Determining potential relationships between individuals

ABSTRACT

A computer-implemented method for obtaining information corresponding to a first user. The computer-implemented method includes, obtaining information corresponding to a first user, accessing a database comprising information corresponding to a plurality of individuals, based on the information corresponding to a plurality of individuals. The method further includes determining whether a potential relationship exists between a first user and at least one of the plurality of individuals.

BACKGROUND

Typically, when a user of a system desires to contact an individualthough the system, the user obtains the contact information of theindividual from the user's address book. However, the address book maynot be sufficiently populated. For example, a client device, rarely usedor newly used by the user, may not have any information in the addressbook. Therefore, it is difficult to efficiently communicate with theindividual.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example of a system, in accordance with anembodiment of the present invention.

FIG. 2 illustrates an example of information and a contact list, inaccordance with an embodiment of the present invention.

FIG. 3 illustrates an example of a method for determining an associationbetween individuals, in accordance with an embodiment of the presentinvention.

FIG. 4 illustrates an example of a method for obtaining informationcorresponding to a first user, in accordance with an embodiment of thepresent invention.

FIG. 5 illustrates an example of a method for suggesting invitations toa network, in accordance with an embodiment of the present invention.

FIG. 6 illustrates an example of a method for suggesting invitations toa network, in accordance with an embodiment of the present invention.

The drawings referred to in this description should be understood as notbeing drawn to scale except if specifically noted.

DESCRIPTION OF EMBODIMENTS

Reference will now be made in detail to embodiments of the presenttechnology, examples of which are illustrated in the accompanyingdrawings. While the technology will be described in conjunction withvarious embodiment(s), it will be understood that they are not intendedto limit the present technology to these embodiments. On the contrary,the present technology is intended to cover alternatives, modificationsand equivalents, which may be included within the spirit and scope ofthe various embodiments as defined by the appended claims.

Furthermore, in the following description of embodiments, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present technology. However, the present technologymay be practiced without these specific details. In other instances,well known methods, procedures, components, and circuits have not beendescribed in detail as not to unnecessarily obscure aspects of thepresent embodiments.

In social networks or communication systems, it is desirable to haveaccess to a large relevant list of people to communicate with, follow orbe connected to. Creating this access increases the utility of thesocial networks or communication systems. Moreover, the access improvesthe overall user experience with the social networks or communicationsystems.

Oftentimes, a user's address book is not populated or is sparselypopulated. For example, a device (e.g., a cell phone) is new to the userand the address book has not been populated. In another example, adevice (e.g. a PC, Connect TV environment) does not include astandardized address book or the devices are not synched with all of thecontacts.

Moreover, some social networks or communication systems search a user'scontact list for other users of the network/system. Additionally, usersof the social networks or communication systems may opt out of providingtheir personal information.

As a result, the access to a large relevant list of people that can becommunicated with, followed or connected to is diminished. Thus, theoverall user experience with the social networks or communicationsystems may be negatively affected.

The following discussion will first describe the structure andcomponents of system 100. Then the discussion will describe thefunctionality of the structure and components of system 100 during useof system 100.

FIG. 1 depicts system 100 comprising device 110 and database 190. System100 is any network or communication system that allows individuals tocommunicate with one another. Also, system 100 allows for the access ofa large relevant list of people to communicate with, follow or connectto. This access increases the utility of system 100 and increases theoverall user experience system 100.

In various embodiments, system 100 can be, but is not limited to, asocial network (e.g., Facebook), a communication system (e.g., a mobiledevice system, a mobile video calling service, etc.).

Database 190 is configured for storing information 195 corresponding toa plurality of individuals. In one embodiment, information 195corresponds with users of system 100. In another embodiment, information195 corresponds to individuals who do not use or are not registered withsystem 100.

In one embodiment, users provide information 195 to system 100 andinformation 195 is subsequently stored in database 190. The providedinformation can be, but is not limited to a user's name, telephonenumber, street address, area code, email addresses, social networkingIDs (e.g., Facebook ID), address book, screen name, etc.

Users can also provide information 195 when registering to use system100. Additionally, users may give access to their address books (e.g.,contact lists) which is subsequently stored in database 190. As will bedescribed in detail below, information 195 is utilized to enhance auser's experience of system 100.

