Online identity management
First Claim
Patent Images
1. A method of providing information to a guardian of a minor regarding activities of the minor, the method comprising:
- receiving information from the guardian identifying one or more events of interest to the guardian;
scanning a plurality of online data sources including at least one social network for information regarding the minor, wherein information regarding the minor includes information provided by the minor and information provided by one or more third-parties that refers to the minor;
determining one or more keywords or patterns of words to search for in the information regarding the minor, wherein presence of the keywords or patterns is indicative of one or more of the identified events;
parsing text portions of the information to identify text matching the one or more keywords or patterns indicative of one or more of the identified events;
scanning image portions of the information to identify objects present in the images matching one or more objects indicative of one or more of the identified events; and
determining a risk score for the minor based on at least a quantity of identified text and identified objects.
3 Assignments
0 Petitions
Accused Products
Abstract
An identity scanner monitors information regarding a target individual on various data sources, such as social networking sites. The information is analyzed to identify risk and/or reward factors that are indicative of risk levels associated with the target'"'"'s privacy, reputation, safety, health, and/or other attributes. Various information regarding the identified risks and/or reward factors identified may be provided to a monitoring individual (e.g., a guardian of the target individual) in various customizable manners and mediums.
380 Citations
12 Claims
-
1. A method of providing information to a guardian of a minor regarding activities of the minor, the method comprising:
-
receiving information from the guardian identifying one or more events of interest to the guardian; scanning a plurality of online data sources including at least one social network for information regarding the minor, wherein information regarding the minor includes information provided by the minor and information provided by one or more third-parties that refers to the minor; determining one or more keywords or patterns of words to search for in the information regarding the minor, wherein presence of the keywords or patterns is indicative of one or more of the identified events; parsing text portions of the information to identify text matching the one or more keywords or patterns indicative of one or more of the identified events; scanning image portions of the information to identify objects present in the images matching one or more objects indicative of one or more of the identified events; and determining a risk score for the minor based on at least a quantity of identified text and identified objects. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of providing real-time information regarding activities of an individual, the method comprising:
-
receiving, from a computing device of a monitoring entity, at least a name of a target individual for which information is desired; periodically accessing or receiving information from one or more social media networks for information regarding the target individual, wherein the information regarding the target individual includes information provided by the target individual and information provided by one or more third-parties that refers to the target individual; analyzing the information regarding the target individual to determine whether any of the information is indicative of a high risk activity; and in response to determining that one or more high risk activities are in the information, initiating transmission of a real-time alert to a computing device of the monitoring entity. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A system for monitoring online activity impacting a user comprising:
-
a memory configured to store computer program instructions; a discovery engine configured to discover one or more social networks in which the user is involved or mentioned; a data extraction engine configured to extract data from the one or more social networks discovered by the discovery engine; an analytics engine configured to interpret the data extracted by the data extraction engine to identify information that may help or hurt the user'"'"'s privacy, reputation or safety; a scoring engine configured to determine a risk score for the user based on at least a number of occurrences of identified information; and a reporting engine configured to provide the identified information and the risk score.
-
Specification