Social network profile data removal
First Claim
1. A computer-implemented method comprising:
- receiving, by one or more processors, a request to remove data that is associated with a particular individual that does not maintain any personal social network profiles, wherein the request is based on a user input received at a threat protection platform, wherein the received request includes one or more data parameters that define specific data associated with the particular individual to be removed, and wherein the one or more data parameters include name, images, date of birth, gender, location, email address, education, and organization data;
generating, for each of the received one or more data parameters, a reference to the data parameter, wherein at least one of the generated references comprises a hash of an image associated with the particular individual;
storing, at a social risk database, the one or more generated references for each of the one or more data parameters;
scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with one or more social entities;
determining one or more characteristics of the identified data;
generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic;
identifying a match between the one or more generated references and at least one of the one or more stored references;
submitting, by one or more processors, a request to at least one of the multiple social networks to remove the identified data associated with the one or more generated references;
generating an alert to the particular individual, wherein the generated alert includes the identified data and the request submitted to the at least one of the multiple social networks; and
providing the alert, through the protection platform, to the particular individual.
12 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes receiving a request to remove data that is associated with a protected social entity. The data maintained on one or more social networks is scanned, where scanning includes identifying data that is associated with one or more social entities. One or more characteristics of the identified data are determined, and a reference to the identified data that indicates the characteristic, is generated for each of the one or more characteristics. A match between the one or more generated references and one or more stored references is identified, where the one or more stored references each reference one or more characteristics associated with the protected social entity, and where the one or more stored references are stored in one or more social risk databases. A request to the one or more social networks to remove the identified data associated with the one or more generated references is submitted.
-
Citations
18 Claims
-
1. A computer-implemented method comprising:
-
receiving, by one or more processors, a request to remove data that is associated with a particular individual that does not maintain any personal social network profiles, wherein the request is based on a user input received at a threat protection platform, wherein the received request includes one or more data parameters that define specific data associated with the particular individual to be removed, and wherein the one or more data parameters include name, images, date of birth, gender, location, email address, education, and organization data; generating, for each of the received one or more data parameters, a reference to the data parameter, wherein at least one of the generated references comprises a hash of an image associated with the particular individual; storing, at a social risk database, the one or more generated references for each of the one or more data parameters; scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with one or more social entities; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; identifying a match between the one or more generated references and at least one of the one or more stored references; submitting, by one or more processors, a request to at least one of the multiple social networks to remove the identified data associated with the one or more generated references; generating an alert to the particular individual, wherein the generated alert includes the identified data and the request submitted to the at least one of the multiple social networks; and providing the alert, through the protection platform, to the particular individual. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
one or more processing devices; and one or more non-transitory computer-readable media coupled to the one or more processing devices having instructions stored thereon which, when executed by the one or more processing devices, cause the one or more processing devices to perform operations comprising; receiving, by one or more processors, a request to remove data that is associated with a particular individual that does not maintain any personal social network profiles, wherein the request is based on a user input received at a threat protection platform, wherein the received request includes one or more data parameters that define specific data associated with the particular individual to be removed, and wherein the one or more data parameters include name, images, date of birth, gender, location, email address, education, and organization data; generating, for each of the received one or more data parameters, a reference to the data parameter, wherein at least one of the generated references comprises a hash of an image associated with the particular individual; storing, at a social risk database, the one or more generated references for each of the one or more data parameters; scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with one or more social entities; determining one or more characteristics of the identified data; generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; identifying a match between the one or more generated references and at least one of the one or more stored references; submitting, by one or more processors, a request to at least one of the multiple social networks to remove the identified data associated with the one or more generated references; generating an alert to the particular individual, wherein the generated alert includes the identified data and the request submitted to the at least one of the multiple social networks; and providing the alert, through the protection platform, to the particular individual. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
receiving, by one or more processors, a request to remove data that is associated with a particular individual that does not maintain any personal social network profiles, wherein the request is based on a user input received at a threat protection platform, wherein the received request includes one or more data parameters that define specific data associated with the particular individual to be removed, and wherein the one or more data parameters include name, images, date of birth, gender, location, email address, education, and organization data; generating, for each of the received one or more data parameters, a reference to the data parameter, wherein at least one of the generated references comprises a hash of an image associated with the particular individual; storing, at a social risk database, the one or more generated references for each of the one or more data parameters; scanning data that is maintained on multiple social networks, wherein scanning comprises identifying, by one or more processors, data that is associated with one or more social entities; determining one or more characteristics of the identified data generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic; identifying a match between the one or more generated references and at least one of the one or more stored references; submitting, by one or more processors, a request to at least one of the multiple social networks to remove the identified data associated with the one or more generated references; generating an alert to the particular individual, wherein the generated alert includes the identified data and the request submitted to the at least one of the multiple social networks; and providing the alert, through the protection platform, to the particular individual. - View Dependent Claims (16, 17, 18)
-
Specification