首页>
外国专利>
Whether or not it authorizes the fact that the contents are transmitted to the 2nd individual from the 1st individual on the basis of the social network of the individual it manages and it stores user identification
Whether or not it authorizes the fact that the contents are transmitted to the 2nd individual from the 1st individual on the basis of the social network of the individual it manages and it stores user identification
展开▼
机译:它是否授权基于其管理的个人的社交网络从第一个人向第二个人传输内容并将其存储用户标识的事实
展开▼
页面导航
摘要
著录项
相似文献
摘要
A method of authenticating an individual based on an approved list of users, a black list of users, and the individual's social network, said social network defined by relationships among individuals and represented using a graph structure, wherein the graph structure has a plurality of nodes, wherein each node corresponds to an individual in the social network, and wherein a degree of separation between any two nodes is a minimum number of hops required to traverse the social graph from one node to the other, the method comprising: receiving inputs by the individual, said inputs including identifying information of the individual; generating a gray list based on the black list and the individual's social network, the gray list including identifying information of a set of individuals who are one degree separated from any user in the individual's social network on the black list; and authenticating the individual if the individual is connected to an individual that is on the approved list and within the graph structure along a path that does not traverse any nodes corresponding to individuals identified in the gray list.
展开▼