Temporary virtual identities in a social networking system

ABSTRACT

Disclosed are various embodiments for facilitating temporary virtual identities in a social networking system. An identity associated with a user is authenticated. A time period, location or other parameter associated with the user is authenticated. The temporary virtual identity is registered in the social networking system. Content generated by the user is published in the social networking system under the temporary virtual identity.

BACKGROUND

In a social networking system, such as a user community, a bloggingsystem, a microblogging network, or other systems, users often have apermanent identity with which they interact with other users. Forexample, a user may publish content in a social networking system, andother users with which he is associated may see the published content.In a social networking system such as a blogging network, the contentmay be publicly accessible and can be associated with the permanentidentity of the user. As another example, in a microblogging network, auser may publish content that is publicly accessible and/or accessibleby other users who are linked with the permanent identity of the user.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the present disclosure can be better understood withreference to the following drawings. The components in the drawings arenot necessarily to scale, emphasis instead being placed upon clearlyillustrating the principles of the disclosure. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views.

FIG. 1 is a drawing of networked environment according to variousembodiments of the present disclosure.

FIG. 2 is a drawing of a client interacting with the temporary virtualidentity application and the social networking service in the networkedenvironment of FIG. 1 according to various embodiments of the presentdisclosure.

FIG. 3 is a drawing of a client interacting with the temporary virtualidentity application and the social networking service in the networkedenvironment of FIG. 1 according to various embodiments of the presentdisclosure.

FIG. 4 is a drawing of a client interacting with the temporary virtualidentity application and the social networking service in the networkedenvironment of FIG. 1 according to various embodiments of the presentdisclosure.

FIG. 5 is a flowchart illustrating one example of functionality of thetemporary virtual identity application as executed in a computing devicein the networked environment of FIG. 1 according to various embodimentsof the present disclosure.

FIG. 6 is a schematic block diagram that provides one exampleillustration of a computing device employed in the networked environmentof FIG. 1 according to various embodiments of the present disclosure.

DETAILED DESCRIPTION

In the following discussion, a general description of the system and itscomponents is provided, followed by a discussion of the operation of thesame. This disclosure describes systems and methods for establishing,registering, and authenticating a temporary virtual identity in a socialnetworking system. As discussed herein, a social networking system canalso include any type of virtual user community, blogging service,microblogging service, etc., in which a user has an identity. Thetemporary virtual identity can be associated with an identity of a userin the social networking system. The embodiments described herein alsorelate to publishing content under such a temporary virtual identity.The content can be published in a form that links or associates thecontent with a temporary virtual identity and the identity of the userin the social networking system, or the content can be published in aform that only links the content with the temporary virtual identity.For the sake of convenience, first a networked environment is described,followed by a discussion of the operation of the various components ofthe data communications network according to various embodiments.

With reference to FIG. 1, shown is an example of a networked environment100 according to various embodiments. The networked environment 100includes one or more computing devices 103, 105, clients 107, and/ormobile devices 109. The network 110 includes, for example, the Internet,intranets, extranets, wide area networks (WANs), local area networks(LANs), wired networks, wireless networks, or other suitable networks,etc., or any combination of two or more such networks.

The computing device 103, 105 may comprise, for example, a servercomputer or any other system providing computing capability.Alternatively, a plurality of computing devices 103, 105 may be employedthat are arranged, for example, in one or more server banks or computerbanks or other arrangements. For example, a plurality of computingdevices 103, 105 together may comprise, for example, a cloud computingresource, a grid computing resource, and/or any other distributedcomputing arrangement. Such computing devices 103, 105 may be located ina single installation or may be dispersed among many differentgeographical locations. In one embodiment, the computing device 103, 105represents a virtualized computer system executing on one or morephysical computing systems. For purposes of convenience, the computingdevices 103, 105 are referred to herein in the singular. Even though theterm “computing device” is referred to in the singular, it is understoodthat a plurality of computing devices 103, 105 may be employed in thevarious arrangements as described above.

The components executed on the computing device 103, for example,include a temporary virtual identity application 111 as well as otherapplications, services, processes, systems, engines, or functionalitynot discussed in detail herein. The temporary virtual identityapplication 111 executed in the computing device 103 allows a user of asocial networking system to establish and register a temporary virtualidentity in a social networking service. The temporary virtual identityapplication 111 can authenticate the identity of the user. The temporaryvirtual identity application 111 can additionally allow a user topublish content associated with a temporary virtual identity in a socialnetworking system. The various aspects of the temporary virtual identityapplication 111 will be discussed in more detail herein.

The components executed in the depicted computing device 105, forexample, include a social networking service 113. The social networkingservice 113 facilitates implementation of a social networking system,which can include any type of user community, a blogging service, amicroblogging service, etc. A user of the social networking system canhave an identity and interact with other users of the social networkingsystem, publish content, and take advantage of other functionalitygenerally found within a social networking system.

As a non-limiting example, in a microblogging service implemented by thesocial networking service 113, a user (e.g., a publisher) can publishcontent under an identity in the microblogging service. This content canbe published and viewable to other users linked to the publisher of thecontent. In some social networking systems, for example, the content canbe available to “friends,” “followers” and/or users in the publisher's“network.” In other social networking systems, the content can bepublicly accessible without regard to how a particular user is linked tothe publisher. It should be appreciated that the social networkingservice 113 and the temporary virtual identity application 111 can beexecuted within a single computing device or as an integrated system,and that the depicted embodiment is but one example.

The client 107 is representative of a plurality of client devices thatmay be coupled to the network 110. The client 107 may comprise, forexample, a processor-based system such as a computer system. Such acomputer system may be embodied in the form of a desktop computer, alaptop computer, a personal digital assistant, a cellular telephone,set-top box, music players, web pads, tablet computer systems, or otherdevices with like capability.

The client 107 a may be configured to execute various applications suchas a browser 117 and/or other applications. The browser 117 may beexecuted in a client 107 a, for example, to access and render networkpages 119, such as web pages, or other network content served up by thecomputing device 103, 105 and/or other servers. The client 107 a may beconfigured to execute applications beyond the browser 117 such as, forexample, email applications, instant message applications, socialnetworking applications, and/or other applications. The client 107 canalso include additional special purpose hardware and software componentswith which a browser 117 or other software executed on the client 107may interact. As one non-limiting example, the client 107 a may comprisea mobile device including cellular telephone and location detectionhardware and software components. Accordingly, the mobile device client107 a can detect the location of a user using the client 107 a, whichcan be incorporated into various location based services andapplications executed thereon.

In other embodiments, the client 107 b can be configured to execute asocial networking application 121 configured to access a socialnetworking system implemented by a computing device 105 executing asocial networking service 113. As a non-limiting example, a specialpurpose client software application can be executed on the client 107 bto allow a user to access various features of a social networkingservice 113 on a computing device 105. For example, a client tailored toallow a user to publish content as well as view, browse, and/or searchthe content of other users in a microblogging network can be executed onthe client 107 b, which may provide an alternative or more immersiveuser experience relative to accessing the microblogging network via aclient 107 a executing a browser 117 that renders network pages 119. Itshould be appreciated that the above illustrates but one example, andthat other variations consistent with this disclosure should be apparentto one of ordinary skill in the art. The client 107 b can also includeadditional special purpose hardware and software components with whichthe social networking application 121 may interact. As noted above, theclient 107 b can include location detection hardware and software, whichthe social networking application 121 can employ to provide locationbased features and/or services in the context of a social networkingsystem.

In the depicted networked environment, a user of a client 107 mayinteract with a social networking system facilitated by the computingdevice 105 executing the social networking service 113. Accordingly, theuser can manipulate a user interface encoded by the social networkingservice 113 and rendered on a client 107 a or one that is provided in asocial networking application 121 on the client 107 a. In one example,the user can authenticate himself by providing login credentials in auser interface on a client 107, which can be verified by the socialnetworking service 113. In this way, the social networking service 113can provide an identity with which the user interacts with other usersin the social networking system, publishes content, or performs othertasks in the social networking system as can be appreciated.

In one embodiment, in a microblogging network implemented by the socialnetworking service 113, the user can publish content that is availableto other users or the public. Other users of the social networkingsystem can access the published content via the social networkingservice 113. In this way, a user can have a permanent identity in thesocial networking service 113 with which interaction with the socialnetworking system can occur. This identity, in many cases, is identifiedwith a personal identity or an entity with which the user represents.

Accordingly, users of a social networking system may desire to interactwith the system using a temporary identity that can be linked to apermanent identity of the user in the social networking service 113. Inthis way, a user can interact with the social networking system with atemporary virtual identity that masks a permanent identity associatedwith the user from other users. To facilitate this functionality, thetemporary virtual identity application 111 can create a temporaryvirtual identity on behalf of a user having a permanent identity in asocial networking system, and the user can then interact with the socialnetworking system using the temporary virtual identity.

In some embodiments, it may be desired that the temporary virtualidentity created on behalf of a user be linked with other attributes orvariables. As a non-limiting example, the temporary virtual identity canbe linked with a certain geographical location, such as an event,conference or other gathering of people. As another example, thetemporary virtual identity can be linked to a certain time period.Accordingly, the temporary virtual identity application 111 can executean authentication module 121 that can authenticate the identity of theuser within the social networking system as well as authenticate theother attributes associated with a temporary identity.

As a non-limiting example, the authentication module 121 canauthenticate a user based on whether the user is attending an eventlinked with a temporary virtual identity. Therefore, if a user having anidentity in a social networking system that is described by thecharacters “JohnDoe,” the authentication module 121 can determinewhether the user is authorized to be granted a temporary virtualidentity linked with the event. Therefore, the temporary virtualidentity requested by a user on a client 107 can be, for example,“John@BigConference” and is linked with the permanent identity of theuser. In this example, the authentication module 121 can thenauthenticate whether the user “JohnDoe” is attending the event“BigConference,” and only grant the user the above temporary virtualidentity if the user can successfully authenticate his attendance.Additionally, in the above example, the authentication module 121 canalso authenticate whether the user's name is “John” and only grant theuser the above temporary virtual identity if the user's name can beauthenticated.

In one embodiment, the event organizers can execute the temporaryvirtual identity application 111 on a computing device 103 and generatethe temporary virtual identity on behalf of the user upon authenticatingthe attendance of the user at an event. In another embodiment, once theattendance of the user at an event is authenticated, the temporaryvirtual identity application 111 can issue an authentication code,certificate, and/or a signup code that allows a user to generate atemporary virtual identity in the social networking system that isassociated with the event.

In other embodiments, the temporary virtual identity application 111 canbe executed by the provider of a social networking system, and theauthentication module 121 can authenticate the attendance of a user at aparticular event based on a geographic location of the user. As notedabove, a client 107 may possess location aware capabilities, such as aglobal positioning system (GPS) capability, assisted GPS, cellulartriangulation, cell identification, enhanced cell identification,network based location, IP location finding, other satellite locationcompatible systems, etc., and other methods of determining the locationof a client communicating with a computing device 103 over a network 110as can be appreciated. Accordingly, the client 107 can provide itslocation to the temporary virtual identity application 111 and theauthentication module 121, which can verify whether the user is locatedin or around the geographic location of a particular event for which theuser desires a temporary virtual identity. As a non-limiting example,the authentication module 121 can receive the location of the user on aclient 107, and as the geographic location of a particular event can beknown or determined, the authentication module 121 can verify whetherthe user is in the geographic vicinity of an event during a particulartime period during which the event is scheduled to occur.

Accordingly, the authentication module 121 can facilitate providingtemporary virtual identities to a user that are strong, in that they areauthenticated based on various factors such as time and location, butthat also provide some form of anonymity, in that the temporary virtualidentity can be separate from a permanent identity of a user in a socialnetworking system. Because the authentication module 121 authenticates atemporary virtual identity based upon an event, geographic location, andother attributes as can be appreciated, a user associated with atemporary virtual identity can locate and/or interact with other usersin a social networking system that are similarly authenticated by anauthentication module 121. In other words, a user can interact withother users of a social networking system who are attending the sameevent or are in a similar geographic location. The temporary virtualidentity can provide a degree of anonymity and the user can interactwith other users in this way without revealing his permanent identity orlinking these other users to his permanent identity.

Upon authentication of a user and the establishing of a temporaryvirtual identity by the authentication module 121, the temporary virtualidentity application 111 can register the temporary virtual identity inthe social networking service 113. The temporary virtual identity can beregistered in the social networking service 113 and linked to apermanent identity of the user in the social networking service 113. Inother words, the temporary virtual identity of the user can be a“sub-identity” of the permanent identity of the user. Accordingly, theuser may interact with other users or publish content in the socialnetworking system through his permanent identity in the socialnetworking system, using the same login credentials associated with thepermanent identity.

