Abstract:
Particular embodiments of a method comprise providing one or more ideograms (e.g., written characters, symbols or images that represent an idea or thing) for insertion into a message. A request may be received from a user for a restricted one of the ideograms. A determination may be made as to whether the user is authorized to access the restricted ideogram. This determination may be based on whether the user is a member of a group of authorized users, whether an attribute of the user meets a restriction requirement, or whether the request comprises an authorization code or token. If the user is authorized to access the restricted ideogram, then the restricted ideogram may be displayed to the user in association with the message. Otherwise, a restricted-content response may be generated.
Abstract:
A social networking system manages the accessibility of content items provided by users and directed to various audiences in the social networking system. An author provides the social networking system with a content item, a content item tag indicating an association between the content item and a tagged user, and a definition of a first audience who may view the content item. The social networking system then allows the tagged user to provide a definition of a second audience who may view the content item, where the second audience may contains users who are not in the first audience defined by the original author. The social networking system then determines whether a viewing user may view the posted content item (and tag) based on whether the viewing user is in at least one of the first audience and the second audience.
Abstract:
The invention provides a display interface in a social networking system that enables the presentation of information related to a user in a timeline or map view. The system accesses information about a user of a social networking system, including both data about the user and social network activities related to the user. The system then selects one or more of these pieces of data and/or activities from a certain time period and gathers them into timeline units based on their relatedness and their relevance to users. These timeline units are ranked by relevance to the user, and are used to generate a timeline or map view for the user containing visual representations of the timeline units organized by location or time. The timeline or map view is then provided to other users of the social networking system that wish to view information about the user.
Abstract:
A composer interface provided by a social networking system allows a user to provide input, such as text data, to the social networking system. The composer interface allows the user to identify an action and/or an object related to the input. An action is structured data describing a relationship between objects defined by the social networking system. Based on the action identified as related to the input, the social networking system stores an association between the received input and the identified action.
Abstract:
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact. Probabilistic information may be collected from various sources for a claim, enabling a social networking system to evaluate a truthfulness of the assertion made in the claim. User-declared profile information may be evaluated as claims. A user, entity, or application may make claims about any assertions made in the social networking system. Reputation scores may be determined for users based on evaluations of their historical assertions. Claims may be evaluated for truthfulness using a probabilistic prediction model using heuristics analysis, regression analysis, and machine learning methods. A claims-based profile of users may be provided to viewers based on the contexts in which the claims were made. Viewers may view claims made about users, such as the users' biographical information, contact information, expertise, and interests.
Abstract:
When a request to connected a requesting user to a target user is received by the social networking system, information associated with the requesting user and with users connected to the target user is retrieved. A fraud probability score indicating a probability that the requesting user is impersonating a user connected to the target user is determined based on the information associated with the requesting user and with users connected to the target user. Based on the fraud probability score, a determination is made whether the requesting user is a suspected imposter and remedial action is taken if imposter is suspected.
Abstract:
Particular embodiments of a method comprise analyzing an image to classify an expression displayed on a face shown in a captured image. Image analysis may include detecting the face in the image, generating a characterization of features of the face, and classifying the expression based on the characterization. The characterization of facial features may be based on benchmark metrics for a particular expression. One or more ideograms (e.g., written characters, symbols or images that represent an idea or thing) may be selected based on the expression. The selection may be based on one or more match scores for the expression. The match scores may be determined based on an ideogram dictionary or an ideogram usage history. The selected ideograms may then be presented, in association with the face, on a screen for the computing device.
Abstract:
The invention provides a display interface in a social networking system that enables the presentation of information related to a user in a timeline or map view. The system accesses information about a user of a social networking system, including both data about the user and social network activities related to the user. The system then selects one or more of these pieces of data and/or activities from a certain time period and gathers them into timeline units based on their relatedness and their relevance to users. These timeline units are ranked by relevance to the user, and are used to generate a timeline or map view for the user containing visual representations of the timeline units organized by location or time. The timeline or map view is then provided to other users of the social networking system that wish to view information about the user.
Abstract:
When a request to connect a requesting user to a target user is received by the social networking system, information associated with the requesting user and with users connected to the target user is retrieved. A fraud probability score indicating a probability that the requesting user is impersonating a user connected to the target user is determined based on the information associated with the requesting user and with users connected to the target user. Based on the fraud probability score, a determination is made whether the requesting user is a suspected imposter and remedial action is taken if imposter is suspected.
Abstract:
In one embodiment, a method includes receiving, from a client device of an author of a message, a request for a restricted ideogram to be inserted into a message; accessing social-networking information for the author; determining, based on the social-networking information for the author, whether the author is authorized to access the restricted ideogram; accessing social-networking information for a recipient user; determining, based on the social-networking information for the recipient user, whether the recipient user is authorized to access the restricted ideogram; and if the author and the recipient user are authorized to access the restricted ideogram, then sending, to the client device of the author, information to insert the restricted ideogram into the message.