User-based identification system for social networks

ABSTRACT

Techniques disclosed herein provide for verifying the identity of a prospective social network member using an authentication process in which one or more existing members of the social network who are knowledgeable of the identity of the prospective member communicate with the prospective member in real time. During the real-time communication, biometric information of the prospective member can be associated with a profile for the prospective member. During or after the real-time communication, the existing member(s) can verify the identity of the prospective member. Once the prospective member&#39;s identity has been properly verified, the prospective member can be granted access to the social network.

CROSS-REFERENCE TO RELATED APPLICATION

The present application claims priority to U.S. Provisional ApplicationNo. 61/643,980 filed May 8, 2012, and titled “User-Based IdentificationSystem for Social Networks,” which is incorporated by reference in itsentirety for all purposes.

BACKGROUND

Online social networks are ubiquitous in today's society, enablinghundreds of millions of users to create and build relationshipselectronically via the Internet using any of a variety of user devices(e.g., personal computers, laptops, tablets, smart phones, etc.). Usersmay join a social network using registration process. But many socialnetworks allow users to register anonymously or with limited means ofverifying the identity of registrants, thereby failing to prevent manyusers from registering with false information. Although anonymity iswelcomed in some social networks, accurate identification can be crucialin others. On-line social networks that facilitate in-person meetingsbetween users, for example, have an interest in ensuring accurateinformation is collected—especially if its users include minors.

SUMMARY

Techniques disclosed herein provide for verifying the identity of aprospective social network member using an authentication process inwhich one or more existing members of the social network who areknowledgeable of the identity of the prospective member communicate withthe prospective member in real time. During the real-time communication,biometric information of the prospective member can be associated with aprofile for the prospective member. During or after the real-timecommunication, the existing member(s) can verify the identity of theprospective member. Once the prospective member's identity has beenproperly verified, the prospective member can be granted access to thesocial network.

An example method of authentication based on real-time communication,according to the disclosure, can include accessing a profile comprisinginformation regarding a first person, and collecting a first set ofbiometric information of the first person during the real-timecommunication between the first person and a second person, where thesecond person has a threshold level of authentication. The methodfurther includes associating, with a processing unit, the first set ofbiometric information with the profile, receiving, from the secondperson, an indication regarding an identity of the first person, andassociating, with the processing unit, a first level of authenticationwith the profile based, at least in part, on the indication regardingthe identity of the first person.

The example method of authentication based on real-time communicationcan include one or more of the following features. Creating, with theprocessing unit, the profile. The first set of biometric information caninclude at least one of audio information, or video information. Thereal-time communication can be initiated, at least in part, by aninvitation to join a social network sent by the second person to thefirst person. The real-time communication can be initiated, at least inpart, by an invitation to join a social network sent from a third personto the first person. Associating a password with the profile. Receiving,from a third person, a second indication regarding the identity of thefirst person, where the third person has at least the threshold level ofauthentication, and associating a second level of authentication withthe profile based, at least in part, on the second indication regardingthe identity of the first person. Prompting, during the real-timecommunication, either or both the first person or the second person toperform an action during the real-time communication. The action cancomprise saying a word or phrase. Receiving, after the real-timecommunication, a second set of biometric information of the firstperson, comparing the second set of biometric information with the firstset of biometric information associated with the profile to obtain acomparison result, and granting access to the profile based, at least inpart, on the comparison result.

An example system for providing authentication based on real-timecommunication, according to the disclosure, can include means foraccessing a profile comprising information regarding a first person, andmeans for collecting a first set of biometric information of the firstperson during the real-time communication between the first person and asecond person, where the second person has a threshold level ofauthentication. The example system also includes means for associatingthe first set of biometric information with the profile means forreceiving, from the second person, an indication regarding an identityof the first person; and means for associating a first level ofauthentication with the profile based, at least in part, on theindication regarding the identity of the first person.

The example system for providing authentication based on real-timecommunication can include one or more of the following features. Meansfor creating the profile. The means for collecting the first set ofbiometric information can include means for collecting at least one ofaudio information, or video information. Means for enabling a thirdperson to send an invitation to join a social network to the firstperson. Means for associating a password with the profile. Means forreceiving, from a third person, a second indication regarding theidentity of the first person, where the third person has at least thethreshold level of authentication, and associating a second level ofauthentication with the profile based, at least in part, on the secondindication regarding the identity of the first person. Means forprompting, during the real-time communication, either or both the firstperson or the second person to perform an action during the real-timecommunication. Means for receiving, after the real-time communication, asecond set of biometric information of the first person, comparing thesecond set of biometric information with the first set of biometricinformation associated with the profile to obtain a comparison result,and granting access to the profile based, at least in part, on thecomparison result.

An example device for providing authentication based on real-timecommunication, the device comprising a communication interface and oneor more processors coupled to the communication interface. The one ormore processors are configured to access a profile comprisinginformation regarding a first person, collect, via the communicationinterface, a first set of biometric information of the first personduring real-time communication between the first person and a secondperson. The second person has a threshold level of authentication. Theone or more processors are further configured to associate the first setof biometric information with the profile, receive, from the secondperson via the communication interface, an indication regarding anidentity of the first person, and associate a first level ofauthentication with the profile based, at least in part, on theindication regarding the identity of the first person.

The example device for providing authentication based on real-timecommunication can include one or more of the following features. The oneor more processors can be further configured to create the profile. Thefirst set of biometric information can include at least one of audioinformation, or video information. The one or more processors can befurther configured to initiate the real-time communication by enablingthe second person to send an invitation to join a social network to thefirst person. The one or more processors can be further configured toinitiate the real-time communication by enabling a third person to sendan invitation to join a social network to the first person. The one ormore processors can be further configured to associate a password withthe profile. The one or more processors can be further configured toreceive, from a third person, a second indication regarding the identityof the first person, where the third person has at least the thresholdlevel of authentication, and associate a second level of authenticationwith the profile based, at least in part, on the second indicationregarding the identity of the first person. The one or more processorscan be further configured to prompt, during the real-time communication,either or both the first person or the second person to perform anaction during the real-time communication. The one or more processorscan be further configured to receive, after the real-time communication,a second set of biometric information of the first person, compare thesecond set of biometric information with the first set of biometricinformation associated with the profile to obtain a comparison result,and grant access to the profile based, at least in part, on thecomparison result.

An example computer-readable medium having instructions embedded thereonfor providing authentication based on real-time communication, accordingto the disclosure, can include computer-executable code for accessing aprofile comprising information regarding a first person, and collectinga first set of biometric information of the first person duringreal-time communication between the first person and a second person,where the second person has a threshold level of authentication. Thecomputer-readable medium also includes computer-executable code forassociating the first set of biometric information with the profile,receiving, from the second person, an indication regarding an identityof the first person, and associating a first level of authenticationwith the profile based, at least in part, on the indication regardingthe identity of the first person.

The example the computer-readable medium can include one or more of thefollowing features. The instructions can further includecomputer-executable code for creating the profile. The code forcollecting the first set of biometric information can include code forcollecting at least one of audio information, or video information. Theinstructions further include computer-executable code for enabling thesecond person to send an invitation to join a social network to thefirst person. The instructions can further include computer-executablecode for enabling a third person to send an invitation to join a socialnetwork to the first person. The instructions can further includecomputer-executable code for associating a password with the profile.The instructions can further include computer-executable code forreceiving, from a third person, a second indication regarding theidentity of the first person, where the third person has at least thethreshold level of authentication, and associating a second level ofauthentication with the profile based, at least in part, on the secondindication regarding the identity of the first person. The instructionscan further include computer-executable code for prompting, during thereal-time communication, either or both the first person or the secondperson to perform an action during the real-time communication. Theinstructions can further include computer-executable code for receiving,after the real-time communication, a second set of biometric informationof the first person, comparing the second set of biometric informationwith the first set of biometric information associated with the profileto obtain a comparison result, and granting access to the profile based,at least in part, on the comparison result.

Items and/or techniques described herein may provide one or more of thefollowing capabilities, as well as other capabilities not mentioned.Increased accuracy of user profile information. Increased security tothe social network and its members. Multiple authentication levelsenabling a social network to provide varying degrees of functionality tousers, based on the users' respective authentication levels. While atleast one item/technique-effect pair has been described, it may bepossible for a noted effect to be achieved by means other than thatnoted, and a noted item/technique may not necessarily yield the notedeffect.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of variousembodiments may be realized by reference to the following figures. Inthe appended figures, similar components or features may have the samereference label. Further, various components of the same type may bedistinguished by following the reference label by a dash and a secondlabel that distinguishes among the similar components. If only the firstreference label is used in the specification, the description isapplicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

FIG. 1 is a simplified diagram of components of a social network,according to an embodiment of the present invention.

FIG. 2 is a simplified illustration demonstrating how various componentsof a social network can be utilized to implement an identificationsystem, according to one embodiment.

FIG. 3 is a flow diagram illustrating an embodiment of an online and/orelectronic authentication process.

FIG. 4 is a swim-lane diagram illustrating how different tasks of anauthentication process can be performed by different entities shown inFIGS. 1-2, according to one embodiment.

FIG. 5 is an illustration of an embodiment of a computer system, whichmay be incorporated, at least in part, into devices configured toperform some or all of the methods described herein.

DETAILED DESCRIPTION

Embodiments of the present invention are directed toward modes of onlineand/or electronic authentication. The registration process of socialnetworks (such as Facebook®, Twitter®, etc.) often allows users toregister anonymously using false information. Although anonymity iswelcomed in some social networks, accurate identification can be crucialin others. On-line social networks that facilitate in-person meetingsbetween users, for example, have an interest in ensuring accurateinformation is collected—especially if its users include minors.Techniques provided herein can help reduce the risk posed to socialnetwork members by those who would attempt to mislead them throughfraudulent profile information. It can be noted that, although examplesprovided herein discuss the invention as applied to social networks, thefunctionality described herein can be extended to other electronicand/or online authentication systems.

FIG. 1 is a simplified diagram of components of a social network 100.Various electronic devices 120 can allow social network members toaccess and/or contribute to the social network 100 via a communicationnetwork 110, which is communicatively linked with social networkserver(s) 130. Depending on desired functionality, electronic devices120 can include any of a variety of devices communicatively linked withthe communication network 110, such a tablet computer 120-1, mobilephone 120-2, personal computer 120-3, cell phone, e-reader, personalmedia player, and the like.

The communication network 110 enables communication between othercomponents of the social network 100. The communication network 110 cancomprise any combination of a variety of data communication systems, forexample, cable, satellite, wireless/cellular, or Internet systems, orthe like, utilizing various technologies and/or protocols, such as radiofrequency (RF), optical, satellite, coaxial cable, Ethernet, cellular,twisted pair, other wired and wireless technologies, and the like. Thecommunication network 110 type can comprise packet- and/or circuit-typeswitching, and can include one or more open, closed, public, and/orprivate networks, including the Internet, depending on desiredfunctionality, cost concerns, and other factors.

The social network server(s) 130 can comprise one or more computersystems (as described in more detail herein below) configured toauthenticate users, store user information, host and/or manageuser-based content, and more. Depending on desired functionality, thesocial network server(s) 130 can communicate with the electronic devices120 via an Internet browser and/or specialized software applicationexecuted on the electronic devices 120.

As indicated above, many social networks 100 have limited means forcorrectly identifying members of the social network 100. While a socialnetwork 100 may offer password-protected member profiles to helpauthenticate an existing user, these passwords may be hacked and/orotherwise compromised, and they offer no identity verification or otherauthentication when a member first joins the social network. As providedherein, embodiments of the invention utilize crowdsourcing and real-timecommunication to provide identification/authentication of a member whenthe member first joins the social network.

FIG. 2 is a simplified illustration demonstrating how various componentsof the social network can be utilized to implement these techniques,according to one embodiment. An authentication process can involve anexisting member 210 of the social network 100 who conducts a video chator other real-time communication using electronic devices 120 connectedvia communication network 110 to authenticate a prospective member 220.The real-time communication may be initiated, for example, when theprospective member 220 accepts a communication invitation from theexisting member, which can be sent via the social network 100. Duringthe communication, the electronic device 120 can collect biometricinformation (e.g., voice, and/or physical features) and/or otheridentifying information of the prospective member using a camera 230,microphone, and/or other sensors. This information can be communicatedto the social network server(s) 130, which can and associate theinformation with a profile for the prospective member 220 during and/orafter the real-time communication. During or after the video chat, theexisting member 210 can complete an authentication process by verifyingthe identity of the prospective member 220.

FIG. 3 is a flow diagram illustrating an embodiment of an online and/orelectronic authentication method 300, which can be performed, forexample, by software and/or hardware of the social network server(s) 130and/or electronic devices 120 of FIGS. 1-2. At block 305, a profile forthe prospective member is accessed. The profile information can includeinformation regarding a prospective member 220, including identifyinginformation (name, birth date, address, phone number, username,password, email address, etc.). The profile information can be providedby the prospective member 220, existing member 210, and/or other entityduring an initial profile setup process. In some embodiments, forexample, a prospective member 220 may upload information on aregistration website of the social network 100. Social network server(s)130 and/or other system to which the social network server(s) 130 iscommunicatively linked may create, store, and/or access the profile.Thus, structure for performing block 305 and/or creating the profile caninclude one or more processors, memory, communication interface(s),and/or any of the structure discussed generally in reference to method300.

