User-Defined Coverage of Media-Player Devices on Online Social Networks

ABSTRACT

In one embodiment, a method includes receiving an authentication key broadcasted from a media-player device at the client system which is within a wireless communication range of the media-player device, wherein the media-player device comprises a plurality of antennas, verifying the authentication key by the client system to register the user to the media-player device, and sending instructions from the client system to adjust a power level of each of the plurality of antennas, the instructions being determined based on broadcast signals received at the client system and on a respective position of the client system associated with each received broadcast signal, wherein the respective position of the client system is determined with respect to a position of the media-player device.

PRIORITY

This application is a continuation under 35 U.S.C. § 120 of U.S. patentapplication Ser. No. 15/925,616, filed 19 Mar. 2018, which is acontinuation under 35 U.S.C. § 120 of U.S. patent application Ser. No.15/240,910, filed 18 Aug. 2016, issued as U.S. Pat. No. 9,924,470, whichis a continuation under 35 U.S.C. § 120 of U.S. patent application Ser.No. 14/836,245, filed 26 Aug. 2015, issued as U.S. Pat. No. 9,425,869,each of which is incorporated herein by reference.

TECHNICAL FIELD

This disclosure generally relates to communicating with a media-playerdevice, particularly within the context of an online social network.

BACKGROUND

A social-networking system, which may include a social-networkingwebsite, may enable its users (such as persons or organizations) tointeract with it and with each other through it. The social-networkingsystem may, with input from a user, create and store in thesocial-networking system a user profile associated with the user. Theuser profile may include demographic information, communication-channelinformation, and information on personal interests of the user. Thesocial-networking system may also, with input from a user, create andstore a record of relationships of the user with other users of thesocial-networking system, as well as provide services (e.g., wall posts,photo-sharing, event organization, messaging, games, or advertisements)to facilitate social interaction between or among users.

The social-networking system may send over one or more networks contentor messages related to its services to a mobile or other computingdevice of a user. A user may also install software applications on amobile or other computing device of the user for accessing a userprofile of the user and other data within the social-networking system.The social-networking system may generate a personalized set of contentobjects to display to a user, such as a newsfeed of aggregated storiesof other users connected to the user.

Social-graph analysis views social relationships in terms of networktheory consisting of nodes and edges. Nodes represent the individualactors within the networks, and edges represent the relationshipsbetween the actors. The resulting graph-based structures are often verycomplex. There can be many types of nodes and many types of edges forconnecting nodes. In its simplest form, a social graph is a map of allof the relevant edges between all the nodes being studied.

SUMMARY OF PARTICULAR EMBODIMENTS

In particular embodiments, a social-networking system may authenticate auser to a media-device player when the user's client system is proximateto the media-device player in order to enhance the user's media-viewingexperience. The media-player device may have social-networkingfunctionality, and may communicate with a social-networking system. Themedia-device player may be coupled—via a wired or wireless connection—toa display screen (e.g., television), and the media-device player mayprovide streaming media content (e.g., television shows, movies, music,music videos, or any other suitable media content) for display on thedisplay screen. As an example and not by way of limitation, themedia-player device may retrieve the media content for streaming, via awireless internet connection, directly from the content providers. Auser may be seamlessly and securely authenticated to the media-playerdevice based on a unique authentication key sent from the media-playerdevice and received at the application on the client system. Theauthentication key may be generated by a social-networking system andsent to the media-player device, which, in turn, sends theauthentication key to a user's client system that is in range of themedia-player device's broadcast. An application on the user's clientsystem may communicate with the social-networking system in order toverify that the authentication key is correct (i.e., not spoofed), and,in response to this verification, may send location information of theuser's client system (e.g., location data acquired via GlobalPositioning System (GPS) functionality) and social-networkinginformation of the user. The media-device player may then authenticatethe user to the media-player device. As an example and not by way oflimitation, the first user to be authenticated to a media-player devicemay be registered as the owner of the media-player device. The firstuser may then dictate, via settings of the media-player device, whichother users may be authenticated as guest users when in range of themedia-player device.

In particular embodiments, a range of each antenna of a media-playerdevice may be adjusted based on the signal strengths of broadcastsignals received from the antennas at an application running on a clientsystem. As an example and not by way of limitation, a user who isauthenticated to the media-player device (e.g., the owner) may initiatean application running on the user's client system in order to definethe range of coverage of the media-player device. The application mayreceive broadcast signals from the antennas of the media-player deviceas the user walks around boundaries of a desired range of coverage(e.g., the perimeter of a room in which the media-player device islocated). The application may determine the orientation of the clientsystem with respect to the media-player device and, at various positionsin the room, a signal strength of a broadcast signal received at theclient system from an antenna of the media-player device. Theapplication running on the user's client system may determine adjustedoutput power levels for the antennas based on the determined signalstrengths. The application may send instructions to the media-playerdevice to adjust the output power level of each antenna of themedia-player device to the adjusted output power levels. In this manner,the user may set the desired range of coverage for the media-playerdevice via the application running on the user's client system.

The embodiments disclosed above are only examples, and the scope of thisdisclosure is not limited to them. Particular embodiments may includeall, some, or none of the components, elements, features, functions,operations, or steps of the embodiments disclosed above. Embodimentsaccording to the invention are in particular disclosed in the attachedclaims directed to a method, a storage medium, a system and a computerprogram product, wherein any feature mentioned in one claim category,e.g., method, can be claimed in another claim category, e.g., system, aswell. The dependencies or references back in the attached claims arechosen for formal reasons only. However any subject matter resultingfrom a deliberate reference back to any previous claims (in particularmultiple dependencies) can be claimed as well, so that any combinationof claims and the features thereof are disclosed and can be claimedregardless of the dependencies chosen in the attached claims. Thesubject-matter which can be claimed comprises not only the combinationsof features as set out in the attached claims but also any othercombination of features in the claims, wherein each feature mentioned inthe claims can be combined with any other feature or combination ofother features in the claims. Furthermore, any of the embodiments andfeatures described or depicted herein can be claimed in a separate claimand/or in any combination with any embodiment or feature described ordepicted herein or with any of the features of the attached claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example network environment associated with asocial-networking system.

FIG. 2 illustrates an example social graph.

FIG. 3 illustrates an example media-player device environment associatedwith a social-networking system.

FIG. 4A illustrates an example view of a prompt to authenticate with amedia-player device displayed on a client system.

FIG. 4B illustrates an example view of a prompt to register with amedia-player device displayed on a client system.

FIG. 5 illustrates an example media-player device.

FIG. 6 illustrates example user-defined ranges of media-player devices.

FIG. 7 illustrates an example method for registering a user as an ownerof a media-player device.

FIG. 8 illustrates an example method for sending instructions to adjustpower levels of antennas to a media-device player.

FIG. 9 illustrates an example computer system.

DESCRIPTION OF EXAMPLE EMBODIMENTS System Overview

FIG. 1 illustrates an example network environment 100 associated with asocial-networking system. Network environment 100 includes a clientsystem 130, a social-networking system 160, and a third-party system 170connected to each other by a network 110. Although FIG. 1 illustrates aparticular arrangement of client system 130, social-networking system160, third-party system 170, and network 110, this disclosurecontemplates any suitable arrangement of client system 130,social-networking system 160, third-party system 170, and network 110.As an example and not by way of limitation, two or more of client system130, social-networking system 160, and third-party system 170 may beconnected to each other directly, bypassing network 110. As anotherexample, two or more of client system 130, social-networking system 160,and third-party system 170 may be physically or logically co-locatedwith each other in whole or in part. Moreover, although FIG. 1illustrates a particular number of client systems 130, social-networkingsystems 160, third-party systems 170, and networks 110, this disclosurecontemplates any suitable number of client systems 130,social-networking systems 160, third-party systems 170, and networks110. As an example and not by way of limitation, network environment 100may include multiple client system 130, social-networking systems 160,third-party systems 170, and networks 110.

This disclosure contemplates any suitable network 110. As an example andnot by way of limitation, one or more portions of network 110 mayinclude an ad hoc network, an intranet, an extranet, a virtual privatenetwork (VPN), a local area network (LAN), a wireless LAN (WLAN), a widearea network (WAN), a wireless WAN (WWAN), a metropolitan area network(MAN), a portion of the Internet, a portion of the Public SwitchedTelephone Network (PSTN), a cellular telephone network, or a combinationof two or more of these. Network 110 may include one or more networks110.

Links 150 may connect client system 130, social-networking system 160,and third-party system 170 to communication network 110 or to eachother. This disclosure contemplates any suitable links 150. Inparticular embodiments, one or more links 150 include one or morewireline (such as for example Digital Subscriber Line (DSL) or Data OverCable Service Interface Specification (DOC SIS)), wireless (such as forexample Wi-Fi or Worldwide Interoperability for Microwave Access(WiMAX)), or optical (such as for example Synchronous Optical Network(SONET) or Synchronous Digital Hierarchy (SDH)) links. In particularembodiments, one or more links 150 each include an ad hoc network, anintranet, an extranet, a VPN, a LAN, a WLAN, a WAN, a WWAN, a MAN, aportion of the Internet, a portion of the PSTN, a cellulartechnology-based network, a satellite communications technology-basednetwork, another link 150, or a combination of two or more such links150. Links 150 need not necessarily be the same throughout networkenvironment 100. One or more first links 150 may differ in one or morerespects from one or more second links 150.

In particular embodiments, client system 130 may be an electronic deviceincluding hardware, software, or embedded logic components or acombination of two or more such components and capable of carrying outthe appropriate functionalities implemented or supported by clientsystem 130. As an example and not by way of limitation, a client system130 may include a computer system such as a desktop computer, notebookor laptop computer, netbook, a tablet computer, e-book reader, GPSdevice, camera, personal digital assistant (PDA), handheld electronicdevice, cellular telephone, smartphone, other suitable electronicdevice, or any suitable combination thereof. This disclosurecontemplates any suitable client systems 130. A client system 130 mayenable a network user at client system 130 to access network 110. Aclient system 130 may enable its user to communicate with other users atother client systems 130.

In particular embodiments, client system 130 may include a web browser132, such as MICROSOFT INTERNET EXPLORER, GOOGLE CHROME or MOZILLAFIREFOX, and may have one or more add-ons, plug-ins, or otherextensions, such as TOOLBAR or YAHOO TOOLBAR. A user at client system130 may enter a Uniform Resource Locator (URL) or other addressdirecting the web browser 132 to a particular server (such as server162, or a server associated with a third-party system 170), and the webbrowser 132 may generate a Hyper Text Transfer Protocol (HTTP) requestand communicate the HTTP request to server. The server may accept theHTTP request and communicate to client system 130 one or more Hyper TextMarkup Language (HTML) files responsive to the HTTP request. Clientsystem 130 may render a webpage based on the HTML files from the serverfor presentation to the user. This disclosure contemplates any suitablewebpage files. As an example and not by way of limitation, webpages mayrender from HTML files, Extensible Hyper Text Markup Language (XHTML)files, or Extensible Markup Language (XML) files, according toparticular needs. Such pages may also execute scripts such as, forexample and without limitation, those written in JAVASCRIPT, JAVA,MICROSOFT SILVERLIGHT, combinations of markup language and scripts suchas AJAX (Asynchronous JAVASCRIPT and XML), and the like. Herein,reference to a webpage encompasses one or more corresponding webpagefiles (which a browser may use to render the webpage) and vice versa,where appropriate.

In particular embodiments, social-networking system 160 may be anetwork-addressable computing system that can host an online socialnetwork. Social-networking system 160 may generate, store, receive, andsend social-networking data, such as, for example, user-profile data,concept-profile data, social-graph information, or other suitable datarelated to the online social network. Social-networking system 160 maybe accessed by the other components of network environment 100 eitherdirectly or via network 110. In particular embodiments,social-networking system 160 may include one or more servers 162. Eachserver 162 may be a unitary server or a distributed server spanningmultiple computers or multiple datacenters. Servers 162 may be ofvarious types, such as, for example and without limitation, web server,news server, mail server, message server, advertising server, fileserver, application server, exchange server, database server, proxyserver, another server suitable for performing functions or processesdescribed herein, or any combination thereof. In particular embodiments,each server 162 may include hardware, software, or embedded logiccomponents or a combination of two or more such components for carryingout the appropriate functionalities implemented or supported by server162. In particular embodiments, social-networking system 160 may includeone or more data stores 164. Data stores 164 may be used to storevarious types of information. In particular embodiments, the informationstored in data stores 164 may be organized according to specific datastructures. In particular embodiments, each data store 164 may be arelational, columnar, correlation, or other suitable database. Althoughthis disclosure describes or illustrates particular types of databases,this disclosure contemplates any suitable types of databases. Particularembodiments may provide interfaces that enable a client system 130, asocial-networking system 160, or a third-party system 170 to manage,retrieve, modify, add, or delete, the information stored in data store164.

In particular embodiments, social-networking system 160 may store one ormore social graphs in one or more data stores 164. In particularembodiments, a social graph may include multiple nodes—which may includemultiple user nodes (each corresponding to a particular user) ormultiple concept nodes (each corresponding to a particular concept)—andmultiple edges connecting the nodes. Social-networking system 160 mayprovide users of the online social network the ability to communicateand interact with other users. In particular embodiments, users may jointhe online social network via social-networking system 160 and then addconnections (e.g., relationships) to a number of other users ofsocial-networking system 160 to whom they want to be connected. Herein,the term “friend” may refer to any other user of social-networkingsystem 160 with whom a user has formed a connection, association, orrelationship via social-networking system 160.

In particular embodiments, social-networking system 160 may provideusers with the ability to take actions on various types of items orobjects, supported by social-networking system 160. As an example andnot by way of limitation, the items and objects may include groups orsocial networks to which users of social-networking system 160 maybelong, events or calendar entries in which a user might be interested,computer-based applications that a user may use, transactions that allowusers to buy or sell items via the service, interactions withadvertisements that a user may perform, or other suitable items orobjects. A user may interact with anything that is capable of beingrepresented in social-networking system 160 or by an external system ofthird-party system 170, which is separate from social-networking system160 and coupled to social-networking system 160 via a network 110.

In particular embodiments, social-networking system 160 may be capableof linking a variety of entities. As an example and not by way oflimitation, social-networking system 160 may enable users to interactwith each other as well as receive content from third-party systems 170or other entities, or to allow users to interact with these entitiesthrough an application programming interfaces (API) or othercommunication channels.

In particular embodiments, a third-party system 170 may include one ormore types of servers, one or more data stores, one or more interfaces,including but not limited to APIs, one or more web services, one or morecontent sources, one or more networks, or any other suitable components,e.g., with which servers may communicate. A third-party system 170 maybe operated by a different entity from an entity operatingsocial-networking system 160. In particular embodiments, however,social-networking system 160 and third-party systems 170 may operate inconjunction with each other to provide social-networking services tousers of social-networking system 160 or third-party systems 170. Inthis sense, social-networking system 160 may provide a platform, orbackbone, which other systems, such as third-party systems 170, may useto provide social-networking services and functionality to users acrossthe Internet.

In particular embodiments, a third-party system 170 may include athird-party content object provider. A third-party content objectprovider may include one or more sources of content objects, which maybe communicated to a client system 130. As an example and not by way oflimitation, content objects may include information regarding things oractivities of interest to the user, such as, for example, movie showtimes, movie reviews, restaurant reviews, restaurant menus, productinformation and reviews, or other suitable information. As anotherexample and not by way of limitation, content objects may includeincentive content objects, such as coupons, discount tickets, giftcertificates, or other suitable incentive objects.

In particular embodiments, social-networking system 160 also includesuser-generated content objects, which may enhance a user's interactionswith social-networking system 160. User-generated content may includeanything a user can add, upload, send, or “post” to social-networkingsystem 160. As an example and not by way of limitation, a usercommunicates posts to social-networking system 160 from a client system130. Posts may include data such as status updates or other textualdata, location information, photos, videos, links, music or othersimilar data or media. Content may also be added to social-networkingsystem 160 by a third-party through a “communication channel,” such as anewsfeed or stream.

In particular embodiments, social-networking system 160 may include avariety of servers, sub-systems, programs, modules, logs, and datastores. In particular embodiments, social-networking system 160 mayinclude one or more of the following: a web server, action logger,API-request server, relevance-and-ranking engine, content-objectclassifier, notification controller, action log,third-party-content-object-exposure log, inference module,authorization/privacy server, search module, advertisement-targetingmodule, user-interface module, user-profile store, connection store,third-party content store, or location store. Social-networking system160 may also include suitable components such as network interfaces,security mechanisms, load balancers, failover servers,management-and-network-operations consoles, other suitable components,or any suitable combination thereof. In particular embodiments,social-networking system 160 may include one or more user-profile storesfor storing user profiles. A user profile may include, for example,biographic information, demographic information, behavioral information,social information, or other types of descriptive information, such aswork experience, educational history, hobbies or preferences, interests,affinities, or location. Interest information may include interestsrelated to one or more categories. Categories may be general orspecific. As an example and not by way of limitation, if a user “likes”an article about a brand of shoes the category may be the brand, or thegeneral category of “shoes” or “clothing.” A connection store may beused for storing connection information about users. The connectioninformation may indicate users who have similar or common workexperience, group memberships, hobbies, educational history, or are inany way related or share common attributes. The connection informationmay also include user-defined connections between different users andcontent (both internal and external). A web server may be used forlinking social-networking system 160 to one or more client systems 130or one or more third-party system 170 via network 110. The web servermay include a mail server or other messaging functionality for receivingand routing messages between social-networking system 160 and one ormore client systems 130. An API-request server may allow a third-partysystem 170 to access information from social-networking system 160 bycalling one or more APIs. An action logger may be used to receivecommunications from a web server about a user's actions on or offsocial-networking system 160. In conjunction with the action log, athird-party-content-object log may be maintained of user exposures tothird-party-content objects. A notification controller may provideinformation regarding content objects to a client system 130.Information may be pushed to a client system 130 as notifications, orinformation may be pulled from client system 130 responsive to a requestreceived from client system 130. Authorization servers may be used toenforce one or more privacy settings of the users of social-networkingsystem 160. A privacy setting of a user determines how particularinformation associated with a user can be shared. The authorizationserver may allow users to opt in to or opt out of having their actionslogged by social-networking system 160 or shared with other systems(e.g., third-party system 170), such as, for example, by settingappropriate privacy settings. Third-party-content-object stores may beused to store content objects received from third parties, such as athird-party system 170. Location stores may be used for storing locationinformation received from client systems 130 associated with users.Advertisement-pricing modules may combine social information, thecurrent time, location information, or other suitable information toprovide relevant advertisements, in the form of notifications, to auser.

Social Graphs

FIG. 2 illustrates example social graph 200. In particular embodiments,social-networking system 160 may store one or more social graphs 200 inone or more data stores. In particular embodiments, social graph 200 mayinclude multiple nodes—which may include multiple user nodes 202 ormultiple concept nodes 204—and multiple edges 206 connecting the nodes.Example social graph 200 illustrated in FIG. 2 is shown, for didacticpurposes, in a two-dimensional visual map representation. In particularembodiments, a social-networking system 160, client system 130, orthird-party system 170 may access social graph 200 and relatedsocial-graph information for suitable applications. The nodes and edgesof social graph 200 may be stored as data objects, for example, in adata store (such as a social-graph database). Such a data store mayinclude one or more searchable or queryable indexes of nodes or edges ofsocial graph 200.

