CONTROLLING DEVICES BY SOCIAL NETWORKING
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system. The method also includes determining (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, where the authorization is based on social-networking information. The method further includes providing the instructions to the second network-enabled device.
12 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method comprising:
-
by a computing device of a social-networking system, analyzing information received from a first network-enabled device to identify one or more control commands for a second network-enabled device and information identifying a first user to the social-networking system, the second network-enabled device being associated with a second user of the social-networking system; by the computing device of the social-networking system, authorizing, without explicit authorization of the first user by the second user, the first network-enabled device to send the control commands to the second network-enabled device, wherein; the authorizing is based on an affinity coefficient between the first user and the second user exceeding a pre-determined threshold; and the affinity coefficient is calculated based on (1) one or more actions between the first user and the second user or (2) a type of edge connecting a node of a social-graph representing the first user to a node representing the second user; and by the computing device of the social-networking system, based on the authorizing, providing the identified control commands to the second network-enabled device. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
analyze information received from a first network-enabled device to identify one or more control commands for a second network-enabled device and information identifying a first user to a social-networking system, the second network-enabled device being associated with a second user of the social-networking system; authorize, without explicit authorization of the first user by the second user, the first network-enabled device to send the control commands to the second network-enabled device, wherein; the authorization is based on an affinity coefficient between the first user and the second user exceeding a pre-determined threshold; and the affinity coefficient is calculated based on (1) one or more actions between the first user and the second user or (2) a type of edge connecting a node of a social-graph representing the first user to a node representing the second user; and based on the authorization, providing the identified control commands to the second network-enabled device. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; analyze information received from a first network-enabled device to identify one or more control commands for a second network-enabled device and information identifying a first user to a social-networking system, the second network-enabled device being associated with a second user of the social-networking system; authorize, without explicit authorization of the first user by the second user, the first network-enabled device to send the control commands to the second network-enabled device, wherein; the authorization is based on an affinity coefficient between the first user and the second user exceeding a pre-determined threshold; and the affinity coefficient is calculated based on (1) one or more actions between the first user and the second user or (2) a type of edge connecting a node of a social-graph representing the first user to a node representing the second user; and based on the authorization, providing the identified control commands to the second network-enabled device. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification