System and method for employing social networks for information discovery
First Claim
Patent Images
1. A computer-implemented system for utilizing a social network comprising:
- one or more processors;
one or more computer readable storage mediums maintaining computer-executable instructions that, when executed by the one or more processors, perform acts comprising;
receiving a plurality of buddy lists and personal information corresponding to a social network;
generating a plurality of directed subgraphs based on the buddy lists and the personal information, the directed subgraphs being subsets of a directed graph that functionally represents relationships between individuals and/or entities within the social network; and
encrypting the plurality of directed subgraphs to protect personal information returned as part of a search over the social network, wherein the encrypting encrypts a first portion of the directed graph and the encrypting further includes encrypting a second portion of the directed graph using a different encryption to provide layered encryption, the second portion comprising at least;
a part of the encrypted first portion of the graph; and
a part of the directed graph not included in the encrypted first portion.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided that enable searches of social networks by acting as a “compass” that assists users in navigating the social network. Individual user participation is not required in response to queries from other users. The systems and methods offer navigational assistance or information as opposed to a traditional search which returns requested information, thus currently acceptable social mechanisms for arbitrating trust can be exploited. As a result, users do not make their personal information publicly searchable, while at the same time, they are protected from potential misrepresentations of facts.
44 Citations
15 Claims
-
1. A computer-implemented system for utilizing a social network comprising:
-
one or more processors; one or more computer readable storage mediums maintaining computer-executable instructions that, when executed by the one or more processors, perform acts comprising; receiving a plurality of buddy lists and personal information corresponding to a social network; generating a plurality of directed subgraphs based on the buddy lists and the personal information, the directed subgraphs being subsets of a directed graph that functionally represents relationships between individuals and/or entities within the social network; and encrypting the plurality of directed subgraphs to protect personal information returned as part of a search over the social network, wherein the encrypting encrypts a first portion of the directed graph and the encrypting further includes encrypting a second portion of the directed graph using a different encryption to provide layered encryption, the second portion comprising at least; a part of the encrypted first portion of the graph; and a part of the directed graph not included in the encrypted first portion. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer implemented method that utilizes a social network represented by a database storing a collection of information about individuals and/or entities and intra-relationships there between, the method comprising:
-
receiving information for users of the social network, the information comprising attribute and relationship information; generating, by one or more processors, a directed graph of the social network by representing the individuals and/or entities as nodes and the relationship information as arcs interconnecting the nodes, the arcs having a directionality according to the relationship information received; and encrypting a portion of the directed graph to protect a portion of the relationship information, the portion of the directed graph being encrypted being less than the complete directed graph, wherein the portion of the directed graph that is encrypted is a first portion of the directed graph and the encrypting further includes encrypting a second portion of the directed graph using a different encryption to provide layered encryption, the second portion comprising at least; a part of the encrypted first portion of the graph; and a part of the directed graph not included in the encrypted first portion. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented method that utilizes a social network represented by a database storing a collection of information about individuals and/or entities and intra-relationships there between, the method comprising:
-
receiving information for users of the social network, the information comprising attribute and relationship information; generating, by one or more processors, a directed graph of the social network by representing the individuals and/or entities as nodes and the relationship information as arcs interconnecting the nodes, the arcs having a directionality according to the relationship information received; and encrypting a portion of the directed graph to protect a portion of the relationship information, the portion of the directed graph being encrypted being less than the complete directed graph, wherein the portion of the directed graph that is encrypted is a first portion of the directed graph and the encrypting further includes encrypting a second portion of the directed graph using a different encryption to provide layered encryption, the second portion comprising at least; a part of the encrypted first portion of the graph, and a part of the directed graph not included in the encrypted first portion.
-
Specification