- From: Timothy Holborn <timothy.holborn@gmail.com>
- Date: Thu, 06 Aug 2015 22:56:38 +0000
- To: Sandro Hawke <sandro@w3.org>, W3C Credentials Community Group <public-credentials@w3.org>, public-rww <public-rww@w3.org>, "public-webid@w3.org" <public-webid@w3.org>
- Message-ID: <CAM1Sok1ZYH5e3O66BggmO6JBGp84zNLiNH6fvyMJ5ibZ4tLR=Q@mail.gmail.com>
Oh, And re: putting genies back into bottles... Block chain based accountability; not sure how to take a transaction off the ledger. credentials based: ask the authority to delete, from my understanding... Cheers. On Fri, 7 Aug 2015 at 8:50 am, Timothy Holborn <timothy.holborn@gmail.com> wrote: > So, > > Top info was news article about a patent, abstract of patent was linked to > in news article. > > I'm Australian. Are you not allowed to read about knowledge in the U.S.? > > I had no idea there was a problem in that area. Apologies... > > Feel welcome to remove from list. > > Sending information about an intellectual property claim that states > ownership of concepts, within the field of auth and social relations seems > absolutely reasonable to me... > > I have no awareness of the fears embodied within the breach of best > practices, and certainly don't like that the first email from you to me, > being scornful. > > Tim. > > On Fri, 7 Aug 2015 at 1:16 am, Sandro Hawke <sandro@w3.org> wrote: > >> On August 6, 2015 1:03:29 AM EDT, Timothy Holborn < >> timothy.holborn@gmail.com> wrote: >>> >>> Article Appeared [1] on entrepreneur "Someday, Your Facebook Friends May >>> Determine Whether You Get a Loan" >>> >>> Found the patent [2] Abstract is as follows >>> >>> Authorization and authentication based on an individual's social network >>> >>> *Abstract* >>> >>> In particular embodiments, a method includes accessing a graph structure >>> comprising a plurality of nodes and edges where each node represents a >>> user, receiving a request to transmit content related to a first user to a >>> second user, and prohibiting transmission of the content to the second user >>> if the first user and the second user are connected in the graph structure >>> through a series of edges and nodes that comprises an unauthorized node. >>> >>> >>> [1] http://www.entrepreneur.com/article/249229 >>> [2] >>> http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.htm&r=4&p=1&f=G&l=50&d=PTXT&S1=((%22facebook%22.ASNM.)+AND+%40PD%3E%3D20150804%3C%3D20151231)&OS=AN/%22facebook%22+AND+ISD/8/4/2015-%3E12/31/2015&RS=(AN/%22facebook%22+AND+ISD/20150804-%3E20151231) >>> >>> >>> >> I haven't read this, but from the subject it looks like information about >> a patent. >> >> It is extremely bad practice to send people unsolicited information about >> a patent. >> >> I'll dig up the explanation and see if we can delete this from the >> archives later. >> >> >> - Sandro >> >>
Received on Thursday, 6 August 2015 22:57:15 UTC