PERSONAL SEARCHABLE DOCUMENT COLLECTIONS WITH ASSOCIATED USER REFERENCES
20230115998 · 2023-04-13
Inventors
Cpc classification
International classification
G06F16/38
PHYSICS
Abstract
The present invention relates to user searches of the Internet, document repositories, online reporting agencies, information databases, social media outlets, audio or video images, or any other desirable searchable media or information. According to the present invention, a user may perform a search and may take into account certain users or user groups who may have previously searched out the same items so that a user can limit or influence its current search taking into account prior user searches for particular prior user purposes. Accordingly, users may curate their searches based on the information entered by other users or even the same user during previous searches, so that the universe of searched resources may be limited to those most likely to pertain to that user search, based on previous users or subsets of users as selected by the user, that is, crowd sourced curation of metadata.
Claims
1. (canceled)
2. An apparatus for searching a hierarchy of document references comprising including a computer with associated non-transitory memory and available online information: a first user data interface suitable for entry of a search term; a criteria non-transitory memory element for storing data for access by containing information relating to search scope specified by said first user of said apparatus defining search scope, and said system comparing applying said search term to said search scope specified by said first user; said computer capable of transmitting and receiving information over the internet; the computer storing a specific user interface available over the internet at a specific URL; the available online information including written articles & stories, blogs, photographs, videos & animations, geographic locations (latitude and longitudes, counties, states, cites, neighborhoods etc.), buildings and businesses, websites, sporting events, recipes, comics & illustrations and social media profiles for individuals or entities; the available online information having an associated URL; said online information with associated URL capable of annotation through hash tags or hash paths automatically generated if specific metadata is found; sharing said annotated online information with an associated location; and the server providing output of metadata associated with said shared annotated online information in the form of a text file via a display, and wherein said metadata is automatically selectively used as to a time window and private index; wherein available online information having an associated URL for storage in a user's collection further comprises reference documentation including: the title of the document; the reference creators identification; non alpha-numeric tags including hash tags denoting at least subject matter and topic of interest contained in the available online information; data and time said available online information having an associated URL was added to the user's collection; location of the user when said available online information having an associated URL was added to the user's collection; and privacy settings of the said available online information having an associated URL in the user's collection, and wherein said users may designate various of said user's collections of searches as private as included in said private index or non-private by way of said hash tags or hash paths for forming a topic tree associated with said searches and second users may search based on said hash tags or hash paths as to said non-private collections or authorized private collections corresponding with said topic trees.
3. The apparatus of claim 2, wherein the output of metadata associated with shared annotated online information comprises hashtags, hash paths, key-words, or key-phrases to be associated with said annotated online information.
4. The apparatus of claim 2, wherein available online information comprises a plurality of unique user metadata associated with online information having an associated URL.
5. The apparatus of claim 2, wherein said online information with associated URL capable of annotation through hash tags or hash paths further comprises a topic tree generated from said hash tags and hash paths.
6. The apparatus of claim 2, wherein prior to storing data for access by containing information relating to search scope specified by said first user of said apparatus defining search scope, a check is performed against reference data previously stored by the system.
7. A method for searching a hierarchy of document references comprising including a computer with associated non-transitory memory and available online information: a first user data interface suitable for entry of a search term; a criteria non-transitory memory element for storing data for access by containing information relating to search scope specified by said first user of said apparatus defining search scope, and said system comparing applying said search term to said search scope specified by said first user; said computer capable of transmitting and receiving information over the internet; the computer storing a specific user interface available over the internet at a specific URL; the available online information including written articles & stories, blogs, photographs, videos & animations, geographic locations (latitude and longitudes, counties, states, cites, neighborhoods etc.), buildings and businesses, websites, sporting events, recipes, comics & illustrations and social media profiles for individuals or entities; the available online information having an associated URL; said online information with associated URL capable of annotation through hash tags or hash paths automatically generated if specific metadata is found; sharing said annotated online information with an associated location; and the server providing output of metadata associated with said shared annotated online information in the form of a text file via a display, and wherein said metadata is automatically selectively used as to a time window and private index; wherein available online information having an associated URL for storage in a user's collection further comprises reference documentation including: the title of the document; the reference creators identification; non alpha-numeric tags including hash tags denoting at least subject matter and topic of interest contained in the available online information; data and time said available online information having an associated URL was added to the user's collection; location of the user when said available online information having an associated URL was added to the user's collection; and privacy settings of the said available online information having an associated URL in the user's collection, and wherein said users may designate various of said user's collections of searches as private as included in said private index or non-private by way of said hash tags or hash paths for forming a topic tree associated with said searches and second users may search based on said hash tags or hash paths as to said non-private collections or authorized private collections corresponding with said topic trees.
