Wireless data privacy maintained through a social network
First Claim
1. A method, comprising:
- by one or more servers of a system providing an online service, sending a token to a first client computing device associated with a first user of the online service, the token being generated by the servers based at least in part on a user identifier of the first user;
by the servers, receiving the token from a second client computing device associated with a second user of the online service, the token being sent to the second client computing device from the first client computing device through a wireless connection;
by the servers, verifying the token based at least in part on the user identifier of the first user and a least number of edges traversed in a social graph from a first node corresponding to the first user to a second node corresponding to the second user;
by the servers, determining data accessible to the second user in an event that the token is verified, wherein said determining includes determining a list of nodes in the social graph for access to the second user, the list of nodes representing connections common to both the first node and the second node; and
by the servers, sending to the second client computing device at least some of the data accessible to the second user.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, one or more servers providing an on-line service send a token to a first client computing device associated with a first user of the on-line service, the token being generated by the servers based at least in part on a user identifier of the first user; the serves receive the token from a second client computing device associated with a second user of the on-line service, the token being sent to the second client computing device from the first client computing device through a wireless connection; the servers verify the token based at least in part on the user identifier of the first user; the servers determine data accessible to the second user if the token is verified; the servers also send to the second client computing device at least some of the data accessible to the second user.
18 Citations
19 Claims
-
1. A method, comprising:
-
by one or more servers of a system providing an online service, sending a token to a first client computing device associated with a first user of the online service, the token being generated by the servers based at least in part on a user identifier of the first user; by the servers, receiving the token from a second client computing device associated with a second user of the online service, the token being sent to the second client computing device from the first client computing device through a wireless connection; by the servers, verifying the token based at least in part on the user identifier of the first user and a least number of edges traversed in a social graph from a first node corresponding to the first user to a second node corresponding to the second user; by the servers, determining data accessible to the second user in an event that the token is verified, wherein said determining includes determining a list of nodes in the social graph for access to the second user, the list of nodes representing connections common to both the first node and the second node; and by the servers, sending to the second client computing device at least some of the data accessible to the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable data storage memory storing computer-executable instructions that, when executed, cause a computer system to perform a computer-implemented method, the instructions comprising:
-
instructions for sending, by a system providing an online service, a token to a first client computing device associated with a first user of an online service, wherein the token is generated based at least in part on a user identifier of the first user; instructions for receiving the token from a second client computing device associated with a second user of the online service, the token being sent to the second client computing device from the first client computing device through a wireless connection; instructions for verifying the token based at least in part on the user identifier of the first user and a least number of edges traversed in a social graph from a first node corresponding to the first user to a second node corresponding to the second user; instructions for determining data accessible to the second user in an event that the token is verified, wherein said determining includes determining a list of nodes in the social graph for access to the second user, the list of nodes representing connections common to both the first node and the second node; and instructions for sending to the second client computing device at least some of the data accessible to the second user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer system, comprising:
-
a data storage component configured to store executable instructions; one or more processors configured, by the executable instructions, to; provide an online service; send a token to a first client computing device associated with a first user of the online service, wherein the token is generated based at least in part on a user identifier of the first user; receive the token from a second client computing device associated with a second user of the online service, the token being sent to the second client computing device from the first client computing device through a wireless connection; verify the token based at least in part on the user identifier of the first user and a least number of edges traversed in a social graph from a first node corresponding to the first user to a second node corresponding to the second user; determine data accessible to the second user in an event that the token is verified by at least determining a list of nodes in the social graph for access to the second user, the list of nodes representing connections common to both the first node and the second node; and send to the second client computing device at least some of the data accessible to the second user. - View Dependent Claims (19)
-
Specification