In other embodiments, the temporary virtual identity of a user can beregistered in the social networking service 113 as an identity that isseparate from the permanent identity of the user. In this way, aseparate identity can be created in the social networking service 113 asthe temporary virtual identity with which the user may interact withother users or publish content in a social networking system implementedby the social networking service 113.

Because a temporary virtual identity can be, by definition, “temporary”in nature, the temporary virtual identity application 111 can specify apoint in time at which the temporary virtual identity expires from thesocial networking system. As noted above, because a temporary virtualidentity, in one embodiment, can be linked with a particular event, thetemporary virtual identity application 111 can specify that a temporaryvirtual identity expires from the social networking service 113 uponconclusion of the event.

The temporary virtual identity application 111 further includes apublishing module 123, which facilitates the publishing of content in asocial networking system implemented by the social networking service113. The content published in the social networking system can beassociated with the temporary virtual identity, the permanent identityof a user, or both a temporary virtual identity and a permanent identityassociated with a user. Accordingly, a user on a client 107 canestablish a temporary virtual identity with the temporary virtualidentity application 111 as described above, which can be authenticatedwith the authentication module 121, and then publish content in a socialnetworking system, which can be managed by the publishing module 123executed by the temporary virtual identity application 111. It shouldalso be appreciated that in some embodiments, as a temporary virtualidentity can be registered within a social networking service 113 onbehalf of a user, a user on a client 107 may bypass the publishingmodule 123 in order to publish content within the social networkingservice 113 under a temporary virtual identity. In yet otherembodiments, the publishing module 123 can be executed within the socialnetworking service 113 and facilitate publishing of content under apermanent identity and/or a temporary virtual identity.

In the non-limiting example of a user establishing and registering atemporary virtual identity that is associated with a particular event,the user can then manipulate a user interface on the client 107 topublish content in the social networking system under the temporaryvirtual identity. In the example described above of a temporary virtualidentity “John@BigConference” that is associated with a permanentidentity “JohnDoe,” the user can publish content under the“John@BigConference” temporary virtual identity during his attendance atthe event associated with the temporary virtual identity. Accordingly,the publishing module 123 can receive content from a user on a client107 that the user wishes to publish under a temporary virtual identityin the social networking service 113 and publish the content in thesocial networking service 113. It should be appreciated that in someembodiments, the publishing module 123 can be executed in the socialnetworking service 113 and the user can interact directly with thesocial networking service 113 in order to publish content under atemporary virtual identity.

Because the publishing module 123 facilitates the publishing of contentunder a temporary virtual identity, the user can publish content underthe temporary virtual identity that is either separate from or linked toa permanent identity of the user. In this way, in one example, the usercan interact with other users who may be attending the same event, andthe various users having temporary virtual identities authenticated bythe authentication module 121 who can communicate at the event viacontent published under their corresponding temporary virtualidentities. In another embodiment, a user can separate content publishedin the social networking service 113 under a temporary virtual identitythat is related to the event from content published under a permanentidentity of the user in the social networking system, as the user maydesire not to publish content associated with the event to users in thesocial networking system linked to the permanent identity but not thetemporary virtual identity of the user. In other embodiments, the usermay desire to publish content that is associated with a temporaryvirtual identity and a permanent identity. In this way, the user caninteract with users associated with his permanent identity as well asthose attending a particular event, in a particular geographic location,etc.

Referring next to FIG. 2, which depicts flow of data between thecomponents of the networked environment of FIG. 1 according to variousembodiments of the disclosure. In the depicted embodiment, a user on aclient 107 (FIG. 1) submits a request to generate a temporary virtualidentity to the temporary virtual identity application 111 (FIG. 1). Therequest can include a desired temporary virtual identity as well asvarious parameters with which authentication of the user can becompleted. In the depicted embodiment, the request can include logincredentials of the user that are associated with a permanent identity ina social networking system. In other embodiments, the request caninclude time and date information if a temporary virtual identityrequires authentication with a particular period of time. The requestcan also include location information regarding the location of the userand/or the client 107 so that the location of the user can beauthenticated. As noted above, the location of the user and/or theclient 107 can be authenticated based on location data provided by theclient 107 and/or other data such as, but not limited to, an IP addressof the client 107, cellular tower information, etc.

