System and method for presenting targeted content

ABSTRACT

A method and system for presenting targeted content to users over the internet is provided. The method includes enabling a user to sign into a website. An identifier is generated for the user, if the user is signing into the website for the first time. Information corresponding to the user is mined and the information is linked to the user. Further, verification is made to determine whether the generated identifier matches with existing identifiers. If the generated identifier matches with an existing identifier, then existing information corresponding to the matched identifier is linked to the user. Targeted content is presented to the user by processing at least the information linked to the user.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation application under 35 U.S.C. §120 of U.S. Non-provisional patent application Ser. No. 13/089,772, filed on Apr. 19, 2011 and claiming the benefit under 35 U.S.C. §119(e) of U.S. Provisional Application No. U.S. 61/400,663, filed on Aug. 2, 2010, the entire disclosures of both aforesaid prior applications being incorporated herein by reference.

BACKGROUND

1. Field

Embodiments relate generally to the field of presenting targeted content to users of a website and, more particularly but not exclusively, to presenting targeted content to the users based on information aggregated from one or more online social networking platforms.

2. Discussion of Related Field

It is a well-known fact that penetration of internet has increased substantially, and continues to increase. With increased penetration of the internet, users have started using internet for a gamut of reasons. Internet is being used for conducting research that helps in taking decisions, expressing views and opinions, and buying products and services, among other reasons.

A large number of web portals enable users to buy goods and services online. Some web portals allow users to only search or browse their inventory online and facilitate buying of goods and services available in their inventory. On the other hand, some web portals present targeted content, such as advertisements, recommendations or suggestions to a user on what goods or services the user may wish to buy.

One of the commonly adopted methodologies for presenting targeted content is collaborative filtering. Collaborative filtering is used with machine learning algorithms to present targeted content to users of the web portal. Amazon is one such web portal that appears to use collaborative filtering to group users who have carried out similar actions, and provides recommendations thereafter. It has been often observed that, sometimes, unrelated recommendations are presented to the user, when recommendations are provided based on the group a user pertains to, which has been algorithmically determined by adopting collaborative filtering algorithm. Additionally, the instant approach may not be ideal when a user is using the web portal for purchasing gifts for other persons. While purchasing gifts, the preference of the person receiving the gift is of importance. However, the instant approach does not appear to be designed to consider the preference of the person who will be receiving the gift into consideration for providing recommendations to the user purchasing the gifts.

Another approach for presenting targeted content to the user is by using information gathered from an online social networking platform, which the user might be using. A website, www.goodreads.com, is one such example that appears to recommend books to its users based on the information corresponding to the user that is gathered from an online social networking platform (www.facebook.com), which the user might be using. In the instant approach, the user is allowed to log into the web portal using his online social networking authentication credentials. After the user provides his online social networking authentication credentials, the user is asked to provide access to information that may be used to give recommendations. Once the user grants rights to access the information, the information is used to provide recommendation to the user. It shall be noted that, in the instant approach, information corresponding to the user is gathered from only one social networking platform, which the user is using. However, it has been observed that generally a single user socializes by using more than one online social networking platform. For instance, a user may use LinkedIn Network to socialize and increase acquaintances within his professional work. The same user may also use Facebook to interact and stay in touch with his friends. Additionally, the user may be using location based social networking platforms, such as, Foursquare to meet his friends at a given location. The interactions in each of these social networks are isolated from each other and there are no clear ways to aggregate the interactions of a user across social networks and share the information to applications, which can leverage this information to enhance the relevance of targeted content presented to the user.

In light of the foregoing discussion, there is a need for a technique to improve relevancy of the targeted content presented to users. Further, the technique shall enable aggregation of information corresponding to users across online social networking platforms. Furthermore, the technique shall enable sharing of the aggregated information to applications that can leverage the information to enhance the relevance of the targeted content presented to the user.

SUMMARY

In one aspect, a method for presenting targeted content to users over the internet is provided. The method includes enabling a user to sign into a website. An identifier is generated for the user, if the user is signing into the website for the first time. Information corresponding to the user is mined and the information is linked to the user. Further, verification is made to determine whether the generated identifier matches with existing identifiers. If the generated identifier matches with an existing identifier, then existing information corresponding to the matched identifier is linked to the user. Targeted content is presented to the user by processing at least the information linked to the user.

