Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting contact data for displaying representations of contacts for display to a user, the contacts being contacts of the user within a computer-implemented social networking service, generati
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting contact data for displaying representations of contacts for display to a user, the contacts being contacts of the user within a computer-implemented social networking service, generating a first social circle of the user, the first social circle comprising a first subset of contacts of the user within the social networking service and defining a first distribution for digital content, generating a second social circle of the user, the second social circle comprising a second subset of contacts of the user within the social networking service and defining a second distribution for digital content, and, in response to user input, providing the first social circle and the second social circle for selection by the user to define a distribution of digital content, the distribution comprising at least one of the first distribution and the second distribution.
대표청구항▼
1. A system comprising: a server computing device comprising one or more processors; anda non-transitory computer-readable medium coupled to the server computing device and having instructions stored thereon that, when executed by the one or more processors, cause the server to perform server-side o
1. A system comprising: a server computing device comprising one or more processors; anda non-transitory computer-readable medium coupled to the server computing device and having instructions stored thereon that, when executed by the one or more processors, cause the server to perform server-side operations for distributing digital content across a network, the server-side operations comprising: receiving, from a client computing device, information descriptive of a selection by a user of a first group of one or more social networking contacts of the user;receiving, from the client computing device, information descriptive of a selection by the user of a group type for the first group;populating, based on the received information descriptive of the selection of the group type for the first group, a shared social circle with the first group of social networking contacts;determining whether or not the selected group type is a shared private social circle type;if the selected group type is a shared private circle type, then: classifying the shared social circle as a shared private social circle; andprocessing the populated shared social circle to provide an access control list which specifies that contacts in the first group of social networking contacts are granted access to a collection of one or more digital content items of digital content shared by contacts in the first group and distributed for display to contacts in the first group across the network, and the access control list specifies that contacts not in the first group of social networking contacts are not granted permission to access the digital content item collection;determining whether or not the selected group type is a shared public social circle type; andif the selected group type is a shared public circle type, then: classifying the shared social circle as a shared public social circle; andprocessing the populated shared social circle to provide an access control list which specifies that contacts in the first group of social networking contacts and contacts outside the first group of contacts are granted access to a collection of one or more digital content items of digital content shared by contacts in the first group and distributed for display across the network, and the access control list specifies that contacts in the first group of social networking contacts are granted permission to contribute to the collection, and the access control list specifies that contacts not in the first group of social networking contacts are not granted permission to contribute to the collection;wherein the shared public social circle type and the shared private social circle type are mutually exclusive. 2. The system of claim 1, wherein the access control list specifies that contacts in the first group of social networking contacts are granted permission to contribute to the collection, wherein contributions to the collection are distributed for display to the first group. 3. The system of claim 1, wherein the access control list specifies that only the first group of social networking contacts are granted access to the collection. 4. The system of claim 1, wherein the operations further comprise: receiving, from a second client computing device and a second user, information descriptive of a request for membership in the shared social circle;transmitting, to the client computing device, information descriptive of a notification of the request;receiving, from client computing device, information descriptive of an approval indication by the user;populating, based on the received information descriptive of the approval, the shared social circle with a social networking contact representative of the second user; andprocessing the populated shared social circle to modify the access control list to specify that the second user is granted access to the collection. 5. The system of claim 1, wherein the operations further comprise: receiving, from a second client computing device and a second user, information descriptive of a request for membership in the shared social circle;transmitting, to the client computing device, information descriptive of a notification of the request;receiving, from the client computing device, information descriptive of an approval indication by the user;populating, based on the received information descriptive of the approval, the shared social circle with a social networking contact representative of the second user; andprocessing the populated shared social circle to modify the access control list to specify that the second user is granted access to the collection. 6. The system of claim 1, wherein the operations further comprise transmitting an indication to each contact of the first group, the indication informing each contact of membership in the shared social circle. 7. The system of claim 1, wherein the operations further comprise transmitting an indication to each contact of the first group, the indication informing each contact of identities of each of the contacts in the first group. 8. The system of claim 7, wherein the indication informs each contact in the first group of a name of the shared social circle. 9. The system of claim 1, wherein the shared social circle is a topic-based social circle. 10. A non-transitory computer storage medium encoded with a computer program, the program comprising instructions that when executed by data processing apparatus cause the data processing apparatus to perform operations comprising: serving one or more web page documents to a client computing device operated by a user, each document containing instructions for a browser application to perform client-side operations, comprising: receiving, from a client computing device, information descriptive of a selection by a user of a first group of one or more social networking contacts of the user;receiving, from the client computing device, information descriptive of a selection by the user of a group type for the first group, wherein the selected group type is either a shared private social circle type or a shared public social circle type;populating, based on the received information descriptive of the selection of the group type for the first group, a shared social circle with the first group of social networking contacts;if the selected group type is a shared private circle type, then: classifying the shared social circle as a shared private social circle; andprocessing the populated shared social circle to provide an access control list which specifies that contacts in the first group of social networking contacts are granted access to a collection of one or more digital content items of digital content shared by contacts in the first group and distributed for display to contacts in the first group across the network, and the access control list specifies that contacts not in the first group of social networking contacts are not granted permission to access the digital content item collection; andif the selected group type is a shared public circle type, then: classifying the shared social circle as a shared public social circle; andprocessing the populated shared social circle to provide an access control list which specifies that contacts in the first group of social networking contacts and contacts outside the first group of contacts are granted access to a collection of one or more digital content items of digital content shared by contacts in the first group and distributed for display across the network, and the access control list specifies that contacts in the first group of social networking contacts are granted permission to contribute to the collection, and the access control list specifies that contacts not in the first group of social networking contacts are not granted permission to contribute to the digital content item collection;wherein the shared public social circle type and the shared private social circle type are mutually exclusive. 11. The non-transitory computer storage medium of claim 10, wherein the access control list specifies that contacts in the first group of social networking contacts are granted permission to contribute to the collection, wherein contributions to the collection are distributed for display to the first group. 12. The non-transitory computer storage medium of claim 10, wherein the access control list specifies that only the first group of social networking contacts are granted access to the collection. 13. The non-transitory computer storage medium of claim 10, wherein the operations further comprise: receiving, from a second client computing device and a second user, information descriptive of a request for membership in the shared social circle;transmitting, to the client computing device, information descriptive of a notification of the request;receiving, from client computing device, information descriptive of an approval indication by the user;populating, based on the received information descriptive of the approval, the shared social circle with a social networking contact representative of the second user; andprocessing the populated shared social circle to modify the access control list to specify that the second user is granted access to collection. 14. The non-transitory computer storage medium of claim 10, wherein the operations further comprise: receiving, from a second client computing device and a second user, information descriptive of a request for membership in the shared social circle;transmitting, to the client computing device, information descriptive of a notification of the request;receiving, from the client computing device, information descriptive of an approval indication by the user;populating, based on the received information descriptive of the approval, the shared social circle with a social networking contact representative of the second user; andprocessing the populated shared social circle to modify the access control list to specify that the second user is granted access to the collection. 15. The non-transitory computer storage medium of claim 10, wherein the operations further comprise transmitting an indication to each contact of the first group, the indication informing each contact of membership in the shared social circle. 16. The non-transitory computer storage medium of claim 10, wherein the operations further comprise transmitting an indication to each contact of the first group, the indication informing each contact of identities of each of the contacts in the first group. 17. The non-transitory computer storage medium of claim 16, wherein the indication informs each contact in the first group of a name of the shared social circle. 18. The non-transitory computer storage medium of claim 10, wherein the shared social circle is a topic-based social circle. 19. A computer-implemented method comprising: serving one or more web page documents to a client computing device operated by a user, each document containing instructions for a browser application to perform client-side operations, comprising: receiving, from a client computing device, information descriptive of a selection by the user of a first group of one or more social networking contacts of the user;receiving, from the client computing device, information descriptive of a selection by the user of the group type for the first group, wherein the selected group type is either a shared private social circle type or a shared public social circle type, but not both;populating, based on the received information descriptive of the selection of the group type for the first group, a shared social circle with the first group of social networking contacts;if the selected group type is a shared private circle type, then: classifying the shared social circle as a shared private social circle; andprocessing the populated shared social circle to provide an access control list which specifies that contacts in the first group of social networking contacts are granted access to a collection of one or more digital content items of digital content shared by contacts in the first group and distributed for display to contacts in the first group across the network, and the access control list specifies that contacts not in the first group of social networking contacts are not granted permission to access the digital content item collection; andif the selected group type is a shared public circle type, then: classifying the shared social circle as a shared public social circle; andprocessing the populated shared social circle to provide an access control list which specifies that contacts in the first group of social networking contacts and contacts outside the first group of contacts are granted access to a collection of one or more digital content items of digital content shared by contacts in the first group and distributed for display across the network, and the access control list specifies that contacts in the first group of social networking contacts are granted permission to contribute to the collection, and the access control list specifies that contacts not in the first group of social networking contacts are not granted permission to contribute to the digital content item collection. 20. The method of claim 19, wherein the access control list specifies that contacts in the first group of social networking contacts are granted permission to contribute to the collection, wherein contributions to the collection are distributed for display to the first group. 21. The method of claim 19, wherein the access control list specifies that only the first group of social networking contacts are granted access to the collection. 22. The method of claim 19, further comprising: receiving, from a second client computing device and a second user, information descriptive of a request for membership in the shared social circle;transmitting, to the client computing device, information descriptive of a notification of the request;receiving, from client computing device, information descriptive of an approval indication by the user;populating, based on the received information descriptive of the approval, the shared social circle with a social networking contact representative of the second user; andprocessing the populated shared social circle to modify the access control list to specify that the second user is granted access to the collection. 23. The method of claim 19, further comprising: receiving, from a second client computing device and a second user, information descriptive of a request for membership in the shared social circle;transmitting, to the client computing device, information descriptive of a notification of the request;receiving, from the client computing device, information descriptive of an approval indication by the user;populating, based on the received information descriptive of the approval, the shared social circle with a social networking contact representative of the second user; andprocessing the populated shared social circle to modify the access control list to specify that the second user is granted access to the collection. 24. The method of claim 19, further comprising transmitting an indication to each contact of the first group, the indication informing each contact of membership in the shared social circle. 25. The method of claim 19, further comprising transmitting an indication to each contact of the first group, the indication informing each contact of identities of each of the contacts in the first group. 26. The method of claim 25, wherein the indication informs each contact in the first group of a name of the first social circle. 27. The method of claim 19, wherein the shared social circle is a topic-based social circle.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (47)
Mao, Jianchang; Xu, Zhichen; Walters, Chad; Wang, John; Meltzer, Albert, Access control systems and methods using visibility tokens with automatic propagation.
Abu-Hakima, Suhayya; Grigg, Kenneth E., Collaborative multi-agent system for dynamic management of electronic services in a mobile global network environment.
Zuckerberg, Mark; Sanghvi, Ruchi; Bosworth, Andrew; Cox, Chris; Sittig, Aaron; Hughes, Chris; Germinder, Katie; Corson, Dan, Dynamically providing a feed of stories about a user of a social networking system.
Altman, Samuel H.; Sivo, Nicholas T.; Pernikoff, Thomas B.; Deshpande, Alok; Pernikoff, Richard M., Network manager system for location-aware mobile communication devices.
Farnham,Shelly D.; Turski,Andrzej; Portnoy,William L.; Vronay,David P.; Cheng,Lili, Social mapping of contacts from computer communication information.
Dolan, Mihael R., System and method of user definition of and participation in communities and management of individual and community information and communication.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Thatcher, Gregory Garland; Jacobson, Joshua Robert Russell; Cort, Frank J.; Smith, Adam Michael, Systems and methods to provide assistance during address input.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.