发明名称 |
Providing Access to Non-Obscured Content Items based on Triggering Events |
摘要 |
A computer-implemented technique enables a creator-user to create an obscured version of a content item. The technique then posts the obscured version to a hosting environment. A monitoring system receives a requestor-user's request to obtain a non-obscured version of the content item. In response, the monitoring system determines whether a number of requestor-users who have made such a valid request exceeds a predetermined threshold value set by the creator-user. If so, the monitoring system provides access to at least part of the non-obscured version of the content item to all requestor-users who have made valid requests. |
申请公布号 |
US2017094019(A1) |
申请公布日期 |
2017.03.30 |
申请号 |
US201514866853 |
申请日期 |
2015.09.26 |
申请人 |
Microsoft Technology Licensing, LLC |
发明人 |
Ahmed Muzammil;Jahed Saeed;Apacible Johnson;Wang Hsiao-Lan;Quek Siu Yu Cherie |
分类号 |
H04L29/08;H04L12/26 |
主分类号 |
H04L29/08 |
代理机构 |
|
代理人 |
|
主权项 |
1. A monitoring system, implemented by one or more computing devices, for providing access to a content item, comprising:
at least one hardware processor for executing instructions to perform operations of:
receiving a message over a computer network that indicates that a requestor-user has made a request to obtain a non-obscured version of a content item, the requestor-user making such a request, via a user device, upon interacting with an obscured version of the content item that is accessible via a computer-implemented hosting environment;determining whether a number of requestor-users who have made a valid request to obtain the non-obscured version of the content item satisfies a threshold value; andproviding access to at least part of the non-obscured version of the content item to a group of requestor-users, operating respective user devices, upon determining that the number of requestor-users who have made a valid request satisfies the threshold value. |
地址 |
Redmond WA US |