Authentication for social networking messages

ABSTRACT

A tool for verifying that a message received by a social networking service was sent by a bona fide owner of a social networking account who purportedly sent the message. The tool receives a message and it locates in the message a string that was entered into a message text field of the message. The string is compared with a registered authentication string for the bona fide owner of the account. If the string in the message matches the registered authentication string, the string is removed from the message and the message is forwarded to the social networking service. If the string in the message does not match the registered authentication string, the message is blocked from being forwarded to the social networking service.

TECHNICAL FIELD

The present invention relates generally to social networking and morespecifically to the authentication of the sender of a social networkingmessage.

BACKGROUND

Social networking is the interaction between people to shareinformation, ideas, resources and interests. A popular form of socialnetworking uses social networking services over the Internet. A socialnetworking service allows a person to become a “user,” create a profile(description of the user) for the user's web page, communicate withother users, or utilize a range of other services available through thesocial network service. Examples of popular social networking servicesare Facebook® (Registered trademark of Facebook, Inc.) social networkingservices and Twitter® (Registered trademark of Twitter, Inc.) socialnetworking services.

Users of Facebook social networking services and Twitter socialnetworking services communicate with other users of the service through“social networking messages,” which are messages sent to the socialnetworking service that can be made available to the general public, allusers of the service, or to a select set of friends or followers.

For example, Facebook “friends” are pairs of Facebook users who havemutually agreed to be able to view each other's messages. A Facebookuser can post a message on his or her “Facebook wall.” A “Facebook wall”is a user's virtual wall displayed when a user is logged in to theFacebook service. This wall is where a user can post messages forviewing by his or her friends, and where he or she can view messagesposted by his or her friends on their walls. Users can also postmessages directly on a friend's wall. In another example, a Twitter usercan post a “Tweet®” message which is a message posted to a Twitteraccount. These Tweet messages can either be public or protected. Apublic Tweet message can be viewed by anyone while a protected Tweetmessage can only be seen by approved “followers.” Followers are otherusers of Twitter social networking service that have subscribed to auser's Twitter updates. In either of the examples above, once a socialnetworking message is posted, it is disseminated to others.

Facebook social networking service operates on a network of serversincluding web servers, Memcached servers (generic high-performance,distributed memory object caching systems) and database servers. Theservers receive and store data that users send when creating theirprofile. This data typically includes photos, lists of interests,contact information, and other information. The servers disseminate thisdata to other computing devices when users access the created profile.The servers communicate over the Internet with users on computingdevices, such as computers or smart phones.

The servers receive messages from Facebook users attempting tocommunicate with others. These messages are sent from a computing devicelogged on to the Facebook service. The servers process and send themessages to the appropriate location (e.g., Facebook wall) for viewingby the appropriate users (e.g., friends). The messages can then beviewed on the computing device of the recipient user.

Twitter social networking service, similar to Facebook social networkingservice, operates on a network of servers including web servers,Memcached servers and database servers. The servers communicate over theInternet with users on computing devices, such as computers or smartphones. Twitter has a limited profile feature but is more focused oncommunication with the public and between users.

The servers receive Tweet messages from Twitter users wishing to sharethe Tweet message with others. The servers process and send the Tweetmessage to the Twitter profile of the sender and to the “timeline” (alist of all the Tweet messages from people a user follows) of thesender's followers.

When using a social networking service, security is a concern. Messagesmay be sent from someone pretending to be a specific user (spoofing) orfrom someone who has gained unauthorized access to a user's account(hacking). The messages may be embarrassing to the real/spoofed user.Also, users receiving these messages may respond with the release ofpersonal information.

Authentication of a social network service user is typically limited tologin authentication before access to the service is granted. A usertypically enters a userID and password on the service home page to gainaccess. The userID and password are created when the user initiallyjoins the service. Normally, after the initial login authentication, auser can utilize all the functionality of the social networking service.

SUMMARY

Aspects of an embodiment of the present invention disclose a method,system, and a program product for verifying that a message received by asocial networking service was sent by a bona fide owner of a socialnetworking account who purportedly sent the message. A network servercomputer receives the message and locates in the message a string thatwas entered into a message text field of the message by a person whoauthored the message, the string comprising first and second portions,the first portion comprising a combination of alpha numeric characterswhich identifies the second portion as containing purportedauthentication information for the bona fide owner of the account. Thenetwork server computer compares the second portion of the string in themessage to a registered authentication string for the bona fide owner ofthe account. If the second portion of the string in the message matchesthe registered authentication string, the network server computerremoves the string from the message and permits the message to beforwarded to the social networking service. If the second portion of thestring in the message does not match the registered authenticationstring, the network server computer blocks the message from beingforwarded to the social networking service.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 depicts a diagram of a computing system in accordance with anembodiment of the present invention.

FIG. 2 depicts a flowchart of the steps of a social networking messageauthentication program executing within the computing system of FIG. 1,for verifying that a string in a social networking message contains theauthentication string of a user, in accordance with a preferredembodiment of the present invention.

FIG. 3 is an exemplary interface to a social networking service program.

FIG. 4 depicts a flowchart of the steps of an authentication stringsetup program for defining, establishing and storing an authenticationstring, in accordance with a preferred embodiment of the presentinvention.

FIG. 5 depicts a flowchart of the steps of another authentication stringsetup program for defining, establishing and storing an authenticationstring, in accordance with other embodiments of the present invention.

FIG. 6 depicts a flowchart of the steps of a social networking interfaceprogram for updating and collecting sensor data for use with theauthentication string setup program of FIG. 4 or 5, in accordance withother embodiments of the present invention.

FIG. 7 is a block diagram of internal and external components of thecomputers of FIG. 1.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention will now be described in detail with reference tothe figures.

FIG. 1 depicts a diagram of a computing system 10 in accordance with anembodiment of the present invention. FIG. 1 provides only anillustration of one embodiment and does not imply any limitations withregard to the environments in which different embodiments may beimplemented.

In the depicted embodiment, system 10 includes user computing device 40and social networking server 30 interconnected over network 20. Network20 may be a local area network (LAN), a wide area network (WAN) such asthe Internet, a combination of the two or any combination of connectionsand protocols that will support communications between user computingdevice 40 and social networking server 30 in accordance with embodimentsof the invention. Network 20 may include wired, wireless, or fiber opticconnections.

User computing device 40 may be a laptop computer, tablet computer,desktop computer, personal digital assistant (PDA), or smart phone. Ingeneral, user computing device 40 may be any electronic device orcomputing system capable of accepting user input and communicating overa network with a social networking service. User computing device 40contains social networking interface program 90 which is similar to aprior art social networking interface program except that socialnetworking interface program 90 sends user messages to social networkingmessage authentication program 50 instead of directly to the socialnetworking service web site. This allows social networking messageauthentication program 50 to verify the authenticity of the messageauthor based on authentication information entered in the message textfield before forwarding the actual message text to the social networkingservice web site. User computing device 40 also contains internalcomponents 800 b and external components 900 b.

In a preferred embodiment, social networking interface program 90 is aknown web browser. The web browser is capable of displaying on usercomputing device 40 a web page, from a social networking service, with aknown form having a message input field. For example, the form can bethat provided by the known Facebook social messaging service. The webbrowser displays web pages received over the network from specificnetwork addresses referred to as uniform resource locators (URLs). Theweb pages are authored primarily in hypertext markup language (HTML),which supports the display of forms with input fields. In otherembodiments, social networking interface program 90 may be anapplication on a smart phone or any other program that is capable ofaccepting user input, displaying information and communicating over anetwork with a social networking service.

Social networking server 30 may be a server computer such as amanagement server, a web server, or any other electronic device capableof receiving and sending data. In another embodiment, social networkingserver 30 may represent a server computing system utilizing multiplecomputers as a server system, such as in a cloud computing environment.Social networking server 30 contains social networking messageauthentication program 50, authentication string setup program 60 withassociated authentication string store 70, and social networking serviceprogram 80. Social networking server 30 also includes internalcomponents 800 a and external components 900 a.

In a preferred embodiment, authentication string store 70 is a file thatmay be written by authentication string setup program 60 and read bysocial networking message authentication program 50. Authenticationstring store 70 operates to store a user's authentication stringreceived from authentication string setup program 60. In anotherembodiment, authentication string store 70 may be a database such asOracle® database or IBM® DB2® database.

In a preferred embodiment, authentication string store 70 resides onsocial networking server 30. In another embodiment, authenticationstring store 70 may reside on another server or another computing deviceprovided it is accessible to social networking message authenticationprogram 50 and authentication string setup program 60.

Social networking message authentication program 50 operates to verifythat a string in a social networking message received, over network 20from social networking service program 80, contains the authenticationstring of a user the social networking message is purported to be from.Social networking message authentication program 50 removes the stringand passes the social networking message to social networking serviceprogram 80 to post to a “location” on the social networking service ifthe string contains the proper authentication string. In variousembodiments a location may be a user's Facebook wall or a user's Twitteraccount.

In a preferred embodiment, social networking message authenticationprogram 50 is a program residing on social networking server 30. Inanother embodiment, social networking message authentication program 50may reside on another server or another computing device provided it isaccessible to social networking service program 80 and has access toauthentication string store 70.

In a preferred embodiment, social networking message authenticationprogram 50 receives from social networking service program 80 a socialnetworking message that includes a string used to determine if thesocial networking message was sent by the user who purportedly sent it.Social networking message authentication program 50 verifies that thestring included in the social networking message contains theauthentication string previously registered by the user and stored onauthentication string store 70. If the authentication string isverified, social networking message authentication program 50 thenremoves the string from the social networking message and sends thesocial networking message to social networking service program 80 to beposted to a location on the social networking service. If theauthentication string contained in the message does not match theauthentication string previously registered by the user or if themessage does not include any authentication string, then socialnetworking message authentication program 50 blocks the message so it isnot sent to social networking service program 80 and not posted on asocial networking site.

In other embodiments, social networking message authentication program50 may receive a social networking message over network 20 directly fromsocial networking interface program 90 on user computing device 40.Social networking message authentication program 50 then follows thesame process outlined in the paragraph above.

Social networking service program 80 operates as the main socialnetworking program, such as Facebook social networking service orTwitter social networking service, to receive social networking messagesfrom social networking interface program 90 on user computing device 40and to send those messages to social networking message authenticationprogram 50. Social networking service program 80 also posts socialnetworking messages social networking service program 80 receives fromsocial networking message authentication program 50 to a location on thesocial networking service. In a preferred embodiment, social networkingservice program 80 is a program residing on social networking server 30.In another embodiment, social networking service program 80 may resideon another server or another computing device, provided socialnetworking service program 80 is accessible to social networkinginterface program 90 and social networking message authenticationprogram 50.

Authentication string setup program 60 operates to allow a user todefine an authentication string for use by social networking messageauthentication program 50. In a preferred embodiment, authenticationstring setup program 60 is a web based program residing on socialnetworking server 30. In general, authentication string setup program 60may reside on another network server, on user computing device 40, or onany computing device, provided it is can communicate with user computingdevice 40, and authentication string store 70 where the authenticationstring is stored.

In a preferred embodiment, authentication string setup program 60receives an initial authentication string from user computing device 40over network 20 and stores the authentication string on authenticationstring store 70.

In various embodiments, authentication string setup program 60 maypermit a user to setup multiple authentication strings. For example, oneauthentication string may be used for a desktop computer and another fora smart phone. Also, different authentication strings can be used fordifferent social networking services. These computing devices arecapable of utilizing different types of authentication strings asillustrated below in the description of FIG. 3, FIG. 4 and FIG. 5.

Authentication string setup program 60 also operates to allow a user toedit a previously stored authentication string. Authentication stringsetup program 60 receives the edited authentication string from usercomputing device 40 over network 20 and stores the authentication stringon authentication string store 70.

FIG. 2 depicts a flowchart of the steps of social networking messageauthentication program 50 for verifying that a string in a socialnetworking message contains the authentication string of a user, inaccordance with a preferred embodiment of the present invention.

Social networking interface program 90 sends the social networkingmessage with a string from user computing device 40 over network 20 tosocial networking service program 80 on social networking server 30.

In a preferred embodiment, the string has two portions and is located inthe body of the social networking message in the message text field.Thus, the authentication string is entered into the same field as theactual message text. The first portion is a predetermined combination ofalpha numeric characters that indicates that the following charactersare the second portion which contains the authentication sting.

In an alternative embodiment, social networking interface program 90accesses data from biometric data sensors of user computing device 40and inserts the data in to the social networking message as a string.User computing device 40 is an electronic device including one or moresensors such as an accelerometer or a gyroscope, and social networkinginterface program 90 is an application on user computing device 40.Social networking interface program 90 calls an Application ProgrammingInterface (API) or a Standard Development Kit (SDK) of user computingdevice 40 to begin updating sensor data from the sensors of usercomputing device 40, and social networking interface program 90 promptsthe user to make a series of motions or actions that would utilize thesensors of user computing device 40. Social networking interface program90 calls the API or the SDK of user computing device 40 to access thesensor data collected while the user makes the series of motions oractions with user computing device 40. Social networking interfaceprogram 90 calls the API or the SDK or user computing device 40 to stopupdating sensor data.

In step 190, social networking message authentication program 50 sendsto social networking interface program 90 a message text field todisplay for a social networking service in response to a user accessingthe social networking service web site and supplying a known userID andpassword to the social networking service. In response, the user entersinto the message text field, actual message text and the symbolindicative of the authentication string, followed by the authenticationstring.

In step 200, social networking message authentication program 50receives the social networking message with the string from socialnetworking service program 80.

In step 210, social networking message authentication program 50identifies the authentication string from the predetermined keyboardsymbol and verifies that the string in the social networking messagecontains the authentication string previously registered by the user andstored on authentication string store 70. In a preferred embodiment,social networking message authentication program 50 queriesauthentication string store 70, to fetch the registered authenticationstring of the user and compares the registered authentication string tothe second portion of the string included in the social networkingmessage. The form of the query matches the form of the authenticationstring store 70, i.e., relational or non-relational.

If social networking message authentication program 50 verifies that thestring in the social networking message contains the authenticationstring defined by the user and stored on authentication string store 70(decision 210, yes branch), then social networking messageauthentication program 50 removes the string from the social networkingmessage (step 220) and sends the social networking message to socialnetworking service program 80 to be posted to a location on the socialnetworking service (step 230).

If social networking message authentication program 50 cannot verifythat the social networking message contains the authentication stringdefined by the user and stored on authentication string store 70 (i.e.,either the message text field contains no authentication string orcontains an authentication string that does not match the registeredauthentication string for the user) (decision 210, no branch), thensocial networking message authentication program 50 will return an errorto the sender of the second message and not forward the message to thesocial networking service (step 240).

If activated by an owner of the social networking account to which themessage was intended to be sent, social networking messageauthentication program 50 sends an alert to the owner of the socialnetworking account when an error is returned to the sender of the secondmessage, as follows (step 250). Social networking message authenticationprogram 50 calls social networking service program 80 to obtain contactpreferences set by the owner and sends the owner an alert using thecontact preferences. The alert may be sent to an electronic device ofthe owner of the social networking account. The alert may be sent byemail or text message depending on the preferences setup by the owner ofthe social networking account.

If activated by the owner of the social networking account, socialnetworking message authentication program 50 will lock the socialnetworking account in response to social networking messageauthentication program 50 receiving a predetermined threshold number ofsocial networking messages that identify the social networking accountand are devoid of a string that contains the proper authenticationstring. The owner will select the number of messages devoid of a stringthat contains the authentication string needed to lock the socialnetworking account.

In a preferred embodiment, after returning an error to the sender of thesecond message, social networking message authentication program 50determines if the number of messages devoid of a string that containsthe authentication string needed to lock the social networking accounthas been reached (step 260). If the number has not been reached thensocial networking message authentication program 50 ends. If the numberhas been reached social networking message authentication program 50locks the social networking account (step 270).

FIG. 3 is an exemplary interface to a social networking service. Userinterface 300 displays a social networking web site 310. Socialnetworking web site 310 includes a message text field 320 where a usermay enter message text 330. The user may also enter a string in themessage text field 320. A string has two portions and is entered intothe same field as the actual message text. A first portion 340 is apredetermined combination of alpha numeric characters (e.g., @&) thatindicates that the following characters are a second portion 350 (e.g.,baseballfan11) which contains the authentication sting. After the userhas entered the message text 330, the first portion 340, and the secondportion 350, the user will select the send button 360.

FIG. 4 depicts a flowchart of the steps of authentication string setupprogram 60 for defining, establishing and storing an authenticationstring, in accordance with a preferred embodiment of the presentinvention.

Access to authentication string setup program 60 is granted after a userlogs on to a social networking service. In a preferred embodiment, auserID and password are required to logon to the social networkingservice. In another embodiment, after initial access to authenticationstring setup program 60 is granted, an additional layer of security maybe used. For example, the additional layer of security may be a securityquestion or any other security function in addition to the userID andpassword login.

In step 400, authentication string setup program 60 receives a requestto establish a new authentication string from social networkinginterface program 90. In a preferred embodiment, social networkinginterface program 90 sends the request when a user selects theauthentication string setup URL while viewing the settings orpreferences web page of a particular service.

In response to the authentication string setup request, authenticationstring setup program 60 sends to social networking interface program 90a web page with at least a form having an authentication string inputfield (step 410).

Authentication string setup program 60 receives the new authenticationstring from social networking interface program 90 (step 420). In apreferred embodiment, the authentication string is a set of characters.

Authentication string setup program 60 stores the authentication stringon authentication string store 70 (step 430) so social networkingmessage authentication program 50 may access the stored string whencarrying out step 210.

FIG. 5 depicts a flowchart of the steps of authentication string setupprogram 60 for defining, establishing and storing an authenticationstring, in accordance with other embodiments of the present invention.In the embodiment of FIG. 5, user computing device 40 is an electronicdevice including one or more biometric data sensors such as anaccelerometer or a gyroscope, and social networking interface program 90is an application on user computing device 40.

In step 500, authentication string setup program 60 receives a requestto establish a new authentication string from social networkinginterface program 90. Social networking interface program 90 sends toauthentication string setup program 60 the request, in response to auser selecting the authentication string setup function in theapplication on user computing device 40.

In response to receiving the authentication string setup request,authentication string setup program 60 sends to social networkinginterface program 90 a request for the user to input a newauthentication string (step 510).

Authentication string setup program 60 receives from social networkinginterface program 90 the sensor data from the biometric data sensors ofuser computing device 40 (step 520).

Authentication string setup program 60 stores the sensor data from thebiometric data sensors of user computing device 40 as the newauthentication string on authentication string store 70 (step 530) sosocial networking message authentication program 50 may access thestored strings when carrying out step 210.

FIG. 6 depicts a flowchart of the steps of social networking interfaceprogram 90 for updating and collecting sensor data for use withauthentication string setup program 60, in accordance with otherembodiments of the present invention. In the embodiment of FIG. 6, usercomputing device 40 is an electronic device including one or morebiometric data sensors such as an accelerometer or a gyroscope, andsocial networking interface program 90 is an application on usercomputing device 40.

Social networking interface program 90 receives a request fromauthentication string setup program 60 for the user to input a newauthentication string (step 600).

Social networking interface program 90 calls an Application ProgrammingInterface (API) or a Standard Development Kit (SDK) of user computingdevice 40 to begin updating sensor data from the biometric data sensorsof user computing device 40, and social networking interface program 90prompts the user to make a series of motions or actions that wouldutilize the biometric data sensors of user computing device 40 (step610). In one embodiment, user computing device 40 is an Apple® iPhone®device and user computing device 40 includes a Core Motion API and anaccelerometer and a gyroscope. Social networking interface program 90calls the Core Motion API to start updating data from the accelerometerand the gyroscope. In another embodiment, user computing device 40 is aDroid™ X device (DROID is a trademark of Lucasfilm Ltd. and its relatedcompanies) and user computing device 40 includes an Android™ API and atouch screen sensor. Social networking interface program 90 calls theAndroid API to start updating data from the touch screen sensor.

Social networking interface program 90 calls the API or the SDK of usercomputing device 40 to access the sensor data collected while the usermakes the series of motions or actions with user computing device 40(step 620). Social networking interface program 90 calls the API or theSDK or user computing device 40 to stop updating sensor data (step 630).Social networking interface program 90 sends the sensor data from thebiometric data sensors of user computing device 40, collected while theuser made the series of motions or actions, to authentication stringsetup program 60 (step 640). In one embodiment, user computing device 40is an Apple® iPhone® and user computing device 40 includes a Core MotionAPI and an accelerometer and a gyroscope. Social networking interfaceprogram 90 calls the Core Motion API to access the accelerometer and thegyroscope data collected while the user makes a series of motions withuser computing device 40. In another embodiment, user computing device40 is a Droid™ X (DROID is a trademark of Lucasfilm Ltd. and its relatedcompanies) and user computing device 40 includes an Android™ API and atouch screen sensor. Social networking interface program 90 calls theAndroid API to access the touch screen sensor data collected while theuser makes a series of motions on the touch screen of user computingdevice 40.

FIG. 7 is a block diagram of internal and external components of thecomputers of FIG. 1 in accordance with an embodiment of the presentinvention.

User computing device 40 and social networking server 30 includerespective sets of internal components 800 a,b and external components900 a,b illustrated in FIG. 7. Each of the sets of internal components800 a,b includes one or more processors 820, one or morecomputer-readable RAMs 822 and one or more computer-readable ROMs 824 onone or more buses 826, and one or more operating systems 828 and one ormore computer-readable tangible storage devices 830. The one or moreoperating systems 828, social networking message authentication program50 (for social networking server 30), authentication string setupprogram 60 (for social networking server 30), social networking serviceprogram 80 (for social networking server 30) and any other programs forsocial networking server 30 and user computing device 40 are stored onone or more of the respective computer-readable tangible storage devices830 for execution by one or more of the respective processors 820 viaone or more of the respective RAMs 822 (which typically include cachememory). In the embodiment illustrated in FIG. 7, each of thecomputer-readable tangible storage devices 830 is a magnetic diskstorage device of an internal hard drive. Alternatively, each of thecomputer-readable tangible storage devices 830 is a semiconductorstorage device such as ROM 824, EPROM, flash memory or any othercomputer-readable tangible storage device that can store a computerprogram and digital information.

Each set of internal components 800 a,b also includes a R/W drive orinterface 832 to read from and write to one or more portablecomputer-readable tangible storage devices 936 such as a CD-ROM, DVD,memory stick, magnetic tape, magnetic disk, optical disk orsemiconductor storage device. Social networking message authenticationprogram 50 (for social networking server 30), authentication stringsetup program 60 (for social networking server 30), social networkingservice program 80 (for social networking server 30) and any otherprograms for social networking server 30 and user computing device 40can be stored on one or more of the respective portablecomputer-readable tangible storage devices 936, read via the respectiveR/W drive or interface 832 and loaded into the respective hard drive 83.

Each set of internal components 800 a,b also includes a network adapteror interface 836 such as a TCP/IP adapter card. Social networkingmessage authentication program 50 (for social networking server 30),authentication string setup program 60 (for social networking server30), social networking service program 80 (for social networking server30) and any other programs for social networking server 30 and usercomputing device 40 can be downloaded to the respective computers froman external computer via a network (such as network 20) and networkadapter or interface 836. From the network adapter or interface 836,social networking message authentication program 50 (for socialnetworking server 30), authentication string setup program 60 (forsocial networking server 30), social networking service program 80 (forsocial networking server 30) and any other programs for socialnetworking server 30 and user computing device 40 are loaded into therespective hard drive 830. The network may comprise copper wires,optical fibers, wireless transmission, routers, firewalls, switches,gateway computers and/or edge servers.

Each of the sets of external components 900 a,b includes a computerdisplay monitor 920, a keyboard 930, and a computer mouse 934. Each ofthe sets of internal components 800 a,b also includes device drivers 840to interface to computer display monitor 920, keyboard 930 and computermouse 934. The device drivers 840, R/W drive or interface 832 andnetwork adapter or interface 836 comprise hardware and software (storedin storage device 830 and/or ROM 824).

Social networking message authentication program 50 (for socialnetworking server 30), authentication string setup program 60 (forsocial networking server 30), social networking service program 80 (forsocial networking server 30) and any other programs for socialnetworking server 30 and user computing device 40 can be written invarious programming languages (such as Java, C++) including low-level,high-level, object-oriented or non object-oriented languages.Alternatively, the functions of social networking message authenticationprogram 50 (for social networking server 30), authentication stringsetup program 60 (for social networking server 30), social networkingservice program 80 (for social networking server 30) and any otherprograms for social networking server 30 and user computing device 40can be implemented in whole or in part by computer circuits and otherhardware (not shown).

Based on the foregoing, a computer system, method and program producthave been disclosed for verifying that a message received by a socialnetworking service was sent by a bona fide owner of a social networkingaccount who purportedly sent the message. The description above has beenpresented for illustration purposes only. It is not intended to be anexhaustive description of the possible embodiments. One of ordinaryskill in the art will understand that other combinations and embodimentsare possible. Therefore, the present invention has been disclosed by wayof example and not limitation.

What is claimed is:
 1. A method for verifying that a message received bya social networking service was sent by a bona fide owner of a socialnetworking account who purportedly sent the message, the methodcomprising the steps of: a network server computer receiving the messageand locating in the message a string that was entered into a messagetext field of the message by a person who authored the message, thestring comprising first and second portions, the first portioncomprising a combination of alpha numeric characters which identifiesthe second portion as containing purported authentication informationfor the bona fide owner of the account; the network server computercomparing the second portion of the string in the message to aregistered authentication string for the bona fide owner of the account;and the network server computer determining that the second portion ofthe string in the message matches the registered authentication string,and responsive to the determining, the network server computer removingthe string from the message and, after removing the string, posting themessage to the social networking service.
 2. The method of claim 1,further comprising the steps of: the network server computer receiving asecond message identifying the social networking account; and thenetwork server computer determining that the second message does notinclude the authentication string, and in response, the network servercomputer returning an error to a sender of the second message.
 3. Themethod of claim 2, wherein in response to the network server computerdetermining that the second message does not include the authenticationstring further comprising the step of the networking server computersending a message to an electronic device of the owner alerting theowner of the second message.
 4. The method of claim 1, furthercomprising the step of the network server computer setting a lock on thesocial networking account in response to the network server computerreceiving a number of messages that identify the social networkingaccount and are devoid of a string that matches the authenticationstring.
 5. A computer program product for verifying that a messagereceived by a social networking service was sent by a bona fide owner ofa social networking account who purportedly sent the message, thecomputer program product comprising: one or more computer-readabletangible storage devices and program instructions stored on at least oneof the one or more storage devices, the program instructions comprising;program instructions to receive the message and locate in the message astring that was entered into a message text field of the message by aperson who authored the message, the string comprising first and secondportions, the first portion comprising a combination of alpha numericcharacters which identifies the second portion as containing purportedauthentication information for the bona fide owner of the account;program instructions to compare the second portion of the string in themessage to a registered authentication string for the bona fide owner ofthe account; and program instructions to determine that the secondportion of the string in the message matches the registeredauthentication string, program instructions to remove the string fromthe message and, after removing the string, program instructions to postthe message to the social networking service; and program instructionsto determine that the second portion of the string in the message doesnot match the registered authentication string, program instructions toblock the message from being forwarded to the social networking service.6. The computer program product of claim 5, further comprising programinstructions, stored on at least one of the one or more storage devices,to: receive a second message identifying the social networking account;and determine that the second message does not include theauthentication string, and in response, to return an error to a senderof the second message.
 7. The computer program product of claim 6,further comprising program instructions, stored on at least one of theone or more storage devices, to send a message to an electronic deviceof the owner alerting the owner of the second message, in response tothe second message not including the authentication string.
 8. Thecomputer program product of claim 5, further comprising programinstructions, stored on at least one of the one or more storage devices,to receive a number of messages that identify the social networkingaccount and are devoid of a string that matches the authenticationstring, and in response, set a lock on the social networking account. 9.A computer system for verifying that a message received by a socialnetworking service was sent by a bona fide owner of a social networkingaccount who purportedly sent the message, the computer systemcomprising: one or more processors, one or more computer-readablememories, one or more computer-readable tangible storage devices andprogram instructions which are stored on at least one of the one or morestorage devices for execution by at least one of the one or moreprocessors via at least one of the one or more memories, the programinstructions comprising: program instructions to receive the message andlocate in the message a string that was entered into a message textfield of the message by a person who authored the message, the stringcomprising first and second portions, the first portion comprising acombination of alpha numeric characters which identifies the secondportion as containing purported authentication information for the bonafide owner of the account; program instructions to compare the secondportion of the string in the message to a registered authenticationstring for the bona fide owner of the account; and program instructionsto determine that the second portion of the string in the messagematches the registered authentication string, program instructions toremove the string from the message and, after removing the string,program instructions to post the message to the social networkingservice; and program instructions to determine that the second portionof the string in the message does not match the registeredauthentication string, program instructions to block the message frombeing forwarded to the social networking service.
 10. The computersystem of claim 9, further comprising program instructions, stored on atleast one of the one or more storage devices for execution by at leastone of the one or more processors via at least one of the one or morememories, to: receive a second message identifying the social networkingaccount; and determine that the second message does not include theauthentication string, and in response, to return an error to a senderof the second message.
 11. The computer system of claim 10, furthercomprising program instructions, stored on at least one of the one ormore storage devices for execution by at least one of the one or moreprocessors via at least one of the one or more memories, to send amessage to an electronic device of the owner alerting the owner of thesecond message, in response to the second message not including theauthentication string.
 12. The computer system of claim 9, furthercomprising program instructions, stored on at least one of the one ormore storage devices for execution by at least one of the one or moreprocessors via at least one of the one or more memories, to receive anumber of messages that identify the social networking account and aredevoid of a string that matches the authentication string, and inresponse, set a lock on the social networking account.