METHOD FOR MANAGING PRIVACY AND SECURITY IN A SOCIAL NETWORK BY CHECKING SHARED DATA AND RELATIONSHIPS BETWEEN USERS
First Claim
Patent Images
1. Computer-implemented method for managing privacy and security in a social network, by checking shared data and relationships with other users;
- where in the control of the shared data, said data consist of at least one multimedia file and comprising;
assigning to a particular multimedia file a privacy identifier;
assigning to at least a contact of the social network user a privacy identifier;
sharing the file with the identifier in the social network;
characterized in thatonly if the privacy identifier of the contact matches the multimedia file the multimedia file is shown to the contact; and
where every time the user which has shared the file changes the privacy identifier of the shared multimedia file, the matching of said new priority identifier with at least one of the user'"'"'s contacts is analyzed, being showed in the case of matching.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a computer-implemented method for managing privacy and security in a social network, by checking shared data and relationships with other users, said method comprising the use of a privacy identifier in multimedia files in order to ensure checking on the part of the sending user and an expectation identifier in order to check relationships with other users within a social network.
-
Citations
12 Claims
-
1. Computer-implemented method for managing privacy and security in a social network, by checking shared data and relationships with other users;
- where in the control of the shared data, said data consist of at least one multimedia file and comprising;
assigning to a particular multimedia file a privacy identifier; assigning to at least a contact of the social network user a privacy identifier; sharing the file with the identifier in the social network; characterized in that only if the privacy identifier of the contact matches the multimedia file the multimedia file is shown to the contact; and
where every time the user which has shared the file changes the privacy identifier of the shared multimedia file, the matching of said new priority identifier with at least one of the user'"'"'s contacts is analyzed, being showed in the case of matching. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 12)
- where in the control of the shared data, said data consist of at least one multimedia file and comprising;
-
8. Computer-implemented method for managing privacy and security in a social network, by checking shared data and relationships between users;
- where in the control of the relationships between users comprises the steps of
establishing an expectation identifier of relationship with at least one user of the social network; sending a contact request from a first user of the social network to a second user of the social network, where said request includes a first expectation identifier from said first user; receiving a response from said second user to said first user including a second expectation identifier from second user.
- where in the control of the relationships between users comprises the steps of
Specification