing said potential targets and reporting instances of acceptable correspondence between said search criteria and said profile criteria where access controls associated with said profile criteria of said potential targets permit said reporting in light of access levels assigned to said search inquiries.
-
- 61. A set of computer-readable instructions embodied within a computer-readable medium, said computer-readable instructions comprising a method of autonomously brokering matches between search queries and potential targets of said search queries by comparing search criteria specified in said search queries with profile criteria describing said potential targets and reporting instances of acceptable correspondence between said search criteria and said profile criteria provided that access controls associated with said profile criteria of said potential targets permit said reporting in light of access levels assigned to said search inquiries.
Specification