System and method for providing calendar and speed dating features for matching users in a network environment
First Claim
1. A method, comprising:
- receiving a request at a communication broker for an electronic dating session to involve a first endpoint and a second endpoint, wherein the communication broker includes a processor and a memory element, and wherein the first endpoint is associated with a first end user and the second endpoint is associated with a second end user, both the first end user and the second end user are members of an online community associated with a matching service, and the first end user is associated with first end user data that personally identifies the first end user;
evaluating first calendar information for the first end user and second calendar information for the second end user;
reconciling the first calendar information with the second calendar information to provide a time slot for the electronic dating session; and
maintaining anonymity of the first end user data by mapping the first end user data to a first identity associated with the first end user, wherein the second endpoint is shown the first identity, and wherein the first end user data associated with the first endpoint is hidden from being shown to the second endpoint.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is provided in one example embodiment and includes receiving a request at a communication broker for a communication session to involve a first endpoint and a second endpoint, where the communication broker includes a processor and a memory element. The method may also include evaluating first calendar information for a first end user associated with the first endpoint and second calendar information for a second end user associated with the second endpoint. The method may also include reconciling the first calendar information with the second calendar information to provide a time slot for the communication session. Additionally, the method may include mapping first end user data to a first identity associated with the first end user, where the second endpoint is shown the first identity, and where the first end user data associated with the first endpoint is hidden from being shown to the second endpoint.
-
Citations
19 Claims
-
1. A method, comprising:
-
receiving a request at a communication broker for an electronic dating session to involve a first endpoint and a second endpoint, wherein the communication broker includes a processor and a memory element, and wherein the first endpoint is associated with a first end user and the second endpoint is associated with a second end user, both the first end user and the second end user are members of an online community associated with a matching service, and the first end user is associated with first end user data that personally identifies the first end user; evaluating first calendar information for the first end user and second calendar information for the second end user; reconciling the first calendar information with the second calendar information to provide a time slot for the electronic dating session; and maintaining anonymity of the first end user data by mapping the first end user data to a first identity associated with the first end user, wherein the second endpoint is shown the first identity, and wherein the first end user data associated with the first endpoint is hidden from being shown to the second endpoint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A communication broker, comprising:
a processor and a memory element, wherein the communication broker is configured to; receive a request for an electronic dating session to involve a first endpoint and a second endpoint, wherein the first endpoint is associated with a first end user and the second endpoint is associated with a second end user, both the first end user and the second end user are members of an online community associated with a matching service, and the first end user is associated with first end user data that personally identifies the first end user; evaluate first calendar information for the first end user and second calendar information for the second end user; reconcile the first calendar information with the second calendar information to provide a time slot for the electronic dating session; and maintain anonymity of the first end user data by mapping the first end user data to a first identity associated with the first end user, wherein the second endpoint is shown the first identity, and wherein the first end user data associated with the first endpoint is hidden from being shown to the second endpoint.
-
19. Logic encoded in one or more non-transitory tangible media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
receiving a request at an communication broker for an electronic dating session to involve a first endpoint and a second endpoint, wherein the communication broker includes a processor and a memory element, and wherein the first endpoint is associated with a first end user and the second endpoint is associated with a second end user, both the first end user and the second end user are members of an online community associated with a matching service, and the first end user is associated with first end user data that personally identifies the first end user; evaluating first calendar information for the first end user and second calendar information for the second end user; reconciling the first calendar information with the second calendar information to provide a time slot for the electronic dating session, wherein the reconciling occurs in advance of the time slot and the time slot is a future time slot at which the first end user and the second end user are mutually available; and maintaining anonymity of the first end user data by mapping the first end user data to a first identity associated with the first end user, wherein the second endpoint is shown the first identity, and wherein the first end user data associated with the first endpoint is hidden from being shown to the second endpoint.
-
Specification