Mobile ad hoc networking
First Claim
1. A method comprising:
- receiving, from a first-user mobile device associated with a first user, a first message, the first message received via a mobile network by a second-user mobile device associated with a second user, the first message comprising;
a first-user identifier corresponding to the first user of the first-user mobile device, wherein the first-user identifier corresponds to a first-user account of the first user at a social-networking site; and
a public encryption key allowing the second-user mobile device within direct radio communication of the first-user mobile device to use the public key to access relevant information associated with the first-user account from the social-networking site;
using, by the second-user mobile device, the public encryption key to access relevant information associated with the first-user account of the social networking site;
receiving, by the second-user mobile device, the relevant information associated with the first-user account from the social networking site;
transmitting, to the first mobile device, a second message comprising a second-user identifier corresponding to the second-user mobile device and a second-user account of the second user in the social-networking site;
establishing a mobile ad hoc network between the first-user mobile device and the second user-mobile device, the mobile ad hoc network being configured to provide a fall-back when the mobile network is unavailable; and
when the mobile network is unavailable, then receiving, by the second-user mobile device, via the mobile ad hoc network, one or more third messages from the first-user mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method comprising by one or more computing devices, transmitting, from a first mobile device, a first message that includes a first user identifier corresponding to a first user of the first mobile device, wherein the first user identifier corresponds to a user account of the first user in a social-networking system, receiving, at the first mobile device, one or more second messages that includes a second user identifier corresponding to a second mobile device within a direct radio connectivity of the first mobile device, wherein the second user identifier corresponds to a respective user account of a second user in the social-networking system, and storing, at the first mobile device, information received in the second message for access by one or more applications hosted on the first mobile device.
33 Citations
17 Claims
-
1. A method comprising:
-
receiving, from a first-user mobile device associated with a first user, a first message, the first message received via a mobile network by a second-user mobile device associated with a second user, the first message comprising; a first-user identifier corresponding to the first user of the first-user mobile device, wherein the first-user identifier corresponds to a first-user account of the first user at a social-networking site; and a public encryption key allowing the second-user mobile device within direct radio communication of the first-user mobile device to use the public key to access relevant information associated with the first-user account from the social-networking site; using, by the second-user mobile device, the public encryption key to access relevant information associated with the first-user account of the social networking site; receiving, by the second-user mobile device, the relevant information associated with the first-user account from the social networking site; transmitting, to the first mobile device, a second message comprising a second-user identifier corresponding to the second-user mobile device and a second-user account of the second user in the social-networking site; establishing a mobile ad hoc network between the first-user mobile device and the second user-mobile device, the mobile ad hoc network being configured to provide a fall-back when the mobile network is unavailable; and when the mobile network is unavailable, then receiving, by the second-user mobile device, via the mobile ad hoc network, one or more third messages from the first-user mobile device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for establishing an ad hoc network between a first-user mobile device and a second-user mobile device comprising:
-
one or more processors of the second-user mobile device; and a memory coupled to the processors comprising instructions executable by the processors, the processors of the second-user mobile device being operable when executing the instructions to; receive, from the first-user mobile device associated with a first user, a first message, the first message received via a mobile network, the first message comprising; a first-user identifier corresponding to the first user of the first-user mobile device, wherein the first-user identifier corresponds to a first-user account of the first user at a social-networking site; and a public encryption key allowing the second-user mobile device within direct radio communication of the first-user mobile device to use the public key to access relevant information associated with the first-user account from the social-networking site; use the public encryption key to access relevant information associated with the first-user account of the social networking site; receive the relevant information associated with the first-user account from the social networking site transmit, to the first mobile device, a second message comprising a second-user identifier corresponding to the second-user mobile device and a second-user account of a second user in the social-networking site; establish a mobile ad hoc network between the first-user mobile device and the second user-mobile device, the mobile ad hoc network being configured to provide a fall-back when the mobile network is unavailable; and when the mobile network is unavailable, then receive, from the second-user mobile device via the mobile ad hoc network, one or more third messages from the first-user mobile device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
receive, from a first-user mobile device associated with a first user, a first message, the first message received via a mobile network by a second-user mobile device associated with a second user, the first message comprising; a first-user identifier corresponding to the first user of a first-user mobile device, wherein the first-user identifier corresponds to a first-user account of the first user at a social-networking site; and a public encryption key allowing the second-user mobile device within direct radio communication of the first-user mobile device to use the public key to access relevant information associated with the first-user account from the social-networking site; use, by the second-user mobile device, the public encryption key to access relevant information associated with the first-user account of the social networking site; receive, by the second-user mobile device, the relevant information associated with the first-user account form the social-networking site; transmit, to the first mobile device, a second message comprising a second user identifier corresponding to the second-user mobile device within a direct radio connectivity of the first-user mobile device and a respective-second-user account of the second user in the social-networking site; establish a mobile ad hoc network between the first-user mobile device and the second user-mobile device, the mobile ad hoc network being configured to provide a fall-back when the mobile network is unavailable; and when the mobile network is unavailable, then receive, by the second-user mobile device via the mobile ad hoc network, one or more third messages from the first-user mobile device. - View Dependent Claims (14, 15, 16, 17)
-
Specification