In another aspect, a method for presenting, to a user, recommendation of gifts for the user's one or more friends over the internet is provided. The method includes, authenticating the user through an online social networking platform and receiving selection from the user, wherein the selection comprises at least one friends of the user, present in the online social networking platform. Thereafter, information corresponding to the friend is mined from the online social networking platform. Recommending corresponding to gifts for the friend is presented based on processing of at least the mined information.

In yet another aspect, a system for presenting targeted content to users over the internet is provided. The system includes an authentication module, a data aggregation module, an identifier generation module, a database and a targeted content selection module. The authentication module is configured to enable a user to sign into a website. The data aggregation module is configured to mine information corresponding to the user. The identifier generation module is configured to generate an identifier for the user, if the user is signing into the website for the first time, and verify whether the generated identifier matches with existing identifiers. The database is configured to store mined information corresponding to the user, and link existing information corresponding to the matched identifier to the user, if the generated identifier matches with an existing identifier. The targeted content selection module is configured to present targeted content to the user by processing at least the information linked to the user.

BRIEF DESCRIPTION OF DRAWINGS

Embodiments are illustrated by way of example and not limitation in the Figures of the accompanying drawings, in which like references indicate similar elements and in which:

FIG. 1 is a block diagram illustrating a system 100 for presenting targeted content to users, in accordance with an embodiment;

FIG. 2 is a flow chart illustrating a method for generating identifier for a user, in accordance with an embodiment;

FIG. 3 is a flow chart illustrating a method for generating identifiers when a user creates an account using an online social networking platform, in accordance with an embodiment;

FIG. 4 is a flow chart illustrating a method for determining whether an identifier has already been created for a user whenever a new identifier has to be created, in accordance with an embodiment; and

FIG. 5 is a flow chart illustrating a method for recommending gifts, which a user may wish to purchase for his friends, in accordance with an embodiment.

DETAILED DESCRIPTION

The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with example embodiments. These example embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical, and electrical changes can be made without departing from the scope of what is claimed. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.

In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a nonexclusive “or” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. Furthermore, all publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.

FIG. 1 is a block diagram illustrating a system 100 for presenting targeted content to users, in accordance with an embodiment. System 100 may enable presenting targeted content, over the internet. The targeted content presented to the users, for example, can be, presenting recommendations corresponding to goods and services, which the users may wish to, buy or gift. Examples of goods and services can include, but are not limited to, gifts, books, concerts, restaurants, musical compositions, spa treatments, gadgets, clothing, pet accessories, jewelry and cosmetics. The targeted content presented to users, for example, may include, but not limited to, advertisements, links to web pages and customized layout of the website the user is visiting.

A user may use his user terminal 110 to access a website in which the targeted content is displayed to the user. The user terminal 110 can be, for example, a desktop computer, a laptop, a communication device, a personal digital assistant or a programmable consumer electronics device. The website, for example, can be an ecommerce website that enables online buying of goods and services. Alternatively, the website can be a blog or a corporate website. On the other hand, the website can be a platform that allows, for example, viewing of videos (Ex: YouTube), presentations (Ex: Slideshare), documents (Ex: Scribd) or lyrics (Ex: www.lyrics.com).

System 100 includes an authentication module 102, a data aggregation module 104, a database 106, an identifier generation module 107 and a targeted content selection module 108. The system 100 is configured to communicate with user terminals (Ex: User terminal 110) over a communication network 116. In FIG. 1, only one user terminal 110 is illustrated to simplify understanding of the embodiment. The system 100 is also configured to communicate over the communication network 116, with one or more social networking platforms. In FIG. 1 a first social networking platform 112 and a second social networking platform 114 are illustrated.

System 100 may be coupled with one or more websites in which visitors (users) to the websites are presented with targeted content. The authentication module 102 may be configured to enable users of a website to sign-in to the website, either by allowing the users to create an account in the website or by allowing signing-in using an online social networking platform (Ex: First social networking platform 112 or second social networking platform 114). If a user signs-in using the online first social networking platform 112, then the data aggregation module 104, which is configured to mine data corresponding to the user from the first social networking platform 112, extracts the data from the first social networking platform 112 after receiving permission from the user for such data mining. At least a part of the mined data is communicated to the identifier generation module 107. The identifier generation module 107 is configured to generate identifiers, using the mined data, for the user and the user's contacts present in the first social networking platform 112. Thereafter, the generated identifiers and the mined data are communicated to the database 106. The database 106 is configured to receive data from the data aggregation module 104 and the generated identifiers, and store the same for retrieval when desired. It shall be noted that the identifiers and the corresponding data are linked. Additionally, the relationship between the identifiers created for various users (and their friends) may also be created and stored. The targeted content selection module 108 is configured to query the database 106 and process the data provided by the database 106 to select content that can be presented to the user.

As highlighted in the foregoing discussion, the identifier generation module 107 is configured to generate identifiers using the information provided by or information mined using permission granted by the visitor. FIG. 2 is a flow chart illustrating a method for generating identifier for a user, in accordance with an embodiment. In this embodiment, an identifier is generated for a user who creates an account in the website. At step 202, the website is displayed in the web browser of the user terminal 110. If the user does not have an account in the website, then he may create an account using an account creation web page present in the website or by using an online social networking platform. In this embodiment, the user attempts to create an account using the account creation page. The account creation page may request the user to provide information that is required to create an account. For example, the information requested may include, first name, last name, date of birth, location and email address. At step 204, the information required to create the account is received from the user. Thereafter, at least a part of the information that is required to generate an identifier for the user is communicated to the identifier generation module 107, at step 206. The identifier, for example, may be generated using information fields, such as, first name, last name, date of birth, email address and location. It shall be noted that, from the instant example, one of more information field may be added or removed to generate identifiers.

In the foregoing embodiment, the identifier was created using information provided by the user while creating an account using the account creation page of the website. In another embodiment, identifier for a user may be generated when the user creates an account using a social networking platform. FIG. 3 is a flow chart illustrating a method for generating identifiers when a user creates an account using an online social networking platform, in accordance with an embodiment. As mentioned earlier, a user can create an account in the website using the website's account creation page or by using an online social networking platform (Ex: Facebook). If the user chooses to create an account using the online social networking platform, then at step 302, authentication webpage of the social networking platform is displayed. The user provides the authentications credentials, and upon successful authentication, a web page seeking permission to access data corresponding to the user, from the social networking platform is displayed at step 304. The information sought to be accessed, for example, may include, user's name, date of birth, location, email address, likes, dislikes, groups, interests and feeds. Additionally, permission may be sought to access user's friends' name, date of birth, location, email address, likes, dislikes, groups, interests and feeds. If the user does not grant access, then information is not accessed. On the other hand, if the user grants access, then at step 310, data is extracted by the data aggregation module 104. At least a part of the user's data, such as user's name, date of birth, location and sex, is used to generate identifier for the user at step 312 by the identifier generation module 107. Further, if the website configured in such a way that generation of identifier for each of user's friends is desired, then at step 318, identifier for each of user's friends is generated using information that is accessible to the data aggregation module 104.

It may be noted that, as aforementioned, data aggregated from one or more social networking platforms is used by the system 100 to present targeted content to the user. Hence, when a user creates an account in the website using the website's account creation page, the system 100 may have to identify whether data, extracted from a social networking platform, corresponding to the user is already present in the database 106, and use the same to present targeted content. For example, User 1 may create an account in the website using a social networking platform (Ex: Facebook), and provide access to data corresponding to User 2, who is in User 1's online social network. After gaining access to User 2's data, the system may generate an identifier for user 2, extract data corresponding to User 2 and store the data corresponding to User 2 in the database 106. In a scenario, wherein User 2 creates an account in the website using the account creation page of the website, the system may generate an identifier for User 2. Thereafter, the system may verify whether information, aggregated from a social networking platform, corresponding to User 2 is available in the database, and use the same to present targeted content, if information is available.

In another scenario, when the system 100 gets access to data corresponding to a user from more than one social networking platform, the system 100 may have to correlate the data from the social networking platforms to a single user. For example, system 100 may be coupled with two websites, Website 1 and Website 2, which allows users to create accounts in their websites using a first social networking platform and a second social networking platform, respectively. A user, for example, User 1 may create an account using the first social networking platform in website 1. The system 100 creates an identifier for User 1, when User 1 creates an account using the first social networking platform in website 1. Additionally, User 1 may create an account using the second social networking platform in website 2. System 100 creates an identifier for User 1 upon creation of the account in website 2. Thereafter, the system 100 may compare the identifier generated and identify that the identifier are generated for a unique person. Thereafter, the system 100 aggregates the information, corresponding to User 1, extracted from both the social networking platforms, and use the information to present targeted content to User 1.

In light of the foregoing discussion, it may be noted that the system 100 may be configured to determine whether an identifier has already been created for a user whenever the system 100 generates a new identifier. FIG. 4 is a flow chart illustrating a method for determining whether an identifier has already been created for a user whenever a new identifier has to be created, in accordance with an embodiment. At step 402, the user provides information that is required to create an account in the website. The information may be provided using an account creation page in the website or by using a social networking platform. Thereafter, at step 404, system 100 generates an identifier using the information received by the user. The generated identifier is compared with the existing identifiers at step 406. It shall be noted that, there can be various scenarios, wherein an identifier for the user has already been created. For example, the instant user's online social networking friend might have created an account using the social networking platform. During creation of the account, system 100 might have accessed information corresponding to the instant user, and created an identifier for the instant user. In another example, the instant user might have created an account in a first website, which is coupled to the system 100, using a first social networking platform. Thereafter, the instant user might be in the process of creating an account in a second website, which is coupled to the system 100, using a second social networking platform. In this scenario as well, the system might have created an identifier for the instant user when he created an account in the first website. Hence, by comparing the newly generated identifier with the existing identifier, the system 100 can identify unique users, and also aggregate information gathered from multiple social networking platforms to increase the relevancy of the targeted content presented to the user.

It shall be noted that, there can be various scenarios, wherein the newly generated identifier and the existing identifiers do not match completely. At step 410, the system checks whether there is a partial match between the newly generated identifier and the existing identifiers. If there is a partial match, then at step 412, the system 100 checks if the partial match is satisfactory to conclude that an identifier for the instant user already exists. If the partial match is satisfactory, then the system correlates existing information corresponding to the instant user with the newly discovered information to present targeted content to the instant user. However, if the match is not satisfactory, then the system may conclude that a new unique user has been identified.

In an embodiment, system 100 may be coupled to an ecommerce website that enables purchasing of entities over the internet. The user accesses the ecommerce website using a web browser provided in the user terminal 110. In an embodiment, the user is asked to authenticate himself. The user may authenticate himself by communicating his authentication credentials, such as, user identification and password to the authentication module 102. Alternatively, the user may authenticate himself using his authentication credentials for a online social networking platform, such as Facebook. To authenticate himself using the website online social networking platform, the user can click on the sign-in button of the social networking platform and provide the required authentication credentials in the sign-in web page of the social networking platform. The sign-in button of the social networking platform can be provided in the ecommerce website. In an embodiment, the authentication module 102 can be configured to seek additionally permission from the user. For example, when the user successfully authenticates himself by using the social networking platform, the user is requested to grant explicit permission to extract information corresponding to him. Further, permission may be sought to extract information corresponding to the user's friends. Furthermore, permission may be sought to carry out certain actions in the social networking platform, on behalf of the user.

If the user grants permission to the extract the requested information, then the data aggregation module 104 extract the information. The data aggregation module 104 may be configured to extract data to which the permission has been granted by the user.

In an embodiment, the data aggregation module 104 may extract, from the social networking platform, data corresponding to, user identification, date of birth, location of the user, email address, likes and dislikes. Additionally, the data aggregation module 104 may extract data corresponding to friends, such as, friends' name, date of birth, location, likes and dislikes.

In an embodiment, information to be stored in the database 106 may appear as:

         [user]            [[userid]: 1234          [username]: Jagdish Nomula            [dob]: 01/01/1976            [location]: San Jose            [friends]              [friend ]                [[friendid]: 1324          [username]: Todd Johnson          [dob]:01/02/1974          [location]: San Francisco          [hobbies]: Hiking, Tennis          [likes]: Britney Spears, Barak Obama    [feed]: The next time Steve pulls out a new iPhone, you can be sure where everyone's eyes will be ....          ]            ....          ]]

For the above example, in an embodiment, a hash function may be used, which maps username, date of birth and location to a Byte Array. A person skilled in art would know that this functionality could be replaced with other implementations. This function could be a one-way hash function, to ensure that privacy of users is not compromised.

The identifier generation module 107 may be configured to generate an identifier for the user. The identifier may be generated using name of the user, date of birth and location of the user, which are extracted from the social networking platform.

In an embodiment, the identifier may be generated using the name of the user and the user's date of birth.

In another embodiment, the identifier may be generated using the user ID and the user's date of birth.

In yet another embodiment, the identifier may be generated using the user ID, user's date of birth, email address and location of the user.

The identifier generated and the extracted data is sent to the database 106. The database 106 is configured to store the identifier and the corresponding data. The database 106 is configured to be queried, at least by the targeted content selection module 108. The database 106 may be configured to enable retrieval of data from the database 106 by the targeted content selection 108 for further processing to generate recommendations of entities, which will be presented to the user. It shall be noted that the information used for processing is mapped to the context in which targeted content is being presented to the user.

In an embodiment, system 100 may be configured to recommend gifts to users, which the users may buy for his friend(s). FIG. 5 is a flow chart illustrating a method for recommending gifts, which a user may wish to purchase for his friends, in accordance with an embodiment. An ecommerce website may allow a user to purchase gifts for his friends. Such a website may be configured to present recommendations corresponding to the gifts the user's friend or friends may like. In order to purchase gifts, the user accesses the website using a web browser. The website may allow the user to purchase gifts or present recommendations after the user successfully authenticates himself. At step 502, the user authenticates himself using a social networking platform. A link to the authentication page of the social networking platform may be provided in the ecommerce website. After successful authentication, the user selects one or more friends who are in his friend network in the online social networking platform, for whom the user wishes to purchase gifts. To make understanding convenient, we may assume that the user selects one friend from the social networking platform. The system 100 extracts information corresponding to the friend, and processes the information at step 506. Thereafter, based on the processing, system 100 presents recommendations corresponding to the gifts the user's friend may like. In one embodiment of extracting application related information, a naive Bayes classifier is used to classify a person as a sports fanatic or tech savvy person and recommend him sports accessories or tech gadgets. In another embodiment, collaborative filtering algorithm is used to recommend gifts to used based on gifting/personality related keywords in social feed.

In an embodiment, after the user selects a friend to whom he wishes to purchase gift(s), the system may generate an identifier for the friend. Thereafter, the system 100 may verify if the generated identifier matches (completely or partially as described earlier) with existing identifiers. If the generated identifier does not match with the existing identifier, the system 100 may conclude that a new user has been identified. The system 100 extracts information corresponding to the friend from the social networking platform. The information is processed by system 100 to present recommendations corresponding to the gifts the user's friend may like.

Alternatively, if the generated identifier for the friend matches with an existing identifier, then the system may use information corresponding to the friend, which may already exist in system 100, and may extract any new information corresponding to the friend from the social networking platform, to process and present recommendations. It shall be noted that information, corresponding to the friend, which may have been extracted from other social networking platforms, may exist in the system. In this scenario, system 100 will be able to provide recommendation based on information, corresponding to the friend, which has been aggregated from more than one online social networking platform.

As an example, the system 100 may be configured with two websites, one that sells goods and services, and other that facilitates purchasing gifts for friends. If the friend (from the above embodiments) has used to first website to purchase an iPhone, the system may have generated an identifier for the friend and aggregated information about the friend, including the activity of purchasing of the iPhone. Thereafter, when the user (from the above embodiments) signs-in to the second website to purchase gifts for his friend, the system 100 may generate an identifier for the friend. Thereafter, the system 100 realizes that an identifier has already been created for the friend. Subsequently, system 100 uses information corresponding to the friend, such as, purchase of the iPhone, to provide recommendation. For example, the gift recommendations may include accessories for iPhone, such as, iPhone cases, car charger and iPhone screen protector, which the user's friend may like, thereby, increasing the relevancy of the recommendations presented.

In another example of recommending gifts, system 100 may have access to information corresponding to the user's friend from more than one social networking platform, such as Foursquare, which may provide information corresponding to the friend's location, and another social networking platform, such as Facebook, which may provide information, such as likes, dislikes and interests, corresponding to the friend's. The system can use the information, aggregated from both the social networking platforms, corresponding to the friend, to provide gift recommendations to the user. For example, the system may identifies that the user's friend is in London from one of the social networking platforms, and may also identify that the friend likes wine tasting, from the second social networking platform. In light of these identifications, the system may include wine tasting sessions and offers among the recommendation of gifts provided to the user, who may purchase the gift for his friend, thereby enhancing the relevancy of the recommendations presented.

In an embodiment, user friend's information (feed information) is combined with recommendation algorithms, such as, collaborative algorithm, which can be used in the friend feed as additional attributes in estimating the relevance of results that are shown to the user.

