Instant personalization security
First Claim
Patent Images
1. A computer-implemented method comprising:
- providing a social networking interface of a social networking system for a user account via a user device to access one or more third-party applications or external websites to the social networking system, wherein the user device is logged into the social networking system as the user account, wherein the user account is identified in the social networking system via a user account identifier (UID), wherein the UID is associated with a fully identifying profile of the user account in the social networking system;
generating a hashed identifier (hashed ID) according to a hash function based on at least the UID, wherein the hashed ID is different from the UID, is unique to the user account, and associated with at least a third-party system amongst the third-party applications or external websites;
associating the hashed ID with a pseudonymous profile of the user account, wherein the pseudonymous profile includes a subset of information in the fully identifying profile corresponding to a level of privacy to provide to the third-party system, wherein the hashed ID is configured to provide the third-party system access to the pseudonymous profile from the social networking system; and
providing, to the third-party system, the hashed ID to identify profile information in the pseudonymous profile for instant personalization targeting the user account.
2 Assignments
0 Petitions
Accused Products
Abstract
Some embodiments involve methods and systems for instant personalization security. For example, a social networking system can provide a platform for a user to open applications and/or access external websites. In some cases, an application does not have access to the user'"'"'s fully identifying profile (e.g., UID or other public information). Instead, the application has access to a pseudonymous profile corresponding to a hashed ID that is generated by the platform and provided to the application. Access to the pseudonymous profile enables the application or an external website to personalize its environment without breaching the security of the platform.
-
Citations
20 Claims
-
1. A computer-implemented method comprising:
-
providing a social networking interface of a social networking system for a user account via a user device to access one or more third-party applications or external websites to the social networking system, wherein the user device is logged into the social networking system as the user account, wherein the user account is identified in the social networking system via a user account identifier (UID), wherein the UID is associated with a fully identifying profile of the user account in the social networking system; generating a hashed identifier (hashed ID) according to a hash function based on at least the UID, wherein the hashed ID is different from the UID, is unique to the user account, and associated with at least a third-party system amongst the third-party applications or external websites; associating the hashed ID with a pseudonymous profile of the user account, wherein the pseudonymous profile includes a subset of information in the fully identifying profile corresponding to a level of privacy to provide to the third-party system, wherein the hashed ID is configured to provide the third-party system access to the pseudonymous profile from the social networking system; and providing, to the third-party system, the hashed ID to identify profile information in the pseudonymous profile for instant personalization targeting the user account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer readable memory storing instructions, comprising:
-
instructions for providing, by a social networking system, a social networking interface for a user account via a user device to access a third-party application or an external website to the social networking system, wherein the user device is logged into the social networking system as the user account; instructions for generating, by the social networking system, a hashed identifier (hashed ID) according to a hash function based on at least an identifier of the user account (UID) and an attribute of the third-party application or the external website, the UID associated with a fully identifying profile of the user account in the social networking system, wherein the hashed ID is different from the UID and is unique to the user account; instructions for associating, by the social networking system, the hashed ID with a pseudonymous profile of the user account, wherein the pseudonymous profile includes a subset of information in the fully identifying profile, wherein the subset of information corresponds to a level of privacy to provide to the third-party application or the external website, wherein the hashed ID is configured to provide the third-party application or the external website access to the pseudonymous profile from the social networking system; and instructions for providing, from the social networking system to the third-party application or the external website, the hashed ID to identify profile information in the pseudonymous profile for instant personalization targeting the user account. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A social networking system comprising:
-
a memory having executable instructions; a processor configured by the executable instructions to; provide a social networking interface of the social networking system for a user account via a user device to access a third-party application or an external website to the social networking system, wherein the user device is logged into the social networking system as the user account; generate a hashed identifier (hashed ID) according to a hash function based on at least an identifier of the user account (UID), the UID associated with a fully identifying profile of the user account in the social networking system, wherein the hashed ID is different from the UID and is unique to the user account; associate the hashed ID with a pseudonymous profile of the user account, wherein the pseudonymous profile includes a subset of information in the fully identifying profile, wherein the subset of information corresponds to a level of privacy to provide to the third-party application or the external website, wherein the hashed ID is configured to provide the third-party application or the external website access to the pseudonymous profile from the social networking system; and provide, to the third-party application or the external website, the hashed ID to identify profile information in the pseudonymous profile for instant personalization targeting the user account.
-
Specification