At block 310, biometric information of the prospective member 220 iscollected during a real-time communication with an existing member 210.As suggested above, the existing member 210 may initiate the process bysending a real-time communication request (e.g., video chat request) tothe prospective member 220. The invitation may be sent, for example, toan email address, instant messaging account, or other communicationmedium, which may be specified in the profile of the prospective member220 and/or indicated in the existing member's request. The invitationresponse can be sent in a similar fashion. In some embodiments, forexample, the prospective member 220 could go online and post a “ready tojoin” message. Furthermore, the prospective member 220 may be able toselect members of the social network (besides or in addition to theexisting member 210 who sent the invitation) who know or might know theprospective member 220 in the hope that at least one person (who may beonline) can quickly identify the prospective member 220. In someembodiments, the real-time communication may be facilitated with a webpage or other communication means hosted by the social network 100. Assuch, structure for performing block 310 and/or enabling the invitationto be sent to the prospective member can include one or more processors,memory, communication interface(s), biometric-collecting devices (acamera, microphone, and/or other sensors) and/or processorscommunicatively linked therewith, and/or any of the structure discussedgenerally in reference to method 300.

The biometric information (or other identifying information) collectedcan vary, depending on available biometric sensing structure. For areal-time video chat, for example, video images can be used to collectand process facial (or other physical) features for facial (or other)recognition. Additionally or alternatively, audio can be collected forvoice recognition. Other sensors and/or sensing structure can beutilized to collect retina, fingerprint, signature, and/or otherdistinguishing characteristics. This information may be processed and/orstored by social network server(s) 130, electronic devices 120, and/orother components of the social network.

At block 315, the biometric information is associated with the profileof the prospective member 220. This can, for example, enable the socialnetwork 100 to utilize the biometric information for subsequentauthentication of the prospective member 220, for example, theprospective member 220 attempts to log on or gain access to the socialnetwork 100. Again, structure for performing block 315 can include oneor more processors, memory, communication interface(s), and/or any ofthe structure discussed generally in reference to method 300.

At block 320, an indication regarding the identity of the prospectivemember 220 is received. The existing member 210, for example, canprovide identifying information during and/or after the real-timecommunication with the prospective member 220. As an example, after areal-time communication with prospective member 220 “Bob Jones,” anexisting member 210 may be given a questionnaire or other inputinterface by which the existing member 210 can verify that the voice,image, and/or other distinguishing characteristics used in the real-timecommunication belonged to “Bob Jones.” In other embodiments, thequestionnaire could be simpler, such as a simple identification (e.g.,having the existing member 210 provide a simple “yes, this is Bob Jones”or “no, this isn't Bob Jones” answer). Structure for performing block320 can include one or more processors, memory, communicationinterface(s), electronic device(s) 120 (and/or processorscommunicatively liked therewith), and/or any of the structure discussedgenerally in reference to method 300.

At block 325, after the existing member 210 provides identification, alevel of authentication will be associated with the profile of theprospective member 220. The level of authentication can be, for example,enabling the prospective member 220 to login and/or access at leastcertain portions and/or functions of the social network. In someembodiments, the social network 100 may require authentication fromadditional existing members before a prospective member 220 is grantedaccess. Some embodiments may have different levels of accesscorresponding to different levels of authentication, such that a secondlevel of authentication is associated with the prospective member'sprofile when the prospective member 220 is identified/authenticated by asecond existing member, and so on. Additionally or alternatively, thelevel of authentication associated with the profile of the prospectivemember 220 may depend on a level of authentication of the existingmember 210. For example, a prospective member 220 can be granted ahigher level of authentication if his identity is verified by anexisting member 210 with a relatively high level of authentication thanif his identity is verified by an existing member 210 with a relativelylow of authentication. Moreover, a higher level of authentication may begranted where the existing member has a close connection (e.g., familymember) with the prospective member than when the connection is not soclose (e.g., an acquaintance). An existing member may not be able tosend an invitation to a prospective member to join the social networkunless the existing member has achieved a threshold level ofauthentication. In some embodiments, the real-time communication cantake place between a multiple prospective members and/or multipleexisting members, depending on desired functionality. Structure forperforming block 325 can include one or more processors, memory,communication interface(s), and/or any of the structure discussedgenerally in reference to method 300.

Additionally or alternatively, the real-time communication can beprovided in a survey type of post from the existing member 210 whichwould then allow friends, family, and/or other members of the socialnetwork to verify the identity of the prospective member 220. Thereal-time communication, for example, could be posted on a news feedwhich asks for a “yes” or “no” authentication response from additionalmembers of the social network. Moreover, the additional members caninclude a selection of members, such as a group of members chosen by theexisting member 210.

