METHOD AND APPARATUS FOR CONTROLLING ACCESS IN A SOCIAL NETWORK SERVICE
First Claim
1. A method of controlling access in a social network service, the method performed at an access control apparatus, the method comprising:
- (a) generating a core key and a plurality of sub keys by segmenting a master key unique to a file owner, the plurality of sub keys assigned differently to a plurality of groups divided according to trust level and relationship type;
(b) determining a group to which a file requester belongs by using at least one of a friend list of the file requester, a trust level between the file requester and the file owner, and a friend list of the file owner, and distributing a sub key corresponding to the determined group to the file requester, when the file requester requests a key distribution; and
(c) determining whether or not access to a file of the file owner is authorized by using the sub key distributed to the file requester and the core key, when the file requester requests the file.
1 Assignment
0 Petitions
Accused Products
Abstract
A key-based method for controlling access in a social network service includes: generating a core key and sub keys by segmenting a master key that is unique to a file owner, with the sub keys assigned differently to multiple groups that are divided according to trust level and relationship type; determining the group to which a file requester belongs by using at least one of a friend list of the file requester, a trust level between the file requester and the file owner, and a friend list of the file owner, and distributing a sub key corresponding to the determined group to the file requester, when the file requester requests a key distribution; and determining whether or not access to a file of the file owner is authorized by using the sub key distributed to the file requester and the core key, when the file requester requests the file.
17 Citations
8 Claims
-
1. A method of controlling access in a social network service, the method performed at an access control apparatus, the method comprising:
-
(a) generating a core key and a plurality of sub keys by segmenting a master key unique to a file owner, the plurality of sub keys assigned differently to a plurality of groups divided according to trust level and relationship type; (b) determining a group to which a file requester belongs by using at least one of a friend list of the file requester, a trust level between the file requester and the file owner, and a friend list of the file owner, and distributing a sub key corresponding to the determined group to the file requester, when the file requester requests a key distribution; and (c) determining whether or not access to a file of the file owner is authorized by using the sub key distributed to the file requester and the core key, when the file requester requests the file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus tor controlling access in a social network service, the apparatus comprising:
-
a key generation part configured to generate a core key and a plurality of sub keys by segmenting a master key unique to a file owner, the plurality of sub keys assigned differently to a plurality of groups divided according to trust level and relationship type; a key distribution part configured to determine a group to which a file requester belongs by using at least one of a friend list of the file requester, a trust level between the file requester and the file owner, and a friend list of the file owner, and distribute a sub key corresponding to the determined group to the file requester when the file requester requests a key distribution; and an authentication part configured to determine whether or not access to a file of the file owner is authorized by using the sub key distributed to the file requester and the core key, when the file requester requests the file.
-
Specification