Anonymously sharing resources based on social network user data
First Claim
1. A computer-implemented method, comprising:
- receiving, by a social networking system operatively coupled to a processor, a requestor token and an owner token from a resource computer system communicatively coupled to the social networking system, wherein the requestor token comprises an encrypted resource requester identity generated for a second user requesting access to a resource owned by a first user on the resource computer system, and the owner token comprises an encrypted resource owner identity generated for the first user and an encrypted access control policy;
determining by the social networking system, whether access to the resource by the second user is to be granted based on the encrypted resource requester identity, the encrypted resource owner identity, and the encrypted access control policy;
sending, by the social networking system, a signal to the resource computer system indicating a result of the determining whether the access to the resource by the second user on is to be granted.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for controlling access to a resource of an owner of the resource is provided. The owner can be a user of a resource computer system. The access control can be based on social network data of a social network system and/or on an owner token relating to the owner or a requester token relating to a requester requesting access to the resource and an access control policy. The owner token and the requester token can be received by the system to determine by the social networking system whether access to the resource is to be granted based on the content of the owner token and the requester token. A social network identity of the owner and a social network identity of the requester may only be determinable by the social network system.
14 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a social networking system operatively coupled to a processor, a requestor token and an owner token from a resource computer system communicatively coupled to the social networking system, wherein the requestor token comprises an encrypted resource requester identity generated for a second user requesting access to a resource owned by a first user on the resource computer system, and the owner token comprises an encrypted resource owner identity generated for the first user and an encrypted access control policy; determining by the social networking system, whether access to the resource by the second user is to be granted based on the encrypted resource requester identity, the encrypted resource owner identity, and the encrypted access control policy; sending, by the social networking system, a signal to the resource computer system indicating a result of the determining whether the access to the resource by the second user on is to be granted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A social networking system, comprising:
-
a memory that stores computer executable components; and a processor that executes the computer executable components stored in the memory, wherein the computer executable components comprise; an access controller configured to; receive a requestor token and an owner token from a resource computing system communicatively coupled to the social networking system, wherein the requestor token comprises an encrypted resource requester identity generated for a second user requesting access to a resource owned by the first user on the resource computer system, and the owner token comprises an encrypted resource owner identity generated for the first user and an encrypted access control policy; determine whether access to the resource by the second user is to be granted based on the encrypted resource requester identity, the encrypted resource owner identity, and the encrypted access control policy; send a signal to the resource computer system indicating a result of the determination of whether the access to the resource by the second user on is to be granted. - View Dependent Claims (10)
-
-
11. A computer program product facilitating controlling access to a resource of a resource computer system, wherein the resource is owned by a first user, the computer program product comprising a non-transitory computer readable medium having program instructions embodied therewith, the program instructions executable by a social networking system communicatively coupled to the resource computer system to cause the social networking system to:
-
receive a requestor token from a resource computing system communicatively coupled to the social networking system, wherein the requestor token comprises an encrypted resource requester identity generated for a second user requesting access to a resource owned by the first user on the resource computer system, and the owner token comprises an encrypted resource owner identity generated for the first user and an encrypted access control policy; determine whether access to the resource by the second user is to be granted based on the encrypted resource requester identity, the encrypted resource owner identity, and the encrypted access control policy; send a signal to the resource computer system indicating a result of the determination of whether the access to the resource by the second user on is to be granted. - View Dependent Claims (12)
-
-
13. A computer program product facilitating controlling access to a resource of a resource computer system, wherein the resource is owned by a first user, the computer program product comprising a non-transitory computer readable medium having program instructions embodied therewith, the program instructions executable by the resource computer system communicatively coupled to a social networking system to cause the resource computer system to:
-
send a requestor token and an owner token to the social networking system, wherein the requestor token comprises an encrypted resource requester identity generated for the second user requesting access to the resource owned by the first user, and the owner token comprises an encrypted resource owner identity generated for the first user and an encrypted access control policy; receive a signal from the social networking system indicating whether access to the resource by the second user is to be granted based on the encrypted resource requester identity, the encrypted resource owner identity, and the encrypted access control policy; control access to the resource by the second user based on the signal. - View Dependent Claims (14)
-
-
15. A resource computer system, comprising:
-
a memory that stores computer executable components; and a processor that executes the computer executable components stored in the memory to; send a requestor token and an owner token to a social networking system communicatively coupled to the resource computer system, wherein the requestor token comprises an encrypted resource requester identity generated for the second user requesting access to the resource owned by the first user, and the owner token comprises an encrypted resource owner identity generated for the first user and an encrypted access control policy; receive a signal from the social networking system indicating whether access to the resource by the second user is to be granted based on the encrypted resource requester identity, the encrypted resource owner identity, and the encrypted access control policy; control access to the resource by the second user based on the signal. - View Dependent Claims (16, 17)
-
-
18. A computer-implemented method comprising:
-
sending, by a resource computer system operatively coupled to a processor, a requestor token and an owner token to a social networking system communicatively coupled to the resource computer system wherein the requestor token comprises an encrypted resource requester identity generated for the second user requesting access to the resource owned by the first user, and the owner token comprises an encrypted resource owner identity generated for the first user and an encrypted access control policy; receiving, by the resource computer system, a signal from the social networking system indicating whether access to the resource by the second user is to be granted based on the encrypted resource requester identity, the encrypted resource owner identity, and the encrypted access control policy; controlling, by the resource computer system, access to the resource by the second user based on the signal. - View Dependent Claims (19, 20)
-
Specification