Method for arbitrating encrypted electronic transactions among intermediary and authoring users only when an interaction occurs between authoring and candidate users who was exposed by the intermediary user to data published by authoring user

ABSTRACT

System and computer-implemented method of permitting or arbitrating encrypted electronic transactions to occur among an intermediary and an author in an electronic data system only when an interaction occurs between the author and a candidate who was exposed by the intermediary to data published by the author. The author publishes criteria about a candidate, and the candidate posts information about the candidate, which is ingested and married to personally identifiable information about the candidate. A score is calculated indicating a correlation between the candidate and the published criteria, and an intermediary exposes the candidate to the criteria, which is tracked. When the candidate completes an interaction with the author, an encrypted transaction is permitted to occur between the author and the candidate through a proxy, without the author knowing the identity of the intermediary who facilitated the introduction.

COPYRIGHT

A portion of the disclosure of this patent document contains materialwhich is subject to copyright protection. The copyright owner has noobjection to the facsimile reproduction by anyone of the patentdisclosure, as it appears in the Patent and Trademark Office patentfiles or records, but otherwise reserves all copyright rightswhatsoever.

Field of the Present Disclosure

Aspects of the present disclosure relate generally to systems andmethods of permitting or arbitrating encrypted electronic transactionsto occur among an intermediary user and an authoring user in anelectronic data system only when an interaction occurs between theauthoring user and a candidate user who was exposed by the intermediaryuser to data published by the authoring user.

BACKGROUND

Authoring users can publish information online, which is typicallypassively available on a website. Users to be exposed to thisinformation must visit the website to locate the information, soauthoring users must try to stand out among the millions of onlinecontent publishers to compete for the right set of eyeballs to accesstheir published information. While this information can also be postedon one or more social media networking websites to reach a specificonline community, this approach has limits on how targeted theinformation can be aimed at specific users. Authoring users may wish totarget a specific user or users who satisfy certain criteria, butlocating and identifying these users among the millions of online usersis challenging. What is needed is a way to harness these millions ofusers as facilitators or proxies for the authoring users to connectauthoring users’ published information with the specific user(s) thatthe authoring user is targeting. In this way, computer networkcommunications can be made more efficient, because network bandwidth isconsumed far more efficiently when information published by authoringusers finds its way to the target end users in the most direct routepossible without having to download the information (and thereby consumenetwork bandwidth resources) to thousands of users who are not actualtarget end users, but simply wasteful consumers of the data. Thus, thereis a need to improve the efficiency of computer networks by reducingbandwidth consumption and needless downloading of data that is simplystored but then discarded or overwritten. In particular, for example,there is a need for reducing reliance on usage of online search engines,for example, to expose data published by an authoring user to a targetuser. Online search engines are currently responsible for at least athird of all Internet traffic, which means that a significant amount ofthe overall Internet bandwidth is consumed simply from servicing onlinesearch requests, and this bandwidth consumption continues to increase asthe Internet expands, making relevant information harder to locate forusers.

SUMMARY

Aspects of the present disclosure tracks which intermediary user exposeda candidate user to data created and published online by an authoringuser, and when a specific interaction occurs between the authoring userand the candidate user involving the created data, an encryptedelectronic interaction among the intermediary user and the authoringuser is permitted to occur directly or using a host computer or computersystem as a proxy for the encrypted electronic transaction without theauthoring user having any knowledge as to the identity of theintermediary user who exposed the candidate user to the data publishedby the authoring user. The host computer or computer system can act as aproxy for the encrypted transaction or arbiter of whether the encryptedtransaction occurs, permitting encrypted data to flow from the authoringuser through the host computer as a proxy to the intermediary userwithout any identifying information about the intermediary user beingtransmitted or otherwise made available to the authoring user. Likewise,an encrypted electronic transaction can also occur among the authoringuser and the candidate user using the host computer as a proxy for thatencrypted electronic transaction.

A technical problem posed the present disclosure is that when anauthoring user creates data and publishes it, and when a candidate useraccesses the published data, the authoring user does not know how thecandidate user was initially exposed to the created data. The presentdisclosure tracks which “intermediary” user exposed the created data towhich candidate user(s). When the candidate user was exposed to thecreated data by an intermediary user, this association is tracked by thepresent disclosure, allowing an encrypted electronic transaction tooccur among the intermediary user and the authoring user directly orusing a host computer or computer system as a proxy for the electronictransaction, only when a certain or specific interaction occurs betweenthe candidate user and the authoring user involving the published data.For example, once the authoring user is satisfied that the candidateuser satisfies criteria set forth in the published data, the authoringuser can inform the host computer to initiate the encrypted electronictransaction among the authoring user and the anonymous (vis-à-vis theauthoring user) intermediary user who exposed the published data to thecandidate user. In effect, the intermediary users operate as brokers orfacilitators to locate candidate users as “surrogate” searching entitieson behalf of the authoring user, to introduce candidate users to datapublished by the authoring user, and thereby connect the authoring userto the most relevant potential candidate users who satisfy criteria setforth in the published data. This approach dramatically reduces computernetwork resources and bandwidth consumption by connecting authoringusers with the most relevant target users in the most direct manner.Instead of relying, for example, on target users to find the publisheddata via search engines, intermediary users serve as proxies operatingon behalf of the authoring user to identify most relevant candidateusers who satisfy criteria set forth in the published data.

The present disclosure creates a more secure computer network in thatthe authoring user can be confident in engaging in an encryptedinteraction with the intermediary user directly or through a proxy onlywhen the proxy confirms that the intermediary user which exposed thepublished data to the candidate user, and only when the authoring userconfirms to the proxy that the candidate user satisfies criteria setforth in the authoring user’s published data. The authoring user doesnot need any knowledge or awareness of the intermediary user, whichmakes computer network traffic even more efficient because the proxyassumes the offline burden of tracking which intermediary user exposedthe candidate user to the authoring user’s published data, therebyfreeing the network bandwidth that would have otherwise been consumed bythis effort to be used for other purposes.