FIG. 4 is a swim-lane diagram illustrating how different tasks of anauthentication process can be performed by different entities shown inFIGS. 1-2, according to one embodiment. Here, tasks performed by theexisting member and prospective member can be performed via electronicdevices, such as the electronic devices 120 of FIGS. 1-2. Tasks for thesocial network can be performed by one or more servers (such as socialnetwork server(s) 130 of FIGS. 1-2) executing, for example, softwareconfigured to perform the authentication steps shown in FIG. 4. Theelectronic devices and/or the one or more social network servers canincorporate at least portions of a computer system described hereinbelow in relation to FIG. 5.

At block 410, an existing member sends an invitation to a prospectivemember to initiate a real-time communication such as a voice chat, videochat, or the like. In alternative embodiments, yet another person maysend an invitation to start a real-time communication between theexisting member and the prospective member. This can be, for example,another member of the social network that does not have the abilityand/or authentication level to authenticate prospective members. In suchcases, however, the other member still may be allowed to send aninvitation to initiate the real-time communication.

At blocks 420 and 430 respectively, the social network delivers theinvitation, and the prospective member accepts the invitation. Afterwhich, at block 440, the social network can initiate a real-time chat(or other communication means) and record biometric features of theprospective member. To ensure chat is performed in real time, the socialnetwork can prompt the existing member and/or the prospective member viathe real-time chat (or other communication means) to perform an action,such as make a particular movement, say a word or phrase, etc. Dependingon the functionality of the social network 100, the performance of theaction may be automatically verifiable via visual and/or audiorecognition systems of the social network.

At block 450, the existing member identifies the prospective member,authenticating, for example, one or more features (voice, appearance,etc.) of the prospective member. At block 460, the social network savesbiometric features of the prospective member and subsequently associatesa level of authentication with the prospective member at block 470. Thebiometric features and/or level of authentication can be associated witha profile for the prospective member, which may be created prior to,during, or after the real-time communication.

Subsequently, the prospective member may login to the social networkusing biometric information. For example, if, during a video chat, thesocial network collected a first set of images identifying at least somefacial features of the prospective member, the prospective member maylogin to the social network using an electronic device that collects asecond set of images of the prospective member's facial features. Thesocial network compares the first and second set of images and allowsthe prospective member to login if there is a match. Similarfunctionality can be executed where the biometric information iscollected from a single image, an audio recording, or other identifyinginformation. Additionally or alternatively, after the prospective memberhas been authenticated by an existing member, the prospective member maybe allowed to login to the social network using a password associatedwith a profile for the prospective member, which may be created before,after, or during the real-time communication. Social network server(s)130 and/or other computing structure can be used to associate thepassword with the profile.

It should be appreciated that the specific steps illustrated in FIGS.3-4 provide a examples of methods for authenticating a prospectivemember of a social network. Alternative embodiments may includealterations to the embodiments shown. For example, alternativeembodiments may include saving biometric features of a prospectivemember and/or creating a profile for the prospective member at differenttimes during the method. Yet other embodiments may include verificationwithout the social network capturing and/or storing biometrics.Furthermore, additional features may be added, removed, or combineddepending on the particular applications. One of ordinary skill in theart would recognize many variations, modifications, and alternatives.

FIG. 5 illustrates an embodiment of a computer system 500, which may beincorporated, at least in part, into devices such as a social networkserver(s) 110 and/or electronic devices 120 of FIGS. 1-2, and/or othercomponents of the social network described herein. FIG. 5 provides aschematic illustration of one embodiment of a computer system 500 thatcan perform the methods provided by various other embodiments. It shouldbe noted that FIG. 5 is meant only to provide a generalized illustrationof various components, any or all of which may be utilized asappropriate. FIG. 5, therefore, broadly illustrates how individualsystem elements may be implemented in a relatively separated orrelatively more integrated manner.

The computer system 500 is shown comprising hardware elements that canbe electrically coupled via a bus 505 (or may otherwise be incommunication, as appropriate). The hardware elements may include aprocessing unit, such as processor(s) 510, which can include withoutlimitation one or more general-purpose processors, one or morespecial-purpose processors (such as digital signal processing chips,graphics acceleration processors, and/or the like), and/or otherprocessing structure; one or more input devices 515, which can includewithout limitation a mouse, a keyboard, a camera, a microphone, otherbiometric sensors, and/or the like; and one or more output devices 520,which can include without limitation a display device, a printer, and/orthe like.

The computer system 500 may further include (and/or be in communicationwith) one or more non-transitory storage devices 525, which cancomprise, without limitation, local and/or network accessible storage,and/or can include, without limitation, a disk drive, a drive array, anoptical storage device, a solid-state storage device, such as a randomaccess memory (“RAM”), and/or a read-only memory (“ROM”), which can beprogrammable, flash-updateable, and/or the like. Such storage devicesmay be configured to implement any appropriate data stores, includingwithout limitation, various file systems, database structures, and/orthe like.

The computer system 500 might also include a communications subsystem530, which can include without limitation a modem, a network card(wireless or wired), an infrared communication device, a wirelesscommunication device, and/or a chipset (such as a Bluetooth™ device, an802.11 device, a WiFi device, a WiMax device, cellular communicationfacilities, etc.), and/or the like. The communications subsystem 530 mayinclude one or more input and/or output communication interfaces topermit data to be exchanged with a network (such as the communicationnetwork 110 of FIGS. 1-2), other computer systems, and/or any otherelectronic devices described herein. Depending on the desiredfunctionality and/or other implementation concerns, a portableelectronic device (or similar device) may communicate image and/or otherinformation via the communications subsystem 530. In many embodiments,the computer system 500 will further comprise a working memory 535,which can include a RAM or ROM device, as described above.

The computer system 500 also can comprise software elements, shown asbeing currently located within the working memory 535, including anoperating system 540, device drivers, executable libraries, and/or othercode, such as one or more application programs 545, which may comprisecomputer programs provided by various embodiments, and/or may bedesigned to implement methods, and/or configure systems, provided byother embodiments, as described herein. Merely by way of example, one ormore procedures described with respect to the method(s) discussed above,such as those described in relation to FIGS. 3-4, might be implementedas code and/or instructions executable by a computer (and/or aprocessing unit within a computer); in an aspect, then, such code and/orinstructions can be used to configure and/or adapt a general purposecomputer (or other device) to perform one or more operations inaccordance with the described methods.

A set of these instructions and/or code might be stored on anon-transitory computer-readable storage medium, such as the storagedevice(s) 525 described above. In some cases, the storage medium mightbe incorporated within a computer system, such as computer system 500.In other embodiments, the storage medium might be separate from acomputer system (e.g., a removable medium, such as an optical disc),and/or provided in an installation package, such that the storage mediumcan be used to program, configure, and/or adapt a general purposecomputer with the instructions/code stored thereon. These instructionsmight take the form of executable code, which is executable by thecomputer system 500 and/or might take the form of source and/orinstallable code, which, upon compilation and/or installation on thecomputer system 500 (e.g., using any of a variety of generally availablecompilers, installation programs, compression/decompression utilities,etc.), then takes the form of executable code.

It will be apparent to those skilled in the art that substantialvariations may be made in accordance with specific requirements. Forexample, customized hardware might also be used, and/or particularelements might be implemented in hardware, software (including portablesoftware, such as applets, etc.), or both. Further, connection to othercomputing devices such as network input/output devices may be employed.

As mentioned above, in one aspect, some embodiments may employ acomputer system (such as the computer system 500) to perform methods inaccordance with various embodiments of the invention. According to a setof embodiments, some or all of the procedures of such methods areperformed by the computer system 500 in response to processor 510executing one or more sequences of one or more instructions (which mightbe incorporated into the operating system 540 and/or other code, such asan application program 545) contained in the working memory 535. Suchinstructions may be read into the working memory 535 from anothercomputer-readable medium, such as one or more of the storage device(s)525. Merely by way of example, execution of the sequences ofinstructions contained in the working memory 535 might cause theprocessor(s) 510 to perform one or more procedures of the methodsdescribed herein. Additionally or alternatively, portions of the methodsdescribed herein may be executed through specialized hardware.

The terms “machine-readable medium” and “computer-readable medium,” asused herein, refer to any medium that participates in providing datathat causes a machine to operate in a specific fashion, but do not referto transitory propagating signals. In an embodiment implemented usingthe computer system 500, various computer-readable media might beinvolved in providing instructions/code to processor(s) 510 forexecution and/or might be used to store and/or carry suchinstructions/code. In many implementations, a computer-readable mediumis a physical and/or tangible storage medium. Such a medium may take theform of a non-volatile media or volatile media. Non-volatile mediainclude, for example, optical and/or magnetic disks, such as the storagedevice(s) 525. Volatile media include, without limitation, dynamicmemory, such as the working memory 535.

Common forms of physical and/or tangible computer-readable mediainclude, for example, a floppy disk, a flexible disk, hard disk,magnetic tape, or any other magnetic medium, a CD-ROM, any other opticalmedium, punchcards, papertape, any other physical medium with patternsof holes, a RAM, a PROM, EPROM, a FLASH-EPROM, any other memory chip orcartridge, or any other medium from which a computer can readinstructions and/or code.

