Social network scanning
First Claim
Patent Images
1. A method comprising:
- scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with a social entity;
wherein, scanning data is performed on a continuous basis, without user initiation;
determining one or more characteristics of the identified data;
generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic;
storing one or more references to the identified data in one or more databases that are accessible to a security analysis engine;
algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references are references to characteristics of identified data that have been assigned a level of risk, and wherein the one or more known references are stored in the one or more databases accessible to the security analysis engine;
determining, a social risk score for the social entity, based on the algorithmic comparison;
comparing the social risk score for the social entity to a social risk threshold;
initiating a security action if the social risk score exceeds the social risk threshold, wherein initiating the security action comprises providing an alert to a user whose profile is spoofed by the social entity.
12 Assignments
0 Petitions
Accused Products
Abstract
A method includes identifying data on a social network that is associated with a social entity, and determining one or more characteristics of the identified data. A reference to the identified data is generated for each of the one or more characteristic and the one or more references to the identified data is stored in one or more databases that are accessible to a security analysis engine.
-
Citations
18 Claims
-
1. A method comprising:
-
scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with a social entity; wherein, scanning data is performed on a continuous basis, without user initiation; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; storing one or more references to the identified data in one or more databases that are accessible to a security analysis engine; algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references are references to characteristics of identified data that have been assigned a level of risk, and wherein the one or more known references are stored in the one or more databases accessible to the security analysis engine; determining, a social risk score for the social entity, based on the algorithmic comparison; comparing the social risk score for the social entity to a social risk threshold; initiating a security action if the social risk score exceeds the social risk threshold, wherein initiating the security action comprises providing an alert to a user whose profile is spoofed by the social entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more processing devices; and one or more non-transitory computer-readable media coupled to the one or more processing devices having instructions stored thereon which, when executed by the one or more processing devices, cause the one or more processing devices to perform operations comprising; scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with a social entity; wherein, scanning data is performed on a continuous basis, without user initiation; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; storing one or more references to the identified data in one or more databases that are accessible to a security analysis engine; algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references are references to characteristics of identified data that have been assigned a level of risk, and wherein the one or more known references are stored in the one or more databases accessible to the security analysis engine; determining, a social risk score for the social entity, based on the algorithmic comparison; comparing the social risk score for the social entity to a social risk threshold; initiating a security action if the social risk score exceeds the social risk threshold, wherein initiating the security action comprises providing an alert to a user whose profile is spoofed by the social entity. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage device encoded with a computer program, the program comprising instructions that when executed by a data processing apparatus cause the data processing apparatus to perform operations comprising:
-
scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with a social entity; wherein, scanning data is performed on a continuous basis, without user initiation; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; storing one or more references to the identified data in one or more databases that are accessible to a security analysis engine; algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references are references to characteristics of identified data that have been assigned a level of risk, and wherein the one or more known references are stored in the one or more databases accessible to the security analysis engine; determining, a social risk score for the social entity, based on the algorithmic comparison; comparing the social risk score for the social entity to a social risk threshold; initiating a security action if the social risk score exceeds the social risk threshold, wherein initiating the security action comprises providing an alert to a user whose profile is spoofed by the social entity. - View Dependent Claims (18)
-
Specification