×

Social network stealth and counter messaging

  • US 9,269,079 B2
  • Filed: 09/26/2011
  • Issued: 02/23/2016
  • Est. Priority Date: 09/26/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of transforming messages for a social networking service site, the method comprising:

  • receiving from an originating client a first message, a second message associated therewith, and a first access token specific to a first user of the social networking service site associated with the originating client;

    transmitting a message post command to the social networking service site, the message post command including the first message and the first access token, the first message being stored in a content repository of a first profile linked to the first user for view by other users of the social networking service site;

    receiving from the social networking service site a first message identifier corresponding to the first message, the first message identifier being generated in response to the message post command and a validation of the first access token;

    storing the second message and the first message identifier in a linked relationship for retrieval based upon a query for the first message identifier; and

    transmitting a confirmation message to the originating client in response to receiving the first message identifier;

    receiving from a requesting client a message retrieval request and a second access token specific to a second user of the social networking service site associated with the requesting client;

    transmitting to the social networking service site a message retrieval command and the second access token in response to the message retrieval request from the requesting client;

    receiving at least one message identifier from the social networking service site, the at least one message identifier being the first message identifier and corresponding to the first message stored in the content repository of the first profile;

    querying for the second message with the received at least one message identifier; and

    transmitting to the requesting client the second message.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×