SYSTEMS AND METHODS FOR SECURING SOCIAL MEDIA FOR USERS AND BUSINESSES AND REWARDING FOR ENHANCING SECURITY
First Claim
1. A method for securing information from unintentional publication on social media sites, comprising:
- receiving, at a social media server, a request to publish information;
analyzing the request pursuant to one or more pre-configured rules; and
performing an action with respect to the request in accordance with the one or more pre-configured rules.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed “social media.” Recent trends have shown that information posted to social media may cause tremendous damage to individuals and other entities. This includes information that was posted deliberately or unintentionally, including social security numbers, financial data and other sensitive information. Further, information that previously may have been viewed as innocuous, such as location data, has caused harm on certain occasions and may need to be protected. The disclosed system provides a novel method of screening, identifying, and preventing certain information from being posted on social media and other public locations. In addition, the disclosed system and method improves security by motivating people to use security software by offering rewards for its use.
110 Citations
20 Claims
-
1. A method for securing information from unintentional publication on social media sites, comprising:
-
receiving, at a social media server, a request to publish information; analyzing the request pursuant to one or more pre-configured rules; and performing an action with respect to the request in accordance with the one or more pre-configured rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for protecting users from unintentional disclosure of information on social media sites, comprising:
-
detecting a user'"'"'s attempt to perform a social media action; analyzing the user'"'"'s attempt pursuant to one or more pre-configured rules; and responding to the user'"'"'s attempt in accordance with the one or more pre-configured rules. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for providing information security services to a user of social media, comprising:
-
creating a user profile based on information supplied about a user; searching one or more social media websites for content relating to the user based on the created user profile; analyzing the content relating to the user available on the one or more social media websites; creating a database object; and populating the database object with data obtained by analyzing the content relating to the user available on the one or more social media websites. - View Dependent Claims (17, 18, 19, 20)
-
Specification