This enhanced confidence also improves the security of electroniccommunications, in that the authoring user engages in an encryptedtransaction directly or through a proxy with an unknown intermediaryuser. This intermediary user is known to the proxy, but not to theauthoring user. The proxy ensures that the encrypted transaction occursbetween the correct set of users, enhancing the confidence of theauthoring users to consider candidate users, and enhancing theconfidence of the intermediary users to act as surrogate searchingentities on behalf of the authoring users to locate candidate users whosatisfy criteria set forth in the data published by the authoring users.There are at least two ways the proxy improves communication securityacross the computer network. First, the proxy tracks which intermediaryuser exposed a candidate user to data published by a specific authoringuser. Second, the authoring user confirms for itself in a specificinteraction with the candidate user that the candidate user satisfiescriteria set forth in the published data and notifies the proxyaccordingly, which triggers the proxy to broker the electronictransaction among the intermediary user and the authoring user who doesnot know the identity of the intermediary user.

According to an aspect of the present disclosure, a method is disclosedof arbitrating encrypted electronic transactions among an intermediaryuser and an authoring user of an electronic data system only when aninteraction occurs between the authoring user and a candidate user whowas exposed by the intermediary user to data published by the authoringuser. The method can include receiving at a computer server systempublished electronic data records over a computer network created andpublished by authoring users. Some or all of the published electronicdata records include a set of required criteria and a set of desiredcriteria both established by corresponding authoring users. The methodincludes receiving, over the computer network or another network,candidate electronic data records ingested from an electronic webcrawler component and including personally identifiable informationposted by third parties. The method automatically calculates, for eachof the candidate users by the computer server system, a relevancy scoreindicative of a correlation between (a) at least some of the informationextracted from the respective candidate electronic data record posted bythe respective candidate user and (b) weighted ones of the correspondingsets of required and desired criteria. The method tracks by the computerserver system a first of the intermediary users that exposed a first ofthe candidate users to information associated with the first electronicdata by storing an association in an electronic memory device betweenthe first intermediary user and the first candidate user. The methodreceives, at the computer system, an indication from a first of theauthoring users of an occurrence of an interaction between the firstauthoring user and the first candidate user who was exposed by the firstintermediary user to the information associated with the firstelectronic data. The method includes, responsive to receiving theindication of the occurrence of the interaction between the firstauthoring user and the first candidate user, permitting an encryptedelectronic transaction to occur among the first authoring user and thefirst intermediary user directly or using the computer system as a proxyfor the encrypted electronic transaction.

The method can further include, responsive to receiving the indicationof the interaction between the first authoring user and the firstcandidate user, permitting another encrypted electronic transaction tooccur among the first authoring user and the first candidate user usingthe computer system as a proxy for the encrypted electronic transaction.The method can further include, responsive to receiving the indicationof the interaction between the first authoring user and the firstcandidate user, the computer system and the first authoring usercompleting an encrypted electronic transaction directly between oneanother.

The indication of the interaction can include an indication from theauthoring user that the candidate user satisfies at least some of thecriteria set forth in the required criteria or the desired criteria orboth. The method can further include receiving, at the computer system,a modification to the set of the required criteria and the set of thedesired criteria from the first authoring user, and automaticallyrecalculating, for each of the candidate users by the computer serversystem, a new relevancy score indicative of a correlation between (a) atleast some of the information extracted from the respective candidateelectronic data record posted by the respective candidate and (b)weighted ones of the modified sets of required and desired criteria.

Each of the required criterion in the set of required criteria can havea higher assigned weight than corresponding ones of each of the desiredcriterion in the set of desired criteria, such that a higher relevancyscore indicates a higher correlation between the set of requiredcriteria and the information extracted from the respective candidateelectronic data record.

The respective weights assigned to at least some of the requiredcriteria in the set of required criteria can be determined by andreceived from the first authoring user. The automatically calculatingthe relevancy score can include receiving from an electronic entityrecognition component a numeric value indicating an extent of arelevancy match between (a) the information extracted from therespective candidate electronic data record and (b) a corresponding oneof the set of required criteria or the set of desired criteria.

The method can further include automatically calculating, for each ofthe set of required criteria and the set of desired criteria, asub-score based on the corresponding relevancy match and a correspondingweighted value assigned by the first authoring user for thecorresponding criteria. At least some of the published electronic datarecords can further include a set of mandatory criteria. The set ofmandatory criteria can include a geographic location.

The automatically calculating the relevancy score can includedetermining whether a geographic location extracted from the informationassociated with the respective candidate electronic data record iswithin the geographic location in the set of mandatory criteria, and ifso, assigning a maximum sub-score to the geographic location criterionof the set of mandatory criteria, but if not, assigning a minimumsub-score to the geographic location criterion of the set of mandatorycriteria, without applying any weighting to the geographic locationcriterion of the set of mandatory criteria. The interaction between thefirst authoring user and the first candidate user can involve theinformation associated with the first electronic data at the geographiclocation set forth in the set of mandatory criteria.

The tracking can include tagging the first intermediary user and thefirst candidate user and storing an association between the firstintermediary user and the first candidate user in the electronic memorydevice. The interaction between the first authoring user and the firstcandidate user can involve the information associated with the firstelectronic data. The interaction between the first authoring user andthe first candidate user can be an interaction in the physical worldbetween an authoring person corresponding to the first authoring userand a candidate person corresponding to the candidate user.

According to another aspect of the present disclosure, a computer systemis disclosed for arbitrating encrypted electronic transactions among anintermediary user and an authoring user of an electronic data systemonly when an interaction occurs between the authoring user and acandidate user who was exposed by the intermediary user to datapublished by the authoring user. The system includes one or morecommunication interfaces, a score calculation component, an intermediarytracking component, and a proxy transaction component.

The communication interface(s) are configured to receive, over one ormore computer networks, (a) published electronic data records createdand published by authoring users and (b) candidate electronic datarecords ingested from an electronic web crawler component and includingpersonally identifiable information posted by third parties. Some or allof the published electronic data records include a set of requiredcriteria and a set of desired criteria both established by correspondingauthoring users.

The score calculation component is configured to automaticallycalculate, for each of the candidate users by the computer serversystem, a relevancy score indicative of a correlation between (a) atleast some of the information extracted from the respective candidateelectronic data record posted by the respective candidate user and (b)weighted ones of the corresponding sets of required and desiredcriteria.

The intermediary tracking component is configured to: track a first ofthe intermediary users that exposed a first of the candidate users toinformation associated with the first electronic data by storing anassociation in an electronic memory device between the firstintermediary user and the first candidate user, and receive anindication from a first of the authoring users of an occurrence of aninteraction between the first authoring user and the first candidateuser who was exposed by the first intermediary user to the informationassociated with the first electronic data.

The proxy transaction component is configured to, responsive toreceiving the indication of the occurrence of the interaction betweenthe first authoring user and the first candidate user, permit anencrypted electronic transaction to occur among the first authoring userand the first intermediary user using the proxy tansaction component asa proxy for the encrypted electronic transaction.

The communication interface(s), the score calculation component, theintermediary tracking component, and the proxy transaction component canbe incorporated in a computer server.

The proxy transaction component can be further configured to, responsiveto receiving the indication of the interaction between the firstauthoring user and the first candidate user, permit another encryptedelectronic transaction to occur among the first authoring user and thefirst candidate user directly or using the proxy transaction componentas a proxy for the encrypted electronic transaction.

The one or more communication interfaces can be further configured toreceive a modification to the set of the required criteria and the setof the desired criteria from the first authoring user. The scorecalculation component can be further configured to automaticallyrecalculate, for each of the candidate users by the computer serversystem, a new relevancy score indicative of a correlation between (a) atleast some of the information extracted from the respective candidateelectronic data record posted by the respective candidate and (b)weighted ones of the modified sets of required and desired criteria.

The computer system can further include an electronic entity recognitioncomponent configured to (a) determine a numeric value indicating anextent of a relevancy match between (a) the information extracted fromthe respective candidate electronic data record and (b) a correspondingone of the set of required criteria or the set of desired criteria, and(b) communicate the numeric value to the score calculation component forcalculating the relevancy score.

Additional aspects of the present disclosure will be apparent to thoseof ordinary skill in the art in view of the detailed description ofvarious embodiments, which is made with reference to the drawings, abrief description of which is provided below.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional block diagram of a system according to an aspectof the present disclosure.

FIG. 2 is a functional block diagram of the system shown in FIG. 1organized a different way.

FIG. 3 is a table of an example scoring rubric of exemplar candidateusers and their scores as calculated by the score calculation componentshown in FIG. 1 .

FIG. 4 is a table of an example scoring rubric of exemplar intermediaryusers and their scores as calculated by the score calculation componentshown in FIG. 1 .

FIG. 5 is an example flowchart of a process or method of permitting orarbitrating encrypted electronic transactions to occur among anintermediary user and an authoring user in an electronic data systemonly when an interaction occurs between the authoring user and acandidate user who was exposed by the intermediary user to datapublished by the authoring user.

DETAILED DESCRIPTION

While this disclosure is susceptible of embodiment in many differentforms, there is shown in the drawings and will herein be described indetail example implementations of the inventions and concepts hereinwith the understanding that the present disclosure is to be consideredas an exemplification of the principles of the inventions and conceptsand is not intended to limit the broad aspect of the disclosedimplementations to the examples illustrated. For purposes of the presentdetailed description, the singular includes the plural and vice versa(unless specifically disclaimed); the words “and” and “or” shall be bothconjunctive and disjunctive; the word “all” means “any and all”; theword “any” means “any and all”; and the word “including” means“including without limitation.”

FIG. 1 is a functional block diagram of a system 100, such as anelectronic data system, according to an aspect of the presentdisclosure. First, the general components of the system 100 will beintroduced, followed by examples. The system 100 includes a computersystem 102, which can be connected to one or more computer networks,such as the Internet. A computer as used herein includes any one or moreelectronic devices having a central processing unit (CPU) or controlleror microprocessor or microcontroller as understood by those skilled inthe art of electronic computers. Examples of computers include tabletcomputers, laptop computers, desktop or personal computers, servers,smartphones, a wearable electronic device such as a watch, an eyeglass,an article of clothing, or a wristband, and personal digital assistants(PDAs). The term computer as used herein can include a system ofelectronic devices coupled together to form what is conventionallyreferred to as a computer. For example, one or more input devices, suchas a keyboard or a mouse, and one or more electronic display devices,such as a video display, can be coupled to a housing that houses the CPUor controller. Or, all components of the computer can be integrated intoa single housing, such as in the case of a tablet computer or asmartphone.

The computer system 102 can conventionally include or can be operativelycoupled to one or more memory devices that store digital informationtherein, including non-transitory machine-readable instructions anddata. The computer system 102 can include one or more electronichuman-machine interface (HMI) devices, which corresponds to ahuman-machine interface that accepts inputs made by a human (e.g., viatouch, click, gesture, or voice) and converts those inputs intocorresponding electronic signals. Examples of HMI devices include atouchscreen, a stylus, a computer mouse, a gesture sensing deviceconfigured to sense a human-made gesture, a keyboard, a mouse, a camera,or a microphone. The computer system 102 also includes one or moresoftware or firmware applications, and one more electronic video displaydevices configured to display information that can be visually oraurally perceived. Examples of display devices include a video display,a stereoscopic display, or any electronic display capable of visuallyportraying information including text, static graphics, and movinganimations that is perceivable by the human eye. The video displaydevices display visual information contained in an electronic userinterface (UI), which can be downloaded to the computer system 102 overa computer network from one or more external computer servers. Theelectronic user interface can also include selectable elements that areselectable using the one or more HMI devices. Thus, the electronic userinterface generally can include a graphical user interface (GUI)component and a human-machine user interface component, via which ahuman user can select selectable elements displayed on the GUI via theHMI interface.

A computer system 102 can include various electronic or digital modulesor components, which can be standalone components that are coupledthrough a computer network to the computer system or represent anapplication program interface (API) as that term is understood in thecomputer and software programming arts. The modules and components shownin FIGS. 1 and 2 show an exemplary configuration, but those skilled inthe art will appreciate that other configurations can be used to carryout the aspects of the present disclosure. The particular configurationsof the modules and components are not pertinent to these aspects. Someor all of the components can be implemented in software, which can beconfigured to carry out programmed functions. The term “configured to”used in the context of a component implemented in software refers toprogramming the component with machine-readable instructions, such asobject code as that term is understood in the computer programming art,to carry out the programmed functions.

A (software or firmware) module or component herein can refer tocomputer-readable object code that executes a software sub-routine orprogram, which corresponds to instructions executed by anymicroprocessor or microprocessing device to perform described functions,acts, or steps. Any of the methods or algorithms or functions describedherein can include non-transitory machine or computer-readableinstructions for execution by: (a) an electronic processor, (b) anelectronic controller, and/or (c) any other suitable electronicprocessing device. Any algorithm, software module, software component,software program, routine, sub-routine, or software application, ormethod disclosed herein can be embodied as a computer program producthaving one or more non-transitory tangible medium or media, such as, forexample, a flash memory, a CD-ROM, a floppy disk, a hard drive, adigital versatile disk (DVD), or other electronic memory devices, butpersons of ordinary skill in the art will readily appreciate that theentire algorithm and/or parts thereof could alternatively be executed bya device other than an electronic controller and/or embodied in firmwareor dedicated hardware in a well-known manner (e.g., it may beimplemented by an application specific integrated circuit (ASIC), aprogrammable logic device (PLD), a field programmable logic device(FPLD), discrete logic, etc.).

Connected to the computer system 102 in FIG. 1 are multiple authoringusers 104, candidate users 106, and intermediary users 108. A “user”herein can refer interchangeably to a computer or computer terminal, ora human person operating a computer or computer terminal. It isconvenient in the computer arts to refer to both entities as a user, andthis nomenclature will be used throughout this disclosure. The authoringusers 104 publish electronic data records 110 over a computer network,such as the Internet. The electronic data records 110 include a set ofrequired criteria and a set of desired criteria about a candidate userof interest. The electronic data records 110 can optionally include aset of mandatory criteria about a candidate user of interest. Thecandidate users 106 post candidate information 112 to one or more socialmedia networking servers 120. These servers conventionally host websitesthat offer social media networking platforms for online users tointeract and share information about themselves. The candidate users 106can also post in the candidate information 112 personally identifiableinformation 114 about themselves. This personally identifiableinformation 114 can also be posted to the one or more social medianetworking servers 120, or to another computer server accessible overthe Internet.

The computer system 102, as discussed above, can include one or morecomputers or electronic components or modules as defined above.Functionally, these computers or components or modules are groupedtogether in FIG. 1 by reference number 102. The computer system 102includes at least a web crawler component 130, an entity recognitioncomponent 132, a candidate record database 134, a score calculationcomponent 136, an intermediary tracking component 138, an intermediarycontact database 140, and a proxy transaction component 142, which iscoupled over the computer network to a third party processor 116. Thecomputer system 102 can include one or more wired and/or wirelesscommunication interfaces (not shown) to communicate information betweenthe computer system 102 and one or more systems or components externalto the computer system 102 and operatively coupled thereto.

Having introduced some of the various components of the system 100,attention will now be drawn to an exemplar process flow according to anaspect of the present disclosure. One or more authoring users 104 postover a computer network (which is not necessarily the same computernetwork through which posted candidate user content is ingested by theweb crawler component 130), such as through an API, electronic datarecords having a set of required criteria and a set of desired criteriaabout a candidate user. The set of required criteria refers to criteriaor characteristics or qualities about a candidate user that theauthoring user requires to be present, whereas the set of desiredcriteria refers to criteria or characteristics or qualities about acandidate user the authoring user desires, but does not necessarilyrequire, to be present. An authoring user 104 is a user who authorscontent and publishes the same in the form of an electronic data recordto the computer system 102 or to one or more computer networks to whichthe computer system 102 is operatively connected.

To locate candidate users, aspects of the present disclosure harness aconventional web crawler component to scrape published data frommultiple authoring users. The web crawler component provides the scrapeddata to an entity recognition engine or component that scores eachentity among the scraped data. These scores are provided to acalculation engine or component that calculates weighted scores for eachentity scores corresponding to a set of criteria established by theauthoring user. The authoring user have two or three sets of criteria,including mandatory criteria, which is not weighted, required criteria,which is weighted relatively high, and desired criteria, which isweighted lower than weights assigned to required criteria. Thesecriteria can be seen as dials, which the authoring user can set, toestablish the criteria of a particular candidate user of interest. Byadjusting these criteria dials, the weights are automatically anddynamically adjusted by the calculation engine. The mandatory criteria(which can be a criterion), if present, operate as binary switches inthat the candidate user either satisfies or does not satisfy themandatory criteria. If the candidate user does not satisfy one or moremandatory criteria, a minimum score is assigned to that criteria;otherwise if the candidate user satisfies the mandatory criteria, amaximum score is assigned to that criteria. An example of a mandatorycriterion includes a physical geographic location where the candidateuser must be present. The required versus desired criteria can also beestablished and modified by the authoring user. Required criteria canindicate criteria in or about or regarding or associated with a targetcandidate user that the authoring user requires to be present. Desiredcriteria indicates criteria in a target candidate user that theauthoring user desires, but does not insist, on being present. Therequired and desired criteria are weighted, with required criteriagenerally being assigned a higher or greater weight compared to desiredcriteria. Each required criterion of the required criteria can havedifferent weights, and likewise for each desired criterion of thedesired criteria. A criteria or criterion refers to an attribute,characteristic, or trait about or regarding or associated with acandidate user of interest. As discussed above, the authoring users 104would ordinarily require extensive use of computer search engines tolocate candidate users satisfying one or more of the required or desiredcriteria. Each authoring user 104 can have the option of adjusting whichcriteria are required versus desired, and can optionally have the optionto rank each criterion, which causes a commensurate adjustment in aweight assigned to each criterion, where lower ranked criterion isassigned to a smaller or lesser weight value. These adjustment optionsare referred to colloquially herein as dials, because they allow theauthoring user 104 to adjust the weights associated with each criterion,and to determine which criteria are required and which are merelydesired. Optionally, a mandatory criterion, such as geographic location,can also be present, which is not weighted but rather presents a binaryswitch that provides a maximum or a minimum impact on an overall scorefor the candidate user, as discussed further below. When presented as anoption, the authoring user 104 can select which criterion is mandatory,which removes that selected criterion from being weighted.

The candidate users 106 post information about themselves as candidateinformation 112 to one or more social media networking servers 120. Asdiscussed above, this information 112 can typically include personallyidentifiable information 114, which can also be retrieved from othertypes of computer servers that do not operate a social media networkingplatform. These users are referred to as candidates because they arewould-be matches for the criteria set forth in the data records 110published by the authoring users 104. In an online community of millionsof users, locating candidate users who match criteria published byauthoring users would otherwise consume significant network resourcesand bandwidth, where both finders (authoring users) and seekers(candidate users) would otherwise have to use conventional tools, suchas search engines, to connect with one another. The present disclosuresignificant reduces consumption of these resources and bandwidth byidentifying matches offline through the scoring and tracking algorithmsdiscussed herein.

To do so, a conventional web crawler component 130 scrapes (as that termis understood in the art of electronic data mining) or ingests data fromthe social media networking servers 120. A list of seed universalresource locators (URLs) are provided to the web crawler, which URLspoint to likely locations where the required or desired criteria can beobtained or where candidate users create trails of personallyidentifiable information 114. An example of a web crawler component 130is the 80Legs custom web scraping and web crawling platform available asan API from Datafiniti, LLC, the details of which are incorporatedherein by reference. The web crawler component 130 outputs a text filecontaining relevant content scraped from the seed URLs and provided toan entity recognition component 132, which extracts from the web crawleroutput (including the URL web page content) various entitiescorresponding to the criteria set forth in the data records 110. Anexample of an entity recognition component 132 includes the AlchemyAPIavailable from IBM Corporation, the details of which are incorporatedherein by reference. The functionality of the web crawler component 130and the entity recognition component 132 can be merged or integratedinto a single electronic tool or set of electronic tools, such as theEntelo software-as-a-service (Saas) platform available from Entelo,Inc., the details of which are incorporated herein by reference. Eachweb page content, the associated URL for the web page, a list ofassociated entities excavated by the entity recognition component 132,the entity types, entity counts, and relevance score are stored as adocument 202 (shown in FIG. 2 ) in a candidate record database 134. Thescore calculation component 136 calculates scores indicative of acorrelation between entity information extracted by the entityrecognition component 132 and the criteria set forth in the data records110 published by the authoring users. Additional details of the scorecalculations are discussed below in connection with FIGS. 3 and 4 . Thescore calculation component 136 outputs a score for candidate users whomatch one or more criteria in the data records published by theauthoring users 104.

The intermediary tracking component 138 tracks which intermediary users108 exposed which candidate users 106 to data records 110 published byauthoring users 104. The intermediary contact database 140, 216 includesa database of contact information of intermediary users, including theiremail addresses 214 (FIG. 2 ). The intermediary tracking component 138tags electronic data records 110 that the intermediary users 108 haveexposed to the candidate users 106 by associating the specific datarecord 110 of a specific authoring user 104 to an intermediary user 108and the candidate user 106 to which the intermediary user 108 exposedthe data record. The data records 110 exposed by the intermediary user108 can be representative of the original data records 110 published bythe authoring user 104, such as setting forth the criteria in asummative form.

The third party processor 116 is used by the proxy transaction component142 to broker an encrypted transaction between the authoring user 104and the intermediary user 108 without any direct communication betweenthe authoring and intermediary users 104, 108. Once an authoring user104 confirms with the computer system 102 that an interaction betweenthe authoring user 104 and the candidate user 106 who was exposed to adata record 110, which was published by the authoring user 104, by anintermediary user 108 has occurred, where the authoring user 104confirms that the candidate user 106 satisfies one or more of thecriteria set forth in the data record 110, the proxy transactioncomponent 142 of the computer system 102 invokes the third partyprocessor 116 to cause an encrypted transaction to occur via thecomputer system 102 as a proxy for the encrypted transaction between theauthoring user 104 and the intermediary user 108 and optionally betweenthe authoring user 104 and the candidate user 106 who as originallyexposed to the data record 110 by the intermediary user 108. Theinteraction can be an interaction in the physical world betweenrespective persons associated with the authoring user 104 and thecandidate user 106.

