Controlling access to ideograms
First Claim
1. A method comprising:
- by one or more computing systems, sending, to a first client device associated with a first user of a social-networking system, information to display one or more ideograms available for insertion into a user input field for composing a message, wherein one or more of the ideograms are restricted;
by the one or more computing systems, receiving a request, from the first client device, for one of the restricted ideograms;
by the one or more computing systems, accessing social-networking information for the first user stored in association with a social graph of the social-networking system;
by the one or more computing systems, determining, based on the social-networking information, whether the first user is authorized to access the restricted ideogram;
if the first user is authorized to access the restricted ideogram, then sending, to the first client device, information to insert the restricted ideogram into the user input field;
else sending a restricted-content response to the first client device;
by the one or more computing systems, sending the message to a second client device associated with a second user of the social-networking system;
by the one or more computing systems, accessing social-networking information for the second user stored in association with the social graph;
by the one or more computing systems, determining, based on the social-networking information, whether the second user is authorized to access the restricted ideogram; and
if the second user is authorized to access the restricted ideogram, then sending, to the second client device, information to display the restricted ideogram;
else sending a restricted-content response to the second client device.
2 Assignments
0 Petitions
Accused Products
Abstract
Particular embodiments of a method comprise providing one or more ideograms (e.g., written characters, symbols or images that represent an idea or thing) for insertion into a message. A request may be received from a user for a restricted one of the ideograms. A determination may be made as to whether the user is authorized to access the restricted ideogram. This determination may be based on whether the user is a member of a group of authorized users, whether an attribute of the user meets a restriction requirement, or whether the request comprises an authorization code or token. If the user is authorized to access the restricted ideogram, then the restricted ideogram may be displayed to the user in association with the message. Otherwise, a restricted-content response may be generated.
15 Citations
20 Claims
-
1. A method comprising:
-
by one or more computing systems, sending, to a first client device associated with a first user of a social-networking system, information to display one or more ideograms available for insertion into a user input field for composing a message, wherein one or more of the ideograms are restricted; by the one or more computing systems, receiving a request, from the first client device, for one of the restricted ideograms; by the one or more computing systems, accessing social-networking information for the first user stored in association with a social graph of the social-networking system; by the one or more computing systems, determining, based on the social-networking information, whether the first user is authorized to access the restricted ideogram; if the first user is authorized to access the restricted ideogram, then sending, to the first client device, information to insert the restricted ideogram into the user input field; else sending a restricted-content response to the first client device; by the one or more computing systems, sending the message to a second client device associated with a second user of the social-networking system; by the one or more computing systems, accessing social-networking information for the second user stored in association with the social graph; by the one or more computing systems, determining, based on the social-networking information, whether the second user is authorized to access the restricted ideogram; and if the second user is authorized to access the restricted ideogram, then sending, to the second client device, information to display the restricted ideogram; else sending a restricted-content response to the second client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
send, to a first client device associated with a first user of a social-networking system, information to display one or more ideograms available for insertion into a user input field for composing a message, wherein one or more of the ideograms are restricted; receive a request, from the first client device, for one of the restricted ideograms; access social-networking information for the first user stored in association with a social graph of the social-networking system; determine, based on the social-networking information, whether the first user is authorized to access the restricted ideogram; if the first user is authorized to access the restricted ideogram, then sending, to the first client device, information to insert the restricted ideogram into the user input field; else send a restricted-content response to the first client device; send the message to a second client device associated with a second user of the social-networking system; access social-networking information for the second user stored in association with the social graph; determine, based on the social-networking information, whether the second user is authorized to access the restricted ideogram; and if the second user is authorized to access the restricted ideogram, then send, to the second client device, information to display the restricted ideogram; else send a restricted-content response to the second client device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; send, to a first client device associated with a first user of a social-networking system, information to display one or more ideograms available for insertion into a user input field for composing a message, wherein one or more of the ideograms are restricted; receive a request, from the first client device, for one of the restricted ideograms; access social-networking information for the first user stored in association with a social graph of the social-networking system; determine, based on the social-networking information, whether the first user is authorized to access the restricted ideogram; if the first user is authorized to access the restricted ideogram, then sending, to the first client device, information to insert the restricted ideogram into the user input field; else send a restricted-content response to the first client device; send the message to a second client device associated with a second user of the social-networking system; access social-networking information for the second user stored in association with the social graph; determine, based on the social-networking information, whether the second user is authorized to access the restricted ideogram; and if the second user is authorized to access the restricted ideogram, then send, to the second client device, information to display the restricted ideogram; else send a restricted-content response to the second client device. - View Dependent Claims (17, 18, 19, 20)
-
Specification