8. The method of claim 7, wherein the output of metadata associated with shared annotated online information comprises hashtags, hash paths, key-words, or key-phrases to be associated with said annotated online information.
9. The method of claim 7, wherein said online information with associated URL capable of annotation through hash tags or hash paths further comprises a topic tree generated from said hash tags and hash paths.
10. The method of claim 7, wherein prior to storing data for access by containing information relating to search scope specified by said first user of said apparatus defining search scope, a check is performed against reference data previously stored by the system.
11. An apparatus for searching a hierarchy of document references including a computer with associated non-transitory memory and available online information: a first user data interface suitable for entry of a search term; a criteria non-transitory memory element containing information relating to search scope specified by said first user of said apparatus defining search scope; said system retrieving available online reference within said search scope specified by said first user; said available online reference having an associated URL; applying metadata, hashtags, and hash paths to said available online reference having an associated URL; generating a public or private index of said available online reference coupled to associated metadata, hashtags, and hash paths, said online reference having an associated URL; adding said reference to said index list; adding subsequent references as branches to a user specific topic tree for one or more hashtags or hash paths automatically generated if specific metadata is found; sharing said annotated online information with an associated location; and the server providing output of metadata associated with said shared annotated online information in the form of a text file via a display, and wherein said metadata is automatically selectively used as to a time window and private index; wherein metadata applied to said reference comprises: the title of the document; the reference creators identification; non alpha-numeric tags including hash tags denoting at least subject matter and topic of interest contained in the available online information; data and time said available online information having an associated URL was added to the user's collection; location of the user when said available online information having an associated URL was added to the user's collection; and privacy settings of the said available online information having an associated URL in the user's collection, and wherein said users may designate various of said user's collections of searches as private as included in said private index or non-private by way of said hash tags or hash paths for forming a topic tree associated with said searches and second users may search based on said hash tags or hash paths as to said non-private collections or authorized private collections corresponding with said topic trees.
12. The apparatus of claim 11, wherein said available online reference comprises: written articles & stories, blogs, photographs, videos & animations, geographic locations (latitude and longitudes, counties, states, cites, neighborhoods etc.), buildings and businesses, websites, sporting events, recipes, comics & illustrations and social media profiles for individuals or entities.
13. The apparatus of claim 11, wherein metadata applied to said reference may be automatically generated by the system.
14. The apparatus of claim 11, wherein metadata applied to said reference may be assigned by a first user.
15. The apparatus of claim 11, wherein adding subsequent references as branches to a user specific topic tree for one or more hashtags or hash paths further comprises: prior to adding subsequent references, searching all public and private indexes to match search terms to a plurality of metadata of said references and displaying an indication of matches to said first user.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0019] In accordance, preferred embodiments of the inventions, Personal Searchable Document Collections with Associated User References, are provided. For the purposes of describing the present invention, the terms library and collection will generally be interchangeable. It will be appreciated that each of the embodiments described include methods and that the methods of one preferred embodiment may be different than the methods of another embodiment. The preferred embodiments described herein are not the sum total of the invention but merely contain certain methods of how the disclosed invention may provide unique experiences to users of the system.
[0020] According to the present invention, a user adds a document to the system and a user adds reference data to be associated with document, hash tags or hash paths etc. The database checks to see if a document already exists in the database is also performed. If no, the document is added to the database (hereinafter “DB”) and a document is “crawled” (A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.) and a user's unique reference is added.(User is tagged as originator of document)
Other crawled information about the document is added to DB, publication date, author, document size, file type, formatting, geo-location, etc. A potential list of what is crawled is set forth herein. If yes, a user's new unique reference to existing document is added. A user's hashtags and other information are associated with references and specific to user are added. User's hash tags and hash paths are added to their topic trees
A user may now search and find personal references using any of above information. If made public or available to a group, others may find the same information or a partial piece of data in the reference. A user may search other public or permitted reference collections (the “Reference”) using similar information.
