Social networking permissions

ABSTRACT

Enabling access to user-specific content includes maintaining data indicating a social network that indicates a first user and a second user that are connected by one or more relationships through zero or more intermediary users. At least one of the relationships that connect the first and second users is categorized. A request for access to content maintained by the second user is received from the first user. One or more of the relationships that connect the first user to the second user are identified using the data indicating the social network. A category of at least one of the identified relationships is identified. A type of access to the content to be provided to the first user is identified based on the identified to category. The first user is enabled to access the content in accordance with the identified type of access.

This patent application is a continuation of and claims the benefit of priority to U.S. patent application Ser. No. 14/089,677, filed Nov. 25, 2013, which is a continuation of and claims the benefit of priority to U.S. patent application Ser. No. 11/079,524, filed Mar. 15, 2005, now U.S. Pat. No. 8,595,146, which is a continuation-in-part of and claims the benefit of priority to U.S. patent application Ser. No. 10/981,460, filed Nov. 5, 2004, which claims the benefit of priority to U.S. Provisional Patent Application Nos. 60/552,718, filed Mar. 15, 2004, and 60/579,290, filed Jun. 15, 2004, and 60/552,718, filed Mar. 15, 2004. All of the above applications are incorporated by reference in their entirety for all purposes.

This application is related to U.S. application Ser. No. 11/015,423, which was filed on Dec. 20, 2004, and is titled “Passively Populating a Participant List with Known Contacts,” and to U.S. application Ser. No. 11/079,522, which has attorney docket number 06975.476001, is concurrently filed herewith on Mar. 15, 2005, and is titled “Sharing Social Network Information.” Both of the above applications are incorporated by reference in their entirety for all purposes

DETAILED DESCRIPTION Technical Field

This document relates to social networks.

Background

Entities who may not have a direct relationship to one another may nevertheless be linked to one another through intermediary entities based on a personal, business, or other relationship among the entities and the intermediary entities. For example, a user A may have a friend, user B, who has a business relationship with user C. Thus, user A is linked to user C through user B. Such interpersonal interactions or relationships may generally be referred to as a social network. How many intermediary entities are needed to link one entity or user to another may generally be referred to as the degrees of separation between those two entities or users. In general, the relationship between user A and user B may be referred to as a direct relationship because there are no intermediate entities between the two. The relationship between user A and user C may be referred to as an indirect relationship because an intermediate entity connects the two.

SUMMARY

In one general aspect, enabling access to user-specific content includes maintaining data indicating a social network that indicates a first user and a second user that are connected by one or more relationships through zero or more intermediary users. At least one of the relationships that connect the first and second users is categorized. A request for access to content maintained by the second user is received from the first user. One or more of the relationships that connect the first user to the second user are identified using the data indicating the social network. A category of at least one of the identified relationships is identified. A type of access to the content to be provided to the first user is identified based on the identified category. The first user is enabled to access the content in accordance with the identified type of access.

Implementations may include one or more of the following features. For example, identifying a type of access to the content may include identifying, based on the identified category, that the first user is allowed to view the content, and enabling the first user to access the content may include enabling the first user to view the content. Identifying a type of access to the content may include identifying, based on the identified category, that the first user is allowed to modify the content, and enabling the first user to access the content may include enabling the first user to modify the content. Identifying a type of access to the content may include identifying, based on the identified category, that the first user is not allowed to access the content, and enabling the first user to access the content may include denying the first user access to the content. Identifying a type of access to the content may include identifying, based on the identified category, a portion of the content that the first user is allowed to access, and enabling the first user to access the content may include enabling the first user to access only the identified portion of the content.

The content may be a profile of the second user. Receiving a request for access to the content may include receiving a request for access to the profile. Identifying a type of access to the content may include identifying, based on the identified category, a portion of the profile that the first user is allowed to access, and enabling the first user to access the content may include enabling the first user to access the identified portion of the profile. Identifying a portion of the profile that the first user may access may include identifying one or more fields of the profile that have been designated as appropriate for users related to the first user with at least one relationship of the identified category. Enabling the first user to access the identified portion of the profile may include enabling the first user to access the identified fields of the profile.

The content may include at least one of the following: an electronic calendar of the second user, pictures maintained by the second user, annotations for pictures that are maintained by the second user, a list of entities for which presence information is monitored, an address book of the second user, an online data store of the second user, an online journal of the second user, or information describing an account of the second user.

The categories of the one or more relationships may include at least one of the following: friend, family member, business contact, vendor, or customer.

The identified category may represent a sub-category of a broader category. Identifying a type of access to the content based on the identified category may include identifying a type of access to the content based on the broader category.

Identifying one or more relationships may include identifying at least two relationships that connect the first user to the second user through at least one intermediary user. A composite category may be identified based on categories of the at least two identified relationships. Identifying a type of access to the content based on the identified category may include identifying a type of access to the content based on the composite category.

Identifying one or more relationships may include identifying at least two relationships that connect the first user to the second user through at least one intermediary user. Identifying a category of at least one of the identified relationships may include identifying categories of the at least two relationships. One of the identified categories for which a most restrictive type of access to the content may be provided to the first user may be identified. Identifying a type of access to the content may include identifying the most restrictive type of access to the content as the type of access to the content to be provided to the first user.

A characteristic of the first user may be identified. Identifying a type of access to the content may include identifying a type of access to the content based on the identified category and the identified characteristic. Identifying a characteristic of the first user may include identifying a degree of separation between the first user and the second user. Identifying a type of access to the content based on the identified category and on the identified characteristic may include identifying a type of access to the content based on the identified category and the identified degree of separation.

A request for access to the content maintained by the second user may be received from a third user that is not connected to the second user by one or more relationships through zero or more intermediary user. A type of access to the content to be provided to users that are not connected to the second user by one or more relationships through zero or more intermediary users may be identified, and the third user may be enabled to access the content in accordance with the identified type of access.

In another general aspect, enabling access to user-specific content includes receiving, from a first user, a request for access to content maintained by a second user. An indication of an allowable type of access based on a category of one or more relationships with which the first and second users are connected through zero or more intermediary users in a social network is requested. The indication of an allowable type of access is received, and the first user is enabled to access the content in accordance with the allowable type of access.

Implementations may include one or more of the following features. For example, receiving an indication of an allowable type of access may include receiving an indication of an allowable type of access based on a category of one or more relationships with which the first and second users are connected through zero or more intermediary users in a social network.

The content may include at least one of the following: a profile of the second user, an electronic calendar of the second user, pictures maintained by the second user, annotations for pictures that are maintained by the second user, a list of entities for which presence information is monitored, an address book of the second user, an online data store of the second user, an online journal of the second user, or information describing an account of the second user.

Receiving an indication of an allowable type of access may include receiving an indication that the first user is allowed to view the content, and enabling the first user to access the content may include enabling the first user to view the content. Receiving an indication of an allowable type of access may include receiving an indication that the first user is allowed to modify the content, and enabling the first user to access the content may include enabling the first user to modify the content. Receiving an indication of an allowable type of access may include receiving an indication that the first user is not allowed to access the content, and enabling the first user to access the content may include denying the first user access to the content. Receiving an indication of an allowable type of access may include receiving an indication of a portion of the content that the first user is allowed to access, and enabling the first user to access the content may include enabling the first user to access only the identified portion of the content.

These general and specific aspects may be implemented using a system, a method, or a computer program, or any combination of systems, methods, and computer programs.

Other features will be apparent from the description and drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram of an example of a networked computing environment.

FIG. 2 is an illustration of an example of a social network with categorized relationships.

FIG. 3 is a flow chart of a process for establishing a social network with categorized relationships using contact lists of members of the social network.

FIG. 4 is a communications diagram of a process for establishing and categorizing relationships in a social network

FIG. 5 is a communications diagram of a process for re-categorizing existing relationships in a social network.

FIG. 6 is a flow chart of a process for providing access to content based on categories of relationships in a social network.

FIGS. 7A-7C are illustrations showing examples of interfaces for displaying a user profile to which differing types of access are provided based on categories of relationships in a social network.

FIGS. 8A-8C are illustrations showing examples of interfaces for displaying an electronic calendar to which differing types of access are provided based on categories of relationships in a social network.

DETAILED DESCRIPTION

Direct relationships within a social network may be categorized. For example, a direct relationship between a first user and a second user of the social network may be categorized as a family or business relationship. The type of access provided to a first user to content maintained by a second user may depend on the category of one or more direct relationships linking the two users. For example, a request from a first user for access to a calendar maintained by a second user may be granted or denied based on the category of one or more direct relationships linking the first and second users. More particularly, in one implementation, access to at least a portion of the calendar may be provided to the first user if the first user is related to the second user with a friend relationship, while access to the calendar may be denied if the first user is related to the second user with a business relationship. In another implementation, access by a first user to pictures, or annotations for the pictures, maintained by a second, user may be conditioned upon the category of one or more relationship between the first user and the second user.

Allowing a user to condition access to content that is maintained by the user based on the categories of the relationships between the user and other users within a social network may facilitate the setting of access permissions for the content. Instead of having to manually indicate the permissions for each of the other users, the user may specify the permissions once for those other users that are related to the user with a particular category of relationship. The user may not be familiar enough with some of the other users to appropriately set permissions for those users, but specifying the permissions based on the categories eliminates the need of the user to be familiar with each of the other users. Instead, the user only needs to specify permissions for each type of user, as indicated by the categories of the relationships. Furthermore, default permissions for the other users may be specified automatically based on the categories, rather than for each of the other users individually.

Referring to FIG. 1, an example of a networked computing environment 100 supports communications between computer users. The computer users may be members of a social network of users of the networked computer environment 100. The computer users are distributed geographically and communicate using client systems 105. A network 110 interconnects the client systems 105. The client systems 105 are connected to the network 110 through various communication channels, such as a modem connected to a telephone line (using, for example, serial line internet protocol (SLIP) or point-to-point protocol (PPP)) or a direct internetwork connection (using, for example, transmission control protocol/internet protocol (TCP/IP)).

The client systems 105 include a communications interface (not shown) used by the communications programs to send communications through network 110. The communications may include for example, e-mail, audio data, video data, general binary data, or text data (e.g., encoded in American Standard Code for Information Interchange (ASCII) format). The client systems 105 also may include one or more input devices, such as a keyboard, a mouse, a stylus, a camera, or a microphone, as well as one or more output devices, such as a monitor, a touch screen, speakers, or a printer.

The network 110 typically includes a series of portals interconnected through a coherent system. Examples of the network 110 include the Internet, Wide Area Networks (WANs), Local Area Networks (LANs), analog or digital wired and wireless telephone networks (e.g., a Public Switched Telephone Network (PSTN), an Integrated Services Digital Network (ISDN), or a Digital Subscriber Line (xDSL)), or any other wired or wireless network. The network 110 may include multiple networks or subnetworks, each of which may include, for example, a wired or wireless data pathway.

A host server 115 also may be connected to the network 110 and may be used to facilitate some direct or indirect communications between the client systems 105. For example, the host server 115 may include a social network provider system 120 that maintains the social network of the users of the networked computing environment 100. To maintain the social network, the social network provider system 120 maintains lists of the users of the networked computing environment 100 and of the relationships between the users. In addition, the social network provider system 120 may indicate permissions to access content related to the users based on the relationships between the users. Furthermore, the social network provider system 120 may maintain information related to the users or the relationships between the users, such as profiles of the users or categories for the relationships. Alternatively or additionally, the social network provider system 120 may be configured to access the information related to the users from one or more external sources, such as another host server 115.

Each of the client systems 105 and the host server 115 may be implemented using, for example, a general-purpose computer capable of responding to and executing instructions in a defined manner, a personal computer, a special-purpose computer, a workstation, a server, a device, a component, or other equipment or some combination thereof capable of responding to and executing instructions. The client systems 105 and the host server 115 may receive instructions from, for example, a software application, a program, a piece of code, a device, a computer, a computer system, or a combination thereof, which independently or collectively direct operations, as described herein. These instructions may take the form of one or more communications programs that facilitate communications between the users of the client systems 105. For instance, such communications programs may include e-mail programs, instant messaging (IM) programs, file transfer protocol (FTP) programs, and voice over internet protocol (VoIP) programs. The instructions may be embodied permanently or temporarily in any type of machine, component, equipment, storage medium, or propagated signal that is capable of being delivered to the client systems 105 or the host server 115.

Further, the host server 115 includes a communications interface (not shown) used by the communications programs to send communications through network 110. The communications may include, for example, e-mail, audio data, video data, general binary data, or text data (e.g., encoded in American Standard Code for Information Interchange is (ASCII) format).

Referring to FIG. 2, an example of a social network map 200 indicates members 205 a-205 m of a social network that are linked through a series of relationships 210 a-210 y. In one implementation, the map 200 is a graphical representation of the members 205 a-205 m and the relationships 210 a-210 y, as is illustrated in FIG. 2. In another implementation, the map 200 represents data that is useful or sufficient in generating a graphical representation, such as that illustrated in FIG. 2, is a map.

The relationships 210 a-210 y define direct and indirect relationships between the members 205 a-205 m of the social network map 200. More particularly, the members 205 a-205 m that are connected by one of the relationships 210 a-210 y are involved in a direct relationship. For example, the members 205 a and 205 b are involved in a direct relationship, as evidenced by the relationships 210 a and 210 b that connect the members 205 a and 205 b.

In addition, the members 205 a-205 m that are connected indirectly through one or more intermediary members 205 a-205 m with more than one of the relationships 210 a-210 y are involved in indirect relationships. For example, the members 205 c and 205 d are involved in an indirect relationship because the members 205 c and 205 d are connected through the intermediary member 205 a with the relationships 210 c and 210 f. The number of intermediary members through which two indirectly related members are related is called the degree of separation between the indirectly related members. In the above example, the members 205 c and 205 d are said to be one degree of separation apart because the member 205 a is the only intermediary member through which the members 205 c and 205 d are related.

The relationships 210 a-210 y are unidirectional. In other words, each of the relationships 210 a-210 y relates an origin member to a destination member. For example, the member 205 a is an origin member and the member 205 b is a destination member of the relationship 210 a.

Each of the relationships 210 a-210 y has a category. For example, the relationship 210 a has a category of “employee.” The categories of the relationships 210 a-210 y define the type of relationships of the corresponding destination members to the corresponding origin members. For example, the category of the relationship 210 a indicates that the member 205 b is an employee of the member 205 a. As another example, the relationship 210 b indicates that the member 205 a is a boss of the member 205 b. When a member is said to have a relationship of a particular category, the member is the destination member of the relationship with the particular category. In one implementation, the categories of the relationships may include at least one of the following: friend, family member, business contact, vendor, or customer.

The categories of the relationships 210 a-210 y may be identified from literal or constructive indications of the categories. A literal indication of a category for a direct relationship between two users is an indication of the category that is explicitly specified by one of the two users. For example, the category of the relationship 210 w may be literally indicated if one of the members 205 j and 205 m explicitly indicates that they are co-workers.

Alternatively, a constructive indication of the category is an indication of the category that is generated based on information describing the two users, or the relationship between them. In other words, information describing the two users or the relationship may be used to infer a category for the relationship. For example, a communications strength between the two users, or another indication of the relationship between the two users, may constructively indicate the category between the first and second users. The communications strength between the first and second users may depend, for example, on the type of messages exchanged between the first and second users, the frequency of communication between the first and second users, a degree of separation between the first and second users, and/or other characteristics of the relationship between the first and second users. For example, the business relationship 210 r may be inferred by the members 205 j and 205 k having a low communications strength, while the family relationship 210 t may be inferred by the members 205 j and 205 l having a high communications strength. The concept of communications strength is more fully described in U.S. application Ser. No. 11/015,423, which was filed on Dec. 20, 2004, is titled “Passively Populating a Participant List with Known Contacts,” and was previously incorporated herein in its entirety for all purposes.

In some implementations, a category may be indicated literally or constructively for a relationship that has not yet been established, in which case the relationship may be established with the indicated category. For example, the member 205 b may explicitly designate in a contact list that the member 205 g is a friend, in which case a friend relationship may be established between the members 205 b and 205 g in response to the designation. As another example, the member 205 i and 205 k may have a high communications strength, in which case a family relationship may be established between the members 205 b and 205 g.

Two of the members 205 a-205 m may be involved in multiple direct relationships with one another. For example, the members 205 a and 205 e are involved in the direct relationships 210 g and 210 h. The member 205 a is the origin member of the relationship 210 g, and the member 205 e is the origin member of the relationship 210 h. As another example, the members 205 j and 205 m are involved in the direct relationships 210 v, 210 w, 210 x, and 210 y. The member 205 j is the origin member of the relationships 210 v and 210 y, and the member 205 m is the origin member of the relationships 210 w and 210 x.

In some implementations, the direct relationships between two members have the same category. For example, the relationships 210 k and 210 l both have the same category, i.e. “friend,” which indicates that the members 205 f and 205 g have been categorized as friends of one another. In other implementations, the multiple direct relationships have different categories. For example, the members 205 f and 205 i are involved in multiple direct relationships 210 o and 210 p that have different categories. The relationship 210 o indicates that the member 205 i is a babysitter of the member 205 f, while the relationship 210 p indicates that the member 205 f is a customer of the member 205 i. As another example, the relationships 210 v, 210 w, 210 x, and 210 y indicate that the members 205 j and 205 m are both friends and co-workers of one another.

The relationships 210 a-210 y may have more general or abstract interpretations than what is indicated by the corresponding categories. For example, the relationship 210 e indicates that the member 205 c is a son of the member 205 a. The relationship 210 c may be more generally interpreted to indicate that the member 205 c is simply a member of a family of the member 205 a. As another example, the relationship 210 b indicates that the member 205 a is the boss of the member 205 b. The relationship 210 b may be more abstractly or generally interpreted to indicate that the member 205 a is a co-worker or a business contact of the member 205 b. General categories, such as “family,” “co-worker,” or “business contact” may be explicitly defined for the relationships 210 a-210 y or inferred from specific categories is assigned to the relationships 210 a-210 y, such as “brother” or “boss.”

Specific social networks may be extracted from a general social network with categorized relationships, such as the social network illustrated by the social network map 200. More particularly, the categorized relationships may be used to identify whether two members of the general social network are included in a specific social network. More particularly, members of the general social network that are directly or indirectly related with a specific type of relationship may form a social network of the specific type. For example, the members 205 j, 205 k, and 205 m may form a business social network because the members 205 j, 205 k, and 205 m are directly and indirectly related with business type relationships. Alternatively, if two members of the general social network have a relationship of a specific type, all members of the general social network directly or indirectly related to the two members may form a social network of the specific type. For example, because the member 205 a and 205 d are related with a relationship that has a type of “friend,” the members 205 a-205 m, who are directly or indirectly related to the members 205 a and 205 d, form a social network of friends.

Each of the members 205 a-205 m may maintain a personal profile that includes information describing the member, such as an employer, an occupation, favorite music, sexual orientation, or other personal or identifying information for the member. The members 205 a-205 m may present their profiles to one another while communicating. In one implementation, the members 205 a-205 m may present only particular aspects of their profiles to one another, depending on the relationships between the members 205 a-205 m. More particularly, the aspects of a profile of a first member that are presented to a second member that is directly related to the first member may depend on the type of the direct relationship between the first and second members. For example, only business-related aspects of a profile of the member 205 a may be presented to the member 205 e, because the members 205 a and 205 e are involved in the business relationship 210 g. Alternatively or additionally, the aspects of a profile of a first member that are presented to a second member with whom the first member indirectly related may depend on the category or categories of the direct relationships between the members connecting the first member to the second member. For example, different aspects of a profile of the member 205 m may be presented to the member 205 d and the member 205 k, because the members 205 m and 205 d are related by two friend relationships 210 x and 210 q while the members 205 m and 205 k are related by a friend relationship 210 x and a business relationship 210 r.

Similarly, the members 205 a-205 m may present different aspects of personal profiles to different specific social networks that relate the members 205 a-205 m. For example, the member 205 m may present different aspects of a personal profile to different social networks, such as a friends network and a business network, that involve the member 205 m. The aspects of the profile that are presented by the member 205 m to a specific social network may depend on the relationship of the member 205 m with one or more of the members of the specific social network. For example, the member 205 m may present aspects of the profile appropriate for a social network of friends to a social network that includes the member 205 d, because the member 205 m is connected by friend relationships to the member 205 d through the member 205 j. If a first member is connected to a second member through differing types of relationships, then the first member may present an aspect of a personal profile that is appropriate for one of the types. For example, the member 205 j may present aspects of a personal profile that are appropriate for a social network of friends to the member 205 m. Alternatively, the member 205 j may present aspects to the member 205 m appropriate for a business network. Alternatively or additionally, the first member may present aspects of the personal profile that correspond to both of the differing types to the second member. For example, the member 205 j may present aspects of a personal profile that are appropriate for a social network of friends and for a business social network to the member 205 m.

Referring to FIG. 3, a process 300 may be used to establish and build a social network. The process 300 uses contact lists of members of the social network to add members to the social network and to establish relationships between the members of the social network. The process 300 may be executed by, for example the social network provider system 120 of FIG. 1. The process 300 begins with an initial user and adds to the social network contacts on contact lists of users within a certain number of degrees of separation from the initial user.

The process 300 includes maintaining a social network (305). Maintaining the social network may include maintaining the members of the social network and the categorized relationships between the members. Alternatively, a new social network may be established with the execution of the process 300, in which case, there is no set of members or relationships to maintain. The social network initially includes the initial user. If the initial user is not included in the social network, then the initial user is added to the social network.

A list of contacts is maintained for the initial user. The list of contacts may be any personally maintained list or lists, such as, for example, an address book, a contact list for instant messaging, and/or a white list. The rest of process 300 will be described using an address book as an example of a list of contacts. The contacts in the initial user's address is book are added to the social network (310). Adding the contacts in the initial user's address book to the social network includes adding the contacts as members of the social network and establishing direct relationships between the initial user and the added contacts. The initial user is the origin member of the established relationships, and each of the added contacts is the destination member of one of the established relationships. In one implementation, a particular contact may be added to the social network, and a relationship may be established between the initial user and particular contact, only when the initial user and the particular contact list each other in their respective contact lists.

Next, the contacts linked to the initial user (i.e., up to a desired degree of separation) are identified and added to the social network. To do so, the address books of each contact in the initial user's address book are accessed (315). The contacts' address books typically include communication identifiers selected by the contacts. In one implementation, the contacts' address books are stored in a central location, such as on the host server 115 of FIG. 1. In another implementation, the address books are stored on local systems used by the contacts, such as the client systems 105 of FIG. 1.

The contacts in the user's contacts' address books (i.e., the contacts separated by one degree) then are added to the social network (320). Adding the contacts in the user's contacts' address books to the social network includes adding the contacts as members of the social network and establishing relationships between the added contacts and other members of the social network. More particularly, a direct relationship is established between one of the added contacts and the member of the social network whose address book includes the added contact. In such a case, the member of the social network whose address book includes the added contact is the origin member of the established relationship, and the added contact is the destination member of the established relationship.

