×

Social network security monitoring

  • US 10,491,623 B2
  • Filed: 01/09/2017
  • Issued: 11/26/2019
  • Est. Priority Date: 12/11/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing risk assessment data comprising:

  • receiving, a security analysis module and from a user device of one or more employees of a company, authorization to access security data, wherein the security data is private data that controls access to one or more social network profiles of the one or more employees of the company;

    accessing, by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of the company;

    determining, by the security analysis module, using a scoring algorithm, a security risk score for the company based on evaluating the security data associated with the one or more social network profiles of one or more employees of a company;

    providing the determined security risk score to a user device of an entity associated with the company;

    monitoring, on a continuous basis by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of a company for changes to the security data that alter a level of security to access the one or more social network profiles of the one or more employees of the company;

    updating, by the security analysis module, the security risk score for the company based on identifying changes to the security data associated with the one or more social network profiles of the one or more employees of the company;

    comparing, by the security analysis module, the updated security risk score to a risk score threshold;

    generating, by the security analysis module, an alert based on the security risk score exceeding the risk score threshold;

    providing, by the security analysis module, the alert to the user device of the employee of the company associated with the changes to the security data;

    storing, for each of the updated security risk scores, the updated security risk score, a timestamp, the risk score threshold, and a reason for generating the updated security risk score;

    generating, by the security analysis module, a historical list of security risk scores based on the stored updated security risk scores; and

    providing the company access to the historical list of security risk scores via a social protection tool platform.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×