×

Authorization and authentication based on an individual's social network

  • US 9,100,400 B2
  • Filed: 08/02/2012
  • Issued: 08/04/2015
  • Est. Priority Date: 07/22/2004
  • Status: Expired due to Term
First Claim
Patent Images

1. A method comprising:

  • receiving, by one or more computing devices, a request to send to a first user content relating to a second user;

    accessing, by the one or more computing devices, a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, wherein;

    each edge connects two nodes and represents a single degree of separation between them;

    a first node corresponds to the first user; and

    a second node corresponds to the second user;

    determining, by the one or more computing devices, whether the first and second nodes are connected to each other in the graph structure through a path that comprises one or more unauthorized nodes identified in a gray list, the gray list being based on a black list; and

    prohibiting, by the one or more computing devices, the content from being sent to the first user if the first and second user nodes are connected to each other in the graph structure through a path that comprises at least one unauthorized node identified in the gray list.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×