In particular embodiments, a user node 202 may correspond to a user ofsocial-networking system 160. As an example and not by way oflimitation, a user may be an individual (human user), an entity (e.g.,an enterprise, business, or third-party application), or a group (e.g.,of individuals or entities) that interacts or communicates with or oversocial-networking system 160. In particular embodiments, when a userregisters for an account with social-networking system 160,social-networking system 160 may create a user node 202 corresponding tothe user, and store the user node 202 in one or more data stores. Usersand user nodes 202 described herein may, where appropriate, refer toregistered users and user nodes 202 associated with registered users. Inaddition or as an alternative, users and user nodes 202 described hereinmay, where appropriate, refer to users that have not registered withsocial-networking system 160. In particular embodiments, a user node 202may be associated with information provided by a user or informationgathered by various systems, including social-networking system 160. Asan example and not by way of limitation, a user may provide his or hername, profile picture, contact information, birth date, sex, maritalstatus, family status, employment, education background, preferences,interests, or other demographic information. In particular embodiments,a user node 202 may be associated with one or more data objectscorresponding to information associated with a user. In particularembodiments, a user node 202 may correspond to one or more webpages.

In particular embodiments, a concept node 204 may correspond to aconcept. As an example and not by way of limitation, a concept maycorrespond to a place (such as, for example, a movie theater,restaurant, landmark, or city); a website (such as, for example, awebsite associated with social-network system 160 or a third-partywebsite associated with a web-application server); an entity (such as,for example, a person, business, group, sports team, or celebrity); aresource (such as, for example, an audio file, video file, digitalphoto, text file, structured document, or application) which may belocated within social-networking system 160 or on an external server,such as a web-application server; real or intellectual property (suchas, for example, a sculpture, painting, movie, game, song, idea,photograph, or written work); a game; an activity; an idea or theory;another suitable concept; or two or more such concepts. A concept node204 may be associated with information of a concept provided by a useror information gathered by various systems, including social-networkingsystem 160. As an example and not by way of limitation, information of aconcept may include a name or a title; one or more images (e.g., animage of the cover page of a book); a location (e.g., an address or ageographical location); a website (which may be associated with a URL);contact information (e.g., a phone number or an email address); othersuitable concept information; or any suitable combination of suchinformation. In particular embodiments, a concept node 204 may beassociated with one or more data objects corresponding to informationassociated with concept node 204. In particular embodiments, a conceptnode 204 may correspond to one or more webpages.

In particular embodiments, a node in social graph 200 may represent orbe represented by a webpage (which may be referred to as a “profilepage”). Profile pages may be hosted by or accessible tosocial-networking system 160. Profile pages may also be hosted onthird-party websites associated with a third-party server 170. As anexample and not by way of limitation, a profile page corresponding to aparticular external webpage may be the particular external webpage andthe profile page may correspond to a particular concept node 204.Profile pages may be viewable by all or a selected subset of otherusers. As an example and not by way of limitation, a user node 202 mayhave a corresponding user-profile page in which the corresponding usermay add content, make declarations, or otherwise express himself orherself. As another example and not by way of limitation, a concept node204 may have a corresponding concept-profile page in which one or moreusers may add content, make declarations, or express themselves,particularly in relation to the concept corresponding to concept node204.

In particular embodiments, a concept node 204 may represent athird-party webpage or resource hosted by a third-party system 170. Thethird-party webpage or resource may include, among other elements,content, a selectable or other icon, or other inter-actable object(which may be implemented, for example, in JavaScript, AJAX, or PHPcodes) representing an action or activity. As an example and not by wayof limitation, a third-party webpage may include a selectable icon suchas “like,” “check-in,” “eat,” “recommend,” or another suitable action oractivity. A user viewing the third-party webpage may perform an actionby selecting one of the icons (e.g., “check-in”), causing a clientsystem 130 to send to social-networking system 160 a message indicatingthe user's action. In response to the message, social-networking system160 may create an edge (e.g., a check-in-type edge) between a user node202 corresponding to the user and a concept node 204 corresponding tothe third-party webpage or resource and store edge 206 in one or moredata stores.

In particular embodiments, a pair of nodes in social graph 200 may beconnected to each other by one or more edges 206. An edge 206 connectinga pair of nodes may represent a relationship between the pair of nodes.In particular embodiments, an edge 206 may include or represent one ormore data objects or attributes corresponding to the relationshipbetween a pair of nodes. As an example and not by way of limitation, afirst user may indicate that a second user is a “friend” of the firstuser. In response to this indication, social-networking system 160 maysend a “friend request” to the second user. If the second user confirmsthe “friend request,” social-networking system 160 may create an edge206 connecting the first user's user node 202 to the second user's usernode 202 in social graph 200 and store edge 206 as social-graphinformation in one or more of data stores 164. In the example of FIG. 2,social graph 200 includes an edge 206 indicating a friend relationbetween user nodes 202 of user “A” and user “B” and an edge indicating afriend relation between user nodes 202 of user “C” and user “B.”Although this disclosure describes or illustrates particular edges 206with particular attributes connecting particular user nodes 202, thisdisclosure contemplates any suitable edges 206 with any suitableattributes connecting user nodes 202. As an example and not by way oflimitation, an edge 206 may represent a friendship, family relationship,business or employment relationship, fan relationship (including, e.g.,liking, etc.), follower relationship, visitor relationship (including,e.g., accessing, viewing, checking-in, sharing, etc.), subscriberrelationship, superior/subordinate relationship, reciprocalrelationship, non-reciprocal relationship, another suitable type ofrelationship, or two or more such relationships. Moreover, although thisdisclosure generally describes nodes as being connected, this disclosurealso describes users or concepts as being connected. Herein, referencesto users or concepts being connected may, where appropriate, refer tothe nodes corresponding to those users or concepts being connected insocial graph 200 by one or more edges 206.

In particular embodiments, an edge 206 between a user node 202 and aconcept node 204 may represent a particular action or activity performedby a user associated with user node 202 toward a concept associated witha concept node 204. As an example and not by way of limitation, asillustrated in FIG. 2, a user may “like,” “attended,” “played,”“listened,” “cooked,” “worked at,” or “watched” a concept, each of whichmay correspond to an edge type or subtype. A concept-profile pagecorresponding to a concept node 204 may include, for example, aselectable “check in” icon (such as, for example, a clickable “check in”icon) or a selectable “add to favorites” icon. Similarly, after a userclicks these icons, social-networking system 160 may create a “favorite”edge or a “check in” edge in response to a user's action correspondingto a respective action. As another example and not by way of limitation,a user (user “C”) may listen to a particular song (“Imagine”) using aparticular application (SPOTIFY, which is an online music application).In this case, social-networking system 160 may create a “listened” edge206 and a “used” edge (as illustrated in FIG. 2) between user nodes 202corresponding to the user and concept nodes 204 corresponding to thesong and application to indicate that the user listened to the song andused the application. Moreover, social-networking system 160 may createa “played” edge 206 (as illustrated in FIG. 2) between concept nodes 204corresponding to the song and the application to indicate that theparticular song was played by the particular application. In this case,“played” edge 206 corresponds to an action performed by an externalapplication (SPOTIFY) on an external audio file (the song “Imagine”).Although this disclosure describes particular edges 206 with particularattributes connecting user nodes 202 and concept nodes 204, thisdisclosure contemplates any suitable edges 206 with any suitableattributes connecting user nodes 202 and concept nodes 204. Moreover,although this disclosure describes edges between a user node 202 and aconcept node 204 representing a single relationship, this disclosurecontemplates edges between a user node 202 and a concept node 204representing one or more relationships. As an example and not by way oflimitation, an edge 206 may represent both that a user likes and hasused at a particular concept. Alternatively, another edge 206 mayrepresent each type of relationship (or multiples of a singlerelationship) between a user node 202 and a concept node 204 (asillustrated in FIG. 2 between user node 202 for user “E” and conceptnode 204 for “SPOTIFY”).

In particular embodiments, social-networking system 160 may create anedge 206 between a user node 202 and a concept node 204 in social graph200. As an example and not by way of limitation, a user viewing aconcept-profile page (such as, for example, by using a web browser or aspecial-purpose application hosted by the user's client system 130) mayindicate that he or she likes the concept represented by the conceptnode 204 by clicking or selecting a “Like” icon, which may cause theuser's client system 130 to send to social-networking system 160 amessage indicating the user's liking of the concept associated with theconcept-profile page. In response to the message, social-networkingsystem 160 may create an edge 206 between user node 202 associated withthe user and concept node 204, as illustrated by “like” edge 206 betweenthe user and concept node 204. In particular embodiments,social-networking system 160 may store an edge 206 in one or more datastores. In particular embodiments, an edge 206 may be automaticallyformed by social-networking system 160 in response to a particular useraction. As an example and not by way of limitation, if a first useruploads a picture, watches a movie, or listens to a song, an edge 206may be formed between user node 202 corresponding to the first user andconcept nodes 204 corresponding to those concepts. Although thisdisclosure describes forming particular edges 206 in particular manners,this disclosure contemplates forming any suitable edges 206 in anysuitable manner.

