Abstract:
Based on information used by the external system to identify a target user, the external system generates a target user hash identifier that is communicated to the social networking system along with a message. Using information from user profiles maintained by the social networking system, the social networking system generates hash identifiers for its users and compares the target user hash identifier to the generated hash identifiers hash identifiers for social networking system users are generated. The social networking system sends the message to a user associated with a hash identifier generated from user profile information that matches the target user hash identifier. Hence, an external application may communicate with social networking system users without accessing access information about the users maintained by the social networking system.
Abstract:
An entity provides a competitive block list for one or more of its objects in a social networking system. The competitive block list identifies advertisers or other entities prevented from targeting advertisements based on connections between users and objects of the entity. If a later received advertisement is targeted based on a connection between a user and an object of the entity, the social networking system determines whether the advertiser associated with the advertisement is included on the competitive block list. If the competitive block list includes the advertiser, the advertisement is determined not to be valid, and not presented to users. Otherwise, the advertisement is determined to be valid, and may be presented to users thereafter.
Abstract:
An entity provides a competitive block list for one or more of its objects in a social networking system. The competitive block list identifies advertisers or other entities prevented from targeting advertisements based on connections between users and objects of the entity. If a later received advertisement is targeted based on a connection between a user and an object of the entity, the social networking system determines whether the advertiser associated with the advertisement is included on the competitive block list. If the competitive block list includes the advertiser, the advertisement is determined not to be valid, and not presented to users. Otherwise, the advertisement is determined to be valid, and may be presented to users thereafter.
Abstract:
Methods, apparatuses and systems directed to sponsored story generation from an organic activity stream in a social networking site. A user wishing to promote an entry from an organic activity stream may, using a sponsor user interface, specify the types of stories to promote to a portion of the home page displayed to a member of a social network.
Abstract:
Methods, apparatuses and systems directed to sponsored story generation from an organic activity stream in a social networking site. A user wishing to promote an entry from an organic activity stream may, using a sponsor user interface, specify the types of stories to promote to a portion of the home page displayed to a member of a social network.
Abstract:
Based on information used by the external system to identify a target user, the external system generates a target user hash identifier that is communicated to the social networking system along with a message. Using information from user profiles maintained by the social networking system, the social networking system generates hash identifiers for its users and compares the target user hash identifier to the generated hash identifiers hash identifiers for social networking system users are generated. The social networking system sends the message to a user associated with a hash identifier generated from user profile information that matches the target user hash identifier. Hence, an external application may communicate with social networking system users without accessing access information about the users maintained by the social networking system.