Geo-fence selection system

ABSTRACT

The present invention relates to improvements to systems and methods for determining a current location of a client device, and for identifying and selecting appropriate geo-fences based on the current location of the client device. An improved geo-fence selection system performs operations that include associating media content with a geo-fence that encompasses a portion of a geographic region, sampling location data from a client device, defining a boundary based on the sampled location data from the client device, detecting an overlap between the boundary and the geo-fence, retrieving the media content associated with the geo-fence, and loading the media content at a memory location of the client device, in response to detecting the overlap.

PRIORITY

This application claims the benefit of priority to U.S. patentapplication Ser. No. 15/912,769, filed on Mar. 6, 2018, the benefit ofpriority of each of which is claimed hereby, and each of which isincorporated by reference herein in its entirety.

TECHNICAL FIELD

Embodiments of the present disclosure relate generally to mobilecomputing technology and, more particularly, but not by way oflimitation, to systems for determining a location of a client device forthe purposes of geo-fencing.

BACKGROUND

A “geo-fence” is a virtual perimeter created around real-worldgeographic locations. Traditional geo-fence services provide merchantsor other businesses with a capability to create a geo-fence around themerchant or business' location. When a user enters or exits a perimeterof one of these geo-fences with a location-aware device (e.g., asmartphone), a notification related to the location may be transmittedto the user's device. Such notifications are often used as a marketingtool to entice nearby users to patronize these locations. Some socialmedia platforms employ geo-fencing for location-based functionality, forexample providing location-based collections of social media content, ormaking available themed location overlays or stickers for augmentingsocial media posts.

Traditional methods of delivering notifications related to the locationsthrough the use of geo-fences have inherent limitations. For example,location accuracy of a device is often limited as a result of poor orslow network connectivity. As a result, a device may enter and exit theperimeter of a geo-fence before a traditional geo-fencing system isactually able to deliver content to the device. Furthermore, locationdata retrieved from the device may not accurately define a location ofthe device at all.

BRIEF DESCRIPTION OF THE SEVERAL, VIEWS OF THE DRAWINGS

To easily identify the discussion of any particular element or act, themost significant digit or digits in a reference number refer to thefigure number in which that element is first introduced.

FIG. 1 is a block diagram showing an example messaging system forexchanging data (e.g., messages and associated content) over a networkin accordance with some embodiments, wherein the messaging systemincludes a geo-fence selection system.

FIG. 2 is block diagram illustrating further details regarding amessaging system, according to example embodiments.

FIG. 3 is a block diagram illustrating various modules of a geo-fenceselection system, according to certain example embodiments.

FIG. 4 is a flowchart illustrating a method for retrieving and loadingmedia content at a client device, according to certain exampleembodiments.

FIG. 5A is an illustration of location data sampled by a geo-fenceselection system, according to certain example embodiments.

FIG. 5B is an illustration of a boundary generated based on locationdata sampled by a geo-fence selection system, according to certainexample embodiments.

FIG. 5C is an illustration of a boundary generated based on locationdata sampled by a geo-fence selection system, according to certainexample embodiments.

FIG. 6 is a flowchart illustrating a method for retrieving and loadingmedia content at a client device, according to certain exampleembodiments.

FIG. 7 is a table comprising location data and timestamps, according tocertain example embodiments.

FIG. 8 is a flowchart illustrating a method for retrieving and loadingmedia content at a client device, according to certain exampleembodiments.

FIG. 9 is an illustration of a boundary generated based on location datasampled by a geo-fence selection system, according to certain exampleembodiments.

FIG. 10 is a block diagram illustrating a representative softwarearchitecture, which may be used in conjunction with various hardwarearchitectures herein described and used to implement variousembodiments.

FIG. 11 is a block diagram illustrating components of a machine,according to some example embodiments, able to read instructions from amachine-readable medium (e.g., a machine-readable storage medium) andperform any one or more of the methodologies discussed herein.

DETAILED DESCRIPTION

As discussed above, an inherent limitation with traditional geo-fencetechnology is the inaccuracy and inconsistency of location data that maybe retrieved from a client device. Furthermore, an objective oftraditional geo-fences is to load and display content at client deviceswithin geo-fences as quickly as possible. Due to the aforementionedinaccuracies and inconsistencies of location data received from clientdevices, the presentation of media content may be delayed or notdelivered at all.

Thus, the present invention relates to improvements to systems andmethods for determining a current location of a client device, and foridentifying and selecting appropriate geo-fences based on the currentlocation of the client device. An improved geo-fence selection systemperforms operations that include associating media content with ageo-fence that encompasses a portion of a predefined geographic region,sampling location data from a client device, defining a boundary basedon the sampled location data from the client device, detecting anoverlap between the boundary and the geo-fence, retrieving the mediacontent associated with the geo-fence, and loading the media content ata memory location of the client device, in response to detecting theoverlap.

In some embodiments, the improved geo-fence selection system sampleslocation data from a client device at predefined intervals (e.g., 30seconds, 1 minute, 5 minutes, etc.) over a period of time (e.g., 24hours). For example, the system may ping the client device everyinterval to retrieve location data, such as Global Positioning System(GPS) data, cell triangulation data, or the like. In furtherembodiments, the improved geo-fence selection system samples thelocation data by retrieving the location data from the client inresponse to certain user actions performed by a user of the clientdevice. For example, the user may provide an input to the client deviceto check-in to a particular location, or to interact with certain mediacontent presented at the client device, or to launch an application. Inresponse to detecting the user input, the improved geo-fence selectionsystem retrieves location data from the client device and assigned atimestamp to the location data.

The location data may also include temporal data, which the improvedgeo-fence selection system may utilize to timestamp the retrievedlocation data. In such embodiments, the improved geo-fence selectionsystem indexes and stores the location data at a database, along withthe timestamps.

In response to sampling the location data, the improved geo-fenceselection system generates a boundary that indicates a general locationof the client device. The boundary defined by the improved geo--fenceselection system based on the location data includes a “bounded box.” Ingeometry, the minimum or smallest bounding or enclosing box for a pointset (S) in N dimensions is the box with the smallest measure (area,volume, or hyper-volume in higher dimensions) within which all thepoints lie. When other kinds of measure are used, the minimum box isusually called accordingly, e.g., “minimum-perimeter bounding box,” or a“bounded box.”

In further embodiments, the boundary defined by the improved geo-fencesystem based on the location data includes a “convex hull” Inmathematics, the convex hull or convex envelope of a set X of points inthe Euclidean plane or in a Euclidean space (or, more generally, in anaffine space over the reals) is the smallest convex set that contains X.For instance, when X is a bounded subset of the plane, the convex hullmay be visualized as the shape enclosed by a rubber band stretchedaround X.

In further embodiments, the improved geo-fence system calculates anaverage based on the location data retrieved from the client device, anddefines the boundary based on the average of the location data.

In further embodiments, the improved geo-fence system identifies acentral point of the client device based on the location data, andgenerates a boundary that expands a predefined radius from the centralpoint and encompasses the location data of the client device.

The improved geo-fence system detects overlaps and intersections of theboundary (that identifies a location of the client device with one ormore geo-fences within a geographic area. In response to detecting theoverlaps and intersections of the boundary that defines the location ofthe client device with the one or more geo-fences, the improvedgeo-fence system retrieves media content associated with the one or moregeo-fences, and loads the media content at a memory location of theclient device.

In some embodiments, a larger boundary such as a map tile may encompassthe one or more geo-fences. In such embodiments, the improved geo-fencesystem may detect overlaps of the boundary that defines the location ofthe client device and a border of the map tile. In response to detectingthe overlap with the boundary that defines the location of the clientdevice and the border of the map tile, the improved geo-fence systemidentifies the one or more geo-fences within the map tile, and retrievesmedia content associated with the one or more geo-fences. The retrievedmedia content may then be loaded at the client device.

In further embodiments, in response to detecting the overlap with theboundary that defines the location of the client device and the borderof the map tile, the improved geo-fence system identifies the one ormore geo-fences within the map tile, then detects whether or not asocial network connection of the user of the client device is within anyof the one or more geo-fences. Upon identifying a social networkconnection of the user of the client device within a geo-fence fromamong the one or more geo-fences, the improved geo-fence systemretrieves the media content associated with the geo-fence, and loads itat the client device.

In some example embodiments, the improved geo-fence system detects acurrent location of a client device, and accesses a database thatcontains the sampled location data from the client device to predict afuture location of the client device. For example, the improvedgeo-fence system may determine a trajectory of the client device basedon the sampled location data and the timestamps of the sampled locationdata, and may identify one or more geo-fences based on the trajectory.In further embodiments, the improved geo-fence system may identifyrelationships between locations identified by the location data based onthe timestamps. For example, the improved geo-fence system may determinethat when a user is at a first location (e.g., work), the always go to asecond location (e.g., home) within a period of time. The improvedgeo-fence system may identify these relationships and load media contentat the client device based on the next predicted location of the clientdevice, based on the current location of the client device and a currenttime.

FIG. 1 is a block diagram showing an example messaging system 100 forexchanging data (e.g., messages and associated content) over a network.The messaging system 100 includes multiple client devices 102, each ofwhich hosts a number of applications including a messaging clientapplication 104. Each messaging client application 104 iscommunicatively coupled to other instances of the messaging clientapplication 104 and a messaging server system 108 via a network 106(e.g., the Internet).

Accordingly, each messaging client application 104 is able tocommunicate and exchange data with another messaging client application104 and with the messaging server system 108 via the network 106. Thedata exchanged between messaging client applications 104, and between amessaging client application 104 and the messaging server system 108,includes functions (e.g., commands to invoke functions) as well aspayload data (e.g., text, audio, video or other multimedia data).

The messaging server system 108 provides server-side functionality viathe network 106 to a particular messaging client application 104. Whilecertain functions of the messaging system 100 are described herein asbeing performed by either a messaging client application 104 or by themessaging server system 108, it will be appreciated that the location ofcertain functionality either within the messaging client application 104or the messaging server system 108 is a design choice. For example, itmay be technically preferable to initially deploy certain technology andfunctionality within the messaging server system 108, but to latermigrate this technology and functionality to the messaging clientapplication 104 where a client device 102 has a sufficient processingcapacity.

The messaging server system 108 supports various services and operationsthat are provided to the messaging client application 104. Suchoperations include transmitting data to, receiving data from, andprocessing data generated by the messaging client application 104. Insome embodiments, this data includes, message content, client deviceinformation, geolocation information, media annotation and overlays,message content persistence conditions, social network information, andlive event information, as examples. In other embodiments, other data isused. Data exchanges within the messaging system 100 are invoked andcontrolled through functions available via GUIs of the messaging clientapplication 104.

Turning now specifically to the messaging server system 108, anApplication Program Interface (API) server 110 is coupled to, andprovides a programmatic interface to, an application server 112. Theapplication server 112 is communicatively coupled to a database server118, which facilitates access to a database 120 in which is stored dataassociated with messages processed by the application server 112.

Dealing specifically with the Application Program Interface (API) server110, this server receives and transmits message data (e.g., commands andmessage payloads) between the client device 102 and the applicationserver 112. Specifically, the Application Program Interface (API) server110 provides a set of interfaces (e.g., routines and protocols) that canbe called or queried by the messaging client application 104 in order toinvoke functionality of the application server 112. The ApplicationProgram Interface (API) server 110 exposes various functions supportedby the application server 112, including account registration, loginfunctionality, the sending of messages, via the application server 112,from a particular messaging client application 104 to another messagingclient application 104, the sending of media files (e.g., images orvideo) from a messaging client application 104 to the messaging serverapplication 114, and for possible access by another messaging clientapplication 104, the setting of a collection of media data (e.g.,story), the retrieval of a list of friends of a user of a client device102, the retrieval of such collections, the retrieval of messages andcontent, the adding and deletion of friends to a social graph, thelocation of friends within a social graph, opening and application event(e.g., relating to the messaging client application 104).

The application server 112 hosts a number of applications andsubsystems, including a messaging server application 114, an imageprocessing system 116, a social network system 122, and a geo-fenceselection system 124. The messaging server application 114 implements anumber of message processing technologies and functions, particularlyrelated to the aggregation and other processing of content (e.g.,textual and multimedia content) included in messages received frommultiple instances of the messaging client application 104. As will bedescribed in further detail, the text and media. content from multiplesources may be aggregated into collections of content (e.g., calledstories or galleries). These collections are then made available, by themessaging server application 114, to the messaging client application104. Other processor and memory intensive processing of data may also beperformed server-side by the messaging server application 114, in viewof the hardware requirements for such processing.

The application server 112 also includes an image processing system 116that is dedicated to performing various image processing operations,typically with respect to images or video received within the payload ofa message at the messaging server application 114.

The social network system 122 supports various social networkingfunctions services, and makes these functions and services available tothe messaging server application 114. To this end, the social networksystem 122 maintains and accesses an entity graph 304 within thedatabase 120. Examples of functions and services supported by the socialnetwork system 122 include the identification of other users of themessaging system 100 with which a particular user has relationships oris “following,” and also the identification of other entities andinterests of a particular user.

The application server 112 is communicatively coupled to a databaseserver 118, which facilitates access to a database 120 in which isstored data associated with messages processed by the messaging serverapplication 114.

FIG. 2 is block diagram illustrating further details regarding themessaging system 100, according to example embodiments. Specifically,the messaging system 100 is shown to comprise the messaging clientapplication 104 and the application server 112, which in turn embody anumber of some subsystems, namely an ephemeral timer system 202, acollection management system 204 and an annotation system 206.

The ephemeral timer system 202 is responsible for enforcing thetemporary access to content permitted by the messaging clientapplication 104 and the messaging server application 114. To this end,the ephemeral tinier system 202 incorporates a number of timers that,based on duration and display parameters associated with a message,collection of messages (e.g., a SNAPCHAT story), or graphical element.selectively display and enable access to messages and associated contentvia the messaging client application 104. Further details regarding theoperation of the ephemeral timer system 202 are provided below,

The collection management system 204 is responsible for managingcollections of media (e.g., collections of text, image video and audiodata). In some examples, a collection of content (e.g., messages,including images, video, text and audio) may be organized into an “eventgallery” or an “event story.” Such a collection may be made availablefor a specified time period, such as the duration of an event to whichthe content relates. For example, content relating to a music concertmay be made available as a “story” for the duration of that musicconcert. The collection management system 204 may also be responsiblefor publishing an icon that provides notification of the existence of aparticular collection to the user interface of the messaging clientapplication 104.

The collection management system 204 furthermore includes a curationinterface 208 that allows a collection manager to manage and curate aparticular collection of content. For example, the curation interface208 enables an event organizer to curate a collection of contentrelating to a specific event (e.g., delete inappropriate content orredundant messages). Additionally, the collection management system 204employs machine vision (or image recognition technology) and contentrules to automatically curate a content collection. In certainembodiments, compensation may be paid to a user for inclusion of usergenerated content into a collection. In such cases, the curationinterface 208 operates to automatically make payments to such users forthe use of their content.

The annotation system 206 provides various functions that enable a userto annotate or otherwise modify or edit media content associated with amessage. For example, the annotation system 206 provides functionsrelated to the generation and publishing of media overlays for messagesprocessed by the messaging system 100. The annotation system 206operatively supplies a media overlay (e.g., a SNAPCHAT filter) to themessaging client application 104 based on a geolocation of the clientdevice 102. In another example, the annotation system 206 operativelysupplies a media overlay to the messaging client application 104 basedon other information, such as, social network information of the user ofthe client device 102. A media overlay may include audio and visualcontent and visual effects. Examples of audio and visual content includepictures, texts, logos, animations, and sound effects, as well asanimated facial models, such as those generated by the geo-fenceselection system 124. An example of a visual effect includes coloroverlaying. The audio and visual content or the visual effects can beapplied to a media content item (e.g., a photo) at the client device102. For example, the media overlay including text that can be overlaidon top of a photograph generated taken by the client device 102. Inanother example, the media overlay includes an identification of alocation overlay (e.g., Venice beach), a name of a live event, or a nameof a merchant overlay (e.g., Beach Coffee House). In another example,the annotation system 206 uses the geolocation of the client device 102to identify a media overlay that includes the name of a merchant at thegeolocation of the client device 102. The media overlay may includeother indicia associated with the merchant. The media overlays may bestored in the database 120 and accessed through the database server 118.

In one example embodiment, the annotation system 206 provides auser-based publication platform that enables users to select ageolocation on a map, and upload content associated with the selectedgeolocation. The user may also specify circumstances under which aparticular media overlay should be offered to other users. Theannotation system 206 generates a media overlay that includes theuploaded content and associates the uploaded content with the selectedgeolocation.

In another example embodiment, the annotation system 206 provides amerchant-based publication platform that enables merchants to select aparticular media overlay associated with a geolocation via a biddingprocess. For example, the annotation system 206 associates the mediaoverlay of a highest bidding merchant with a corresponding geolocationfor a predefined amount of time

FIG. 3 is a block diagram illustrating components of the geo-fenceselection system 124 that configure the geo-fence selection system 124to associate media content with a geo-fence, sample location data from aclient device, define a boundary that identifies a location of theclient device, detect an overlap between the boundary and a geo-fence,and retrieve and load the media content of the geo-fence at a memorylocation of the client device, according to some example embodiments.The geo-fence selection system 124 is shown as including a geo-fencingmodule 302, a location module 304, a communication module 306, andpresentation module 308, all configured to communicate with each other(e.g., via a bus, shared memory, or a switch). Any one or more of thesemodules may be implemented using one or more processors 310 (e.g., byconfiguring such one or more processors to perform functions describedfor that module) and hence may include one or more of the processors310.

Any one or more of the modules described may be implemented usinghardware alone (e.g., one or more of the processors 310 of a machine) ora combination of hardware and software. For example, any moduledescribed of the geo-fence selection system 124 may physically includean arrangement of one or more of the processors 310 (e.g., a subset ofor among the one or more processors of the machine) configured toperform the operations described herein for that module. As anotherexample, any module of the geo-fence selection system 124 may includesoftware, hardware, or both, that configure an arrangement of one ormore processors 310 (e.g., among the one or more processors of themachine) to perform the operations described herein for that module.Accordingly, different modules of the geo-fence selection system 124 mayinclude and configure different arrangements of such processors 310 or asingle arrangement of such processors 310 at different points in time.Moreover, any two or more modules of the geo-fence selection system 124may be combined into a single module, and the functions described hereinfor a single module may be subdivided among multiple modules.Furthermore, according to various example embodiments, modules describedherein as being implemented within a single machine, database, or devicemay be distributed across multiple machines, databases, or devices.

FIG. 4 is a flowchart illustrating a method 400 for retrieving andloading media content at a client device, according to certain exampleembodiments. Operations of the method 400 may be performed by themodules described above with respect to FIG. 3. As shown in FIG. 4, themethod 400 includes one or more operations 402, 404, 406, 408, and 410.

At operation 402, the geo-fencing module 302 receives a user input toassociate media content with a geo-fence that encompasses a portion of ageographic region. For example, the media content may comprise imagedata, video data, filters, messages, as well as interactive mediacontent. A user may associate the media content with a geo-fence suchthat the media content is only accessible or available through clientdevices located within the geo-fence, or which have at some pointtransgressed a border of the geo-fence.

At operation 404, the location module 304 samples location data from aclient device. In some example embodiments, the location module 304samples the location data from a client device 102 at predefinedintervals (e.g., 30 seconds, 1 minute, 5 minutes, etc.) over a period oftime (e.g., 24 hours). For example, the system may ping the clientdevice every interval to retrieve location data, such as GlobalPositioning System (GPS) data, cell triangulation data, or the like. Infurther embodiments, the location module 304 samples the location databy retrieving the location data from the client device 102 in responseto certain user actions performed by a user of the client device 102.For example, the user may provide an input to the client device 102 tocheck-in to a particular location, or to interact with certain mediacontent presented at the client device, or to launch an application. Inresponse to detecting the user input, the location module 304 retrieveslocation data from the client device 102 and assigns a timestamp to thelocation data.

At operation 406, the location module 304 defines a boundary based onthe location data retrieved from the client device 102 over thepredefined period of time, wherein the boundary defined by the locationmodule 304 provides an indication of a location of the client device 102over the predefined period of time. In some embodiments, the boundarydefined by the location module 204 based on the location data retrievedfrom the client device 102 includes one or more of: a bounded box; anaverage location; a radius; and a convex hull.

At operation 408, the location module 304 detects an overlap between thegeo-fence and the boundary that identifies a location of the clientdevice 102 over the predefined period of time. In response to detectingthe overlap between the boundary and the geo-fence, at operation 410,the communication module 306 loads the media content of the geo-fence ata memory location of the client device 102, wherein the presentationmodule 308 may generate and cause display of a presentation of the mediacontent.

FIG. 5A is an illustration 500A of location data (e.g., location data502) sampled from a client device 102 by the location module 304 of thegeo-fence selection system 124, as discussed in the method 400, andaccording to certain example embodiments. The illustration 500A includesa depiction of a geo-fence 506 that encompasses a portion of apredefined geographic region.

FIG. 5B is an illustration 500B of a boundary 504B generated based onthe sampled location data (e.g., location data 502) by the locationmodule 304 of the geo-fence selection system 124, as discussed in themethod 400, and according to certain example embodiments. As seen inFIG. 5B, the boundary 504B may intersect or overlap with the geo-fence506.

The boundary 504B may for example include a “bounded box,” In geometry,the minimum or smallest bounding or enclosing box for a point set (S) inN dimensions is the box with the smallest measure (area, volume, orhyper-volume in higher dimensions) within which all the points lie.

FIG. 5C is an illustration 500C of another embodiment, in which aboundary 504C is generated based on sampled location data (e.g.,location data 502), by the location module 304 of the geo-fenceselection system 124, as discussed in the method 400, and according tocertain example embodiments. As seen in FIG. 5C, the boundary 504C maybe defined based on an average location, or a central point of theclient device 102 based on the location data.

FIG. 6 is a flowchart illustrating a method 600 for retrieving andloading media content at a client device (e.g., client device 102)according to certain example embodiments. Operations of the method 600may be performed by the modules described above with respect to FIG. 3.As shown in FIG. 6, the method 600 includes one or more operations 602,604, 606, and 608. Operations of the method 600 may be performed as asubroutine or portion of any of the operations of the method 400 of FIG.4.

At operation 602, the location module 304 associates the sampledlocation data from the client device 102 with a time of day within adatabase associated with a user of the client device 102. The locationmodule 304 may timestamp the location data retrieved from the clientdevice 102, such that the timestamps indicate a time in which thelocation data was retrieved from the client device.

At operation 604, the location module 304 identifies a location (e.g., apast location of the client device 102) based on a time of day (e.g., acurrent time of day, or an impending time of day). For example, thetimestamped location data may indicate that on most days, the clientdevice 102 is at a location (e.g., work) at a certain time (e.g., noon).

At operation 606, the geo-fencing module 302 identifies one or moregeo-fences that intersect a boundary that defines a location of theclient device 102 at the certain time of day, based on the sampledlocation data within the database.

At operation 608, the geo-fencing module retrieves media contentassociated with the one or more geo-fences, and at operation 610, thecommunication module 306 loads the retrieved media content at the clientdevice 102, at a time earlier than the certain time of day correspondingto the historical location data.

FIG. 7 is a table 700 comprising location data and timestamps, asdiscussed with respect to the operations of the method 600 of FIG. 6,and according to certain example embodiments. As seen in the table 700,the location data may be organized based on corresponding timestamps,wherein the timestamps indicate a time of day in which the client device102 was at a particular location.

FIG. 8 is a flowchart illustrating a method 800 for retrieving andloading media content at a client device, according to certain exampleembodiments. Operations of the method 800 may be performed by themodules described above with respect to FIG. 3. As shown in FIG. 8, themethod 800 includes one or more operations 802, 804, 806, and 808.Operations of the method 800 may be performed as a subroutine or portionof any of the operations of the method 400 of FIG. 4.

In some embodiments as discussed above, one or more geo-fences may beencompassed by a larger border that defines the geographic regionitself, such as a map tile. At operation 802, the location module 304detects an overlap between the border of the map tile that encompassesthe geographic region and the boundary that identifies the location of afirst client device (e.g., client device 102A).

In response to detecting the overlap between the border of the map tileand the boundary that identifies the location of the first client device(e.g., client device 102A), at operation 804, the geo-fence module 302identifies one or more geo-fences within the border of the map tile. Insome embodiments, the communication module 306 may load media contentassociated with the one or more geo-fences within the border of the maptile at the client device 102A in response to detecting the overlap.

In further embodiments, as described in operation 806, the geo-fencemodule 302 identifies a second client device (e.g., client device 102B)within a first geo-fence located within the border of the map tile. Forexample, the second client device (e.g., client device 102B) may beassociated with a user of the first client device (e.g., client device102A) based on a social network connection.

In response to detecting a social media connection between a user of thesecond client device and the user of the first client device, thegeo-fencing module 302 retrieves media content associated with the firstgeo-fence, and loads the media content at the first client device (e.g.,client device 102A).

FIG. 9 is an illustration 900 of the boundary 502 generated based onlocation data sampled by a geo-fence selection system 124, according tocertain example embodiments. The illustration 900 also include adepiction of a map tile 902 (e.g., a geographical region predefined by aborder of a map tile), and one or more geo-fences that include a firstgeo-fence 904, and a. second geo-fence 906, wherein a user of a secondclient device 102B is within the first geo-fence 904.

As explained in the method 800 of FIG. 8, in response to detecting theoverlap between the border of the map tile 902 and the boundary 502 thatidentifies the location of the first client device (e.g., client device102A), the geo-fence module 302 identifies one or more geo-fences withinthe border 902 (i.e., geo-fence 904 and 906).

In further embodiments, as discussed at operation 806, the geo-fencemodule 302 identifies a second client device (e.g., client device 102B)within the first geo-fence 904 located within the border 902. Inresponse to detecting the overlap of the boundary 502 with the border ofthe map the 902, the geo-fence module retrieves media content of thegeo-fence 904, and loads the media content at the client device 102A.

Software Architecture

FIG. 10 is a block diagram illustrating an example software architecture1006, which may be used in conjunction with various hardwarearchitectures herein described. FIG. 10 is a non-limiting example of asoftware architecture and it will be appreciated that many otherarchitectures may be implemented to facilitate the functionalitydescribed herein. The software architecture 1006 may execute on hardwaresuch as machine 1100 of FIG. 11 that includes, among other things,processors 1104, memory 1114, and I/O components 1118. A representativehardware layer 1052 is illustrated and can represent, for example, themachine 1000 of FIG. 10. The representative hardware layer 1052 includesa processing unit 1054 having associated executable instructions 1004.Executable instructions 1004 represent the executable instructions ofthe software architecture 1006, including implementation of the methods,components and so forth described herein. The hardware layer 1052 alsoincludes memory and/or storage modules memory/storage 1056, which alsohave executable instructions 1004. The hardware layer 1052 may alsocomprise other hardware 1058.

In the example architecture of FIG. 10, the software architecture 1006may be conceptualized as a stack of layers where each layer providesparticular functionality. For example, the software architecture 1006may include layers such as an operating system 1002, libraries 1020,applications 1016 and a presentation layer 1014. Operationally, theapplications 1016 and/or other components within the layers may invokeapplication programming interface (API) API calls 1008 through thesoftware stack and receive a response as in response to the API calls1008. The layers illustrated are representative in nature and not allsoftware architectures have all layers. For example, some mobile orspecial purpose operating systems may not provide aframeworks/middleware 1018, while others may provide such a layer. Othersoftware architectures may include additional or different layers.

The operating system 1002 may manage hardware resources and providecommon services. The operating system 1002 may include, for example, akernel 1022, services 1024 and drivers 1026. The kernel 1022 may act asan abstraction layer between the hardware and the other software layers.For example, the kernel 1022 may be responsible for memory management,processor management (e.g., scheduling), component management,networking, security settings, and so on, The services 1024 may provideother common services for the other software layers. The drivers 1026are responsible for controlling or interfacing with the underlyinghardware. For instance, the drivers 1026 include display drivers, cameradrivers, Bluetooth® drivers, flash memory drivers, serial communicationdrivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers,audio drivers, power management drivers, and so forth depending on thehardware configuration.

The libraries 1020 provide a common infrastructure that is used by theapplications 1016 and/or other components and/or layers. The libraries1020 provide functionality that allows other software components toperform tasks in an easier fashion than to interface directly with theunderlying operating system 1002 functionality (e.g., kernel 1022,services 1024 and/or drivers 1026). The libraries 1020 may includesystem libraries 1044 (e.g., C standard library) that may providefunctions such as memory allocation functions, string manipulationfunctions, mathematical functions, and the like. In addition, thelibraries 1020 may include API libraries 1046 such as media libraries(e.g., libraries to support presentation and manipulation of variousmedia format such as MPREG4, H.264, MP3, AAC, AMR, JPG, PNG), graphicslibraries (e.g., an OpenGL framework that may be used to render 2D and3D in a graphic content on a display), database libraries (e.g., SQLitethat may provide various relational database functions), web libraries(e.g., WebKit that may provide web browsing functionality), and thelite. The libraries 1020 may also include a wide variety of otherlibraries 1048 to provide many other APIs to the applications 1016 andother software components/modules.

The frameworks/middleware 1018 (also sometimes referred to asmiddleware) provide a higher-level common infrastructure that may beused by the applications 1016 and/or other software components/modules.For example, the frameworks/ middleware 1018 may provide various graphicuser interface (GUI) functions, high-level resource management,high-level location services, and so forth. The frameworks/middleware1018 may provide a broad spectrum of other APIs that may be utilized bythe applications 1016 and/or other software components/modules, some ofwhich may be specific to a particular operating system 1002 or platform.

The applications 1016 include built-in applications 1038 and/orthird-party applications 1040. Examples of representative built-inapplications 1038 may include, but are not limited to, a contactsapplication, a browser application, a book reader application, alocation application, a media application, a messaging application,and/or a game application. Third-party applications 1040 may include anapplication developed using the ANDROID™ or IOS™ software developmentkit (SDK) by an entity other than the vendor of the particular platform,and may be mobile software running on a mobile operating system such asIOS™, ANDROID™, WINDOWS® Phone, or other mobile operating systems. Thethird-party applications 1040 may invoke the API calls 1008 provided bythe mobile operating system (such as operating system 1002) tofacilitate functionality described herein.

The applications 1016 may use built in operating system functions (e.g.,kernel 1022, services 1024 and/or drivers 1026), libraries 1020, andframeworks/middleware 1018 to create user interfaces to interact withusers of the system. Alternatively, or additionally, in some systemsinteractions with a user may occur through a presentation layer, such aspresentation layer 1014. In these systems, the application/component“logic” can be separated from the aspects of the application/componentthat interact with a user.

FIG. 11 is a block diagram illustrating components of a machine 1100,according to some example embodiments, able to read instructions from amachine-readable medium (e.g., a machine-readable storage medium) andperform. any one or more of the methodologies discussed herein.Specifically, FIG. 11 shows a diagrammatic representation of the machine1100 in the example form of a computer system, within which instructions1110 (e.g., software, a program, an application, an applet, an app, orother executable code) for causing the machine 1100 to perform any oneor more of the methodologies discussed herein may be executed. As such,the instructions 1110 may be used to implement modules or componentsdescribed herein. The instructions 1110 transform the general,non-programmed machine 1100 into a particular machine 1100 programmed tocarry out the described and illustrated functions in the mannerdescribed. In alternative embodiments, the machine 1100 operates as astandalone device or may be coupled (e.g., networked) to other machines.In a networked deployment, the machine 1100 may operate in the capacityof a server machine or a client machine in a server-client networkenvironment, or as a peer machine in a peer-to-peer (or distributed)network environment. The machine 1100 may comprise, but not be limitedto, a server computer, a client computer, a personal computer (PC), atablet computer, a laptop computer, a netbook, a set-top box (STB), apersonal digital assistant (PDA), an entertainment media system, acellular telephone, a smart phone, a mobile device, a wearable device(e.g., a smart watch), a smart home device (e.g., a smart appliance),other smart devices, a web appliance, a network router, a networkswitch, a network bridge, or any machine capable of executing theinstructions 1110, sequentially or otherwise, that specify actions to betaken by machine 1100. Further, while only a single machine 1100 isillustrated, the term “machine” shall also be taken to include acollection of machines that individually or jointly execute theinstructions 1110 to perform any one or more of the methodologiesdiscussed herein.

