People Directory with Social Privacy and Contact Association Features
First Claim
1. A method comprising, by one or more computing devices:
- receiving from an initiating user a request for information of a target user;
accessing user information associated with the initiating user, wherein the user information specifies one or more attributes of the initiating user;
determining whether the initiating user is permitted to access information related to the target user based on privacy settings of the target user, wherein the privacy settings require the initiating user have one or more attributes that satisfy one or more social, spatiotemporal, geographic, or temporal conditions defined by the privacy settings; and
blocking the initiating user from accessing information related to the target user in response to determining that the initiating user does not fulfill the requirement of the privacy settings of the target user.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method comprises receiving from an initiating user a request for information of a target user, accessing information associated with the initiating user comprising one or more attributes, determining whether the initiating user is permitted to access information related to the target user based on privacy settings of the target user, wherein the privacy settings require the initiating user attributes to satisfy one or more social, spatiotemporal, geographic, or temporal conditions, and blocking the initiating user from accessing information of the target user in response to determining that the initiating user does not fulfill the requirements of the privacy settings of the target user.
1 Citation
20 Claims
-
1. A method comprising, by one or more computing devices:
-
receiving from an initiating user a request for information of a target user; accessing user information associated with the initiating user, wherein the user information specifies one or more attributes of the initiating user; determining whether the initiating user is permitted to access information related to the target user based on privacy settings of the target user, wherein the privacy settings require the initiating user have one or more attributes that satisfy one or more social, spatiotemporal, geographic, or temporal conditions defined by the privacy settings; and blocking the initiating user from accessing information related to the target user in response to determining that the initiating user does not fulfill the requirement of the privacy settings of the target user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. One or more computer-readable non-transitory media embodying software that is configured when executed to:
-
receive from an initiating user a request for information of a target user; access user information associated with the initiating user, wherein the user information specifies one or more attributes of the initiating user; determine whether the initiating user is permitted to access information related to the target user based on privacy settings of the target user, wherein the privacy settings require the initiating user have one or more attributes that satisfy one or more social, spatiotemporal, geographic, or temporal conditions defined by the privacy settings; and block the initiating user from accessing information related to the target user in response to determining that the initiating user does not fulfill the requirement of the privacy settings of the target user. - View Dependent Claims (18)
-
-
19. A system comprising:
- one or more processors; and
a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to;receive from an initiating user a request for information of a target user; access user information associated with the initiating user, wherein the user information specifies one or more attributes of the initiating user; determine whether the initiating user is permitted to access information related to the target user based on privacy settings of the target user, wherein the privacy settings require the initiating user have one or more attributes that satisfy one or more social, spatiotemporal, geographic, or temporal conditions defined by the privacy settings; and block the initiating user from accessing information related to the target user in response to determining that the initiating user does not fulfill the requirement of the privacy settings of the target user. - View Dependent Claims (20)
- one or more processors; and
Specification