摘要 |
A second user requests access to a wireless access point, such as a WiFi connection, provided by a first user. To determine whether the first user should be provided with access, the second user identifies a chain of trust relationships between the first and second users. The chain of trust relationships is established by determining if, for example, the first user is in an instant messaging buddy list of the second user, or if there is an intermediate user who both trusts the first user and is trusted by the second user. If a chain of trust relationships between the first and second users exists and is not too attenuated, the second user provides the first user with network access.
|