Social network data removal
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving risk thresholds from a protected social entity, including a first risk threshold associated with a first type of risk and a second risk threshold associated with a second type of risk, wherein the first risk threshold and the second risk threshold have different values;
scanning data that is maintained across multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with the protected social entity;
determining one or more characteristics of the identified data;
generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic;
algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references include references to characteristics of identified data that have been assigned a level of risk associated with the first type of risk, and include references to characteristics of identified data that have been assigned a level of risk associated with the second type of risk;
determining, a first risk score for the social entity, based on the algorithmic comparison;
comparing the first risk score for the social entity to the first risk threshold;
determining, responsive to comparing the first risk score for the social entity to the first risk threshold, that the first risk score exceeds the first risk threshold;
initiating a security action;
determining, a second risk score for the social entity, based on the algorithmic comparison;
comparing the second risk score for the social entity to the second risk threshold; and
determining, responsive to comparing the second risk score for the social entity to the second risk threshold, that the second risk score does not exceed the second risk threshold.
10 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes receiving a risk threshold from a protected social entity, and scanning data that is maintained across multiple social networks, where scanning includes identifying data that is associated with the protected social entity. One or more characteristics of the identified data is determined, and based on the one or more characteristics of the data identified across the multiple social networks, a risk to the protected social entity is determined. A request to a social network for the removal of the data associated with the risk is submitted.
59 Citations
14 Claims
-
1. A computer-implemented method comprising:
-
receiving risk thresholds from a protected social entity, including a first risk threshold associated with a first type of risk and a second risk threshold associated with a second type of risk, wherein the first risk threshold and the second risk threshold have different values; scanning data that is maintained across multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with the protected social entity; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references include references to characteristics of identified data that have been assigned a level of risk associated with the first type of risk, and include references to characteristics of identified data that have been assigned a level of risk associated with the second type of risk; determining, a first risk score for the social entity, based on the algorithmic comparison; comparing the first risk score for the social entity to the first risk threshold; determining, responsive to comparing the first risk score for the social entity to the first risk threshold, that the first risk score exceeds the first risk threshold; initiating a security action; determining, a second risk score for the social entity, based on the algorithmic comparison; comparing the second risk score for the social entity to the second risk threshold; and determining, responsive to comparing the second risk score for the social entity to the second risk threshold, that the second risk score does not exceed the second risk threshold. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
one or more processing devices; and one or more non-transitory computer-readable media coupled to the one or more processing devices having instructions stored thereon which, when executed by the one or more processing devices, cause the one or more processing devices to perform operations comprising; receiving risk thresholds from a protected social entity, including a first risk threshold associated with a first type of risk and a second risk threshold associated with a second type of risk, wherein the first risk threshold and the second risk threshold have different values; scanning data that is maintained across multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with the protected social entity; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references include references to characteristics of identified data that have been assigned a level of risk associated with the first type of risk, and include references to characteristics of identified data that have been assigned a level of risk associated with the second type of risk; determining, a first risk score for the social entity, based on the algorithmic comparison; comparing the first risk score for the social entity to the first risk threshold; determining, responsive to comparing the first risk score for the social entity to the first risk threshold, that the first risk score exceeds the first risk threshold; initiating a security action; determining, a second risk score for the social entity, based on the algorithmic comparison; comparing the second risk score for the social entity to the second risk threshold; and determining, responsive to comparing the second risk score for the social entity to the second risk threshold, that the second risk score does not exceed the second risk threshold. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A non-transitory computer-readable storage device encoded with a computer program, the program comprising instructions that when executed by a data processing apparatus cause the data processing apparatus to perform operations comprising:
receiving risk thresholds from a protected social entity, including a first risk threshold associated with a first type of risk and a second risk threshold associated with a second type of risk, wherein the first risk threshold and the second risk threshold have different values; scanning data that is maintained across multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with the protected social entity; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; algorithmically comparing the one or more generated references to one or more known references, wherein the one or more known references include references to characteristics of identified data that have been assigned a level of risk associated with the first type of risk, and include references to characteristics of identified data that have been assigned a level of risk associated with the second type of risk; determining, a first risk score for the social entity, based on the algorithmic comparison; comparing the first risk score for the social entity to the first risk threshold; determining, responsive to comparing the first risk score for the social entity to the first risk threshold, that the first risk score exceeds the first risk threshold; initiating a security action; determining, a second risk score for the social entity, based on the algorithmic comparison; comparing the second risk score for the social entity to the second risk threshold; and determining, responsive to comparing the second risk score for the social entity to the second risk threshold, that the second risk score does not exceed the second risk threshold. - View Dependent Claims (13, 14)
Specification