SYSTEM AND METHOD FOR DYNAMICALLY GENERATING AND MANAGING AN ONLINE CONTEXT-DRIVEN INTERACTIVE SOCIAL NETWORK
First Claim
1. A method for protecting secure information when tracking actions used to generate recommendations, the method comprising:
- collecting explicit actions performed by a plurality of secondary users;
collecting implicit actions performed by a plurality of secondary users;
calculating the correlation between the explicit action and the implicit action;
generating a record of the collected explicit actions, the collected implicit actions, and the corresponding calculated correlations;
receiving an indication of a first action from a primary user;
identify a second action from the generated record that is correlated with the first action;
identifying a secondary user from the plurality of secondary users that has performed the second action;
determining whether the secondary user is performing a secure action; and
if the secondary user is not performing a secure action, providing a recommendation to the primary user, the recommendation including an identification of the secondary user.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for calculating recommendations for a user is described. One embodiment includes a method for collecting actions performed by a plurality of secondary users; calculating correlations between the collected actions; generating a record of the collected actions and the corresponding calculated correlations; receiving an indication of a first action from a primary user; identify a second action from the generated record that is correlated with the first action; identifying a secondary user from the plurality of secondary users that has performed the second action; determining whether the secondary user is performing a secure action; and if the secondary user is not performing a secure action, providing a recommendation to the primary user, the recommendation including an identification of the secondary user.
-
Citations
5 Claims
-
1. A method for protecting secure information when tracking actions used to generate recommendations, the method comprising:
-
collecting explicit actions performed by a plurality of secondary users;
collecting implicit actions performed by a plurality of secondary users;
calculating the correlation between the explicit action and the implicit action;
generating a record of the collected explicit actions, the collected implicit actions, and the corresponding calculated correlations;
receiving an indication of a first action from a primary user;
identify a second action from the generated record that is correlated with the first action;
identifying a secondary user from the plurality of secondary users that has performed the second action;
determining whether the secondary user is performing a secure action; and
if the secondary user is not performing a secure action, providing a recommendation to the primary user, the recommendation including an identification of the secondary user. - View Dependent Claims (2, 3, 5)
-
-
4. A method for protecting secure information when tracking actions used to generate recommendations, the method comprising:
-
receiving an indication that one of a plurality of secondary users is performing a secure action;
collecting actions performed the plurality of secondary users, not including the one of the plurality of secondary users;
calculating correlations between the collected actions;
generating a record of the collected actions and the corresponding calculated correlations;
receiving an indication of a first action from a primary user;
identify a second action from the generated record that is correlated with the first action;
identifying a secondary user from the plurality of secondary users that has performed the second action; and
providing a recommendation to the primary user, the recommendation including an identification of the secondary user.
-
Specification