Various forms of computer-readable media may be involved in carrying oneor more sequences of one or more instructions to the processor(s) 510for execution. Merely by way of example, the instructions may initiallybe carried on a magnetic disk and/or optical disc of a remote computer.A remote computer might load the instructions into its dynamic memoryand send the instructions as signals over a transmission medium to bereceived and/or executed by the computer system 500.

The communications subsystem 530 (and/or components thereof) generallywill receive signals, and the bus 505 then might carry the signals(and/or the data, instructions, etc. carried by the signals) to theworking memory 535, from which the processor(s) 510 retrieves andexecutes the instructions. The instructions received by the workingmemory 535 may optionally be stored on a storage device 525 eitherbefore or after execution by the processor(s) 510 (where the phrases“storage device,” “storage medium,” and the like do not refer totransitory propagating signals).

The methods, systems, and devices discussed above are examples. Variousconfigurations may omit, substitute, or add various procedures orcomponents as appropriate. For instance, in alternative configurations,the methods may be performed in an order different from that described,and/or various stages may be added, omitted, and/or combined. Also,features described with respect to certain configurations may becombined in various other configurations. Different aspects and elementsof the configurations may be combined in a similar manner. Also,technology evolves and, thus, many of the elements are examples and donot limit the scope of the disclosure or claims.

Specific details are given in the description to provide a thoroughunderstanding of example configurations (including implementations).However, configurations may be practiced without these specific details.For example, well-known circuits, processes, algorithms, structures, andtechniques have been shown without unnecessary detail in order to avoidobscuring the configurations. This description provides exampleconfigurations only, and does not limit the scope, applicability, orconfigurations of the claims. Rather, the preceding description of theconfigurations will provide those skilled in the art with an enablingdescription for implementing described techniques. Various changes maybe made in the function and arrangement of elements without departingfrom the spirit or scope of the disclosure.

Also, configurations may be described as a process which is depicted asa flow diagram or block diagram. Although each may describe theoperations as a sequential process, many of the operations can beperformed in parallel or concurrently. In addition, the order of theoperations may be rearranged. A process may have additional steps notincluded in the figure. Furthermore, examples of the methods may beimplemented by hardware, software, firmware, middleware, microcode,hardware description languages, or any combination thereof. Whenimplemented in software, firmware, middleware, or microcode, the programcode or code segments to perform the necessary tasks may be stored in anon-transitory computer-readable medium such as a storage medium.Processors may perform the described tasks.

Having described several example configurations, various modifications,alternative constructions, and equivalents may be used without departingfrom the spirit of the disclosure. For example, the above elements maybe components of a larger system, wherein other rules may takeprecedence over or otherwise modify the application of the invention.Also, a number of steps may be undertaken before, during, or after theabove elements are considered. Accordingly, the above description doesnot bound the scope of the claims.