One or more of the contacts in the user's contacts' address books already may be members of the social network. In such a case, the one or more contacts are not added to the social network, but relationships between the one or more contacts and the user's contacts are established. For example, the address book of a first contact that is listed in the address book of the initial user may list the initial user. The initial user is already a member of the social network, so the initial user does not need to be added to the social network. Therefore, a direct relationship with the first contact as the origin member and the initial user as the destination member may be established. A relationship with the initial user as the origin member and the first contact as the destination member was established when the first contact was added to the social network as a result of being included in the initial user's address book. Therefore, two direct relationships have been established between the initial user and the first contact.

The address books of the added contacts may be accessed to determine if the added contacts list any existing members of the social network in their address books. If so, then direct relationships may be established between the added contacts and the existing members of the social network. More particularly, if the address book of one of the added contacts lists one of the existing members of the social network, then a direct relationship with the added contact as the origin member and the existing member as the destination member is established.

If another degree of separation is desired (325), the degree of separation is incremented (330) such that the address books of the contacts that are separated from the user by one degree are accessed (315) and the contacts in those address books are added to the social network (320). The addition of contacts at larger degrees of separation from the initial user continues until the desired degree of separation is reached (325). Once the desired degree of separation has been reached, all of the contacts within that desired degree of separation from the user have been added to the social network, and the social network is stored (335).

The direct relationships between the members that have been added to the social network list are categorized (340). In one implementation, categories for the relationships are automatically inferred from the address books used to establish the direct relationships. More particularly, the groups within the address books may be used to set the categories for the direct relationships. For example, if a first member of the social network is added to the social network due to inclusion in a “friends” group of an address book of a second member, the direct relationship between the first member and the second member may be categorized as a “friend” relationship. In another implementation, a user may be enabled to categorize the direct relationships in the social network for which the user is the origin member. For example, if a first member is added to the social network due to inclusion in an address book for a second member, then the second member may be able to categorize the direct relationship between the first member and the second member for which the second member is the origin member.

The desired degrees of separation may be a system parameter or, in some implementations, the initial user may be provided with the ability to set the desired degrees of separation. For example, the initial user may be provided with an interface that allows the initial user to decide whether degrees of separation will be used, and, if so, how many degrees should be used. Alternatively, the desired degrees of separation may be both a system parameter and able to be set by the initial user. For example, the system may include a default degrees of separation, which can be adjusted by the initial user if he or she so desires.

The process 300 may result in the social network not being updated when any users update their contact lists. That is, if a user related to the initial user adds a contact to the user's contact list, the new contact may not be reflected in the social network. The process 300 may be repeated on a periodic or aperiodic basis to mitigate this situation. Another manner of mitigating this situation is to use an update system in which changes to contact lists are tracked and the social network is updated accordingly in an incremental fashion or by triggering an update or re-initiation of process 300 when a change occurs.

As an example, the process 300 may be used to create part of the social network map 200 of FIG. 2. More particularly, the process 300 may be used add the members of the social network map 200 within one degree of separation from an initial user, such as the member 205 c. Contacts from an address book maintained by the member 205 c are added to the social network map 200 (310). More particularly, the members 205 a and 205 f are added to the social network map 200 as a result of being included in the address book of the member 205 c. Furthermore, the relationships 210 d and 210 i are established as a result of the members 205 a and 205 f being included in the address book of the member 205 c. Address books for the members 205 a and 205 f are accessed because the members 205 a and 205 f are an initial number of degrees of separation from the member 205 c (315), and contacts from the accessed address books are added to the social network map 200 (320). More in particularly, the members 205 b, 205 d, 205 e, 205 g, 205 h, and 205 i are added to the social network map 200, and the corresponding relationships 210 a, 210 e, 210 g, 210 k, 210 m, and 210 o are established. The accessed address books also include the member 205 c, which is already a member of the social network map 200. Consequently, the relationships 210 c and 210 j are established within the social network map 200, such that the member 205 c is involved in two direct relationships with each of the members 205 a and 205 f.

At this point, contacts within one degree of separation from the member 205 c have been added to the social network map 200. Address books of the members 205 b, 205 d, 205 e, 205 g, 205 h, and 205 i may be accessed to determine if the accessed address books include any existing members of the social network map 200. The address books maintained by the members 205 b, 205 d, and 205 e each include the member 205 a, so the relationships 210 b, 210 f, and 210 h are established. Similarly, the address books maintained by the members 205 g, 205 h, and 205 i each include the member 205 f, so the relationships 210 l, 210 n, and 210 p are established. Another degree of separation is not desired (325), so the social network map 200 is stored, (335), and the direct relationships that have been established are categorized (340). Other parts of the social network map 200 may be established through other related processes.

Referring to FIG. 4, an alternative or additional process 400 may be used to establish relationships within a social network based on an invitation-acceptance model. An invitation is sent between members to establish a relationship with the process 400. If the invitation is accepted, then the relationship is established. In one implementation of the process 400, a first user 402 uses the process 400 to request establishment of a relationship with a second user 404 though a social network provider system 120. The first user 402 and the second user 404 may be users of the client systems 105 of FIG. 1, and the social network provider system 120 may be the social network provider system 120 of FIG. 1. The first user 402 initially may not be a member of the social network and may become a member of the social network if the second user 404 accepts the invitation.

The social network provider 120 maintains a social network that includes the second user 404 (406). Maintaining the social network includes maintaining the members of the social network and the categorized relationships between the members. The members and the relationships maintained by the social network provider system 120 may be established using the process 300 of FIG. 3. Alternatively, the social network provider system 120 may be establishing a new social network with the execution of the process 400, in which case, the social network provider system 120 does not have a set of members or relationships to maintain. As another alternative, the social network may be established using an invitation acceptance model similar to process 400.

The first user 402 sends an invitation to the second user 404 to establish a relationship between the first user 402 and the second user 404 (408). The invitation may be an e-mail message, an instant message, or some other message outlining the desire to establish a relationship with the second user 404. Alternatively or additionally, the invitation may be an interface displayed to the second user 404 that outlines the desire of the first user 402 to establish a relationship with the second user 404, and enables the second user 404 to accept or reject the invitation. The invitation is sent to the second user 404 through the social network provider system 120, so the social network provider system 120 receives the invitation from the first user 402 (410). The social network provider system 120 then forwards the invitation to the second user 404 (412). In implementations where the invitation is an interface to be displayed for the second user 404, sending the invitation to the second user 404 may include sending an indication that the interface should be displayed to the second user 404.

The second user 404 receives and views the invitation (414) and determines whether to accept the invitation (416). If the invitation is not accepted, then the second user 404 notifies the first user 402 that the invitation is not accepted (418). The notification may be an e-mail message, an instant message, or some other message indicating that the invitation is not accepted. For example, if the original invitation is an e-mail message, the notification may be a reply to the e-mail message. Alternatively or additionally, the notification may be an interface that is displayed to the first user 402 indicating that the invitation is not accepted. The notification is sent to the first user 402 through the social network provider system 120, so the social network provider system receives and forwards the notification to the first user 402 (420). In implementations where the notification is an interface to be displayed to the first user 402, sending the notification to the first user 402 may include sending an indication that the interface should be displayed to the first user 402. The first user 402 receives and views the notification that the invitation is not accepted (422), and a relationship is not established between the first user 402 and the customer.

If the second user 404 determines that the invitation is accepted (416), then the second user 404 signals the social network provider system 120 to establish a relationship between the first user 402 and the second user 404 (424). The social network provider system receives the signal and establishes a relationship between the first user 402 and the second user 404 (426). The relationship may be established such that the second user 404 is the origin member for the established relationship and the first user 402 is the destination member of the established relationship. Alternatively or additionally, the relationship may be established such that the first user 402 is the origin member for the established relationship and the second user 404 is the destination member for the established relationship.

In addition, a category for the established relationship is specified. In some implementations, the category is specified by the first user 402 in, for example, the original invitation sent to the second user 404. For example, the first user 402 may specify that the category of the relationship is “business,” which would indicate that the first user 402 and the second user 404 are business contacts. The first user 402 may specify more specific categories for the established relationship, such as “boss” or “employee” instead of simply “business.” In such implementations, the social network provider system 120 sets the category of the established relationship to what is indicated in the original invitation. In other implementations, the second user 404 specifies the category for the established relationship by sending a category for the established relationship to the social network provider system 120 (428). The social network provider system receives the category and sets the category of the established relationship to what is specified by the second user 404 (430).

After a category for the established relationship has been specified, the social network provider system 120 notifies the first user 402 that the relationship has been established and a category for the relationship has been set (432). The first user 402 receives the notification that the relationship has been established (434).

Referring to FIG. 5, a process 500 may be used to categorize relationships within a social network based on an invitation-acceptance model. For example, the process 500 may be used to specify a category for an uncategorized relationship or to change a category of an already categorized relationship. An invitation is sent between the members to categorize a relationship with the process 500. If the invitation is accepted, then the relationship is categorized. In one implementation of the process 500, a first user 502 uses the process 500 to request that a relationship with a second user 504 be categorized through a social network provider system 120. The first user 502 and the second user 504 may be users of the client systems 105 of FIG. 1, and the social network provider system 120 may be the social network provider system 120 of FIG. 1.

The social network provider 120 maintains a social network that includes the first user 502 and the second user 504 (506). One or more direct relationships within the social network between the first user 502 and the second user 504 have been established.

The first user 502 may wish to establish or change the category of a relationship with the second user 504 for multiple reasons. For example, the first user 502 may be listed in an address book maintained by the second user 504 so that the second user 504 may contact the first user 502 when needed. The first user 502 may be added to the social network as a result of being included in the address book of the second user 504, and a relationship in the social network may be established between the first user 502 and the second user 504. However, the relationship may or may not be categorized, so the first user 502 may desire to change or to establish a category for the relationship.

To do so, the first user 502 sends an invitation to the second user 504 to categorize a relationship between the first user 502 and the second user 504 (508). The invitation to categorize the relationship may be an invitation to categorize an as yet uncategorized relationship or an invitation to change the category of an already categorized relationship. The invitation is sent to the second user 504 through the social network provider system 120, so the social network provider system 120 receives the invitation from the first user 502 (510).

The social network provider system 120 then forwards the invitation to the second user 504 (512). The second user 504 receives and views the invitation (514) and determines whether to accept the invitation to implicitly endorse the second user 504 (516). If the invitation is not accepted, then the second user 504 notifies the first user 502 that the invitation is not accepted (518). The notification is sent to the first user 502 through the social network provider system 120, so the social network provider system receives and forwards the notification to the first user 502 (520). The first user 502 receives and views the notification that the invitation is not accepted (522). If the relationship has not been categorized, then the relationship remains uncategorized. If the relationship has been categorized, then the category of the relationship remains unchanged.

If the second user 504 determines that the invitation is accepted (516), then the second user 504 signals the social network provider system 120 to categorize the relationship between the first user 502 and the second user 504 (524). The social network provider system receives the signal and categorizes the relationship between the first user 502 and the second user 504 (536), in some implementations, the category may be specified by the first user 502 in the original invitation to categorize the relationship sent to the second user 504. In such implementations, the social network provider system 120 sets the category of the relationship to what is indicated in the original invitation.

In other implementations, the second user 504 specifies the category for the established relationship by sending the category for the established relationship to the social network provider system 120. The social network provider system receives the specification of the category from the second user 504 and sets the category of the established relationship to what is specified by the second user 504. The social network provider system 120 notifies the first user 502 that the relationship has been categorized (528), and the first user 502 receives the notification that the relationship has been categorized (530).

Referring to FIG. 6, a process 600 is used to provide a first user with access to content maintained by a second user based on the categories of the relationships connecting the first and second users in the social network. The process 600 may be executed by a social network provider system, such as the social network provider system 120 of FIG. 1.

The social network provider system receives, from a first user, a request for access to content maintained by a second user (605). The content may be, for example, a profile of the second user, an electronic calendar of the second user, pictures maintained by the second user, annotations for pictures that are maintained by the second user, a list of entities for which presence information is monitored, an address book of the second user, an online data store of the second user, an online journal of the second user, or information describing an account of the second user. When the content is a profile of the second user, the request may be for access to one or more fields included in the profile. The first user may request to view the content or modify the content. The first user also may request a portion of the content. The request may be received from a client system used by the first user, such as one of the client systems 105 of FIG. 1.

In one implementation, the first user may directly request the access to the content. For example, the first user may know an identifier of the second user within the social network, and the first user may use the identifier to request the profile of the second user. In another implementation, the first user may submit the request indirectly, such as, for example, in response to a search of the social network in which the second user was identified. More particularly, the first user may specify search criteria to find members of the social network matching the criteria. A set of search results that includes the second user may be presented to the first user, and the first user may select an indication of the second user, such as an identifier of the second user, from the set to request the content of the second user. The search criteria may include values of one or more fields included in a profile, and the second user may be identified as matching the search criteria because the fields of the second user's profile have the same values.

The social network provider system next accesses a social network map that includes the second user (610). For example, the social network provider system may access the social network map 200 of FIG. 2. The social network map indicates multiple members, including the second user, and direct relationships between pairs of the members. At least one pair of the multiple members is related within the social network map by one or more of the direct relationships through zero or more intermediary members. For example, the first user and the second user may be related by a single direct relationship without any intermediary members, in which case the first and second users may be said to be directly related. As another example, the first user and the second user may be related by at least two direct relationships through at least one intermediary member, in which case the first and second users may be said to be indirectly related. More particularly, the first and second users may be indirectly related through a third user (the intermediary member), in which case the direct relationships that connect the first user to the second user are the direct relationship between the first and third users, and the direct relationship between the second and third users. At least some of the direct relationships of the social network map are categorized. The members and the direct relationships of the accessed social network may be established and categorized using the process 300 of FIG. 3, the process 400 of FIG. 4, or the process 500 of FIG. 5.

The social network provider system determines whether the first user is related to the second user in the social network map (615). More particularly, the social network provider system may determine whether one or more direct relationships of the social network directly or indirectly relate the first user to the second user through zero or more intermediary members. For example, referring also to FIG. 2, the first user may be the member 205 a, and the second user may be the member 205 g. In such a case, the social network provider system determines that the first user is related to the second user, for example, through the relationships 210 c, 210 i, and 210 k.

If the first user is related to the second user, the social network provider system identifies one or more direct relationships through which the first and second users are is related (620). The first and second users may be related directly to one another in the accessed social network, in which case the social network identifies one or more of the direct relationships between the first and second users. For example, if the first user is the member 205 m and the second user is the member 205 j, the social network provider system identifies at least one of the relationship 210 u-210 x.

Alternatively, the first and second users may be related indirectly through at least one intermediary member. In one implementation, the social network provider system may identify direct relationships that relate the first user to the second user. For example, when the first and second users are related through a third user, a direct relationship from the first user to the third user and a direct relationship from the third user to the second user may be identified. More particularly, if the first user is the member 205 a and the second user is the member 205 f, the social network provider system may identify the relationships 210 c and 210 i. In another implementation, direct relationships that relate the second user to the first user may be identified. For example, when the first and second users are related through a third user, a direct relationship from the second user to the third user and a direct relationship from the third user to the first user may be identified. More particularly, using the above example, the social network provider system may identify the relationships 210 j and 210 d. In other implementations, the social network provider system may identify both the direct relationships that relate the first user to the second user and the direct relationships that relate the second user to the first user.

The social network provider system identifies a category of at least one of the identified direct relationships (625). In one implementation, the identified category may be a category of one of the identified direct relationships. For example, when the first and second users are directly related, the identified category may be a category of a relationship that directly relates the first and second users. More particularly, if the first user is the member 205 f and the second user is the member 205 h, the identified category may be the category of the relationship 210 m, which is “husband,” or the category of the relationship 210 n, which is “wife.” As another example, when the first and second users are indirectly related, the identified category may be a category of one of the direct relationships between the first and second users. More particularly, the identified category may be a category of a direct relationship for which the first or second user is the origin or destination member. For example, if the first user is the member 205 e and the second user is the member 205 h, the identified category may be the category of one of the relationships 210 g, 210 h, 210 m, or 210 n.

In other implementations, categories may be identified for at least two of the identified relationships, or for all of the identified relationships. In such implementations, the social network provider system may identify a composite category for the identified direct relationships based on the identified categories (630). The composite category represents a single category for the multiple direct relationships that relate the first and second users. For example, using the above example, the composite category for the multiple direct relationships between the member 205 a and the member 205 d may indicate that the member 205 d is a daughter of a son of the member 205 a, or that the member 205 a is a mother of the father of the member 205 d, depending on whether the relationships 210 c and 210 i or the relationships 210 j and 210 d were previously identified. In such a case, the composite category of the identified direct relationships may be “daughter of son” or “mother of father.” Another example of a composite category may be “friend of a business contact,” which describes the direct relationships between the members 205 a and 205 d.

Alternatively or additionally, the composite category may be identified as one of the identified categories for which a most restrictive type of access to the requested content may be provided to the first user. For example, more restrictive access may be provided to users related to the second user with a business relationship than with a friend relationship. If the first user is related to the second user with a friend relationship and a business relationship, the social network provider system may identify the business relationship as the composite category, because such a category may result in more restrictive access to the requested content for the first user. In other implementations, the social network provider system may select the least restrictive of the identified categories.

The social network provider system also may identify a characteristic of the first user (635). The identified characteristic may affect a type of access to the requested content that is provided to the first user. For example, the social network provider system may identify a degree of separation between the first and second users. Greater access to the requested content may be provided when the identified degree of separation is small, and more restrictive access may be provided when the identified degree of separation is large. For example, when the identified degree is within a first degree of separation, the first user may be able to modify the requested content. When the identified degree is greater than the first degree but less than a second degree of separation, the first user may be able to view the requested content. When the identified degree is greater than the second degree, the first user may be denied access to the content. Alternatively or additionally, an amount of the content to be provided to the first user may depend on the identified degree of separation.

The social network provider system identifies a type of access to the content to be provided to the first user, based on the identified category (640). The identified type of access also may depend on the identified characteristic of the first user. The identified category may represent a sub-category of a broader category. For example, the identified category may be “mother,” “father,” “sister,” “brother,” “son,” or “daughter,” which represent sub-categories of a broader “family” category. In such a case, the social network provider system may identify the type of access based on the broader category.

In one implementation, each possible category of a direct relationship may be associated with a type of access to the content. For example, users related to the second user with a family relationship may be able to modify the content, users related to the second user with a friend relationship may be able to view the content, and users related to the second user with a business relationship may be denied access to the content. As another example, users related to the second user with a family relationship may be able to view all of the content, users related to the second user with a friend relationship may be able to view a smaller portion of content, and users related to the second user with a business relationship may be able to view an even smaller portion of content.

Alternatively or additionally, one or more of the possible composite categories may be associated with a type of access to the content. For example, a family member of a friend of the second user may be able to modify the content, a friend of the friend of the second user may be able to view the content, and a business contact of the friend of the second user may be denied access to the content. As another example, a family member of a family member may be able to view all of the content, a friend of the family member may be able to view a portion of content that does not relate to professional aspects of the second user, and a business contact of the family member may be able to view a portion of content that does not relate to personal aspects of the second user.

The types of access corresponding to the possible categories and the possible composite categories may be specified by the second user. In one implementation, default types of access may be provided for each of the possible categories. The second user may be able to modify the defaults for one or more of the possible categories. In addition, the second user may be able to specify a type of access for a composite category, particularly if a default type of access for the composite category was not provided.

If the first user is not related to the second user (615), the social network provider system identifies a type of access to the content that is to be provided to users who are not related to the second user (645). In one implementation, the identified type of access is at least as restrictive as a most restrictive type of access that may be provided to the first user if the first user were related to the second user. For example, the requested access to the content may be categorically denied such that the first user may not view or modify any portion of the content.

The social network provider system provides the identified type of access to the content to the first user (650). The social network provider system may provide the portion of the content that the first user may access to the first user. In addition, the social network provider system may enable the first user to modify, or only to view, the content, as indicated by the identified type of access. Alternatively or additionally, the social network system may signal an external system that maintains the content to provide the identified type of access to the first user. In one implementation, the social network provider may authenticate an identity of the first user before providing the identified type of access to the content. For example, the first user may be required to sign into the social network provider system with a username and a password before being provided with the identified type of access.

As an example, the social network provider system may execute the process 600 to provide the member 205 i access to content maintained by the member 205 h, such as a profile of the member 205 h. The social network provider system receives such a request from the member 205 i (605). The social network provider system then accesses the social network map 200 (610). Based on the accessed map, the social network provider system determines that the member 205 i is related to the member 205 h through the member 205 f (615).

In more detail, the social network provider system may identify the relationships 210 p and 210 m as direct relationships that relate the members 205 i and 205 h (620). Categories of the relationships 210 p and 210 m are identified (625). The relationship 210 p indicates that the member 205 f is a customer of the member 210 i, and the relationship 210 m indicates that the member 205 h is the husband of the member 205 f. The customer relationship 210 p is a particular type of business relationship, and the husband relationship 210 m is a particular type of family relationship, and those broader categories may be used to identify a type of access to the profile to be provided to the member 205 i.

The social network provider system may identify “family member of a business contact” as a composite category for the relationships between the members 205 i and 205 h, based on the categories of the relationships 210 p and 210 m (630). Alternatively, the social network provider system may determine that the composite category is the category of the business relationship, since that category may indicate the most restrictive access to the profile. The social network provider system also may identify that the member 205 h is one degree of separation from the member 205 i (635). Using the identified categories, the corresponding composite category, and the identified degree of separation, the social network provider system may determine that the member 205 i is able to view professional aspects of the profile of the member 205 h (640). Such a determination may be made using default or user-specified types of access for categories of relationships or for composite categories. The social network provider system then provides the identified type of access to the profile of the member 205 h to the member 205 i (650).

FIGS. 7A-7C and FIGS. 8A-8C illustrate interfaces that provide a first user with a particular type of access to content maintained by a second user, based on a category of relationship between the first and second users. More particularly, FIGS. 7A-7C illustrate an interface for limiting access to a profile of the second user, and FIGS. 8A-8C illustrate an interface for limiting access to an electronic calendar of the second user. In addition, access to other content that is maintained by the second user may be conditioned on a category of relationship between the first and second users.

For example, access to pictures, or annotations therefore, that are maintained by the second user, may be provided or limited based on the category of one or more relationships between the first and second users. More particularly, the second user may maintain a store of pictures that is accessible to other users, including the first user. The first user may be enabled to access all of the pictures when related to the second user with a family relationship. The first user may be enabled to access only some of the pictures when related to the second user with a friend relationship, and the first user may be denied access to all of the pictures when related to the second user with a business relationship.

The second user also may maintain several pictures in association with a profile of the second user, for example, for an online dating service. One of the pictures may be a is conservative picture of the second user, and another one of the pictures may be a relaxed picture of the second user. The first user may be provided with access to the relaxed picture, or with access to both the relaxed picture and the conservative picture, when related to the second user with a close relationship, such as a friend relationship or a family relationship. Alternatively or additionally, the first user may be provided with access only to the conservative picture if the first user is related to the second user with a more distant relationship, such as a business relationship.

The pictures that are included in the store of pictures, or that are associated with the profile of the second user, may have associated annotations; such as captions or comments that are added by the second user or other users with the appropriate access to the pictures. Access to the annotations or portions of the annotations may be conditioned on the category of one or more relationships between the first and second users. For example, annotations associated with the pictures that the first user is able to access may be provided to the first user conditioned on whether the first user is related to the second user with a close friend or family relationship. The annotations or portions of the annotations may be withheld from the first user when the first user is related to the second user with a business relationship.

Referring to FIGS. 7A-7C, a profile interface 700 displays a profile of a second user to a first user that requests the profile. Different views of the profile may be displayed to the first user with the profile interface 700 based on whether the first user is related to the second user in a social network, and, if so, on categories of relationships with which the first and second users are related in the social network. The profile interface 700 includes an identifier field 705 that identifies the second user. A profile 710 of the second user includes fields 715-765 that include information describing the second user.

The identifier field 705 includes an identifier of the second user. For example, the identifier field 705 may include a screen name, e-mail address, or another identifier with which the second user may be identified within the social network. In the illustrated example, the second user is identified by the screen name “User A” within the social network, as indicated by the identifier field 705.

The profile 710 includes information describing the second user. More particularly, each of the fields 715-765 includes a piece of information describing an aspect of the second user. For example, a name field 715 includes a full name of the second user, which is “Joe User.” A title field 720 indicates that the second user is occupied as a chief technical officer. A work address field 725 and a work phone number field 730 indicate an address and a telephone number of a workplace of the second user. A fax number field 735 indicates a number of a fax machine used by the second user.

A home address field 740 and a home phone number field 745 indicate an address and a phone number of the second user's home, and a cell phone number field 750 indicates a phone number of the second user's cellular telephone. A screen name field 755, a sexual orientation field 760, and an interests field 765 indicate a screen name, a sexual orientation, and interests, respectively, of the second user.

A particular one of the profile interfaces 700 of FIGS. 7A-7C may be presented to the first user based on a relationship of the first user to the second user. The interface 700 of FIG. 7A provides the least restrictive access to the second user's profile 710, as indicated by the profile 710 including all of the fields 715-765. Therefore, the interface 700 of FIG. 7A may be presented to the users to which a large amount of information describing the second user is provided, such as family members of the second user. For example, if the second user is the member 205 f in the social network map 200 of FIG. 2, the interface 700 may be presented to the member 205 h, since the member 205 h is related to the member 205 f with family relationships 210 m and 210 n.

The interface 700 of FIG. 7B provides more restrictive access to the second user's profile 710, as indicated by the profile 710 only including the fields 715-735, which relate to professional aspects of the second user. Therefore, the interface 700 of FIG. 7B may be presented to users with whom the second user has a business relationship. For example, if the second user is the member 205 c in the social network map 200, the interface 700 may be presented to the member 205 e, since the member 205 c is indirectly related to the member 205 e with at least one business relationship 210 g or 210 h.

The interface 700 of FIG. 7C provides a different type of restricted access to the second user's profile 710, as indicated by the profile 710 only including the fields 715 and 740-765, which relate to personal aspects of the second user. Therefore, the interface 700 of FIG. 7C may be presented to users with whom the second user has a friend or family relationship. For example, if the second user is the member 205 g in the social network map 200, the interface 700 may be presented to any other members of the social network 200, since the member 205 g is directly or indirectly related to the other members with the friend relationships 210 k and 210 l.

In some implementations, none of the interfaces 700 of FIGS. 7A-7C may be presented to the first user, depending on a characteristic of the first user, such as a degree of separation between the first user and the second user. For example, one of the interfaces 700 may be presented to users that are within three degrees of separation from the second user. In this case, when the second user is the member 205 m, a request for access to the profile of the member 205 m that is received from one of the members 205 f-205 i will be denied, because the members 205 f-205 i are more than three degrees of separation from the member 205 m. Therefore, one of the interfaces 700 will not be presented to the members 205 f-205 i.

Referring to FIGS. 8A-8C, an electronic calendar interface 800 displays an electronic calendar of a second user to a first user that requests access to the electronic calendar. Different views of the electronic calendar may be presented to the first user based on whether the first user is related to the second user in a social network, and, if so, on categories of relationships with which the first and second users are related in the social network.

The second user participates in events 805-845 that are displayed in the electronic calendar interface 800. The events 805-845 take place during a particular week displayed in the electronic calendar interface. Other implementations of the electronic calendar interface 800 may display events from a different time period, such as a particular day or a particular month. The events 805-845 represent two types of events. For example, the events 805-825 represent business events in which the user normally participates during business hours of the displayed week. In addition, the events 830-845 represent personal or social events in which the second user normally participates after business hours and on weekends.

A particular one of the electronic calendar interfaces 800 of FIGS. 8A-8C may be presented to the first user based on a relationship of the first user to the second user. The interface 800 of FIG. 8A provides the least restrictive access to the second user's electronic calendar, as indicated by the electronic calendar interface 800 displaying all of the events 805-845. Therefore, the interface 800 of FIG. 8A may be presented to the users to which a large amount of information describing events in which the second user participates is provided, such as family members of the second user. For example, if the second user is the member 205 l in the social network 200 of FIG. 2, the interface 800 may be presented to the member 205 j, since the member 205 j is related to the member 205 l with family relationships 210 m and 210 n.

The interface 800 of FIG. 8B provides more restrictive access to the second user's electronic calendar, as indicated by the electronic calendar interface 800 displaying the events 805-825, which relate to business events in which the second user participates. Therefore, the interface 800 of FIG. 8B may be presented to users with whom the second user has a business relationship. For example, if the second user is the member 205 i in the social network 200, the interface 800 may be presented to the member 205 l, since the member 205 i is indirectly related to the member 205 l with at least one business relationship 210 o or 210 p.

The interface 800 of FIG. 8C provides a different type of restricted access to the second user's electronic calendar, as indicated by the electronic calendar interface 800 displaying the events 830-845, which relate to personal or social events in which the user participates. Therefore, the interface 800 of FIG. 8C may be presented to users with whom the second user has a friend or family relationship, or to a friend of a family member of the user. For example, if the second user is the member 205 c in the social network 200, the interface 800 may be presented to the member 205 g, since the member 205 g is a friend of a family member of the member 205 c, as indicated by the relationships 210 i and 210 k.

A relationship of a member of a social network to a company, organization, or other entity may be indicated by relationships of the member to other members of the social network that are affiliated with, or otherwise correspond to, the company, organization, or other entity. For example, the member may have a relationship with the company if the member has a relationship with one or more of the members of the social network that correspond to the company. In some implementations, the member may have a relationship with the company if the member has a particular category of relationship with the one or more members. For example, the member may have a relationship with the company if the member has a “business” relationship with one or more members corresponding to the company. Determining that a member of a social network has a relationship to a company may include first identifying other members of the social network that are related to the member, and then determining which of the related members are employees of the company.

Alternatively, the member may have a relationship with the company if the member has a relationship with a member of the social network that abstractly represents the company. For example, a social network may include a member that is not a person, but rather a representation of a company. Other members of the social network may be related to the representation of the company in the social network with particular types of relationships to indicate the relationships between the other members and the actual company. For example, a first member may be related to the representation of the company with a “customer” relationship that indicates that the first member is a customer of the company, and a second member may be related to the representation with an “employee” link that indicates that the second member is an employee of the company. As a result, the described techniques may be used to provide or limit access to content that is maintained by a company, organization, or other entity. Furthermore, the described techniques may be used to provide or limit access to user-specific content to the company, organization, or entity.

The described techniques may be used to provide access to user-specific content to users of a social network. The described techniques also may be used to provide access to user-specific content to users that are part of different social networks or domains. For example, a first Internet service provider (ISP), such as the Microsoft Network, may provide a first social network, and a second ISP, such as America Online, may provide a second social network. The described techniques may be used, for example, to provide a first user included in the first social network with access to a profile of a second user included in the second social network.

