Authorization and Authentication Based on an Individual's Social Network
First Claim
Patent Images
1. A method comprising:
- accessing, by one or more computing devices, a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising a first-user node corresponding to a first user associated with an online social network and a second-user node corresponding to a second user associated with the online social network;
receiving, by one or more of the computing devices, a request to transmit content relating to the first user to the second user; and
prohibiting, by one or more of the computing devices, transmission of the content to the second user if the first-user node and the second-user node are connected to each other in the graph structure through a series of edges and nodes that comprises an unauthorized node.
1 Assignment
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes accessing a graph structure comprising a plurality of nodes and edges where each node represents a user, receiving a request to transmit content related to a first user to a second user, and prohibiting transmission of the content to the second user if the first user and the second user are connected in the graph structure through a series of edges and nodes that comprises an unauthorized node.
28 Citations
17 Claims
-
1. A method comprising:
-
accessing, by one or more computing devices, a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising a first-user node corresponding to a first user associated with an online social network and a second-user node corresponding to a second user associated with the online social network; receiving, by one or more of the computing devices, a request to transmit content relating to the first user to the second user; and prohibiting, by one or more of the computing devices, transmission of the content to the second user if the first-user node and the second-user node are connected to each other in the graph structure through a series of edges and nodes that comprises an unauthorized node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
- one or more processors; and
one or more servers having a memory storing computer-executable instructions that when executed by one or more of the processors cause the processors to;access a graph structure comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising a first-user node corresponding to a first user associated with an online social network and a second-user node corresponding to a second user associated with the online social network; receive a request to transmit content relating to the first user to the second user; and prohibit transmission of the content to the second user if the first-user node and the second-user node are connected to each other in the graph structure through a series of edges and nodes that comprises an unauthorized node.
- one or more processors; and
Specification