Authenticating a User to a Media-Device Player

Particular embodiments facilitate the authentication of a user's clientsystem 130 to a media-device player or other suitablegeographic-positioning-capable devices or systems associated withsocial-networking system 160. As used herein, a media-player device maybe any device suitable for wirelessly communicating with any number ofclient systems proximate to the media-player device. A media-playerdevice may be communicatively-coupled, via a wireless or wiredconnection, to at least one display screen and able to communicatewirelessly with social-networking system 160. A media-player device maysend and receive wireless communications via, for example,radio-frequency identification, near-field communication, ultrasonicwaves, BLUETOOTH (e.g., short-range radio frequencies), BLUETOOTH lowenergy, or any other suitable wireless communication method,particularly short-range wireless communication methods (e.g., less thanapproximately 300 feet). Media-player devices may be touch-sensitive soas to detect when a user or client system makes contact with the surfaceof the media-player device and to authenticate a client system 130 tothe media-player device in response to the detected touch. Media-playerdevices may have any of the hardware or software features of the typesdescribed in U.S. patent application Ser. No. 14/460,886, titled“Bluetooth Crowd-Sourced Triangulation,” filed 15 Aug. 2014; U.S. patentapplication Ser. No. 14/460,880, titled “Bluetooth Transmission SecurityPattern,” filed 15 Aug. 2014; and U.S. patent application Ser. No.14/460,891, titled “Bluetooth Beacon Protocol,” filed 15 Aug. 2014; U.S.patent application Ser. No. 13/416,975, titled “Dynamic Processor DutyCycle Determination Based on Geographic Positioning Signals,” filed 9Mar. 2012; U.S. patent application Ser. No. 13/417,013, titled “LocationTracking for Geographic Positioning Capable Devices,” filed 9 Mar. 2012;and U.S. patent application Ser. No. 13/431,842, titled “DynamicGeographic Beacons for Geographic Positioning Capable Devices,” filed 27Mar. 2012, each of which is incorporated by reference herein. Amedia-player device may be able to communicate wirelessly with one ormore third-party content providers. Third-party content providers maybe, for example and not by way of limitation, owners and/or distributorsof media content (e.g., music and visual media content). When a user'sclient system 130 comes into range of a media-player device (e.g., aclient system 130 may be in range of a media-player device if it is inrange of at least one antenna of the media-player device and can receivea signal from the at least one antenna) or makes contact with themedia-player device (e.g., the user taps the media-player device withher client system 130), client system 130 may be authenticated to themedia-player device based on wireless communications between clientsystem 130 and the media-player device. Client system 130 may beautomatically authenticated to the media-player device in the backgroundor confirmation from the user (e.g., a response to a prompt displayedvia an application on the client system 130) may be required before theclient system 130 is authenticated to the media-player device. Althoughthis disclosure describes authenticating client system 130 to amedia-player device in a particular manner, this disclosure contemplatesestablishing any suitable authentication in any suitable manner.

In particular embodiments, the media-player device may have any suitablenumber of antennas (e.g., directional antennas) for sending andreceiving wireless communications. An application on a client system 130may be used to define a range of each of the antennas based on thestrength of signals received from the media-player device antennas atclient system 130. Although this disclosure describes defining the rangeof the antennas of a media-player device in a particular manner, thisdisclosure contemplates defining the range of the antennas of themedia-player device in any suitable manner.

FIG. 3 illustrates an example media-player device environment 300associated with a social-networking system 160. Media-player deviceenvironment 300 includes a media-player device 320, a display screen310, a client system 130, a social-networking system 160, and athird-party system 170, each connected to a network 110. Media-playerdevice 320 may be communicatively coupled to display screen 310 by awired or wireless connection. Client system 130 and social-networkingsystem 160 are shown as connected to each other by media-player device320. Although FIG. 3 illustrates a particular arrangement ofmedia-player device 320, display screen 310, client system 130,social-networking system 160, third-party system 170, and network 110,this disclosure contemplates any suitable arrangement of media-playerdevice 320, display screen 310, client system 130, social-networkingsystem 160, third-party system 170, and network 110. As an example andnot by way of limitation, client system 130 and social-networking system160 may be connected to each other directly, bypassing media-playerdevice 320 and network 110. As another example, media-player device 320and display screen 310 may be connected to each other via network 110.Although FIG. 3 illustrates one client system 130, any suitable numberof client systems 130 may be authenticated to media-player device 320.As described above, in connection with FIG. 1, links 150 may connectmedia-player device 320, display screen 310, client system 130,social-networking system 160, and third-party system 170 to network 110or to each other.

In particular embodiments, a user may be registered to a media-playerdevice 320 in response to client system 130 of the user beingauthenticated to media-player device 320. Media-player device 320 may besituated at a designated location within a place (e.g., a living room)of a user of social-networking system 160 or a third-party (e.g.,associated with third-party system 170). When media-player device 320 isfirst powered on (e.g., by the user who purchased media-player device320), it may automatically enter a discovery mode. While in discoverymode, media-player device 320 may broadcast a signal for a predeterminedperiod of time (e.g., a five-minute window). The broadcast signal maybe, as an example and not by way of limitation, an authentication keygenerated by social-networking system 160. In particular embodiments,when media-player device 320 enters discovery mode, it may send, tosocial-networking system 160, a request for an authentication key. Inparticular embodiments, when media-player device 320 detects that clientsystem 130 is within a wireless communication range of media-playerdevice 320 (i.e., a user associated with client system 130 moves intorange of media-player device 320), media-player device 320 may send, tosocial-networking system 160, a request for an authentication key.Social-networking system 160 may generate and send the authenticationkey to media-player device 320 in response to the request. Theauthentication key may be, as an example and not by way of limitation,an alphanumeric sequence or any suitable randomly-generated sequence.Media-player device 320 may send, to social-networking system 160, arequest for a new authentication key for each new broadcast. As anexample and not by way of limitation, for each unique broadcast (e.g.,each five-minute broadcast while media-player device 320 is in discoverymode) media-player device 320 may broadcast a different uniqueauthentication key retrieved from social-networking system 160.Media-player device 320 may broadcast the authentication key using, asan example and not by way of limitation, a short-range radio frequency(e.g., BLUETOOTH).

Client system 130 may receive the broadcast authentication key whenclient system 130 comes within range of media-player device 320 (e.g.,the range may encompass a particular room in the user's house). Inparticular embodiments, in order to receive the authentication key, anative application 330 associated with social-networking system 160 mustbe running on the user's client system 130, and the user of clientsystem 130 must be logged into an online social network via nativeapplication 330. Native application 330 may receive the authenticationkey sent from media-player device 320. As an example and not by way oflimitation, media-player device 320 may broadcast an authentication keyfor one or more predetermined time intervals, and native application 330running on client system 130 may receive the authentication key duringthe one or more predetermined time intervals. In particular embodiments,native application 330 may send the received authentication key tosocial-networking system 160 for verification. Because social-networkingsystem 160 generates the authentication key that is broadcast bymedia-player device 320 and received by native application 330 runningon client system 130, social-networking system 160 may verify theauthentication key sent to social-networking system 160 by client system130 (e.g., confirm that the authentication key sent by social-networkingsystem 160 to media-player device 320 is the same alphanumeric sequenceas the authentication key received by social-networking system 160 fromclient system 130). Thus, the authentication process is secure againstspoofing attacks, because both ends of the authentication process, thegeneration of the authentication key and the verification of theauthentication key by the native application 330, are associated withthe social-networking system 160.

In response to verifying the authentication key with social-networkingsystem 160, native application 330 may send location information ofclient system 130 and social-networking information of the user ofclient system 130 to media-player device 320. Location information mayinclude, as an example and not by way of limitation, locationinformation determined using GPS functionality or any other suitablegeographic-positioning functionality. As another example and not by wayof limitation, location information may be determined bysocial-networking system 160 based on social-networking actions taken bythe user (e.g., the user checked-in at a page or event associated with aplace at which the media-player is located). Social-networkinginformation of a user may include, for example and not by way oflimitation, demographic information (e.g., age, gender, nationality,race, ethnicity, and locality), biographic information (e.g., name,picture, birthday, and astrological sign), preferences (e.g., music,book, movie, and food preferences), payment credentials, purchasehistory, loyalty points or credits, allergies and other medicalinformation, social-graph information (e.g., social connections within athreshold degree of separation in social graph 200 and social-networkinginformation of those connections), any other information stored in aprofile of the user on social-networking system 160, any other suitableinformation pertaining to the user, or any combination thereof. Asanother example and not by way of limitation, the set ofsocial-networking information received by third-party system 170 mayinclude identifiers of one or more second users who are connected to afirst user of client system 130 in social graph 200 by a thresholddegree of separation (e.g., first-degree connections may be “friends” ofthe first user).

Media-player device 320 may register the user to media-player device 320based on the received location information of client system 130 andsocial-networking information of the user. In particular embodiments,media-player device 320 may only register the user to media-playerdevice 320 if the location information of the user's client system 130indicates that the user is within a threshold distance of media-playerdevice 320 (e.g., within 100 feet). In particular embodiments,media-player device 320 may identify the user based on the receivedsocial-networking information and may register the user to media-playerdevice 320 based on the determined identify of the user.

In particular embodiments, when media-player device 320 is first poweredon (e.g., connected to display screen 310), the first user to beauthenticated to media-player device 320 may be registered as the ownerof media-player device 320. One or more additional users ofsocial-networking system 160 may be registered as guest users ofmedia-player device 320. Once the first user's client system 130 isauthenticated to media-player device 320 and the user is registered asthe owner of media-player device 320, the first user may specify, insettings, one or more second users of social-networking system 160 whomay be registered as guest users of media-placer device 320 after theirrespective client systems 130 are each authenticated to media-playerdevice 320. In particular embodiments, the first user may be prompted(e.g., at the first user's client system 130) to confirm authenticationand/or registration of any second users before the authentication and/orregistration is completed. As an example and not by way of limitation, amedia-player device 320 may be registered to a first user—the registeredowner of the media-player device 320—and a second user's client system130 may come within range of media-player device 320. Media-playerdevice 320 may retrieve and broadcast an authentication key, asdescribed above, and an application 330 running on the client system 130of the second user may verify the authentication key withsocial-networking system 160. Client system 130 may then send locationinformation of the client system 130 of the second user andsocial-networking information of the second user to media-player device320. Media-player device 320 may determine, based on the locationinformation and the social-networking information of the second userwhether to register the second user to the media-player device 320. Inthe same example, the first user may specify in settings of media-playerdevice 320 that only first-degree connections in social graph 200 may beregistered as guest users to media-player device 320. Media-playerdevice 320 may determine, based on the social-networking information ofthe second user, that the second user is a first-degree connection ofthe first user in social graph 200 and may then register the second userto media-player device 320 as a guest user in accordance with thefirst-user's specified permissions.

In particular embodiments, the particular set of social-networkinginformation of a user that is sent to media-player device 320 may besubject to a set of permissions (e.g., privacy preferences) specified bythe user or other restrictions imposed by the online social network. Thesocial-networking information of a user may be automatically shared withmedia-player device 320 in accordance with a user-specified set ofpermissions. The set of permissions may permit sharing of certainsocial-networking information of the user based on social-graphinformation (e.g., connections within a threshold degree of separation).As an example and not by way of limitation, the set of permissions mayallow a set of social-networking information to be sent to media-playerdevice 320 based on a degree of separation in social graph 200 between anode corresponding to a first user (i.e., registered owner) ofmedia-player device 320 and a node corresponding to a second user.

In particular embodiments, once a user has been registered to amedia-player device 320, media-player device 320 may tailor thedisplayed content of media-player device 320 to the registered user. Thesocial-networking information of the registered user may be used by themedia-player device to customize content (e.g., retrieved from one ormore third-party content providers) for display to the registered user(e.g., via one or more display screens 310 communicatively coupled tothe media-player device), as described in U.S. patent application Ser.No. 14/836,300, titled “Customizing Media Content on Online SocialNetworks,” filed 26 Aug. 2015, which is incorporated by referenceherein.

In particular embodiments, media-player device 320 may providecustomized media content for display to the user (e.g., via displayscreen 310) if the user is registered to media-player device 320 and theuser's client system 130 is in proximity to a media-player device 320(e.g., in the same room as media-player device 320). In particularembodiments, media-player device 320 may provide customized mediacontent for display to the user if the user is registered tomedia-player device 320 and the user's client system 130 is in an activewireless connection with media-player device 320 (e.g., client system130 and media-player device 320 are paired via a BLUETOOTH connection).In particular embodiments, media-player device 320 may retrieve mediacontent from one or more third-party content providers (e.g., anadvertiser or a subscription-based media-content provider) and maydetermine what of the retrieved content is displayed to the user viadisplay screen 310 based on social-networking information of the user. Aclient system 130 may be authenticated to and a user may be registeredto media-player device 320 using any of the techniques described in U.S.patent application Ser. No. 14/836,206, titled “Authenticating Users toMedia-Player Devices on Online Social Networks,” filed 26 Aug. 2015,which is incorporated by reference herein.

Prompts and Confirmation

In particular embodiments, the process of authenticating and registeringa client system and user to media-player device 320 may be seamless(i.e., it may not require any user input in order for the user's clientsystem 130 to be authenticated to or for a user to be registered tomedia-player device 320). In particular embodiments, as described inconnection with FIGS. 4A-4B, user input responding to a prompt may berequired in order to complete the authentication of the client systemand/or the registration of the user to media-player device 320.

FIG. 4A illustrates an example view 400A of a prompt 410 to authenticatewith a media-player device 320 displayed on a client system 130. Inparticular embodiments, the authentication key being received by nativeapplication 330 causes native application 330 to provide prompt 410 fordisplay at an interface of client system 130. Prompt 410 may be arequest for confirmation of authentication of client system 130 of theuser to media-player device 320. The requested confirmation may be, asan example and not by way of limitation, a binary answer to a questionposed by the prompt (e.g., “yes” or “no” in response to a request toregister the user to media-player device 320). The requestedconfirmation may be inputted by the user at the client system 130. Whenthe requested authentication is received at native application 330,native application 330 may complete the authentication process byverifying the received authentication key with social-networking system160.

In particular embodiments, when prompt 410 is displayed at client system130, media-player device 320 may cause an authentication screen to bedisplayed simultaneously at display screen 310. The authenticationscreen may provide, as an example and not by way of limitation,instructions to authenticate via prompt 410 at client system 130 or toenter a code or other credential at media-player device 320. The codemay be, as an example and not by way of limitation, received at nativeapplication 330.

In particular embodiments, a user may specify, in settings, whether ornot and how a prompt 410 may be displayed. As an example and not by wayof limitation, native application 330 may be associated withsocial-networking system 160, and prompt 410 may be displayed in aninterface of native application 330 (e.g., in news feed 420). Althoughdescribed and depicted in a particular way, it will be understood thatthis is by way of illustration not by way of limitation, and prompt 410may be any suitable type of prompt. As an example and not by way oflimitation, prompt 410 may be a push notification provided on a lockscreen of client system 130 or hovering over any suitable screen ofclient system 130. As another example and not by way of limitation,prompt 410 may be a type of reaction card, which may be presented to auser, of the type described in U.S. patent application Ser. No.14/466,269, titled “Generating Cards in Response to User Actions onOnline Social Networks” filed 22 Aug. 2014, which is incorporated hereinby reference.

FIG. 4B illustrates an example view 400B of a prompt 430 to authenticatewith a media-player device 320 displayed on a client system 130. Inparticular embodiments, the authentication key being verified by nativeapplication 330 causes native application 330 to provide prompt 430 fordisplay at an interface of client system 130. The user of client system130 may be registered as an owner of the media-player device 320 inresponse to the requested confirmation (i.e., requested by prompt 430)being inputted to the native application 330 by the user of clientsystem 130. As described above, prompt 430 may be any suitable prompt,including, for example, a push notification. As another example and notby way of limitation, prompt 430 may be a message provided in amessaging application running on client system 130 (e.g., a messagingapplication associated with social-networking system 160). In thismanner, a user of client system may confirm the authentication bysending a message in response to a message (e.g., prompt 430) in amessage thread hosted by a messaging application running on the user'sclient system 130.

Although this disclosure describes and illustrates particularembodiments of FIGS. 4A-4B as being implemented by media-player device320, this disclosure contemplates any suitable embodiments of FIGS.4A-4B occurring on any suitable interface and as being implemented byany suitable platform or system. As an example, and not by way oflimitation, particular embodiments of FIGS. 4A-4B may be implemented byclient system 130. Furthermore, although this disclosure describes andillustrates particular components, devices, or systems carrying outparticular steps of the method of FIGS. 4A-4B, this disclosurecontemplates any suitable combination of any suitable components,devices, or systems carrying out any suitable steps of the method ofFIGS. 4A-4B.

Defining the Coverage of a Media-Player Device

Once a user has been registered as an owner of media-player device 320,the user may define the range of media-player device 320. As an exampleand not by way of limitation, an application on a client system 130 ofthe user may communicate with antennas of media-player device 320 overBLUETOOTH in order to set a range of coverage of media-player device320. Particular arrangements of antennas on a media-player device 320and calibration of these antennas based on communications with anapplication on a user's client system 130 are described below inconnection with FIGS. 5-6.

FIG. 5 illustrates an example media-player device 320. Media-playerdevice 320 may include any suitable number of antennas 510A, 510B, 510C,and 510D arranged in any suitable pattern on media-player device 320. Inthe illustrated example of FIG. 5, media-player device 320 has fourantennas 510A, 510B, 510C, and 510D arranged such that one antenna ispositioned at each corner of media-player device 320. Antennas 510A,510B, 510C, and 510D may be any suitable types of antennas, including,for example, directional antennas. Although media-player device 320 isillustrated and described as having a certain number of antennas 510A,510B, 510C, and 510D, it will be understood that media-player device 320may include any suitable number of antennas 510A, 510B, 510C, and 510D.In particular embodiments, media-player device 320 may have a fifthantenna, which may be a bidirectional antenna or a directional antenna.In particular embodiments, media-player device 320 may have an array ofantennas and may use beamforming techniques.

Antennas 510A, 510B, 510C, and 510D may have respective ranges 520A,520B, 520C, and 520D. In other words, antennas 510A, 510B, 510C, and510D may generate signals (e.g., BLUETOOTH signals) that have arespective range 520A, 520B, 520C, and 520D. In particular embodiments,one or more of antennas 510A, 510B, 510C, and 510D may generate aradiation pattern in a first plane (e.g., the first plane mayhorizontally bisect media-player device 320), and the radiation patternmay radiate in substantially 360-degrees of the first plane. As anexample and not by way of limitation, the radiation pattern may providecoverage for the major part of a room in which the media-player device320 is situated (e.g., 30 feet in every direction on the first plane).In particular embodiments, media-player device 320 may have a fifthantenna that is positioned on media-player device 320 such that itgenerates a radiation pattern that radiates in a second plane, where thesecond plane is substantially perpendicular to the first plane. As anexample and not by way of limitation, antennas 510A, 510B, 510C, and510D may be directional antennas that radiate in a plane horizontal tothe ground, whereas the fifth antenna may be a bidirectional antennathat radiates in a plane perpendicular to the ground.

In particular embodiments, a user registered as an owner of media-playerdevice 320 may, by an application running on the user's client system130, define a range 520A, 520B, 520C, and 520D of each antenna 510A,510B, 510C, and 510D. Once a user is registered to media-player device320, a client system 130 of the user may send to the media-player device320, an indication that the user is logged into the online socialnetwork via a native application 330 associated with the online socialnetwork 160. Client system 130 may send this indication when clientsystem 130 is within range of at least one of the antennas 510A, 510B,510C, and 510D of the media-player device 320. In response to receivingthis indication, media-player device 320 may enter a calibration modeand set a power level of each of antennas 510A, 510B, 510C, and 510D toa maximum power level. Client system 130 may determine an orientationposition of client system 130 with respect to media-player device 320.The orientation position may be determined based on one or morebroadcast signals received from one or more of antennas 510A, 510B,510C, and 510D of media-player device 320. As an example and not by wayof limitation, client system 130 may determine that it has receivedbroadcast signals only from antenna 510A and thus that it is in range520A with respect to media-player device 320.

After the orientation position has been determined by client system 130,the user may walk a perimeter of a desired zone of coverage (e.g., anarea to be covered by the combined ranges 520A, 520B, 520C, and 520D)with his client system 130, where the perimeter is defined by anysuitable number of boundary positions on the user's walk. Client system130 may be in calibration mode, listening for broadcast signals fromantennas 510A, 510B, 510C, and 510D. Client system 130 may receive, frommedia-player device 320, at any suitable number of boundary positions,broadcast signals from one or more of antennas 510A, 510B, 510C, and510D. Each boundary position may be in at least one of the ranges 520A,520B, 520C, and 520D, and when client system 130 is in a particularrange 520A, 520B, 520C, or 520D, it may receive a broadcast signal fromthe respective antenna 510A, 510B, 510C, or 510D. In particularembodiments, client system 130 receives at least one signal from atleast one antenna 510A, 510B, 510C, and 510D while at a boundaryposition within the respective at least one range 520A, 520B, 520C, or520D.

Client system 130 may calculate a signal strength for each of thereceived signals (e.g., a relative signal strength index (RSSI) value)using any suitable technique. Client system 130 may then determine, foreach calculated RSSI value and for the particular make and model ofclient system 130, an output power level (e.g., in decibels (dB)) forthe respective antenna from which each broadcast signal was received. Inparticular embodiments, client system 130 may transmit the determinedRSSI values to social-networking system 160. Social-networking system160 may have previously determined the make and model of client system130 (e.g., IPHONE 5S) when native application 330 was downloaded toclient system 130, so the signal strength for the particular clientsystem 130 at various distances is known. Social-networking system 160may use this information to create a device-to-antenna characterizationplot. Social-networking system 160 may then correlate the RSSI values tooutput power levels for each of the antennas 510A, 510B, 510C, or 510Dof media-player device 320 based on the device-to-antennacharacterization plot for the particular make and model of client system130.

Client system 130 may determine a low power level for a particularantenna 510A, 510B, 510C, or 510D when the determined signal strengthsof broadcast signals received at boundary positions of client system 130in range 520A, 520B, 520C, or 520D of the particular antenna being highvalues. Similarly, client system 130 may determine a high power levelfor a particular antenna 510A, 510B, 510C, or 510D when the determinedsignal strengths of broadcast signals received at boundary positions ofclient system 130 in range 520A, 520B, 520C, or 520D of the particularantenna being low values. The determined power levels may each be basedon a lowest determined signal strength value for the respective antenna510A, 510B, 510C, and 510D. As an example and not by way of limitation,client system 130 may receive more than one broadcast signal fromantenna 510A while at one or more boundary positions within range 520Aof antenna 510A, and client system 130 may determine signal strengthsfor each of those received broadcast signals. Client system 130 maydetermine the power level based on the lowest of the determined signalstrengths. In particular embodiments, if no signal is received from oneor more of antennas 510A, 510B, 510C, and 510D, meaning no signalsstrengths are determined for broadcast signals received from one or moreof antennas 510A, 510B, 510C, and 510D, client system 130 may determinea power level of zero for the one or more antennas 510A, 510B, 510C, and510D.

Client system 130 may then send, to media-player device 320,instructions to adjust a power level of each of antennas 510A, 510B,510C, and 510D based on the determined signal strengths. Media-playerdevice 320 may, in response to the instructions received from clientsystem 130, adjust the power levels of antennas 510A, 510B, 510C, and510D to define a range of broadcast of the antennas 510A, 510B, 510C,and 510D based on the orientation position and the boundary positions ofthe client system. Although described as defining the range of broadcastfor four antennas 510A, 510B, 510C, and 510D, the user may, by way ofclient system 130, define the range for each of any suitable number ofantennas.

Although this disclosure describes and illustrates particularembodiments of FIG. 5 as being implemented by client system 130, thisdisclosure contemplates any suitable embodiments of FIG. 5 occurring onany suitable interface and as being implemented by any suitable platformor system. As an example, and not by way of limitation, particularembodiments of FIG. 5 may be implemented by a native application runningon client system 130. Furthermore, although this disclosure describesand illustrates particular components, devices, or systems carrying outparticular steps of the method of FIG. 5, this disclosure contemplatesany suitable combination of any suitable components, devices, or systemscarrying out any suitable steps of the method of FIG. 5.

FIG. 6 illustrates example user-defined ranges 630A and 630B ofmedia-player devices 620A and 620B. Media-player device 620A is shown asbeing located within room 600A and connected, by a wired or wirelessconnection, to display screen 610A. Media-player device 620B is shown asbeing located within room 600B and connected, by a wired or wirelessconnection, to display screen 610B. Ranges 630A and 630B may correspondto the perimeters walked by the respective users of media-player devices620A and 620B. By defining the perimeter of the rooms 600A and 600B asdescribed above in connection with FIG. 5, undesired overlap betweensignals emanating from media-player device 620A and signals emanatingfrom media-player device 620B may be avoided.

Although this disclosure describes and illustrates FIG. 6 as having twomedia-player devices 620A and 620B, this disclosure contemplates anysuitable embodiments of FIG. 6 occurring on any suitable interface andas being implemented by any suitable platform or system. As an example,and not by way of limitation, particular embodiments of FIG. 6 may haveany suitable number of media-player devices 620A and 620B. Furthermore,although this disclosure describes and illustrates particularcomponents, devices, or systems carrying out particular steps of themethod of FIG. 6, this disclosure contemplates any suitable combinationof any suitable components, devices, or systems carrying out anysuitable steps of the method of FIG. 6.

FIG. 7 illustrates an example method 700 for registering a user as anowner of a media-player device 320. The method may begin at step 710,where media-device player 320 may receive, from social-networking system160 in response to a request from media-player device 320, anauthentication key. At step 720, media-player device 320 may broadcastthe authentication key, the authentication key being received by firstclient system 130 of a first user of social-networking system 160, firstclient system 130 being within range of the broadcast, wherein firstclient system 130 is running a native application associated withsocial-networking system 160, the first user being logged intosocial-networking system 160 via the native application, and wherein thenative application verifies the authentication key withsocial-networking system 160. At step 730, social-networking system 160may generate a report, the report including aggregated social-networkinginformation and aggregated session information of one or more of thefirst users, wherein the report is generated based on sets ofpermissions specified by each of the one or more first users. At step740, media-player device 320 may receive, from the native applicationrunning on first client system 130, location information of first clientsystem 130 and social-networking information of the first user, whereinthe location information of first client system 130 and thesocial-networking information of the first user are sent in response tothe authentication key being verified by the native application. At step750, media-player device 320 may register the first user as an owner ofmedia-player device 320 based on the location information of firstclient system 130 and the social-networking information of the firstuser, wherein the location information indicates first client system 130is within a threshold distance of media-player device 320. Particularembodiments may repeat one or more steps of the method of FIG. 7, whereappropriate. Although this disclosure describes and illustratesparticular steps of the method of FIG. 7 as occurring in a particularorder, this disclosure contemplates any suitable steps of the method ofFIG. 7 occurring in any suitable order. Moreover, although thisdisclosure describes and illustrates an example method for registering auser as an owner of a media-player device 320 including the particularsteps of the method of FIG. 7, this disclosure contemplates any suitablemethod for registering a user as an owner of a media-player device 320including any suitable steps, which may include all, some, or none ofthe steps of the method of FIG. 7, where appropriate. Furthermore,although this disclosure describes and illustrates particularcomponents, devices, or systems carrying out particular steps of themethod of FIG. 7, this disclosure contemplates any suitable combinationof any suitable components, devices, or systems carrying out anysuitable steps of the method of FIG. 7.

FIG. 8 illustrates an example method 800 for sending instructions toadjust power levels of antennas 510A, 510B, 510C, and 510D to amedia-device player 320. The method may begin at step 810, where clientsystem 130 may send to a media-player device 320, an indication that theuser is logged into social-networking system 160 via native application330 associated with social-networking system 160, the client system 130being within range of at least one of a plurality of antennas of themedia-player device 320, wherein the media-player device 320 sets apower level of each of the plurality of antennas to a maximum powerlevel in response to receiving this indication. At step 820, clientsystem 130 may determine an orientation position of the client systemwith respect to the media-player device 320, wherein the orientationposition is determined based on one or more broadcast signals receivedfrom one or more of the plurality of antennas. At step 830, clientsystem 130 may receive, from media-player device 320, at each of aplurality of boundary positions of client system 130 with respect tomedia-player device 320, at least one broadcast signal from at least oneantenna of the plurality of antennas, wherein the respective boundaryposition is in range of the at least one antenna. At step 840, clientsystem 130 may determining, for each received broadcast signal, a signalstrength of the received broadcast signal, wherein the determined signalstrength is associated with the respective boundary position at whichthe broadcast signal was received. At step 850, client system 130 maysend, to media-player device 320, instructions to adjust a power levelof each of the plurality of antennas based on the determined signalstrengths, the power levels being adjusted to define a range ofbroadcast of the plurality of antennas based on the orientation positionand the boundary positions of client system 130. Particular embodimentsmay repeat one or more steps of the method of FIG. 8, where appropriate.Although this disclosure describes and illustrates particular steps ofthe method of FIG. 8 as occurring in a particular order, this disclosurecontemplates any suitable steps of the method of FIG. 8 occurring in anysuitable order. Moreover, although this disclosure describes andillustrates an example method for sending instructions to adjust powerlevels of antennas 510A, 510B, 510C, and 510D to a media-device player320 including the particular steps of the method of FIG. 8, thisdisclosure contemplates any suitable method for sending instructions toadjust power levels of antennas 510A, 510B, 510C, and 510D to amedia-device player 320 including any suitable steps, which may includeall, some, or none of the steps of the method of FIG. 8, whereappropriate. Furthermore, although this disclosure describes andillustrates particular components, devices, or systems carrying outparticular steps of the method of FIG. 8, this disclosure contemplatesany suitable combination of any suitable components, devices, or systemscarrying out any suitable steps of the method of FIG. 8.

Privacy

In particular embodiments, one or more of the content objects of theonline social network may be associated with a privacy setting. Theprivacy settings (or “access settings”) for an object may be stored inany suitable manner, such as, for example, in association with theobject, in an index on an authorization server, in another suitablemanner, or any combination thereof. A privacy setting of an object mayspecify how the object (or particular information associated with anobject) can be accessed (e.g., viewed or shared) using the online socialnetwork. Where the privacy settings for an object allow a particularuser to access that object, the object may be described as being“visible” with respect to that user. As an example and not by way oflimitation, a user of the online social network may specify privacysettings for a user-profile page identify a set of users that may accessthe work experience information on the user-profile page, thus excludingother users from accessing the information. In particular embodiments,the privacy settings may specify a “blocked list” of users that shouldnot be allowed to access certain information associated with the object.In other words, the blocked list may specify one or more users orentities for which an object is not visible. As an example and not byway of limitation, a user may specify a set of users that may not accessphotos albums associated with the user, thus excluding those users fromaccessing the photo albums (while also possibly allowing certain usersnot within the set of users to access the photo albums). In particularembodiments, privacy settings may be associated with particularsocial-graph elements. Privacy settings of a social-graph element, suchas a node or an edge, may specify how the social-graph element,information associated with the social-graph element, or content objectsassociated with the social-graph element can be accessed using theonline social network. As an example and not by way of limitation, aparticular concept node 204 corresponding to a particular photo may havea privacy setting specifying that the photo may only be accessed byusers tagged in the photo and their friends. In particular embodiments,privacy settings may allow users to opt in or opt out of having theiractions logged by social-networking system 160 or shared with othersystems (e.g., third-party system 170). In particular embodiments, theprivacy settings associated with an object may specify any suitablegranularity of permitted access or denial of access. As an example andnot by way of limitation, access or denial of access may be specifiedfor particular users (e.g., only me, my roommates, and my boss), userswithin a particular degrees-of-separation (e.g., friends, orfriends-of-friends), user groups (e.g., the gaming club, my family),user networks (e.g., employees of particular employers, students oralumni of particular university), all users (“public”), no users(“private”), users of third-party systems 170, particular applications(e.g., third-party applications, external websites), other suitableusers or entities, or any combination thereof. Although this disclosuredescribes using particular privacy settings in a particular manner, thisdisclosure contemplates using any suitable privacy settings in anysuitable manner.

In particular embodiments, one or more servers 162 may beauthorization/privacy servers for enforcing privacy settings. Inresponse to a request from a user (or other entity) for a particularobject stored in a data store 164, social-networking system 160 may senda request to the data store 164 for the object. The request may identifythe user associated with the request and may only be sent to the user(or a client system 130 of the user) if the authorization serverdetermines that the user is authorized to access the object based on theprivacy settings associated with the object. If the requesting user isnot authorized to access the object, the authorization server mayprevent the requested object from being retrieved from the data store164, or may prevent the requested object from be sent to the user. Inthe search query context, an object may only be generated as a searchresult if the querying user is authorized to access the object. In otherwords, the object must have a visibility that is visible to the queryinguser. If the object has a visibility that is not visible to the user,the object may be excluded from the search results. Although thisdisclosure describes enforcing privacy settings in a particular manner,this disclosure contemplates enforcing privacy settings in any suitablemanner.

Systems and Methods

FIG. 9 illustrates an example computer system 900. In particularembodiments, one or more computer systems 900 perform one or more stepsof one or more methods described or illustrated herein. In particularembodiments, one or more computer systems 900 provide functionalitydescribed or illustrated herein. In particular embodiments, softwarerunning on one or more computer systems 900 performs one or more stepsof one or more methods described or illustrated herein or providesfunctionality described or illustrated herein. Particular embodimentsinclude one or more portions of one or more computer systems 900.Herein, reference to a computer system may encompass a computing device,and vice versa, where appropriate. Moreover, reference to a computersystem may encompass one or more computer systems, where appropriate.

This disclosure contemplates any suitable number of computer systems900. This disclosure contemplates computer system 900 taking anysuitable physical form. As example and not by way of limitation,computer system 900 may be an embedded computer system, a system-on-chip(SOC), a single-board computer system (SBC) (such as, for example, acomputer-on-module (COM) or system-on-module (SOM)), a desktop computersystem, a laptop or notebook computer system, an interactive kiosk, amainframe, a mesh of computer systems, a mobile telephone, a personaldigital assistant (PDA), a server, a tablet computer system, or acombination of two or more of these. Where appropriate, computer system900 may include one or more computer systems 900; be unitary ordistributed; span multiple locations; span multiple machines; spanmultiple data centers; or reside in a cloud, which may include one ormore cloud components in one or more networks. Where appropriate, one ormore computer systems 900 may perform without substantial spatial ortemporal limitation one or more steps of one or more methods describedor illustrated herein. As an example and not by way of limitation, oneor more computer systems 900 may perform in real time or in batch modeone or more steps of one or more methods described or illustratedherein. One or more computer systems 900 may perform at different timesor at different locations one or more steps of one or more methodsdescribed or illustrated herein, where appropriate.

In particular embodiments, computer system 900 includes a processor 902,memory 904, storage 906, an input/output (I/O) interface 908, acommunication interface 910, and a bus 912. Although this disclosuredescribes and illustrates a particular computer system having aparticular number of particular components in a particular arrangement,this disclosure contemplates any suitable computer system having anysuitable number of any suitable components in any suitable arrangement.

In particular embodiments, processor 902 includes hardware for executinginstructions, such as those making up a computer program. As an exampleand not by way of limitation, to execute instructions, processor 902 mayretrieve (or fetch) the instructions from an internal register, aninternal cache, memory 904, or storage 906; decode and execute them; andthen write one or more results to an internal register, an internalcache, memory 904, or storage 906. In particular embodiments, processor902 may include one or more internal caches for data, instructions, oraddresses. This disclosure contemplates processor 902 including anysuitable number of any suitable internal caches, where appropriate. Asan example and not by way of limitation, processor 902 may include oneor more instruction caches, one or more data caches, and one or moretranslation lookaside buffers (TLBs). Instructions in the instructioncaches may be copies of instructions in memory 904 or storage 906, andthe instruction caches may speed up retrieval of those instructions byprocessor 902. Data in the data caches may be copies of data in memory904 or storage 906 for instructions executing at processor 902 tooperate on; the results of previous instructions executed at processor902 for access by subsequent instructions executing at processor 902 orfor writing to memory 904 or storage 906; or other suitable data. Thedata caches may speed up read or write operations by processor 902. TheTLBs may speed up virtual-address translation for processor 902. Inparticular embodiments, processor 902 may include one or more internalregisters for data, instructions, or addresses. This disclosurecontemplates processor 902 including any suitable number of any suitableinternal registers, where appropriate. Where appropriate, processor 902may include one or more arithmetic logic units (ALUs); be a multi-coreprocessor; or include one or more processors 902. Although thisdisclosure describes and illustrates a particular processor, thisdisclosure contemplates any suitable processor.

In particular embodiments, memory 904 includes main memory for storinginstructions for processor 902 to execute or data for processor 902 tooperate on. As an example and not by way of limitation, computer system900 may load instructions from storage 906 or another source (such as,for example, another computer system 900) to memory 904. Processor 902may then load the instructions from memory 904 to an internal registeror internal cache. To execute the instructions, processor 902 mayretrieve the instructions from the internal register or internal cacheand decode them. During or after execution of the instructions,processor 902 may write one or more results (which may be intermediateor final results) to the internal register or internal cache. Processor902 may then write one or more of those results to memory 904. Inparticular embodiments, processor 902 executes only instructions in oneor more internal registers or internal caches or in memory 904 (asopposed to storage 906 or elsewhere) and operates only on data in one ormore internal registers or internal caches or in memory 904 (as opposedto storage 906 or elsewhere). One or more memory buses (which may eachinclude an address bus and a data bus) may couple processor 902 tomemory 904. Bus 912 may include one or more memory buses, as describedbelow. In particular embodiments, one or more memory management units(MMUs) reside between processor 902 and memory 904 and facilitateaccesses to memory 904 requested by processor 902. In particularembodiments, memory 904 includes random access memory (RAM). This RAMmay be volatile memory, where appropriate Where appropriate, this RAMmay be dynamic RAM (DRAM) or static RAM (SRAM). Moreover, whereappropriate, this RAM may be single-ported or multi-ported RAM. Thisdisclosure contemplates any suitable RAM. Memory 904 may include one ormore memories 904, where appropriate. Although this disclosure describesand illustrates particular memory, this disclosure contemplates anysuitable memory.

In particular embodiments, storage 906 includes mass storage for data orinstructions. As an example and not by way of limitation, storage 906may include a hard disk drive (HDD), a floppy disk drive, flash memory,an optical disc, a magneto-optical disc, magnetic tape, or a UniversalSerial Bus (USB) drive or a combination of two or more of these. Storage906 may include removable or non-removable (or fixed) media, whereappropriate. Storage 906 may be internal or external to computer system900, where appropriate. In particular embodiments, storage 906 isnon-volatile, solid-state memory. In particular embodiments, storage 906includes read-only memory (ROM). Where appropriate, this ROM may bemask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM),electrically erasable PROM (EEPROM), electrically alterable ROM (EAROM),or flash memory or a combination of two or more of these. Thisdisclosure contemplates mass storage 906 taking any suitable physicalform. Storage 906 may include one or more storage control unitsfacilitating communication between processor 902 and storage 906, whereappropriate. Where appropriate, storage 906 may include one or morestorages 906. Although this disclosure describes and illustratesparticular storage, this disclosure contemplates any suitable storage.