[0021]
[0022] The flowchart then branches to step 106. In step 106 the system adds the Metadata gleaned by the crawl to the Reference. The flowchart then branches to step 107. In step 107 the system determines if any rules are in place instructing the system to automatically generate hash tags or hash paths if specific Metadata is found. If such rules are in place the flowchart branches to step 108. If such rules are not in place the flowchart branches to step 110. In step 108 the system determines if any hash tags and/or hash paths have been automatically created by rule. If hash tags and/or hash paths have been automatically created by rule the flowchart branches to step 109. If hash tags and/or hash paths have not been automatically created by rule the flowchart branches to step 110. In step 109 the system adds hash tags and/or hash paths automatically created by rule to the Reference.
[0023] The flowchart then branches to step 110. In step 110 the system determines if the user of the system has opted to add the Reference to an existing Private Index associated with that user. If the user of the system has opted to add the Reference to a Private Index the flowchart branches to step 111. If the user of the system has not opted to add the Reference to a Private Index the flowchart branches to step 112. In step 111 the system adds the Reference to the selected existing Private Index list. The flowchart then branches to step 115. In step 112 the system determines if the user of the system has opted to add the Reference to a new Private Index associated with that user. If the user of the system has opted to add the Reference to a new Private Index the flowchart branches to step 114. If the user of the system has not opted to add the Reference to a new Private Index the flowchart branches to step 113. In step 114 the system generates the new user associated Private Index and adds the Reference to the new Private Index list.
[0024] The flowchart then branches to step 115. In step 113 the system adds the Reference to the Public Index list. The flowchart then branches to step 115. In step 115 the system determines if the Reference include one or more hash tags or hash paths. If the system determines that the Reference does not include one or more hash tags or hash paths the flowchart branches to step 119. In step 119 the system adds the Reference to the base/root level of the topic tree associated with the user of the system (the “Topic Tree”). In this way a reference may not appear in a branch of the Topic Tree but the reference may still be located in the Topic Tree by searching for keywords etc that are part of the metadata. If the system determines that the Reference does include one or more hash tags or hash paths the flowchart branches to step 116. In step 116 the system determines if a branch in the Topic Tree already exists for one or more of the hash tags or hash paths of the Reference.
[0025] If a branch in the Topic Tree already exists for one or more of the hash tags or hash paths of the Reference the flowchart branches to step 117. If a branch in the Topic Tree does not already exist for one or more of the hash tags or hash paths of the Reference the flowchart branches to step 118. In step 117 the system adds the Reference to those already existing branches of the Topic Tree. The flowchart then branches to step 118. In step 118 the system automatically generates new branches of the Topic Tree for all hash tags and hash paths of the Reference that do not have pre-existing branches in the Topic Tree and adds the Reference to same. In this way new branches of the Topic Tree will be automatically created and populated by the system. It should be noted that, depending on the hash tags and hash paths of the Reference, a Reference may be added to multiple branches of the user's Topic Tree. A better understanding of the user specific Topic Tree may be gained by reference to
[0026]
[0027] The flowchart then branches to step 203. In step 203 the system determines if the Document location already exists in the system database. If the Document Location does already exist in the system database the flowchart branches to step 205. If the Document Location does not already exist in the system database the flowchart branches to step 204. In step 205 the system determines if the database contains Metadata associated with the Document Location. If the database does not contain Metadata associated with the Document Location the flowchart branches to step 204. If the database does contain Metadata associated with the Document Location the flowchart branches to step 206. In step 204 the system crawls the Document to generate metadata relating to the Document and stores this Metadata with the Document Location in the database of the system. The flowchart then branches to step 206. In step 206 the system adds the Metadata to the Reference.
[0028] The flowchart then branches to step 207. In step 207 the system determines if the user has defined one or more hash tags, hash paths, keywords or key-phrases to be associated with the document. If the user has defined one or more hash tags, hash paths, keywords or key-phrases to be associated with the document the flowchart branches to step 208. If the user has not defined one or more hash tags, hash paths, keywords or key-phrases to be associated with the document then the flowchart branches to step 209. In step 208 the system adds the user-defined hash tags, hash paths, key-words and/or key-phrases to the Reference. The flowchart then branches to step 209. In step 209 the system determines if any rules are in place instructing the system to automatically generate hash tags or hash paths if specific Metadata is found. If such rules are in place the flowchart branches to step 210. If such rules are not in place the flowchart branches to step 211. In step 210 the system determines if any hash tags and/or hash paths have been automatically created by rule. If hash tags and/or hash paths have been automatically created by rule the flowchart branches to step 211. If hash tags and/or hash paths have not been automatically created by rule the flowchart branches to step 211. In step 211 the system adds hash tags and/or hash paths automatically created by rule to the Reference.
[0029] The flowchart then branches to step 211. In step 211 the system determines if the user of the system has opted to add the Reference to an existing Private Index associated with that user. If the user of the system has opted to add the Reference to a Private Index the flowchart branches to step 213. If the user of the system has not opted to add the Reference to a Private Index the flowchart branches to step 214. In step 213 the system adds the Reference to the selected existing Private Index list. The flowchart then branches to step 217. In step 214 the system determines if the user of the system has opted to add the Reference to a new Private Index associated with that user. If the user of the system has opted to add the Reference to a new Private Index the flowchart branches to step 216. If the user of the system has not opted to add the Reference to a new Private Index the flowchart branches to step 215. In step 216 the system generates the new user associated Private Index and adds the Reference to the new Private Index list.
[0030] The flowchart then branches to step 217. In step 215 the system adds the Reference to the Public Index list. The flowchart then branches to step 217. In step 217 the system determines if the Reference includes one or more hash tags or hash paths. If the system determines that the Reference does not include one or more hash tags or hash paths the flowchart branches to step 221. In step 221 the system adds the Reference to the base/root level of the topic tree associated with the user of the system (the “Topic Tree”). In this way a reference may not appear in a branch of the Topic Tree but the reference may still be located in the Topic Tree by searching for keywords etc that are part of the metadata. If the system determines that the Reference does include one or more hash tags or hash paths the flowchart branches to step 218. In step 218 the system determines if a branch in the Topic Tree already exists for one or more of the hash tags or hash paths of the Reference. If a branch in the Topic Tree already exists for one or more of the hash tags or hash paths of the Reference the flowchart branches to step 219. If a branch in the Topic Tree does not already exist for one or more of the hash tags or hash paths of the Reference the flowchart branches to step 220. In step 219 the system adds the Reference to those already existing branches of the Topic Tree.
[0031] The flowchart then branches to step 220. In step 220 the system automatically generates new branches of the Topic Tree for all hash tags and hash paths of the Reference that do not have pre-existing branches in the Topic Tree and adds the Reference to same. In this way new branches of the Topic Tree will be automatically created and populated by the system. It should be noted that, depending on the hash tags and hash paths of the Reference, a References may be added to multiple branches of the Topic Tree.
[0032]
[0033] The flowchart then branches to step 303. In step 303 the system determines if any such Search Term matches where found. If Search Term matches where found the flowchart branches to step 304. If Search Term matches where not found the flowchart branches to step 305. In step 304 the system displays the Document Locations or, if present, the title associated with the matched References to User A. It should be noted that References may have been given titles, either by the user or automatically by the system based upon the Metadata of the Document, and these titles may be displayed instead of the actual Document Location. In Step 305 the system inform User A that no matches to the Search Term have been found.
[0034]
[0035] If Search Term matches where not found the flowchart branches to step 405. In step 404 the system aggregates the References associated with the matched Search Term found in User A's Topic Tree (the “Aggregated Search Results”).
