Techniques for exchanging contact information and establishing a connection via a social networking service
First Claim
Patent Images
1. A method comprising:
- incorporating one or more modules into a social networking system, the one or more modules configuring one or more processors of the social networking system to perform operations for notifying users of a social networking system of geographical movements of other users of the social networking system between virtual perimeters corresponding to a real-world location where a business event is being held, the operations comprising;
establishing a first virtual perimeter in one or more memories of the social networking system, the first virtual perimeter being a geo-fence corresponding to the real-world geographical area where the business event is being held;
determining that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user that corresponds to a location within the first virtual perimeter;
detecting an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has moved to be within the first virtual perimeter;
communicating a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user;
detecting an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, the additional series of communications indicating that the client device of the second user is present outside the first virtual perimeter; and
communicating a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of making it easier for users to interact with each other via a social networking system is disclosed. It is detected that a first user of a social networking system performed an action with respect to a second user of the social networking system. It is interpreted that the action of the first user corresponds to a command that the first user intends to issue to a social networking system, the command pertaining to the second user. The command is processed by the social networking system on behalf of the first user.
10 Citations
20 Claims
-
1. A method comprising:
incorporating one or more modules into a social networking system, the one or more modules configuring one or more processors of the social networking system to perform operations for notifying users of a social networking system of geographical movements of other users of the social networking system between virtual perimeters corresponding to a real-world location where a business event is being held, the operations comprising; establishing a first virtual perimeter in one or more memories of the social networking system, the first virtual perimeter being a geo-fence corresponding to the real-world geographical area where the business event is being held; determining that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user that corresponds to a location within the first virtual perimeter; detecting an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has moved to be within the first virtual perimeter; communicating a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user; detecting an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, the additional series of communications indicating that the client device of the second user is present outside the first virtual perimeter; and communicating a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A system comprising:
-
one or more processors; one or more memories; one or more modules incorporated into the one or more memories, the one or more modules configuring the one or more processors to, at least; establish a first virtual perimeter in the one or more memories, the first virtual perimeter being a geo-fence corresponding to a real-world geographical area where a business event is being held; determine that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user that corresponds to a location within the first virtual perimeter; detect an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has moved to be within the first virtual perimeter; communicate a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user; detect an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, the additional series of communications indicating that the client device of the second user is present outside the first virtual perimeter; and communicate a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium storing instructions that, when executed by at least one processor of a machine, cause the machine to perform operations comprising:
-
establishing a first virtual perimeter in one or more memories of a social networking system, the first virtual perimeter being a geo-fence corresponding to a real-world geographical area where a business event is being held; determining that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user that corresponds to a location within the first virtual perimeter; detecting an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has moved to be within the first virtual perimeter; communicating a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user; detecting an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, the additional series of communications indicating that the client device of the second user is present outside the first virtual perimeter, and communicating a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification