Patent application number | Description | Published |
20100132049 | LEVERAGING A SOCIAL GRAPH FROM A SOCIAL NETWORK FOR SOCIAL CONTEXT IN OTHER SYSTEMS - A social network contains information describing information about members of the social network and about various connections among the members. An external system that interacts with users (such as a website) communicates with the social network to access information about the members of the social network. In particular, the external system may determine whether a user is a member of the social network and then obtain information about the member and the member's connections within the social network. This allows an external system to use information from the social network to enhance a user's experience on the external system, while enforcing each member's privacy settings. | 05-27-2010 |
20110023101 | SINGLE LOGIN PROCEDURE FOR ACCESSING SOCIAL NETWORK INFORMATION ACROSS MULTIPLE EXTERNAL SYSTEMS - A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with the social networking system to access information about the users of the social networking system. Login status of the user account on the social networking system is maintained. If the login status of the user account on the social networking system indicates that the user is not logged in, the user is required to provide authentication information. If the login status of the user account indicates that the user is logged in, social network information is provided to the user via an external system, subject to the privacy settings of users of the social networking system. If the user logs out from an external system, the user is also logged out from the social networking system. | 01-27-2011 |
20110023129 | DYNAMIC ENFORCEMENT OF PRIVACY SETTINGS BY A SOCIAL NETWORKING SYSTEM ON INFORMATION SHARED WITH AN EXTERNAL SYSTEM - An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings. | 01-27-2011 |
20110302216 | METHODS AND SYSTEMS FOR MERGING TOPICS ASSIGNED TO CONTENT ITEMS IN AN ONLINE APPLICATION - A question-and-answer application having questions with which topics are associated is described. In some embodiments, user-generated topics are assigned to questions to indicate the subject matter covered by the questions. The application logic includes topic merge logic for quickly and efficiently merging two topics, while enabling the topic merge operation to be easily undone if necessary. | 12-08-2011 |
20110302285 | UPDATE SERVER TO UPDATE RENDERED CONTENT - A method includes maintaining a list of component dependencies for components of a plurality of webpages served from a web server. A change relating to a data item in a database is detected. A first set of components that are impacted by the change relating to the data item in the database are identified. Using the list of component dependencies, a second set of components that are dependent on the first set of components are identified. A set of webpages, served from the web server to at least one browser application, that include components from the first and second sets of components are identified. From an update server, an update operation is initiated with respect to the set of webpages. | 12-08-2011 |
20110302485 | COMPONENT-BASED CONTENT RENDERING SYSTEM - A method to perform component-based rendering of a webpage includes identifying a component hierarchy from which to render the webpage. A set of components are selected from the component hierarchy as an evaluation component set. The evaluation component set is evaluated by determining that a particular component of the evaluation component set does not include a data request for data item to be used in the rendering of the webpage. Responsive to the determination, least one child component of the particular component is identified within the component hierarchy. The child component is added to the evaluation component set. | 12-08-2011 |
20120171654 | METHODS AND SYSTEMS FOR PRESENTING TOPIC-SPECIFIC BIOGRAPHICAL INFORMATION OF A USER - A question-and-answer application that displays topic-specific biographical information about users when presenting certain content elements is described. The topic-specific biographical information for a user may be displayed in various contexts, such as with an answer to a question on a question page for the question, or with information identifying a user who is following a question or a topic. With some embodiments, a user's topic-specific biographical information may be provided by the user, provided or suggested by another user, or obtained from an external data source. | 07-05-2012 |
20120173566 | MULTI-FUNCTIONAL NAVIGATION BAR - A multi-functional navigation bar for a web-based service is described. Consistent with some embodiments of the invention, the navigation bar provides a unified path or user experience for searching for user-generated content that has been posted to a service, and posting new user-generated content to the service. By providing a unified path to perform both the searching and posting functions, the likelihood of the occurrence of redundant or duplicate data is reduced. | 07-05-2012 |
20120173992 | METHODS AND SYSTEMS FOR SOLICITING AN ANSWER TO A QUESTION - A question-and-answer application with an “ask-to-answer” feature is described. The ask-to-answer feature enables any user to solicit an answer to a question from another user. Upon soliciting another user for an answer to a particular question, a message with a call to action is directed to the solicited user. The message may include a copy of the text of the question and may provide a mechanism (e.g., a selectable user interface element) enabling the solicited user to pass on answering the question. Subsequent to the solicitation, the question page for the question will include a notification with information about the solicitation, including in some instances information identifying the user who has been asked to answer the question and the number of times the user has been asked to provide an answer to the question. | 07-05-2012 |
20130014284 | Leveraging A Social Graph From A Social Network For Social Context In Other Systems - A social network contains information describing information about members of the social network and about various connections among the members. An external system that interacts with users (such as a website) communicates with the social network to access information about the members of the social network. In particular, the external system may determine whether a user is a member of the social network and then obtain information about the member and the member's connections within the social network. This allows an external system to use information from the social network to enhance a user's experience on the external system, while enforcing each member's privacy settings. | 01-10-2013 |
20130339879 | METHODS AND SYSTEMS FOR SOLICITING AN ANSWER TO A QUESTION - A question-and-answer application with an “ask-to-answer” feature is described. The ask-to-answer feature enables any user to solicit an answer to a question from another user. Upon soliciting another user for an answer to a particular question, a message with a call to action is directed to the solicited user. The message may include a copy of the text of the question and may provide a mechanism (e.g., a selectable user interface element) enabling the solicited user to pass on answering the question. Subsequent to the solicitation, the question page for the question will include a notification with information about the solicitation, including in some instances information identifying the user who has been asked to answer the question and the number of times the user has been asked to provide an answer to the question. | 12-19-2013 |
