Privacy protected interactions with third parties
First Claim
1. A computer-implemented method for a social networking site to facilitate privacy protected interactions between users of the social networking site and a third party utility, the method comprising:
- providing, by a social networking computer system to a user device, content for presentation to a user of a social networking site, the content including social networking information associated with the user and an advertisement provided by a third party utility;
receiving, by the social networking computer system based on the user interacting with the advertisement, a request to communicate with the third party utility;
responsive to receiving the request, generating, by the social networking computer system, an encrypted user identification based on a social networking identity of the user; and
providing, by the social networking computer system, the encrypted user identification and the request to the third party utility for processing, wherein information that would allow the third party utility to decrypt the encrypted user identification is not provided by the social networking computer system to the third party utility.
6 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments are directed to computer-implemented methods and systems for a site to facilitate privacy protected interactions between users of a site and a third party utility. For example, a computer may receiving from a user selected from the users of the site, a request to interact with the third party utility. The computer may also encrypt an identification of the user to generate an encrypted user identification associated with the third party utility; and provide the encrypted user identification and the request to the third party utility.
43 Citations
32 Claims
-
1. A computer-implemented method for a social networking site to facilitate privacy protected interactions between users of the social networking site and a third party utility, the method comprising:
-
providing, by a social networking computer system to a user device, content for presentation to a user of a social networking site, the content including social networking information associated with the user and an advertisement provided by a third party utility; receiving, by the social networking computer system based on the user interacting with the advertisement, a request to communicate with the third party utility; responsive to receiving the request, generating, by the social networking computer system, an encrypted user identification based on a social networking identity of the user; and providing, by the social networking computer system, the encrypted user identification and the request to the third party utility for processing, wherein information that would allow the third party utility to decrypt the encrypted user identification is not provided by the social networking computer system to the third party utility. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A social networking computer system for a social networking site to facilitate facilitating privacy protected interactions between users of the social networking site and a third party utility, the system comprising:
-
one or more processors; and a non-transitory computer-readable storage medium having instructions that cause the one or more processors to perform steps comprising; providing, by the social networking computer system to a user device, content for presentation to a user of the social networking site, the content including social networking information associated with the user and an advertisement provided by the third party utility; receiving, by the social networking computer system based on the user interacting with the advertisement, a request to communicate with the third party utility; responsive to receiving the request, generating, by the social networking computer system, an encrypted user identification based on a social networking identity of the user; and providing, by the social networking computer system, the encrypted user identification and the request to the third party utility for processing, wherein information that would allow the third party utility to decrypt the encrypted user identification is not provided by the social networking computer system to the third party utility. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory computer readable storage medium having instructions thereon for a social networking site to facilitate privacy protected interactions between users of the social networking site and a third party utility, wherein the instructions are configured to cause a social networking computer system to perform steps comprising:
-
providing, by the social networking computer system to a user device, content for presentation to a user of the social networking site, the content including social networking information associated with the user and an advertisement provided by the third party utility; receiving, by the social networking computer system based on the user interacting with the advertisement, a request to communicate with the third party utility; responsive to receiving the request, generating, by the social networking computer system, an encrypted user identification based on a social networking identity of the user; and providing, by the social networking computer system, the encrypted user identification and the request to the third party utility for processing, wherein information that would allow the third party utility to decrypt the encrypted user identification is not provided by the social networking computer system to the third party utility. - View Dependent Claims (32)
-
Specification