The machine 1100 may include processors 1104, memory memory/storage1106, and I/O components 1118, which may be configured to communicatewith each other such as via a bus 1102. The memory/storage 1106 mayinclude a memory 1114, such as a main memory, or other memory storage,and a storage unit 1116, both accessible to the processors 1104 such asvia the bus 1102. The storage unit 1116 and memory 1114 store theinstructions 1110 embodying any one or more of the methodologies orfunctions described herein. The instructions 1110 may also reside,completely or partially, within the memory 1114, within the storage unit1116, within at least one of the processors 1104 (e.g., within theprocessor's cache memory), or any suitable combination thereof, duringexecution thereof by the machine 1100. Accordingly, the memory 1114, thestorage unit 1116, and the memory of processors 1104 are examples ofmachine-readable media.

The I/O components 1118 may include a wide variety of components toreceive input, provide output, produce output, transmit information,exchange information, capture measurements, and so on. The specific I/Ocomponents 1118 that are included in a particular machine 1100 willdepend on the type of machine. For example, portable machines such asmobile phones will likely include a touch input device or other suchinput mechanisms, while a headless server machine will likely notinclude such a touch input device. It will be appreciated that the I/Ocomponents 1118 may include many other components that are not shown inFIG. 11. The I/O components 1118 are grouped according to functionalitymerely for simplifying the following discussion and the grouping is inno way limiting. In various example embodiments, the I/O components 1118may include output components 1126 and input components 1128. The outputcomponents 1126 may include visual components (e.g., a display such as aplasma display panel (PDP), a light emitting diode (LEI)) display, aliquid crystal display (LCD), a projector, or a cathode ray tube (CRT)),acoustic components (e.g., speakers), haptic components (e.g., avibratory motor, resistance mechanisms), other signal generators, and soforth. The input components 1128 may include alphanumeric inputcomponents (e.g., a keyboard, a touch screen configured to receivealphanumeric input, a photo-optical keyboard, or other alphanumericinput components), point based input components (e.g., a mouse, atouchpad, a trackball, a joystick, a motion sensor, or other pointinginstrument), tactile input components (e.g., a physical button, a touchscreen that provides location and/or force of touches or touch gestures,or other tactile input components), audio input components (e.g., amicrophone), and the like.

In further example embodiments, the I/O components 1118 may includebiometric components 1130, motion components 1134, environmentalenvironment components 1136, or position components 1138 among a widearray of other components. For example, the biometric components 1130may include components to detect expressions (e.g., hand expressions,facial expressions, vocal expressions, body gestures, or eye tracking),measure biosignals (e.g., blood pressure, heart rate, body temperature,perspiration, or brain waves), identify a person (e.g., voiceidentification, retinal identification, facial identification,fingerprint identification, or electroencephalogram basedidentification), and the like. The motion components 1134 may includeacceleration sensor components (e.g., accelerometer), gravitation sensorcomponents, rotation sensor components (e.g., gyroscope), and so forth.The environment components 1136 may include, for example, illuminationsensor components (e.g., photometer), temperature sensor components(e.g., one or more thermometer that detect ambient temperature),humidity sensor components, pressure sensor components (e.g.,barometer), acoustic sensor components (e.g., one or more microphonesthat detect background noise), proximity sensor components (e.g.,infrared sensors that detect nearby objects), gas sensors (e.g., gasdetection sensors to detection concentrations of hazardous gases forsafety or to measure pollutants in the atmosphere), or other componentsthat may provide indications, measurements, or signals corresponding toa surrounding physical environment. The position components 1138 mayinclude location sensor components (e.g., a Global Position system (GPS)receiver component), altitude sensor components (e.g., altimeters orbarometers that detect air pressure from which altitude may be derived),orientation sensor components (e.g., magnetometers), and the like.

Communication may be implemented using a wide variety of technologies.The I/O components 1118 may include communication components 1140operable to couple the machine 1100 to a network 1132 or devices 1120via coupling 1122 and coupling 1124 respectively, For example, thecommunication components 1140 may include a network interface componentor other suitable device to interface with the network 1132. In furtherexamples, communication components 1140 may include wired communicationcomponents, wireless communication components, cellular communicationcomponents, Near Field Communication (NFC) components, Bluetooth®components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and othercommunication components to provide communication via other modalities.The devices 1120 may be another machine or any of a wide variety ofperipheral devices (e.g., a peripheral device coupled via a UniversalSerial Bus (USB)).

Moreover, the communication components 1140 may detect identifiers orinclude components operable to detect identifiers. For example, thecommunication components 1140 may include Radio Frequency Identification(RHD) tag reader components, NFC smart tag detection components, opticalreader components (e.g., an optical sensor to detect one-dimensional barcodes such as Universal Product Code (UPC) bar code, multi-dimensionalbar codes such as Quick Response (QR) code, Aztec code, Data Matrix,Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and otheroptical codes), or acoustic detection components (e.g., microphones toidentify tagged audio signals). In addition, a variety of informationmay be derived via the communication components 1140, such as, locationvia Internet Protocol (IP) geo-location, location via Wi-Fi® signaltriangulation, location via detecting a NEC beacon signal that mayindicate a particular location, and so forth.

Glossary

“CARRIER SIGNAL” in this context refers to any intangible medium that iscapable of storing, encoding, or carrying instructions for execution bythe machine, and includes digital or analog communications signals orother intangible medium to facilitate communication of suchinstructions. Instructions may be transmitted or received over thenetwork using a transmission medium via a network interface device andusing any one of a number of well-known transfer protocols.

“CLIENT DEVICE” in this context refers to any machine that interfaces toa communications network to obtain resources from one or more serversystems or other client devices. A client device may be, but is notlimited to, a mobile phone, desktop computer, laptop, portable digitalassistants (PDAs), smart phones, tablets, ultra books, netbooks,laptops, multi-processor systems, microprocessor-based or programmableconsumer electronics, game consoles, set-top boxes, or any othercommunication device that a user may use to access a network.

“COMMUNICATIONS NETWORK” in this context refers to one or more portionsof a network that may be an ad hoc network, an intranet, an extranet, avirtual private network (VPN), a local area network (LAN), a wirelessLAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), ametropolitan area network (MAN), the Internet, a portion of theInternet, a portion of the Public Switched Telephone Network (PSTN), aplain old telephone service (POTS) network, a cellular telephonenetwork, a wireless network, a Wi-Fi® network, another type of network,or a combination of two or more such networks. For example, a network ora portion of a network may include a wireless or cellular network andthe coupling may be a Code Division Multiple Access (CDMA) connection, aGlobal System for Mobile communications (GSM) connection, or other typeof cellular or wireless coupling n this example, the coupling mayimplement any of a variety of types of data transfer technology, such asSingle Carrier Radio Transmission Technology (1xRTT), Evolution-DataOptimized (EVDO) technology, General Packet Radio Service (GPRS)technology, Enhanced Data rates for GSM Evolution (EDGE) technology,third Generation Partnership Project (3GPP) including 3G, fourthgeneration wireless (4G) networks, Universal Mobile TelecommunicationsSystem (UMTS), High Speed Packet Access (HSPA), WorldwideInteroperability for Microwave Access (WIMAX), Long Term Evolution (LTE)standard, others defined by various standard setting organizations,other long range protocols, or other data transfer technology.

“EMPHEMERAL MESSAGE” in this context refers to a message that isaccessible for a time-limited duration. An ephemeral message may be atext, an image, a video and the like. The access time for the ephemeralmessage may be set by the message sender. Alternatively, the access timemay be a default setting or a setting specified by the recipient.Regardless of the setting technique, the message is transitory.

“MACHINE-READABLE MEDIUM” in this context refers to a component, deviceor other tangible media able to store instructions and data temporarilyor permanently and may include, but is not be limited to, random-accessmemory (RAM), read-only memory (ROM), buffer memory, flash memory,optical media, magnetic media, cache memory, other types of storage(e.g., Erasable Programmable Read-Only Memory (EEPROM)) and/or anysuitable combination thereof. The term “machine-readable medium” shouldbe taken to include a single medium or multiple media (e.g., acentralized or distributed database, or associated caches and servers)able to store instructions. The term “machine-readable medium” shallalso be taken to include any medium, or combination of multiple media,that is capable of storing instructions (e.g., code) for execution by amachine, such that the instructions, when executed by one or moreprocessors of the machine, cause the machine to perform any one or moreof the methodologies described herein. Accordingly, a “machine-readablemedium” refers to a single storage apparatus or device, as well as“cloud-based” storage systems or storage networks that include multiplestorage apparatus or devices. The term “machine-readable medium”excludes signals per se.

“COMPONENT” in this context refers to a device, physical entity or logichaving boundaries defined by function or subroutine calls, branchpoints, application program interfaces (APIs), or other technologiesthat provide for the partitioning or modularization of particularprocessing or control functions. Components may be combined via theirinterfaces with other components to carry out a machine process. Acomponent may be a packaged functional hardware unit designed for usewith other components and a part of a program that usually performs aparticular function of related functions. Components may constituteeither software components (e.g., code embodied on a machine-readablemedium) or hardware components. A “hardware component” is a tangibleunit capable of performing certain operations and may be configured orarranged in a certain physical manner. In various example embodiments,one or more computer systems (e.g., a standalone computer system, aclient computer system, or a server computer system) or one or morehardware components of a computer system (e.g., a processor or a groupof processors) may be configured by software (e.g., an application orapplication portion) as a hardware component that operates to performcertain operations as described herein. A hardware component may also beimplemented mechanically, electronically, or any suitable combinationthereof. For example, a hardware component may include dedicatedcircuitry or logic that is permanently configured to perform certainoperations. A hardware component may be a special-purpose processor,such as a Field-Programmable Gate Array (FPGA) or an ApplicationSpecific Integrated Circuit (ASIC). A hardware component may alsoinclude programmable logic or circuitry that is temporarily configuredby software to perform certain operations. For example, a hardwarecomponent may include software executed by a general-purpose processoror other programmable processor. Once configured by such software,hardware components become specific machines (or specific components ofa machine) uniquely tailored to perform the configured functions and areno longer general-purpose processors. It will be appreciated that thedecision to implement a hardware component mechanically, in dedicatedand permanently configured circuitry, or in temporarily configuredcircuitry (e.g., configured by software) may be driven by cost and timeconsiderations. Accordingly, the phrase “hardware component”(or“hardware-implemented component”) should be understood to encompass atangible entity, be that an entity that is physically constructed,permanently configured (e.g., hardwired), or temporarily configured(e.g., programmed) to operate in a certain manner or to perform certainoperations described herein. Considering embodiments in which hardwarecomponents are temporarily configured (e.g., programmed), each of thehardware components need not be configured or instantiated at any oneinstance in time. For example, where a hardware component comprises ageneral-purpose processor configured by software to become aspecial-purpose processor, the general-purpose processor may beconfigured as respectively different special-purpose processors (e.g.,comprising different hardware components) at different times. Softwareaccordingly configures a particular processor or processors, forexample, to constitute a particular hardware component at one instanceof time and to constitute a different hardware component at a differentinstance of time. Hardware components can provide information to, andreceive information from, other hardware components. Accordingly, thedescribed hardware components may be regarded as being communicativelycoupled. Where multiple hardware components exist contemporaneously,communications may be achieved through signal transmission (e.g., overappropriate circuits and buses) between or among two or more of thehardware components, in embodiments in which multiple hardwarecomponents are configured or instantiated at different times,communications between such hardware components may be achieved, forexample, through the storage and retrieval of information in memorystructures to which the multiple hardware components have access. Forexample, one hardware component may perform an operation and store theoutput of that operation in a memory device to which it iscommunicatively coupled. A further hardware component may then, at alater time, access the memory device to retrieve and process the storedoutput. Hardware components may also initiate communications with inputor output devices, and can operate on a resource (e.g., a collection ofinformation). The various operations of example methods described hereinmay be performed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implementedcomponents that operate to perform one or more operations or functionsdescribed herein. As used herein, “processor-implemented component”refers to a hardware component implemented using one or more processors.Similarly, the methods described herein may be at least partiallyprocessor-implemented, with a particular processor or processors beingan example of hardware. For example, at least some of the operations ofa method may be performed by one or more processors orprocessor-implemented components. Moreover, the one or more processorsmay also operate to support performance of the relevant operations in a“cloud computing” environment or as a “software as a service” (SaaS).For example, at least some of the operations may be performed by' agroup of computers (as examples of machines including processors), withthese operations being accessible via a network (e.g., the Internet) andvia one or more appropriate interfaces (e.g., an Application ProgramInterface (API)). The performance of certain of the operations may bedistributed among the processors, not only residing within a singlemachine, but deployed across a number of machines. In some exampleembodiments, the processors or processor-implemented components may belocated in a single geographic location (e.g., within a homeenvironment, an office environment, or a server farm). In other exampleembodiments, the processors or processor-implemented components may bedistributed across a number of geographic locations.

“PROCESSOR” in this context refers to any circuit or virtual circuit (aphysical circuit emulated by logic executing on an actual processor)that manipulates data values according to control signals (e.g.,“commands”, “op codes”, “machine code”, etc.) and which producescorresponding output signals that are applied to operate a machine. Aprocessor may, for example, be a Central Processing Unit (CPU), aReduced Instruction Set Computing (RISC) processor, a ComplexInstruction Set Computing (CISC) processor, a Graphics Processing Unit(GPU), a Digital Signal Processor (DSP), an Application SpecificIntegrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RTIC)or any combination thereof. A processor may further be a multi-coreprocessor having two or more independent processors (sometimes referredto as “cores”) that may execute instructions contemporaneously.

“TIMESTAMP” in this context refers to a sequence of characters orencoded information identifying when a certain event occurred, forexample giving date and time of day, sometimes accurate to a smallfraction of a second.

“LIFT” in this context is a measure of the performance of a targetedmodel at predicting or classifying cases as having an enhanced response(with respect to a population as a whole), measured against a randomchoice targeting model.

“PHONEME ALIGNMENT” in this context, a phoneme is a unit of speech thatdifferentiates one word from another. One phoneme may consist of asequence of closure, burst, and aspiration events; or, a dipthong maytransition from a back vowel to a front vowel. A speech signal maytherefore be described not only by what phonemes it contains, but alsothe locations of the phonemes. Phoneme alignment may therefore bedescribed as a “time-alignment” of phonemes in a waveform, in order todetermine an appropriate sequence and location of each phoneme in aspeech signal.

“AUDIO-TO-VISUAL CONVERSION” in this context refers to the conversion ofaudible speech signals into visible speech, wherein the visible speechmay include a mouth shape representative of the audible speech signal.

“TIME DELAYED NEURAL NETWORK (TDNN)” in this context, a TDNN is anartificial neural network architecture whose primary purpose is to workon sequential data. An example would be converting continuous audio intoa stream of classified phoneme labels for speech recognition.

“BI-DIRECTIONAL LONG-SHORT TERM MEMORY (BLSTM)” in this context refersto a recurrent neural network (RNN) architecture that remembers valuesover arbitrary intervals. Stored values are not modified as learningproceeds. RNNs allow forward and backward connections between neurons.BLSTM are well-suited for the classification, processing, and predictionof time series, given time lags of unknown size and duration betweenevents.

1. A method comprising: associating media content with a geo-fence, thegeo-fence encompassing a portion of a geographic region; retrievinglocation data from a client device, the location data comprising a setof points that identify a plurality of locations of the client deviceover a period of time; determining a smallest measure that encompassesthe set of points that identify the plurality of locations of the clientdevice; defining a boundary based on the smallest measure thatencompasses the set of points; detecting an intersection between theboundary and the geo-fence; retrieving the media content associated withthe geo-fence responsive to the detecting the intersection between theboundary and the geo-fence; and causing display of the media content ata memory location of the client device.
 2. The method of claim 1,wherein the retrieving the location data from the client device furthercomprises: receiving a designated input at the client device; andretrieving the location data from the client device in response to thedesignated input.
 3. The method of claim 1, wherein the retrieving thelocation client device further comprises: defining a sampling period,the sampling period including a sampling interval; and retrieving thelocation data from the client device based on the sampling interval. 4.The method of claim 1, wherein the defining the boundary based on thesmallest measure includes: generating a bounding box based on the set ofpoints that identify plurality of locations of the client device.
 5. Themethod of claim 1, wherein the defining the boundary based on the set ofpoints that identify the plurality of locations includes: generating aconvex hull based on the set of points that identify the plurality oflocations.
 6. The method of claim 1, wherein the defining the boundarybased on the set of points that identify the plurality of locationsincludes: averaging the location data; identifying an average locationof the client device based on the averaging the location data; andgenerating the boundary based on the average location.
 7. The method ofclaim 1, wherein the loading the media content at memory location of theclient device includes: presenting a representation of the media contentwithin a media gallery at the client device.
 8. The method of claim 1,wherein the loading the media content at the memory location of theclient device includes: presenting the media content in an ephemeralmessage at the client device.
 9. A system comprising: a memory; and atleast one hardware processor coupled to the memory and comprisinginstructions that causes the system to perform operations comprising:associating media content with a geo-fence, the geo-fence encompassing aportion of a geographic region; retrieving location data from a clientdevice, the location data comprising a set of points that identify aplurality of locations of the client device over a period of time;determining a smallest measure that encompasses the set of points thatidentify plurality of locations of the client device; defining aboundary based on the smallest measure that encompasses the set ofpoints; detecting an intersection between the boundary and thegeo-fence; retrieving the media content associated with the geo-fenceresponsive to the detecting the intersection between the boundary andthe geo-fence; and causing display of the media content at a memorylocation of the client device.
 10. The system of claim 9, wherein theretrieving the location data from the client device further comprises:receiving a designated input at the client device; and retrieving thelocation data from the client device in response to the designatedinput.
 11. The system of claim 9, wherein the retrieving the locationdata from the client device further comprises: defining a samplingperiod, the sampling period including a sampling interval; andretrieving the location data from the client device based on thesampling interval.
 12. The system of claim 9, wherein the defining theboundary based on the set of points that identify the plurality oflocations includes: generating a convex hull based on the set of pointsthat identify the plurality of locations.
 13. The system of claim 9,wherein the defining the boundary based on the set of points thatidentify the plurality of locations includes: averaging the locationdata; identifying an average location of the client device based on theaveraging the location data; and generating the boundary based on theaverage location.
 14. The system of claim 9, wherein the defining theboundary based on the plurality of locations identified by the locationdata includes: averaging the location data; identifying an averagelocation of the client device based on the averaging the location data;and generating the boundary based on the average location.
 15. Thesystem of claim 9, wherein the loading the media content at the memorylocation of the client device includes: presenting a representation ofthe media content within a media gallery at the client device.
 16. Thesystem of claim 9, wherein the loading the media content at the memorylocation of the client device includes: presenting the media content inan ephemeral message at the client device.
 17. A non-transitorymachine-readable storage medium comprising instructions that, whenexecuted by one or more processors of a machine, cause the machine toperform operations comprising: associating media, content with ageo-fence, the geo-fence encompassing a portion of a geographic region;retrieving location data from a client device, the location datacomprising a set of points that identify a plurality of locations of theclient device over a period of time; determining a smallest measure thatencompasses the set of points that identify the plurality of locationsof the client device; defining a boundary based on the smallest measurethat encompasses the set of points; detecting an intersection betweenthe boundary and the geo-fence; retrieving the media content associatedwith the geo-fence responsive to the detecting the intersection betweenthe boundary and the geo-fence; and causing display of the media contentat a memory location of the client device.
 18. The non-transitorymachine-readable storage medium of claim 17, wherein the retrieving thelocation data from the client device further comprises: receiving adesignated input at the client device; and retrieving the location datafrom the client device in response to the designated input.
 19. Thenon-transitory machine-readable storage medium of claim 17, wherein theretrieving the location data from the client device further comprises:defining a sampling period, the sampling period including a samplinginterval; and retrieving the location data from the client device basedon the sampling interval.
 20. The non-transitory machine-readablestorage medium of claim 17, wherein the defining the boundary based onthe set of points that identify the plurality of locations includes:generating a convex hull based on the set of points that identify theplurality of locations.