Authorization and authentication based on an individual's social network
First Claim
1. A method of authorizing transmission of content relating to a first individual to a second individual based on the second individual'"'"'s social network, comprising the steps of:
- maintaining a first set of records for the second individual;
generating a second set of records based on the first set and the second individual'"'"'s social network; and
authorizing the transmission of content to the second individual if the first individual and the second individual are connected in the second individual'"'"'s social network along a path that does not traverse through any individual identified in the second set.
8 Assignments
0 Petitions
Accused Products
Abstract
An individual'"'"'s social network is used to authorize information flow to the individual and to authenticate the individual for access to certain information or services. Information flow to the individual is authorized if the source of the information is a member of the individual'"'"'s social network who is connected to the individual along a path that does not traverse through anyone on a gray list of the individual. The black list identifies those members who previously sent unwanted communication to the individual or posted content that was deemed offensive by the individual. The gray list identifies those members who are one degree separated from any black list member. The individual is authenticated for access to certain information or services if a member of the individual'"'"'s social network already has access and this member is connected to the individual along a path that does not traverse through anyone on a gray list of the individual, or if members of the individual'"'"'s social network who are connected to the individual along a path that does not traverse through anyone on a gray list of the individual have an average authentication rating that is at least a minimum value.
393 Citations
20 Claims
-
1. A method of authorizing transmission of content relating to a first individual to a second individual based on the second individual'"'"'s social network, comprising the steps of:
-
maintaining a first set of records for the second individual;
generating a second set of records based on the first set and the second individual'"'"'s social network; and
authorizing the transmission of content to the second individual if the first individual and the second individual are connected in the second individual'"'"'s social network along a path that does not traverse through any individual identified in the second set. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of authenticating an individual based on an approved list of users, a black list of users, and the individual'"'"'s social network, comprising the steps of:
-
receiving inputs by the individual, said inputs including identifying information of the individual;
generating a gray list based on the black list and the individual'"'"'s social network; and
authenticating the individual if the individual is connected to a user who is on the approved list and in the individual'"'"'s social network, along a path that does not traverse through anyone identified in the gray list. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of authenticating an individual based on the individual'"'"'s social network, comprising the steps of:
-
retrieving a first set of records maintained for the individual;
generating a second set of records based on the first set and the individual'"'"'s social network;
identifying individuals who are connected to the individual within the individual'"'"'s social network along a path that does not traverse through any individual identified in the second set; and
authenticating the individual based on authentication ratings of the identified individuals. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification