Authorization and Authentication Based on an Individual's Social Network
First Claim
1. A method comprising, by one or more computing devices:
- receiving, from a client device associated with a first entity of a communication service, a request by the first entity to access the communication service, the request comprising an entity identifier (ID) of the first entity;
determining, by one or more of the computing devices, whether the first entity is authorized to access the communication service based at least in part on a gray list comprising entity IDs of the entities who are not authorized to access the communication service, wherein the gray list is based on a black list; and
prohibiting, by one or more of the computing devices, access to the communication service by the first entity if the first entity is not authorized to access the communication service based on the gray list.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes receiving, from a client device associated with a first entity of a communication service, a request by the first entity to access the communication service, the request comprising an entity identifier (ID) of the first entity, determining whether the first entity is authorized to access the communication service based at least in part on a gray list comprising entity IDs of the entities who are not authorized to access the communication service, wherein the gray list is based on a black list, and prohibiting, by one or more of the computing devices, access to the communication service by the first entity if the first entity is not authorized to access the communication service based on the gray list.
-
Citations
20 Claims
-
1. A method comprising, by one or more computing devices:
-
receiving, from a client device associated with a first entity of a communication service, a request by the first entity to access the communication service, the request comprising an entity identifier (ID) of the first entity; determining, by one or more of the computing devices, whether the first entity is authorized to access the communication service based at least in part on a gray list comprising entity IDs of the entities who are not authorized to access the communication service, wherein the gray list is based on a black list; and prohibiting, by one or more of the computing devices, access to the communication service by the first entity if the first entity is not authorized to access the communication service based on the gray list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A service provider system comprising:
- one or more processors; and
one or more servers having a memory storing computer-executable instructions that when executed by one or more of the processors cause the processors to;receive, from a client device associated with a first entity of a communication service, a request by the first entity to access the communication service, the request comprising an entity identifier (ID) of the first entity; determine whether the first entity is authorized to access the communication service based at least in part on a gray list comprising entity IDs of the entities who are not authorized to access the communication service, wherein the gray list is based on a black list; and prohibit access to the communication service by the first entity if the first entity is not authorized to access the communication service based on the gray list.
- one or more processors; and
-
20. A system comprising:
-
means for receiving, from a client device associated with a first entity of a communication service, a request by the first entity to access the communication service, the request comprising an entity identifier (ID) of the first entity; means for determining whether the first entity is authorized to access the communication service based at least in part on a gray list comprising entity IDs of the entities who are not authorized to access the communication service, wherein the gray list is based on a black list; and means for prohibiting access to the communication service by the first entity if the first entity is not authorized to access the communication service based on the gray list.
-
Specification