Authorization and authentication based on an individual's social network
First Claim
Patent Images
1. A method comprising:
- receiving, by one or more computing devices, a request to send content relating to a first user to a second user, each of the users having a user identifier (ID);
determining, by one or more computing devices, whether sending the content as requested is authorized based on a gray list comprising user IDs of the users whose content is not authorized to be transmitted to the second user, wherein the gray list is based on a black list; and
blocking, by one or more computing devices, the content from being sent as requested to the second user if it is not authorized based on the gray list.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes receiving a request to transmit content related to a first user to a second user, determining whether transmission of the content is authorized based on a list of unauthorized users, and transmitting the content to the second user if the transmission is authorized based on the list.
180 Citations
21 Claims
-
1. A method comprising:
-
receiving, by one or more computing devices, a request to send content relating to a first user to a second user, each of the users having a user identifier (ID); determining, by one or more computing devices, whether sending the content as requested is authorized based on a gray list comprising user IDs of the users whose content is not authorized to be transmitted to the second user, wherein the gray list is based on a black list; and blocking, by one or more computing devices, the content from being sent as requested to the second user if it is not authorized based on the gray list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
- one or more processors; and
one or more servers having a memory storing computer-executable instructions that when executed by one or more of the processors cause the processors to;receive a request to send content relating to a first user to a second user, each of the users having a user identifier (ID); determine whether sending the content as requested is authorized based on a gray list comprising user IDs of the users whose content is not authorized to be transmitted to the second user, wherein the gray list is based on a black list; and block the content from being sent as requested to the second user if it is not authorized based on the gray list.
- one or more processors; and
Specification