Authorization and Authentication Based on an Individual's Social Network
First Claim
Patent Images
1. A method comprising:
- accessing, by one or more computing devices, a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising a first-user node corresponding to a first user associated with an online social network and one or more second-user nodes that each correspond to a second user associated with the online social network;
receiving, by one or more computing devices, a request from an external service provider identifying the first user, wherein the first user is requesting to access content on the external service provider;
accessing, by one or more of the computing devices, a white list comprising a first set of user IDs of a first set of users, each user of the first set of users corresponding to a user associated with the external service provider; and
authenticating, by one or more of the computing devices, the first user to access content on the external service provider if the first-user node is connected in the graph structure to one or more nodes corresponding to users of the first set of users by a series of nodes and edges that does not comprise a node corresponding to a user on an authorized-users list.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes accessing a graph structure comprising a plurality of nodes and edges where each node represents a user, receiving a request from an external service provider identifying a first user who is requesting to access content on the external service provider, accessing a white list comprising a set of users associated with the external service provider, and authenticating the first user to access content on the external service provider if the first user is connected in the graph structure to a user on the white list by a series of nodes and edges that does not comprise an unauthorized node.
-
Citations
14 Claims
-
1. A method comprising:
-
accessing, by one or more computing devices, a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising a first-user node corresponding to a first user associated with an online social network and one or more second-user nodes that each correspond to a second user associated with the online social network; receiving, by one or more computing devices, a request from an external service provider identifying the first user, wherein the first user is requesting to access content on the external service provider; accessing, by one or more of the computing devices, a white list comprising a first set of user IDs of a first set of users, each user of the first set of users corresponding to a user associated with the external service provider; and authenticating, by one or more of the computing devices, the first user to access content on the external service provider if the first-user node is connected in the graph structure to one or more nodes corresponding to users of the first set of users by a series of nodes and edges that does not comprise a node corresponding to a user on an authorized-users list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
- one or more processors; and
one or more servers having a memory storing computer-executable instructions that when executed by one or more of the processors cause the processors to;access a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising a first-user node corresponding to a first user associated with an online social network and one or more second-user nodes that each correspond to a second user associated with the online social network; receive a request from an external service provider identifying the first user, wherein the first user is requesting to access content on the external service provider; access a white list comprising a first set of user IDs of a first set of users, each user of the first set of users corresponding to a user associated with the external service provider; and authenticate the first user to access content on the external service provider if the first-user node is connected in the graph structure to one or more nodes corresponding to users of the first set of users by a series of nodes and edges that does not comprise a node corresponding to a user on an authorized-users list.
- one or more processors; and
Specification