Protecting against suspect social entities
First Claim
Patent Images
1. A method comprising:
- scanning data that is maintained on multiple social networks, wherein scanning data that is maintained on multiple social networks comprises identifying, by one or more processors, data that is associated with a social entity, and wherein scanning data that is maintained on multiple social networks is performed on a continuous basis, without user initiation;
determining one or more characteristics of the identified data;
generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic;
comparing one or more of the generated references to one or more stored references, wherein the one or more stored references are references to one or more characteristics associated with a protected user;
determining, based on an algorithmic comparison of the one or more generated references and the one or more stored references, a profile score for the suspect social entity, wherein determining the profile score comprises identifying a match between one or more of the generated references and one or more of the stored references, wherein the one or more generated references that are compared to the one or more stored references are dynamically determined, being selected from a group of generated references, and wherein the algorithmic comparison comprises;
determining one or more match scores by comparing the one or more generated references to the one or more stored references;
generating a weight for each match score; and
generating a weighted average based on the weighted match scores;
comparing the profile score for the suspect social entity determined by the algorithmic comparison to a threshold;
identifying the suspect social entity as an imposter of the protected social entity if the profile score exceeds the threshold;
monitoring the activity of the identified imposter across the multiple social networks, wherein monitoring the activity of the identified imposter comprises identifying data that is associated with the identified imposter;
determining that the identified data associated with the identified imposter is malicious;
generating an alert; and
providing the alert to the protected social entity.
10 Assignments
0 Petitions
Accused Products
Abstract
A method includes identifying data on a social network that is associated with a suspect social entity, and determining one or more characteristics of the identified data. A reference to the identified data is generated for each of the one or more characteristics. One or more of the generated references are compared to one or more stored references, where the one or more stored references are associated with a protected social entity. A profile score for the suspect social entity is determined based on the comparison. Determining the profile score includes identifying a match between one or more of the generated references and one or more of the stored references.
55 Citations
22 Claims
-
1. A method comprising:
-
scanning data that is maintained on multiple social networks, wherein scanning data that is maintained on multiple social networks comprises identifying, by one or more processors, data that is associated with a social entity, and wherein scanning data that is maintained on multiple social networks is performed on a continuous basis, without user initiation; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; comparing one or more of the generated references to one or more stored references, wherein the one or more stored references are references to one or more characteristics associated with a protected user; determining, based on an algorithmic comparison of the one or more generated references and the one or more stored references, a profile score for the suspect social entity, wherein determining the profile score comprises identifying a match between one or more of the generated references and one or more of the stored references, wherein the one or more generated references that are compared to the one or more stored references are dynamically determined, being selected from a group of generated references, and wherein the algorithmic comparison comprises; determining one or more match scores by comparing the one or more generated references to the one or more stored references; generating a weight for each match score; and generating a weighted average based on the weighted match scores; comparing the profile score for the suspect social entity determined by the algorithmic comparison to a threshold; identifying the suspect social entity as an imposter of the protected social entity if the profile score exceeds the threshold; monitoring the activity of the identified imposter across the multiple social networks, wherein monitoring the activity of the identified imposter comprises identifying data that is associated with the identified imposter; determining that the identified data associated with the identified imposter is malicious; generating an alert; and providing the alert to the protected social entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
one or more processing devices; and one or more non-transitory computer-readable media coupled to the one or more processing devices having instructions stored thereon which, when executed by the one or more processing devices, cause the one or more processing devices to perform operations comprising; scanning data that is maintained on multiple social networks, wherein scanning data that is maintained on multiple social networks comprises identifying, by one or more processors, data that is associated with a social entity, and wherein scanning data that is maintained on multiple social networks is performed on a continuous basis, without user initiation; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; comparing one or more of the generated references to one or more stored references, wherein the one or more stored references are references to one or more characteristics associated with a protected user; and determining, based on an algorithmic comparison of the one or more generated references and the one or more stored references, a profile score for the suspect social entity, wherein determining the profile score comprises identifying a match between one or more of the generated references and one or more of the stored references, wherein the one or more generated references that are compared to the one or more stored references are dynamically determined, being selected from a group of generated references, and wherein the algorithmic comparison comprises; determining one or more match scores by comparing the one or more generated references to the one or more stored references; generating a weight for each match score; and generating a weighted average based on the weighted match scores; comparing the profile score for the suspect social entity determined by the algorithmic comparison to a threshold; identifying the suspect social entity as an imposter of the protected social entity if the profile score exceeds the threshold; monitoring the activity of the identified imposter across the multiple social networks, wherein monitoring the activity of the identified imposter comprises identifying data that is associated with the identified imposter; determining that the identified data associated with the identified imposter is malicious; generating an alert; and providing the alert to the protected social entity. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory computer-readable storage medium storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
scanning data that is maintained on multiple social networks, wherein scanning data that is maintained on multiple social networks comprises identifying, by one or more processors, data that is associated with a social entity, and wherein scanning data that is maintained on multiple social networks is performed on a continuous basis, without user initiation; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; comparing one or more of the generated references to one or more stored references, wherein the one or more stored references are references to one or more characteristics associated with a protected user; and determining, based on an algorithmic comparison of the one or more generated references and the one or more stored references, a profile score for the suspect social entity, wherein determining the profile score comprises identifying a match between one or more of the generated references and one or more of the stored references, wherein the one or more generated references that are compared to the one or more stored references are dynamically determined, being selected from a group of generated references, and wherein the algorithmic comparison comprises; determining one or more match scores by comparing the one or more generated references to the one or more stored references; generating a weight for each match score; and generating a weighted average based on the weighted match scores; comparing the profile score for the suspect social entity determined by the algorithmic comparison to a threshold; identifying the suspect social entity as an imposter of the protected social entity if the profile score exceeds the threshold; monitoring the activity of the identified imposter across the multiple social networks, wherein monitoring the activity of the identified imposter comprises identifying data that is associated with the identified imposter; determining that the identified data associated with the identified imposter is malicious; generating an alert; and providing the alert to the protected social entity.
-
Specification