In one of the embodiments, a friend feed is analyzed for keywords in an application context, which is used to refine the neighbor-hood scores given by collaborative filtering/information retrieval algorithms. The important keywords themselves can be extracted from a data store combined with category information in the feed from the friend. For example, if the feed includes “Music: Britney Spears concert is great”, then a music recommendation application would add Britney Spears as one of the liked artists in Music Entities Category, by doing a data-store lookup for important string matches in the feed, combined with sentiment analysis. In an embodiment, important strings in the feed are extracted using token weights, TFIDF (term frequency inverted document frequency) scores across social feed by eliminating stop words approach in one embodiment. The sentiment analysis can be done by a Bayes classifier in one embodiment. In another embodiment, a SVM (support vector machines) classifier is used to get sentiment information about a given entity. It is to be noted that a person skilled in the art can come up with different ways of analyzing feed. One embodiment for instance can just use look up in the data store for the whole, skip the token weights and use a decision tree for sentiment analysis.

A person skilled in art would know that social feeds that are derived in an application can be used across other applications as we are storing the feeds and users info in a data store.

We also need to note that, we are aggregating information about the user's friend as well, from the feed in the data store, which can be used later when we need to present targeted content to the friend when the friend visits a website that is coupled to system 100.

In another embodiment, all the recommendation services leveraging social network feeds can be hosted in a single domain, in which case, the website can lookup cookie values and provide recommendations without asking the user to login into social network.

In an embodiment, when a user visits a food recommendation site, the user is asked to log into location networking sites such as www.twitter.com or www.foursquare.com or www.google.com/latitude to retrieve his and his network's information. The response from the feeds can then be used to aggregate the information for each user in the response from the location based social network, using identifier approach. In this embodiment, we have information about his location as well as the user's personal interests, which can be used, for example, to recommend “Indian restaurants” in “San Jose”. The system 100 can predict that the user likes Indian restaurant, based on his analysis of, for example, Facebook profile, and location as San Jose, from one of the location based social networks.

In an embodiment, the system 100 may present a user with targeted content based on information extracted, corresponding to the user, from more than one social networking platforms. This may be made possible by coupling the system 100 with more than one website that enables creation of account using distinct social networking platforms.

It shall be noted that, with time, system 100 may have access to various categories of information corresponding to several users. Using this information, the system may generate a graph of users and, goods and service, which users may be interested in. This graph may be used by the system to process and present targeted content.

The processes described above and illustrated in the drawings is shown as a sequence of steps, this was done solely for the sake of illustration. Accordingly, it is contemplated that some steps may be added, some steps may be omitted, the order of the steps may be re-arranged, and/or some steps may be performed simultaneously.

The example embodiments described herein may be implemented in an operating environment comprising software installed on a computer, in hardware, or in a combination of software and hardware.

Although embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the system and method described herein. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.

Many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. It is to be understood that the description above contains many specifications, these should not be construed as limiting the scope of the invention but as merely providing illustrations of some of the personally preferred embodiments of this invention. Thus the scope of the invention should be determined by the appended claims and their legal equivalents rather than by the examples given. 

What is claimed is:
 1. A method, performed by a computer system, for recommending to a first user of targeted gifts for a second user in an online social network of the first user, the first user operating a user terminal, the online social network of the first user established through a social networking platform communicable to both the computer system and the user terminal, the computer system comprising a database storing purchase activity information of a plurality of users, the method comprising the steps of: providing, by the computer system, a first user interface (UI) to the user terminal for display, the first UI containing one or more UI elements allowing the first user to authenticate to the social networking platform using the first user interface as a way for the first user to sign-up with or authenticate into the computer system; receiving, by the computer system, social network information of the first user from the social networking platform after the first user successfully authenticates to the social network platform, the received social network information including information about the second user; providing, by the computer system, a second UI to the user terminal for display, the second UI listing the second user as a selectable recipient for receiving one or more gift items from the first user; receiving, by the computer system, selection information from the user terminal, the selection information indicating that the second user is selected by the first user as a recipient to receive one or more gifts from the first user; extracting, by the computer system, social network information of the second user from the social networking platform, determining, by the computer system, whether the database stores purchase activity information of the second user using the extracted social network information of the second user; retrieving, when purchase activity information of the second user is determined to be present in the database, purchase activity information of the second user, and deciding one or more potential gift items for the second user using at least the retrieved purchase activity information of the second user; and providing, by the computer system, a third UI to the user terminal for display, the third UI listing the decided one or more potential gift items as selectable for purchase for the second user.
 2. The method of claim 1, wherein the determining of whether the database stores purchase activity information of the second user comprises the steps of: generating an identifier for the second user using the extracted social network information of the second user; and determining whether the identifier has already been created for the second user by querying the database; and if the database indicates that the generated identifier matches an existing identifier stored in the database, informing the computer system that the database stores purchase activity information of the second user.
 3. The method of claim 2, wherein the generating of an identifier for the second user further comprises generating an identifier for the second user using a subset of first name, last name, date of birth, location and email address of the second user included in the extracted social network information of the second user.
 4. The method of claim 1, wherein collaborative filtering algorithm is used in the deciding of one or more potential gift items for the second user, to decide specific goods or services which the second user may like or need, using the retrieved purchase activity information of the second user.
 5. The method of claim 1, wherein a machine learning algorithm is used in the deciding of one or more potential gift items for the second user, to perform sentiment analysis in order to classify the second user for better gifting needs so as to match the second user with appropriate gifts.
 6. A method, performed by a computer system, for recommending to a first user of targeted gifts for a second user in an online social network of the first user established through a first social networking platform, the first user operating a user terminal, the first social networking platform and a second social networking platform both communicable to both the computer system and the user terminal, the computer system comprising a database storing aggregated social network information of a plurality of system users, the aggregated social network information of each system user aggregated from one or more social networking platforms, the method comprising the steps of: providing, by the computer system, a first user interface (UI) to the user terminal for display, the first UI containing one or more UI elements allowing the first user to authenticate to the first online social networking platform using the first user interface as a way for the first user to sign-up with or authenticate into the computer system; receiving, by the computer system, social network information of the first user from the first social networking platform after the first user successfully authenticates to the first social networking platform, the received social network information including information about the second user; providing, by the computer system, a second UI to the user terminal for display, the second UI listing the second user as a selectable recipient for receiving one or more gift items from the first user; receiving, by the computer system, selection information from the user terminal, the selection information indicating that the second user is selected by the first user as a recipient to receive one or more gifts from the first user; extracting, by the computer system, social network information of the second user from the first social networking platform; and determining, by the computer system, whether the database stores aggregated social network information of the second user using the extracted social network information of the second user; if aggregated social network information of the second user is found in the database, retrieving, by the computer system, aggregated social network information of the second user, and deciding one or more potential gift items for the second user using at least the retrieved aggregated social network information of the second user; and providing by the computer system, a third UI to the user terminal for display, the third UI listing the decided one or more potential gift items as selectable for purchase for the second user.
 7. The method of claim 6, wherein the determining of whether the database stores aggregated social network information of the second user comprises the steps of: generating an identifier for the second user using the extracted social network information of the second user; and determining whether the identifier has already been created for the second user by querying the database; and if the database indicates that the generated identifier matches an existing identifier stored in the database, informing the computer system that the database stores aggregated social network information of the second user.
 8. The method of claim 6, wherein the aggregated social network information of the second user includes at least one of social feeds of the second user, location of the second user, likes of the second user, and dislikes of the second user.
 9. The method of claim 6, wherein collaborative filtering algorithm is used in the deciding of one or more potential gift items for the second user, to decide specific goods or services which the second user may like or need, using the aggregated social network information of the second user.
 10. The method of claim 6, wherein a machine learning algorithm is used in the deciding of one or more potential gift items for the second user, to perform sentiment analysis in order to classify the second user for better gifting needs so as to match the second user with appropriate gifts.
