×

Controlling devices by social networking

  • US 9,967,259 B2
  • Filed: 07/18/2014
  • Issued: 05/08/2018
  • Est. Priority Date: 07/18/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • analyzing, by a computing device of a social-networking system, information received from a first network-enabled device to identify instructions comprising control commands for a second network-enabled device associated with a second user of the social-networking system, the first network-enabled device being associated with a first user of the social-networking system, the information comprising information identifying the first user to the social-networking system;

    authorizing, by the computing device of the social-networking system, without explicit authorization of the second user by the first user and without any user input by the first user, the first network-enabled device to control the second network-enabled device based on determining that an affinity coefficient between a node representing the first user in a social graph and a node representing the second user in the social graph exceeds a specified threshold, wherein;

    the affinity coefficient comprises a plurality of factors and is calculated based on (1) one or more actions between the node representing the first user and performed by the second user or (2) a type of the relationship between the node representing the first user and the node representing the second user;

    the affinity coefficient is a higher when the node representing the first user is within a threshold degree of separation from the node representing the second user;

    each factor of the plurality of factors is assigned a weight and the factors are then combined together according to their respective weights to determine the affinity coefficient;

    the weight for each factor is based at least in part on a decay factor that causes the weight to decay with time; and

    more recent actions have more relevance when determining the affinity coefficient; and

    based on the authorizing, providing, by the computing device of the social-networking system, the identified instructions to control the second network-enabled device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×