Methods and Systems for Verifying a User Login Using Contact Information of the User
First Claim
Patent Images
1. A method, comprising:
- at a server system having one or more processors and memory storing instructions for execution by the one or more processors;
receiving, from a first device, a request to authenticate a user with a third-party application using a social networking system and contact information of the user; and
requesting the social networking system to authenticate the user based on the contact information,wherein the social networking system is different from the third-party application.
2 Assignments
0 Petitions
Accused Products
Abstract
A server system receives, from a first device, a request to authenticate a user with a third-party application using a social networking system and contact information of the user. The server system requests the social networking system to authenticate the user based on the contact information. The social networking system is different from the third-party application.
28 Citations
16 Claims
-
1. A method, comprising:
at a server system having one or more processors and memory storing instructions for execution by the one or more processors; receiving, from a first device, a request to authenticate a user with a third-party application using a social networking system and contact information of the user; and requesting the social networking system to authenticate the user based on the contact information, wherein the social networking system is different from the third-party application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable storage medium storing one or more programs for execution by one or more processors of a server system, the one or more programs including instructions for:
-
receiving, from a first device, a request to authenticate a user with a third-party application using a social networking system and contact information of the user; and requesting the social networking system to authenticate the user based on the contact information, wherein the social networking system is different from the third-party application.
-
-
16. A server system, comprising:
-
one or more processors; and memory storing one or more programs for execution by the one or more processors, the one or more programs including instructions for; receiving, from a first device, a request to authenticate a user with a third-party application using a social networking system and contact information of the user; and requesting the social networking system to authenticate the user based on the contact information, wherein the social networking system is different from the third-party application.
-
Specification