Implicit Population of Access Control Lists
6 Assignments
0 Petitions
Accused Products
Abstract
Communication applications may include lists of users with which a user of the application communicates. If two users of a communications application each include the other user on their user lists, an implicit trust may be established between the users. For example, if user A includes user B in her list and user B includes user A in his list, then it may be determined that each user knows and/or trusts the other user. As a result, a connection or communications pathway may be automatically created between the client devices of the users to facilitate communications between the users based on the implicit trust.
-
Citations
76 Claims
-
1-53. -53. (canceled)
-
54. A method comprising:
-
determining whether a first user is included on a user list associated with a communications application of a second user;
determining whether the second user is included on a user list of a communications application associated with the first user; and
regulating a communications pathway between a first client device associated with the first user and a second client device associated with the second user based on both the determination of whether the first user is included on a user list associated with a communications application of the second user and the determination of whether the second user is included on a user list of a communications application associated with the first user. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
-
73. A communications system comprising:
-
a first client device associated with a first user and including a communications application;
a second client associated with a second user and including the communications application; and
a host to determine whether the first user is included on a user list of the communications application of the second client device, and to determine whether the second user is included on a user list of the communications application of the first client device, and to regulate a communications pathway between the first client device and the second client device based on both the determination of whether the first user is included on a user list of the communications application of the second client device and the determination of whether the second user is included on a user list of the communications application of the first device.
-
-
74. A host system comprising:
-
an interface to receive a communication from a first client device associated with a first user and to transmit a communication to a second client device associated with a second user;
storage to store a user list associated with the first user and to store a user list associated with the second user; and
a host to determine an identifier of the first user and an identifier of the second user associated with a received message, to determine whether the first user list includes the second user identifier, to determine whether the second user list includes the first user identifier, and to regulate a communications pathway between the first and second client devices based on both the determination of whether the first user list includes the second user identifier and the determination of whether the second user list includes the first user identifier.
-
-
75. A method comprising:
-
determining whether a first user is included on a user list associated with a communications application of a second user;
determining whether the second user is included on a user list of a communications application associated with the first user; and
inferring an implicit trust between the first user and the second user based on both the determination of whether the first user is included on a user list associated with a communications application of the second user and the determination of whether the second user is included on a user list of a communications application associated with the first user. - View Dependent Claims (76)
-
Specification