WIRELESS DATA PRIVACY MAINTAINED THROUGH A SOCIAL NETWORK
First Claim
1. A method comprising:
- by one or more servers of a system providing an on-line service, sending a token to a first client computing device associated with a first user of the on-line service, the token being generated by the servers based at least in part on a user identifier of the first user;
by the servers, receiving the token from a second client computing device associated with a second user of the on-line service, the token being sent to the second client computing device from the first client computing device through a wireless connection;
by the servers, verifying the token based at least in part on the user identifier of the first user;
by the servers, determining data accessible to the second user if the token is verified; and
by the servers, sending to the second client computing device at least some of the data accessible to the second user.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, one or more servers providing an on-line service send a token to a first client computing device associated with a first user of the on-line service, the token being generated by the servers based at least in part on a user identifier of the first user; the serves receive the token from a second client computing device associated with a second user of the on-line service, the token being sent to the second client computing device from the first client computing device through a wireless connection; the servers verify the token based at least in part on the user identifier of the first user; the servers determine data accessible to the second user if the token is verified; the servers also send to the second client computing device at least some of the data accessible to the second user.
40 Citations
9 Claims
-
1. A method comprising:
-
by one or more servers of a system providing an on-line service, sending a token to a first client computing device associated with a first user of the on-line service, the token being generated by the servers based at least in part on a user identifier of the first user; by the servers, receiving the token from a second client computing device associated with a second user of the on-line service, the token being sent to the second client computing device from the first client computing device through a wireless connection; by the servers, verifying the token based at least in part on the user identifier of the first user; by the servers, determining data accessible to the second user if the token is verified; and by the servers, sending to the second client computing device at least some of the data accessible to the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification