W3C home > Mailing lists > Public > public-credentials@w3.org > August 2015

Re: No discussion of patents, was Re: Social AUTH Patent

From: Timothy Holborn <timothy.holborn@gmail.com>
Date: Thu, 06 Aug 2015 22:56:38 +0000
Message-ID: <CAM1Sok1ZYH5e3O66BggmO6JBGp84zNLiNH6fvyMJ5ibZ4tLR=Q@mail.gmail.com>
To: Sandro Hawke <sandro@w3.org>, W3C Credentials Community Group <public-credentials@w3.org>, public-rww <public-rww@w3.org>, "public-webid@w3.org" <public-webid@w3.org>
Oh,

And re: putting genies back into bottles...

Block chain based accountability; not sure how to take a transaction off
the ledger.

credentials based: ask the authority to delete, from my understanding...

Cheers.

On Fri, 7 Aug 2015 at 8:50 am, Timothy Holborn <timothy.holborn@gmail.com>
wrote:

> So,
>
> Top info was news article about a patent, abstract of patent was linked to
> in news article.
>
> I'm Australian. Are you not allowed to read about knowledge in the U.S.?
>
> I had no idea there was a problem in that area. Apologies...
>
> Feel welcome to remove from list.
>
> Sending information about an intellectual property claim that states
> ownership of concepts, within the field of auth and social relations seems
> absolutely reasonable to me...
>
> I have no awareness of the fears embodied within the breach of best
> practices, and certainly don't like that the first email from you to me,
> being scornful.
>
> Tim.
>
> On Fri, 7 Aug 2015 at 1:16 am, Sandro Hawke <sandro@w3.org> wrote:
>
>> On August 6, 2015 1:03:29 AM EDT, Timothy Holborn <
>> timothy.holborn@gmail.com> wrote:
>>>
>>> Article Appeared [1] on entrepreneur "Someday, Your Facebook Friends May
>>> Determine Whether You Get a Loan"
>>>
>>> Found the patent [2] Abstract is as follows
>>>
>>> Authorization and authentication based on an individual's social network
>>>
>>> *Abstract*
>>>
>>> In particular embodiments, a method includes accessing a graph structure
>>> comprising a plurality of nodes and edges where each node represents a
>>> user, receiving a request to transmit content related to a first user to a
>>> second user, and prohibiting transmission of the content to the second user
>>> if the first user and the second user are connected in the graph structure
>>> through a series of edges and nodes that comprises an unauthorized node.
>>>
>>>
>>> [1] http://www.entrepreneur.com/article/249229
>>> [2]
>>> http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.htm&r=4&p=1&f=G&l=50&d=PTXT&S1=((%22facebook%22.ASNM.)+AND+%40PD%3E%3D20150804%3C%3D20151231)&OS=AN/%22facebook%22+AND+ISD/8/4/2015-%3E12/31/2015&RS=(AN/%22facebook%22+AND+ISD/20150804-%3E20151231)
>>>
>>>
>>>
>> I haven't read this, but from the subject it looks like information about
>> a patent.
>>
>> It is extremely bad practice to send people unsolicited information about
>> a patent.
>>
>> I'll dig up the explanation and see if we can delete this from the
>> archives later.
>>
>>
>> - Sandro
>>
>>
Received on Thursday, 6 August 2015 22:57:15 UTC

This archive was generated by hypermail 2.3.1 : Wednesday, 11 July 2018 21:19:24 UTC