TECHNIQUES FOR EXCHANGING CONTACT INFORMATION AND ESTABLISHING A CONNECTION VIA A SOCIAL NETWORKING SERVICE
2 Assignments
0 Petitions
Accused Products
Abstract
A method of making it easier for users to interact with each other via a social networking system is disclosed. It is detected that a first user of a social networking system performed an action with respect to a second user of the social networking system. It is interpreted that the action of the first user corresponds to a command that the first user intends to issue to a social networking system, the command pertaining to the second user. The command is processed by the social networking system on behalf of the first user.
10 Citations
21 Claims
-
1. (canceled)
-
2. A method comprising:
-
incorporating one or more modules into a social networking system, the one or more modules configuring one or more processors of the social networking system to perform operations, the operations comprising; establishing a first virtual perimeter, the first virtual perimeter surrounding a real-world geographical area corresponding to a location where a business event is being held; determining that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user; detecting an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has crossed over the first virtual perimeter; communicating a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user; detecting an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, additional series of communications indicating that the client device of the second user has crossed over the first virtual perimeter; and communicating a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
one or more processors; one or more modules incorporated into a social networking system, the one or more modules configuring the one or more processors to, at least; incorporate one or more modules into a social networking system, the one or more modules configuring one or more processors of the social networking system to perform operations, the operations comprising; establish a first virtual perimeter, the first virtual perimeter surrounding a real-world geographical area corresponding to a location where a business event is being held; determine that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user; detect an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has crossed over the first virtual perimeter; communicate a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user; detect an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, additional series of communications indicating that the client device of the second user has crossed over the first virtual perimeter; and communicate a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 21)
-
-
16. A machine-readable medium storing instructions that, when executed by at least one processor of a machine, cause the machine to perform operations comprising:
-
incorporating one or more modules into a social networking system, the one or more modules configuring one or more processors of the social networking system to perform operations, the operations comprising; establishing a first virtual perimeter, the first virtual perimeter surrounding a real-world geographical area corresponding to a location where a business event is being held; determining that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user; detecting an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has crossed over the first virtual perimeter; communicating a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user; detecting an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, additional series of communications indicating that the client device of the second user has crossed over the first virtual perimeter; and communicating a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user. - View Dependent Claims (17, 18)
-
- 19. The machine-readable medium of claim 216, wherein the communicating of the first notification and the communicating of the second notification is based on an existence of a particular relationship between the first user and the second user.
Specification