Authorization and authentication based on an individual's social network
First Claim
Patent Images
1. A method comprising:
- accessing, by one or more of the computing devices, a graph data structure comprising a plurality of nodes and a plurality of edges connecting the nodes, the nodes comprising a first node corresponding to a first user associated with an online social network and a second node corresponding to a second user associated with the online social network;
receiving, by one or more of the computing devices, a request to send content relating to the first user to the second user; and
prohibiting, by one or more of the computing devices, sending of the content to the second user if the first node and the second node are connected to each other in the graph data structure through a series of edges and nodes that comprises an unauthorized node.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes accessing a graph data structure comprising a plurality of nodes and a plurality of edges connecting the nodes, receiving, a request to send content relating to the first user to the second user, and prohibiting sending of the content to the second user if the node corresponding to the first user and the second user are connected to each other in the graph data structure through a series of edges and nodes that comprises an unauthorized node.
-
Citations
19 Claims
-
1. A method comprising:
-
accessing, by one or more of the computing devices, a graph data structure comprising a plurality of nodes and a plurality of edges connecting the nodes, the nodes comprising a first node corresponding to a first user associated with an online social network and a second node corresponding to a second user associated with the online social network; receiving, by one or more of the computing devices, a request to send content relating to the first user to the second user; and prohibiting, by one or more of the computing devices, sending of the content to the second user if the first node and the second node are connected to each other in the graph data structure through a series of edges and nodes that comprises an unauthorized node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A service provider system comprising:
- one or more processors; and
one or more servers having a memory storing computer-executable instructions that when executed by one or more of the processors cause the processors to;access a graph data structure comprising a plurality of nodes and a plurality of edges connecting the nodes, the nodes comprising a first node corresponding to a first user associated with an online social network and a second node corresponding to a second user associated with the online social network; receive a request to send content relating to the first user to the second user; and prohibit sending of the content to the second user if the first node and the second node are connected to each other in the graph data structure through a series of edges and nodes that comprises an unauthorized node.
- one or more processors; and
Specification