Movatterモバイル変換


[0]ホーム

URL:


US20220038461A1 - Systems and methods for securing social media for users and businesses and rewarding for enhancing security - Google Patents

Systems and methods for securing social media for users and businesses and rewarding for enhancing security
Download PDF

Info

Publication number
US20220038461A1
US20220038461A1US17/506,270US202117506270AUS2022038461A1US 20220038461 A1US20220038461 A1US 20220038461A1US 202117506270 AUS202117506270 AUS 202117506270AUS 2022038461 A1US2022038461 A1US 2022038461A1
Authority
US
United States
Prior art keywords
social media
user
dss
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/506,270
Inventor
Joseph Steinberg
Shira Rubinoff
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Securemysocial Inc
Original Assignee
Securemysocial Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Securemysocial IncfiledCriticalSecuremysocial Inc
Priority to US17/506,270priorityCriticalpatent/US20220038461A1/en
Assigned to SecureMySocial, Inc.reassignmentSecureMySocial, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RUBINOFF, SHIRA, STEINBERG, JOSEPH
Publication of US20220038461A1publicationCriticalpatent/US20220038461A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The disclosed system and method enhances security of people, organizations, and other entities that use what has been termed “social media.” Recent trends have shown that information posted to social media may cause tremendous damage to individuals and other entities. This includes information that was posted deliberately or unintentionally, including social security numbers, financial data and other sensitive information. Further, information that previously may have been viewed as innocuous, such as location data, has caused harm on certain occasions and may need to be protected. The disclosed system provides a novel method of screening, identifying, and preventing certain information from being posted on social media and other public locations. In addition, the disclosed system and method improves security by motivating people to use security software by offering rewards for its use.

Description

Claims (21)

What is claimed is:
1. A system, comprising:
one or more non-transitory storage medium configured to provide stored computer-readable instructions, the one or more non-transitory storage mediums coupled to one or more processors, the one or more processors configured to executed the computer-readable instructions to cause the one or more processors to:
establish a connection to a network configured to provide an access to social media services;
receive a request to share data via the social media services associated with a social media service provider;
intercept the request before the data is shared via the social media services;
scan the data for one or more specified characteristics;
determine whether the data comprises the one or more specified characteristics; and
in response to determining that the data comprises the one or more specified characteristics, process the request based at least on one or more rules.
2. The system ofclaim 1, wherein the system is internal or external to the network managed by the social media service provider.
3. The system ofclaim 1, wherein the system comprises one or more virtual machines.
4. The system ofclaim 1, wherein the system comprises an Internet Protocol (IP) network address that resides internally on the network associated with the social media service provider.
5. The system ofclaim 1, wherein the one or more processors are further configured to transmit Open Systems Interconnection (OSI) model layer 3 level transmission.
6. The system ofclaim 1, wherein the social media services are provided the social media service provider or a third party working with the social media service provider.
7. The system ofclaim 1, wherein the system is implemented on an application-level firewall.
8. A system, comprising:
one or more non-transitory storage medium configured to provide stored computer-readable instructions, the one or more non-transitory storage mediums coupled to one or more processors, the one or more processors configured to executed the computer-readable instructions to cause the one or more processors to:
establish a connection to a network configured to provide an access to social media services;
receive a request from a client device to share data via the social media services associated with a social media service provider;
intercept the request before the data is shared via the social media services;
scan the data for one or more specified characteristics;
determine whether the data comprises the one or more specified characteristics;
in response to determining that the data comprises the one or more specified characteristics, flag the data; and
transmit the flag to the client device.
9. The system ofclaim 8, wherein the system is internal or external to the network managed by the social media service provider.
10. The system ofclaim 8, wherein the system comprises one or more virtual machines.
11. The system ofclaim 8, wherein the system comprises an Internet Protocol (IP) network address that resides internally on the network associated with the social media service provider.
12. The system ofclaim 8, wherein the one or more processors are further configured to transmit Open Systems Interconnection (OSI) model layer 3 level transmission.
13. The system ofclaim 8, wherein the social media services are provided the social media service provider or a third party working with the social media service provider.
14. The system ofclaim 8, wherein the system is implemented on an application-level firewall.
15. One or more non-transitory computer-readable media storing computer-executable instructions that upon execution cause one or more processors to perform acts comprising:
receiving, by way of a social media server application programming interface (API), a request to share data via social media services associated with a social media service provider;
intercepting the request before the data is shared via the social media services;
scanning the data for one or more specified characteristics;
determining whether the data comprises the one or more specified characteristics; and
in response to determining that the data comprises the one or more specified characteristics, rendering a modified view of the data via the social media services.
16. The one or more non-transitory computer-readable media ofclaim 15, wherein the acts further comprise performing at least one of textual analysis, image analysis, sound analysis, video analysis, and contextual analysis.
17. The one or more non-transitory computer-readable media ofclaim 15, wherein the acts further comprise:
relaying the request to a remote server.
18. The one or more non-transitory computer-readable media ofclaim 15, wherein the acts further comprise:
transmitting a notification to a client device based at least on one or more rules.
19. The one or more non-transitory computer-readable media ofclaim 15, wherein the acts further comprise:
scanning the data on a scheduled basis.
20. The one or more non-transitory computer-readable media ofclaim 15, wherein the one or more specified characteristics are based at least on social media service provider.
21. A system, comprising:
one or more non-transitory storage medium configured to provide stored computer-readable instructions, the one or more non-transitory storage mediums coupled to one or more processors, the one or more processors configured to executed the computer-readable instructions to cause the one or more processors to:
establish a connection to a network to provide an access to social media services associated with a social media service provider, wherein the connection adds a network address of the system, the network address associated with the social media service provider;
receive a request via the network from a client device to share data via the social media services supported by an infrastructure managed by the social media service provider;
intercept the request before the data is shared via the social media services;
analyze the data for one or more specified characteristics;
determine whether the data comprises the one or more specified characteristics; and
in response to determining that the data comprises the one or more specified characteristics, perform one or more predetermined actions.
US17/506,2702012-06-192021-10-20Systems and methods for securing social media for users and businesses and rewarding for enhancing securityAbandonedUS20220038461A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/506,270US20220038461A1 (en)2012-06-192021-10-20Systems and methods for securing social media for users and businesses and rewarding for enhancing security

Applications Claiming Priority (8)

Application NumberPriority DateFiling DateTitle
US201261690090P2012-06-192012-06-19
US201361855133P2013-05-092013-05-09
US13/921,205US9374374B2 (en)2012-06-192013-06-18Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US14/846,794US9813419B2 (en)2012-06-192015-09-06Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US15/687,651US10084787B2 (en)2012-06-192017-08-28Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US16/100,978US10771464B2 (en)2012-06-192018-08-10Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US16/935,766US11438334B2 (en)2012-06-192020-07-22Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US17/506,270US20220038461A1 (en)2012-06-192021-10-20Systems and methods for securing social media for users and businesses and rewarding for enhancing security

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US16/935,766ContinuationUS11438334B2 (en)2012-06-192020-07-22Systems and methods for securing social media for users and businesses and rewarding for enhancing security

Publications (1)

Publication NumberPublication Date
US20220038461A1true US20220038461A1 (en)2022-02-03

Family

ID=49757270

Family Applications (6)

Application NumberTitlePriority DateFiling Date
US13/921,205Expired - Fee RelatedUS9374374B2 (en)2012-06-192013-06-18Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US14/846,794Active2033-07-25US9813419B2 (en)2012-06-192015-09-06Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US15/687,651ActiveUS10084787B2 (en)2012-06-192017-08-28Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US16/100,978Expired - Fee RelatedUS10771464B2 (en)2012-06-192018-08-10Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US16/935,766Active2033-09-08US11438334B2 (en)2012-06-192020-07-22Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US17/506,270AbandonedUS20220038461A1 (en)2012-06-192021-10-20Systems and methods for securing social media for users and businesses and rewarding for enhancing security

Family Applications Before (5)

Application NumberTitlePriority DateFiling Date
US13/921,205Expired - Fee RelatedUS9374374B2 (en)2012-06-192013-06-18Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US14/846,794Active2033-07-25US9813419B2 (en)2012-06-192015-09-06Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US15/687,651ActiveUS10084787B2 (en)2012-06-192017-08-28Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US16/100,978Expired - Fee RelatedUS10771464B2 (en)2012-06-192018-08-10Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US16/935,766Active2033-09-08US11438334B2 (en)2012-06-192020-07-22Systems and methods for securing social media for users and businesses and rewarding for enhancing security

Country Status (1)

CountryLink
US (6)US9374374B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230199008A1 (en)*2020-06-302023-06-22Sequoia Benefits and Insurance Services, LLCUsing machine learning to detect malicious upload activity

Families Citing this family (144)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9722807B2 (en)*2008-01-182017-08-01Shutterfly, Inc.Systems and methods for webpage creation and updating
US9374374B2 (en)*2012-06-192016-06-21SecureMySocial, Inc.Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US20140108610A1 (en)*2012-07-172014-04-17Enterprise Nube, Inc.System and method for managing organizational participation in objective pursuits
US9275420B1 (en)*2012-10-052016-03-01Google Inc.Changing user profile impression
US9852436B2 (en)*2012-10-112017-12-26Google Inc.Determining relative interest levels of tourists and locals in points of interest
US11386202B2 (en)*2012-11-082022-07-12Proofpoint, Inc.Apparatus and method for social account access control
US8925037B2 (en)*2013-01-022014-12-30Symantec CorporationSystems and methods for enforcing data-loss-prevention policies using mobile sensors
JP6243127B2 (en)*2013-02-272017-12-06任天堂株式会社 Information processing program, information processing apparatus, information sharing system, and information sharing method
US10476758B2 (en)*2013-07-112019-11-12Google LlcSystems and methods for providing notifications of changes in a cloud-based file system
KR102071530B1 (en)*2013-07-122020-01-30삼성전자주식회사Apparatas and method for proposing a response manual of occurring denial in an electronic device
US9444804B2 (en)*2013-11-252016-09-13Roy S. MelzerDynamic security question generation
US10013694B1 (en)*2013-12-302018-07-03EMC IP Holding Company LLCOpen data collection for threat intelligence posture assessment
US9652597B2 (en)*2014-03-122017-05-16Symantec CorporationSystems and methods for detecting information leakage by an organizational insider
JP6252268B2 (en)*2014-03-142017-12-27富士通株式会社 Management method, management device, and management program
US10044661B2 (en)2014-03-272018-08-07International Business Machines CorporationSocial media message delivery based on user location
US9917851B2 (en)2014-04-282018-03-13Sophos LimitedIntrusion detection using a heartbeat
US10122753B2 (en)2014-04-282018-11-06Sophos LimitedUsing reputation to avoid false malware detections
US10250538B2 (en)2014-06-142019-04-02Trisha N. PrabhuDetecting messages with offensive content
US11095585B2 (en)2014-06-142021-08-17Trisha N. PrabhuDetecting messages with offensive content
US12341739B2 (en)2014-06-142025-06-24Trisha N. PrabhuSystems and methods for mitigating the spread of offensive content and/or behavior
US9686217B2 (en)*2014-06-142017-06-20Trisha N. PrabhuMethod to stop cyber-bullying before it occurs
US10395221B1 (en)*2014-06-262019-08-27Amazon Technologies, Inc.Providing rewards to encourage device care
US11151614B2 (en)*2014-09-262021-10-19Comcast Cable Communications, LlcAdvertisements blended with user's digital content
JP6426433B2 (en)*2014-10-272018-11-21株式会社日立製作所 Image processing apparatus, image processing method, POI information creation system, warning system, and guidance system
US9705896B2 (en)*2014-10-282017-07-11Facebook, Inc.Systems and methods for dynamically selecting model thresholds for identifying illegitimate accounts
US10666664B2 (en)*2014-11-062020-05-26Pcms Holdings, Inc.System and method of providing location-based privacy on social media
US10007791B2 (en)*2014-11-182018-06-26Facebook, Inc.Systems and methods for increasing security sensitivity based on social influence
US10291572B2 (en)*2014-12-022019-05-14International Business Machines CorporationSelectively delaying social media messages
KR101670687B1 (en)*2014-12-172016-10-31주식회사 케이티System, method and computer program for sending message
GB201915196D0 (en)2014-12-182019-12-04Sophos LtdA method and system for network access control based on traffic monitoring and vulnerability detection using process related information
US9378364B1 (en)*2014-12-272016-06-28Intel CorporationTechnologies for managing security threats to a computing system utilizing user interactions
US9954813B2 (en)2015-02-202018-04-24Victory Square Media Inc.Method and system for facilitating publication of a media file at a scheduled time
US9906484B2 (en)2015-02-242018-02-27International Business Machines CorporationDynamic analytics controlled information dissemination in social media
US10565601B2 (en)2015-02-272020-02-18The Nielsen Company (Us), LlcMethods and apparatus to identify non-traditional asset-bundles for purchasing groups using social media
US9762585B2 (en)2015-03-192017-09-12Microsoft Technology Licensing, LlcTenant lockbox
US9692776B2 (en)*2015-04-292017-06-27Symantec CorporationSystems and methods for evaluating content provided to users via user interfaces
US10229219B2 (en)*2015-05-012019-03-12Facebook, Inc.Systems and methods for demotion of content items in a feed
US9756003B2 (en)*2015-05-112017-09-05International Business Machines CorporationDynamic inclusion thresholds for social network conversations
US20160335675A1 (en)*2015-05-152016-11-17T-Mobile, Usa, Inc.Binding social account interactions to a master agnostic identity
US10127211B2 (en)*2015-05-202018-11-13International Business Machines CorporationOverlay of input control to identify and restrain draft content from streaming
US9948580B2 (en)*2015-06-192018-04-17Whatsapp Inc.Techniques to replicate data using uploads from messaging clients
US10135836B2 (en)2015-06-292018-11-20International Business Machines CorporationManaging data privacy and information safety
US10931682B2 (en)*2015-06-302021-02-23Microsoft Technology Licensing, LlcPrivileged identity management
US10516567B2 (en)2015-07-102019-12-24Zerofox, Inc.Identification of vulnerability to social phishing
US20170041408A1 (en)*2015-08-052017-02-09Facebook, Inc.Systems and methods for managing shared content
US9948651B1 (en)*2015-12-142018-04-17Symantec CorporationAutomatic shared personal image privacy level detection and management
US9946895B1 (en)*2015-12-152018-04-17Amazon Technologies, Inc.Data obfuscation
US20170180290A1 (en)*2015-12-212017-06-22International Business Machines CorporationSelective content dissemination based on social media content analysis
US10404697B1 (en)2015-12-282019-09-03Symantec CorporationSystems and methods for using vehicles as information sources for knowledge-based authentication
US10326733B2 (en)2015-12-302019-06-18Symantec CorporationSystems and methods for facilitating single sign-on for multiple devices
US10298701B2 (en)*2016-01-292019-05-21Microsoft Technology Licensing, LlcSystems and methods for timely propagation of network content
US10320938B2 (en)2016-02-022019-06-11International Business Machines CorporationMonitoring and maintaining social group cohesiveness
US10218724B2 (en)*2016-02-042019-02-26Adobe Inc.Monitoring social media for breach of organizational privacy
US10097528B2 (en)*2016-02-272018-10-09Ncr CorporationNon-repeatable challenge-response authentication
JP6727543B2 (en)*2016-04-012020-07-22富士ゼロックス株式会社 Image pattern recognition device and program
US9786298B1 (en)2016-04-082017-10-10Source Digital, Inc.Audio fingerprinting based on audio energy characteristics
US10397663B2 (en)2016-04-082019-08-27Source Digital, Inc.Synchronizing ancillary data to content including audio
US10298663B2 (en)2016-04-272019-05-21International Business Machines CorporationMethod for associating previously created social media data with an individual or entity
US10397256B2 (en)2016-06-132019-08-27Microsoft Technology Licensing, LlcSpam classification system based on network flow data
US9973525B1 (en)2016-06-142018-05-15Symantec CorporationSystems and methods for determining the risk of information leaks from cloud-based services
US10375114B1 (en)2016-06-272019-08-06Symantec CorporationSystems and methods for enforcing access-control policies
US20170371963A1 (en)2016-06-272017-12-28Facebook, Inc.Systems and methods for identifying matching content
US10462184B1 (en)2016-06-282019-10-29Symantec CorporationSystems and methods for enforcing access-control policies in an arbitrary physical space
US11405696B2 (en)*2016-08-172022-08-02International Business Machines CorporationSystem and method for targeting mass media ads on the television to given physical locations using online activity profiles at the locations
US10523769B2 (en)2016-08-232019-12-31International Business Machines CorporationFacilitation of communications to another party using cognitive techniques
US10698959B1 (en)*2016-09-012020-06-30United Services Automobile Association (Usaa)Social warning system
US9961115B2 (en)*2016-09-162018-05-01International Buisness Machines CorporationCloud-based analytics to mitigate abuse from internet trolls
US10469457B1 (en)2016-09-262019-11-05Symantec CorporationSystems and methods for securely sharing cloud-service credentials within a network of computing devices
US10541965B2 (en)*2016-10-022020-01-21Jerry C. LiuDelaying a social media post
US10305850B1 (en)*2016-11-152019-05-28Majid AzizEnhanced instant messaging social network system
US11347374B2 (en)*2016-11-172022-05-31Meta Platforms, Inc.Systems and methods for managing shared content
US11256812B2 (en)2017-01-312022-02-22Zerofox, Inc.End user social network protection portal
US10812981B1 (en)2017-03-222020-10-20NortonLifeLock, Inc.Systems and methods for certifying geolocation coordinates of computing devices
US11394722B2 (en)2017-04-042022-07-19Zerofox, Inc.Social media rule engine
US20190036937A1 (en)*2017-07-312019-01-31Zerofox, Inc.Social network page protection
US10868824B2 (en)2017-07-312020-12-15Zerofox, Inc.Organizational social threat reporting
US11165801B2 (en)2017-08-152021-11-02Zerofox, Inc.Social threat correlation
US11418527B2 (en)*2017-08-222022-08-16ZeroFOX, IncMalicious social media account identification
US11403400B2 (en)*2017-08-312022-08-02Zerofox, Inc.Troll account detection
US11032329B2 (en)*2019-01-292021-06-08Fanmio, Inc.Managing engagements in interactive multimedia sessions
US11134097B2 (en)*2017-10-232021-09-28Zerofox, Inc.Automated social account removal
US11061975B2 (en)*2017-10-252021-07-13International Business Machines CorporationCognitive content suggestive sharing and display decay
US10454954B2 (en)*2017-11-062019-10-22Paypal, Inc.Automated detection of phishing campaigns via social media
US10587643B2 (en)*2017-11-282020-03-10International Business Machines CorporationDetecting a root cause for a vulnerability using subjective logic in social media
US10742688B2 (en)*2017-12-182020-08-11DeepView SolutionsPlatform for automated regulatory compliance monitoring of messaging services
US20190188804A1 (en)*2017-12-182019-06-20Social Media Compliance LtdPlatform for automated social media regulatory compliance monitoring
AU2018409900B2 (en)2018-02-222021-12-02Citrix Systems, Inc.Providing security to mobile devices via image evaluation operations that electronically analyze image data received from cameras of the mobile devices
US20220150068A1 (en)*2018-03-072022-05-12Private Identity LlcSystem and methods for implementing private identity
US11789699B2 (en)2018-03-072023-10-17Private Identity LlcSystems and methods for private authentication with helper networks
US11210375B2 (en)2018-03-072021-12-28Private Identity LlcSystems and methods for biometric processing with liveness
US12355811B2 (en)*2018-06-262025-07-08Zignal Labs, Inc.System and method for social network analysis
US11928749B2 (en)*2018-06-292024-03-12Biometrica Systems, Inc.System and method for continuous biometric monitoring
US11012403B1 (en)*2018-09-042021-05-18Facebook, Inc.Storylines: collaborative feedback system
US11861036B1 (en)*2018-09-182024-01-02United Services Automobile Association (Usaa)Systems and methods for managing private information
US20200110895A1 (en)*2018-10-032020-04-09International Business Machines CorporationSocial post management based on security considerations
US11010437B2 (en)2018-10-272021-05-18International Business Machines CorporationSocial media control provisioning based on a trusted network
US11003790B2 (en)*2018-11-262021-05-11Cisco Technology, Inc.Preventing data leakage via version control systems
US11194925B1 (en)*2018-12-182021-12-07NortonLifeLock Inc.User-based cyber risk communications using personalized notifications
US11194876B2 (en)2019-01-172021-12-07International Business Machines CorporationAssisting users to interact with message threads on social media
US10944743B2 (en)*2019-01-222021-03-09Adp, LlcRich communication services security authentication system
US11194969B2 (en)2019-01-312021-12-07International Business Machines CorporationManaging dialog comments
EP3696761A1 (en)2019-02-152020-08-19Wipro LimitedMethod and system for preventing upload of multimedia content with objectionable content into a server
US11763503B2 (en)*2019-02-252023-09-19Life Impact SolutionsMedia alteration based on variable geolocation metadata
US11126678B2 (en)*2019-03-052021-09-21Corinne Chantal DavidMethod and system to filter out harassment from incoming social media data
US10862854B2 (en)*2019-05-072020-12-08Bitdefender IPR Management Ltd.Systems and methods for using DNS messages to selectively collect computer forensic data
US11443263B2 (en)*2019-06-182022-09-13Heyhq, Inc.Organizational risk management subscription service
US11245959B2 (en)2019-06-202022-02-08Source Digital, Inc.Continuous dual authentication to access media content
CN110399748A (en)*2019-07-232019-11-01中国建设银行股份有限公司A kind of screenshot method and device based on image recognition
US11258741B2 (en)*2019-08-152022-02-22Rovi Guides, Inc.Systems and methods for automatically identifying spam in social media comments
US11677703B2 (en)2019-08-152023-06-13Rovi Guides, Inc.Systems and methods for automatically identifying spam in social media comments based on context
WO2021038271A2 (en)*2019-08-242021-03-04Hussaini Al Anizi Abdullah Mufadhi Fadgham AlSystem and method for establishing communications, attaining evaluation and feedback regarding multiple categories
US11334604B2 (en)2019-09-122022-05-17Snowflake Inc.Private data exchange
US10798100B1 (en)2019-09-122020-10-06Snowflake Inc.Managing membership in a private data exchange
US11184476B2 (en)*2019-10-012021-11-23International Business Machines CorporationPreventing photo image related risks
US11275788B2 (en)2019-10-212022-03-15International Business Machines CorporationControlling information stored in multiple service computing systems
US10963588B1 (en)2019-10-302021-03-30International Business Machines CorporationAnalyzing recordings for data to be protected and identifying recipients and alerts
US11418545B2 (en)2019-10-312022-08-16Blackberry LimitedShared image sanitization method and system
US11755775B2 (en)2019-11-072023-09-12International Business Machines CorporationUpload management
US11709962B2 (en)*2019-12-112023-07-25International Business Machines CorporationConfidential information identification based upon communication recipient
WO2021124559A1 (en)*2019-12-202021-06-24三菱電機株式会社Information processing device, information processing method, and information processing program
CN111160220B (en)*2019-12-262022-07-22厦门市美亚柏科信息股份有限公司Deep learning-based parcel detection method and device and storage medium
US11468142B1 (en)2020-03-212022-10-11Menlo Security, Inc.Managing content uploads
US20210304341A1 (en)*2020-03-262021-09-30International Business Machines CorporationPreventing disclosure of sensitive information
US11805138B2 (en)*2020-04-212023-10-31Zscaler, Inc.Data loss prevention on images
US11971995B2 (en)*2020-07-152024-04-30Kyndryl, Inc.Remediation of regulatory non-compliance
US11561907B2 (en)2020-08-182023-01-24Micron Technology, Inc.Access to data stored in quarantined memory media
US11539692B2 (en)2020-08-182022-12-27Micron Technology, Inc.Setting based access to data stored in quarantined memory media
US11887130B2 (en)*2020-09-112024-01-30International Business Machines CorporationComputer application content detection and feedback
US11868503B2 (en)2020-11-242024-01-09International Business Machines CorporationRecommending post modifications to reduce sensitive data exposure
US12047355B2 (en)*2021-03-082024-07-23Adobe Inc.Machine learning techniques for mitigating aggregate exposure of identifying information
US11190550B1 (en)*2021-04-222021-11-30Netskope, Inc.Synthetic request injection to improve object security posture for cloud security enforcement
US11336698B1 (en)2021-04-222022-05-17Netskope, Inc.Synthetic request injection for cloud policy enforcement
US11647052B2 (en)2021-04-222023-05-09Netskope, Inc.Synthetic request injection to retrieve expired metadata for cloud policy enforcement
US11184403B1 (en)2021-04-232021-11-23Netskope, Inc.Synthetic request injection to generate metadata at points of presence for cloud security enforcement
US11178188B1 (en)2021-04-222021-11-16Netskope, Inc.Synthetic request injection to generate metadata for cloud policy enforcement
WO2022226208A1 (en)*2021-04-222022-10-27Netskope, Inc.Synthetic request injection to improve object security posture for cloud security enforcement
US11303647B1 (en)2021-04-222022-04-12Netskope, Inc.Synthetic request injection to disambiguate bypassed login events for cloud policy enforcement
US11271972B1 (en)2021-04-232022-03-08Netskope, Inc.Data flow logic for synthetic request injection for cloud security enforcement
US11271973B1 (en)2021-04-232022-03-08Netskope, Inc.Synthetic request injection to retrieve object metadata for cloud policy enforcement
US11943260B2 (en)2022-02-022024-03-26Netskope, Inc.Synthetic request injection to retrieve metadata for cloud policy enforcement
US12061783B2 (en)2022-02-222024-08-13International Business Machines CorporationData monitor for detecting unintentional sharing of content
US20240095757A1 (en)*2022-09-162024-03-21Regulatory Education Events, LLC dba Supplement Advisory GroupSystems and methods for compliance, keyword finder, and training tool
US12373559B1 (en)2022-10-032025-07-29Menlo Security, Inc.Secure archive explorer
US12309152B2 (en)*2023-08-152025-05-20Citibank, N.A.Access control for requests to services

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20110125697A1 (en)*2009-11-202011-05-26Avaya Inc.Social media contact center dialog system
US20120246104A1 (en)*2011-03-222012-09-27Anna Maria Di SciulloSentiment calculus for a method and system using social media for event-driven trading
US20120260209A1 (en)*2011-04-112012-10-11Credibility Corp.Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility
US8495709B1 (en)*2008-09-172013-07-23Socialware, Inc.Method, system, and storage medium for secure communication utilizing social networking sites
US20130290317A1 (en)*2012-02-172013-10-31Bottlenose, Inc.Natural language processing optimized for micro content
US8661327B1 (en)*2011-01-062014-02-25Intuit Inc.Method and system for automated insertion of relevant hyperlinks into social media-based communications
US20140180788A1 (en)*2009-08-192014-06-26Oracle International CorporationMethod and system for implementing a cloud-based social media marketing method and system
US9449109B1 (en)*2004-04-292016-09-20Eversitas, LLCVisualizing, sharing and monetizing multimedia content
US10540660B1 (en)*2010-05-192020-01-21Adobe Inc.Keyword analysis using social media data

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1738323A4 (en)2004-03-152009-02-04Aol LlcSharing social network information
WO2006047879A1 (en)2004-11-042006-05-11Topeer CorporationSystem and method for creating a secure trusted social network
US20080109244A1 (en)2006-11-032008-05-08Sezwho Inc.Method and system for managing reputation profile on online communities
US7886334B1 (en)2006-12-112011-02-08Qurio Holdings, Inc.System and method for social network trust assessment
US7895284B2 (en)2007-11-292011-02-22Yahoo! Inc.Social news ranking using gossip distance
WO2010011747A1 (en)2008-07-222010-01-28New Jersey Institute Of TechnologySystem and method for protecting user privacy using social inference protection techniques
US8312276B2 (en)2009-02-062012-11-13Industrial Technology Research InstituteMethod for sending and receiving an evaluation of reputation in a social network
US8320617B2 (en)2009-03-272012-11-27Utc Fire & Security Americas Corporation, Inc.System, method and program product for camera-based discovery of social networks
US9277021B2 (en)2009-08-212016-03-01Avaya Inc.Sending a user associated telecommunication address
US8306922B1 (en)2009-10-012012-11-06Google Inc.Detecting content on a social network using links
US10034034B2 (en)2011-07-062018-07-24Symphony Advanced MediaMobile remote media control platform methods
US20120311034A1 (en)2011-06-032012-12-06Cbs Interactive Inc.System and methods for filtering based on social media
US20120323627A1 (en)*2011-06-142012-12-20Microsoft CorporationReal-time Monitoring of Public Sentiment
US20130018823A1 (en)*2011-07-152013-01-17F-Secure CorporationDetecting undesirable content on a social network
US20130091274A1 (en)*2011-10-062013-04-11Family Signal, LLCProcess for Monitoring, Analyzing, and Alerting an Adult of a Ward's Activity on a Personal Electronic Device (PED)
US20130124644A1 (en)2011-11-112013-05-16Mcafee, Inc.Reputation services for a social media identity
US8601596B2 (en)2011-12-132013-12-03Facebook, Inc.Using social signals to identify unauthorized content on a social networking system
US20130262188A1 (en)2012-03-272013-10-03David Philip LeibnerSocial media brand management
US20150127748A1 (en)*2012-04-132015-05-07Google Inc.Recommendations for enhanced content in social posts
US9747372B2 (en)2012-04-172017-08-29Proofpoint, Inc.Systems and methods for discovering social accounts
US20130339062A1 (en)*2012-06-142013-12-19Seth BrewerSystem and method for use of social networks to respond to insurance related events
US9374374B2 (en)2012-06-192016-06-21SecureMySocial, Inc.Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US9237386B2 (en)*2012-08-312016-01-12Google Inc.Aiding discovery of program content by providing deeplinks into most interesting moments via social media
US20140324719A1 (en)*2013-03-152014-10-30Bruce A. CanalSocial media screening and alert system
US9055097B1 (en)2013-03-152015-06-09Zerofox, Inc.Social network scanning