[0036] The flowchart then branches to step 405. In step 405 the system determines if User B has one or more Private Indexes. For example, User B may have a Private Index “Work” that only he has access to. If the system determines that User B does have one or more Private indexes the flowchart branches to step 406. If the system determines that User B does not have one or more Private indexes the flowchart branches to step 410. In step 406 the system determines if User A has permission to access one or more of User B's Private Indexes. For example, User B may have a Private Index “Family” and has only granted password-protected access to this Index of References to specific family members. If the system determines that User A does have permission to access one or more of User B's Private indexes the flowchart branches to step 407. If the system determines that User A does not have permission to access one or more of User B's Private indexes the flowchart branches to step 410. In step 407 the system searches User B Private indexes that user A has approved access to to match the Search Term to the hash tags, hash paths, key-words, key-phrases and/or Metadata of the References in User B's Private Index Topic Trees.
[0037] The flowchart then branches to step 408. In step 408 the system determines if any such Search Term matches where found. If Search Term matches where found the flowchart branches to step 409. If Search Term matches where not found the flowchart branches to step 410. In step 409 the system adds the References for the matches found in approved User B Private Indexes to the Aggregated Search Results. The flowchart then branches to step 410. In step 410 the system searches User B's Public Index to match the Search Term to the hash tags, hash paths, keywords, key-phrases and/or Metadata of the References in User B's Public Index Topic Tree.
[0038] The flowchart then branches to step 411. In step 411 the system determines if any such Search Term matches where found. If Search Term matches where found the flowchart branches to step 412. If Search Term matches where not found the flowchart branches to step 413. In step 412 the system adds the References for the matches found in User B's Public Index to the Aggregated Search Results. The flowchart then branches to step 413. In step 413 the system determines if the Aggregated Search Results comprise one or more References. If the Aggregated Search Results do comprise one or more References the flowchart branches to step 414. If the Aggregated Search Results do not comprise one or more References the flowchart branches to step 415. In step 414 the system displays the Document Locations or, if present, the titles associated with the References comprising the Aggregated Search Results to User A. It should be noted that References may have been given titles, either by the user or automatically by the system based upon the Metadata of the Document, and these titles may be displayed instead of the actual Document Location. In Step 415 the system informs User A that no matches to the Search Term have been found.
[0039]
[0040] The flowchart then branches to step 505. In step 505 the system determines if any such Search Term matches where found. If Search Term matches where found the flowchart branches to step 506. If Search Term matches where not found the flowchart branches to step 507. In step 506 the system adds the References for the matches found in approved User B Private Indexes to the Aggregated Search Results. The flowchart then branches to step 507. In step 507 the system searches User B's Public Index to match the Search Term to the hash tags, hash paths, keywords, key-phrases and/or Metadata of the References in User B's Public Index Topic Tree. The flowchart then branches to step 508. In step 508 the system determines if any such Search Term matches where found. If Search Term matches where found the flowchart branches to step 509. If Search Term matches where not found the flowchart branches to step 510. In step 509 the system adds the References for the matches found in User B's Public Index to the Aggregated
[0041] Search Results.
[0042] The flowchart then branches to step 510. In step 510 the system determines if the Aggregated Search Results comprise one or more References. If the Aggregated Search Results do comprise one or more References the flowchart branches to step 511. If the Aggregated Search Results do not comprise one or more References the flowchart branches to step 512. In step 511 the system displays the Document Locations or, if present, the titles associated with the References comprising the Aggregated Search Results to User A. It should be noted that References may have been given titles, either by the user or automatically by the system based upon the Metadata of the Document, and these titles may be displayed instead of the actual Document Location.
[0043] In Step 512 the system informs User A that no matches to the Search Term have been found. With respect to Metadata, various items are operated upon according to the present invention. Items or metadata may be collected and stored in the system database when a document is first added to the database (DB) and crawled may include but are not limited to the following; Document location, URL, Host domain of URL (added to searchable keys), Document type, Title, Author (s), other key contributors; actors, musicians, bands, directors, architects, associated people of interest, etc., Original publication date publication date to document source, update date(s) if any, language and translation information, genre, rating, explicit content, file size, bit rate, kbps (music and video), DRM scheme (or type), especially for music/video resolution and size (photograph, picture or video), color mode (RGB, Greyscale), landscape or portrait orientation of photograph or video, other EXIF Data, camera and lens type, exposure info etc., time length (film & music), formatting, geo-location and geographic data—sensed (GPS etc.), entered from selecting spot on map or manually, cost to view and subscription status of Document—free, paid, subscription price of Document subject—music, film, physical object etc., product ID of Document subject—for example Amazon ID.