Depending on the temporary virtual identity requested by a user of thesocial networking system, various forms of authentication can berequired. As a non-limiting example, a user may request a temporaryvirtual identity that requires no authentication. In other embodiments,a user may request a temporary virtual identity that is linked to aspecific event, time period, geographic location, etc. Accordingly, thevirtual identity application 111 can provide the request received fromthe client 107 to the authentication module 121 (FIG. 1). Theauthentication module 121 can authenticate parameters of the request, asdescribed above, to determine whether the user requesting a temporaryvirtual identity should be granted such an identity by the temporaryvirtual authentication application 111.

Additionally, the authentication module 121 can also authenticate thecredentials of the user in a social networking system implemented by thesocial networking service 113 (FIG. 1). Accordingly, the authenticationmodule 121 can authenticate the credentials of a user in the socialnetworking service 113. The social networking service 113 can transmit adata structure representing the permanent identity of the user in thesocial networking system to the authentication module 121. Accordingly,the temporary virtual identity application 111 can then generate orestablish a temporary virtual identity for the user.

Referring next to FIG. 3, shown is an alternative depiction showingsubsequent data flow between the various components of the networkedenvironment of FIG. 1 according to various embodiments of thedisclosure. In FIG. 3, a user on a client 107 (FIG. 1) has beenauthenticated such that the authentication module 121 (FIG. 1) andtemporary virtual identity application 111 (FIG. 1) have determined thatthe user can be granted a temporary virtual identity. Accordingly, thetemporary virtual identity application 111 registers the temporaryvirtual identity in the social networking system implemented by thesocial networking service 113 (FIG. 1).

The social networking service 113 can transmit a data structure or otherrepresentation of the registered temporary virtual identity to thetemporary virtual identity application 111. The temporary virtualidentity application 111 can then transmit the temporary virtualidentity to the client 107 so that the user can interact with otherusers in the social networking system by using the temporary virtualidentity. As depicted, the temporary virtual identity can be linked in apermanent identity of the user in the social networking system andprovided to a client 107 associated with the user. In this way, the useron a client 107 can interact with other users in the social networkingsystem using the temporary virtual identity or the permanent identityassociated with the user in the social networking service 113.

Next, reference is made to FIG. 4, which depicts data flow amongelements of the networked environment 100 (FIG. 1) of FIG. 1 accordingto various embodiments of the disclosure. FIG. 4 depicts one example ofa user on a client 107 (FIG. 1) publishing content in a socialnetworking system implemented by the social networking service 113 (FIG.1). In the depicted example, a user on a client 107 can publish contentin the social networking service 113 using a temporary virtual identity.As one non-limiting example, the user can publish content in amicroblogging service implemented by the social networking service 113.Accordingly, the client 107 transmits the content to the temporaryvirtual identity application 111. The client 107 can then transmit thecontent with a data structure or other designation that the content isintended to be published under a temporary virtual identity in thesocial networking service 113. The publishing module 125 (FIG. 1) of thetemporary virtual identity application 111 can then cause the content tobe published under the temporary virtual identity of the user in thesocial networking service 113.

Referring next to FIG. 5, shown is a flowchart that provides one exampleof the operation of a portion of the temporary virtual identityapplication 111 (FIG. 1) according to various embodiments. It isunderstood that the flowchart of FIG. 5 provides merely an example ofthe many different types of functional arrangements that may be employedto implement the operation of the portion of the temporary virtualidentity application 111 as described herein. As an alternative, theflowchart of FIG. 5 may be viewed as depicting an example of steps of amethod implemented in the computing device 103 (FIG. 1) according to oneor more embodiments. First, in box 501, a request to generate atemporary virtual identity in a social networking system is received.Next, in box 503, a permanent identity of the user in the socialnetworking system is retrieved.

In box 505, the identity of the user is authenticated by theauthentication module 123 of the temporary virtual identity application111. Additionally, the authentication module 123 of the temporaryvirtual identity application 111 authenticates other parameters that maybe required to authenticate depending on the temporary virtual identityrequested by the user. In box 507, the temporary virtual identity isregistered in the social networking system. In box 509, content ispublished using the temporary virtual identity in the social networkingsystem.