FIG. 2 illustrates the process flow and functionality from a differentperspective. The electronic data records 110 published by the authoringusers 104 can be processed by the entity recognition component 132 andstored as documents (like those from the posted candidate information)in a database 134, such as the candidate record database 134. The Solropen source search platform server available from the Apache SoftwareFoundation is an example of a suitable database or server platform forthe database 134, which can be used to store both candidate recordsposted by candidate users 106 and data records published by theauthoring users 104. The intermediary tracking component 138 can querythe database 134 for the top matching people entities satisfying aquery, and the people entities can be collected and populated into alist 206. The people entities correspond to names of candidate users 106satisfying the query. These people entities 206 and associated URLs fromthe locations where these names were extracted are presented to a webinterface to a crowdsourcing marketplace 208 along with a form tocapture required fields. An example of the crowdsourcing marketplace isthe Mechanical Turks web service available from Amazon, Inc., thedetails of which are incorporated herein by reference. The web servicepopulates structured data in the form from the data retrieved from thedatabase 134 and from queries to the Internet to populate the personallyidentifiable fields in the form, such as name and email address for eachof the candidates. This structured data is passed to a personalinformation query tool 210 to extract contact information, social mediadata, and other personally identifiable information 114 about thecandidate users, and this structured people data containing thepersonally identifiable information 114 is stored in the contactdatabase 140 as an intermediary user record. The contact database 140can be queried to produce a list of intermediary users 212, and thecomputer system 102 can automatically prepare an email 214 to each ofthe intermediary users 108 returned from the database 140 along withinformation about the data record 110 published by the authoring user104. The computer system 102 can also prepare an email or otherelectronic message to send to a candidate user 106 or for theintermediary user 108 to send to the candidate user 106. When the datarecord 110 published by the authoring user 104 is communicated from theintermediary user 108 to the candidate user 106, the intermediarytracking component 138 associates those users 106, 108 with the specificdata record 110 published by the authoring user 104 to track whichintermediary user 108 exposed the data record 110 (or representativeinformation in the data record 110) to which authoring user 104.

FIG. 3 is a table of an example scoring rubric of exemplar candidateusers and their scores as calculated by the score calculation componentshown in FIG. 1 . Here, column A includes the maximum number of pointsassignable to each of the criteria listed in rows 2-18. Row 5 includesmandatory criteria set by an authoring user 104, whereas rows 2-4 and9-13 include required criteria A-K. Rows 14-18 include desired criteriaA-E. Fewer or more criteria can be present in an electronic data record110, as this table in FIG. 3 presents just one exemplar of manyconceivable possibilities. Five exemplar candidates are shown along withsub-scores for each criterion. For example, in cell C2, the firstcandidate user 106 has been assigned a score by the entity recognitioncomponent 132 of 0.5, indicating an average correlation between therequired criteria A set forth in the data record published by theauthoring user 104 and the information 112 scraped about the candidateuser 106 from the social media networking servers 120 by the web crawlercomponent 130. This required criteria A is weighted relatively heavily,so the sub-score for this criterion is calculated by the scorecalculation component 136 to be 112.5. Note that in row 5, the mandatorycriteria A is indicated to be a binary match. If a match is found, amaximum sub-score of 100 is assigned; if a match is not found, a minimumsub-score of -50 is assigned to the first candidate user 106. Referringagain to the first candidate user 106, a fairly strong correlation canbe seen between required criteria B, F, H, and K. These higher-weightedcriteria drive up the first candidate user’s overall score of 607, shownin cell D19. The second candidate user has a perfect match with thefirst three required criteria A-C, but is not a match for the mandatorycriteria A, which affects the score of 694.7, but this second candidateuser 106 will be determined by the computer system 102 to have the bestcorrelation with the criteria published by the authoring user 104 eventhough the authoring user’s mandatory criteria is not present in thisparticular second candidate user 106.

As can be seen, because desired criteria are weighted less, even strongcorrelations among, for example, the third candidate user in cellsG16-18 do not have a significant impact on the overall score of 479.55.Another criteria that the score calculation component 136 can take intoaccount involves the intermediary user 108 who exposed the candidateuser 106 to the data record 110 published by the authoring user 104. Row6 is an intermediary score, which is described in more detail inconnection with FIG. 4 below. This intermediary score reflects a “clout”score regarding a particular intermediary user, such that anintermediary user who exposes more candidate users 104 to data records110 published by authoring users 104, the higher the score assigned tothat intermediary user 108. The row 6 sub-score is a metric that takesinto account the intermediary user’s ability or potential to makemeaningful connections between authoring users and candidate users. Therow 7 sub-score indicates a match between the intermediary user 108 andthe candidate user 106 regarding a mandatory criteria D. If both theintermediary and candidate users 108, 106 both share the same criteriaD, a maximum sub-score is assigned; otherwise no points is assigned.Another mandatory criteria E is shown in row 8. The authoring user 104has chosen to weight these criteria in rows 6-8 relatively low comparedto the criteria in rows 2-3. A fifth candidate user 106 is another casecontemplated by the present disclosure. It is contemplated that theintermediary user 108 and the candidate user 106 can be one and thesame. In this example shown in FIG. 3 , however, the fifth user 106, 108is not as good a match among the criteria published in a data record byan authoring user 104 compared to the other four candidate users.

FIG. 4 is a table of an example scoring rubric of exemplar intermediaryusers and their scores as calculated by the score calculation componentshown in FIG. 1 . The scores from FIG. 4 are populated in row 6 of thetable shown in FIG. 3 . Here, twelve intermediary users are shown withtheir respective intermediary scores as calculated by the scorecalculation component 136. The ninth intermediary user is assigned themaximum number of 400 points as the intermediary score. The criteria tocalculate the intermediary score can be weighted. Thus, in column B, thenumber of candidates that the intermediary user 108 has successfullyintroduced to an authoring user 104 is assigned a weight of 100 or 25%of the maximum score. All of those candidates as shown in cell D11 wereengaged by the authoring user 104, and thus, the ninth intermediary userreceives a total sub-score of 100 in D11. Cell E11 refers to thepercentage of candidates that the authoring user is considering engagingbut has not yet engaged. Because these engagements still count asintroductions, they are assigned a weight of 50.

Column H refers to a calculated value that is computed to produce theintermediary score. An example calculation of the column H values is:=IF(G11<0.06,0,IF(G11>0.49,50,IF(AND(G11>0.05,G11<0.11),10,IF(AND(G11>0.1,G11<0.26),25,IF(AND(G11>0.25,G11<0.5),40,“BAD”)))))The intermediary score for row 11 can be calculated according to theformula:=SUM(IF(B11<B$1,B11,B$1),IF(C11<C$1,C11,C$1),IF(D11<D$1,D11,D$1),F11,H11)

In other words, if an intermediary user’s percentage of engagementsfalls below a threshold, that intermediary user’s score can be penalizedby subtracting value, such as shown in cells F10, F12, and F14, whosecorresponding intermediary users have less than a 5% success rate ofhistorical engagements between an authoring user and a candidate user.Finally, in row 15, to account for a scenario where the candidate andintermediary user are one and the same, a value of 1 is assigned as theintermediary score.

FIG. 5 is an example flowchart of an algorithm 100 of permitting orarbitrating encrypted electronic transactions to occur among anintermediary user and an authoring user in an electronic data systemonly when an interaction occurs between the authoring user and acandidate user who was exposed by the intermediary user to datapublished by the authoring user. A computer server system 100 receivespublished electronic data records 110 over a computer network createdand published by authoring users 104 (502). The published electronicdata records include a set of required criteria and a set of desiredcriteria both established by each of the authoring users. Candidateelectronic data records are received, over the computer network, asingested from an electronic web crawler component and includingpersonally identifiable information posted by third parties, which maybe the candidate users themselves (504). For each of the candidateusers, the computer server system 102 automatically calculates arelevancy score indicative of a correlation between (a) at least some ofthe information extracted from the respective candidate electronic datarecord posted by the respective candidate user and (b) weighted ones ofthe corresponding sets of required and desired criteria (506). Thecomputer system 102 tracks a first of the intermediary users 108 thatexposed a first of the candidate users 106 to information associatedwith the first electronic data 110 (508) by storing an association in anelectronic memory device, such as the database 134, between the firstintermediary user 108 and the first candidate user 106 (510). Thecomputer system 102 receives an indication from a first of the authoringusers 104 of an occurrence of an interaction between the first authoringuser 104 and the first candidate user 106 who was exposed by the firstintermediary user 108 to the information associated with the firstelectronic data 110 (512). Then, the computer system 102 permits anencrypted electronic transaction to occur among the first authoring user104 and the first intermediary user 108 using the computer system 102 asa proxy for the encrypted electronic transaction (514).

While this disclosure is susceptible to various modifications andalternative forms, specific embodiments or implementations have beenshown by way of example in the drawings and will be described in detailherein. It should be understood, however, that the disclosure is notintended to be limited to the particular forms disclosed. Rather, thedisclosure is to cover all modifications, equivalents, and alternativesfalling within the spirit and scope of the invention as defined by theappended claims.

Each of these embodiments and obvious variations thereof is contemplatedas falling within the spirit and scope of the claimed invention, whichis set forth in the following claims. Moreover, the present conceptsexpressly include any and all combinations and subcombinations of thepreceding elements and aspects.

What is claimed is:
 1. A method of arbitrating encrypted electronictransactions among an intermediary user and an authoring user of anelectronic data system only when an interaction occurs between theauthoring user and a candidate user who was exposed by the intermediaryuser to data published by the authoring user, the method comprising thesteps of: receiving at a computer server system a plurality of publishedelectronic data records over a computer network created and published bya plurality of authoring users, at least some of the publishedelectronic data records including a set of required criteria and a setof desired criteria both established by corresponding ones of at leastsome of the authoring users; receiving, over the computer network oranother network, a plurality of candidate electronic data recordsingested from an electronic web crawler component and includingpersonally identifiable information posted by third parties;automatically calculating, for each of the candidate users by thecomputer server system, a relevancy score indicative of a correlationbetween (a) at least some of the information extracted from therespective candidate electronic data record posted by the respectivecandidate user and (b) weighted ones of the corresponding sets ofrequired and desired criteria; tracking by the computer server system afirst of the intermediary users that exposed a first of the candidateusers to information associated with the first electronic data bystoring an association in an electronic memory device between the firstintermediary user and the first candidate user; receiving, at thecomputer system, an indication from a first of the authoring users of anoccurrence of an interaction between the first authoring user and thefirst candidate user who was exposed by the first intermediary user tothe information associated with the first electronic data; andresponsive to receiving the indication of the occurrence of theinteraction between the first authoring user and the first candidateuser, the computer system permitting an encrypted electronic transactionto occur among the first authoring user and the first intermediary userdirectly or using the computer system as a proxy for the encryptedelectronic transaction.
 2. The method of claim 1, further comprising,responsive to receiving the indication of the interaction between thefirst authoring user and the first candidate user, the computer systempermitting another encrypted electronic transaction to occur among thefirst authoring user and the first candidate user using the computersystem as a proxy for the encrypted electronic transaction.
 3. Themethod of claim 1, further comprising, responsive to receiving theindication of the interaction between the first authoring user and thefirst candidate user, the computer system and the first authoring usercompleting an encrypted electronic transaction directly between oneanother.
 4. The method of claim 1, wherein the indication of theinteraction includes an indication from the authoring user that thecandidate user satisfies at least some of the criteria set forth in therequired criteria or the desired criteria or both.
 5. The method ofclaim 1, further comprising: receiving, at the computer system, amodification to the set of the required criteria and the set of thedesired criteria from the first authoring user; and automaticallyrecalculating, for each of the candidate users by the computer serversystem, a new relevancy score indicative of a correlation between (a) atleast some of the information extracted from the respective candidateelectronic data record posted by the respective candidate and (b)weighted ones of the modified sets of required and desired criteria. 6.The method of claim 1, wherein each of the required criterion in the setof required criteria has a higher assigned weight than correspondingones of each of the desired criterion in the set of desired criteria,such that a higher relevancy score indicates a higher correlationbetween the set of required criteria and the information extracted fromthe respective candidate electronic data record.
 7. The method of claim6, wherein respective weights assigned to at least some of the requiredcriteria in the set of required criteria are determined by and receivedfrom the first authoring user.
 8. The method of claim 1, wherein theautomatically calculating the relevancy score includes receiving from anelectronic entity recognition component a numeric value indicating anextent of a relevancy match between (a) the information extracted fromthe respective candidate electronic data record and (b) a correspondingone of the set of required criteria or the set of desired criteria. 9.The method of claim 8, further comprising automatically calculating, foreach of the set of required criteria and the set of desired criteria, asub-score based on the corresponding relevancy match and a correspondingweighted value assigned by the first authoring user for thecorresponding criteria.
 10. The method of claim 1, wherein at least someof the published electronic data records further include a set ofmandatory criteria, the set of mandatory criteria including a geographiclocation.
 11. The method of claim 10, wherein the automaticallycalculating the relevancy score includes determining whether ageographic location extracted from the information associated with therespective candidate electronic data record is within the geographiclocation in the set of mandatory criteria, and if so, assigning amaximum sub-score to the geographic location criterion of the set ofmandatory criteria, but if not, assigning a minimum sub-score to thegeographic location criterion of the set of mandatory criteria, withoutapplying any weighting to the geographic location criterion of the setof mandatory criteria.
 12. The method of claim 11, wherein theinteraction between the first authoring user and the first candidateuser involves the information associated with the first electronic dataat the geographic location set forth in the set of mandatory criteria.13. The method of claim 1, wherein the tracking includes tagging thefirst intermediary user and the first candidate user and storing anassociation between the first intermediary user and the first candidateuser in the electronic memory device.
 14. The method of claim 1, whereinthe interaction between the first authoring user and the first candidateuser involves the information associated with the first electronic data.15. The method of claim 1, wherein the interaction between the firstauthoring user and the first candidate user is an interaction in thephysical world between an authoring person corresponding to the firstauthoring user and a candidate person corresponding to the candidateuser.
 16. A computer system of arbitrating encrypted electronictransactions among an intermediary user and an authoring user of anelectronic data system only when an interaction occurs between theauthoring user and a candidate user who was exposed by the intermediaryuser to data published by the authoring user, the system comprising: oneor more communication interfaces configured to receive, over one or morecomputer networks, (a) a plurality of published electronic data recordscreated and published by a plurality of authoring users, at least someof the published electronic data records including a set of requiredcriteria and a set of desired criteria both established by correspondingones of at least some of the authoring users, and (b) a plurality ofcandidate electronic data records ingested from an electronic webcrawler component and including personally identifiable informationposted by third parties; a score calculation component configured toautomatically calculate, for each of the candidate users by the computerserver system, a relevancy score indicative of a correlation between (a)at least some of the information extracted from the respective candidateelectronic data record posted by the respective candidate user and (b)weighted ones of the corresponding sets of required and desiredcriteria; an intermediary tracking component configured to: track afirst of the intermediary users that exposed a first of the candidateusers to information associated with the first electronic data bystoring an association in an electronic memory device between the firstintermediary user and the first candidate user, and receive anindication from a first of the authoring users of an occurrence of aninteraction between the first authoring user and the first candidateuser who was exposed by the first intermediary user to the informationassociated with the first electronic data; and a proxy transactioncomponent configured to, responsive to receiving the indication of theoccurrence of the interaction between the first authoring user and thefirst candidate user, permit an encrypted electronic transaction tooccur among the first authoring user and the first intermediary userusing the proxy tansaction component as a proxy for the encryptedelectronic transaction.
 17. The computer system of claim 16, wherein theone or more communication interfaces, the score calculation component,the intermediary tracking component, and the proxy transaction componentare incorporated in a computer server.
 18. The system method of claim16, further comprising, responsive to receiving the indication of theinteraction between the first authoring user and the first candidateuser, the proxy transaction component being further configured to permitanother encrypted electronic transaction to occur among the firstauthoring user and the first candidate user directly or using the proxytransaction component as a proxy for the encrypted electronictransaction.
 19. The system of claim 16, further comprising: the one ormore communication interfaces being configured to receive a modificationto the set of the required criteria and the set of the desired criteriafrom the first authoring user; and the score calculation component beingconfigured to automatically recalculate, for each of the candidate usersby the computer server system, a new relevancy score indicative of acorrelation between (a) at least some of the information extracted fromthe respective candidate electronic data record posted by the respectivecandidate and (b) weighted ones of the modified sets of required anddesired criteria.
 20. The system of claim 16, further comprising anelectronic entity recognition component configured to (a) determine anumeric value indicating an extent of a relevancy match between (a) theinformation extracted from the respective candidate electronic datarecord and (b) a corresponding one of the set of required criteria orthe set of desired criteria, and (b) communicate the numeric value tothe score calculation component for calculating the relevancy score.