USER SEARCH BASED ON PRIVATE INFORMATION
First Claim
1. A computer-implemented method comprising:
- receiving, at a social-networking system, a query from a client device of a first user specifying one or more criteria;
accessing, by the social-networking system, a data store comprising information associated with one or more users of the social-networking system;
identifying, by the social-networking system, a second user from a plurality of users of the social-networking system based on private information stored in the data store and the one or more criteria, wherein the private information is not viewable by the first user; and
sending, to the client device of the first user, substitute information associated with the second user in place of the private information, the substitute information being information that is viewable by the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving, from a first user, a query specifying one or more criteria; accessing a data store comprising information associated with one or more users of a social-networking system; identifying a second user from a plurality of users of the social-networking system based on private information stored in the data store and the one or more criteria, wherein the private information is not viewable by the first user; and sending, to the first user, substitute information associated with the second user in place of the private information, the substitute information being information that is viewable by the first user.
8 Citations
18 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a social-networking system, a query from a client device of a first user specifying one or more criteria; accessing, by the social-networking system, a data store comprising information associated with one or more users of the social-networking system; identifying, by the social-networking system, a second user from a plurality of users of the social-networking system based on private information stored in the data store and the one or more criteria, wherein the private information is not viewable by the first user; and sending, to the client device of the first user, substitute information associated with the second user in place of the private information, the substitute information being information that is viewable by the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
receive a query from a client device of a first user specifying one or more criteria; access a data store comprising information associated with one or more users of the social-networking system; identify a second user from a plurality of users of the social-networking system based on private information stored in the data store and the one or more criteria, wherein the private information is not viewable by the first user; and send substitute information associated with the second user in place of the private information, the substitute information being information that is viewable by the first user.
-
-
18. A system comprising:
- one or more processors; and
a non-transitory memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to;receive a query from a client device of a first user specifying one or more criteria; access a data store comprising information associated with one or more users of the social-networking system; identify a second user from a plurality of users of the social-networking system based on private information stored in the data store and the one or more criteria, wherein the private information is not viewable by the first user; and send substitute information associated with the second user in place of the private information, the substitute information being information that is viewable by the first user.
- one or more processors; and
Specification