Interacting with a subscriber to a social networking service based on passive behavior of the subscriber
First Claim
1. A method of managing privacy settings of subscribers for one or more social networking services, comprising:
- determining, by a server, a set of privacy settings of a first subscriber for the one or more social networking services;
receiving, by the server, permission to dynamically modify the set of privacy settings of the first subscriber based on passive behavior of the first subscriber;
monitoring, by the server, responsive to the received permission, the passive behavior of the first subscriber that is separate from interactions between the first subscriber and the one or more social networking services;
triggering, by the server, a modification to the set of privacy settings of the first subscriber based on the received permission and the monitored passive behavior of the first subscriber;
modifying the set of privacy settings of the first subscriber and a second subscriber based on the monitored passive behavior of the first subscriber for exchanging information between the first subscriber and the second subscriber, wherein the monitored passive behavior includes one or more of a call, a message exchange, and a cessation of interaction between the first subscriber and the second subscriber; and
reverting, subsequent to the exchanging of the information, the modified set of privacy settings of the first subscriber and the second subscriber to their respective sets of privacy settings prior to the modification.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, an application server is configured to manage privacy settings of a subscriber for one or more social networking services. The application server determines a set of privacy settings (e.g., a manually configured or default set of privacy settings) of the subscriber for the one or more social networking services, and then receives, from the subscriber, permission to dynamically modify the set of privacy settings. The application server monitors, responsive to the received permission, passive behavior of the subscriber that is separate from interactions between the subscriber and the one or more social networking services (e.g., calls, text messages, instant messages made to/from the subscriber, a location of the subscriber, etc.). The application server triggers a modification to the set of privacy settings based on the monitored passive behavior of the subscriber.
24 Citations
24 Claims
-
1. A method of managing privacy settings of subscribers for one or more social networking services, comprising:
-
determining, by a server, a set of privacy settings of a first subscriber for the one or more social networking services; receiving, by the server, permission to dynamically modify the set of privacy settings of the first subscriber based on passive behavior of the first subscriber; monitoring, by the server, responsive to the received permission, the passive behavior of the first subscriber that is separate from interactions between the first subscriber and the one or more social networking services; triggering, by the server, a modification to the set of privacy settings of the first subscriber based on the received permission and the monitored passive behavior of the first subscriber; modifying the set of privacy settings of the first subscriber and a second subscriber based on the monitored passive behavior of the first subscriber for exchanging information between the first subscriber and the second subscriber, wherein the monitored passive behavior includes one or more of a call, a message exchange, and a cessation of interaction between the first subscriber and the second subscriber; and reverting, subsequent to the exchanging of the information, the modified set of privacy settings of the first subscriber and the second subscriber to their respective sets of privacy settings prior to the modification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An application server configured to manage privacy settings of subscribers for one or more social networking services, comprising:
-
means for determining a set of privacy settings of a first subscriber for the one or more social networking services; means for receiving permission to dynamically modify the set of privacy settings of the first subscriber based on passive behavior of the first subscriber; means for monitoring, responsive to the received permission, the passive behavior of the subscriber that is separate from interactions between the first subscriber and the one or more social networking services; means for triggering a modification to the set of privacy settings of the first subscriber based on the received permission and the monitored passive behavior of the first subscriber; means for modifying the set of privacy settings of the first subscriber and a second subscriber based on the monitored passive behavior of the first subscriber for exchanging information between the first subscriber and the second subscriber, wherein the monitored passive behavior includes one or more of a call, a message exchange, and a cessation of interaction between the first subscriber and the second subscriber; and reverting, subsequent to the exchanging of the information, the modified set of privacy settings of the first subscriber and the second subscriber to their respective sets of privacy settings prior to the modification. - View Dependent Claims (20)
-
-
21. An application server configured to manage privacy settings of subscribers for one or more social networking services, comprising:
-
a first processor module configured to determine a set of privacy settings of a first subscriber for the one or more social networking services; a second processor module configured to receive permission to dynamically modify the set of privacy settings of the first subscriber based on passive behavior of the first subscriber; a third processor module configured to monitor, responsive to the received permission, the passive behavior of the first subscriber that is separate from interactions between the first subscriber and the one or more social networking services; a fourth processor module, comprising hardware, configured to trigger a modification to the set of privacy settings based on the received permission and the monitored passive behavior of the subscriber; a fifth processor module, configured to modify the set of privacy settings of the first subscriber and a second subscriber based on the monitored passive behavior of the first subscriber for exchanging information between the first subscriber and the second subscriber, wherein the monitored passive behavior includes one or more of a call, a message exchange, and a cessation of interaction between the first subscriber and the second subscriber; and a sixth processor module, configured to revert, subsequent to the exchanging of the information, the modified set of privacy settings of the first subscriber and the second subscriber to their respective sets of privacy settings prior to the modification. - View Dependent Claims (22)
-
-
23. A non-transitory computer-readable medium storing computer executable code to manage privacy settings of subscribers for one or more social networking services, comprising:
-
code for determining a set of privacy settings of a first subscriber for the one or more social networking services; code for receiving permission to dynamically modify the set of privacy settings of the first subscriber based on passive behavior of the first subscriber; code for monitoring, responsive to the received permission, the passive behavior of the first subscriber that is separate from interactions between the first subscriber and the one or more social networking services; code for triggering a modification to the set of privacy settings based on the received permission and the monitored passive behavior of the first subscriber; code for modifying the set of privacy settings of the first subscriber and a second subscriber based on the monitored passive behavior of the first subscriber for exchanging information between the first subscriber and the second subscriber, wherein the monitored passive behavior includes one or more of a call, a message exchange, and a cessation of interaction between the first subscriber and the second subscriber; and code for reverting, subsequent to the exchanging of the information, the modified set of privacy settings of the first subscriber and the second subscriber to their respective sets of privacy settings prior to the modification. - View Dependent Claims (24)
-
Specification