1. A method of authentication based on real-time communication, the method comprising: accessing a profile comprising information regarding a first person; collecting a first set of biometric information of the first person during the real-time communication between the first person and a second person, the second person having a threshold level of authentication; associating, with a processing unit, the first set of biometric information with the profile; receiving, from the second person, an indication regarding an identity of the first person; and associating, with the processing unit, a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person.
 2. The method of claim 1, further comprising creating, with the processing unit, the profile.
 3. The method of claim 1, wherein the first set of biometric information includes at least one of: audio information, or video information.
 4. The method of claim 1, wherein the real-time communication is initiated, at least in part, by an invitation to join a social network sent by the second person to the first person.
 5. The method of claim 1, wherein the real-time communication is initiated, at least in part, by an invitation to join a social network sent from a third person to the first person.
 6. The method of claim 1, further comprising associating a password with the profile.
 7. The method of claim 1, further comprising: receiving, from a third person, a second indication regarding the identity of the first person, wherein the third person has at least the threshold level of authentication; and associating a second level of authentication with the profile based, at least in part, on the second indication regarding the identity of the first person.
 8. The method of claim 1, further comprising prompting, during the real-time communication, either or both the first person or the second person to perform an action during the real-time communication.
 9. The method of claim 8, wherein the action comprising saying a word or phrase.
 10. The method of claim 1, further comprising: receiving, after the real-time communication, a second set of biometric information of the first person; comparing the second set of biometric information with the first set of biometric information associated with the profile to obtain a comparison result; and granting access to the profile based, at least in part, on the comparison result.
 11. A system for providing authentication based on real-time communication, the system comprising: means for accessing a profile comprising information regarding a first person; means for collecting a first set of biometric information of the first person during the real-time communication between the first person and a second person, the second person having a threshold level of authentication; means for associating the first set of biometric information with the profile; means for receiving, from the second person, an indication regarding an identity of the first person; and means for associating a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person.
 12. The system of claim 11, further comprising means for creating profile.
 13. The system of claim 11, wherein the means for collecting the first set of biometric information includes means for collecting at least one of: audio information, or video information.
 14. The system of claim 11, further comprising means for enabling the second person to send an invitation to join a social network to the first person.
 15. The system of claim 11, further comprising means for enabling a third person to send an invitation to join a social network to the first person.
 16. The system of claim 11, further comprising means for associating a password with the profile.
 17. The system of claim 11, further comprising means for: receiving, from a third person, a second indication regarding the identity of the first person, wherein the third person has at least the threshold level of authentication; and associating a second level of authentication with the profile based, at least in part, on the second indication regarding the identity of the first person.
 18. The system of claim 11, further comprising means for prompting, during the real-time communication, either or both the first person or the second person to perform an action during the real-time communication.
 19. The system of claim 11, further comprising means for: receiving, after the real-time communication, a second set of biometric information of the first person; comparing the second set of biometric information with the first set of biometric information associated with the profile to obtain a comparison result; and granting access to the profile based, at least in part, on the comparison result.
 20. A device for providing authentication based on real-time communication, the device comprising: a communication interface; and one or more processors coupled to the communication interface, the one or more processors configured to: access a profile comprising information regarding a first person; collect, via the communication interface, a first set of biometric information of the first person during real-time communication between the first person and a second person, the second person having a threshold level of authentication; associate the first set of biometric information with the profile; receive, from the second person via the communication interface, an indication regarding an identity of the first person; and associate a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person.
 21. The device of claim 20, wherein the one or more processors are further configured to create the profile.
 22. The device of claim 20, wherein the first set of biometric information includes at least one of: audio information, or video information.
 23. The device of claim 20, wherein the one or more processors are further configured to initiate the real-time communication by enabling the second person to send an invitation to join a social network to the first person.
 24. The device of claim 20, wherein the one or more processors are further configured to initiate the real-time communication by enabling a third person to send an invitation to join a social network to the first person.
 25. The device of claim 20, wherein the one or more processors are further configured to associate a password with the profile.
 26. The device of claim 20, wherein the one or more processors are further configured to: receive, from a third person, a second indication regarding the identity of the first person, wherein the third person has at least the threshold level of authentication; and associate a second level of authentication with the profile based, at least in part, on the second indication regarding the identity of the first person.
 27. The device of claim 20, wherein the one or more processors are further configured to prompt, during the real-time communication, either or both the first person or the second person to perform an action during the real-time communication.
 28. The device of claim 20, wherein the one or more processors are further configured to: receive, after the real-time communication, a second set of biometric information of the first person; compare the second set of biometric information with the first set of biometric information associated with the profile to obtain a comparison result; and grant access to the profile based, at least in part, on the comparison result.
 29. A non-transitory computer-readable recording medium having instructions embedded thereon for providing authentication based on real-time communication, the instructions including computer-executable code for: accessing a profile comprising information regarding a first person; collecting a first set of biometric information of the first person during real-time communication between the first person and a second person, the second person having a threshold level of authentication; associating the first set of biometric information with the profile; receiving, from the second person, an indication regarding an identity of the first person; and associating a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person.
 30. The non-transitory computer-readable recording medium of claim 29, wherein the instructions further include computer-executable code for creating the profile.
 31. The non-transitory computer-readable recording medium of claim 29, wherein the code for collecting the first set of biometric information includes code for collecting at least one of: audio information, or video information.
 32. The non-transitory computer-readable recording medium of claim 29, wherein the instructions further include computer-executable code for enabling the second person to send an invitation to join a social network to the first person.
 33. The non-transitory computer-readable recording medium of claim 29, wherein the instructions further include computer-executable code for enabling a third person to send an invitation to join a social network to the first person.
 34. The non-transitory computer-readable recording medium of claim 29, wherein the instructions further include computer-executable code for associating a password with the profile.
 35. The non-transitory computer-readable recording medium of claim 29, wherein the instructions further include computer-executable code for: receiving, from a third person, a second indication regarding the identity of the first person, wherein the third person has at least the threshold level of authentication; and associating a second level of authentication with the profile based, at least in part, on the second indication regarding the identity of the first person.
 36. The non-transitory computer-readable recording medium of claim 29, wherein the instructions further include computer-executable code for prompting, during the real-time communication, either or both the first person or the second person to perform an action during the real-time communication.
 37. The non-transitory computer-readable recording medium of claim 29, wherein the instructions further include computer-executable code for: receiving, after the real-time communication, a second set of biometric information of the first person; comparing the second set of biometric information with the first set of biometric information associated with the profile to obtain a comparison result; and granting access to the profile based, at least in part, on the comparison result. 