Control and monetization of networking transactions
First Claim
1. A computer-implemented method for controlling networking transactions among a plurality of users populating a networking database, said networking database populated with at least user identity information and relational information between said plurality of users, said method comprising:
- receiving a request from a first user to perform a transaction;
determining a feasibility of said transaction based on at least a characteristic of said transaction, a characteristic associated with an identity of said first user, and said relational information;
when said transaction is feasible, monetizing said transaction including monetization possibilities such as variable pricing for said transaction and not charging for said transaction; and
after successful monetization of said transaction, initiating execution of said transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention teaches a variety of techniques and mechanisms for controlling and monetizing networking transactions among users of a computer network. At least some of these techniques and mechanisms come about as a result of several new paradigms contemplated by the present invention. One paradigm of the present invention involves monetizing user transactions as a function of relational patterns and connections between different users. Another paradigm of the present invention introduces a “virtual network” as a set of user having some predefined relational pattern. Once virtual networks are defined for a plurality of users, decisions regarding transactions can then be made based on the characteristics of the virtual network.
36 Citations
45 Claims
-
1. A computer-implemented method for controlling networking transactions among a plurality of users populating a networking database, said networking database populated with at least user identity information and relational information between said plurality of users, said method comprising:
-
receiving a request from a first user to perform a transaction;
determining a feasibility of said transaction based on at least a characteristic of said transaction, a characteristic associated with an identity of said first user, and said relational information;
when said transaction is feasible, monetizing said transaction including monetization possibilities such as variable pricing for said transaction and not charging for said transaction; and
after successful monetization of said transaction, initiating execution of said transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented method for controlling and monetizing transactions between users of a computer network, the method comprising:
-
receiving a request from a first user to initiate a transaction that is dependent upon a second user;
determining a relational connection between said first user and said second user; and
determining a cost of executing said requested transaction, said execution cost being a function of said relational connection. - View Dependent Claims (22, 23, 24)
-
-
25. A computer-implemented method for controlling transactions among a plurality of parties, said computer-implemented method comprising:
-
populating a database with a plurality of users, said database storing at least user identity information and relational information between said plurality of users;
organizing one or more virtual networks from said plurality of users;
defining a set of transaction rules for determining how to implement transactions among said plurality of parties, said set of transaction rules including rules which are decided based upon data represented in said one or more virtual networks;
receiving a request from a first party to execute a transaction with a second party, and processing said transaction request in a manner consistent with said set of transaction rules. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer-implemented method for controlling transactions among a plurality of parties, said computer-implemented method comprising:
-
populating a database with a plurality of users, said database storing at least user identity information, relational information between said plurality of users, and profile data for said plurality of users;
organizing one or more virtual networks from said plurality of users;
receiving a request from a first party to search said profile data; and
performing said search when said first party is a member of said database and said profile data has not been made private. - View Dependent Claims (34)
-
-
35. A computer-implemented method for controlling email transactions among a plurality of users, said computer implemented method comprising:
-
forming at least one virtual network from a plurality of users, the at least one virtual network being formed of member users, said member users consisting of all of said plurality of users that have a common predefined characteristic;
receiving from a specific party an email communication intended for delivery to a specific member user, determining whether said specific party is a member of said virtual network; and
prohibiting delivery of said email communication when said specific party is not a member of said virtual network. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42)
-
-
43. A computer database suitable for enabling transactions between a plurality of parties including a plurality of users, said computer database comprising:
-
unique identity information for each of said plurality of users;
relational information associated with each of said plurality of users, said relational information useful for determining whether any two users have a connection enabling at least one type of transaction between said two users, and said relational information useful for determining a degree of separation between said two users when said two users have said connection; and
virtual network information associated with each of said plurality of users, virtual network information including an identity of a virtual network of which each specific user is a member, members of each virtual network consisting of all users having a connection enabling a transaction.
-
-
44. A computer system suitable for operating as a server computer, said computer system comprising:
-
transient memory such as random access memory (RAM);
persistent memory such as a hard disk;
a central processing unit (CPU);
a networking device;
a databus coupling said transient memory, said persistent memory, said CPU, and said networking device;
a networking database stored on said computer system, said networking database populated with a plurality of users and at least data representing relational connections between said plurality of users;
a networking database process instantiated on said computer system, said process operable to receive transaction requests from said users, and monetize and execute said transaction requests based upon said data representing relational connections between said plurality of users.
-
-
45. A computer readable medium storing executable instructions for controlling networking transactions among a plurality of users populating a networking database, said networking database populated with at least user identity information and relational information between said plurality of users, said executable instructions comprising:
-
receiving a request from a first user to perform a transaction;
determining a feasibility of said transaction based on at least a characteristic of said transaction, a characteristic associated with an identity of said first user, and said relational information;
when said transaction is feasible, monetizing said transaction including monetization possibilities such as variable pricing for said transaction and not charging for said transaction; and
after successful monetization of said transaction, initiating execution of said transaction.
-
Specification