Data analytics and security in social networks
First Claim
1. A method for securing a social network account assigned to a member, the method comprising:
- determining at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program;
determining, by the processor, a pattern of communications between the member and the at least one social network account;
generating, by the processor, a profile for the at least one social network account assigned to the member based on the pattern of communications, wherein the pattern of communications is determined by extracting a plurality of stylometry and metadata from a plurality of historical message postings associated with the member, wherein the plurality of stylometry includes a member'"'"'s style of writing, a type of message being shared, a context of a message, and an application used to post a message, and wherein the metadata includes who created the posting, when the posting was created, what the content of the posting is, where the posting was created, how the posting was created, access control of the posting, and the IP address of the member creating the posting;
monitoring, by the processor, an electronic communication with the at least one social network account by the member, wherein the monitoring comprises;
receiving a new social network posting at the at least one social network account;
analyzing the new social network posting; and
disabling all bridges to any other social network account associated with the member in response to determining, based on a comparing, that the new social network posting is not in accordance with the generated profile and a failure to authenticate the member'"'"'s identity, wherein the authentication of the member'"'"'s identity is verified based on a security question posted to the member;
adding a plurality of attributes associated with the received new social network posting to the generated profile, wherein the adding is performed based on the member'"'"'s identity being authenticated, and wherein the added plurality of attributes includes words describing a day of a week and a time of the day;
displaying the received new social network posting based on the plurality of attributes associated with the received new social network posting being added to the generated profile; and
sending a hacking notification to all social network accounts when the new social network posting is not in accordance with the generated profile.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program. The method may also include determining a pattern of communications between the member and the at least one social network account and generating a profile for the at least one social network account assigned to the member based on the pattern of communications. The method may further include monitoring an electronic communication with the at least one social network account by the member based on comparing the generated profile with the electronic communication.
29 Citations
3 Claims
-
1. A method for securing a social network account assigned to a member, the method comprising:
-
determining at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program; determining, by the processor, a pattern of communications between the member and the at least one social network account; generating, by the processor, a profile for the at least one social network account assigned to the member based on the pattern of communications, wherein the pattern of communications is determined by extracting a plurality of stylometry and metadata from a plurality of historical message postings associated with the member, wherein the plurality of stylometry includes a member'"'"'s style of writing, a type of message being shared, a context of a message, and an application used to post a message, and wherein the metadata includes who created the posting, when the posting was created, what the content of the posting is, where the posting was created, how the posting was created, access control of the posting, and the IP address of the member creating the posting; monitoring, by the processor, an electronic communication with the at least one social network account by the member, wherein the monitoring comprises; receiving a new social network posting at the at least one social network account; analyzing the new social network posting; and disabling all bridges to any other social network account associated with the member in response to determining, based on a comparing, that the new social network posting is not in accordance with the generated profile and a failure to authenticate the member'"'"'s identity, wherein the authentication of the member'"'"'s identity is verified based on a security question posted to the member; adding a plurality of attributes associated with the received new social network posting to the generated profile, wherein the adding is performed based on the member'"'"'s identity being authenticated, and wherein the added plurality of attributes includes words describing a day of a week and a time of the day; displaying the received new social network posting based on the plurality of attributes associated with the received new social network posting being added to the generated profile; and sending a hacking notification to all social network accounts when the new social network posting is not in accordance with the generated profile.
-
-
2. A computer system for securing a social network account assigned to a member, the computer system comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising; program instructions to determine at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program; program instructions to determine, by the processor, a pattern of communications between the member and the at least one social network account; program instructions to generate, by the processor, a profile for the at least one social network account assigned to the member based on the pattern of communications, wherein the pattern of communications is determined by extracting a plurality of stylometry and metadata from a plurality of historical message postings associated with the member, wherein the plurality of stylometry includes a member'"'"'s style of writing, a type of message being shared, a context of a message, and an application used to post a message, and wherein the metadata includes who created the posting, when the posting was created, what the content of the posting is, where the posting was created, how the posting was created, access control of the posting, and the IP address of the member creating the posting; program instructions to monitor, by the processor, an electronic communication with the at least one social network account by the member, wherein the monitoring comprises; program instructions to receive a new social network posting at the at least one social network account; program instructions to analyze the new social network posting; and program instructions to disable all bridges to any other social network account associated with the member in response to determining, based on a comparing, that the new social network posting is not in accordance with the generated profile and a failure to authenticate the member'"'"'s identity, wherein the authentication of the member'"'"'s identity is verified based on a security question posted to the member; program instructions to add a plurality of attributes associated with the received new social network posting to the generated profile, wherein the adding is performed based on the member'"'"'s identity being authenticated, and wherein the added plurality of attributes includes words describing a day of a week and a time of the day; program instructions to display the received new social network posting based on the plurality of attributes associated with the received new social network posting being added to the generated profile; and sending a hacking notification to all social network accounts when the new social network posting is not in accordance with the generated profile.
-
-
3. A computer program product for securing a social network account assigned to a member, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on at least one of the one or more tangible storage devices, the program instructions comprising; program instructions to determine at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program; program instructions to determine, by the processor, a pattern of communications between the member and the at least one social network account; program instructions to generate, by the processor, a profile for the at least one social network account assigned to the member based on the pattern of communications, wherein the pattern of communications is determined by extracting a plurality of stylometry and metadata from a plurality of historical message postings associated with the member, wherein the plurality of stylometry includes a member'"'"'s style of writing, a type of message being shared, a context of a message, and an application used to post a message, and wherein the metadata includes who created the posting, when the posting was created, what the content of the posting is, where the posting was created, how the posting was created, access control of the posting, and the IP address of the member creating the posting; program instructions to monitor, by the processor, an electronic communication with the at least one social network account by the member, wherein the monitoring comprises; program instructions to receive a new social network posting at the at least one social network account; program instructions to analyze the new social network posting; and program instructions to disable all bridges to any other social network account associated with the member in response to determining, based on a comparing, that the new social network posting is not in accordance with the generated profile and a failure to authenticate the member'"'"'s identity, wherein the authentication of the member'"'"'s identity is verified based on a security question posted to the member; program instructions to add a plurality of attributes associated with the received new social network posting to the generated profile, wherein the adding is performed based on the member'"'"'s identity being authenticated, and wherein the added plurality of attributes includes words describing a day of a week and a time of the day; program instructions to display the received new social network posting based on the plurality of attributes associated with the received new social network posting being added to the generated profile; and sending a hacking notification to all social network accounts when the new social network posting is not in accordance with the generated profile.
-
Specification