Device 110 is any device that is able to facilitate in the communicationbetween users in system 100. For example, device 110 can be, but is notlimited to, a personal computer (PC), smart phone, personal digitalassistant (PDA), cell phone, hand-held mobile device, any computingdevice configured for video conferencing between users, etc. In oneembodiment, user 105 communicates with another individual through system100 via device 110.

System 100 also includes user information obtainer 120, databaseaccessor 125, relationship determiner 130, populator 135, invitationsuggestor 140, filter 145 and contact list 150. In one embodiment,device 110 includes components 120-150, as depicted in FIG. 1. Inanother embodiment, device 110 includes some or none of components120-150. For example, some or all of components 120-150 are disposed inanother device, such as a server (not shown).

User information obtainer 120 is configured to obtain information of auser of system 100. Obtained user information can be, but is not limitedto, a user's name, telephone number, street address, area code, emailaddresses, zip code, social networking IDs (e.g., Facebook ID), addressbook, etc.

Database accessor 125 is configured to accesses database 190 forinformation 195 corresponding to individuals. The individuals can beother users of system 100 or any individual included in any socialgraph.

Relationship determiner 130 is configured to determine any potential orpossible relationships between user 105 and individuals associated withinformation 195.

Populator 135 is configured to populate an address book or contact listassociated with user 105. In other words, populator 135 facilitates ingenerating a social graph associated with user 105.

Invitation suggestor 140 is configured for suggesting invitations to usesystem 100. For example, invitation suggestor 140 is for providingsuggested list of individuals to be invited to use system 100.

Filter 145 is configured for filtering a determination of a relationship(or potential relationship) between user 105 and at least one individualassociated with information 195. In another embodiment, filter 145 isconfigured for filtering generated suggested invitations.

Contact list 150 (or address book) is a collection of informationcorresponding to individuals. In one embodiment, contact list 150 is asocial graph of user 105. In general, a social graph describes therelationships between individuals.

The discussion will now describe the functionality of the structure andcomponents of system 100 during use of system 100. In particular, thediscussion will describe system 100 that allows for the access of alarge relevant list of people to communicate with, follow or connect to.This access increases the utility of system 100 and increases theoverall user experience of system 100. The discussion will refer toFIGS. 1 and 2. FIG. 2 depicts an embodiment of contact list 150 andinformation 195.

In various embodiments, user 105 uses or initiates use with system 100via device 110. In some embodiments, contact list 150 is initially emptyor sparsely populated. This is due to device being a new device or user105 has not entered any information into contact list 150.

In order to access a large relevant list of people to communicate with,follow or be connected to, user information obtainer 120 obtainsinformation associated with user 105. For example, user informationobtainer 120 obtains a phone number of user 105. It should beappreciated that user information obtainer 120 can obtain anyinformation that facilitates in identifying user 105.

In various embodiments, user information obtainer 120 obtainsinformation when user registers or logs into system 100. For example,user 105 inputs, a login name, phone number, Facebook ID, screen name orthe like and user information obtainer 120 obtains this information.

Database accessor 125 accesses database 190. Specifically, databaseaccessor 125 accesses information 195 corresponding to a plurality ofindividuals. As described above, information 195 can be, but is notlimited to, a name, telephone number, street address, area code, emailaddresses, social networking IDs (e.g., Facebook ID), address book,contact list, social graph, etc.

In various embodiments, information 195 is obtained via a Facebookidentification (ID). For example, user 105 logs onto a website via aFacebook application interface (API). In other words, a user logs into awebsite (other than Facebook.com) via Facebook credentials. Accordingly,the Facebook ID of user 105 is obtained and cached, as well as, all ofthe Facebook ID's of the friends of user 105. Therefore, information 195includes Facebook IDs of user 105 and/or the friends of user 105.

With reference to FIG. 1, database accessor 125 accesses information195. In one embodiment, information 195 includes contact lists 210-230.It should be appreciated that information 195 can include any number ofcontact lists or any information that corresponds to any number ofindividuals.

