Trust metrics on shared computers
First Claim
Patent Images
1. A method comprising:
- by a verification authority, receiving data uniquely identifying a particular one of a plurality of users to the verification authority and a request to access a shared device, the shared device being configured for use by at least the plurality of users;
by the verification authority, accessing a social graph of the particular user to determine whether one or more users in the social graph have previously accessed the shared device; and
by the verification authority, transmitting to a display of the mobile device information indicating which of the users in the social graph have previously accessed the shared device.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving data uniquely identifying a particular user to the verification authority and a request to access a shared device. The shared device being configured for use by at least a number of users. The method also includes accessing a social graph of the particular user to determine whether one or more users in the social graph have previously accessed the shared device; and displaying on a display of the mobile device information indicating which of the users in the social graph have previously accessed the shared device.
-
Citations
20 Claims
-
1. A method comprising:
-
by a verification authority, receiving data uniquely identifying a particular one of a plurality of users to the verification authority and a request to access a shared device, the shared device being configured for use by at least the plurality of users; by the verification authority, accessing a social graph of the particular user to determine whether one or more users in the social graph have previously accessed the shared device; and by the verification authority, transmitting to a display of the mobile device information indicating which of the users in the social graph have previously accessed the shared device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable non-transitory storage media embodying logic configured when executed to:
-
receive data uniquely identifying a particular one of a plurality of users to the verification authority and a request to access a shared device, the shared device being configured for use by at least the plurality of users; access a social graph of the particular user to determine whether one or more users in the social graph have previously accessed the shared device; and transmit to a display of the mobile device information indicating which of the users in the social graph have previously accessed the shared device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
by an application on a mobile device of a particular one of a plurality of users, transmitting data uniquely identifying the particular user to a verification authority and a request to access a shared device, the shared device being configured for use by at least the plurality of users; and by the application, presenting on a display of the mobile device information from the verification authority indicating which of one or more users in a social graph of the particular user have previously accessed the shared device, the verification authority accessing the social graph to determine whether one or more of the users in the social graph have previously accessed the shared device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification