Implicit population of access control lists
First Claim
Patent Images
1. A method comprising:
- logging, by a server, a first client device into a the server;
logging, by the server, a second client device into the server;
accessing, using by the server, a first user list associated with a first user of the first client device;
accessing, using by the server, a second user list associated with a second user of the second client device, wherein the first user list and the second user list are maintained separately from one another;
analyzing, using by the server, the accessed first user list to determine whether an identifier of the second user is included in the first user list;
analyzing, using by the server, the accessed second user list to determine whether an identifier of the first user is included in the second user list;
andregulating, using by the server, a communications pathway communications between the first client device and the second client device based on both the determination of whether the identifier of the first user is included on the second user list and the determination of whether the identifier of the second user is included on the first user list.
4 Assignments
0 Petitions
Accused Products
Abstract
Communication applications may include lists of users with which a user of the application communicates. If two users of a communications application each include the other user on their user lists, an implicit trust may be established between the users. For example, if user A includes user B in her list and user B includes user A in his list, then it may be determined that each user knows and/or trusts the other user. As a result, a connection or communications pathway may be automatically created between the client devices of the users to facilitate communications between the users based on the implicit trust.
373 Citations
33 Claims
-
1. A method comprising:
-
logging, by a server, a first client device into a the server; logging, by the server, a second client device into the server; accessing, using by the server, a first user list associated with a first user of the first client device; accessing, using by the server, a second user list associated with a second user of the second client device, wherein the first user list and the second user list are maintained separately from one another; analyzing, using by the server, the accessed first user list to determine whether an identifier of the second user is included in the first user list; analyzing, using by the server, the accessed second user list to determine whether an identifier of the first user is included in the second user list;
andregulating, using by the server, a communications pathway communications between the first client device and the second client device based on both the determination of whether the identifier of the first user is included on the second user list and the determination of whether the identifier of the second user is included on the first user list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 25, 26, 27)
-
-
9. A system comprising:
-
a first client device; a second client device; and a server configured to that; accessaccesses a first user list associated with a first user of thea first client device; accessaccesses a second user list associated with a second user of thea second client device, wherein the first user list and the second user list are maintained separately from one another; analyzeanalyzes the accessed first user list to determine whether an identifier of the second user is included in the first user list; analyzeanalyzes the accessed second user list to determine whether an identifier of the first user is included in the second user list; and regulate a communications pathwayregulates communications between the first client device and the second client device based on both the determination of whether the identifier of the first user is included on the second user list and the determination of whether the identifier of the second user is included on the first user list. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 28, 29, 30)
-
-
17. A host system comprising:
-
an interface to receive a communication from a first client device associated with a first user and to transmit a communication to a second client device associated with a second user; storage to store a first user list associated with the first user and to store a second user list associated with the second user; and a host configured to server that; determinedetermines an identifier of the first user and an identifier of the second user; accessaccesses the first user list associated with the first user of the first client device; accessaccesses the second user list associated with the second user of the second client device, wherein the first user list and the second user list are maintained separately from one another; analyzeanalyzes the accessed first user list to determine whether an identifier of the second user is included in the first user list; analyzeanalyzes the accessed second user list to determine whether an identifier of the first user is included in the second user list; and regulate a communications pathwayregulates communications between the first client device and the second client device based on both the determination of whether the identifier of the first user is included on the second user list and the determination of whether the identifier of the second user is included on the first user list. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 31, 32, 33)
-
Specification