[0044] If two documents in the database (DB) have matching metadata, excluding the Document URL, a relation tag may be added to each document claiming the other Document(s) as a relation or twin. For example there may be several Documents that contain the same content, a specific song for instance, that is identical to the content of one or several other documents in the database. It may also be noted that if a certain percentage of the Document's metadata match that of another Document's, then they may also be considered as related and noted as such. The system continually checks Documents to make sure they have a valid URL and the Document has not become defunct. If a broken URL is discovered the system will first check for relatives of the Document, twins or documents closely matching metadata and replace the defunct Document with the updated and working replacement. If no active replacement can be found the system will point to a cached version of the Document either stored in the system or on a variety of Internet caching systems such as the Way Back Machine Internet archive. If there is no cached version of the Document the system may simply delete the Document. After the completion of the repair process for the defunct Document the system will update the entire collection associated unique user References to the document so they will still function when accessed by a user. The system may also check Documents that contain a latitude and longitude, or other geo-specific data, to ensure that the object Referenced is still located or doing business at the Referenced location. For example a user may have created a reference to a favorite ice cream parlor in San Francisco. That ice cream parlor has gone out of business and been replaced with a candy shop.
[0045] By checking available mapping systems such as Google Maps and Bing Maps the system can tell that the identified object, the Document, has changed. It could automatically update the Reference, or ask the user if they would like to update or to delete the Reference since they may not like candy shops and the location is no longer of interest to them. Or if the ice cream parlor had moved to a new location (the system would search the maps for them name of the ice cream parlor to see if a new location was available after it failed to appear in the tagged location), its geo-data would be updated and the Reference would point to the new geo-location of the ice cream parlor. Items automatically added to a Reference may include but are not limited to the following; Document location—URL, location on local computer or home server, title, user ID, privacy settings, date and time of Reference creation, location of user when added, physical location where reference was added, host domain of URL (added to searchable keys), collection the Reference was added to Document metadata, alterations to the Database, a new Reference to an existing Document, changes the Document's ranking (number of associated References) in the DB. The number of times a Document is accessed by the Document's References changes the Document's popularity in the DB. Methods of using stored metadata and hash tags and hash paths in the system are important features of the present invention. Any piece of the sourced, crawled, metadata that is associated with a Document in the database DB may be set by the user, or suggested by the system, to automatically add hash tags and hash paths to a user's References.
[0046] A user of the system may be very interested in languages and therefore set the system to automatically add the identified language metadata of a document to their new reference entries as hash tags or hash paths. This way when revisiting or searching their References or topic tree they can easily discover Documents that fit their desired criteria. For example, a user may want to add a document they discovered relating to the history of the French Revolution to their Reference library. The new Document was originally in French and had been translated to their native language by a person and not a machine translation system such as Google Translate. The Document Reference may automatically be tagged with the following hash path; #language #french #translated #human. If the Document had been translated by machine method the hash path would read; #language #french #translated #machine, perhaps also adding the machine translation method used; #language #french #translated #machine #google.
[0047] According to the present invention, the hash tags and hash paths would be added to a user's topic tree (for easy reference) by the user, or by others, if the References are tagged as public and not private. Another example of a Document's metadata that may be relevant to certain users of the system is the formatting or file type of a document. Many people access the Internet, its Documents, via devices of varying types and screen sizes. These range from a phone with a small screen to a desktop computer with a large display. It may be desirable for a user accessing the system via their phone to only be shown documents that fit their search criteria, French Revolution, originally in French, translated by a human, but have also been tagged or identified as being formatted properly for their device type. And conversely it may be desirable for a user accessing the system using a large screen from a desktop computer to exclude similarly tagged and formatted Documents.
