Providing Social-Network Information to Third-Party Systems
First Claim
1. A method comprising:
- receiving, at a first computing device associated with a social-networking system and from a second computing device associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system;
determining, by the first computing device, whether the user of the third-party system matches any member of the social-networking system, comprising;
for each member of the social-networking system,accessing a second identifier corresponding to the member of the social-networking system computed by applying the hash algorithm to a user credential associated with the member of the social-networking system; and
comparing the first identifier and the second identifier; and
if the second identifier corresponding to a member of the social-networking system matches the first identifier, then sending, by the first computing device to the second computing device, social-network information of the member of the social-networking system in response to the query.
1 Assignment
0 Petitions
Accused Products
Abstract
Particular embodiments receive, at a first computing device associated with a social-networking system and from a second computing device associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system; determine, by the first computing device, whether the user of the third-party system matches any member of the social-networking system; and if the second identifier corresponding to a member of the social-networking system matches the first identifier, then send, by the first computing device to the second computing device, social-network information of the member of the social-networking system in response to the query.
-
Citations
30 Claims
-
1. A method comprising:
-
receiving, at a first computing device associated with a social-networking system and from a second computing device associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system; determining, by the first computing device, whether the user of the third-party system matches any member of the social-networking system, comprising; for each member of the social-networking system, accessing a second identifier corresponding to the member of the social-networking system computed by applying the hash algorithm to a user credential associated with the member of the social-networking system; and comparing the first identifier and the second identifier; and if the second identifier corresponding to a member of the social-networking system matches the first identifier, then sending, by the first computing device to the second computing device, social-network information of the member of the social-networking system in response to the query. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A first computing system associated with a social-networking system comprising:
-
a memory comprising instructions executable by one or more processors; and the one or more processors coupled to the memory and operable to execute the instructions, the one or more processors being operable when executing the instructions to; receive, from a second computing system associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system; determine whether the user of the third-party system matches any member of the social-networking system, comprising; for each member of the social-networking system, access a second identifier corresponding to the member of the social-networking system computed by applying the hash algorithm to a user credential associated with the member of the social-networking system; and compare the first identifier and the second identifier; and if the second identifier corresponding to a member of the social-networking system matches the first identifier, then send, to the second computing system, social-network information of the member of the social-networking system in response to the query. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification