×

Techniques for exchanging contact information and establishing a connection via a social networking service

  • US 9,872,138 B2
  • Filed: 11/21/2016
  • Issued: 01/16/2018
  • Est. Priority Date: 12/31/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • incorporating one or more modules into a social networking system, the one or more modules configuring one or more processors of the social networking system to perform operations for notifying users of a social networking system of geographical movements of other users of the social networking system between virtual perimeters corresponding to a real-world location where a business event is being held, the operations comprising;

    establishing a first virtual perimeter in one or more memories of the social networking system, the first virtual perimeter being a geo-fence corresponding to the real-world geographical area where the business event is being held;

    determining that a first user of the social networking system is within the real-world geographical area based on a communication received from a client device of the first user, the communication indicating a location of the client device of the first user that corresponds to a location within the first virtual perimeter;

    detecting an entering of a second user into the real-world geographical area based on a series of communications received from a client device of the second user, the series of communications indicating that the client device of the second user has moved to be within the first virtual perimeter;

    communicating a first notification to the client device of the first user, the first notification notifying the first user of the detecting of the entering of the second user;

    detecting an exiting of the second user from the real-world geographical area based on an additional series of communications received from the client device of the second user, the additional series of communications indicating that the client device of the second user is present outside the first virtual perimeter; and

    communicating a second notification to the client device of the first user, the second notification notifying the first user of the detecting of the exiting of the second user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×