In particular embodiments, I/O interface 908 includes hardware,software, or both, providing one or more interfaces for communicationbetween computer system 900 and one or more I/O devices. Computer system900 may include one or more of these I/O devices, where appropriate. Oneor more of these I/O devices may enable communication between a personand computer system 900. As an example and not by way of limitation, anI/O device may include a keyboard, keypad, microphone, monitor, mouse,printer, scanner, speaker, still camera, stylus, tablet, touch screen,trackball, video camera, another suitable I/O device or a combination oftwo or more of these. An I/O device may include one or more sensors.This disclosure contemplates any suitable I/O devices and any suitableI/O interfaces 908 for them. Where appropriate, I/O interface 908 mayinclude one or more device or software drivers enabling processor 902 todrive one or more of these I/O devices. I/O interface 908 may includeone or more I/O interfaces 908, where appropriate. Although thisdisclosure describes and illustrates a particular I/O interface, thisdisclosure contemplates any suitable I/O interface.

In particular embodiments, communication interface 910 includeshardware, software, or both providing one or more interfaces forcommunication (such as, for example, packet-based communication) betweencomputer system 900 and one or more other computer systems 900 or one ormore networks. As an example and not by way of limitation, communicationinterface 910 may include a network interface controller (NIC) ornetwork adapter for communicating with an Ethernet or other wire-basednetwork or a wireless NIC (WNIC) or wireless adapter for communicatingwith a wireless network, such as a WI-FI network. This disclosurecontemplates any suitable network and any suitable communicationinterface 910 for it. As an example and not by way of limitation,computer system 900 may communicate with an ad hoc network, a personalarea network (PAN), a local area network (LAN), a wide area network(WAN), a metropolitan area network (MAN), or one or more portions of theInternet or a combination of two or more of these. One or more portionsof one or more of these networks may be wired or wireless. As anexample, computer system 900 may communicate with a wireless PAN (WPAN)(such as, for example, a BLUETOOTH WPAN), a WI-FI network, a WI-MAXnetwork, a cellular telephone network (such as, for example, a GlobalSystem for Mobile Communications (GSM) network), or other suitablewireless network or a combination of two or more of these. Computersystem 900 may include any suitable communication interface 910 for anyof these networks, where appropriate. Communication interface 910 mayinclude one or more communication interfaces 910, where appropriate.Although this disclosure describes and illustrates a particularcommunication interface, this disclosure contemplates any suitablecommunication interface.

In particular embodiments, bus 912 includes hardware, software, or bothcoupling components of computer system 900 to each other. As an exampleand not by way of limitation, bus 912 may include an AcceleratedGraphics Port (AGP) or other graphics bus, an Enhanced Industry StandardArchitecture (EISA) bus, a front-side bus (FSB), a HYPERTRANSPORT (HT)interconnect, an Industry Standard Architecture (ISA) bus, an INFINIBANDinterconnect, a low-pin-count (LPC) bus, a memory bus, a Micro ChannelArchitecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, aPCI-Express (PCIe) bus, a serial advanced technology attachment (SATA)bus, a Video Electronics Standards Association local (VLB) bus, oranother suitable bus or a combination of two or more of these. Bus 912may include one or more buses 912, where appropriate. Although thisdisclosure describes and illustrates a particular bus, this disclosurecontemplates any suitable bus or interconnect.

Herein, a computer-readable non-transitory storage medium or media mayinclude one or more semiconductor-based or other integrated circuits(ICs) (such, as for example, field-programmable gate arrays (FPGAs) orapplication-specific ICs (ASICs)), hard disk drives (HDDs), hybrid harddrives (HHDs), optical discs, optical disc drives (ODDs),magneto-optical discs, magneto-optical drives, floppy diskettes, floppydisk drives (FDDs), magnetic tapes, solid-state drives (SSDs),RAM-drives, SECURE DIGITAL cards or drives, any other suitablecomputer-readable non-transitory storage media, or any suitablecombination of two or more of these, where appropriate. Acomputer-readable non-transitory storage medium may be volatile,non-volatile, or a combination of volatile and non-volatile, whereappropriate.

Miscellaneous

Herein, “or” is inclusive and not exclusive, unless expressly indicatedotherwise or indicated otherwise by context. Therefore, herein, “A or B”means “A, B, or both,” unless expressly indicated otherwise or indicatedotherwise by context. Moreover, “and” is both joint and several, unlessexpressly indicated otherwise or indicated otherwise by context.Therefore, herein, “A and B” means “A and B, jointly or severally,”unless expressly indicated otherwise or indicated otherwise by context.

The scope of this disclosure encompasses all changes, substitutions,variations, alterations, and modifications to the example embodimentsdescribed or illustrated herein that a person having ordinary skill inthe art would comprehend. The scope of this disclosure is not limited tothe example embodiments described or illustrated herein. Moreover,although this disclosure describes and illustrates respectiveembodiments herein as including particular components, elements,feature, functions, operations, or steps, any of these embodiments mayinclude any combination or permutation of any of the components,elements, features, functions, operations, or steps described orillustrated anywhere herein that a person having ordinary skill in theart would comprehend. Furthermore, reference in the appended claims toan apparatus or system or a component of an apparatus or system beingadapted to, arranged to, capable of, configured to, enabled to, operableto, or operative to perform a particular function encompasses thatapparatus, system, component, whether or not it or that particularfunction is activated, turned on, or unlocked, as long as thatapparatus, system, or component is so adapted, arranged, capable,configured, enabled, operable, or operative.

The claims:
 1. A method comprising, by a client system of a user:receiving, at the client system, an authentication key broadcasted froma media-player device, wherein the client system is within a wirelesscommunication range of the media-player device, and wherein themedia-player device comprises a plurality of antennas; verifying, by theclient system, the authentication key to register the user to themedia-player device; and sending, from the client system, instructionsto adjust a power level of each of the plurality of antennas, theinstructions being determined based on broadcast signals received at theclient system and on a respective position of the client systemassociated with each received broadcast signal, wherein the respectiveposition of the client system is determined with respect to a positionof the media-player device.
 2. The method of claim 1, wherein the useris registered as an owner of the media-device player.
 3. The method ofclaim 1, wherein each of the plurality of antennas is a directionalantenna.
 4. The method of claim 3, wherein the plurality of antennasgenerate a radiation pattern in a first plane, and wherein the radiationpattern radiates in substantially 360-degrees of the first plane.
 5. Themethod of claim 3, wherein the plurality of antennas comprises fourantennas.
 6. The method of claim 5, wherein the media-player devicefurther comprises a fifth antenna, the fifth antenna being abidirectional antenna.
 7. The method of claim 6, wherein the fifthantenna generates a radiation pattern that radiates in a second plane,the second plane being substantially perpendicular to the first plane.8. The method of claim 1, further comprising: determining, by the clientsystem, a signal strength for each of the broadcast signals received atthe client system.
 9. The method of claim 1, wherein the instructions toadjust the power level of each of the plurality of antennas are furtherbased on a make and model of the client system.
 10. The method of claim1, wherein the instructions to adjust the power level of each of theplurality of antennas comprise instructions to adjust at least one ofthe plurality of antennas to zero based on no broadcast signal beingreceived at the client system from the at least one antenna.
 11. One ormore computer-readable non-transitory storage media embodying softwarethat is operable when executed to: receive, at a client system, anauthentication key broadcasted from a media-player device, wherein theclient system is within a wireless communication range of themedia-player device, and wherein the media-player device comprises aplurality of antennas; verify, by the client system, the authenticationkey to register the user to the media-player device; and send, from theclient system, instructions to adjust a power level of each of theplurality of antennas, the instructions being determined based onbroadcast signals received at the client system and on a respectiveposition of the client system associated with each received broadcastsignal, wherein the respective position of the client system isdetermined with respect to a position of the media-player device. 12.The media of claim 11, wherein the user is registered as an owner of themedia-device player.
 13. The media of claim 11, wherein each of theplurality of antennas is a directional antenna.
 14. The media of claim11, wherein the embodied software is further operable when executed todetermine a signal strength for each of the broadcast signals receivedat the client system.
 15. The media of claim 11, wherein theinstructions to adjust the power level of each of the plurality ofantennas are further based on a make and model of the client system. 16.A client system comprising: one or more processors; and a memory coupledto the processors comprising instructions executable by the processors,the processors operable when executing the instructions to: receive, atthe client system, an authentication key broadcasted from a media-playerdevice, wherein the client system is within a wireless communicationrange of the media-player device, and wherein the media-player devicecomprises a plurality of antennas; verify, by the client system, theauthentication key to register a user to the media-player device; andsend, from the client system, instructions to adjust a power level ofeach of the plurality of antennas, the instructions being determinedbased on broadcast signals received at the client system and on arespective position of the client system associated with each receivedbroadcast signal, wherein the respective position of the client systemis determined with respect to a position of the media-player device. 17.The system of claim 16, wherein the user is registered as an owner ofthe media-device player.
 18. The system of claim 16, wherein each of theplurality of antennas is a directional antenna.
 19. The system of claim16, wherein the processors are further operable when executing theinstructions to determine a signal strength for each of the broadcastsignals received at the client system.
 20. The system of claim 16,wherein the instructions to adjust the power level of each of theplurality of antennas are further based on a make and model of theclient system.