Method and apparatus for obtaining recommendations from trusted sources
First Claim
1. A computer-implemented method comprising:
- receiving a request from a first user for recommendations;
comparing web visitation patterns of the first user and a second user;
identifying, from the comparison, a trust relationship between the first user and a second user, wherein the trust relationship includes a trust level that indicates a strength measurement for the trust relationship;
identifying one or more web sites visited by the second user exceeding a threshold number of visits;
identifying recommendations from the one or more web sites based on the trust relationship;
providing the identified recommendations to the first user; and
adjusting the trust level of the trust relationship between the first and the second users in response to subsequent interaction of the first user with one or more recommendations, wherein adjusting the trust level further includes decreasing the trust level between the first user and the second user when the first user does not follow at least one of the recommendations.
2 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of the present invention comprises a system that provides recommendations to a user. During operation, the system performs a computer-based lookup operation to identify trusted entities that the user trusts (or is likely to trust) to make recommendations. Next, the system performs another computer-based lookup operation to obtain recommendations associated with the identified trusted entities. The system then uses the obtained recommendations to provide recommendations to the user. In a variation on this embodiment, the system additionally receives information indicating that the user trusts recommendations associated with an entity. The system then stores a corresponding record for the trust relationship between the user and the trusted entity in a computer-based lookup structure to facilitate subsequently identifying trusted entities that the user trusts to make recommendations.
24 Citations
36 Claims
-
1. A computer-implemented method comprising:
-
receiving a request from a first user for recommendations; comparing web visitation patterns of the first user and a second user; identifying, from the comparison, a trust relationship between the first user and a second user, wherein the trust relationship includes a trust level that indicates a strength measurement for the trust relationship; identifying one or more web sites visited by the second user exceeding a threshold number of visits; identifying recommendations from the one or more web sites based on the trust relationship; providing the identified recommendations to the first user; and adjusting the trust level of the trust relationship between the first and the second users in response to subsequent interaction of the first user with one or more recommendations, wherein adjusting the trust level further includes decreasing the trust level between the first user and the second user when the first user does not follow at least one of the recommendations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 19, 22, 24, 25)
-
-
9. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform operations comprising:
-
receiving a request from a first user for recommendations; comparing web visitation patterns of the first user and a second user; identifying, from the comparison, a trust relationship between the first user and the second user, wherein the trust relationship includes a trust level that indicates a strength measurement for the trust relationship; identifying one or more web sites visited by the second user exceeding a threshold number of visits; identifying recommendations from the one or more web sites based in part on the trust relationship; providing the recommendations to the first user; and adjusting the trust level of the trust relationship between the first and second users in response to subsequent interaction of the first user with the one or more of the recommendations, wherein adjusting the trust level further includes decreasing the trust level between the first user and the second user when the first user does not follow at least one of the recommendations. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 20, 23, 26, 27)
-
-
17. A computer system comprising:
-
a processor; a memory; a receiving mechanism coupled to the processor, wherein the receiving mechanism is configured to receive a request from a first user for recommendations; a compare mechanism coupled to the processor, wherein the compare mechanism is configured to compare web visitation patterns of the first user and a second user; an identification mechanism coupled to the processor, wherein the identification mechanism is configured to identify, from the comparison, a trust relationship between the firs user and the second user, wherein the trust relationship includes a trust level that indicates a strength measurement for the trust relationship; a web visitation identification mechanism coupled to the processor, wherein the web visitation identification mechanism is configured to identify one or more web sites visited by the second user exceeding a threshold number of visits; a recommendation lookup mechanism coupled to the processor, wherein the recommendation lookup mechanism is configured to identify recommendations from the one or more web sites based in part on the trust relationship; a recommendation-providing mechanism coupled to the processor, wherein the recommendation-providing mechanism is configured to provide the recommendations to the first user; and a trust level adjusting mechanism coupled to the processor, wherein the trust level adjusting mechanism is configured to adjust the trust level of the trust relationship between the first and the second users in response to subsequent interaction of the first user with one or more of the recommendations, wherein trust level adjusting mechanism is further configured to decrease the trust level between the first user and the second user when the first user does not follow at least one of the recommendations. - View Dependent Claims (18, 21, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification