SOCIAL DEVICE SECURITY IN A SOCIAL NETWORK
First Claim
1. A secure social network infrastructure having a plurality of circles, each of the plurality of circles being defined by at least a first member, the secure social network infrastructure being supported by a communication network, the secure social network infrastructure comprising:
- a social user device that supports both communication pathway security and a human member;
a social networking system that supports communication pathway security in communicating with the social user device via the communication network;
the social networking system having a security requirement associated with a first circle of the plurality of circles;
the social networking system configured to attempt to authenticate both the human member and the social user device, the authentication of the social user device being based at least in part on the security requirement associated with the first circle of the plurality of circles; and
the social networking system further configured to determine, based on a result of the authentication attempt, access rights for both the social user device and the human member to the first circle of the plurality of circles.
7 Assignments
0 Petitions
Accused Products
Abstract
A social network (SNET) is divided into one or more circles employing separate security secrets, e.g. keys, for communication between members. A device can be a member of more than one circle, and store different keys for each of those circles in separate, restricted portions of memory. When a member leaves a circle, new keys can be generated and distributed to the remaining members. Before and after joining a circle, a level of trust associated with the device or human member can be determined based on third party trust verification and a trust history. A requirement for multiple current circle members to vouch for the prospective member can be imposed as a condition of membership. Each circle can be assigned different trust and access levels, and authorization to receive information can be checked before transmitting information between circles.
-
Citations
23 Claims
-
1. A secure social network infrastructure having a plurality of circles, each of the plurality of circles being defined by at least a first member, the secure social network infrastructure being supported by a communication network, the secure social network infrastructure comprising:
-
a social user device that supports both communication pathway security and a human member; a social networking system that supports communication pathway security in communicating with the social user device via the communication network; the social networking system having a security requirement associated with a first circle of the plurality of circles; the social networking system configured to attempt to authenticate both the human member and the social user device, the authentication of the social user device being based at least in part on the security requirement associated with the first circle of the plurality of circles; and the social networking system further configured to determine, based on a result of the authentication attempt, access rights for both the social user device and the human member to the first circle of the plurality of circles. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. Device circuitry used in a first device member of a social network circle, the social networking circle being hosted by a social networking system, the social networking circle having a second device member, the device circuitry comprising:
-
communication interface circuitry through which both authenticity as a device member and authorized participation in the social networking circle are established; processing circuitry that manages secure communication relating to the second device member via the social networking circle; and the processing circuitry configured to utilize the social networking circle to set up a secure communication pathway to the second device member via the communication interface circuitry. - View Dependent Claims (10, 11, 12)
-
-
13. A social network infrastructure supporting a first device, a second device, and a first human member via a communication network, the social network infrastructure comprising:
-
a social networking system supporting a plurality of circles, a first circle of the plurality of circles being established by the first human member, and the first device being an established member of the first circle; the social networking system, to service an attempt to dock the first device in the first circle, configured to perform a first secure interaction with the first device, the first secure interaction being associated with the first device for participation in the first circle; and the social networking system, to service an invitation to add the second device as a member of the first circle, configured to perform a second secure interaction with the second device, the second secure interaction being associated with initial establishment of participation in the first circle. - View Dependent Claims (14, 15)
-
-
16. A method for use by a social network device, the method comprising:
-
requesting social network docking; receiving secure authentication interaction; providing secure authentication processing; receiving confirmation of docking into a first social circle within a social network, the social network having a plurality of social circles; and interacting via the first social circle using at least a first security key. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
Specification