H04L51/52

Search system and methods with integration of user annotations from a trust network

Computer systems and methods incorporate user annotations (metadata) regarding various pages or sites, including annotations by a querying user and by members of a trust network defined for the querying user into search and browsing of a corpus such as the World Wide Web. A trust network is defined for each user, and annotations by any member of a first user's trust network are made visible to the first user during search and/or browsing of the corpus. Users can also limit searches to content annotated by members of their trust networks or by members of a community selected by the user.

Friend location sharing mechanism for social media platforms

A server system for a map-based social media platform maintains user location information to enable the rendering of friend icons on a map at a corresponding display locations. The system maintains a per user access control list (ACL) that lists all users whose icons can be viewed by a requesting user. The ACL can include a designation of respective display granularity levels for different friend users.

Friend location sharing mechanism for social media platforms

A server system for a map-based social media platform maintains user location information to enable the rendering of friend icons on a map at a corresponding display locations. The system maintains a per user access control list (ACL) that lists all users whose icons can be viewed by a requesting user. The ACL can include a designation of respective display granularity levels for different friend users.

Longevity management of social network data

In an approach to longevity management of social network data, a computer detects a posting of a social artifact by a first user of a social network. A computer stores the social artifact with associated identification information. A computer stores activity associated with the social artifact by one or more other users. A computer detects a status change in an account associated with the first user, wherein the status change indicates the first user is not active in the social network. In response to detecting the status change, a computer determines a second user from the one or more other users to which to transfer the social artifact based on the social artifact, the associated identification information, and the activity associated with the social artifact by the one or more other users. A computer transfers the social artifact to an account associated with the second user on the social network.

Longevity management of social network data

In an approach to longevity management of social network data, a computer detects a posting of a social artifact by a first user of a social network. A computer stores the social artifact with associated identification information. A computer stores activity associated with the social artifact by one or more other users. A computer detects a status change in an account associated with the first user, wherein the status change indicates the first user is not active in the social network. In response to detecting the status change, a computer determines a second user from the one or more other users to which to transfer the social artifact based on the social artifact, the associated identification information, and the activity associated with the social artifact by the one or more other users. A computer transfers the social artifact to an account associated with the second user on the social network.

Messaging-enabled unmanned aerial vehicle
11556123 · 2023-01-17 · ·

An unmanned aerial vehicle (UAV) carries a camera, sends data from the camera, and receives commands. The UAV is connected to a messaging platform. Pictures or video clips received from the UAV are selected and placed in messages broadcast by an account associated with the UAV. Video footage from the camera is live-streamed in a card-type message. Account holders of the messaging platform may control the UAV with commands embedded in messages and directed towards an account associated with the UAV. Controllable elements of the UAV include UAV location, camera orientation, camera subject, UAV-mounted lighting, a UAV-mounted display, a UAV-mounted projector, UAV-mounted speakers, and a detachable payload. UAV control may be determined through democratic means. Some UAV functionality may be triggered through aggregated engagements on the messaging platform. The UAV may include a display screen and/or a microphone to provide for telepresence or interview functionality.

Methods, systems, and media for sending a message about a new video to a group of related users
11558214 · 2023-01-17 · ·

Methods, systems, and media for sending a message about a new video to a group of related users are provided. In accordance with some embodiments, the method comprises: determining that a new video associated with a content creator has been uploaded to a video sharing service; identifying a group of candidate users to receive a message indicating that the new video is available; identifying a sub-group of users within the group of candidate users based on relationships of users within the group to each other; determining a time to send the message; transmitting the message to the sub-group of users at the determined time; determining that the message has been selected by a user device associated with a user of the sub-group of users; and causing the new video to be presented in a user interface including a communication interface associated with the sub-group of users on the user device.

Methods, systems, and media for sending a message about a new video to a group of related users
11558214 · 2023-01-17 · ·

Methods, systems, and media for sending a message about a new video to a group of related users are provided. In accordance with some embodiments, the method comprises: determining that a new video associated with a content creator has been uploaded to a video sharing service; identifying a group of candidate users to receive a message indicating that the new video is available; identifying a sub-group of users within the group of candidate users based on relationships of users within the group to each other; determining a time to send the message; transmitting the message to the sub-group of users at the determined time; determining that the message has been selected by a user device associated with a user of the sub-group of users; and causing the new video to be presented in a user interface including a communication interface associated with the sub-group of users on the user device.

Addressing propagation of inaccurate information in a social networking environment

An approach is described for addressing propagation of inaccurate information in a social networking environment. An associated method may include identifying inaccurate information within the social networking environment, facilitating creation of countering content to address the inaccurate information, and disseminating the countering content. The countering content may be determined by identifying behavior of one or more users among a plurality of users within the social networking environment. Identifying the inaccurate information within the social networking environment may include receiving information provided within the social networking environment. Upon determining that the received information is factual and thus objectively verifiable, it may be determined whether the received information matches analogous information verified as accurate. Upon determining that the received information does not match the analogous information verified as accurate, the received information may be marked as inaccurate.

Addressing propagation of inaccurate information in a social networking environment

An approach is described for addressing propagation of inaccurate information in a social networking environment. An associated method may include identifying inaccurate information within the social networking environment, facilitating creation of countering content to address the inaccurate information, and disseminating the countering content. The countering content may be determined by identifying behavior of one or more users among a plurality of users within the social networking environment. Identifying the inaccurate information within the social networking environment may include receiving information provided within the social networking environment. Upon determining that the received information is factual and thus objectively verifiable, it may be determined whether the received information matches analogous information verified as accurate. Upon determining that the received information does not match the analogous information verified as accurate, the received information may be marked as inaccurate.