With reference to FIG. 6, shown is a schematic block diagram of thecomputing device 103 (FIG. 1) according to an embodiment of the presentdisclosure. The computing device 103 includes at least one processorcircuit, for example, having a processor 603 and a memory 606, both ofwhich are coupled to a local interface 609. To this end, the computingdevice 103 may comprise, for example, at least one server computer orlike device. The local interface 609 may comprise, for example, a databus with an accompanying address/control bus or other bus structure ascan be appreciated.

Stored in the memory 606 are both data and several components that areexecutable by the processor 603. In particular, stored in the memory 606and executable by the processor 603 are a temporary virtual identityapplication 111 (FIG. 1), and potentially other applications. Inaddition, an operating system may be stored in the memory 606 andexecutable by the processor 603.

It is understood that there may be other applications that are stored inthe memory 606 and are executable by the processors 603 as can beappreciated. Where any component discussed herein is implemented in theform of software, any one of a number of programming languages may beemployed such as, for example, C, C++, C#, Objective C, Java, JavaScript, Perl, PHP, Visual Basic, Python, Ruby, Delphi, Flash, or otherprogramming languages.

A number of software components are stored in the memory 606 and areexecutable by the processor 603. In this respect, the term “executable”means a program file that is in a form that can ultimately be run by theprocessor 603. Examples of executable programs may be, for example, acompiled program that can be translated into machine code in a formatthat can be loaded into a random access portion of the memory 606 andrun by the processor 603, source code that may be expressed in properformat such as object code that is capable of being loaded into a randomaccess portion of the memory 606 and executed by the processor 603, orsource code that may be interpreted by another executable program togenerate instructions in a random access portion of the memory 606 to beexecuted by the processor 603, etc. An executable program may be storedin any portion or component of the memory 606 including, for example,random access memory (RAM), read-only memory (ROM), hard drive,solid-state drive, USB flash drive, memory card, optical disc such ascompact disc (CD) or digital versatile disc (DVD), floppy disk, magnetictape, or other memory components.

The memory 606 is defined herein as including both volatile andnonvolatile memory and data storage components. Volatile components arethose that do not retain data values upon loss of power. Nonvolatilecomponents are those that retain data upon a loss of power. Thus, thememory 606 may comprise, for example, random access memory (RAM),read-only memory (ROM), hard disk drives, solid-state drives, USB flashdrives, memory cards accessed via a memory card reader, floppy disksaccessed via an associated floppy disk drive, optical discs accessed viaan optical disc drive, magnetic tapes accessed via an appropriate tapedrive, and/or other memory components, or a combination of any two ormore of these memory components. In addition, the RAM may comprise, forexample, static random access memory (SRAM), dynamic random accessmemory (DRAM), or magnetic random access memory (MRAM) and other suchdevices. The ROM may comprise, for example, a programmable read-onlymemory (PROM), an erasable programmable read-only memory (EPROM), anelectrically erasable programmable read-only memory (EEPROM), or otherlike memory device.

Also, the processor 603 may represent multiple processors 603 and thememory 606 may represent multiple memories 606 that operate in parallelprocessing circuits, respectively. In such a case, the local interface609 may be an appropriate network 110 (FIG. 1) that facilitatescommunication between any two of the multiple processors 603, betweenany processor 603 and any of the memories 606, or between any two of thememories 606, etc. The local interface 609 may comprise additionalsystems designed to coordinate this communication, including, forexample, performing load balancing. The processor 603 may be ofelectrical or of some other available construction.

Although temporary virtual identity application 111, and other varioussystems described herein may be embodied in software or code executed bygeneral purpose hardware as discussed above, as an alternative the samemay also be embodied in dedicated hardware or a combination ofsoftware/general purpose hardware and dedicated hardware. If embodied indedicated hardware, each can be implemented as a circuit or statemachine that employs any one of or a combination of a number oftechnologies. These technologies may include, but are not limited to,discrete logic circuits having logic gates for implementing variouslogic functions upon an application of one or more data signals,application specific integrated circuits having appropriate logic gates,or other components, etc. Such technologies are generally well known bythose skilled in the art and, consequently, are not described in detailherein.

The flowchart of FIG. 5 shows the functionality and operation of animplementation of portions of the temporary virtual identity application111. If embodied in software, each block may represent a module,segment, or portion of code that comprises program instructions toimplement the specified logical function(s). The program instructionsmay be embodied in the form of source code that comprises human-readablestatements written in a programming language or machine code thatcomprises numerical instructions recognizable by a suitable executionsystem such as a processor 603 in a computer system or other system. Themachine code may be converted from the source code, etc. If embodied inhardware, each block may represent a circuit or a number ofinterconnected circuits to implement the specified logical function(s).

Although the flowchart of FIG. 5 shows a specific order of execution, itis understood that the order of execution may differ from that which isdepicted. For example, the order of execution of two or more blocks maybe scrambled relative to the order shown. Also, two or more blocks shownin succession in FIG. 5 may be executed concurrently or with partialconcurrence. In addition, any number of counters, state variables,warning semaphores, or messages might be added to the logical flowdescribed herein, for purposes of enhanced utility, accounting,performance measurement, or providing troubleshooting aids, etc. It isunderstood that all such variations are within the scope of the presentdisclosure.

Also, any logic or application described herein, including temporaryvirtual identity application 111, that comprises software or code can beembodied in any non-transitory computer-readable medium for use by or inconnection with an instruction execution system such as, for example, aprocessor 603 in a computer system or other system. In this sense, thelogic may comprise, for example, statements including instructions anddeclarations that can be fetched from the computer-readable medium andexecuted by the instruction execution system. In the context of thepresent disclosure, a “computer-readable medium” can be any medium thatcan contain, store, or maintain the logic or application describedherein for use by or in connection with the instruction executionsystem. The computer-readable medium can comprise any one of manyphysical media such as, for example, electronic, magnetic, optical,electromagnetic, infrared, or semiconductor media. More specificexamples of a suitable computer-readable medium would include, but arenot limited to, magnetic tapes, magnetic floppy diskettes, magnetic harddrives, memory cards, solid-state drives, USB flash drives, or opticaldiscs. Also, the computer-readable medium may be a random access memory(RAM) including, for example, static random access memory (SRAM) anddynamic random access memory (DRAM), or magnetic random access memory(MRAM). In addition, the computer-readable medium may be a read-onlymemory (ROM), a programmable read-only memory (PROM), an erasableprogrammable read-only memory (EPROM), an electrically erasableprogrammable read-only memory (EEPROM), or other type of memory device.

It should be emphasized that the above-described embodiments of thepresent disclosure are merely possible examples of implementations setforth for a clear understanding of the principles of the disclosure.Many variations and modifications may be made to the above-describedembodiment(s) without departing substantially from the spirit andprinciples of the disclosure. All such modifications and variations areintended to be included herein within the scope of this disclosure andprotected by the following claims.

Therefore, the following is claimed:
 1. A non-transitorycomputer-readable medium, comprising: a program executable in acomputing device, the program configured to cause the computing deviceto: retrieve an identity associated with a user in a social networkingservice; authenticate the identity associated with the user in thesocial networking service by verifying login credentials provided in arequest from a client with login credentials in the social networkingservice; authenticate at least one parameter associated with the user inaddition to authentication of the identity, the at least one parameterbeing a requirement for issuing the user a temporary virtual identity inthe social networking service, the at least one parameter comprising atleast one of: a geographic location of the user, a time period, orattendance of the user at an event; generate the temporary virtualidentity associated with the user within the social networking service;register the temporary virtual identity in the social networkingservice; associate the temporary virtual identity with the identity ofthe user in the social networking service; publish, in the socialnetworking service, content associated with the user under the temporaryvirtual identity, the published content associated with at least one ofthe time period, the geographic location, or the event, the publishedcontent further being disassociated from the identity associated withthe user in the social networking service; and expire the temporaryvirtual identity by deleting the temporary virtual identity from thesocial networking service after a predetermined period of time.
 2. Asystem, comprising: at least one computing device; and a temporaryvirtual identity application executable in the at least one computingdevice, the temporary virtual identity application comprising: logicthat authenticates an identity within a social networking service, theidentity being associated with a user; logic that authenticates at leastone parameter associated with the user in addition to authentication ofthe identity, the at least one parameter being a requirement for issuingthe user a temporary virtual identity, the at least one parametercomprising at least one of: a time period, a location, or attendance ofthe user at an event and the temporary virtual identity being associatedwith the at least one parameter and the identity within the socialnetworking service; logic that generates the temporary virtual identitywithin the social networking service, the temporary virtual identitybeing associated with the user; and logic that registers the temporaryvirtual identity in the social networking service.
 3. The system ofclaim 2, further comprising: logic that retrieves an identity associatedwith the user in the social networking service; wherein the identityassociated with the user is retrieved from the social networkingservice.
 4. The system of claim 3, further comprising logic thatpublishes, in the social networking service, content associated with theuser under the temporary virtual identity, the published contentassociated with at least one of a time period or a location.
 5. Thesystem of claim 4, wherein the logic that authenticates the identitywith the social networking service further comprises logic that verifieslogin credentials provided in a request from a client with logincredentials in the social networking service.
 6. The system of claim 4,wherein the logic that authenticates the at least one parameter furthercomprises: logic that issues an authentication certificate to the user;and logic that verifies the authentication certificate when thetemporary virtual identity is registered.
 7. The system of claim 6,wherein the temporary virtual identity is associated with an eventoccurring in the location and the time period.
 8. The system of claim 7,wherein the logic that issues the authentication certificate furthercomprises logic that verifies the attendance of the user at the event.9. The system of claim 3, wherein the logic that establishes thetemporary virtual identity further comprises the logic that detects ageographic location of the user from a mobile device of the user. 10.The system of claim 9, wherein the logic that detects the geographiclocation of the user further comprises logic that accesses a globalpositioning system (GPS) capability of the mobile device.
 11. The systemof claim 9, wherein the logic that establishes the temporary virtualidentity further comprises logic that detects a network location of theuser based at least upon an internet protocol (IP) address from whichthe mobile device is communicating.
 12. The system of claim 3, whereinthe logic that registers the temporary virtual identity furthercomprises logic that associates the temporary virtual identity with theidentity of the user in the social networking service.
 13. The system ofclaim 4, wherein the logic that publishes content associated with theuser under the temporary virtual identity further comprises logic thatmasks a relationship between the temporary virtual identity and theidentity of the user.
 14. The system of claim 3, further comprisinglogic that expires the temporary virtual identity after a predeterminedperiod of time.
 15. A computer-implemented method, comprisingretrieving, in at least one computing device, an identity associatedwith a user in a social networking service; establishing, in the atleast one computing device, a temporary virtual identity associated withthe user within the social networking service, the temporary virtualidentity associated with at least one of: a time period, a location orattendance of the user at an event; registering the temporary virtualidentity in the social networking service; and publishing, in the socialnetworking service, content associated with the user under the temporaryvirtual identity, the published content associated with at least one of:the time period, the location or the event, the content further beingdisassociated from the identity of the user in the social networkingservice.
 16. The computer-implemented method of claim 15, furthercomprising authenticating the temporary virtual identity byauthenticating at least one of: an identity of the user, the time periodor the location.
 17. The computer-implemented method of claim 15,wherein the event is associated with the location and the time period.18. The computer-implemented method of claim 17, wherein authenticatingthe temporary virtual identity further comprises: issuing anauthentication certificate to the user; and verifying the authenticationcertificate when the temporary virtual identity is registered.
 19. Thecomputer-implemented method of claim 18, wherein issuing theauthentication certificate further comprises verifying the attendance ofthe user at the event.
 20. The computer-implemented method of claim 18,wherein issuing the authentication certificate further comprises issuingthe user an authentication code; and registering the temporary virtualidentity with the social networking service further comprises verifyingthe authentication code.
 21. The computer-implemented method of claim15, wherein establishing the temporary virtual identity furthercomprises detecting a geographic location of the user from a mobiledevice of the user.
 22. The computer-implemented method of claim 21,wherein detecting the geographic location of the user further comprisesaccess a global positioning system (GPS) capability of the mobiledevice.
 23. The computer-implemented method of claim 15, whereinestablishing the temporary virtual identity further comprises detectinga network location of the user based at least upon an internet protocol(IP) address from which the user is communicating.
 24. Thecomputer-implemented method of claim 15, wherein registering thetemporary virtual identity further comprises associating the temporaryvirtual identity with the identity of the user in the social networkingservice.
 25. The computer-implemented method of claim 15, whereinpublishing content associated with the user under the temporary virtualidentity further comprises masking a relationship between the temporaryvirtual identity and the identity of the user.
 26. Thecomputer-implemented method of claim 15, further comprising expiring thetemporary virtual identity after a predetermined period of time.