Network access based on social-networking information
First Claim
1. A method comprising:
- receiving, at a wireless access point, from a client system of a first user, a request to access a network through the wireless access point, the wireless access point being operated by an entity;
sending, by the wireless access point, an identifier comprising a unique code that uniquely identifies the client system to a social-networking system, the social-networking system comprising at least one social graph, the social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a relationship between the nodes, wherein a first node of the plurality of nodes corresponds to the first user;
receiving, at the wireless access point, from the social-networking system, a positive authorization determination based on the identifier, wherein the positive authorization is determined because a timeline associated with the first user indicates that the first user has previously checked in with the entity; and
providing the client system with access to the network through the wireless access point in accordance with the positive authorization determination.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving a request at a wireless access point from a client system to access a network through the wireless access point. The wireless access point sends an identifier associated with the client system to a social-networking system, the social-networking system including user profiles arranged in one or more social graphs. The social graphs store relationships between the user profiles. The method further includes receiving at the wireless access point from the social-networking system an authorization determination. The authorization determination is based upon a first user profile of the plurality of user profiles. The first user profile includes the identifier associated with the client system. The method further includes providing the client system with access to the network through the wireless access point in accordance with the authorization determination.
-
Citations
19 Claims
-
1. A method comprising:
-
receiving, at a wireless access point, from a client system of a first user, a request to access a network through the wireless access point, the wireless access point being operated by an entity; sending, by the wireless access point, an identifier comprising a unique code that uniquely identifies the client system to a social-networking system, the social-networking system comprising at least one social graph, the social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a relationship between the nodes, wherein a first node of the plurality of nodes corresponds to the first user; receiving, at the wireless access point, from the social-networking system, a positive authorization determination based on the identifier, wherein the positive authorization is determined because a timeline associated with the first user indicates that the first user has previously checked in with the entity; and providing the client system with access to the network through the wireless access point in accordance with the positive authorization determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to; receive a request from a client system of a first user to access a network through a wireless access point, the wireless access point being operated by an entity; send an identifier comprising a unique code that uniquely identifies the client system to a social-networking system, the social-networking system comprising at least one social graph, the social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a relationship between the nodes, wherein a first node of the plurality of nodes corresponds to the first user; receive, from the social-networking system, a positive authorization determination based on the identifier, wherein the positive authorization is determined because a timeline associated with the first user indicates that the first user has previously checked in with the entity; and provide the client system with access to the network through the wireless access point in accordance with the positive authorization determination. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer readable media comprising logic operable to:
-
receive a request from a client system of a first user to access a network through a wireless access point, the wireless access point being operated by an entity; send an identifier comprising a unique code that uniquely identifies the client system to a social-networking system, the social-networking system comprising at least one social graph, the social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a relationship between the nodes, wherein a first node of the plurality of nodes corresponds to the first user; receive, from the social-networking system, a positive authorization determination based on the identifier, wherein the positive authorization is determined because a timeline associated with the first user indicates that the first user has previously checked in with the entity; and provide the client system with access to the network through the wireless access point in accordance with the positive authorization determination. - View Dependent Claims (16, 17, 18, 19)
-
Specification