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9449109B1 (en)*2004-04-292016-09-20Eversitas, LLCVisualizing, sharing and monetizing multimedia content
US8495709B1 (en)*2008-09-172013-07-23Socialware, Inc.Method, system, and storage medium for secure communication utilizing social networking sites
US20140180788A1 (en)*2009-08-192014-06-26Oracle International CorporationMethod and system for implementing a cloud-based social media marketing method and system
US20110125697A1 (en)*2009-11-202011-05-26Avaya Inc.Social media contact center dialog system
US10540660B1 (en)*2010-05-192020-01-21Adobe Inc.Keyword analysis using social media data
US8661327B1 (en)*2011-01-062014-02-25Intuit Inc.Method and system for automated insertion of relevant hyperlinks into social media-based communications
US20120246104A1 (en)*2011-03-222012-09-27Anna Maria Di SciulloSentiment calculus for a method and system using social media for event-driven trading
US20120260209A1 (en)*2011-04-112012-10-11Credibility Corp.Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility
US20130290317A1 (en)*2012-02-172013-10-31Bottlenose, Inc.Natural language processing optimized for micro content

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20230199008A1 (en)*2020-06-302023-06-22Sequoia Benefits and Insurance Services, LLCUsing machine learning to detect malicious upload activity
US11936670B2 (en)*2020-06-302024-03-19Sequoia Benefits and Insurance Services, LLCUsing machine learning to detect malicious upload activity
US20240179157A1 (en)*2020-06-302024-05-30Sequoia Benefits and Insurance Services, LLCUsing machine learning to detect malicious upload activity
US12316654B2 (en)*2020-06-302025-05-27Sequoia Benefits and Insurance Services, LLCUsing artificial intelligence to detect malicious upload activity

