Trust-based authentication in a social networking system
First Claim
1. A computer implemented method to determine the status of a user being authenticated, the method comprising:
- using a computer processor to perform a plurality of steps, wherein the steps perform;
selecting a trusted agent, the selected trusted agent being a user who has been verified to be a public figure;
iteratively determining confidence scores for a plurality of users, wherein a user being authenticated is connected to the trusted agent through the plurality of users, the confidence scores being based on a strength of a connection between the trusted agent and each of the plurality of users, wherein the strength of a connection between two users is determined by a factor selected from a group consisting of;
a number of friends shared by the two users, a length of time overlap between when the two users joined a social networking system, a direction of the connection between the two users, and a degree of the connection between the two users;
calculating a confidence score of the user being authenticated based on the confidence scores of the plurality of users, the confidence score of the user being authenticated representing an estimate of whether the user being authenticated having a user account that matches a verified public figure; and
determining whether the user being authenticated is a public figure based on the confidence score of the user being authenticated.
2 Assignments
0 Petitions
Accused Products
Abstract
A social networking system determines whether a user is a real public figure or is the correct “public persona” of an individual who is famous within a particular domain. The system selects one or more trusted agents. A trusted agent is a user who has been confirmed or is otherwise trusted within the system. The system traverses the social graph of the trusted agent to score and identify additional users who have a sufficient connection to the trusted agent to authenticate them as other confirmed public personas/figures. The system computes confidence scores of the connections of the trusted agent, considering the strength of the connections and other relevant factors. The system provides confidence scores for one or more target users in the social network based on the confidence scores of the friends or connections connecting the trusted agent and the target user.
30 Citations
18 Claims
-
1. A computer implemented method to determine the status of a user being authenticated, the method comprising:
using a computer processor to perform a plurality of steps, wherein the steps perform; selecting a trusted agent, the selected trusted agent being a user who has been verified to be a public figure; iteratively determining confidence scores for a plurality of users, wherein a user being authenticated is connected to the trusted agent through the plurality of users, the confidence scores being based on a strength of a connection between the trusted agent and each of the plurality of users, wherein the strength of a connection between two users is determined by a factor selected from a group consisting of;
a number of friends shared by the two users, a length of time overlap between when the two users joined a social networking system, a direction of the connection between the two users, and a degree of the connection between the two users;calculating a confidence score of the user being authenticated based on the confidence scores of the plurality of users, the confidence score of the user being authenticated representing an estimate of whether the user being authenticated having a user account that matches a verified public figure; and determining whether the user being authenticated is a public figure based on the confidence score of the user being authenticated.
-
2. The computer implemented method of claim 1, wherein selecting the trusted agent is based at least in part on knowledge of the trusted agent observed by the social networking system.
-
3. The computer implemented method of claim 1, wherein the trusted agent has a predetermined confidence score representing high confidence that the selected trusted agent is a public figure.
-
4. The computer implemented method of claim 1, wherein iteratively determining confidence scores for the plurality of users comprises:
-
selecting a user from the plurality of the users, the selected user directly connected to the trusted agent; determining strength of the connection between the selected user and the trusted agent; and calculating the confidence score of the selected user based on the confidence score of the trusted agent and the strength of the connection.
-
-
5. The computer implemented method of claim 4, further comprising:
responsive to the determination of the strength of the connection, calculating a confidence score of a second user based on the confidence score of the selected user and the strength of connection between the second user and the selected user.
-
6. The computer implemented method of claim 1, wherein iteratively determining confidence scores for the plurality of users further comprises:
-
determining hygiene of computers associated with the plurality of users, the hygiene of a computer indicating whether the computer has been exposed to malicious malware; and adjusting the confidence scores of the plurality of users based on the hygiene of the computers associated with the plurality of users.
-
-
7. The computer implemented method of claim 1, wherein calculating the confidence score of the user being authenticated comprises:
-
correlating the confidence scores of the users that are connected to the user being authenticated; and calculating the confidence score of the user being authenticated based on the correlation.
-
-
8. The computer implemented method of claim 7, wherein correlating the confidence scores of the users that are directly connected to the user being authenticated comprises:
averaging the confidence scores of the users that are connected to the user being authenticated to generate the confidence score of the user being authenticated.
-
9. The computer implemented method of claim 1, wherein determining whether the user being authenticated is a public figure based on the confidence score of the user being authenticated comprises:
-
responsive to the user being authenticated having a bad confidence, identifying the user being authenticated as a candidate for further investigation; determining a true identity of the user being authenticated based on user profile, connections and events data associated with the user being authenticated.
-
-
10. A non-transitory computer-readable storage medium to determine the status of a user being authenticated, the storage medium storing computer program instructions, executed by a computer processor, the computer program instructions comprising instructions for:
-
selecting a trusted agent, the selected trusted agent being a user who has been verified to be a public figure; iteratively determining confidence scores for a plurality of users, wherein a user being authenticated is connected to the trusted agent through the plurality of users, the confidence scores being based on a strength of a connection between the trusted agent and each of the plurality of users, wherein the strength of a connection between two users is determined by a factor selected from a group consisting of;
a number of friends shared by the two users, a length of time overlap between when the two users joined a social networking system, a direction of the connection between the two users, and a degree of the connection between the two users;calculating a confidence score of the user being authenticated based on the confidence scores of the plurality of users, the confidence score of the user being authenticated representing an estimate of whether the user being authenticated having a user account that matches a verified public figure; and determining whether the user being authenticated is a public figure based on the confidence score of the user being authenticated.
-
-
11. The computer-readable storage medium of claim 10, wherein the computer program instructions for selecting the trusted agent is based at least in part on knowledge of the trusted agent observed by the social networking system.
-
12. The computer-readable storage medium of claim 10, wherein the trusted agent has a predetermined confidence score representing high confidence that the selected trusted agent is a public figure.
-
13. The computer-readable storage medium of claim 10, wherein the computer program instructions for iteratively determining confidence scores for the plurality of users comprise computer program instructions for:
-
selecting a user from the plurality of the users, the selected user is directly connected to the trusted agent; determining strength of the connection between the selected user and the trusted agent; and calculating the confidence score of the selected user based on the confidence score of the trusted agent and, the strength of the connection.
-
-
14. The computer-readable storage medium of claim 13, further comprising computer program instructions for:
responsive to the determination of the strength of the connection, calculating a confidence score of a second user based on the confidence score of the selected user and the strength of connection between the second user and the selected user.
-
15. The computer-readable storage medium of claim 10, wherein the computer program instructions for iteratively determining confidence scores for the plurality of users further comprise computer program instructions for:
-
determining hygiene of computers associated with the plurality of users, the hygiene of a computer indicating whether the computer has been exposed to malicious malware; and adjusting the confidence scores of the plurality of users based on the hygiene of the computers associated with the plurality of users.
-
-
16. The computer-readable storage medium of claim 10, wherein the computer program instructions for calculating the confidence score of the user being authenticated comprise computer program instructions for:
-
correlating the confidence t scores of the users that are connected to the user being authenticated; and calculating the confidence score of the user being authenticated based on the correlation.
-
-
17. The computer-readable storage medium of claim 16, wherein the computer program instructions for correlating the confidence scores of the users that are directly connected to the user being authenticated comprise computer program instructions for:
averaging the confidence scores of the users that are connected to the target user to generate the confidence score of the user being authenticated.
-
18. The computer-readable storage medium of claim 10, wherein the computer program instructions for determining whether the user being authenticated is a public figure based on the confidence score of the user being authenticated comprise computer program instructions for:
-
responsive to the user being authenticated having a bad confidence score, identifying the user being authenticated as a candidate for further investigation; determining true identity of the user being authenticated based on user profile, connections and events data associated with the user being authenticated.
-
Specification