×

Protecting against suspect social entities

  • US 9,191,411 B2
  • Filed: 07/09/2014
  • Issued: 11/17/2015
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • scanning data that is maintained on multiple social networks, wherein scanning data that is maintained on multiple social networks comprises identifying, by one or more processors, data that is associated with a social entity, and wherein scanning data that is maintained on multiple social networks is performed on a continuous basis, without user initiation;

    determining one or more characteristics of the identified data;

    generating, for each of the one or more characteristics, a reference to the identified data that indicates the characteristic;

    comparing one or more of the generated references to one or more stored references, wherein the one or more stored references are references to one or more characteristics associated with a protected user;

    determining, based on an algorithmic comparison of the one or more generated references and the one or more stored references, a profile score for the suspect social entity, wherein determining the profile score comprises identifying a match between one or more of the generated references and one or more of the stored references, wherein the one or more generated references that are compared to the one or more stored references are dynamically determined, being selected from a group of generated references, and wherein the algorithmic comparison comprises;

    determining one or more match scores by comparing the one or more generated references to the one or more stored references;

    generating a weight for each match score; and

    generating a weighted average based on the weighted match scores;

    comparing the profile score for the suspect social entity determined by the algorithmic comparison to a threshold;

    identifying the suspect social entity as an imposter of the protected social entity if the profile score exceeds the threshold;

    monitoring the activity of the identified imposter across the multiple social networks, wherein monitoring the activity of the identified imposter comprises identifying data that is associated with the identified imposter;

    determining that the identified data associated with the identified imposter is malicious;

    generating an alert; and

    providing the alert to the protected social entity.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×