Invite abuse prevention

A client and behavioral technology, applied in data processing applications, instruments, computing, etc., can solve problems such as increasing social networking sites

Active Publication Date: 2012-06-27
MICROSOFT TECH LICENSING LLC
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Accordingly, one challenge faced by providers attempting to maintain and / or increase the popularity of social networking sites is controlling unsolicited messages from spammers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invite abuse prevention
  • Invite abuse prevention
  • Invite abuse prevention

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Overview

[0012] In order to establish connections in social networks, users can send and receive invitations to become part of each other's network. When the invitation is accepted, the user becomes a "friend" and can then transmit and share information. Unfortunately, this mechanism may be abused by attackers (such as spammers) who may create accounts and send out large numbers of invitations for illegal and / or undesired purposes.

[0013] Describe techniques used to invite abuse prevention. In one implementation, data describing the mutual behavior of the client and one or more resources available via the service provider is obtained from multiple clients. Service providers can use data about mutual behavior to determine behavior scores between directly interacting clients. The determined behavior score can then be used to calculate the score between two object clients (ie, "potential friends") to control invitations and / or other interactions between the clients. Be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Techniques for invite abuse prevention are described. In an implementation, data that describes mutual activities of the clients with one or more resources available via a service provider is obtained from multiple clients. The service provider may use this data regarding mutual activities to ascertain activity scores between clients that interact directly. The ascertained activity scores may then be used to compute a score between two subject clients to control invites and / or other interactions between the clients. Computing the score may include determining one or more connections between the two clients through clients that interact directly, calculating candidate values for the one or more connections, and selecting one of the candidate values as the computed score using various techniques. The computed score may be used in various ways to control invites and / or other interactions between the clients using the one or more resources.

Description

Background technique [0001] The popularity of social networking via online networking sites / services is increasing. People can use social networking sites in various ways to keep in touch with friends, establish new connections with others, post status updates, and share information such as recommendations, pictures, and discussions with others. [0002] In order to establish connections in social networks, users can send and receive invitations to become part of each other's network. When the invitation is accepted, the user becomes a "friend" and can then transmit and share information. Unfortunately, this mechanism may be abused by attackers (such as spammers) who may create accounts and send out large numbers of invitations for illegal and / or undesired purposes. Attackers often use attractive and familiar names that will mislead some invitees to accept the invitation. Once the attacker and the victim invitee become friends, the attacker can “spam” by sending unsolicited mes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCG06Q50/01G06Q10/107G06Q50/00
Inventor A.M.萨米尔S.哈莱
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products