Member privacy protection
First Claim
1. A system comprising:
- a computer-readable memory storing computer-executable instructions that, when executed by one or more hardware processors, configure the system to perform a plurality of operations, the operations comprising;
storing contact information for a plurality of members of a social networking system;
receiving, from a client device associated with a first member, a communication representing a request for matching member profiles in the social networking service, the communication including a list of contacts of the first member;
for a particular contact submitted in the list of contacts;
accessing member-identifiable contact information of the particular contact;
comparing the member-identifiable contact information in the particular contact to contact information for the plurality of members; and
in accordance with a determination that the member-identifiable contact information in the particular contact matches the contact information of a particular member of the social networking system;
generating a likelihood score that the communication is a legitimate request for matching member profiles, the higher the likelihood score the likelier the communication is a legitimate request while the lower the likelihood score the likelier the communication is a malicious request; and
in accordance with a determination that the generated likelihood score exceeds a predetermined likelihood score threshold, thus determining that the communication is a legitimate request, causing the following operations to be performed;
categorizing the particular contact as a suggested member connection; and
transmitting member referral data to the client device for presentation.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for identifying potential member and guest contacts while protecting member data privacy at a social networking system are disclosed. A system stores contact information for a plurality of members of a social networking system. The system receives a list of contacts of the first member. For a contact, the system accesses contact information of the contact, compares the contact information in the contact to contact information for the plurality of members, and in accordance with a determination that the contact information in the contact matches the contact information of a member of the social networking system, generates a score that the contact is not associated with malicious activity. In accordance with a determination that the generated score exceeds a predetermined score threshold, the system categorizes the contact as a suggested member connection. The system transmits member referral data to the client device for presentation.
28 Citations
20 Claims
-
1. A system comprising:
-
a computer-readable memory storing computer-executable instructions that, when executed by one or more hardware processors, configure the system to perform a plurality of operations, the operations comprising; storing contact information for a plurality of members of a social networking system; receiving, from a client device associated with a first member, a communication representing a request for matching member profiles in the social networking service, the communication including a list of contacts of the first member; for a particular contact submitted in the list of contacts; accessing member-identifiable contact information of the particular contact; comparing the member-identifiable contact information in the particular contact to contact information for the plurality of members; and in accordance with a determination that the member-identifiable contact information in the particular contact matches the contact information of a particular member of the social networking system; generating a likelihood score that the communication is a legitimate request for matching member profiles, the higher the likelihood score the likelier the communication is a legitimate request while the lower the likelihood score the likelier the communication is a malicious request; and in accordance with a determination that the generated likelihood score exceeds a predetermined likelihood score threshold, thus determining that the communication is a legitimate request, causing the following operations to be performed; categorizing the particular contact as a suggested member connection; and transmitting member referral data to the client device for presentation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method using at least one computer processor, the method comprising:
-
storing contact information for a plurality of members of a social networking system; receiving, from a client device associated with a first member, a communication representing a request for matching member profiles in the social networking service, the communication including a list of contacts of the first member; for a particular contact submitted in the list of contacts; accessing member-identifiable contact information of the particular contact; comparing the member-identifiable contact information in the particular contact to contact information for the plurality of members; and in accordance with a determination that the member-identifiable contact information in the particular contact matches the contact information of a particular member of the social networking system; generating a likelihood score that the communication is a legitimate request for matching member profiles, the higher the likelihood score the likelier the communication is a legitimate request while the lower the likelihood score the likelier the communication is a malicious request; and in accordance with a determination that the generated likelihood score exceeds a predetermined likelihood score threshold, thus determining that the communication is a legitimate request, causing the following operations to be performed; categorizing the particular contact as a suggested member connection; and transmitting member referral data to the client device for presentation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing instructions that, when executed by the one or more processors of a machine, cause the machine to perform operations comprising:
storing contact information for a plurality of members of a social networking system; receiving, from a client device associated with a first member, a communication representing a request for matching member profiles in the social networking service, the communication including a list of contacts of the first member; for a particular contact submitted in the list of contacts; accessing member-identifiable contact information of the particular contact; comparing the member-identifiable contact information in the particular contact to contact information for the plurality of members; and in accordance with a determination that the member-identifiable contact information in the particular contact matches the contact information of a particular member of the social networking system; generating a likelihood score that the communication is a legitimate request for matching member profiles, the higher the likelihood score the likelier the communication is a legitimate request while the lower the likelihood score the likelier the communication is a malicious request; and in accordance with a determination that the generated likelihood score exceeds a predetermined likelihood score threshold, thus determining that the communication is a legitimate request, causing the following operations to be performed; categorizing the particular contact as a suggested member connection; and transmitting member referral data to the client device for presentation. - View Dependent Claims (16, 17, 18, 19, 20)
Specification