Segmenting access to electronic message boards
First Claim
1. A computer-implemented method comprising:
- under control of one or more computer systems configured with executable instructions,receiving a request from a user of a computing device to perform an action with respect to a selected thread of a plurality of threads on an electronic message board, wherein the action includes modifying a posted message in the selected thread or removing a posted message from the selected thread;
retrieving access criteria associated with the action to be performed on the selected thread, each of the plurality of threads on the electronic message board having access criteria for each of a plurality of actions capable of being performed with respect to each thread, the access criteria for the selected thread specifying at least a strong level of authentication and a weak level of authentication;
determining a required level of authentication specified by the access criteria for the selected thread and the action to be performed with respect to the selected thread, the required level being determined to be at least one of the strong level of authentication or the weak level of authentication;
accessing user profile information associated with the user using a user profile module configured to obtain the user profile information from at least one data store;
determining whether the user is authorized to perform the action by validating the user profile information against the required level of authentication, the user profile information capable of being validated using a transactional account associated with the user for the strong level of authentication and capable of being validated using at least one of a gender, an age, a birthdate, a location, an identification, or an organization membership associated with the user for the weak level of authentication; and
performing the action with respect to the selected thread when the user is determined to be authorized.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for fine level access control over message content in an electronic messaging system. Access criteria associated with the message content define requirements that a user must satisfy in order to perform specified actions on message content. The user'"'"'s complete profile is examined at run time and compared to access criteria to make a real time decision about the level of access that a user should have to message content. Depending on the access criteria associated with content, stronger authentication or weaker authentication of the user profile information may be performed on the user profile to determine the level of access that should be granted to the user.
12 Citations
20 Claims
-
1. A computer-implemented method comprising:
under control of one or more computer systems configured with executable instructions, receiving a request from a user of a computing device to perform an action with respect to a selected thread of a plurality of threads on an electronic message board, wherein the action includes modifying a posted message in the selected thread or removing a posted message from the selected thread; retrieving access criteria associated with the action to be performed on the selected thread, each of the plurality of threads on the electronic message board having access criteria for each of a plurality of actions capable of being performed with respect to each thread, the access criteria for the selected thread specifying at least a strong level of authentication and a weak level of authentication; determining a required level of authentication specified by the access criteria for the selected thread and the action to be performed with respect to the selected thread, the required level being determined to be at least one of the strong level of authentication or the weak level of authentication; accessing user profile information associated with the user using a user profile module configured to obtain the user profile information from at least one data store; determining whether the user is authorized to perform the action by validating the user profile information against the required level of authentication, the user profile information capable of being validated using a transactional account associated with the user for the strong level of authentication and capable of being validated using at least one of a gender, an age, a birthdate, a location, an identification, or an organization membership associated with the user for the weak level of authentication; and performing the action with respect to the selected thread when the user is determined to be authorized. - View Dependent Claims (2, 3, 4)
-
5. A computer-implemented method comprising:
under control of one or more computer systems configured with executable instructions, receiving a request from a mobile computing device associated with a user to perform an action with respect to a selected thread of a plurality of threads on a message board, each thread having access criteria for each of a plurality of actions capable of being performed with respect to each thread, wherein the action includes modifying a posted message in the selected thread or removing a posted message from the selected thread; retrieving access criteria associated with the action to be performed with respect to the selected thread, the access criteria including at least a strong level of authentication and a weak level of authentication; determining a required level of authentication specified by the access criteria; accessing user profile information associated with the user, the user profile information stored in at least one data store; sending a message over a telecommunications network to the mobile computing device associated with the user when the required level of authentication is the strong level of authentication, a contact information for the mobile computing device associated with the user being identified based on the user profile information, and the message including an authentication code for authorizing the action; validating at least one of a gender, an age, a birthdate, a location, an identification, or an organization membership associated with the user for authorizing the action, the validating being based on the user profile information when the determined level of authentication is the weak level of authentication; and performing the action when the action is authorized. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
13. A system comprising:
-
at least one processor; and a memory device including instructions that, when executed by the at least one processor, cause the system to; receive a request from a mobile computing device associated with a user to perform an action with respect to a selected thread of a plurality of threads on a message board, each thread having access criteria for each of a plurality of actions capable of being performed with respect to each thread, wherein the action includes modifying a posted message in the selected thread or removing a posted message from the selected thread; retrieve access criteria associated with the action to be performed with respect to the selected thread, the access criteria including at least a strong level of authentication and a weak level of authentication; determine a required level of authentication specified by the access criteria; access user profile information associated with the user, the user profile information stored in at least one data store; send a message over a telecommunications network to the mobile computing device associated with the user when the required level of authentication is the strong level of authentication, a contact information for the mobile computing device associated with the user being identified based on the user profile information, and the message including an authentication code for authorizing the action; validate at least one of a gender, an age, a birthdate, a location, an identification, or an organization membership associated with the user for authorizing the action, the validating being based on the user profile information when the determined level of authentication is the weak level of authentication; and perform the action when the action is authorized. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium including instructions for identifying elements, the instructions when executed by a processor of a computing device causing the computing device to:
-
receive a request from a user of the computing device to perform an action with respect to a selected thread of a plurality of threads on an electronic message board being displayed on a display of the computing device, wherein the action includes modifying a posted message in the selected thread or removing a posted message from the selected thread; retrieve access criteria associated with the action to be performed on the selected thread, each of the plurality of threads on the electronic message board having access criteria for each of a plurality of actions capable of being performed with respect to each thread, the access criteria for the selected thread specifying at least a strong level of authentication and a weak level of authentication; determine a required level of authentication specified by the access criteria for the selected thread and the action to be performed with respect to the selected thread, the required level being determined to be at least one of the strong level of authentication or the weak level of authentication; access user profile information associated with the user using a user profile module configured to obtain the user profile information from at least one data store; determine whether the user is authorized to perform the action by validating the user profile information against the required level of authentication, the user profile information capable of being validated using a transactional account associated with the user for the strong level of authentication and capable of being validated using at least one of a gender, an age, a birthdate, a location, an identification, or an organization membership associated with the user for the weak level of authentication; and perform the action with respect to the selected thread when the user is determined to be authorized. - View Dependent Claims (18, 19, 20)
-
Specification