As depicted in FIG. 2, Contact list 210 is a contact list of IndividualA. Contact list 210 includes information (e.g., cell phone number)corresponding to individuals B, C, D, E, F and X.

Contact list 220 is a contact list of Individual B. Contact list 220includes information corresponding to individuals C, E, G, H and I.

Contact list 230 is a contact list of Individual C. Contact list 230includes information corresponding to individuals F, X, Y and Z. Itshould be appreciated that contact lists 210-230 can include anyinformation corresponding to any number of individuals.

Relationship determiner 130 determines whether a potential relationshipexists between user 105 and at least one of the plurality of individualscorresponding to information 195.

For example, relationship determiner 130 determines whether or not apotential relationship exists between Individual F (e.g., user 105) andat least one of Individuals A-C, based on contact lists 210-230,respectively. In such an example, it is determined that there is arelationship between Individual F and both Individual A and IndividualC, because contact list 210 includes information (e.g., cell phonenumber) regarding Individual F and contact list 230 also includesinformation (e.g., cell phone number) regarding individual F.

Populator 135 populates contact list 150 with information correspondingto at least one of Individuals A-C which are determined to have arelationship with Individual F. For example, contact list 150 (which wasinitially empty or sparsely populated) is populated with Individual Aand Individual C, as depicted in FIG. 2.

Invitation suggestor 140 generates suggested invitations to individualsto utilize system 100.

A user of a network communicates with other individuals, as describedabove. In some instances, a user of a video calling service interactswith a limited number of people they are particularly close to (e.g.,spouses, parents, children, etc.). If individuals that the userinteracts with are not registered with the network, then the likelihoodthe individuals will become active users is reduced. Thus, by invitingthe individuals to register with the network, by the user, thelikelihood that the individuals will register with the networkincreases.

In one embodiment, invitation suggestor 140 generates a suggested listof individuals to invite to use or register for services of system 100.In such an embodiment, Individual F (e.g., user 105) is presented withthe suggested list of individuals, such as Individuals A and C, becausethey were determined to have a relationship with Individual F.

In one example, invitation suggestor 140 generates a suggested list thatat least includes Individual X because Individual X is within thecontact list of Individuals A and C.

In one embodiment, filter 145 filters the results generated byrelationship determiner 130. In various embodiments, filter 145 filtersbased on, but not limited to, first and/or last name, street address,area code, zip code, time zone, international country calling code, calllogs (e.g., most recent sent and/or received calls), favorite contacts,etc.

For example, filter 145 filters the potential or possible relationshipthat is determined between Individual F and individuals A and C. In suchan example, filter 145 filters the results based on a last name ofIndividual F, which is Smith. The last name of Individual A is Smith andthe last name of Individual C is Jones. Accordingly, Individual C isfiltered out and not populated in contact list 150, while Individual Ais not filtered out and is populated in contact list 150 of IndividualF.

In another embodiment, filter 145 filters the generated suggestedinvitations. For example, filter 145 filters the generated list of usersto be invited to utilize system 100. In such an example, filter 145filters the results based on area code. The area code of Individual A isthe same area code as Individual F and the area code of Individual C isan area code which is not in the same geographical region as the areacode of Individual F. Accordingly, Individual C is filtered out of thegenerated suggested invitations, while Individual A is not filtered outand remains in the generated suggested invitations.

Database 190 includes an inversion point at which it provides sufficientinformation for users to access a large relevant list of people thatthey can communicate with, follow or connect to. Thus, the overall userexperience with the social networks or communication systems would beenhanced.

In contrast, if the inversion point is not met, because information 195is associated with a limited amount of individuals (e.g., tens ofpeople), then database 190 would not be able to provide sufficientinformation for users to access a large relevant list of people thatthey can communicate with, follow or connect to. Thus, the overall userexperience with the social networks or communication systems may benegatively affected.

FIGS. 3-6 depict embodiments of methods 300-600, respectively. Invarious embodiments, methods 300-600 are carried out by processors andelectrical components under the control of computer readable andcomputer executable instructions. The computer readable and computerexecutable instructions reside, for example, in a non-transitory datastorage medium such as computer usable volatile and non-volatile memory.However, the computer readable and computer executable instructions mayreside in any type of computer readable storage medium. In someembodiments, methods 300-600 are performed by components in system 100,as described in FIGS. 1 and 2.

FIG. 3 depicts an embodiment of a method 300 for obtaining informationcorresponding to a first user. At 310 of method 300, informationcorresponding to a first user is obtained. For example, user informationobtainer 120 obtains information associated with user 105. Theinformation can be given by user 105 through registering or logging intosystem 100.

At 320, a database is accessed comprising information corresponding to aplurality of individuals. For example, database 190 is accessedcomprising information 195 corresponding to a plurality of individuals,such as Individuals A-C.

It is to be understood that information 195 can be a variety ofdifferent information that is obtained by a variety of means. Forexample, information 195 is a plurality of social graphs associated witha plurality of individuals.

At 330, it is determined whether a potential relationship exists betweenthe first user and at least one of said plurality of individuals, basedon the information corresponding to a plurality of individuals. Forexample, relationship determiner 130 determines whether or not apotential relationship exists between Individual F and any one ofIndividuals A-C, based on information 195 corresponding to individualsA-C. Specifically, relationship determiner 130 determines that contactlists of Individuals A and C include information (e.g., cell phonenumber) associated with Individual F. Therefore, a potentialrelationship exists between Individual F and both Individuals A and C.

At 340, a list of potential relationships between the first user and atleast one of the plurality of individuals is provided. For example, alist of Individuals A and C are displayed on a display (not shown) ofdevice 110 and viewed by user 105. Individuals A and C are listedbecause their respective social graphs include information regardingIndividual F.

At 350, selection of the at least one of the plurality of individuals isoffered. For example, relationship determiner 130 determines thatIndividuals A and C have a relationship with Individual F. The resultsof the determination are presented to Individual F (e.g., displayed ondevice 110) and Individual F selects whether or not Individuals A and/orC should remain in a generated list of relationships or in a contactlist of Individual F.

At 360, population of a contact list of the first user with at least oneof the plurality of individuals is offered. For example, population ofcontact list 150 of user 105 (or Individual F) is offered. Specifically,Individual F is offered to have his contact list 150 populated withIndividuals A and C, because it was determined that Individuals A and Chave a relationship with Individual F.

At 370, a contact list of the first user is automatically populated withat least one of the plurality of individuals. For example, in responseto determination of Individuals A and C having a relationship withIndividual F, contact list 150 of Individual F is automaticallypopulated with Individuals A and C and their respective phone numbers.

At 380, automatically populate an unpopulated contact list of the firstuser with at least one of the plurality of individuals. For example, inresponse to determination of Individuals A and C having a relationshipwith Individual F, contact list 150 of Individual F, which is initiallyunpopulated, is automatically populated with Individuals A and C andtheir respective phone numbers.

At 390, the list of potential relationships between the first user andat least one of the plurality of individuals is filtered. For example,the generated list of relationship determiner 130 is further filtered byfilter 145. Filter 145 filters the list based on a variety of filters,such as area code, zip code, name, etc. In such an example, filter 145filters out Individual A because the zip code of Individual A is a greatdistance away from the zip code of Individual F.

FIG. 4 depicts an embodiment of a method 400 for determining anassociation between individuals. At 410 of method 400, useridentification of a user is obtained. For example, Individual F logsinto or registers with system 100 by providing his name. It should beappreciated that user identification can be any information thatfacilitates in identifying the user.

At 420, a database comprising a plurality of social graphs is accessed.For example, database accessor 125 accesses social graphs of a pluralityof individuals. The social graphs can be any format that facilitates indetermining relationships between individuals.

In one embodiment, at 425, a database comprising a plurality of contactlists is accessed. For example, database accessor 125 accesses database190 that includes individual's contact lists. The contact lists can bein any format and be accessed from any device (e.g., a cell phone, PC).

At 430, an association between the first user and at least oneindividual associated with at least one of the plurality of socialgraphs is determined, based on the plurality of social graphs. Forexample, relationship determiner 130 determines a relationship betweenindividuals whose information is located within a contact list orbetween individuals whose contact list contains information associatedwith user 105.

