Obfuscation and routing of sensitive actions or requests based on social connections
摘要:
Improvements in data security and privacy may be realized by receiving a service request including a social range and a requestor identity; mining a first social network to create a social graph of entities within the social range of the requestor identity, wherein the entities are represented by nodes in the social graph linked to a requestor via one or more edges, wherein a number of edges used to link a given entity to the requestor does not exceed the social range; determining whether the social graph includes at least one person matching personnel included in an organizational chart; and in response to determining that the social graph includes no persons matching the personnel included in the organizational chart, transmitting an acceptance response from a provider-side system to a client-side system.
信息查询
0/0