20140137201 | DETERMINING A TRUST LEVEL OF A USER IN A SOCIAL NETWORK ENVIRONMENT - A system and method for determining a trust level for a non-approved user in a social network is described. The method includes monitoring requests for social network interactions between an approved user and the non-approved user and determining if each interaction requested is of a first type or a second type. The method further includes increasing a first trust value when the interaction requested is of the first type and increasing a second trust value when the interaction requested is of the second type. The method further includes determining the trust level based on the first trust value and the second trust value. The method further includes changing the status of the non-approved user to an approved user based on the trust level, the first trust value and/or the second trust value. | 05-15-2014 |
20140223519 | Platform for Providing a Social Context to Software Applications - The present invention provides a system and method for providing a social context to software applications. According to one embodiment of the invention, a user of a social network authorizes access by an external software application to information available in the social network. At some time later, the user of the social network uses an application designed by a third-party software developer. The application contacts the social network provider for permission to access the information available in the social network. If access has been authorized, the application incorporates the information from the social network into its interaction with the user, providing a social context to the user's interaction with the application. | 08-07-2014 |
20140237618 | DYNAMIC ENFORCEMENT OF PRIVACY SETTINGS BY A SOCIAL NETWORKING SYSTEM ON INFORMATION SHARED WITH AN EXTERNAL SYSTEM - An external system (such as a website) that interacts with users communicates with a social networking system to access information about the users, who may also be users of the social networking system. If a privacy setting is changed in the social networking system, and the change applies to information that has been shared with an external system, the change is enforced at the external system. For example, the external system may be notified that the information is invalid and must be deleted, or the external system may periodically request the information so that changes to the privacy settings are eventually experienced at the external systems. When an external system again needs the information, whether expired naturally or actively invalidated by the social network, the external system sends a new request for the information, which is subject to the (possibly revised) privacy settings. | 08-21-2014 |
20140245407 | Single Login Procedure For Accessing Social Network Information Across Multiple External Systems - A social networking system contains information describing users of the social network and various connections among the users. A user can access multiple external systems that communicate with the social networking system to access information about the users of the social networking system. Login status of the user account on the social networking system is maintained. If the login status of the user account on the social networking system indicates that the user is not logged in, the user is required to provide authentication information. If the login status of the user account indicates that the user is logged in, social network information is provided to the user via an external system, subject to the privacy settings of users of the social networking system. If the user logs out from an external system, the user is also logged out from the social networking system. | 08-28-2014 |
Patent application number | Description | Published |
20080235353 | System and method for confirming an association in a web-based social network - A method for confirming a request for an association with an organization by a user of a web-based social network is disclosed. In one embodiment, the request includes an e-mail address not controlled by the organization. The request may also be part of an application for membership with the web-based social network. A determination is made whether the request is accepted based at least partially on a specified number of prior requests for association with the organization or being identified as a member of the organization by another user already a member of the organization. The organization may be a high school, a college, a university, a business, a non-profit company, or any other group of people who may desire to associate with each other. | 09-25-2008 |
20090031301 | Personalized platform for accessing internet applications - The present invention provides a system and method for providing a personalized platform for accessing internet applications. According to one embodiment of the invention, a social network provider receives a request for installation of an application from a user of the social network, installs the application at multiple points in the user's social network environment, and personalizes interfaces with the application at these integration points based on information about the user available from the social network. The present invention enables applications to be integrated in the social network environment at multiple integration points and to be personalized for and configured by the user. | 01-29-2009 |
20090049525 | Platform for providing a social context to software applications - The present invention provides a system and method for providing a social context to software applications. According to one embodiment of the invention, a user of a social network authorizes access by an external software application to information available in the social network. At some time later, the user of the social network uses an application designed by a third-party software developer. The application contacts the social network provider for permission to access the information available in the social network. If access has been authorized, the application incorporates the information from the social network into its interaction with the user, providing a social context to the user's interaction with the application. | 02-19-2009 |
20090070412 | Providing Personalized Platform Application Content - A social networking website maintains a profile for each user of the website. The profile includes data associated with a user, such as a connection to one or more plurality of other users of the social networking website or user preferences. The social networking website communicates with one or more third-party application servers to provide one or more applications to social networking website users. When a social networking website user requests an application provided by a third-party application server, the social networking website communicates a subset of the user's profile to the third-party application server, allowing the third-party application server to use this profile data to personalize the application performed for the user. A privacy settings associated with a user profile allows the social networking website to limit the profile data communicated to the third-party application server. | 03-12-2009 |
20110035789 | Determining a Trust Level of a User in a Social Network Environment - A system and method for determining a trust level for a non-approved user in a social network is described. The method includes monitoring requests for social network interactions between an approved user and the non-approved user and determining if each interaction requested is of a first type or a second type. The method further includes increasing a first trust value when the interaction requested is of the first type and increasing a second trust value when the interaction requested is of the second type. The method further includes determining the trust level based on the first trust value and the second trust value. The method further includes changing the status of the non-approved user to an approved user based on the trust level, the first trust value and/or the second trust value. | 02-10-2011 |