In one embodiment, at 435, an association between the first user and atleast one individual associated with at least one contact list isdetermined. For example, an association between Individual F andIndividual X is determined based on information of stored in the contactlists of Individuals A and C. In another example, an association betweenIndividual F and Individual E is determined, because Individual E hasthe same area code and zip code as Individual F.

At 440, a social graph of the first user based on the determination ofthe association between the first user and the at least one individualassociated with the at least one of the plurality of social graphs isdetermined. For example, a relationship between Individual F andIndividuals A and C is determined. Therefore, a social graph isdetermined for Individual F.

At 450, a contact list of the first user, is generated, for use in ahand-held mobile device, based on the determination of the associationbetween the first user and at least one individual associated with atleast one of a plurality of contact lists. For example, contact list 150is generated (which includes Individuals A and C) for use at device 110,based on the determination of the association between Individual F andIndividuals A and C.

FIG. 5 depicts an embodiment of a method 500 for suggesting invitationsto a network. At 510 of method 500, information corresponding to a firstuser is obtained. For example, a name of user 105 is obtained.

At 520, a database is accessed comprising information corresponding to aplurality of individuals. For example, database 190 is accessed.Database 190 can include information associated with millions ofindividuals.

At 530, suggested invitations to the network are generated, wherein theinvitations are for the at least one of the plurality of individuals.For example, a list of users to invite to register or use system 100 isgenerated by invitation generator 140. The invitations are forindividuals who are determined to have a relationship with user 105. Assuch, the invitations are for Individuals A and C and are to be sentfrom Individual F.

In one embodiment, at 535, suggested invitations to a mobile videocalling network are generated. For example, system 100 is a mobile videocalling network that allows for individuals to video call one another.Accordingly, invitation suggester 140 generates suggested invitations tosystem 100.

At 540, a list of the suggested invitations is provided. For example,the generated suggested invitations is provided in a list to user 105.In particular, the suggested invitations are displayed as a list to user105 on device 110.

At 550, selections of the list of the suggested invitations are offered.For example, user 105 is presented with the list of the suggestedinvitations. User 105 can select which of individuals listed are to beinvited or not invited to utilize system 100.

At 560, a list of the suggested invitations are offered to beautomatically provided. For example, user 105 is prompted whether or notthe list of suggested invitations are to be automatically sent to theindividuals.

At 570, a list of the suggested invitations are automatically provided.For example, the invitations suggested by invitation suggestor 140 areautomatically sent to the individuals listed.

FIG. 6 depicts an embodiment of a method 500 for suggesting invitationsto a network. At 610 of method 600, user identification of a first userof the network is obtained. For example, the first and last name of user105 is obtained.

At 620, a database comprising a plurality of social graphs is accessed.In one embodiment, at 625, a database comprising a plurality of contactlists is accessed.

At 630, an association between the first user and at least oneindividual associated with at least one of the plurality of socialgraphs is determined, based on the plurality of social graphs. In oneembodiment, at 635, an association between the first user and at leastone individual associated with at least one contact list is determined.

At 640, suggested invitations to the network are generated, wherein theinvitations are for the at least one of the plurality of individuals.For example, a suggested invitation to Individual E is generated,because Individual E has the same last name and the same zip code asIndividual F.

At 650, the invitations are sent from the first user to the at least oneof the plurality of individuals. For example, invitations to utilizesystem 100 is sent from Individual F to Individual E, because it wasdetermined that there was an associate between the individuals. Invarious embodiments, the invitations can be sent via email, promotionalemail (e.g., newsletters, announcements, etc.)

Various embodiments of the present invention are thus described. Whilethe present invention has been described in particular embodiments, itshould be appreciated that the present invention should not be construedas limited by such embodiments, but rather construed according to thefollowing claims.

The invention claimed is:
 1. A computer-implemented method for obtaininginformation corresponding to a first user, said computer-implementedmethod comprising: obtaining information corresponding to a first userof a system, wherein said system comprises at least one of acommunications system and a network; accessing a database of saidsystem, wherein said database comprises information corresponding to atleast one individual of a plurality of individuals, wherein said atleast one individual of said plurality of individuals is at least one ofa second user of said system and included in any social graph, wherein aportion of said information corresponding to said at least oneindividual is received from a source other than a user of said system,and wherein a potential relationship between said first user and eachindividual of said plurality of individuals may be determined even ifsaid each individual is not a user of said system and is not registeredwith said system, wherein said database comprises an inversion point, apredetermined value of which being met signifying that said databaseprovides sufficient information for at least said user to access asufficiently large relevant list of people with which to at least one ofcommunicate, follow, and connect, wherein said sufficiently largerelevant list of people comprises a predetermined quantity of saidpeople; and determining an association between said first user and saidat least one individual, thereby achieving a determination of a set ofpotential relationships between said first user and said at least oneindividual.
 2. The computer-implemented method of claim 1, furthercomprising: providing a list of said set of potential relationships. 3.The computer-implemented method of claim 2, further comprising:providing a list of said set of potential relationships, wherein saidlist comprises a selectable offering of said at least one individual ofsaid plurality of individuals associated with said set of potentialrelationships.
 4. The computer-implemented method of claim 1, furthercomprising: filtering said set of potential relationships according topredetermined filter instructions.
 5. The computer-implemented method ofclaim 1, further comprising: automatically populating a contact list ofsaid first user with said at least one individual of said plurality ofindividuals associated with said set of actual relationships.
 6. Thecomputer-implemented method of claim 1, further comprising: from saidset of potential relationships, determining a set of actualrelationships between said first user and said at least one individualof said plurality of individuals.
 7. The computer-implemented method ofclaim 6, further comprising: providing selectable options for populatinga contact list on a device of said first user with said at least oneindividual of said plurality of individuals associated with said set ofactual relationships.
 8. The computer-implemented method of claim 6,further comprising: automatically populating an unpopulated contact listof said first user with said at least one individual of said pluralityof individuals associated with said set of actual relationships.
 9. Acomputer-implemented method for determining an association betweenindividuals, said computer-implemented method comprising: obtaining auser identification of a first user of a system, wherein said systemcomprises at least one of a communications system and a network;accessing a database of said system, wherein said database comprisesinformation corresponding to at least one individual of a plurality ofindividuals, wherein said at least an individual of said plurality ofindividuals is at least one of a second user of said system and includedin any social graph of a plurality of social graphs, wherein a portionof said information corresponding to said at least one individual isreceived from a source other than a user of said system, and wherein apotential relationship between said first user and each individual ofsaid plurality of individuals may be determined even if said eachindividual is not a user of said system and is not registered with saidsystem; based on said plurality of social graphs, determining anassociation between said first user and said at least one individualassociated with at least one social graph of said plurality of socialgraphs, thereby achieving a determination of a set of potentialrelationships between said first user and said at least one individualof said plurality of individuals; and generating a contact list of saidfirst user, for use in a hand-held mobile device, based on saiddetermination of said association between said first user and said atleast one individual associated with at least one contact list of aplurality of contact lists.
 10. The computer-implemented method of claim9, wherein said user identification is selected from a group consistingof: phone number, street address, zip code, email address, area code,and a Facebook ID.
 11. The computer-implemented method of claim 9,wherein said accessing a database comprising a plurality of socialgraphs further comprises: accessing a database comprising said pluralityof contact lists.
 12. The computer-implemented method of claim 9,wherein said determining an association between said first user and saidat least one individual associated with at least one of said pluralityof social graphs further comprises: determining an association betweensaid first user and said at least one individual associated with said atleast one contact list.
 13. The computer-implemented method of claim 9,further comprising: generating a social graph of said first user basedon said determination of said association between said first user andsaid at least one individual associated with said at least one socialgraph of said plurality of social graphs.
 14. The computer-implementedmethod of claim 9, wherein said accessing a database of said systemcomprises: accessing a database of said system, wherein said databasecomprises an inversion point, a predetermined value of which being metsignifying that said database provides sufficient information for atleast said user to access a sufficiently large relevant list of peoplewith which to at least one of communicate, follow, and connect, whereinsaid sufficiently large relevant list of people comprises apredetermined quantity of said people.
 15. A computer-implemented methodfor suggesting invitations to a network, said computer-implementedmethod comprising: obtaining information corresponding to a first userof said network, wherein a system comprises said network, wherein saidnetwork is a mobile video calling network; accessing a database of saidsystem, wherein said database comprises information corresponding to atleast one individual of a plurality of individuals, wherein said atleast one individual of said plurality of individuals is at least one ofa second user of said system and included in any social graph, wherein aportion of said information corresponding to said at least oneindividual is received from a source other than a user of said system,and wherein a potential relationship between said first user and eachindividual of said plurality of individuals may be determined even ifsaid each individual is not a user of said network and is not registeredwith said network; based on said information corresponding to said atleast one individual, determining an association between said first userand said at least one individual of said plurality of individuals,thereby achieving a determination of a set of potential relationshipsbetween said first user and said at least one individual; and generatingsuggested invitations to said network, wherein said invitations are forsaid at least one individual.
 16. The computer-implemented method ofclaim 15, further comprising: providing a list of said suggestedinvitations.
 17. The computer-implemented method of claim 16, furthercomprising: offering selections of said list of said suggestedinvitations.
 18. The computer-implemented method of claim 15, furthercomprising: offering to automatically provide a list of said suggestedinvitations.
 19. The computer-implemented method of claim 15, furthercomprising: automatically providing a list of said suggestedinvitations.
 20. A computer-implemented method for suggestinginvitations to a network, said computer-implemented method comprising:obtaining a user identification of a first user of said network, whereina system comprises said network, wherein said network is a mobile videocalling network; accessing a database of said system, wherein saiddatabase comprises information corresponding to at least one individualof a plurality of individuals, wherein said at least one individual ofsaid plurality of individuals is at least one of a second user of saidsystem and included in any social graph of a plurality of social graphs,wherein a portion of said information corresponding to said at least oneindividual is received from a source other than a user of said system,and wherein a potential relationship between said first user and eachindividual of said plurality of individuals may be determined even ifsaid each individual is not a user of said network and is not registeredwith said network; based on said plurality of social graphs, determiningan association between said first user and said at least one individualthat is associated with at least one social graph of said plurality ofsocial graphs; and generating a suggested invitation to said network,wherein said invitation is for said at least one individual.
 21. Thecomputer-implemented method of claim 20, wherein said useridentification is selected from a group consisting of: phone number,street address, zip code, email address, area code, and a Facebook ID.22. The computer-implemented method of claim 20, wherein said accessinga database comprises: accessing a database comprising a plurality ofcontact lists.
 23. The computer-implemented method of claim 20, whereinsaid determining an association between said first user and said atleast one individual that is associated with at least one social graphof said plurality of social graphs further comprises: determining anassociation between said first user and said at least one individualthat is associated with at least one contact list.
 24. Thecomputer-implemented method of claim 20, further comprising: sendingsaid invitation, from said first user, to said at least one individualof said plurality of individuals.
 25. A hand-held mobile device for usein a mobile video calling network, said hand-held mobile devicecomprising: a user information obtainer configured for obtaininginformation of a user of said mobile video calling network, wherein asystem comprises a mobile video calling network; a database accessorconfigured for accessing a database and obtaining information therefromcorresponding to at least one individual of a plurality of individuals,wherein said at least one individual of said plurality of individuals isat least one of a second user of said system and included in any socialgraph, wherein a portion of said information corresponding to said atleast one individual is received from a source other than a user of saidsystem, and wherein a potential relationship between said first user andeach individual of said plurality of individuals may be determined evenif said each individual is not a user of said system and is notregistered with said system; and a relationship determiner configuredfor determining an association between said first user and said at leastone individual, thereby achieving a determination of a set of potentialrelationships between said first user and said at least one individual.26. The hand-held mobile device of claim 25, further comprising: aninvitation suggestor configured for suggesting invitations for said atleast one individual of said plurality of individuals.
 27. The device ofclaim 25, further comprising: a list populator configured for populatinga contact list.
 28. The device of claim 25, further comprising: a filterconfigured for filtering said determination of an association betweensaid first user and said at least one individual of said plurality ofindividuals.
 29. The device of claim 25, further comprising: a filterconfigured for filtering a generated suggested invitation for said atleast one individual of said plurality of individuals.