CONTROLLING DEVICES BY SOCIAL NETWORKING
First Claim
1. A method comprising:
- analyzing, by a computing device of a social-networking system, information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of the social-networking system, the first network-enabled device being associated with a first user of the social-networking system;
determining, by the computing device of the social-networking system, (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, wherein the authorization is based on social-networking information; and
providing, by the computing device of the social-networking system, the instructions to the second network-enabled device.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system. The method also includes determining (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, where the authorization is based on social-networking information. The method further includes providing the instructions to the second network-enabled device.
-
Citations
20 Claims
-
1. A method comprising:
-
analyzing, by a computing device of a social-networking system, information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of the social-networking system, the first network-enabled device being associated with a first user of the social-networking system; determining, by the computing device of the social-networking system, (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, wherein the authorization is based on social-networking information; and providing, by the computing device of the social-networking system, the instructions to the second network-enabled device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
analyze information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system; determine (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, wherein the authorization is based on social-networking information; and provide the instructions to the second network-enabled device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; analyze information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system; determine (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, wherein the authorization is based on social-networking information; and provide the instructions to the second network-enabled device. - View Dependent Claims (20)
-
Specification