In such a case, one or more members of the first social network also may be members of the second social network. The members included in both social networks may be required to register with both ISPs to be given identifiers to be used in each of the social networks. Registering a user with both of the social networks enables direct relationships to be established between the user and users of each of the social networks. In one implementation, registering a user with both social networks adds the user to both social networks. For each member that is included in both social networks, the first social network may include an indication of an identifier of the member within the second social network, and the second social network may include an indication of an identifier of the member within the first social network.

Each of the ISPs may maintain a dedicated social network provider system for the corresponding social network. When the first user requests access to the profile of the second user, a first social network provider system for the first social network may identify a third user of the first social network that is connected to the first user and that also is a member of the second social network. The first social network provider system may identify the third user by determining that the third user has an identifier within the second social network. The first social network provider system may provide the identifier of the third user within the second social network to a second social network provider system of the second social network. The first social network provider system also may provide an indication of one or more categories of direct relationships with which the first user is related to the third user in the first social network to the second social network provider system.

Using the received identifier of the third user, the second social network provider system may identify one or more direct relationships with which the third user is connected to the second user within the second social network. The second social network provider system may identify one or more categories of the identified direct relationships. Using the identified categories and the categories received from the first social network provider system, the second social network provider system may identify a type of access to the profile to be provided to the first user. The second social network provider system may communicate with the first social network provider system to provide the identified type of access to the profile to the first user. The first user may be required to be authenticated with the first or second social network provider system before being provided with the identified type of access. Such techniques are more fully described in U.S. application Ser. No. 11/079,522, which has attorney docket number 06975-476001, is concurrently filed herewith on Mar. 15, 2005, is titled “Sharing Social Network Information,” and was previously incorporated herein in its entirety for all purposes.

Various types of content have been described throughout, but the described techniques may be used to provide or limit access to any type of content. For example, the described techniques may be used to provide business contacts of a user access only to entries for business contacts from an address book of the user. Similarly, various types of relationships between users included in a social network have been described throughout. However, the described techniques may be used with other categories of relationships. In addition, various examples of types of access to user-specific content have been described throughout. However, the described types of access are included as examples only, and the described techniques may be used to provide other types of access to the content.

The described systems, methods, and techniques may be implemented in digital electronic circuitry, computer hardware, firmware, software, or in combinations of these elements. Apparatus embodying these techniques may include appropriate input and output devices, a computer processor, and a computer program product tangibly embodied in a machine-readable storage device for execution by a programmable processor. A process embodying these techniques may be performed by a programmable processor executing a program of instructions to perform desired functions by operating on input data and generating appropriate output. The techniques may be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to 

1-22. (canceled)
 23. A computer-implemented method, comprising: identifying, using at least one processor, a plurality of first relationships between a first user and a second user of the social network, based on social networking information, the first relationships comprising direct relationships through zero intermediary users; identifying, using the at least one processor, categories associated with the first relationships based on the social networking information; generating, using the at least one processor, a composite category representative of the identified categories; determining, using the at least one processor, a portion of a contact list of the second user that is accessible to the first user based on a composite access type associated with the generated composite category; and generating an instruction to transmit information associated with the portion of the contact list to the device of the first user based on the search criteria entered, the information instructing the device to: (i) present the contact list portion to the first user and (ii) enable the first user to at least read or modify the presented contact list portion in accordance with the composite access type.
 24. The computer-implemented method of claim 23, wherein: the identified relationship comprises a direct relationship between the first and second users through zero intermediary users; and the method further comprises: identifying a category associated with the direct relationship; and determining the accessible portion of the contact list of the second user based on the identified relationship and the identified category.
 25. The computer-implemented method of claim 23, further comprising identifying a plurality of direct relationships through zero intermediary users.
 26. The computer-implemented method of claim 25, further comprising: identifying categories associated with the direct relationships based on the social networking information; generating a composite category representative of the identified categories; and determining the accessible portion of the contact list of the second user based on the composite category.
 27. The computer-implemented method of claim 23, wherein the identified relationship comprises an indirect relationship between the first and second users through one or more intermediary users.
 28. The computer-implemented method of claim 27, further comprising: computing, for the indirect relationship, a degree of separation between the first and second users; and determining the accessible portion of the contact list of the second user based on at least the degree of separation.
 29. The computer-implemented method of claim 23, further comprising: receiving, from the first user, a request to access the contact list of the second user, the request identifying the first user; and identifying at least one characteristic of the first user based on the received request.
 30. The computer-implemented method of claim 29, further comprising determining the accessible portion of the contact list of the second user based on the first user characteristic.
 31. The computer-implemented method of claim 23, further comprising: determining a type of access associated with the accessible portion of the contact list of the second user; and enabling the first user to access the determined portion of the contact list of the second user in accordance with the access type.
 32. The computer-implemented method of claim 23, further comprising: determining, based on the social networking information, that no relationship exists between the first and second users; and assigning a default type of access to the contact list of the second user, based on the determination that no relationship between the first and second users, enabling the first user to access the determined portion of the contact list in accordance with the default access type.
 33. A system, comprising: a storage device that stores a set of instructions; and at least one processor coupled to the storage device and operative with the set of instructions to: identifying, using at least one processor, a plurality of first relationships between a first user and a second user of the social network, based on social networking information, the first relationships comprising direct relationships through zero intermediary users; identifying, using the at least one processor, categories associated with the first relationships based on the social networking information; generating, using the at least one processor, a composite category representative of the identified categories; determining, using the at least one processor, a portion of a contact list of the second user that is accessible to the first user based on a composite access type associated with the generated composite category; and generating an instruction to transmit information associated with the portion of the contact list to the device of the first user based on the search criteria entered, the information instructing the device to: (i) present the contact list portion to the first user and (ii) enable the first user to at least read or modify the presented contact list portion in accordance with the composite access type.
 34. The system of claim 33, wherein: the identified relationship comprises a direct relationship between the first and second users through zero intermediary users; and the method further comprises: identifying a category associated with the direct relationship; and determining the accessible portion of the contact list of the second user based on the identified relationship and the identified category.
 35. The system of claim 33, further comprising identifying a plurality of direct relationships through zero intermediary users.
 36. The system of claim 35, further comprising: identifying categories associated with the direct relationships based on the social networking information; generating a composite category representative of the identified categories; and determining the accessible portion of the contact list of the second user based on the composite category.
 37. The system of claim 33, wherein the identified relationship comprises an indirect relationship between the first and second users through one or more intermediary users.
 38. The system of claim 37, further comprising: computing, for the indirect relationship, a degree of separation between the first and second users; and determining the accessible portion of the contact list of the second user based on at least the degree of separation.
 39. The system of claim 33, further comprising: receiving, from the first user, a request to access the contact list of the second user, the request identifying the first user; and identifying at least one characteristic of the first user based on the received request.
 40. The system of claim 39, further comprising determining the accessible portion of the contact list of the second user based on the first user characteristic.
 41. The system of claim 33, further comprising: determining a type of access associated with the accessible portion of the contact list of the second user; and enabling the first user to access the determined portion of the contact list of the second user in accordance with the access type.
 42. A tangible, non-transitory computer-readable medium storing instructions that, when executed by at least one processor, cause the at least one processor to perform a method comprising: identifying, using at least one processor, a plurality of first relationships between a first user and a second user of the social network, based on social networking information, the first relationships comprising direct relationships through zero intermediary users; identifying, using the at least one processor, categories associated with the first relationships based on the social networking information; generating, using the at least one processor, a composite category representative of the identified categories; determining, using the at least one processor, a portion of a contact list of the second user that is accessible to the first user based on a composite access type associated with the generated composite category; and generating an instruction to transmit information associated with the portion of the contact list to the device of the first user based on the search criteria entered, the information instructing the device to: (i) present the contact list portion to the first user and (ii) enable the first user to at least read or modify the presented contact list portion in accordance with the composite access type. 