Abstract:
An online services system includes a mechanism for providing user confidence information to an external data consumer, and for determining user contribution quality. Using stored information about user actions and interactions, user confidence is evaluated for one or more parameters associated with the validity of the user's account and/or quality of the user's contributions to the online services system. Confidence values are assigned to each parameter, and the values are exposed to external data consumers. Using stored information, user actions and interactions are correlated with contribution quality to produce a metric indicative of user contribution quality. Users with low quality parameter metrics may have their contributions shown to a smaller audience or have a lower prominence in a news feed.
Abstract:
In particular embodiments, a computing device accesses a device identifier that is encoded in the hardware of the computing device. The device identifier is used to generate a device key that will uniquely identify the particular computing device. The computing device stores the device key in a data store, and sends the device key to be stored on a first computer server. The computing device subsequently requests a user action from a second computer server, and the second computing server requests user authentication. The computing device generates a first authentication code using a cryptographic hash algorithm and the device key, and sends the first authentication code to the second computer server. The computing device is authenticated based on a second authentication code generated by the first computer server using the device key.
Abstract:
In particular embodiments, a computing device accesses a device identifier that is encoded in the hardware of the computing device. The device identifier is used to generate a device key that will uniquely identify the particular computing device. The computing device stores the device key in a data store, and sends the device key to be stored on a first computer server. The computing device subsequently requests a user action from a second computer server, and the second computing server requests user authentication. The computing device generates a first authentication code using a cryptographic hash algorithm and the device key, and sends the first authentication code to the second computer server. The computing device is authenticated based on a second authentication code generated by the first computer server using the device key.
Abstract:
Advertisement content presented to a user of an online system is presented along with an option allowing the user to view one or more reasons for presentation of the advertisement content to the user. If the user selects the option, based on targeting criteria associated with the advertisement content and characteristics associated with the user, the online system selects one or more characteristics of the user satisfying the targeting criteria and presents a description to the user identifying the selected one or more characteristics satisfying the targeting criteria. The online system may apply one or more rules based on user perception of characteristics when selecting the one or more characteristics included in the description. An option for the user to prevent use of the selected one or more characteristics when the online system subsequently selects advertisement content for the user is also presented with the description.
Abstract:
In particular embodiments, a computing device accesses a device identifier that is encoded in the hardware of the computing device. The device identifier is used to generate a device key that will uniquely identify the particular computing device. The computing device stores the device key in a data store, and sends the device key to be stored on a first computer server. The computing device subsequently requests a user action from a second computer server, and the second computing server requests user authentication. The computing device generates a first authentication code using a cryptographic hash algorithm and the device key, and sends the first authentication code to the second computer server. The computing device is authenticated based on a second authentication code generated by the first computer server using the device key.
Abstract:
Advertisement content presented to a user of an online system is presented along with an option allowing the user to view one or more reasons for presentation of the advertisement content to the user. If the user selects the option, based on targeting criteria associated with the advertisement content and characteristics associated with the user, the online system selects one or more characteristics of the user satisfying the targeting criteria and presents a description to the user identifying the selected one or more characteristics satisfying the targeting criteria. The online system may apply one or more rules based on user perception of characteristics when selecting the one or more characteristics included in the description. An option for the user to prevent use of the selected one or more characteristics when the online system subsequently selects advertisement content for the user is also presented with the description.
Abstract:
A social networking system performs account recovery for a user with the help of the user's connections (e.g., friends). The social networking system selects connections of the user based on information indicating likelihood of real-world interactions between the user and the selected connections. Access codes are sent to the selected connections and the user instructed to obtain access codes from the selected connections via a communication that is outside the social networking system, for example, via phone. The user provides the access codes obtained from the selected connections to the social networking system. If the access codes provided by the user match the access codes sent to the selected connections, the user is granted access to the account. Real-world interactions between two users are determined based on sharing of devices between the users or information indicating presence of the users in the same place during same time interval.
Abstract:
A user makes a request to restrict targeted advertising through third party services accessed on a client device. A publishing system obtains information indicating that the user requested to restrict targeted advertising. The publishing system updates a profile associated with an account of the user to indicate that the user has requested to restrict targeted advertising. Based on the update to the profile, when the user communicates with the publishing system through the same or a different client device, the publishing system is restricted as to the information that can be collected and used for targeted advertising