Inherited Access Authorization to a Social Network
First Claim
1. A method for access authorization via inheritance to information of a first registered user on a social network, the method comprising:
- defining authorization criteria for the first registered user;
receiving first verification data from a requester, wherein the requestor comprises one of a second registered user or a non-registered user;
determining if the first verification data satisfies the authorization criteria, and in the event the first verification data satisfies the authorization criteria, extending inherited access authorization to the requester in the event the requester is the non-registered user, and extending inherited access authorization to a contact of the requestor in the event the requester is the second registered user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for access authorization via inheritance to information of a first registered user on a social network comprises defining authorization criteria for the first registered user; receiving first verification data from a requester, wherein the requester comprises one of a second registered user or a non-registered user; determining if the first verification data satisfies the authorization criteria, and in the event the first verification data satisfies the authorization criteria, extending inherited access authorization to the requester in the event the requester is the non-registered user, and extending inherited access authorization to a contact of the requestor in the event the requestor is the second registered user.
134 Citations
19 Claims
-
1. A method for access authorization via inheritance to information of a first registered user on a social network, the method comprising:
-
defining authorization criteria for the first registered user; receiving first verification data from a requester, wherein the requestor comprises one of a second registered user or a non-registered user; determining if the first verification data satisfies the authorization criteria, and in the event the first verification data satisfies the authorization criteria, extending inherited access authorization to the requester in the event the requester is the non-registered user, and extending inherited access authorization to a contact of the requestor in the event the requester is the second registered user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product comprising a computer readable storage medium containing computer code that, when executed by a computer, implements a method for accessing information of a registered user on a social network, wherein the method comprises:
-
defining authorization criteria for the first registered user; receiving first verification data from a requestor, wherein the requestor comprises one of a second registered user or a non-registered user; determining if the first verification data satisfies the authorization criteria, and in the event the first verification data satisfies the authorization criteria, extending inherited access authorization to the requester in the event the requester is the non-registered user, and extending inherited access authorization to a contact of the requestor in the event the requester is the second registered user.
-
-
19. A system for access authorization via inheritance to information of a first registered user on a social network, the system comprising:
-
a network configured to transmit first verification data from a requestor to the social network, wherein the requester comprises one of a second registered user or a non-registered user; and a social network, the social network comprising authorization criteria for the first registered user, the social network being configured to determine if the first verification data satisfies the authorization criteria, and in the event the first verification data satisfies the authorization criteria, extending inherited access authorization to the requestor in the event the requestor is the non-registered user, and extending inherited access authorization to a contact of the requestor in the event the requestor is the second registered user.
-
Specification