Also Published As

Publication numberPublication date
US9813419B2 (en)2017-11-07
US9374374B2 (en)2016-06-21
US10084787B2 (en)2018-09-25
US20200351269A1 (en)2020-11-05
US10771464B2 (en)2020-09-08
US20130340089A1 (en)2013-12-19
US20200236109A1 (en)2020-07-23
US11438334B2 (en)2022-09-06
US20170374072A1 (en)2017-12-28
US20150381628A1 (en)2015-12-31

Similar Documents

PublicationPublication DateTitle
US11438334B2 (en)Systems and methods for securing social media for users and businesses and rewarding for enhancing security
Thomas et al.Sok: Hate, harassment, and the changing landscape of online abuse
US11134097B2 (en)Automated social account removal
US11418527B2 (en)Malicious social media account identification
Matias et al.Reporting, reviewing, and responding to harassment on Twitter
Redmiles" Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response
Chen et al.Exploring internet security perceptions and practices in urban ghana
US11165801B2 (en)Social threat correlation
MennieSocial media risk and governance: Managing enterprise risk
US20190036937A1 (en)Social network page protection
Wilkinson et al.Many islands, many problems: An empirical examination of online safety behaviors in the caribbean
TaylorThe privatization of human rights: Illusions of consent, automation and neutrality
US20160234147A1 (en)Integrated Digital Filtering System
Samermit et al.{“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators
Nyoni et al.Emerging internet technologies and the regulation of user privacy
DevPrivacy-preserving conversational interfaces
HudaibComprehensive social media security analysis & xkeyscore espionage technology
MasekoRemedies to reduce user susceptibility to phishing attacks
Trevathan et al.Anti-social networking?
DeibertCommunities@ risk: Targeted digital threats against civil society
DossTime for a New Tech-Centric Church-Pike: Historical Lessons from Intelligence Oversight Could Help Congress Tackle Today's Data-Driven Technologies
LancasterA Quantitative Study on How Personality Affects the Ability to Detect Phishing
HanA Security Perspective on Designing Safer Sociotechnical Systems
Musa et al.Emerging Trends in Phishing: A Look at Smishing, Vishing, Quishing
MishraSECURE USE OF SOCIAL NETWORKING SITES

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SECUREMYSOCIAL, INC., NEW JERSEY

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STEINBERG, JOSEPH;RUBINOFF, SHIRA;REEL/FRAME:057850/0919

Effective date:20160513

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp