INSTANT PERSONALIZATION SECURITY
First Claim
1. A method comprising:
- providing a platform for the user to use applications and/or access web pages;
when an application or a web page is integrated with the platform, combining an identifier (ID) of the application or the web page with an identifier of the user (UID) in a networking system;
encrypting the combined UID and application ID into a hashed ID according to a hash function;
providing, to the application or the web page, the hashed ID to identify the user;
providing one or more options for the user to authorize or reject the application or the web page to access the user'"'"'s fully identifying profile; and
upon the user'"'"'s authorization, providing the application or the web page an access token to access a subset of the user'"'"'s fully identifying profile in the networking system.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for instant personalization security are provided. The system includes a platform on a user to open applications and/or access web sites. When an application is integrated with the platform, the identification of the application can be combined with the ID of the user and encrypted into a hashed ID. The application does not have access to the user'"'"'s fully identifying profile (e.g., UID or other public information). Instead, the application only has access to pseudonymous profile (e.g., the hashed ID, first name, last initial, small profile pictures and/or other non-fully identifying profile information) of the user. One or more options are then provided for the user to authorize or reject the application to access the user'"'"'s fully identifying profile. Upon the user'"'"'s authorization, an access token is provided to the application to access a subset of the user'"'"'s fully identifying profile.
41 Citations
20 Claims
-
1. A method comprising:
-
providing a platform for the user to use applications and/or access web pages; when an application or a web page is integrated with the platform, combining an identifier (ID) of the application or the web page with an identifier of the user (UID) in a networking system; encrypting the combined UID and application ID into a hashed ID according to a hash function; providing, to the application or the web page, the hashed ID to identify the user; providing one or more options for the user to authorize or reject the application or the web page to access the user'"'"'s fully identifying profile; and upon the user'"'"'s authorization, providing the application or the web page an access token to access a subset of the user'"'"'s fully identifying profile in the networking system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A networking system comprising:
-
a computer system; and an application program instantiated on the computer system, wherein the application provides computer-generated output; wherein the computer system is configured to; provide a platform for the user to use applications and/or access web pages; when an application is integrated with the platform, combine an identifier (ID) of the application with an identifier of the user (UID) in the networking system; encrypt the combined UID and application ID into a hashed ID according to a hash function; provide, to the application, the hashed ID to identify the user; provide one or more options for the user to authorize or reject the application to access the user'"'"'s fully identifying profile; and upon the user'"'"'s authorization, provide the application an access token to access a subset of the user'"'"'s fully identifying profile in the networking system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
providing a platform on a user device for a user to use applications and/or access web pages; when an application is integrated with the platform, combining an identifier (ID) of the application, an identifier of the user (UID) and the user'"'"'s birthday in a networking system; encrypting the combined application ID, UID and birthday into a hashed ID according to a hash function; linking the hashed ID with pseudonymous profile of the user;
wherein the pseudonymous profile includes the user'"'"'s small profile picture URLs, first name, and/or last initial;providing, to the application or the web page, the hashed ID to identify the user; providing one or more options for the user to authorize or reject the application to access the user'"'"'s fully identifying profile; and upon the user'"'"'s authorization, providing the application an access token to access a subset of the user'"'"'s fully identifying profile in the networking system.
-
Specification