[0048] The file type may also be considered if a specific device does not have the ability to play or display a certain type of file. For example Adobe Flash based websites and content are not supported and are therefore un-viewable on an Apple iPhone or iPad. A user concerned with such situations may choose to add the associated Document formatting or file type data to their References when they are being created; #format #mobile or #format #HDTV, or simply #flash, #mobile or #desktop. These hash tags and hash paths would, as with all similarly annotated additions (items with a hashtag or hash path), to a Reference be added to the user's topic tree. The size of a document, its total kilobytes, may also be of concern to users of the system when considering the differing types of access one has to the Internet. It may be that when on a slower or perhaps more expensive cellular data connection they restrict their search to Documents that have been tagged with a size below a certain threshold. This metadata may be added to a user's Reference to a Document. #3983 kb for example. A user of the system may be interested in photography and therefore attach, manually or set the system to do so automatically, certain pieces of EXIF data to their References that are associated with documents that are photographs. #nikon #50 mm #f7 #ISO400 #400 thsec #b&w for example. These could be added as a hash path as shown, as individual hash tags or perhaps both or a combination thereof. The user may also only search for photographic Documents that had #canon associated with them or had Canon in their associated metadata or title since they are a user of or a fan of Canon cameras.
[0049] Another novel use of the system according to the present invention can be realized when considering the sharing of ones References with the public or with specific groups. For example a professor or teacher may wish to share certain collected References with their students. Since it is likely that the teacher has more than one class they may tag each Reference as specific to that class allowing for the students to easily find Referenced Documents that the teacher deems as important to their class. For example; #ap_english or #anthropology. Hash paths may also be used to further define the intended audience of interest. For example #chemistry #lab_group_3 since lab group three may be conducting an experiment that has relevance to the Referenced Document. Instead of having to email individuals or groups they simply use the system described in this disclosure to communicate with the desired specific parties by annotating a Reference. The system may be set to notify an individual or group via a plurality of means, email, SMS, etc. that a Reference that is annotated to their attention has been added. The system also allows for users to set up sharing groups that allow References to only be shared with a certain group via entering desired user names or emails. This is a more restrictive method. In the case of a professor sharing References a prospective student would not be able to see potential required reading if the references were not tagged as public, but only for a certain group. It is clear that both sharing methods have different utility for certain users of the system.
[0050] It is of further interest to note the ability of a user to search the public References of specific people, scientists, actors, or others of note (or perhaps just co-workers, friends and others) and use the collected Document metadata and associated Reference metadata in unique ways. For example the user of the system may be looking for articles, Documents, on astrophysics that television host and astrophysicist Neil deGrasse Tyson has created, or added References to, that contain black holes as a topic. It should be noted that using this unique system the user can not only discover what Documents Neil deGrasse Tyson has public References to, and one would assume read, but how many times he has read or viewed a Document he has Referenced. It may be that the most read or viewed Document by Neil deGrasse Tyson about black holes is a very old article, published 20 years ago, but he, for some reason, finds it interesting and noteworthy. Neil deGrasse Tyson created a Reference to the 20 year old article about black holes and has read or viewed it 22 times, most recently one month prior. It can be concluded that the Referenced Document may also be of interest to the user. Now the user has discovered something about that Document that no other service can deliver. Searching for “Neil deGrasse Tyson Black Hole” on the internet will produce an abundance of returns, but none can tell you that Neil deGrasse Tyson himself read, or looked at the returned article even once let alone 22 times.
[0051] The search results returned by regular web searches will be presented usually by general popularity or by perceived relevance. In the case of news articles on the Internet, searches usually supply results by publication date, which in the case of the twenty-year old article, would be of no help at all. The addition of geo-data to references is a very useful way to organize and view ones References and can be a quick way to build a customized tour or list of things to do and to visit while in a city one may be visiting. Adding latitudes and longitudes and geo-specific hash tags and hash paths to References that one would like to visit or access while in a city, Paris for instance, would be of great utility to a user. They could easily build a list of restaurants for example; #paris #restaurant #breakfast #leboulanger or #paris #restaurant #dinner #septime. While in Paris they could set the system to only display References that conform to their current geo-location. The References could be displayed in a list, accessed from the topic tree or be displayed on a map. It may also be of interest to users to visit locations, or simply access location specific Documents, which others have found to be of note. For example, the celebrity chef and television star Anthony Bourdain often visits cities around the world and creates television shows about those cities. One could hashtag the places he has been, #paris #bourdain #restaurant #robertetlouise or #paris #bourdain #tourism #catacombs and easily recall them while in that city. This would be even easier if Anthony Bourdain was a user of the system and made public References to places he has visited and added to the system.
[0052] A user's location when they add a Document Reference is logged by the system. This may be of interest in certain situations. For example, a user is visiting the American Museum of Natural History are viewing the astrophysics displays. They could easily see if Neil deGrasse Tyson had created any Document References while he visited the museum or even if he had accessed another's Referenced Document while in the museum.
[0053] When looking for a Document, particularly one publicly referenced by another party, it would be advantageous for the user to restrict the search to Documents that fit certain payment and subscription parameters. If the user does not have a paid subscription to a site such as the New York Times certain content may be unavailable to them and therefore it would be desirable to exclude New York Times articles from any searches. The same exclusions could be made for Referenced content that was unavailable to a user such as music on paid services, movies and television on Netflix or Hulu if the user did not have subscription. These payment and subscription parameters could be set and stored in a user's profile. Only show me content I can see without additional payment. They system may be able suggest a twin or related Document as an alternative that fit a user's payment and subscription parameters if a reference is of particular interest and therefore the content highly desired by the user.
[0054] Users of the system may find themselves accessing the Referenced Documents form different location around the globe. It may be that certain content may be restricted and illegal in certain geographic locations and therefore any search of Referenced Documents could exclude References to Documents that contained illicit or illegal content based on the Documents sourced or added metadata. For example rated X films are illegal in many party of the world and any Reference to Documents that had been tagged with an X rating would be excluded based on the users physical geographic location.
[0055]
[0056] While various embodiments of the disclosed technology have been described above, it should be understood that they have been presented by way of example only, and not of limitation. Likewise, the various diagrams may depict an example architectural or other configuration for the disclosed technology, which is done to aid in understanding the features and functionality that may be included in the disclosed technology. The disclosed technology is not restricted to the illustrated example architectures or configurations, but the desired features may be implemented using a variety of alternative architectures and configurations. Indeed, it will be apparent to one of skill in the art how alternative functional, logical or physical partitioning and configurations may be implemented to implement the desired features of the technology disclosed herein. Also, a multitude of different constituent module names other than those depicted herein may be applied to the various partitions. Additionally, with regard to flow diagrams, operational descriptions and method claims, the order in which the steps are presented herein shall not mandate that various embodiments be implemented to perform the recited functionality in the same order unless the context dictates otherwise.
[0057] Although the disclosed technology is described above in terms of various exemplary embodiments and implementations, it should be understood that the various features, aspects and functionality described in one or more of the individual embodiments are not limited in their applicability to the particular embodiment with which they are described, but instead may be applied, alone or in various combinations, to one or more of the other embodiments of the disclosed technology, whether or not such embodiments are described and whether or not such features are presented as being a part of a described embodiment. Thus, the breadth and scope of the technology disclosed herein should not be limited by any of the above-described exemplary embodiments.
[0058] Terms and phrases used in this document, and variations thereof, unless otherwise expressly stated, should be construed as open ended as opposed to limiting. As examples of the foregoing: the term “including” should be read as meaning “including, without limitation” or the like; the term “example” is used to provide exemplary instances of the item in discussion, not an exhaustive or limiting list thereof; the terms “a” or “an” should be read as meaning “at least one,” “one or more” or the like; and adjectives such as “conventional,” “traditional,” “normal,” “standard,” “known” and terms of similar meaning should not be construed as limiting the item described to a given time period or to an item available as of a given time, but instead should be read to encompass conventional, traditional, normal, or standard technologies that may be available or known now or at any time in the future. Likewise, where this document refers to technologies that would be apparent or known to one of ordinary skill in the art, such technologies encompass those apparent or known to the skilled artisan now or at any time in the future.
[0059] Embodiments presented are particular ways to realize the invention and are not inclusive of all ways possible. Therefore, there may exist embodiments that do not deviate from the spirit and scope of this disclosure as set forth by appended claims, but do not appear here as specific examples. It will be appreciated that a great plurality of alternative versions are possible.