Systems and methods for monitoring information shared via communication services
First Claim
1. A computer-implemented method for monitoring information shared via communication services, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- providing, by the computing device, a security service capable of monitoring information shared via a plurality of communication services, wherein the security service is independent of the plurality of communication services;
identifying, by the computing device, a user of the plurality of communication services that has registered for the security service;
maintaining, by the computing device, a database that identifies potentially sensitive information associated with the user by;
retrieving information that identifies an association between the user and an additional user;
enabling the user to identify information that is considered potentially sensitive with respect to the additional user across the plurality of communication services such that the user is unable to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services;
storing the information that is considered potentially sensitive with respect to the additional user in the database to facilitate determining whether the user is attempting to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services;
monitoring, by the computing device, information shared by the user via at least one of the plurality of communication services by;
identifying a profile of the user provided by the at least one of the plurality of communication services;
detecting an attempt by the additional user to access the user'"'"'s profile via the at least one of the plurality of communication services;
comparing information shared by the user via the user'"'"'s profile with the potentially sensitive information identified in the database;
determining, based on the comparison, that at least a portion of the information shared by the user via the user'"'"'s profile is considered potentially sensitive with respect to the additional user;
preventing, by the computing device, the additional user from accessing the portion of information that is considered potentially sensitive with respect to the additional user via the user'"'"'s profile.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method may include providing a security service capable of monitoring information shared by users of at least one communication service. The computer-implemented method may also include identifying a user of the communication service that has registered for the security service and maintaining a database that identifies potentially sensitive information. The computer-implemented method may further include determining, while monitoring information shared by the user via the communication service, that the user is attempting to share information that is potentially sensitive. In addition, the computer-implemented method may notify the user of the user'"'"'s attempt to share potentially sensitive information via the communication service. Various other methods, systems, and computer-readable media are also disclosed.
39 Citations
16 Claims
-
1. A computer-implemented method for monitoring information shared via communication services, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
providing, by the computing device, a security service capable of monitoring information shared via a plurality of communication services, wherein the security service is independent of the plurality of communication services; identifying, by the computing device, a user of the plurality of communication services that has registered for the security service; maintaining, by the computing device, a database that identifies potentially sensitive information associated with the user by; retrieving information that identifies an association between the user and an additional user; enabling the user to identify information that is considered potentially sensitive with respect to the additional user across the plurality of communication services such that the user is unable to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services; storing the information that is considered potentially sensitive with respect to the additional user in the database to facilitate determining whether the user is attempting to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services; monitoring, by the computing device, information shared by the user via at least one of the plurality of communication services by; identifying a profile of the user provided by the at least one of the plurality of communication services; detecting an attempt by the additional user to access the user'"'"'s profile via the at least one of the plurality of communication services; comparing information shared by the user via the user'"'"'s profile with the potentially sensitive information identified in the database; determining, based on the comparison, that at least a portion of the information shared by the user via the user'"'"'s profile is considered potentially sensitive with respect to the additional user; preventing, by the computing device, the additional user from accessing the portion of information that is considered potentially sensitive with respect to the additional user via the user'"'"'s profile. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for monitoring information shared via communication services, the system comprising:
-
at least one processor; a provisioning module programmed to direct the processor to; provide a security service capable of monitoring information shared via a plurality of communication services, wherein the security service is independent of the plurality of communication services; identify a user of the plurality of communication services that has registered for the security service; maintain a database that identifies potentially sensitive information associated with the user by; retrieving information that identifies an association between the user and an additional user; enabling the user to identify information that is considered potentially sensitive with respect to the additional user across the plurality of communication services such that the user is unable to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services; storing the information that is considered potentially sensitive with respect to the additional user in the database to facilitate determining whether the user is attempting to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services; a monitoring module programmed to direct the processor to; monitor information shared by the user via at least one of the plurality of communication services by; identifying a profile of the user provided by the at least one of the plurality of communication services; detecting an attempt by the additional user to access the user'"'"'s profile via the at least one of the plurality of communication services; comparing information shared by the user via the user'"'"'s profile with the potentially sensitive information identified in the database; determining, based on the comparison, that at least a portion of the information shared by the user via the user'"'"'s profile is considered potentially sensitive with respect to the additional user; prevent the additional user from accessing the portion of information that is considered potentially sensitive with respect to the additional user via the user'"'"'s profile. - View Dependent Claims (14, 15)
-
-
16. A non-transitory computer-readable-storage medium comprising computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
provide a security service capable of monitoring information shared via a plurality of communication services, wherein the security service is independent of the plurality of communication services; identify a user of the plurality of communication services that has registered for the security service; maintain a database that identifies potentially sensitive information associated with the user by; retrieving information that identifies an association between the user and an additional user; enabling the user to identify information that is considered potentially sensitive with respect to the additional user across the plurality of communication services such that the user is unable to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services; storing the information that is considered potentially sensitive with respect to the additional user in the database to facilitate determining whether the user is attempting to share the information that is considered potentially sensitive with the additional user via any of the plurality of communication services; monitor information shared by the user via at least one of the plurality of communication services by; identifying a profile of the user provided by the at least one of the plurality of communication services; detecting an attempt by the additional user to access the user'"'"'s profile via the at least one of the plurality of communication services; comparing information shared by the user via the user'"'"'s profile with the potentially sensitive information identified in the database; determining, based on the comparison, that at least a portion of the information shared by the user via the user'"'"'s profile is considered potentially sensitive with respect to the additional user; prevent the additional user from accessing the portion of information that is potentially sensitive with respect to the additional user via the user'"'"'s profile.
-
Specification