Authorization and authentication based on an individual's social network
First Claim
Patent Images
1. A method comprising:
- receiving, by one or more computing devices, a request to send to a first user content relating to a second user;
accessing, by the one or more computing devices, a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, wherein;
each edge connects two nodes and represents a single degree of separation between them;
a first node corresponds to the first user; and
a second node corresponds to the second user;
determining, by the one or more computing devices, whether the first and second nodes are connected to each other in the graph structure through a path that comprises one or more unauthorized nodes identified in a gray list, the gray list being based on a black list; and
prohibiting, by the one or more computing devices, the content from being sent to the first user if the first and second user nodes are connected to each other in the graph structure through a path that comprises at least one unauthorized node identified in the gray list.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes accessing a graph structure comprising a plurality of nodes and edges where each node represents a user, receiving a request to transmit content related to a first user to a second user, and prohibiting transmission of the content to the second user if the first user and the second user are connected in the graph structure through a series of edges and nodes that comprises an unauthorized node.
-
Citations
16 Claims
-
1. A method comprising:
-
receiving, by one or more computing devices, a request to send to a first user content relating to a second user; accessing, by the one or more computing devices, a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, wherein; each edge connects two nodes and represents a single degree of separation between them; a first node corresponds to the first user; and a second node corresponds to the second user; determining, by the one or more computing devices, whether the first and second nodes are connected to each other in the graph structure through a path that comprises one or more unauthorized nodes identified in a gray list, the gray list being based on a black list; and prohibiting, by the one or more computing devices, the content from being sent to the first user if the first and second user nodes are connected to each other in the graph structure through a path that comprises at least one unauthorized node identified in the gray list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
- one or more processors; and
one or more computer-readable non-transitory storage media embodying software that is executed by one or more of the processors to;receive a request to send to a first user content relating to second user; access a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, wherein; each edge connects two nodes and represents a single degree of separation between them; a first node corresponds to the first user; and a second node corresponds to the second user; determine whether the first and second nodes are connected to each other in the graph structure through a path that comprises one or more unauthorized nodes identified in a gray list, the gray list being based on a black list; and prohibit the content from being sent to the first user if the first and second user nodes are connected to each other in the graph structure through a path that comprises at least one unauthorized node identified in the gray list.
- one or more processors; and
Specification