 11. A system for recommending to a first user of targeted gifts for a second user in an online social network of the first user, the first user operating a user terminal, the online social network of the first user established through a social networking platform communicable to both the user terminal and the system, the system having a database storing purchase activity information of a plurality of users, the system comprising: a processor; a system memory, said system memory storing a plurality of application modules adapted to perform, when executed by the processor, a set of steps comprising: providing a first user interface (UI) to the user terminal for display, the first UI containing one or more UI elements allowing the first user to authenticate to the social networking platform using the first user interface as a way for the first user to sign-up with or authenticate into the computer system; receiving social network information of the first user from the social networking platform after the first user successfully authenticates to the social network platform, the received social network information including information about the second user; providing a second UI to the user terminal for display, the second UI listing the second user as a selectable recipient for receiving one or more gift items from the first user; receiving selection information from the user terminal, the selection information indicating that the second user is selected by the first user as a recipient to receive one or more gifts from the first user; extracting social network information of the second user from the social networking platform, determining whether the database stores purchase activity information of the second user using the extracted social network information of the second user; retrieving, when purchase activity information of the second user is determined to be present in the database, purchase activity information of the second user, and deciding one or more potential gift items for the second user using at least the retrieved purchase activity information of the second user; and providing, by the computer system, a third UI to the user terminal for display, the third UI listing the decided one or more potential gift items as selectable for purchase for the second user; and the database configured to store the purchase activity information of the plurality of users and data received from the plurality of application modules.
 12. The system of claim 11, wherein the determining of whether the database stores purchase activity information of the second user comprises the steps of: generating an identifier for the second user using the extracted social network information of the second user; and determining whether the identifier has already been created for the second user by querying the database; and if the database indicates that the generated identifier matches an existing identifier stored in the database, informing the computer system that the database stores purchase activity information of the second user.
 13. The system of claim 12, wherein the generating of an identifier for the second user further comprises generating an identifier for the second user using a subset of first name, last name, date of birth, location and email address of the second user included in the extracted social network information of the second user.
 14. The system of claim 11, wherein collaborative filtering algorithm is used in the deciding of one or more potential gift items for the second user, to decide specific goods or services which the second user may like or need, using the retrieved purchase activity information of the second user.
 15. The method of claim 13, wherein a machine learning algorithm is used in the deciding of one or more potential gift items for the second user, to perform sentiment analysis in order to classify the second user for better gifting needs so as to match the second user with appropriate gifts.
 16. A system for recommending to a first user of targeted gifts for a second user in an online social network of the first user established through a first social networking platform, the first user operating a user terminal, the first social networking platform and a second social networking platform both communicable to both the computer system and the user terminal, the system comprising a database storing aggregated social network information of a plurality of users, the aggregated social network information of each user aggregated from one or more social networking platforms, the system comprising: a processor; a system memory, said system memory storing a plurality of application modules adapted to perform, when executed by the processor, a set of steps comprising: providing, by the computer system, a first user interface (UI) to the user terminal for display, the first UI containing one or more UI elements allowing the first user to authenticate to the first online social networking platform using the first user interface as a way for the first user to sign-up with or authenticate into the computer system; receiving, by the computer system, social network information of the first user from the first social networking platform after the first user successfully authenticates to the first social networking platform, the received social network information including information about the second user; providing, by the computer system, a second UI to the user terminal for display, the second UI listing the second user as a selectable recipient for receiving one or more gift items from the first user; receiving, by the computer system, selection information from the user terminal, the selection information indicating that the second user is selected by the first user as a recipient to receive one or more gifts from the first user; extracting, by the computer system, social network information of the second user from the first social networking platform; and determining, by the computer system, whether the database stores aggregated social network information of the second user using the extracted social network information of the second user; if aggregated social network information of the second user is found in the database, retrieving, by the computer system, aggregated social network information of the second user, and deciding one or more potential gift items for the second user using at least the retrieved aggregated social network information of the second user; and providing by the computer system, a third UI to the user terminal for display, the third UI listing the decided one or more potential gift items as selectable for purchase for the second user; and the database configured to store the aggregated social network information of the plurality of users and data received from the plurality of application modules.
 17. The system of claim 16, wherein the determining of whether the database stores aggregated social network information of the second user comprises the steps of: generating an identifier for the second user using the extracted social network information of the second user; and determining whether the identifier has already been created for the second user by querying the database; and if the database indicates that the generated identifier matches an existing identifier stored in the database, informing the computer system that the database stores aggregated social network information of the second user.
 18. The system of claim 16, wherein the aggregated social network information of the second user includes at least one of social feeds of the second user, location of the second user, likes of the second user, and dislikes of the second user.
 19. The system of claim 16, wherein collaborative filtering algorithm is used in the deciding of one or more potential gift items for the second user, to decide specific goods or services which the second user may like or need, using the aggregated social network information of the second user.
 20. The system of claim 16, wherein a machine learning algorithm is used in the deciding of one or more potential gift items for the second user, to perform sentiment analysis in order to classify the second user for better gifting needs so as to match the second user with appropriate gifts. 