Using photographs to manage groups
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, at a computer system, an electronic photograph;
identifying, by the computer system analyzing the electronic photograph, a plurality of users depicted in the electronic photograph;
designating a group of users based on the identified plurality of users;
providing information regarding the designated group of users to one or more computing devices associated with one or more of the plurality of users;
verifying the authenticity of the electronic photograph based on proximity information associated with the plurality of users; and
determining whether to designate the group of users based on the authenticity of the electronic photograph.
2 Assignments
0 Petitions
Accused Products
Abstract
In one implementation, a computer-implemented method includes receiving, at a computer system, an electronic photograph; and identifying, by the computer system, a plurality of users of depicted in the electronic photograph. The computer-implemented method can also include designating a group of users based on the identified plurality of users; and providing information regarding the designated group of users to one or more computing devices associated with one or more of the plurality of users.
5 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, at a computer system, an electronic photograph; identifying, by the computer system analyzing the electronic photograph, a plurality of users depicted in the electronic photograph; designating a group of users based on the identified plurality of users; providing information regarding the designated group of users to one or more computing devices associated with one or more of the plurality of users; verifying the authenticity of the electronic photograph based on proximity information associated with the plurality of users; and determining whether to designate the group of users based on the authenticity of the electronic photograph. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented method comprising:
-
receiving, at a computing device, user input that indicates a first request for a group of users to be designated based on identifying users in an electronic photograph; in response to receiving the user input, obtaining proximity information for one or more other computing devices that were physically located within a threshold distance of the computing device within a threshold amount of time of the electronic photograph being taken; providing a second request to a computer system for a group of users to be designated as authentic based on an analysis for verification of the electronic photograph using the obtained proximity information; and receiving information indicating that the group of users has been designated as authentic by the computer system to include the plurality of users identified based on the electronic photograph and the proximity information. - View Dependent Claims (18)
-
-
19. A system comprising:
-
a computer system; an interface to the computer system to receive an electronic photograph; a user identification module of the computer system to identify a plurality of users depicted in the electronic photograph by analyzing the electronic photograph; a group manager of the computer system to designate a group of users based on the plurality of users identified by the user identification module; and a verification module of the computer system to verify the authenticity of the electronic photograph based on proximity information associated with the plurality of users, wherein the verification module determines whether to designate the group of users based on the authenticity of the electronic photograph, and wherein the interface further provides information regarding the designated group of users to one or more computing devices associated with one or more of the plurality of users. - View Dependent Claims (20)
-
Specification