Information removal from a network
First Claim
1. A method to manage user information related to a user, the method comprising:
- receiving, by one or more processors, the user information related to the user;
determining, by the one or more processors and based on the user information, a first social network associated with the user;
determining, by the one or more processors and based on the user information, a second social network associated with the user, wherein the second social network is different from the first social network, and wherein the second social network is linked with the first social network;
receiving, by the one or more processors, first information related to the user, wherein the first information includes results of a first search of the first social network based on the user information related to the user;
receiving, by the one or more processors, second information related to the user, wherein the second information includes results of a second search of the second social network based on the user information related to the user;
sending, by the one or more processors, a first request to one or more first removal processors in communication with the first social network to remove or obfuscate at least a portion of the first information that is less than an entirety of the first information;
sending, by the one or more processors, a second request to one or more second removal processors in communication with the second social network to remove or obfuscate at least a portion of the second information that is less than an entirety of the second information, wherein sending each of the first request and the second request includes sending a modified photograph or a modified video of the user to each of the first social network and the second social network;
removing or obfuscating, by the one or more first removal processors and the one or more second removal processors, the at least the portion of the first information and the second information respectively,wherein the removal or obfuscation, of the at least the portion of the first information and the second information, is based on the modified photograph or the modified video of the user as a replacement, andwherein the removal or obfuscation of the at least the portion of each of the first information and the second information related to the user enforces security of the user information; and
sending a notification to the user, in response to non-compliance with the first request or the second request to remove or obfuscate.
4 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for systems, methods and devices effective to remove information from a network such as the Internet. In some examples, a device may include a memory including instructions and a processor configured in communication with the memory. The processor may be configured effective to receive user information relating to a user and search the network using the user information. In response to the search, the processor may find additional information relating to the user stored in the network. The processor may receive a first request to remove particular information from the network. The particular information may be part of the additional information and the particular information may be removable by a second user. The processor may send a second request to remove the particular information from the network.
24 Citations
17 Claims
-
1. A method to manage user information related to a user, the method comprising:
-
receiving, by one or more processors, the user information related to the user; determining, by the one or more processors and based on the user information, a first social network associated with the user; determining, by the one or more processors and based on the user information, a second social network associated with the user, wherein the second social network is different from the first social network, and wherein the second social network is linked with the first social network; receiving, by the one or more processors, first information related to the user, wherein the first information includes results of a first search of the first social network based on the user information related to the user; receiving, by the one or more processors, second information related to the user, wherein the second information includes results of a second search of the second social network based on the user information related to the user; sending, by the one or more processors, a first request to one or more first removal processors in communication with the first social network to remove or obfuscate at least a portion of the first information that is less than an entirety of the first information; sending, by the one or more processors, a second request to one or more second removal processors in communication with the second social network to remove or obfuscate at least a portion of the second information that is less than an entirety of the second information, wherein sending each of the first request and the second request includes sending a modified photograph or a modified video of the user to each of the first social network and the second social network; removing or obfuscating, by the one or more first removal processors and the one or more second removal processors, the at least the portion of the first information and the second information respectively, wherein the removal or obfuscation, of the at least the portion of the first information and the second information, is based on the modified photograph or the modified video of the user as a replacement, and wherein the removal or obfuscation of the at least the portion of each of the first information and the second information related to the user enforces security of the user information; and sending a notification to the user, in response to non-compliance with the first request or the second request to remove or obfuscate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device effective to manage user information related to a user, the device comprising:
-
a memory that includes instructions; and at least one processor configured in communication with the memory, wherein the configured at least one processor is effective to execute the instructions to; obtain the user information related to the user; store the user information in the memory; determine, based on the user information stored in the memory, a first social network associated with the user; determine, based on the user information stored in the memory, a second social network associated with the user, wherein the second social network is different from the first social network, and wherein the second social network is linked with the first social network; obtain first information related to the user, wherein the first information is generated from a first search of the first social network based on the user information related to the user; store the first information in the memory; obtain, by the one or more processors, second information related to the user, wherein the second information is generated from a second search of the second social network based on the user information related to the user; store the second information in the memory; send a first request to the first social network to remove or obfuscate at least a portion of the first information; send a second request to the second social network to remove or obfuscate at least a portion of the second information, wherein to send each of the first request and the second request, the configured at least one processor is effective to execute the instructions to send a modified photograph or a modified video of the user to each of the first social network and the second social network, wherein the removal or obfuscation, of the at least the portion of the first information and the second information, is based on the modified photograph or the modified video of the user, and wherein the removal or obfuscation of the at least the portion of each of the first information and the second information related to the user enforces security of the user information. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transient computer readable medium that includes instructions effective to manage user information related to a user, wherein execution of the instructions by one or more processors causes the one or more processors to perform or control performance of operations that comprise:
-
obtain the user information related to the user; determine, based on the user information, a first social network associated with the user; determine, based on the user information, a second social network associated with the user, wherein the second social network is different from the first social network, and wherein the second social network is linked with the first social network; obtain first information related to the user, wherein the first information is generated from a first search of the first social network based on the user information related to the user; obtain, by the one or more processors, second information related to the user, wherein the second information is generated from a second search of the second social network based on the user information related to the user; send a first request to the first social network to remove or obfuscate at least a portion of the first information; send a second request to the second social network to remove or obfuscate at least a portion of the second information, wherein each of the first request and the second request being sent includes a modified photograph or a modified video of the user, wherein the removal or obfuscation, of the at least the portion of the first information and second information, is based on the modified photograph or the modified video of the user, and wherein the removal or obfuscation of the at least the portion of each of the first information and the second information related to the user enforces security of the user information.
-
-
17. A system effective to manage user information, the system comprising:
-
a memory that includes instructions; one or more first removal processors configured to be in communication with a first social network and one or more second removal processors configured to be in communication with a second social network; and at least one other processor configured in communication with the memory, wherein the configured at least one other processor is effective to execute the instructions to; obtain user information related to a user; store the user information in the memory; determine, based on the user information stored in the memory, that the first social network is associated with the user; determine, based on the user information stored in the memory, that the second social network is associated with the user, wherein the second social network is different from the first social network, and wherein the second social network is linked with the first social network; obtain first information related to the user, wherein the first information is generated from a first search of the first social network based on the user information related to the user; store the first information in the memory; obtain second information related to the user, wherein the second information is generated from a second search of the second social network based on the user information related to the user; store the second information in the memory; send a first request to the one or more first removal processors to remove or obfuscate at least a portion of the first information; and send a second request to the one or more second removal processors to remove or obfuscate at least a portion of the second information, wherein each of the sent first request and the second request include a modified photograph or a modified video of the user that is to each of the first social network and the second social network, wherein the one or more first removal processors are configured to remove or obfuscate the at least the portion of the first information, in response to the first request; wherein the one or more second removal processors are configured to remove or obfuscate the at least the portion of the second information, in response to the second request, wherein the removal or obfuscation, of the at least the portion of the first information and the second information, is based on the modified photograph or the modified video of the user, and wherein the removal or obfuscation of the at least the portion of the first information and the second information related to the user enforces security of the user information.
-
Specification