VIRAL ENGINE FOR NETWORK DEPLOYMENT
First Claim
1. A network deployment method for building a membership based private network between users of a public communications network, the method comprising:
- receiving from a first member at least one identifier for a user of the public communications network, wherein the user is one of a member or a non-member of the private network;
determining, based at least in part on the identifier, whether the user is one of a member or a non-member of the private network;
requesting information from the user via a public communications protocol in response to determining that the user is a non-member of the private network;
receiving information from the non-member via the public communications network; and
populating at least part of a data object in a database record associated with the first member with the information received from the non-member, wherein the non-member is later contacted to request and to receive updates from the non-member to the information stored in the data object for the non-member.
1 Assignment
0 Petitions
Accused Products
Abstract
A private network system operates over a public network to provide an asymmetric service to members with information from other members and non-members. The system includes central servers and databases connected via the public network to client systems of public network users. The users may be members who communicate with a private protocol or non-members who communicate with the public protocol. A process for the private service includes communication of information between users via the private service servers. The private service server implements the private service, which includes a viral engine for network deployment. Features of the viral engine include genetic algorithms, data mining, personalization, frictionless service setup, user maximization, and member-controlled privacy. A sample setup process and contact update wizard that include several viral engine features are described.
-
Citations
23 Claims
-
1. A network deployment method for building a membership based private network between users of a public communications network, the method comprising:
-
receiving from a first member at least one identifier for a user of the public communications network, wherein the user is one of a member or a non-member of the private network; determining, based at least in part on the identifier, whether the user is one of a member or a non-member of the private network; requesting information from the user via a public communications protocol in response to determining that the user is a non-member of the private network; receiving information from the non-member via the public communications network; and populating at least part of a data object in a database record associated with the first member with the information received from the non-member, wherein the non-member is later contacted to request and to receive updates from the non-member to the information stored in the data object for the non-member. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing an asymmetric data sharing service to members of a private network and between users of a public network, the system comprising:
-
a server communicatively coupled to the public network and configured to communicate based on a public protocol and a private protocol, the server for implementing features of the asymmetric data sharing service by communicating with members of the private network based on the private protocol and by communicating with non-members based on the public protocol; and a database coupled to the server for storing information received from non-members in response to information requests sent by members for the non-members and for maintaining links between information shared among members of the private network permitting members to automatically receive updated information of other members when such an update is made, wherein the database is further configured for later receiving and storing updates to the information previously stored for the non-members in response to requests by the members to receive the updates. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method for deploying a network of computer users to exchange contact information, the method comprising:
-
identifying computer users associated with a first user for adding to a contact list of the first user by performing an analysis of possible contacts of the first user, the contact list comprising contact information for subset of the computer users; composing an invitation to join the network for transmission to the subset of computer users in the contact list, the invitation composed with a subset of aesthetic appeal related features selected from a variety of aesthetic appeal related features; requesting information from the subset of computer users in the contact list, the request comprising the invitation to join the network; repeatedly performing analysis of possible contacts of the first user to select computer users not members of the network; and providing a plurality of messages to the computer users within the first user'"'"'s set of contacts suggesting to the computer users to join the network. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification