SYSTEM AND METHOD FOR DEVELOPING AND USING TRUSTED POLICY BASED ON A SOCIAL MODEL
First Claim
1. A computer-implemented method, executed by one or more computing devices, for using social relationships between entities to provide access to a computing resource, the method comprising:
- receiving, by at least one of the one or more computing devices, a request to calculate a social distance between a first node and a second node of a social map, the first node corresponding to a first entity, the second node corresponding to a second entity;
determining, by at least one of the one or more computing devices, a social distance between the first node and the second node based at least in part on one or more social connections between the first node and the second node;
determining, by at least one of the one or more computing devices, a trust relationship between the first entity and the second entity based at least in part on the one or more social connections between the first node and the second node; and
transmitting, by at least one of the one or more computing devices, information associated with the trust relationship to at least one of the first entity and the second entity, the trust relationship being used to determine whether the first entity is permitted to access a computing resource associated with the second entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A trust policy is constructed based upon a social relationship between real-world entities. The trust policy may determined based upon a social network and social network maps. The social network map provides a framework to determine social distances. The trust policy provides quick and secure access to desired or trusted nodes while providing security from entities outside the trusted sphere of nodes. The trust policy determined by the social distance may be used for various types of applications including filtering unwanted e-mail, providing secure access to resources, and accessing protected services. File sharing, referral querying, advertisement targeting, announcement targeting, access control, and various applications may be limited using the constructed trust policy.
-
Citations
27 Claims
-
1. A computer-implemented method, executed by one or more computing devices, for using social relationships between entities to provide access to a computing resource, the method comprising:
-
receiving, by at least one of the one or more computing devices, a request to calculate a social distance between a first node and a second node of a social map, the first node corresponding to a first entity, the second node corresponding to a second entity; determining, by at least one of the one or more computing devices, a social distance between the first node and the second node based at least in part on one or more social connections between the first node and the second node; determining, by at least one of the one or more computing devices, a trust relationship between the first entity and the second entity based at least in part on the one or more social connections between the first node and the second node; and transmitting, by at least one of the one or more computing devices, information associated with the trust relationship to at least one of the first entity and the second entity, the trust relationship being used to determine whether the first entity is permitted to access a computing resource associated with the second entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for using social relationships between entities to provide access to a computing resource, the apparatus comprising:
-
one or more processors; and one or more memories operatively coupled to at least one of the one or more processors and having instructions stored thereon that, when executed by at least one of the one or more processors, cause at least one of the one or more processors to; enable the receipt of a request to calculate a social distance between a first node and a second node of a social map, the first node corresponding to a first entity, the second node corresponding to a second entity; determine a social distance between the first node and the second node based at least in part on one or more social connections between the first node and the second node; determine a trust relationship between the first entity and the second entity based at least in part on the one or more social connections between the first node and the second node; and transmit information associated with the trust relationship to at least one of the first entity and the second entity, the trust relationship being used to determine whether the first entity is permitted to access a computing resource associated with the second entity. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. At least one non-transitory computer-readable medium storing computer-readable instructions that, when executed by one or more computing devices, cause at least one of the one or more computing devices to:
-
receive of a request to calculate a social distance between a first node and a second node of a social map, the first node corresponding to a first entity, the second node corresponding to a second entity; determine a social distance between the first node and the second node based at least in part on one or more social connections between the first node and the second node; determine a trust relationship between the first entity and the second entity based at least in part on the one or more social connections between the first node and the second node; and transmit information associated with the trust relationship to at least one of the first entity and the second entity, the trust relationship being used to determine whether the first entity is permitted to access a computing resource associated with the second entity. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification