×

Information removal from a network

  • US 9,892,197 B2
  • Filed: 01/14/2016
  • Issued: 02/13/2018
  • Est. Priority Date: 06/12/2012
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method to manage user information related to a user, the method comprising:

  • receiving, by one or more processors, the user information related to the user;

    determining, by the one or more processors and based on the user information, a first social network associated with the user;

    determining, by the one or more processors and based on the user information, a second social network associated with the user, wherein the second social network is different from the first social network, and wherein the second social network is linked with the first social network;

    receiving, by the one or more processors, first information related to the user, wherein the first information includes results of a first search of the first social network based on the user information related to the user;

    receiving, by the one or more processors, second information related to the user, wherein the second information includes results of a second search of the second social network based on the user information related to the user;

    sending, by the one or more processors, a first request to one or more first removal processors in communication with the first social network to remove or obfuscate at least a portion of the first information that is less than an entirety of the first information;

    sending, by the one or more processors, a second request to one or more second removal processors in communication with the second social network to remove or obfuscate at least a portion of the second information that is less than an entirety of the second information, wherein sending each of the first request and the second request includes sending a modified photograph or a modified video of the user to each of the first social network and the second social network;

    removing or obfuscating, by the one or more first removal processors and the one or more second removal processors, the at least the portion of the first information and the second information respectively,wherein the removal or obfuscation, of the at least the portion of the first information and the second information, is based on the modified photograph or the modified video of the user as a replacement, andwherein the removal or obfuscation of the at least the portion of each of the first information and the second information related to the user enforces security of the user information; and

    sending a notification to the user, in response to non-compliance with the first request or the second request to remove or obfuscate.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×