Abstract:
A user of a social networking system performs an action with a device associated with a terminal, and based on the action, the terminal displays a visual representation of machine-readable code (e.g., a QR code) that encodes information about the action or a link to a source for obtaining such information. The user captures the machine-readable code with a mobile device, and an application on the device obtains the information describing the action from the machine-readable, associates the information with the user's identifier and communicates the information and user identifier to the social networking system. Using the information describing the action, the social networking system may then publish an action, add to the user's user profile, and/or perform other tasks based on the received information.
Abstract:
User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.
Abstract:
In particular embodiments, a method comprises accessing, by one or more computing systems associated with a social-networking system, a structured document of a network application, the structured document comprising structural information and content comprising one or more embedded scripts, resources, or identifiers for the resources. The method further comprises processing the structured document to generate a model representation of the structured document, executing at least some of the content of the structured document and logging multiple snapshots of the model representation of the structured document as the model representation is generated in response to one or more interactions initiated by execution of the content. The method further comprises creating a behavior model of the network application based on the multiple snapshots of the model representation of the structured document and determining, based on the behavior model, compliance by the network application with one or more requirements of the social-networking system.
Abstract:
User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.
Abstract:
In one embodiment, a method includes one or more computing devices of a proxy server, in response to receiving a message from a token reader, generating a federated session token in relation to the message and sending a request for federated access to social-networking information of a first user of a social-networking system, where the request contains the federated session token. The method also includes one or more computing devices of the social-networking system, in response to receiving the request for federated access, validating the request based at least in part on one or more configuration settings associated with the first user and establishing a federated access session with the proxy server. The method also includes one or more computing devices of the proxy server, retrieving, by the federated access session, the social-networking information of the first user from the social-networking system.
Abstract:
In one embodiment, a method includes one or more computing devices of a proxy server, in response to receiving a message from a token reader, generating a federated session token in relation to the message and sending a request for federated access to social-networking information of a first user of a social-networking system, where the request contains the federated session token. The method also includes one or more computing devices of the social-networking system, in response to receiving the request for federated access, validating the request based at least in part on one or more configuration settings associated with the first user and establishing a federated access session with the proxy server. The method also includes one or more computing devices of the proxy server, retrieving, by the federated access session, the social-networking information of the first user from the social-networking system.