Authorization and Authentication Based on an Individual's Social Network
First Claim
Patent Images
1. A method comprising:
- receiving, at a service provider, a request from a first user to access content on the service provider, the request identifying a user identifier (ID) of the first user;
transmitting, to a social networking system that is external to the service provider, a request to determine whether the first user is authorized to access content on the service provider based on a gray list comprising user IDs of the users who are not authorized to access content on the service provider, wherein the gray list is based on a black list; and
permitting, at the service provider, the content to be accessed by the first user if an indication is received from the social networking system that the first user is authorized to access the content based on the gray list.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes receiving a request to transmit content related to a first user to a second user, determining whether transmission of the content is authorized based on a list of unauthorized users, and transmitting the content to the second user if the transmission is authorized based on the list.
34 Citations
19 Claims
-
1. A method comprising:
-
receiving, at a service provider, a request from a first user to access content on the service provider, the request identifying a user identifier (ID) of the first user; transmitting, to a social networking system that is external to the service provider, a request to determine whether the first user is authorized to access content on the service provider based on a gray list comprising user IDs of the users who are not authorized to access content on the service provider, wherein the gray list is based on a black list; and permitting, at the service provider, the content to be accessed by the first user if an indication is received from the social networking system that the first user is authorized to access the content based on the gray list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A service provider system comprising:
- one or more processors; and
one or more servers having a memory storing computer-executable instructions that when executed by one or more of the processors cause the processors to;receive, at the service provider, a request from a first user to access content on the service provider, the request identifying a user identifier (ID) of the first user; transmit, to a social networking system that is external to the service provider, a request to determine whether the first user is authorized to access content on the service provider based on a gray list comprising user IDs of the users who are not authorized to access content on the service provider, wherein the gray list is based on a black list; and permit, at the service provider, the content to be accessed by the first user if an indication is received from the social networking system that the first user is authorized to access the content based on the gray list.
- one or more processors; and
Specification