Controlling devices by social networking
First Claim
1. A method comprising:
- analyzing, by a computing device of a social-networking system, information received from a first network-enabled device to identify instructions comprising control commands for a second network-enabled device associated with a second user of the social-networking system, the first network-enabled device being associated with a first user of the social-networking system, the information comprising information identifying the first user to the social-networking system;
authorizing, by the computing device of the social-networking system, without explicit authorization of the second user by the first user and without any user input by the first user, the first network-enabled device to control the second network-enabled device based on determining that an affinity coefficient between a node representing the first user in a social graph and a node representing the second user in the social graph exceeds a specified threshold, wherein;
the affinity coefficient comprises a plurality of factors and is calculated based on (1) one or more actions between the node representing the first user and performed by the second user or (2) a type of the relationship between the node representing the first user and the node representing the second user;
the affinity coefficient is a higher when the node representing the first user is within a threshold degree of separation from the node representing the second user;
each factor of the plurality of factors is assigned a weight and the factors are then combined together according to their respective weights to determine the affinity coefficient;
the weight for each factor is based at least in part on a decay factor that causes the weight to decay with time; and
more recent actions have more relevance when determining the affinity coefficient; and
based on the authorizing, providing, by the computing device of the social-networking system, the identified instructions to control the second network-enabled device.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes analyzing information received from a first network-enabled device to identify instructions for a second network-enabled device associated with a second user of a social-networking system, the first network-enabled device being associated with a first user of the social-networking system. The method also includes determining (1) that the first user is connected to the second user with respect to a social graph of the social-networking system and (2) that the first user has authorization to provide instructions to the second network-enabled device, where the authorization is based on social-networking information. The method further includes providing the instructions to the second network-enabled device.
35 Citations
33 Claims
-
1. A method comprising:
-
analyzing, by a computing device of a social-networking system, information received from a first network-enabled device to identify instructions comprising control commands for a second network-enabled device associated with a second user of the social-networking system, the first network-enabled device being associated with a first user of the social-networking system, the information comprising information identifying the first user to the social-networking system; authorizing, by the computing device of the social-networking system, without explicit authorization of the second user by the first user and without any user input by the first user, the first network-enabled device to control the second network-enabled device based on determining that an affinity coefficient between a node representing the first user in a social graph and a node representing the second user in the social graph exceeds a specified threshold, wherein; the affinity coefficient comprises a plurality of factors and is calculated based on (1) one or more actions between the node representing the first user and performed by the second user or (2) a type of the relationship between the node representing the first user and the node representing the second user; the affinity coefficient is a higher when the node representing the first user is within a threshold degree of separation from the node representing the second user; each factor of the plurality of factors is assigned a weight and the factors are then combined together according to their respective weights to determine the affinity coefficient; the weight for each factor is based at least in part on a decay factor that causes the weight to decay with time; and more recent actions have more relevance when determining the affinity coefficient; and based on the authorizing, providing, by the computing device of the social-networking system, the identified instructions to control the second network-enabled device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
analyze information received from a first network-enabled device to identify instructions comprising control commands for a second network-enabled device associated with a second user of the social-networking system, the first network-enabled device being associated with a first user of the social-networking system, the information comprising information identifying the first user to the social-networking system; authorize without explicit authorization of the second user by the first user and without any user input by the first user, the first network-enabled device to control the second network-enabled device based on determining that an affinity coefficient between a node representing the first user in a social graph and a node representing the second user in the social graph exceeds a specified threshold, wherein; the affinity coefficient comprises a plurality of factors and is calculated based on (1) one or more actions between the node representing the first user and performed by the second user or (2) a type of the relationship between the node representing the first user and the node representing the second user; the affinity coefficient is a higher when the node representing the first user is within a threshold degree of separation from the node representing the second user; each factor of the plurality of factors is assigned a weight and the factors are then combined together according to their respective weights to determine the affinity coefficient; the weight for each factor is based at least in part on a decay factor that causes the weight to decay with time; and more recent actions have more relevance when determining the affinity coefficient; and based on the authorizing, provide the identified instructions to control the second network-enabled device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; analyze information received from a first network-enabled device to identify instructions comprising control commands for a second network-enabled device associated with a second user of the social-networking system, the first network-enabled device being associated with a first user of the social-networking system, the information comprising information identifying the first user to the social-networking system; authorize without explicit authorization of the second user by the first user and without any user input by the first user, the first network-enabled device to control the second network-enabled device based on determining that an affinity coefficient between a node representing the first user in a social graph and a node representing the second user in the social graph exceeds a specified threshold, wherein; the affinity coefficient comprises a plurality of factors and is calculated based on (1) one or more actions between the node representing the first user and performed by the second user or (2) a type of the relationship between the node representing the first user and the node representing the second user the affinity coefficient is a higher when the node representing the first user is within a threshold degree of separation from the node representing the second user; each factor of the plurality of factors is assigned a weight and the factors are then combined together according to their respective weights to determine the affinity coefficient; the weight for each factor is based at least in part on a decay factor that causes the weight to decay with time; and more recent actions have more relevance when determining the affinity coefficient; and based on the authorizing, provide the identified instructions to control the second network-enabled device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification