![]() portable platform for network computing
专利摘要:
Summary "portable network computing platform" in one embodiment, a portable network computing device comprises a processor, a plurality of radios and a memory. The device may be operated to pair over at least one radio with a device associated with a user. The device can then monitor, via one of the radios, a signal for a connection established with a first network. When the device determines that the signal to the first network has fallen below a quality threshold level, it may allow access point mode for at least one of the devices paired by the radio link to establish a connection with a second network and therefore provide connectivity to the second network for at least one of the paired devices. If multiple networks are available, the device can select an optimal network based on an estimate of one or more factors. 公开号:BR112015023597A2 申请号:R112015023597 申请日:2014-03-12 公开日:2020-03-10 发明作者:E Kalinowski Caitlin;Coglitore Giovanni;Maguire Yael 申请人:Facebook Inc; IPC主号:
专利说明:
PORTABLE PLATFORM FOR NETWORK COMPUTING TECHNICAL FIELD This description generally refers to networked computing devices. FUNDAMENTALS [001] A social networking system, which may include a social networking site, can allow its users (such as people or organizations) to interact with it and with each other through it. The social network system can, with the registration of a user, create and store in the social network system a user profile associated with the user. The user profile may include demographic information, communication channel information, and information about the user's personal interests. The social network system can also, with the registration of a user, create and store a record of the user's relationships with other users of the social network system, in addition to providing services (for example, page publications, photo sharing, organization events, messaging, games or ads) to facilitate social interaction between users. [002] The social networking system may send one or more network content or messages related to its services to a user's mobile device or other computing device. A user can also install software applications on a user's mobile device or other computing device to access a user's user profile and other data within the social networking system. The social networking system can generate a personalized set of content objects to display to a user, such as newsfeed of aggregated stories from other users connected to the user. [003] A mobile computing device - such as a smartphone, tablet computer, or laptop computer - may include functionality to determine its location, direction or orientation, such as a GPS receiver, compass, altimeter, accelerometer or gyroscope. Such a device may also include the Petition 870200018704, of 02/07/2020, p. 74/154 2/57 functionality for wireless communication using any conventional technology, such as, by way of example and not limitation. BLUETOOTH, near field communication (NFC), radio frequency (for example, RFID), infrared (IR), Wi-Fi, pager or cell phone (for example, 2G, 3G, 4G). Such a device can also include one or more cameras, scanners, touch screens, microphones or speakers. Mobile computing devices can also run software applications, such as games, network browsers, or social networking applications. With social networking applications, users can connect, communicate and share information with other users on their social networks. SUMMARY OF PRIVATE MODALITIES [004] In particular modalities, a portable network computing device (PND) provides continuous and portable network connectivity to a user's devices in a device cloud. In particular modes, PND can be a small independent device (for example, keyfob-sized); in other modalities, the PND can be integrated with one of the user's devices (for example, a smartphone or a tablet-like computing device). The PND can be designed to take advantage of any available network connection to act as a network access point for devices that may not include all of the same capabilities. A PND can be paired with one or more devices, with which it can communicate directly, in a non-hierarchical way, by low energy radio when it is within a limit proximity with the paired PND devices. PND itself can monitor network availability and / or link quality and connect one or more of its own additional radios according to your need (conserves energy and can reduce costs). For example, when PND detects that WiFi signals are getting weak, it can activate your radio Petition 870200018704, of 02/07/2020, p. 75/154 3/57 cellular to continuously provide network connectivity to the paired devices within the proximity of the PND. [005] A new device being introduced in the cloud of the user's device can take advantage of the proximity to the devices already registered as being associated with the user to more quickly start personalizing the user experience with the device using social network information. Additionally, when a guest enters the PND user's residence, the guest's PND will attempt to establish a non-hierarchical connection with one of the user devices in the device cloud. The guest can be authenticated according to social graph information and other social network information (for example, first degree friends can be automatically authenticated to access and use user devices). Such access can be granted / restricted according to any property or attribute associated with an element of the user's social graph (for example, allowing access to other social network users in a group called close friends to be automatically authenticated after logging on. user's home). [006] Paired mobile / portable PND devices in the user device's cloud may include a 2G radio or a two-way radio pager so that the device can send an alert and report its location if it determines it is lost, in an inability to detect the PND within the range. [007] A user can use one of the devices in the device cloud to control one or more paired mobile / portable PND devices comprising the user device cloud (e.g. PND, phone, tablet, laptop, automobile, watch, camera) . In a group situation, such as where each element of a household has its own individual PND that is loaded by itself, each PND can be configured for individual authentication and security levels. Petition 870200018704, of 02/07/2020, p. 76/154 4/57 authorization to access and / or control devices in the cloud of the home device. Roaming users to whom members of a household can be connected via a social graph can be granted permissions according to social graph information and other social network information. [008] A user interface can be provided on the control device to control other devices in the device's cloud. Such a control interface can be displayed in a convenient way so as not to impair the user experience. For example, if the control device is a smartphone, the interface for controlling other devices can be provided in such a way that it does not require the user to unlock his smartphone in order to use the interface. icons to control one or more devices may appear on the locked screen interface, based on the smartphone's proximity to one or more devices. BRIEF DESCRIPTION OF THE DRAWINGS [009] Figure 1 illustrates an illustrative device cloud associated with a user; [010] Figure 2 illustrates an illustrative method for providing continuous and portable network connectivity to a user's devices; [011] Figure 3 illustrates the cloud of the illustrative device of figure 1 and a guest user equipped with PND; [012] Figure 4 illustrates an illustrative method 400 for building an PND-based ecosystem of devices associated with users; [013] Figures 5A to 5D illustrate an illustrative interface 500 for controlling devices in a device cloud; [014] Figure 6 illustrates an illustrative method 600 for presenting a user interface for controlling devices in a device cloud; [015] Figure 7 illustrates an illustrative network environment associated with a social network system; Petition 870200018704, of 02/07/2020, p. 77/154 5/57 [016] Figure 8 illustrates an illustrative social graph; [017] Figure 9 illustrates an illustrative computer system. DESCRIPTION OF ILLUSTRATIVE MODALITIES [018] A portable network computing device (PND) that can act as a network access point and universal control for one or more devices with which the PND is paired. In particular embodiments, a PND may comprise a portable device (e.g., key-fob-sized device) including network components to allow the PND to pair with and communicate with the devices paired with the PND. In particular modes, a PND pairs with devices using a radio (for example, a low energy radio using the Bluetooth low energy standard (BLE) or a conventional radio using the WI-FI DIRECT standard soft access point functionality) which requires any of these paired devices to be within close proximity to the PND. [019] Figure 1 illustrates an illustrative device cloud 100 including devices associated with a user 101. A user PND 110 can be paired with one or more devices in device cloud 100; the PND 110 can communicate directly with one or more of the paired PND devices in device cloud 100, in a non-hierarchical manner, over the low energy radio when it is within a limit proximity to the device. In particular embodiments, a paired PND device may comprise any device that includes at least one processor and at least one network connectivity mode (for example, telephone 120, desktop computer 130, refrigerator 140, security system 150, television (TV) 160, car 170, tablet 180 and camera 190). By pairing a device with PND 110, the user can activate, control and otherwise use devices in the device's cloud. For each paired PND device, PND 110 can store one Petition 870200018704, of 02/07/2020, p. 78/154 6/57 unique device identifier (for example, UDID), authentication information, or a user identifier (for example, an identifier for the authorized owner / operator / user of the device). [020] PND 110 can be designed to take advantage of any available network connection, while acting as a network access point for devices that may not include all of the same capabilities. A device paired with PND can therefore conserve energy without sacrificing network connectivity including only low-energy radios, which also improve the device's form factor by eliminating cellular radios and antennas, as well as reducing the size of the battery. (allowing for a thinner and lighter device). [021] PND 110 may include antennas and one or more low energy and high energy radios for various types of network connections, for example, cellular (eg 2G / 3G / 4G / 4G LTE), Wi-Fi (eg e.g. 802.11η, 802.11 ac, 802.11ad, WiGig), Wi-Fi-based top-level protocols (e.g. INTEL WIRELESS DISPLAY (WiDi), Wi-Fi interlacing (e.g. ITU-T G.hn) ), whitespace / TV interlacing (TVWS or 802.11af), GPS, Bluetooth, Low Energy Bluetooth, near field communication (NFC), satellite, pager, radio, etc. [022] In particular modalities, PND 110 may also include external physical accessories, such as, for example, and not by way of limitation, a button interface, a situation indicator, a low energy / small screen, an opening for memory card, and connection ports (for example, USB, Ethernet, optics). In particular embodiments, a PND may be able to connect to a power adapter, draw power from a received RF signal, generate energy using integrated piezoelectric components, or otherwise use energy using any conventional source. [023] Each device paired with PND can use PND 110 to Petition 870200018704, of 02/07/2020, p. 79/154 7/57 network connectivity, constantly (for example, whenever the user holding the PND 110 is in proximity to the device paired with PND), or as needed (for example, whenever the device's network connectivity paired with PND become sporadic / weak / unavailable or expensive, based on the financial cost to the user or energy / resource consumption by the device paired with PND). [024] For example, PND 110 may comprise a small device attached to the user's keychain that has cellular and Wi-Fi connectivity and is paired with the tablet 180 and the phone 120 via Wi-Fi, Bluetooth or NFC. Since the PND 110 is continuously connected to the Internet at all times, if the user 101 carries the tablet 180 and the phone 120 in a bag, the PND 110 can provide the user 101 with a continuous connection to the Internet regardless of where user 101 can go (taking the PND 110 and devices paired with the user's PND) to provide IP-based telephony and message sending capabilities to the phone 120 and Internet connectivity to the tablet 180. The PND 110 can also be paired with and provide network connectivity to other devices, so that the user can use the accessories activated by the network on any of the devices as long as the PND 110 is within the limit proximity with the device. [025] Since the PND 110 can act as an access point (and thus establish a local private network for devices paired with PND 110), multiple devices connected to a PND 110 can also communicate with each other through PND 110, even when the PND 110 is not connected to an external network. [026] In particular modalities, one or more of the devices paired with PND can operate as false terminal devices that are Petition 870200018704, of 02/07/2020, p. 80/154 8/57 make custom computing devices after pairing with a user PND. A fake terminal device can include any computing device that does not persistently store user-specific information and that can be temporarily converted into a custom computing device for a user (for example, public or shared use). The PND 110 may be able to pair with and use a false terminal device for any and all of the appropriate purposes. In some embodiments, the PND 110 can pair wirelessly with a device; in some embodiments, the PND 110 can physically connect to the device. [027] For example, a library can provide the number of standard emission desktop computers 130 (ie, fake terminal devices), where a library member can pair a desktop computer 130 with its PND 110, and the PND 110 will configure the desktop computer 130 to adopt user preferences (for example, desktop theme, language settings, and time zone), conform to user security policies (for example, screen lock authentication, authorization, and expiration policies ), and accessing and uploading user content (e.g., social media information, music library, photo album, subscribed newspapers). [028] In another example, user 101 can enter car 170 (a robot-driven, autonomous taxi) which, after pairing with PND 110, authenticates user 101, provides personalized destination suggestions for user 101 (for example example, the user’s home, workplace, school, or a destination specified in the user’s calendar), authorizes payment to user 101 (based on the destination selected by the user) and transports user 101 to their selected destination according to your personal preferences (for example, as quickly as possible, or in a controlled and relaxed way), while providing facilities Petition 870200018704, of 02/07/2020, p. 81/154 9/57 video conference for user 101 while traveling. [029] PND 110 can also store user-specific authentication and authorization credentials, payment credentials (for example, smart card chip), telephony identifiers (for example, SIM card), settings, preferences, lists / bookmarks of favorites, applications or any other data to allow the PND 110 to facilitate personalized and secure computing with respect to devices paired with PND. In particular embodiments, certain devices paired with PND (for example, home security system, a safe, a gun cabinet, a bicycle chain, a laptop security cable) may comprise additional components for security purposes (for example, sensors and logic to perform biometric identification). [030] In particular modalities, PND 110 can disallow pairing with a fake terminal device without leaving any trace of personal information, usage files, or other user identification information on the fake terminal device. [031] A PND 110 itself can monitor network availability and / or link quality and connect one or more of its radios as needed, in order to conserve energy and reduce cost (for example, by turning on a radio high-energy, such as a cellular radio, or connecting a radio that provides a connection to a network requiring payment for bandwidth usage). When the link quality (for example, as characterized by the received signal strength indication (RSSI)) detected by the PND 110 falls below a particular limit (that is, it begins to decrease to the point where it appears that the user is leaving the Wi-Fi network zone), PND 110 turns on the cellular radio and enters access point mode on your Wi-Fi to continuously provide network connectivity to the paired devices within the limit proximity of the PND 110. The Petition 870200018704, of 02/07/2020, p. 82/154 10/57 limit can be characterized according to any of several different signal attributes, including, but not limited to signal strength, signal-to-noise ratio, average data throughput, average data latency, or any other attribute signal u any combination of attributes. The threshold can also be characterized by one or more data quality metrics as well, such as current and / or historical performance for a known site (for example, a social network site) with respect to latency and / or performance ( for example, if the latency exceeds the threshold or the throughput falls below the threshold, then the PND 110 can enter access point mode). In particular modalities, the PND 110 and / or device paired with PND can detect network availability and / or link quality. In particular modes, the PND 110 can obtain such information from the device paired with PND, and vice versa. [032] In particular modalities, PND 110 can calculate the limit and / or carry out this determination to enter the access point mode based on other factors or conditions besides the simple detection of a real-time drop in RSSI, such as , for example, RSSI data for archiving historical data in particular locations (for example, PND 110 is being ported by the user and heading towards a neutral point where RSSI has historically fallen below some threshold), designations of the low locations RSSI (for example, within a secure military complex that blocks all wireless signals except for those of a particular bandwidth), or RSSI designations estimated at particular locations (for example, network coverage maps calculated based on signal type and base station location information). In particular modalities, such factors can be determined based on information shared through a network of users, such as, for example, a network of registered PND users, a network of users associated with an organization (for example, employees of a company or a group of customers paying for the service Petition 870200018704, of 02/07/2020, p. 83/154 11/57 network) or a social network of users connected within a social graph. [033] When a device paired with PND loses network connectivity (for example, it moves out of range of a home Wi-Fi network), the device can automatically start using PND 110 for network connectivity. PND 110 itself can continuously monitor the level of connectivity to family networks and serve only as an access point when it detects that any signals from family networks are becoming attenuated. [034] In particular modalities, PND 110 may be able to carry out continuous transfers between different types of networks in order to avoid any interruption in connectivity. Once the PND-paired device enters the range of a family network, it may be able to continuously switch back from using PND 110 to network connectivity using the family network (for example, when the user arrives home and is on range of a home Wi-Fi network, the user's 180 tablet can switch to connect to the home Wi-Fi network). [035] Figure 2 illustrates an illustrative method 200 for providing continuous and portable network connectivity for a user's devices. The method can start at step 210, where a PND sets up family network connections. This initial step can be performed when the user first associates with the PND, in addition to whenever the user connects with a new network and establishes the network as a new family network. As described above, the PND can obtain network connectivity information from the user's other devices, or the PND can obtain such information by accessing a profile for the user locally or via the social network. [036] In step 220, the PND can pair with one or more devices. For example, while the user is at home and within the limit proximity to Petition 870200018704, of 02/07/2020, p. 84/154 12/57 any or all of the phone 120, the desktop computer 130, the refrigerator 140, the security system 150, the television (TV) 160, the tablet 180, and the camera 190, the PND can remain paired with any one of those devices. In particular modalities, the PND can pair with a device in order to retrieve network connectivity information before configuring any network connections. In particular modalities, the PND 110 may require that the initial pairing with a device takes place using a radio that requires a very close proximity, such as NFC, or by a Wi-Fi or Bluetooth radio where the distance is determined by a maximum RSSI limit in order to provide additional security and help prevent inadvertent pairing of PND 110 with a device. [037] In step 230, the PND can monitor available networks and detect a family network (for example, a home Wi-Fi network). As long as the signal detected for the network is of sufficient quality, the PND can use the family network for network connectivity and expect any devices paired with PND to do the same. In particular modalities, the PND can automatically determine that a detected network is a family network since it is provided by another user who is known to user 101 (for example, a user 101 social network connection). The PND can identify a network provider by detecting another user's PND and identifying and / or authenticating that PND. In particular modalities, the PND belonging to user 101 can use particular security measures based on the attributes of the detected network (for example, if it is an open or secure network, or if the other user is a trusted friend of user 101 or simply a friend of a friend). In particular modalities, the PND belonging to user 101 can limit or return to certain types of network communications by the paired devices based on the attributes of the detected network (for example, if the detected network requires Petition 870200018704, of 02/07/2020, p. 85/154 13/57 payment based on the use of bandwidth or amount of data downloaded, or if the detected network imposes limits on bandwidth). [038] In particular modalities, a PND 110 may be able to access an interlaced network installation formed when sufficient density of users within a geographic region provides access to the wireless network to which the PND 110 can connect. A user carrying PND can travel significant distances (for example, crossing a city) without activating any cellular radios (or other high energy radios), simply by switching between wireless networks. For example, in a particular region, many if not all residents may have set up individual Wi-Fi and / or television whitespace networks (TVWS), where a user's PND 110 is configured to access some or all of said networks , in addition to broader networks (for example, commercial cellular networks), to provide seamless connectivity for devices that have paired with the user's PND 110. [039] Such modalities can facilitate the control of security and / or consumption of bandwidth for a unit of an interlaced network (for example, an individual home Wi-Fi network) by establishing rules that impose restrictions on users in roaming who wish to connect to your wireless network, such as, by way of example and not by limitation: (1) restricting access to other social network users (for example, by confirming that they have a valid user identifier), ( 2) restricting access to other social network users within their social graph; (3) restricting access to other social network users within a limited degree of separation, (4) restricting access according to any other property or attribute associated with an element of the user's social graph (for example, allowing only the access to other social network users in a designated group); (5) restricting access to private days or times, (6) allowing access only to private users (for example, Petition 870200018704, of 02/07/2020, p. 86/154 14/57 example, other social network users who are not within the user's social graph) by charging a connection fee, (7) restricting access to a maximum number of roaming users; (8) restricting access to a maximum bandwidth per device; (9) restricting access to particular application types (10), restricting access by a connection time expiration; (11) restricting access to allow only connections by roaming users who also contribute to the installation of access by providing their own wireless networks, or any combination of these rules. [040] In step 240, PND can detect that the signal to the family network is falling or has already dropped below a threshold quality level (for example, signal drops, becomes unstable, or attenuated) and allow its point mode (in step 250), thereby providing network connectivity for any paired devices. The limit quality level of a network signal can be determined as discussed above, based on several factors and / or conditions. For example, if user 101 left home holding phone 120, tablet 180, and camera 190, got into car 170 and started driving, the PND can detect that he is no longer in the range of the Wi- Home Fi and is now only in the range of a home TVWS network. At that point, PND can allow its access point mode to provide continuous connectivity for the phone 120, tablet 180, camera 190, and car 170. In particular modalities, the PND can allow its access point mode access simply based on the fact that user 101 has entered and started car 170, since at this point it is very likely that user 101 will move imminently out of the range of the home Wi-Fi network. In particular modalities, the PND can only allow the access point mode if the PND detects that the devices paired with PND within the limit proximity to the PND (thus conserving energy if there is no device that may need to use the PND for connectivity with network). Petition 870200018704, of 02/07/2020, p. 87/154 15/57 [041] The PND can also begin performing operations in order to smoothly establish a network connection to any of these devices so that it can continue communication through the PND instead of the family network, such as, for example , initiating / facilitating a smooth transfer by temporarily using both the family network and the PND access point in parallel. The PND can use multi-frequency radios (2.4 GHz and 5 GHz) to ensure that it can maintain the access point mode and test the quality of the family network. The PND can also use GPS or internal beacons to determine the imminent departure of the original Wi-Fi. The PND and user devices can also communicate in a non-hierarchical manner to mutually assess network changes. [042] In particular modalities, instead of switching between networks, the PND can combine the available bandwidth across multiple networks (for example, in order to match a specified Quality of Service standard or type transmission requirement content, such as high-definition video). [043] In step 260, the PND can detect that the signal to the family network is of sufficient quality again (or that another family network is now within the range) and disable its access point mode (in step 270). In particular modalities, if the PND detects that there are paired devices that are communicating through the PND, the PND can carry out the operations in order to smoothly transfer the network connection to any of these devices so that they are connected to the family network alternatively. For example, if user 101 has arrived at work and the PND 110 detects the user's working Wi-Fi network, or if user 101 has arrived at a cafe he normally frequents with a TVWS network, the PND can connect to the newly detected network, initiate / facilitate a smooth transfer to any devices that are currently using the Petition 870200018704, of 02/07/2020, p. 88/154 16/57 PND for network connectivity (for example, phone 120 and tablet 180), and then disable your access mode. In particular modes, the PND 110 can detect that a paired device is using the PND 110 for high-demand activity (for example, making a phone call, or sequencing high-bandwidth content) and postpone disabling the access point until the activity has ended. [044] If more than one network is available, the selection of which particular network to join can include a determination of which network is ideal, where the analysis can be based on any number of cost factors, including, but not limited to, limited to technical factors, economic factors, security factors, and user preference factors, such as, for example: available bandwidth, type of network (eg 4G X TVWS X 802.11η cell), signal strength , noise, level of interference, resource consumption required to establish and maintain a connection to the network (for example, using a radio to connect to a cellular network may require more energy than a radio to connect to a WiFi network), if a particular network is familiar with the PND 110 (for example, the PND 110 has previously successfully connected to the network or has a password stored to access the network), if there is any cost incurred by connecting to the network (for example it, access is free , access is free, but does the network require the use of software that displays ads is it an embedded cost where the user is already paying for a regular network subscription access is pay per use ), if the network is operated by a known person or entity (for example, by your employer, by another user to whom you are connected in a social network system, by the host of an event for the which the user purchased an entry from), available security level (for example, open X WEP X WPA2), etc. [045] Once a device paired with a PND (for example, telephone 120) enters the range of a network associated with a telephone number in Petition 870200018704, of 02/07/2020, p. 89/154 17/57 particular to the user (for example, home network or work network), the device paired with PND may ring in response to callers who call the particular phone number. For example, when the user is at home (within the range of their home network), the device paired with the PND can detect an incoming call to the home phone number and have the device ring. The PND 110 can also provide an IP-based phone accessory that works transparently across international boundaries and across different networks (which can operate based on different technologies); in particular modalities, a phone number can be associated with the user's social network user identity, and a first social network user can call a second social network user simply by dialing the second user using their social network identifier ( for example, connection username). [046] Particular modalities may repeat one or more steps of the method of figure 2 where appropriate. Although this description describes and illustrates particular steps in the method of figure 2 as occurring in a particular order, this description contemplates any suitable steps of the method in figure 2 that occur in any suitable order. Furthermore, although this description describes and illustrates particular components, devices or systems performing particular steps of the method of figure 2, this description contemplates any suitable combination of any suitable components, devices or systems performing any suitable steps of the method of figure 2. [047] Figure 3 illustrates the device 100 cloud illustrating user 101 of devices paired with PND 110 as illustrated in figure 1 (for example, telephone 120, desktop computer 130, refrigerator 140, security system 150, television (TV) 160, car 170, tablet 180, and camera 190), in addition to the guest user 301 who is equipped with his own PND 310 and wants Petition 870200018704, of 02/07/2020, p. 90/154 18/57 to pair temporarily and / or permanently with one or more devices in the user device 101 cloud. [048] Typically, when a user sets up a new custom device, such as an ANDROID or APPLE IOS device, the user needs to connect to the device with their existing user ID. The setup process may require the user to register their password repeatedly, which can be cumbersome for the user. It can often be long before the device can present the user with a personalized experience on the device, based on the profile information associated with their existing user connection. Additionally, when using the device to make purchases, a user may again need to enter their password repeatedly. [049] Figure 4 illustrates an illustrative method 400 for building an PND-based ecosystem of devices associated with users. The ecosystem can include the PND itself, in addition to the device in the device cloud. In step 410, the new PND 110 stores the configuration information associated with user 101. The PND 110 can obtain configuration information in any conventional way: (1) by registering user identification and / or authentication information directly on the PND 110 (for example, by providing PND 110 with biometric identification, or by registering a user ID and password for a user's 101 social network account), (2) by (at least temporarily) pairing PND 110 with a fake terminal device that can be used to provide the PND 110 with user credentials, (3) by encoding a PND 110 with user identification information in a store or warehouse at the time of sale, (4) by encoding a new PND 110 with user identification information after connecting to the user's home Wi-Fi network (probably after receiving confirmation from the user), etc. In particular modes, the PND 110 can be configured to Petition 870200018704, of 02/07/2020, p. 91/154 19/57 access a user profile for user 101 (for example, on a social network system based on the user identifier on the social network system), from where the PND 110 can retrieve network connectivity settings or any other user-specific information. [050] In step 420, the PND 110 (or a device that has already paired with the PND 110) perceives a new device (not paired) within a limit proximity. In particular embodiments, the new device itself can perceive that it is within the limit proximity of the PND 110 or a device paired with PND. For example, if the user purchases a new tablet device online and it is sent to their home, when the user brings the tablet into the home, the tablet may come into close proximity to the user's PND and / or one or more devices registered as associated with the user. The new tablet can also allow it to be within the range of the user's home Wi-Fi network, where the user's Wi-Fi router is paired with the PND 110. The limit proximity can be determined by the natural range of a particular radio that must be used to pair new devices. For example, in order to avoid inadvertent pairings (or attempts to pair a device), some modalities may require that a near-field communication radio (NFC) be used to pair new devices. In other modalities (for example, where pairing is performed using network technology with a greater signal range, such as Wi-Fi Direct or BLE), the limit proximity can be configured at a particular distance, for example, a foot or less or one meter or less, or according to an RSSI indicator (for example, higher value for saturation). [051] In particular modalities, a new device being introduced in the cloud of the user's device can take advantage of the proximity of a PND or other devices that have already been registered as being associated with the Petition 870200018704, of 02/07/2020, p. 92/154 20/57 user in order to accelerate the personalization of the user experience with the device through the use of social network information. In particular modalities, a user profile can be pre-configured to allow the purchase / activation of a new device when the user accesses a purchase / activation interface on the novel device and the new device is within a limit proximity of one or more other devices already registered as being associated with the user. [052] In step 430, in particular modalities, the new device pairs with the user's PND and joins the cloud of the user's device. As part of the pairing process, the PND 110 may attempt to establish a direct, non-hierarchical connection to the device in order to exchange the initial information. The user's PND can store the initial information associated with the new device (for example, device ID, MAC address), and the new device can likewise store the initial information associated with the PND (for example, PND ID ). In particular modes, if the new device is within the range of the user's home Wi-Fi network, the new device can pair with the user's PND 110 even if it is not within the limit proximity of the PND 110 (for example, even if the user 110 has left the PND 110 at work, the new device will still be able to pair with the PND 110 by connecting to the PND 110 over the Internet over the home Wi-Fi network) to accelerate the customization of the user experience with the device ). [053] In step 440, the new device can provide information to the PND 110. For example, a device belonging to user 101 may have established its own network connectivity settings (for example, Wi-Fi service set identifiers (SSIDs ), encryption settings and passwords) before pairing with PND 110, which you can then share with PND 110 after pairing with PND 110. Petition 870200018704, of 02/07/2020, p. 93/154 21/57 [054] In step 450, the new device can obtain user information from the PND or another device paired with PND. For example, based on the status of the tablet as a new device and the proximity of the tablet to one or more other devices and / or the presence of the device within the user's home Wi-Fi network, the tablet can obtain identification information for the user, such as the user's social network user identifier. [055] In step 460, the new device uses user information to provide a personalized user experience for user 101. For example, the tablet can use the user's social network user identifier to establish a connection to the network social and start downloading some information about various types in order to present a user experience based on an innovative social network (for example, by displaying a photo on the locked screen, by the possibility of accessing the user's home Wi-Fi network, by configuring basic device settings and / or metadata according to user preferences, such as time zone, preferred language, etc.). In some embodiments, full access to the device and the user's social network information (as displayed on the device) may not be granted until the user registers their social network system credentials on the device. In particular embodiments, a new device can be encoded with the user's social network user identifier on an integrated chip (for example, an RFID / NFC indicator) in a factory, warehouse or some other point in a mode distribution chain. that the device can start downloading some information of various types in order to present a user experience based on an innovative social network - in this case, the user may not need to register their social network password as long as the new device is placed inside limit proximity to another device already registered as associated with the user. Petition 870200018704, of 02/07/2020, p. 94/154 22/57 [056] Once user 101 has configured one or more devices paired with PND, the user may wish to securely provide a guest 301 with access to devices in the user's device cloud (eg refrigerator 140, TV 160, and automobile 170). Guest 301 can be authenticated according to social graph information and other social network information (for example, first degree friends can be authenticated automatically to access and use user devices). Such access may be granted / restricted according to any property or attribute associated with an element of the user's social graph (for example, allowing only access to other users of the social network in a group designated Close Friends to be automatically authenticated after logging in. enter the user's home). [057] In step 470, in particular modalities, when guest 301 enters the user's home and is within a close proximity of a device, for example, TV 160, the PND 310 of guest 301 will attempt to establish a non-direct connection hierarchical with TV 160. The requirement that a direct connection be established between the PND 310 and the user's device implies that the guest 301 is in the user's presence, thus reducing the likelihood of gaining access through spoofing. In particular modalities, for this type of authentication use case, the PND 310 may be necessary to establish a direct connection using NFC or another type of wireless technology where the limit proximity is very low (so that the guest 301 needs be very close to the device, as opposed to being outside the window). [058] In step 480, once a direct connection has been established, the device can attempt to authenticate and / or authorize access for guest 301. For example, TV 160 can retrieve a social network user ID for the guest 301 from the PND 310, access a social network system and determine Petition 870200018704, of 02/07/2020, p. 95/154 23/57 if guest 301 and user are connected within a social graph of a social network system. If so, TV 160 can recognize guest 301 as a friend of the user and display an interface for the user to grant credentials to guest 301. Such credentials may receive an expiration time stamp or may be revoked. In particular embodiments, the device can grant access according to an authorization level based on whether guest 301 is connected to user 101 within a boundary degree of separation, based on whether guest 301 belongs to a user-designated group of trusted friends (or a user-designated black list of untrusted friends), or based on some other information associated with guest 301. [059] In particular modalities, the use of a PND can support multiple factor authentication of a guest with whom a user can be connected through a social graph. The possession factor can be satisfied by the guest 301 carrying the PND in his person. In an example based on ownership + inheritance (of a type), when guest 301 enters the user's home and tries to pair their PND with the user's TV, the PND 310 can transmit a token to the TV, which uses that token to fetch guest 301 from the user's social graph and retrieve their user profile. The TV can then display the 301 guest's profile and ask the user to click a button on their own PND to confirm their guest identity and allow the 301 guest to pair their PND with the TV. In an example based on ownership + knowledge, after the TV locates guest 301 on the user's social graph, the TV may display a request for guest 301 to register their authentication credentials, such as a password or a gestural pattern ( for example, by using a TV remote control, by using the PND 310, by using another device paired with the PND 110, or by using a device Petition 870200018704, of 02/07/2020, p. 96/154 24/57 paired with PND 310). In an example based on two degrees of possession, the user's own SNE (or a SNE belonging to someone else in the household) may also need to be present. In particular modalities, authentication may require that the PND 310 be in close proximity to at least a minimum number of devices in the cloud of the user's device 101 (for example, three devices paired with PND); if PND 310 can be determined to be in close proximity to that minimum number of user devices 101, guest 301 can be authenticated (the consideration being that guest 301 may not be in close proximity to many of the user devices 101 without need to be invited). The stricter requirements for multi-factor authentication can also be applied selectively (for example, for guests who are not the user's first friends within the social graph). [060] In particular modalities, a PND can be authenticated using a non-hierarchical token-based technique as described in US patent application No. 13 / 843,155, filed on March 15, 2013 and entitled Wireless Data Privacy Maintained Through a Social Network. In particular modes, authentication can be performed. [061] In step 490, the device grants access and / or control to guest 301, based on the detected presence of his PND 310. In some modalities, if the PND 310 is not detected, the device can temporarily or permanently disable access / control (or only certain types of access / control, until the PND 310 is detected and / or the guest 310 re-authenticates his identity). In particular modalities, this process can also include steps to authorize the guest 301 to access different features of the device. For example, when a user confirms that guest 301 must be authenticated, the user can also configure Petition 870200018704, of 02/07/2020, p. 97/154 25/57 manually access permissions for guest 301 with respect to the device. In another example, access permissions can be automatically configured according to the guest's 301 social network profile and other social network information. For example, if guest 301 is a child, the range of channels on the TV may be automatically limited to those considered suitable for children. [062] Although the PND 110 has been described as being associated with a single user, in particular ways, the PND 110 can be used by a group of users (for example, a family or group of friends) to provide connectivity to devices associated with any user in the group and / or to allow any user in the group to connect to a fake terminal device. In particular embodiments, such a PND 110 can be associated with a group profile, including any suitable type of information described here (for example, group-level and security authorization settings, payment credentials for a group bank account, content shared group). In particular modalities, the PND 110 can be used in association with a social network system to automatically detect and allow access to friends of a PND 110 user - such access can be restricted by the degree of separation between the user's social graph. [063] The particular modalities can repeat one or more steps of the method of figure 4, where appropriate. Although this description describes and illustrates particular steps of the method in figure 4 as occurring in a particular order, this description contemplates any suitable steps of the method in figure 4 occurring in any suitable order. Furthermore, although this description describes and illustrates particular components, devices or systems performing the particular steps of the method in figure 4, this description contemplates any suitable combination of any components, devices or systems Petition 870200018704, of 02/07/2020, p. 98/154 26/57 by performing any appropriate steps in the method of figure 4. [064] In some embodiments, when a device paired with PND determines that it has been lost since it is neither in the PND range nor in the range of a family network, the device may include a 2G radio or a two-way radio pager so that the device can send an alert and report its location. Such a device can use an IP address that can be geolocated or in the case of Wi-Fi, the SSID / password combination can be used to designate a trusted location (home, work, friends house, etc.). [065] In particular, pager radios are often used in emergency situations for reasons that make them ideal for use when integrated with a lost device: (1) pager networks are typically based on simultaneous broadcast distribution over satellite-controlled networks with many overlapping pager transmitters, (2) pager radios can penetrate solid structures much more easily than other radios (for example, cellular or Wi-Fi), and (3) pager radios use a lot little energy. [066] In some modalities, no alerts can be generated if a device happens to be within the range of a trusted network (for example, home Wi-Fi network) or can maintain a non-hierarchical connection with the PND 110. In some modalities , the pager or 2G radio remains off until the device paired with PND does not detect the PND 110 and is not within the range of a trusted network. [067] As discussed above, by pairing a device with PND 110, the user can activate, control and otherwise use the devices in the device cloud. By connecting to the PND, one or more devices in the device cloud can be used to communicate and control (actively or automatically) one or more other devices in the device cloud. A control interface can be provided on one device (the Petition 870200018704, of 02/07/2020, p. 99/154 27/57 control) to control other devices in the device cloud. In particular embodiments, the control device can only provide control for controllable devices in particular in the device cloud, for example, those that are perceived within a limit proximity, those that include a remote interaction interface through which the device can receive and process commands for remote control, those for which the PND 110 user has been granted authorization to control the device, or those that are available (for example, powered, connected to a network, operational and / or enabled for remote control) . [068] Figures 5A through 5D illustrate an illustrative user interface (UI) 500 for controlling devices in a device cloud. In the example illustrated in figures 5A to 5D, UI 500 is displayed on the screen of the user's smartphone 120. In particular modes, the UI 500 can be displayed on a smartphone 120 home screen, or even on a locked screen interface ( thus being available for use without requiring the user 101 to unlock the smartphone 120). [069] When smartphone 120 enters a limit proximity with multiple devices in device cloud 100, an icon for each device may appear on the screen of smartphone 120. For example, in Figure 5A, when user 101 transports smartphone 120 to in the living room, the UI 500 displays icons for the four devices within the limit proximity: Main Television (the television in the living room), Curtains, Living Room Lights and Downstairs Thermostat. The pattern for being within the limit proximity may differ from one device paired with PND to another, based on factors such as: the radio range used to establish a connection with the device paired with PND (for example, a large screen TV with Wi-Fi receiver may have a larger range than a watch with a Bluetooth receiver), the Petition 870200018704, of 02/07/2020, p. 100/154 28/57 use of the device paired with PND (for example, normal distance for using and operating a large screen TV - viewing distance - can be greater than the normal distance for using and operating a tablet with a touch screen - a comfortable distance corresponding to the length of the arm), etc. If user 101 selects the icon for a particular device, an interface can be displayed allowing smartphone 120 to act as a remote control for the selected device. As illustrated in figure 5B, when user 101 selects the Living Room Lights icon, an interface is displayed to allow user 101 to control two sets of dimmer-controlled top recessed lighting in the living room while watching television. As illustrated in figure 5C, when user 101 selects the Downstairs Thermostat icon, user 101 can also control the air conditioning and heating under the living room floor. [070] In another illustrative situation, when the user is watching a movie on TV, (1) an interface can be provided on the smartphone through which the user can control a remote control car, and (2) a Picture display -inpicture (PiP) can appear on the TV where the user can monitor a video camera mounted on the remote control car to follow the user's baby or puppy and monitor what they are doing in another environment. [071] In another illustrative situation, if a user is working in their upstairs home office with the door closed, the user's laptop may display a first notification when the front door is opened by someone with a key (period where the control interface can appear on the laptop screen to display an image of the user’s child captured by a security camera mounted on the front door), and then the user’s laptop can display a second notification when the TV on the floor has been turned on and the channel switched to the cartoon channel (point at which the control interface can Petition 870200018704, of 02/07/2020, p. 101/154 29/57 accessory to take control of the TV and turn off the TV, change the channel to an educational channel, or transmit audio through the VR speakers so that the user can ask their child to do their homework) . [072] In another illustrative situation, as the user walks around the house before going to bed, different interfaces can appear on the smartphone screen as he crosses a corridor and passes through different rooms, where each interface displays a UI to control the aspects of the associated environment (for example, turning off lights, locking doors, turning off TVs, silencing the ringing of phones, closing curtains, etc.). As illustrated in Figure 5D, after user 101 has finished watching television and goes up to bed, smartphone 120 notices the devices in the main suite and displays icons to control those devices: Master Suite Television, Security System, Lights Room, Upper Floor Thermostat. [073] In some embodiments, instead of having a single designated control device that is physically transported by the user, the PND 110 can transfer device designation to device within the device cloud, based on which device (which can providing a suitable control interface) is in closer proximity to the PND 110 (and, presumably, the user). Different types of control interfaces (eg display screen, built-in microphone for detecting voice commands, built-in 3D motion sensor for detecting commands by gestures, etc.), can be integrated with different types of devices. For example, when the user is in his car (with built-in microphones and a touch screen on the dashboard), the user can command the garage door to open and the oven to start preheating as the car drives down the street (and the PND 110 enters the Wi-Fi range of the user's home). After the user parks their car in the garage, the PND 110 detects that the user got out of the car and entered the kitchen, and transfers the designation device Petition 870200018704, of 02/07/2020, p. 102/154 30/57 car control for a refrigerator with an interactive screen, built-in microphones, and 3D motion sensors built into the door. Now that this refrigerator is designated as the control device while the user is cooking in the kitchen, the user can monitor a video camera focused on a baby sleeping on the top floor, and while the hands are dirty, provides voice commands and / or gesture commands to the refrigerator to respond to a text message sent to the smartphone 120. [074] In particular modes, the automatic and active controls can be activated simultaneously - for example, if there is a person in a large house with many rooms, while the person walks through different rooms in the house to prepare dinner, watch TV , use the bathroom, and go to bed, each room can automatically adjust the temperature and lighting as the user enters and exits the room, and an interface may appear briefly on the user's smartphone for the first 20 seconds after the user enters a new environment to allow the user to actively control the temperature and lighting as well. [075] In a group situation, such as when each member of a household has its own individual SNE that is transported by itself, each SNE can be configured for individual authentication and authorization. In this way, different permissions can be granted to each SNE (for example, relatives can have administrative level controls over all devices, whereas teenagers can have strict controls, and children / pets have no control). In this situation, when each PND is paired with one or more devices in the house, automatic controls can be implemented to control a particular device based on the particular PND that is detected in proximity to the device. [076] For example, a child or puppy PND can be configured Petition 870200018704, of 02/07/2020, p. 103/154 31/57 how the PND acts as a tracking device that notifies devices in the home when the PND approaches. If the PND and / or PND-paired device detects that the child / puppy is approaching, the PND can send a signal to the PND-paired device to perform certain actions that would not trigger a PND configured for an adult or older child ( for example, an automated gate for children automatically closes access to a ladder). In another example, if the child wakes up and approaches the living room where adults are watching a land movie, the TV can automatically pause the movie and show a screen saver or channel suitable for children. In another example, if a secure closet containing medication / alcoholic beverages / cleaning supplies detects that a child is approaching the closet without any adults in the vicinity, the secure closet may lock its doors. [077] In a situation involving one or more roaming users (each carrying a PND with them) who are not members of the household, varying levels of control can be granted to roaming users based on social network information or other information. For example, different access permissions may be granted to different service providers depending on their different roles (for example, gardeners may need access to a side gate to the yard, but not access to the home; a nanny may need access to the home, but not to the couple's bedroom or office; a cleaning lady may need access to almost every area of the home; guests in the home who are in the home while the owner is away can have access to everything except private lockers and the liquor cabinet, and may not have access to pay-per-view movies). [078] Other roaming users to whom members of the household may be connected via a social graph may have permission according to Petition 870200018704, of 02/07/2020, p. 104/154 32/57 social graph information and other social network information (for example, first-degree friends can automatically receive access to the home Wi-Fi network). Such permissions may be granted / restricted, as an example and without limitation, by: (1) restricting access to other users of the social network (for example, by confirming that they have a valid user identifier); (2) restricting access to other users of the social network with their social graph; (3) restriction of access to other social network users within a degree of separation or (4) restriction of access according to any other property or attribute associated with an element of the user's social graph (for example, allowing access only other social network users in a designated group). [079] Figure 6 illustrates an illustrative method 600 for providing continuous, portable network connectivity to a user's devices. The method can begin at step 610, where a particular device in the device cloud 100 designated as a control device (e.g., smartphone 120) perceives one or more other devices in the device cloud 100 within a boundary proximity. The limit proximity can be determined with respect to the location of the control device, or with respect to the location of the PND. In particular embodiments, only one device associated with a specific user can be used as a control device. In step 620, the control device determines which of the devices within a limit proximity are controllable. This determination can be made by retrieving such information from the PND, or by the control device itself. In step 630, the control device features a UI that allows a user to view and select each device - in some ways, only those devices within a limit proximity for which the user is authorized to access and / or control the device. In step 640, after receiving the user registration by selecting a particular device Petition 870200018704, of 02/07/2020, p. 105/154 33/57 presented in the UI that the user wants to access or control, the control device presents a UI to control the selected device. In step 650, the control device sends commands to access or control the selected device, based on the user registration received through the UI. In particular modes, the user record can indicate that the user wants to monitor the progress of the selected device with respect to a particular operation (for example, turning on the oven light and watching a chocolate souffle progress), or receiving a notification when a particular event occurs (for example, oven temperature reaches 425 Fahrenheit). Commands can be sent directly from the control device to the selected device, or via the PND. In step 660, the control device receives feedback from the selected device (for example, confirmation that the command has been successfully executed, or sensor data indicating a current state of the device). Like commands, feedback can be sent directly to the control device from the selected device, or via the PND. In step 670, the control device can update the UI as the user (and thus the control device) moves through the physical space, thereby moving towards or away from devices in the device cloud 100, and then returns to step 620 (to determine if the user is authorized to access and / or control any newly perceived devices). [080] In particular modes, the UI 500 can be displayed in a convenient way so as not to impair the user experience. For example, if a smartphone and a PND are detected as being in close proximity to the TV, the interface to control the TV can be provided in such a way that it does not require the user to unlock their smartphone in order to use the interface (for example, displaying controls on the locked screen interface where the user is also prompted to unlock their smartphone). In another example, a notification can be sent Petition 870200018704, of 02/07/2020, p. 106/154 34/57 for the smartphone that, when clicked, opens the device control interface without unlocking the smartphone. In another example, one or more icons for controlling one or more devices may appear on the locked screen interface, based on the smartphone's proximity to one or more devices. [081] Figure 7 illustrates an illustrative network environment 700 associated with a social network system. The network environment 700 includes a client system 730, a social network system 760, and a third party system 770 connected to each other by a network 710. Although figure 7 illustrates a particular arrangement of the client system 730 , the social networking system 760, the third party system 770 and the network 710, this description includes any suitable provision of the client system 730, social network system 760, third party system 770 and network 710. As an example and not by way of limitation, two or more of the 730 client system, the social network system 760 and the third party system 770 can be connected to each other directly, bypassing the 710 network. As another example, two or more among the the client system 730, the social network system 760, and the third party system 770 can be physically or logically located in the same place with each other in whole or in part. In addition, although figure 7 illustrates a particular number of client systems 730, social network systems 760, third party systems 770 and networks 710, the description contemplates any suitable number of client systems 730, network systems social 760, third party systems 770 and networks 710. As an example and not by way of limitation, network environment 700 may include multiple client systems 730, social network systems 760, third party systems 770 and networks 710. [082] This description covers any suitable 710 network. As an example and not by way of limitation, one or more parts of the 710 network may include an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a Petition 870200018704, of 02/07/2020, p. 107/154 35/57 local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), a part of the Internet, a part of the Public Exchanged Telephone Network (PSTN), a cellular telephone network, or a combination of two or more of them. The 710 network can include one or more 710 networks. [083] Links 750 can connect client system 730, social network system 760, and third party system 770 to communication network 710 or to each other. This description includes any suitable 750 links. In particular modalities, one or more 750 links includes one or more wired links (such as, for example, Digital Subscriber Line (DSL) or Cable Data Service Interface Specification ( DOCSIS)), wireless (such as, for example, Wi-Fi or Worldwide Interoperability for Microwave Access (WiMAX)), or optical (such as, for example, Synchronized Optical Network (SONET) or Synchronized Digital Hierarchy ( SDH)). In particular modalities, one or more 750 links each include an ad hoc network, an intranet, an extranet, a VPN, a LAN, a WLAN, a WAN, a WWAN, a MAN, a part of the Internet, a part PSTN network, a network based on cellular technology, a network based on satellite communications technology, another link 750, or a combination of two or more of these links 750. Links 750 do not necessarily have to be the same across the entire network 700. One or more first 750 links may differ in one or more aspects from one or more second 750 links. [084] In particular embodiments, the 730 client system may be an electronic device including hardware, software, or embedded logic components or a combination of two or more of such components and capable of performing the appropriate functionalities implemented or supported by the client system 730. As an example and not by delimitation, a 730 client system can include a computer system such as a desktop computer, Petition 870200018704, of 02/07/2020, p. 108/154 36/57 notebook or laptop computer, netbook, tablet computer, ebook reader, GPS device, camera, personal digital assistant (PDA), portable electronic device, cell phone, smartphone, other suitable electronic devices, or any suitable combination of themselves. This description covers any suitable 730 client system. A 730 client system can allow a network user on the 730 client system to access the 710 network. A 730 client system can allow its user to communicate with other users on other security systems. customer 730. [085] In particular modalities, the 730 client system may include a 732 web browser, such as MICROSOFT INTERNET EXPLORER, GOOGLE CHROME or MOZILLA FIREFOX, and may have one or more add-ons, plug-ins or other extensions, such as like TOOLBAR or YAHOO TOOLBAR. A user on the 730 client system can enter a Uniform Resource Locator (URL) or other address by directing the network browser 732 to a private server (such as server 762, or a server associated with a third party system 770) , and the 732 web browser can generate a Hypertext Transfer Protocol (HTTP) request and communicate the HTTP request to the server. The server can accept the HTTP request and communicate to the 730 client system one or more Hypertext Markup Language (HTML) files in response to the HTTP request. The 730 client system can create a web page based on HTML files from the server for presentation to the user. This description includes any suitable web page files. As an example and not by way of limitation, web pages can be created from HTML files, Extensible Hypertext Markup Language (XHTML) files, or Extensible Markup Language (XML) files, according to particular needs. Such pages can also execute scripts such as, for example and without limitation, the writings Petition 870200018704, of 02/07/2020, p. 109/154 37/57 in JAVASCRIPT, JAVA, MICROSOFT SILVERLIGHT, markup language and script combinations such as AJAX (JAVASCRIPT asynchronous and XML) and the like. Here, reference to a web page encompasses one or more corresponding web page files (which a browser can use to create the web page) and vice versa, where appropriate. [086] In particular modalities, the social network system 760 can be a network addressable computing system that can host an online social network. The social networking system 760 can generate, store, receive and send social networking data, such as, for example, user profile data, concept profile data, social graph information, or other suitable network related data online social. The social networking system 760 can be accessed by other components of the networking environment 700 directly or via the 710 network. In particular embodiments, the social networking system 760 can include one or more 762 servers. Each 762 server can be a unitary server or a distributed server spanning multiple computers or multiple data centers. 762 servers can be of various types, such as, for example, and without limitation, the network server, news server, mail server, message server, ad server, file server, application server, exchange, database server, proxy server, another server suitable for carrying out the functions or processes described here, or any combination thereof. In particular embodiments, each 762 server may include embedded hardware, software, or logical components or a combination of two or more of these components to achieve the appropriate functionality implemented or supported by the 762 server. In particular embodiments, the 764 social networking system may include one or more 764 data stores. 764 data stores can be used to store various types of information. In particular modalities, the information stored in the Petition 870200018704, of 02/07/2020, p. 110/154 38/57 data stores 764 can be organized according to specific data structures. In particular embodiments, each data store 764 can be a relational, columnar, correlation or other suitable database. Although this description describes or illustrates particular types of databases, this description includes any suitable type of database. Particular modalities may provide interfaces that allow a client system 730, a social networking system 760, or a third party system 770 to manage, retrieve, modify, add or delete information stored in the data store 764. [087] In particular modalities, the social networking system 760 can store one or more social graphs in one or more 764 data stores. In particular modalities, a social graph can include multiple nodes - which can include multiple user nodes (each one corresponding to a particular user) or multiple concept nodes (each corresponding to a particular concept) - and multiple tabs connecting the nodes. The social networking system 760 can provide online social networking users with the ability to communicate and interact with other users. In particular modes, users can join the online social network through the social network system 760 and then add connections (for example, relationships) to a number of other users of the social network system 760 with whom they wish to be connected. Here, the term friend can refer to any other user of the social networking system 760 with whom a user has formed a connection, association or relationship through the social networking system 760. [088] In particular modalities, the social networking system 760 can provide users with the ability to perform actions on various types of items or objects, supported by the social networking system 760. As an example and not by way of limitation, items and objects can include groups or social networks to which Petition 870200018704, of 02/07/2020, p. 111/154 39/57 users of the social networking system 760 can belong, events or calendar records that a user may be interested in, computer-based applications that a user can use, transactions that allow users to buy or sell items through the service, interactions with advertisers that a user may perform, or other suitable items or objects. A user can interact with anything that can be represented on the social network system 760 or by an external system of the third party system 770, which is separate from the social network system 760 and coupled to the social network system 760 through a network . [089] In particular modalities, the social network system 760 may be able to connect a variety of entities. As an example and not by way of limitation, the 760 social networking system may allow users to interact with each other in addition to receiving content from 770 third party systems or other entities, or to allow users to interact with those entities through an application programming interface (API) or other communication channel. [090] In particular embodiments, a third party system 770 may include one or more types of servers, one or more data stores, one or more interfaces, including, but not limited to APIs, one or more network services, one or more content sources, one or more networks, or any other suitable component, for example, with which servers can communicate. A third party system 770 may be operated by an entity other than an entity operating the social network system 760. In particular embodiments, however, the social network system 760 and third party systems 770 may operate together with each other. the other to provide social networking services to users of the social networking system 760 or third party systems 770. In that sense, the social networking system 760 can provide a platform, or structure, Petition 870200018704, of 02/07/2020, p. 112/154 40/57 that other systems, such as third party 770 systems, can use to provide social networking services and functionality to users over the Internet. [091] In particular embodiments, a third party system 770 may include a third party content object provider. A third party content object provider may include one or more sources of content objects, which can be communicated to a 730 client system. As an example and not by way of limitation, content objects may include information regarding things or activities of interest to the user, such as, for example, movie showtimes, movie synopses, gastronomic reviews, restaurant menus, product information and review, or other appropriate information. As another example, and not by way of limitation, content objects may include incentive content objects, such as coupons, discount tickets, gift cards, or other suitable incentive objects. [092] In particular modalities, the social networking system 760 also includes user-generated content objects, which can improve a user's interactions with the social networking system 760. User-generated content can include anything that a user can add, upload, send or post on the social networking system 760. As an example and not by way of limitation, a user communicates posts on the social networking system 760 of a 730 client system. Posts can include data such as updates status or other text data, location information, photos, videos, links, music or other similar data or media. The content can also be added to the social networking system 760 by a third party via a communication channel, such as a newsfeed or stream. [093] In particular modalities, the social network system 760 can include a variety of servers, subsystems, programs, modules, files, and data stores. In particular modalities, the social network system Petition 870200018704, of 02/07/2020, p. 113/154 41/57 760 can include one or more of the following: a network server, action filer, API request server, relevance and classification engine, content object classifier, notification controller, action file, content object display file third party, inference module, authorization / privacy server, search module, ad focus module, user interface module, user profile store, connection store, third party content store, or content store location. The social networking system 760 may also include suitable components such as network interfaces, security mechanisms, load balancers, fault servers, management and network operations consoles, other suitable components, or any suitable combination thereof. In particular embodiments, the social networking system 760 may include one or more user profile stores for storing user profiles. A user profile may include, for example, biographical information, demographic information, behavioral information, social information, or other types of descriptive information, such as a professional experience, educational background, leisure or preferences, interests, affinities or location. Interest information can include interests related to one or more categories. Categories can be general or specific. As an example and not by way of limitation, if a user likes an article about a shoe brand, the category can be the brand, or the general category of shoes or clothing. A connection store can be used to store connection information about users. The connection information can indicate users who have similar or common professional experience, group membership, hobbies, educational background, or are in some way related or share common attributes. Connection information can also include user-defined connections between different users and content (internal and external). A network server can be used to connect the Petition 870200018704, of 02/07/2020, p. 114/154 42/57 social networking system 760 to one or more client systems 730 or one or more third party systems 770 over network 710. The network server may include a mail server or other messaging functionality for receiving and direct messages between the social networking system 760 and one or more 730 client systems. An API request server can allow a third party system 770 to access information from the social networking system 760 by calling one or more APIs. An action filer can be used to receive communications from a network server about a user's actions on or outside the social networking system 760. In conjunction with the action file, a third party content object file can be kept from exposures of the user to third-party content objects. A notification controller can provide information regarding content objects to a 730 client system. Information can be pushed to a 730 client system as notifications, or information can be acquired from the 730 client system in response to a request. received from the 730 client system. Authorization servers can be used to secure one or more privacy settings for users of the 760 social networking system. A user's privacy setting determines how the particular information associated with a user can be shared. The authorization server can allow users to choose whether or not to have their actions filed by the social networking system 760 or shared with other systems (for example, the third party system 770), such as, for example, by configuring settings adequate privacy. Third party content object stores can be used to store content objects received from third parties, such as a third party 770 system. Location stores can be used to store location information received from client systems 730 associated with users. Ad price quote modules can combine the Petition 870200018704, of 02/07/2020, p. 115/154 43/57 social information, current time, location information, or other information suitable to provide relevant advertisements in the form of notifications to a user. [094] Figure 8 illustrates the illustrative social graph 800. In particular embodiments, the social network system 760 can store one or more social graphs 800 in one or more data stores. In particular embodiments, the social graph 800 can include multiple nodes - which can include multiple user nodes 802 or multiple concept nodes 804 - and multiple tabs 806 connecting the nodes. The illustrative social graph 800 illustrated in figure 8 is illustrated, for didactic purposes, in a two-dimensional visual map representation. In particular embodiments, a social networking system 760, client system 730 or third party system 770 can access social graph 800 and related social graph information for suitable applications. The nodes and tabs of the social graph 800 can be stored as data objects, for example, in a data store (such as a social graph database). Such a data store may include one or more searchable indexes of nodes or social graph tabs 800. [095] In particular modalities, a user node 802 can correspond to a user of the social network system 760. As an example and not by way of limitation, a user can be an individual (human user), an entity (for example , a third party employer, commerce or application), or a group (for example, of individuals or entities) that interact or communicate with or through the 760 social network system. In particular ways, when a user logs into an account with the social networking system 760, the social networking system 760 can create an 802 user node corresponding to the user, and store the 802 user node in one or more data stores. The users and 802 user nodes described here may, where appropriate, refer to registered users Petition 870200018704, of 02/07/2020, p. 116/154 44/57 and 802 user nodes associated with registered users. Additionally or alternatively, the 802 user and user nodes described here may, where appropriate, refer to users who have not registered with the 760 social networking system. In particular modalities, an 802 user node can be associated with the information provided by a user or information collected by various systems, including the social networking system 760. As an example and not by way of limitation, a user may provide his name, profile picture, contact information, date of birth, sex, status family status, employment, educational background, preferences, interests or other demographic information. In particular embodiments, a user node 802 may be associated with one or more data objects corresponding to the information associated with a user. In particular embodiments, an 802 user node can correspond to one or more pages on the network. [096] In particular modalities, a concept node 804 can correspond to a concept. In an example and not by way of limitation, a concept may correspond to a location (such as, for example, a cinema, restaurant, landmark or city); a network site (such as, for example, a network site associated with the social networking system 760 or a third party network site associated with a network application server); an entity (such as, for example, a person, business, group, sports team, or celebrity); a resource (such as, for example, an audio file, a video file, a digital photo, a text file, a structured document, or an application) that can be located within the 760 social networking system or on a server external, such as a network application server; real or intellectual property (such as, for example, a sculpture, painting, film, game, music, idea, photography, or written work); a game; an activity; an idea or theory; another suitable concept; or two or more of these concepts. An 804 concept node can be associated with the Petition 870200018704, of 02/07/2020, p. 117/154 45/57 information of a concept provided by a user or information collected by various systems, including the social networking system 760. As an example and not by way of limitation, the information of a concept may include a name or a title; one or more images (for example, an image of a book cover); a location (for example, an address or geographic location); a web site (which can be associated with a URL); contact information (for example, a phone number or an email address); other appropriate concept information; or any appropriate combination of such information. In particular embodiments, a concept node 804 can be associated with one or more data objects corresponding to the information associated with the concept node 804. In particular embodiments, a concept node 804 can correspond to one or more web pages. [097] In particular modalities, a node in the social graph 800 can represent or can be represented by a network page (which can be referred to as a profile page). Profile pages can be hosted by or accessible to the 760 social networking system. Profile pages can also be hosted on third party network sites associated with a third party 770 server. As an example and not by way of limitation , a profile page corresponding to a particular external network page can be the private external network page and the profile page can correspond to a particular concept node 804. Profile pages can be viewable by all or a selected subset of other users. As an example and not by way of limitation, an 802 user node may have a corresponding user profile page on which the corresponding user can add content, make statements, or otherwise express themselves. As another example and not by way of limitation, a concept node 804 may have a corresponding concept profile page on which one or more users can add content, perform Petition 870200018704, of 02/07/2020, p. 118/154 46/57 statements, or expressing oneself, particularly in relation to the concept corresponding to the concept node 804. [098] In particular modalities, a concept node 804 can represent a third party network page or resource hosted by a third party system 770. The third party network page or resource can include, among other elements, content, a selectable icon or other icon, or another interacted object (which can be implemented, for example, in JavaScript, AJAX, or PHP code) representing an action or activity. As an example and not by way of limitation, a third party network page may include a selectable icon such as like, register, eat, recommend or other appropriate action or activity. A user viewing the third party network page can perform an action by selecting one of the icons (for example, eating), causing a 730 client system to send a message to the social network system 760 indicating the action of a user. In response to the message, the social networking system 760 may create a tab (for example, an eating tab) between a user node 802 corresponding to the user and a concept node 804 corresponding to the third party network page or resource and store tab 806 on one or more data stores. [099] In particular modes, a pair of nodes on the social graph 800 can be connected to one or the other by one or more tabs 806. A tab 806 connecting a pair of nodes can represent a relationship between the pair of nodes. In particular embodiments, a tab 806 can include or represent one or more data objects or attributes corresponding to the relationship between a pair of nodes. As an example and not by way of limitation, a first user may indicate that a second user is a friend of the first user. In response to this indication, the social network system 760 can send a friend request to the second user. If the second user confirms the request and friendship, the Petition 870200018704, of 02/07/2020, p. 119/154 47/57 social network 760 can create a tab 806 by connecting the user node of the first user 802 to the user node of the second user 802 in the social graph 800 and store the tab 806 as social graph information in one or more of the data stores 764. In the example in Figure 8, the social graph 800 includes a tab 806 indicating a friendship relationship between user nodes 802 of user A and user B and a tab indicating a friendship relationship between user nodes 802 of user C and user B. Although this description describes or illustrates private tabs 806 with particular attributes connecting private user nodes 802, this description contemplates any suitable tabs 806 with any suitable attributes connecting user nodes 802. As an example and not by means of limitation, a tab 806 can represent a relationship, a family relationship, a business or employment relationship, a fan relationship, a relationship of follower, a visitor relationship, a subscriber relationship, a superior / subordinate relationship, a reciprocal relationship, a non-reciprocal relationship, any other suitable type of relationship, or two or more of these relationships. Furthermore, although this description generally describes nodes as being connected, this description also describes users or concepts as being connected. Here, references to users or concepts being connected can, where appropriate, refer to the nodes corresponding to the users or concepts being connected in social graph 800 by one or more tabs 806. [0100] In particular modalities, a tab 806 between a user node 802 and a concept node 804 can represent a particular action or activity performed by a user associated with the user node 802 towards a concept associated with a node concept 804. As an example and not by way of limitation, as illustrated in figure 8, a user can enjoy, attend, reproduce, listen, cook, work on or watch a concept, each of which may correspond to a type of tab or subtype. A profile page for Petition 870200018704, of 02/07/2020, p. 120/154 48/57 concept corresponding to a concept node 804 can include, for example, a selectable register icon (such as, for example, a clickable register icon) or a selectable add to favorites icon. Similarly, after a user clicks on these icons, the social networking system 760 can create a favorite tab or a register tab in response to a user action corresponding to a respective action. As another example and not by way of limitation, a user (user C) can listen to a particular song (for example, Ramble On) using a particular application (SPOTIFY, which is an online music application). In that case, the social networking system 760 can create a heard 806 tab and a used tab (as shown in figure 8) between 802 user nodes corresponding to user and concept nodes 804 corresponding to the music and application to indicate that the user listened to the music and used the app. In addition, the social network system 760 can create a tab reproduced 806 (as shown in figure 8) between the concept nodes 804 corresponding to the song and the application to indicate that the particular song was played by the particular application. In this case, the tab reproduced 806 corresponds to an action performed by an external application (SPOTIFY) on an external audio file (the Imagine song). Although this description describes particular tabs 806 with particular attributes connecting user nodes 802 and concept nodes 804, this description contemplates any suitable edges 806 with any suitable attributes connecting user nodes 802 and concept nodes 804. Furthermore, despite While this description describes the tabs between a user node 802 and a concept node 804 representing a singular relationship, that description contemplates the tabs between a user node 802 and a concept node 804 representing one or more relations. As an example and not by way of limitation, a tab 806 can represent so much that a user likes and used a particular concept. Alternatively, another 806 edge can represent each type of relationship (or Petition 870200018704, of 02/07/2020, p. 121/154 49/57 multiple of a singular relationship) between a user node 802 and a concept node 804 (as illustrated in figure 8 between user node 802 for user E and concept node 804 for SPOTIFY). [0101] In particular modalities, the social network system 760 can create a tab 806 between a user node 802 and a concept node 804 in the social graph 800. As an example and not by way of limitation, a user viewing a page concept profile (such as, for example, using a web browser or a special purpose application hosted by the 730 user client system) may indicate that he likes the concept represented by the concept node 804 by clicking or selecting a like icon, which can cause the user client system 730 to send to the social network system 760 a message indicating the concept user's liking associated with the concept profile page. In response to the message, the social networking system 760 can create a tab 806 between the user node 802 associated with the user node and concept 804, as illustrated by the like tab 806 between the user node and concept 804. In particular modalities , the social networking system 760 can store a tab 806 in one or more data stores. In particular embodiments, a tab 806 can be formed automatically by the social network system 760 in response to a particular user action. As an example and not by way of limitation, if a first user uploads an image, watches a movie, or listens to music, a tab 806 can be formed between user node 802 corresponding to the first user and concept nodes 804 corresponding to these concepts. Although this description describes the formation of particular tabs 806 in particular ways, that description contemplates the formation of any suitable tabs 806 in any suitable form. [0102] Figure 9 illustrates an illustrative computer system 900. In particular embodiments, one or more computer systems 900 perform one or more Petition 870200018704, of 02/07/2020, p. 122/154 50/57 more steps of one or more methods described or illustrated here. In particular embodiments, one or more computer systems 900 provide the functionality described or illustrated here. In particular embodiments, the software running on one or more computer systems 900 performs one or more steps of one or more of the methods described or illustrated here or provides the functionality described or illustrated here. The particular embodiments include one or more parts of one or more computer systems 900. Here, reference to a computer system may include a computing device, and vice versa, where appropriate. In addition, with reference to a computer system it may include one or more computer systems, where appropriate. [0103] This description includes any suitable number of 900 computer systems. This description includes the 900 computer system assuming any suitable physical form. As an example and not by way of limitation, computer system 900 may be an embedded computer system, a chip system (SOC), a single panel computer system (SBC) (such as, for example, a computer in module (COM) or system in module (SOM)), a desktop computer system, a laptop or notebook computer system, an interactive kiosk, a main structure, an interlocking of computer systems, a mobile phone, a personal digital assistant (PDA), a server, a tablet computer system, or a combination of two or more of them. Where appropriate, one or more computer systems 900 may perform without substantial spatial or temporal limitation one or more stages of one or more of the methods described or illustrated herein. As an example and not by way of limitation, one or more computer systems 900 may perform in real time or in batch mode one or more steps of one or more of the methods described or illustrated here. One or more 900 computer systems can perform one or more steps at different times or in different locations Petition 870200018704, of 02/07/2020, p. 123/154 51/57 of one or more methods described or illustrated here, where appropriate. [0104] In particular embodiments, the computer system 900 includes a processor 902, a memory 904, a storage 906, an input / output (I / O) interface 908, a communication interface 910, and a 912 bus. of that description describing and shining a particular computer system having a particular number of particular components in a particular arrangement, that description contemplates any suitable computer system having any suitable number of any suitable components in any suitable arrangement. [0105] In particular modes, the 902 processor includes hardware for executing instructions, such as those that create a computer program. As an example and not by way of limitation, to execute instructions, processor 902 can retrieve (or collect) instructions from an internal register, an internal temporary memory, a 904 memory or a 906 storage; decode and execute them; and then writing one or more results to an internal register, an internal buffer, a 904 memory, or a 906 store. In particular embodiments, processor 902 may include one or more internal buffers for data, instructions or addresses. This description contemplates processor 902 including any suitable number of any suitable internal buffers, where appropriate. As an example and not by way of limitation, processor 902 may include one or more instruction buffer memories, one or more data buffer memories, and one or more lookaside translation stores (TLBs). The instructions in the instruction buffer can be copies of instructions in memory 904 or store 906, and the instruction buffers can speed up the recovery of these instructions by the 902 processor. The data in the data buffer can be copies of data in memory 904 or store Petition 870200018704, of 02/07/2020, p. 124/154 52/57 906 for instructions executed on processor 902 on which to operate; the results of previous instructions executed on processor 902 for access by subsequent instructions executed on processor 902 or for writing to memory 904 or store 906, or other suitable data. Data buffers can speed up read or write operations by the 902 processor. TLBs can speed up the virtual address translation for the 902 processor. In particular embodiments, the 902 processor can include one or more internal records for data, instructions or addresses . This description contemplates processor 902 including any suitable number of any suitable internal records, where appropriate. Where appropriate, processor 902 may include one or more arithmetic logic units (ALUs); it can be a multi-core processor, or include one or more 902 processors. Although this description describes and illustrates a particular processor, that description contemplates any suitable processor. [0106] In particular embodiments, memory 904 includes main memory for storing instructions for processor 902 to execute or data on which processor 902 operates. As an example and not by way of limitation, computer system 900 can load instructions from storage 906 or another source (such as, for example, another computer system 900) to memory 904. Processor 902 can then load instructions from memory 904 for an internal register or internal temporary memory. To execute the instructions, the 902 processor can retrieve the instructions from the internal register or internal temporary memory and decode them. During or after executing instructions, processor 902 can write one or more results (which can be intermediate or final results) in the internal register or internal temporary memory. Processor 902 can then write one or more of these results to memory 904. In particular embodiments, processor 902 Petition 870200018704, of 02/07/2020, p. 125/154 53/57 executes only instructions in one or more internal registers or internal buffers or in memory 904 (as opposed to store 906 or elsewhere) and operates only on data in one or more internal registers or internal buffers or in memory 904 (as opposed to store 906 or elsewhere). One or more memory buses (which can each include an address bus and a data bus) can couple processor 902 to memory 904. Bus 912 can include one or more memory buses, as described below. In particular modes, one or more memory management units (MMUs) reside between the 902 processor and the 904 memory and facilitates access to the 904 memory requested by the 902 processor. In particular modes, the 904 memory includes random access memory (RAM) ). Such RAM may be volatile memory, where appropriate, such as dynamic RAM (DRAM) or static RAM (SRAM). In addition, where appropriate, this RAM can be a single port or multiple port RAM. This description includes any suitable RAM. Memory 904 may include one or more memories 904, where appropriate. Although this description describes and illustrates the memory in particular, it describes any suitable memory. [0107] In particular embodiments, the 906 storage includes mass storage for data or instructions. As an example and not by way of limitation, the 906 storage may include a hard disk drive (HDD), a floppy drive, flash memory, an optical disk, a magnetootic disk, magnetic tape, or a Universal Serial Bus driver (USB) or a combination of two or more of them. The 906 storage can include removable or non-removable (or fixed) media, where appropriate. The 906 storage can be internal or external to the 900 computer system, where appropriate. In particular embodiments, storage 906 is a non-volatile solid state memory. In particular embodiments, storage 906 includes read-only memory Petition 870200018704, of 02/07/2020, p. 126/154 54/57 (ROM). Where appropriate, this ROM can be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically erasable PROM (EEPROM), electrically alterable ROM (EAROM), or flash memory or a combination of two or more of the same . This description contemplates mass storage 906 assuming any suitable physical form. The store 906 may include one or more storage control units facilitating communication between processor 902 and store 906, where appropriate. Where appropriate, store 906 may include one or more store 906. While this description describes and illustrates the particular store, that description contemplates any suitable store. [0108] In particular modalities, the I / O interface 908 includes hardware, software or both, providing one or more interfaces for communication between the 900 computer system and one or more I / O devices. Computer system 900 may include one or more of these I / O devices, where appropriate. One or more of these I / O devices can allow communication between a person and the 900 computer system. As an example and not by way of limitation, an I / O device can include a keyboard, a microphone, a monitor, a mouse , a printer, a digitizer, a speaker, a static camera, a pen, a tablet, a touch screen, a trackball, a video camera, another suitable I / O device or a combination of two or more of them. An I / O device can include one or more sensors. This description includes any suitable I / O device and any suitable I / O interface 908 for it. Where appropriate, the 908 I / O interface may include one or more device or software triggers allowing the 902 processor to drive one or more of these I / O devices. The I / O 908 interface may include one or more I / O 908 interfaces, where appropriate. Although this description describes and illustrates a particular I / O interface, it describes any suitable I / O interface. Petition 870200018704, of 02/07/2020, p. 127/154 55/57 [0109] In particular embodiments, the communication interface 910 includes hardware, software or both providing one or more interfaces for communication (such as, for example, packet-based communication) between the computer system 900 and one or most other 900 computer systems or one or more networks. As an example and not by way of limitation, the 910 communication interface may include a network interface controller (NIC) or network adapter for communication with an Ethernet or other wired-based network or a wireless NIC (WNIC) or wireless adapter for communication with a wireless network, such as the Wi-Fi network. This description includes any suitable network and any communication interface suitable for that purpose. As an example and not by way of limitation, the computer system 900 can communicate with an ad hoc network, a personal area network (PAN), a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), or one or more parts of the Internet, or a combination of two or more of them. One or more parts of one or more of these networks can be wired or wireless. As an example, a computer system 900 can communicate with a wireless PAN (WPAN) (such as, for example, a WPAN BLUETOOTH), a Wi-Fi network, a WiMAX network, a cellular network (such as, for example, a Global System for Mobile Communications (GSM) network, or another suitable wireless network, or a combination of two or more of them. Computer system 900 may include any suitable communication interface 901 for any such network, where appropriate. The communication interface 910 may include one or more communication interfaces 910, where appropriate. Although this description describes and illustrates a particular communication interface, it describes any suitable communication interface. [0110] In particular modes, the 912 bus includes hardware, software, or both coupling components of the 900 computer system Petition 870200018704, of 02/07/2020, p. 128/154 56/57 each other. As an example and not by way of limitation, the 912 bus may include an Accelerated Graphics Port (AGP) bus or other graphics bus, an Industry Enhanced Standard Architecture (EISA) bus, a front side bus (FSB), an HYPERTRANSPORT (HT) interconnect, an Industry Standard Architecture (ISA) bus, an INFINIBAND interconnect, a low pin count bus (LPC), a memory bus, a Micro Channel Architecture (MCA) bus , a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCIe) bus, an advanced serial technology (SATA) fixing bus, an Electronic Video Standards Association (VLB) local bus, or other bus or a combination of two or more of them. The bus 912 may include one or more buses 912, where appropriate. Although this description describes and illustrates a particular bus, it describes any suitable bus or interconnection. [0111] Here, a non-transient, computer-readable storage medium or media can include one or more semiconductor based circuits or other integrated circuits (ICs) (such as, for example, field programmable port sets (FPGAs) or Application-specific ICs (ASICs), hard disk drives (HDDs), hybrid drives (HHDs), optical drives, optical disk drives (ODDs), magneto-optical drives, magneto-optical drivers, floppy disks, floppy drives ( FDDs), magnetic tapes, solid state drives (SSDs), RAM drives, SECURE DIGITAL cards or drivers, any other suitable, computer-readable, non-transitory storage medium, or any suitable combination of two or more of them, where appropriate. A computer readable non-transitory storage medium can be volatile, non-volatile or a combination of volatile and non-volatile where appropriate. [0112] Here or is inclusive and not exclusive, unless expressly Petition 870200018704, of 02/07/2020, p. 129/154 57/57 indicated otherwise or indicated otherwise by context. Therefore, here, A or B means A, B, or both, unless expressly stated otherwise or indicated otherwise by context. Furthermore, and it is both together and several times, unless expressly stated otherwise or otherwise indicated by context. Therefore, here A and B means A and B, together or several times, unless expressly stated otherwise or stated otherwise by context. [0113] The scope of this description includes all changes, substitutions, variations, alterations and modifications to the illustrative modalities described or illustrated here that a person skilled in the art would understand. The scope of this description is not limited to the illustrative modalities described or illustrated here. In addition, although this description describes and illustrates the respective modalities as including particular components, elements, functions, operations or steps, any of these modalities may include any combination or exchange of any of the described or illustrated components, elements, functions, operations or steps anywhere here that a person skilled in the art would understand. Additionally, reference in the claims attached to an apparatus or system or a component of an apparatus or system being adapted for, arranged for, capable of, configured for, enabled for, operational for, or operant to perform a particular function encompasses that apparatus , system, component, whether or not that particular function is activated, switched on, or unlocked, provided that the device, system or component is adapted, arranged, capable, configured, activated, operational or operative.
权利要求:
Claims (24) [1] 1. First computing device, the computing device being CHARACTERIZED by understanding: a processor; one or more radios; and a memory coupled to the processor comprising executable instructions for the processor, the processor being operated when executing instructions for: perceiving, at least one of the radios, a second portable network computing device, within a limit proximity, where the second computing device comprises a processor, one or more radios and a memory coupled to the processor; establish a direct connection with the second device; retrieving the initial information from the second device, the initial information comprising a social network system user identifier; after authentication of the second computing device based on the initial information, grant credentials to the second computing device, where the credentials granted by the first computing device allow the second computing device to communicate with one or more third computing devices and where one or more of the third computing devices comprises a processor, one or more radios, and memory attached to the processor. [2] 2. First device, according to claim 1, CHARACTERIZED in that the instructions for granting credentials for the second device comprise instructions for: determine that a first user node is connected on a social graph to a second user node, where the first user node represents a first Petition 870200018704, of 02/07/2020, p. 148/154 2/7 user associated with the first portable computing device, where the second user node is identified by the social network system user identifier, and where the granting of credentials to the second computing device is based on the determination that the the first user node is connected on the social graph to the second user node. [3] 3. First device, according to claim 2, CHARACTERIZED by the fact that the instructions for granting credentials to the second device include instructions for: determine that the first user node is connected to the second user node within a limit degree of separation. [4] 4. First device, according to claim 1, CHARACTERIZED in that the instructions for granting credentials to the second device comprise instructions for: determine that a user identified by the social network system's user identifier belongs to a user-designated group of trusted friends. [5] 5. First device, according to claim 1, CHARACTERIZED in that the instructions for granting credentials to the second device comprise instructions for: determine that a user identified by the social network system's user identifier does not appear on a blacklist designated by the user. [6] 6. First device, according to claim 1, CHARACTERIZED in that the instructions for granting credentials to the second device comprise instructions for: confirm the detection of the presence of the first portable computing device; confirm successful receipt of permission from the first device Petition 870200018704, of 02/07/2020, p. 149/154 3/7 portable computing; confirm successful receipt of authentication credentials; or confirm that the credentials previously granted for the second device have neither expired nor been revoked. [7] 7. First device, according to claim 1, CHARACTERIZED by the fact that the credentials granted authorize a non-hierarchical connection between the second computing device and one or more of the third computing devices. [8] 8. First device, according to claim 7, CHARACTERIZED by the fact that the granted credentials authorize access based on a user profile associated with the social network system user identifier. [9] 9. Method, CHARACTERIZED by understanding: the perception, by a first computing device comprising a plurality of radios, of a second portable network computing device, within a limit proximity, where the second computing device comprises a processor, one or more radios, and a memory coupled to the processor; the establishment, by the first computing device, of a direct connection with the second device; the retrieval, by the first computing device, of the initial information from the second device, the initial information comprising a user identifier of the social network system; after authentication of the second computing device by the first computing device, based on the initial information, grant, by the first computing device, credentials to the second computing device, where the credentials granted by the first computing device allow the second computing device communicates with one or more of the Petition 870200018704, of 02/07/2020, p. 150/154 4/7 third-party computing devices, and where one or more of the third-party computing devices comprise a processor, one or more radios and memory attached to the processor. [10] 10. Method, according to claim 9, CHARACTERIZED by the fact that the authentication of the second device comprises: determining that a first user node is connected on a social graph to a second user node, where the first user node represents a first user associated with the first computing device, and where the second user node is identified by user identifier of the social network system, and where the granting of credentials for the second computing device is based on the determination that the first user node is connected on the social graph to the second user node. [11] 11. Method, according to claim 10, CHARACTERIZED by the fact that the granting of credentials for the second device comprises: determining that the first user node is connected to the second user node within a limit degree of separation. [12] 12. Method, according to claim 9, CHARACTERIZED by the fact that the granting of credentials for the second computing device comprises: determining that a user identified by the social network system's user identifier belongs to a user-designated group of trusted friends. [13] 13. Method, according to claim 9, CHARACTERIZED by the fact that the granting of credentials to the second device comprises: the determination that a user identified by the social network system's user identifier does not appear on a user-designated blacklist. [14] 14. Method, according to claim 9, CHARACTERIZED by the fact Petition 870200018704, of 02/07/2020, p. 151/154 5/7 the granting of credentials to the second device comprises: confirmation of detection of the presence of the first portable computing device; confirmation of successful receipt of permission from the first portable computing device; confirmation of successful receipt of authentication credentials; or confirmation that the credentials previously granted for the second device have neither expired nor been revoked. [15] 15. Method, according to claim 9, CHARACTERIZED by the fact that the credentials granted authorize the non-hierarchical connection between the second computing device and one or more of the third computing devices. [16] 16. Method, according to claim 15, CHARACTERIZED by the fact that the granted credentials authorize access based on a user profile associated with the user identifier of the social network system. [17] 17. One or more non-transient computer-readable storage media CHARACTERIZED by the fact that they comprise software that operates when executed for: perceiving, by means of a plurality of radios, a second portable network computing device, within the limit proximity of a first computing device, where the second computing device comprises a processor, one or more radios, and a memory coupled to the processor; establish a direct connection between the first computing device and the second computing device; retrieving the initial information from the second device, the initial information comprising a user identifier of the social network system; Petition 870200018704, of 02/07/2020, p. 152/154 6/7 after authentication of the second computing device based on the initial information, grant credentials to the second device, where the credentials granted by the first computing device allow the second computing device to communicate with one or more of the third computing devices computing, and where one or more of the third computing devices comprise a processor, one or more radios, and memory attached to the processor. [18] 18. Media, according to claim 17, CHARACTERIZED by the fact that the software that operates when run to grant credentials for the second device is additionally operational for: determine that a first user node is connected on a social graph to a second user node, where the first user node represents a first user associated with the first computing device, and where the second user node is identified by the user identifier user of the social networking system, and where the granting of credentials for the second computing device is based on the determination that the first user node is connected on the social graph to the second user node. [19] 19. Media, according to claim 18, CHARACTERIZED by the fact that the software that operates when run to grant credentials for the second device is additionally operational for: determining that the first user node is connected to the second user node within a limit degree of separation. [20] 20. Media, according to claim 17, CHARACTERIZED by the fact that the software that operates when run to grant credentials for the second device is additionally operational for: Petition 870200018704, of 02/07/2020, p. 153/154 7/7 determines that a user identified by the user identifier of the social networking system belongs to a group designated by the user of trusted friends. [21] 21. Media, according to claim 17, CHARACTERIZED by the fact that the software it operates when run to grant credentials to the second computing device is further configured to: determine that a user identified by the social network system's user identifier does not appear on a blacklist designated by the user. [22] 22. Media, according to claim 17, CHARACTERIZED by the fact that the software it operates when run to grant credentials for the second computing device is additionally operational for: confirm the detection of a presence of the first computing device; confirm successful receipt of permission from the first computing device; confirm successful receipt of authentication credentials; or confirm that the credentials previously granted for the second computing device have neither expired nor been revoked. [23] 23. Media, according to claim 17, CHARACTERIZED by the fact that the credentials granted authorize a non-hierarchical connection between the second computing device and one or more of the third computing devices. [24] 24. Media, according to claim 23, CHARACTERIZED by the fact that the credentials granted authorize access based on a user profile associated with the user identifier of the social network system.
类似技术:
公开号 | 公开日 | 专利标题 AU2018201741B2|2018-11-01|Portable platform for networked computing
同族专利:
公开号 | 公开日 CA2904619A1|2014-09-25| US9674751B2|2017-06-06| EP2974145B1|2020-07-29| AU2018201741A1|2018-04-05| IL241266D0|2015-11-30| EP2974132A4|2016-10-19| BR112015023019A2|2017-07-18| BR112015022569A2|2017-07-18| MX2015012640A|2016-08-11| IL241266A|2018-10-31| AU2018201728A1|2018-04-05| CN105230111B|2017-12-12| KR101611341B1|2016-04-12| JP6523242B2|2019-05-29| MX361237B|2018-11-30| AU2014235396A1|2015-11-05| JP2016519866A|2016-07-07| US20140282967A1|2014-09-18| MX352475B|2017-11-27| CN105264827B|2019-04-16| EP2974145A1|2016-01-20| MX2015012568A|2016-08-08| US10097641B2|2018-10-09| AU2014235396B2|2016-05-26| CN110087203A|2019-08-02| US20140280985A1|2014-09-18| CA2904643A1|2014-09-25| KR20150131334A|2015-11-24| IL241258A|2016-03-31| AU2014235382A1|2015-11-05| AU2014235404A1|2015-11-05| US9998969B2|2018-06-12| WO2014151050A3|2014-11-06| WO2014151050A2|2014-09-25| KR101794159B1|2017-11-06| JP2016520888A|2016-07-14| IL241279D0|2015-11-30| CA2903847C|2016-04-12| JP5902364B1|2016-04-13| MX348258B|2017-06-05| IL241279A|2018-02-28| IL241258D0|2015-11-30| AU2018201741B2|2018-11-01| EP2974498A4|2016-10-26| EP2974145A4|2016-10-26| CN105230111A|2016-01-06| KR20150121259A|2015-10-28| KR20170124643A|2017-11-10| KR20150133777A|2015-11-30| AU2020202649A1|2020-05-14| CA2903847A1|2014-09-25| CN105264827A|2016-01-20| WO2014151028A1|2014-09-25| US20170208129A1|2017-07-20| JP2016520889A|2016-07-14| EP2974498B1|2020-05-06| CN105210354A|2015-12-30| JP6209670B2|2017-10-04| WO2014151042A1|2014-09-25| KR102033943B1|2019-10-21| US9137723B2|2015-09-15| CA2904619C|2018-02-13| EP2974132B1|2018-09-05| EP2974498A1|2016-01-20| US20140269614A1|2014-09-18| EP2974132A2|2016-01-20| CN105210354B|2019-04-16| CA2904643C|2019-02-26| MX2015012645A|2016-08-18|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 JPH09167098A|1995-07-28|1997-06-24|Hewlett Packard Co <Hp>|Communication system for portable device| US6434159B1|1996-10-15|2002-08-13|Motorola, Inc.|Transaction system and method therefor| SE516509C2|2000-05-18|2002-01-22|Ericsson Telefon Ab L M|A communication device with two radio units and an operating method thereof| FR2835997B1|2002-02-11|2004-11-26|Somfy|METHOD FOR DEFINING A GROUP AMONG BIDIRECTIONAL OBJECTS| US7907564B2|2002-11-12|2011-03-15|Cisco Technology, Inc.|Method and apparatus for supporting user mobility in a communication system| KR100586858B1|2003-05-03|2006-06-07|삼성전자주식회사|Ultra wide band communication systnem equipped with a plurality of antenna and method using the same| US20040253923A1|2003-06-12|2004-12-16|Braley Richard C.|System and method for electronically pairing devices| US7069308B2|2003-06-16|2006-06-27|Friendster, Inc.|System, method and apparatus for connecting users in an online computer system based on their relationships within social networks| US20050221876A1|2004-04-05|2005-10-06|Van Bosch James A|Methods for sending messages based on the location of mobile users in a communication network| US8302164B2|2004-07-22|2012-10-30|Facebook, Inc.|Authorization and authentication based on an individual's social network| CN101053235B|2004-11-01|2012-03-28|皇家飞利浦电子股份有限公司|Method, system and device for access to authorized domain| CA2807829C|2004-11-04|2017-10-10|Topeer Corporation|System and method for creating a secure trusted social network| US7664081B2|2004-12-22|2010-02-16|Nokia Corporation|Wireless gateway for enabling wireless devices to discover and interact with various short-range services/devices| KR100680177B1|2004-12-30|2007-02-08|삼성전자주식회사|User authentication method and system being in home network| US7698556B2|2005-02-25|2010-04-13|Hewlett-Packard Development Company, L.P.|Secure spontaneous associations between networkable devices| US20070156664A1|2005-07-06|2007-07-05|Gemini Mobile Technologies, Inc.|Automatic user matching in an online environment| US9614964B2|2005-08-19|2017-04-04|Nextstep, Inc.|Consumer electronic registration, control and support concierge device and method| JP2007267128A|2006-03-29|2007-10-11|Toshiba Corp|Electronic apparatus and communication control method| US7738569B2|2006-04-13|2010-06-15|Dell Products L.P.|Ultra-wideband secure wireless device pairing and associated systems| JP2007310512A|2006-05-16|2007-11-29|Mitsubishi Electric Corp|Communication system, service providing server, and user authentication server| US8402094B2|2006-08-11|2013-03-19|Facebook, Inc.|Providing a newsfeed based on user affinity for entities and monitored actions in a social network environment| JP4953736B2|2006-09-06|2012-06-13|パナソニック株式会社|Wireless communication system| US20080222294A1|2006-10-21|2008-09-11|Paragon Wireless, Inc.|Managing Communications Using a Mobile Device| US8230466B2|2006-11-16|2012-07-24|At&T Intellectual Property I, L.P.|Home automation system and method including remote media access| JP2008129860A|2006-11-21|2008-06-05|Matsushita Electric Ind Co Ltd|Information processing equipment, service provision server, and remote operation apparatus| GB2444304A|2006-11-30|2008-06-04|Michael Litherland|Wireless networking| KR100822706B1|2006-12-08|2008-04-17|한국전자통신연구원|Apparatus and method of controlling home appliance using zigbee wireless communication| US7925297B2|2007-03-13|2011-04-12|Intel Corporation|TXOP duration adaptation for dual radio devices| US8706631B2|2007-03-22|2014-04-22|Sound Starts, Inc.|Credit and transaction systems| US7747223B2|2007-03-29|2010-06-29|Research In Motion Limited|Method, system and mobile device for prioritizing a discovered device list| JP2009177765A|2007-12-26|2009-08-06|Panasonic Corp|Radio base station, radio communication terminal, radio communication system| US9559867B2|2008-05-30|2017-01-31|Google Technology Holdings LLC|Contact group dynamics in networked communication devices| US8010131B2|2008-09-16|2011-08-30|Rothschild Leigh M|System and method for enabling social interactive wireless communications| JP2010128713A|2008-11-26|2010-06-10|Ripplex Inc|Server for providing relationship between users using network service| US20100191728A1|2009-01-23|2010-07-29|James Francis Reilly|Method, System Computer Program, and Apparatus for Augmenting Media Based on Proximity Detection| US8910251B2|2009-03-06|2014-12-09|Facebook, Inc.|Using social information for authenticating a user session| US20100257239A1|2009-04-02|2010-10-07|Qualcomm Incorporated|Method and apparatus for establishing a social network through file transfers| US8903390B2|2009-05-13|2014-12-02|Qualcomm Incorporated|Provisioning single-mode and multimode system selection parameters and service management| US20110004692A1|2009-07-01|2011-01-06|Tom Occhino|Gathering Information about Connections in a Social Networking Service| KR101049664B1|2009-07-06|2011-07-14|주식회사 케이티|Client devices that support mobility and security between heterogeneous wireless networks using the Mobike protocol| WO2011006231A1|2009-07-17|2011-01-20|Boldstreet Inc.|Hotspot network access system and method| KR20110047764A|2009-10-30|2011-05-09|삼성전자주식회사|Method and apparatus for controlling of home network system using mobile terminal| US8776215B2|2009-11-06|2014-07-08|Microsoft Corporation|Credential device pairing| US9247411B2|2009-12-23|2016-01-26|Qualcomm Incorporated|Methods and apparatus for supporting multi-hop peer discovery in peer-to-peer wireless networks| CN101794501A|2010-01-21|2010-08-04|中兴通讯股份有限公司|Method for performing remote control on home appliances and wireless network card| FR2956224B1|2010-02-09|2012-11-02|Somfy Sas|METHOD FOR OPERATING A DEVICE FOR CONTROLLING DOMOTIC EQUIPMENT| US9526058B2|2010-02-10|2016-12-20|Lantronix, Inc.|Smart roam system and method| US10159020B2|2010-04-06|2018-12-18|Koninklijke Philips N.V.|Method for fast link layer handoff in heterogeneous networks| US20110258042A1|2010-04-16|2011-10-20|Google Inc.|Endorsements Used in Ranking Ads| US8224246B2|2010-05-10|2012-07-17|Nokia Corporation|Device to device connection setup using near-field communication| CN102906757B|2010-05-26|2015-12-16|惠普发展公司,有限责任合伙企业|Figure authorizes| EP3490322A1|2010-06-04|2019-05-29|Board of Regents, The University of Texas System|Wireless communication methods, systems, and computer program products| JPWO2011158512A1|2010-06-18|2013-08-19|パナソニック株式会社|Communication terminal device and communication method| US8150844B2|2010-08-18|2012-04-03|Facebook, Inc.|Location ranking using social graph information| US9370034B2|2010-09-21|2016-06-14|Cisco Technology, Inc.|Method and apparatus for a Bluetooth-enabled Ethernet interface| US20120110640A1|2010-11-02|2012-05-03|Donelson Loren J|Method, apparatus and system for wireless network authentication through social networking| FR2967004B1|2010-11-03|2012-12-14|Inst Nat Sciences Appliq|NEIGHBORHOOD DISCOVERY SYSTEM AND METHOD FOR COMMUNICATING OBJECTS| US10304066B2|2010-12-22|2019-05-28|Facebook, Inc.|Providing relevant notifications for a user based on location and social information| US20120166532A1|2010-12-23|2012-06-28|Yun-Fang Juan|Contextually Relevant Affinity Prediction in a Social Networking System| US9049745B2|2011-01-14|2015-06-02|Apple Inc.|Wireless electronic devices with dual circuit architecture| BR112013021000A2|2011-02-16|2016-10-11|Kortek Ind Pty Ltd|automation control, wireless power and light| US9264897B2|2011-03-30|2016-02-16|Qualcomm Incorporated|Pairing and authentication process between a host device and a limited input wireless device| WO2012150907A1|2011-05-03|2012-11-08|Roam Over Ip Pte Ltd|An apparatus and method for enabling at least one wireless communication device to access a data network| BR112013030366A2|2011-05-27|2016-11-29|Nokia Corp|computer program method, apparatus and product| US8644892B2|2011-05-31|2014-02-04|Facebook, Inc.|Dual mode wireless communications device| WO2012166907A2|2011-05-31|2012-12-06|Plum Labs, Llc|Mobile communications devices and methods having reduced communication latency| KR20120139957A|2011-06-20|2012-12-28|삼성전자주식회사|Multiband multimode wireless communication apparatus and computer having the same| US20130185131A1|2011-07-18|2013-07-18|Pradeep Sinha|System and method for integrating social and loyalty platforms| US8782761B1|2011-08-08|2014-07-15|Google Inc.|Generating authentication challenges based on preferences of a user's contacts| US20130052946A1|2011-08-23|2013-02-28|Manjirnath Chatterjee|Home automation using a mobile device| US8897152B1|2011-08-30|2014-11-25|Amazon Technologies, Inc.|System and method for minimizing network transition latencies while minimizing power consumption| US9197600B2|2011-09-29|2015-11-24|Israel L'Heureux|Smart router| US9936351B2|2011-10-26|2018-04-03|Sling Media Pvt Ltd|Apparatus systems and methods for proximity-based service discovery and session sharing| US9083670B1|2011-12-05|2015-07-14|Google Inc.|Notifications about users in a social network| CN102568178B|2011-12-27|2015-05-20|中山市云创知识产权服务有限公司|Remote control system and remote control method| US9204345B1|2012-02-22|2015-12-01|Google Inc.|Socially-aware cloud control of network devices| JP5584251B2|2012-04-17|2014-09-03|京セラ株式会社|Wireless communication apparatus and method| US9847993B2|2012-05-14|2017-12-19|Nec Corporation|Method and system for accessing service/data of a first network from a second network for service/data access via the second network| US20140013000A1|2012-07-03|2014-01-09|Sap Portals Israel Ltd.|Social graph based permissions, publishing, and subscription| JP2014032501A|2012-08-02|2014-02-20|Sony Corp|Information processing unit and information processing method| US8498572B1|2012-08-24|2013-07-30|Google Inc.|Home automation device pairing by NFC-enabled portable device| CN102905262B|2012-09-25|2015-05-06|百度在线网络技术(北京)有限公司|Identity authentication method, system and server based on mobile terminal| US9654591B2|2012-10-01|2017-05-16|Facebook, Inc.|Mobile device-related measures of affinity| US9009249B2|2012-11-29|2015-04-14|Linkedin Corporation|Systems and methods for delivering content to a mobile device based on geo-location| US9148787B2|2012-12-06|2015-09-29|Google Technology Holdings LLC|Apparatus and method for accessing WiFi networks| EP2936881B1|2012-12-21|2019-12-04|Orange|Connecting to a wireless network using social network identifier| US9191874B2|2012-12-31|2015-11-17|Ipass Inc.|Advanced network characterization and migration| US9544808B2|2013-01-08|2017-01-10|Broadcom Corporation|Systems and methods for network discovery and selection using contextual information| US9847961B2|2013-02-25|2017-12-19|Qualcomm Incorporated|Automatic IoT device social network expansion| US9137723B2|2013-03-15|2015-09-15|Facebook, Inc.|Portable platform for networked computing| US9215005B2|2013-11-26|2015-12-15|Cisco Technology, Inc.|Social cloud application-mediated mobile data hotspot sharing|US9411327B2|2012-08-27|2016-08-09|Johnson Controls Technology Company|Systems and methods for classifying data in building automation systems| US9137723B2|2013-03-15|2015-09-15|Facebook, Inc.|Portable platform for networked computing| KR102124476B1|2013-06-03|2020-06-19|엘지전자 주식회사|Mobile terminal and method for controlling the same| US20150040198A1|2013-07-31|2015-02-05|Wipro Limited|Systems and methods for accessing a device using a paired device in its proximity| KR102147088B1|2013-09-03|2020-08-24|삼성전자 주식회사|Method and apparatus for offering received information to user in a electronic device| US9185099B2|2013-09-23|2015-11-10|Airwatch Llc|Securely authorizing access to remote resources| KR102162955B1|2013-10-31|2020-10-08|삼성전자 주식회사|Method for performing authentication using biometrics information and portable electronic device supporting the same| US10575347B2|2013-11-04|2020-02-25|Microsoft Technology Licensing, Llc|Delivery of shared WiFi credentials| US9113383B2|2013-11-22|2015-08-18|Cellco Partnership|Call continuity using short-range communications handoff| KR20150060275A|2013-11-26|2015-06-03|삼성전자주식회사|Electronic device and method for providing data service in electronic device| KR101558685B1|2013-12-09|2015-10-07|현대자동차주식회사|System And Method for providing a Communication Service, and Vehicle supporting the same| WO2015108330A1|2014-01-20|2015-07-23|Samsung Electronics Co., Ltd.|Electronic device for controlling an external device using a number and method thereof| US10314088B2|2014-04-16|2019-06-04|Belkin International, Inc.|Associating devices and users with a local area network using network identifiers| US10560975B2|2014-04-16|2020-02-11|Belkin International, Inc.|Discovery of connected devices to determine control capabilities and meta-information| US9531578B2|2014-05-06|2016-12-27|Comcast Cable Communications, Llc|Connecting devices to networks| JP6053719B2|2014-05-14|2016-12-27|シャープ株式会社|Network system, server, terminal, information processing method, and program| EP3584671A1|2014-06-27|2019-12-25|Apple Inc.|Manipulation of calendar application in device with touch screen| US20160042168A1|2014-08-07|2016-02-11|Christopher Eric HOLLAND|Method and apparatus for authenticating users| US9532188B1|2014-08-10|2016-12-27|Google Inc.|Creating a group based on proximate detection| US10063439B2|2014-09-09|2018-08-28|Belkin International Inc.|Coordinated and device-distributed detection of abnormal network device operation| US20160097545A1|2014-10-03|2016-04-07|Kyungdong One Corporation|Remote control and management device for heating system using a smart phone application and method thereof| US9628282B2|2014-10-10|2017-04-18|Verizon Patent And Licensing Inc.|Universal anonymous cross-site authentication| US10321259B2|2014-10-28|2019-06-11|Comcast Cable Communications, Llc|Low energy network| US10333980B2|2014-11-19|2019-06-25|Imprivata, Inc.|Personal device network for user identification and authentication| US9693375B2|2014-11-24|2017-06-27|Apple Inc.|Point-to-point ad hoc voice communication| US10231268B2|2014-12-04|2019-03-12|Belkin International, Inc.|Associating devices and users with a local area network using network identifiers| US10045389B2|2014-12-04|2018-08-07|Belkin International Inc.|Determining connectivity to a network device to optimize performance for controlling operation of network devices| US9763039B2|2014-12-30|2017-09-12|Alcatel-Lucent Usa Inc.|Controlling access to venue-related content, applications, and services| JP6376621B2|2015-01-15|2018-08-22|エンクリプティア株式会社|Authentication communication system| US9949093B2|2015-01-29|2018-04-17|Dominic M. Kotab|System, method, and computer program product for managing a network based on feedback| US10375620B2|2015-03-06|2019-08-06|Apple Inc.|Determining routing of proxy traffic between mobile client and proxy devices| CN104714414B|2015-03-25|2018-11-02|小米科技有限责任公司|The control method and device of smart home device, electronic equipment| CN106202071A|2015-04-29|2016-12-07|腾讯科技(深圳)有限公司|Method, terminal, server and the system that accounts information obtains| US10276017B2|2015-05-08|2019-04-30|Kerry CAPERELL|Alert system capable of indicating the nature of an object, person, or pet| US9942725B2|2015-05-08|2018-04-10|Kerry CAPERELL|Alert system capable of indicating the nature of an object, person, or pet| US9749864B2|2015-06-25|2017-08-29|International Business Machines Corporation|Controlling mobile device access with a paired device| US10045148B2|2015-06-26|2018-08-07|Intel Corporation|Location-based wireless device presentation and connection| WO2017004200A1|2015-06-30|2017-01-05|K4Connect Inc.|Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods| US9832082B2|2015-06-30|2017-11-28|Mist Systems, Inc.|Monitoring wireless access point events| WO2017004184A1|2015-06-30|2017-01-05|K4Connect Inc.|Home automation system including device signature pairing and related methods| US10893467B2|2015-06-30|2021-01-12|K4Connect Inc.|Home automation system including selective operation of paired device based upon voice commands and related methods| US10630649B2|2015-06-30|2020-04-21|K4Connect Inc.|Home automation system including encrypted device connection based upon publicly accessible connection file and related methods| CN106332056B|2015-06-30|2020-01-14|芋头科技(杭州)有限公司|Structure and method for pre-configuring user information of intelligent equipment| US10009795B2|2015-07-23|2018-06-26|At&T Intellectual Property I, L.P.|Remote channel selection| US9869560B2|2015-07-31|2018-01-16|International Business Machines Corporation|Self-driving vehicle's response to a proximate emergency vehicle| US10541958B2|2015-08-05|2020-01-21|Facebook, Inc.|Controlling a device cloud| US9785145B2|2015-08-07|2017-10-10|International Business Machines Corporation|Controlling driving modes of self-driving vehicles| US9721397B2|2015-08-11|2017-08-01|International Business Machines Corporation|Automatic toll booth interaction with self-driving vehicles| US9718471B2|2015-08-18|2017-08-01|International Business Machines Corporation|Automated spatial separation of self-driving vehicles from manually operated vehicles| US9896100B2|2015-08-24|2018-02-20|International Business Machines Corporation|Automated spatial separation of self-driving vehicles from other vehicles based on occupant preferences| US10530875B2|2015-08-26|2020-01-07|Facebook, Inc.|Customizing media content on online social networks| US9425869B1|2015-08-26|2016-08-23|Facebook, Inc.|User-defined coverage of media-player devices on online social networks| US9781092B2|2015-08-26|2017-10-03|Facebook, Inc.|Authenticating users to media-player devices on online social networks| US9731726B2|2015-09-02|2017-08-15|International Business Machines Corporation|Redirecting self-driving vehicles to a product provider based on physiological states of occupants of the self-driving vehicles| US9947154B2|2015-09-02|2018-04-17|Assa Abloy Ab|Retrofitted keypad and method| CN105069336B|2015-09-14|2019-04-23|中山易云云计算有限公司|A kind of distributed security management method based on the analysis of big data weight dynamic and intelligent| US9566986B1|2015-09-25|2017-02-14|International Business Machines Corporation|Controlling driving modes of self-driving vehicles| CN105204742B|2015-09-28|2019-07-09|小米科技有限责任公司|Control method, device and the terminal of electronic equipment| US10455054B2|2015-10-09|2019-10-22|At&T Intellectual Property I, L.P.|Cross-services application service, device and network content delivery management| US9834224B2|2015-10-15|2017-12-05|International Business Machines Corporation|Controlling driving modes of self-driving vehicles| US9751532B2|2015-10-27|2017-09-05|International Business Machines Corporation|Controlling spacing of self-driving vehicles based on social network relationships| US9944291B2|2015-10-27|2018-04-17|International Business Machines Corporation|Controlling driving modes of self-driving vehicles| US10607293B2|2015-10-30|2020-03-31|International Business Machines Corporation|Automated insurance toggling for self-driving vehicles| US10176525B2|2015-11-09|2019-01-08|International Business Machines Corporation|Dynamically adjusting insurance policy parameters for a self-driving vehicle| US9791861B2|2015-11-12|2017-10-17|International Business Machines Corporation|Autonomously servicing self-driving vehicles| US9444703B1|2015-11-30|2016-09-13|International Business Machines Corporation|Interconnecting electronic devices for reporting device status| US10863330B1|2015-12-03|2020-12-08|Eta Vision Inc.|Systems and methods for sensing, recording, analyzing and reporting environmental conditions in data centers and similar facilities| US10061326B2|2015-12-09|2018-08-28|International Business Machines Corporation|Mishap amelioration based on second-order sensing by a self-driving vehicle| US10867508B2|2015-12-17|2020-12-15|Tive, Inc.|Multi-sensor electronic device with wireless connectivity and sensing as a service platform and web application| US10482419B2|2015-12-17|2019-11-19|Tive, Inc.|Sensor device having configuration changes| US9836973B2|2016-01-27|2017-12-05|International Business Machines Corporation|Selectively controlling a self-driving vehicle's access to a roadway| CN105608776A|2016-01-29|2016-05-25|成都比善科技开发有限公司|Method for authorizing visitor to visit subareas through community access control system| KR20170091426A|2016-02-01|2017-08-09|삼성전자주식회사|Display apparatus and control method thereof| US10666642B2|2016-02-26|2020-05-26|Ca, Inc.|System and method for service assisted mobile pairing of password-less computer login| US9892076B2|2016-03-04|2018-02-13|Facebook, Inc.|Mobile hardware fob with device ecosystem for modular I/O extension devices| JP6207651B2|2016-03-30|2017-10-04|キヤノン株式会社|Information processing apparatus, control method therefor, and program| US10854194B2|2017-02-10|2020-12-01|Johnson Controls Technology Company|Building system with digital twin based data ingestion and processing| JP6700959B2|2016-05-11|2020-05-27|キヤノン株式会社|Communication device, communication device control method, and program| CN105848188B|2016-05-17|2019-09-20|协同通信技术有限公司|A kind of wireless network access method, system and equipment| US10685391B2|2016-05-24|2020-06-16|International Business Machines Corporation|Directing movement of a self-driving vehicle based on sales activity| AU2017100667A4|2016-06-11|2017-07-06|Apple Inc.|Activity and workout updates| WO2018036642A1|2016-08-24|2018-03-01|Siemens Aktiengesellschaft|Linking of a radio transmitting switch and a radio receiving device| US10093322B2|2016-09-15|2018-10-09|International Business Machines Corporation|Automatically providing explanations for actions taken by a self-driving vehicle| US10643256B2|2016-09-16|2020-05-05|International Business Machines Corporation|Configuring a self-driving vehicle for charitable donations pickup and delivery| US11212326B2|2016-10-31|2021-12-28|Microsoft Technology Licensing, Llc|Enhanced techniques for joining communication sessions| US10587480B2|2016-11-14|2020-03-10|WiSilica Inc.|User experience enhancement using proximity awareness| US10194390B2|2016-12-12|2019-01-29|Whp Workflow Solutions, Inc.|Energy efficient communication for data asset transfers| US11184764B2|2016-12-14|2021-11-23|Amzetta Technologies, Llc|Methods and systems of establishing communication between devices| US10259452B2|2017-01-04|2019-04-16|International Business Machines Corporation|Self-driving vehicle collision management system| US10529147B2|2017-01-05|2020-01-07|International Business Machines Corporation|Self-driving vehicle road safety flare deploying system| US10363893B2|2017-01-05|2019-07-30|International Business Machines Corporation|Self-driving vehicle contextual lock control system| US10515098B2|2017-02-10|2019-12-24|Johnson Controls Technology Company|Building management smart entity creation and maintenance using time series data| US10397739B2|2017-03-03|2019-08-27|Here Global B.V.|Supporting the creation of a radio map| US10966258B2|2017-03-08|2021-03-30|Comcast Cable Communications, Llc|Methods and systems for managing network hotspots| US10152060B2|2017-03-08|2018-12-11|International Business Machines Corporation|Protecting contents of a smart vault being transported by a self-driving vehicle| US10560844B2|2017-03-15|2020-02-11|International Business Machines Corporation|Authentication of users for securing remote controlled devices| WO2018175912A1|2017-03-24|2018-09-27|Johnson Controls Technology Company|Building management system with dynamic channel communication| EP3613180B1|2017-04-21|2020-12-09|Danfoss A/S|A control system for controlling a cooling system| US9974043B1|2017-05-31|2018-05-15|Aruba Networks, Inc.|Assigning a subset of access points in a wireless network to a high priority| US10582435B2|2017-07-28|2020-03-03|Samsung Electronics Co., Ltd.|Method and system for handling wireless communication in voice over wireless fidelity system| US10674940B2|2017-08-10|2020-06-09|Parasol Medical LLC|Patient movement and incontinence notification system| US11095662B2|2017-08-29|2021-08-17|Amazon Technologies, Inc.|Federated messaging| US10791196B2|2017-08-29|2020-09-29|Wickr Inc.|Directory lookup for federated messaging with a user from a different secure communication network| JP6941516B2|2017-09-14|2021-09-29|立川ブラインド工業株式会社|Signal processing equipment and systems| US20190082476A1|2017-09-14|2019-03-14|Verizon Patent And Licensing Inc.|Pairing method for monitoring devices| US10962945B2|2017-09-27|2021-03-30|Johnson Controls Technology Company|Building management system with integration of data into smart entities| US20190095480A1|2017-09-27|2019-03-28|Johnson Controls Technology Company|Web services for smart entity management for sensor systems| EP3583770B1|2018-05-07|2020-10-28|Google LLC|Providing composite graphical assistant interfaces for controlling various connected devices| CN109561455B|2018-12-14|2022-02-18|四川通信科研规划设计有限责任公司|Communication system and method of hybrid network| US11256392B2|2019-11-01|2022-02-22|Microsoft Technology Licensing, Llc|Unified interfaces for paired user computing devices| CN111792476A|2020-06-24|2020-10-20|巨立电梯股份有限公司|Intelligent elevator monitoring system|
法律状态:
2018-11-13| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2020-08-04| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2020-11-24| B11B| Dismissal acc. art. 36, par 1 of ipl - no reply within 90 days to fullfil the necessary requirements| 2021-10-13| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US201361801526P| true| 2013-03-15|2013-03-15| US13/914,570|US9137723B2|2013-03-15|2013-06-10|Portable platform for networked computing| PCT/US2014/024822|WO2014151042A1|2013-03-15|2014-03-12|Portable platform for networked computing| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|