The present disclosure generally relates to electronic communication methods and systems including those utilizing the Internet and cloud-based solutions. More particularly, examples of the disclosure relate to electronic communication methods and systems that can mitigate connecting with undesirable social media contacts by comparing a potential social media contact to a database of trusted contacts.
Mobile and web applications allow users, such as operators of smartphones and other computing devices as well as tablets, laptop, notebook, and desktop computers, to perform a wide range of communication functions. Of course, one continuing use of smartphones and computing devices (together “user devices” and singly a “user device”) is to access and participate in communications on one or more social media platforms with friends, family, co-workers, groups, organizations, and other entities. While not a new problem, an ongoing and challenging issue is how to detect and block (or reject) a connection to an unwanted (or undesirable) contact.
In recent years, undesirable potential contacts, such as scammers and others, attempt to have a user connect on a social media platform. The undesirable contact may send a connection request, such as a “friend” request, which can be an invitation for the user to connect to someone or some entity, or join a group, or open a message appearing to originate from a legitimate social media contact. Once connected, the undesirable contact may hack the social media account of the user to obtain personal information, or obtain and send messages to the user's existing contacts (sometimes under the guise of being the user), or render the user's account inaccessible or unusable, or post unwanted content on the user's site, or send unwanted communications to the user. Sometimes the undesirable contact is motivated by malicious intent to harm the user, the user's social media account, or the user's reputation.
Most social media platforms have few or no filters, warnings, or verification protocols and users can unwittingly connect to undesirable contacts. There is presently no solution to successfully address this deficiency in existing social media platforms, although reported egregious behavior may result in the undesirable contact's profile being temporarily or permanently shut down, but the damage to the user may have already been done, and an undeniable contact often can simply create a new profile.
Any discussion of problems provided in this section has been included in this disclosure solely for the purposes of providing a background for the present invention and should not be taken as an admission that any or all of the discussion was known at the time the invention was made.
The subject matter of the present disclosure is particularly pointed out and distinctly claimed in the concluding portion of the specification. A more complete understanding of the present disclosure, however, may best be obtained by referring to the detailed description and claims when considered in connection with the drawing figures, wherein like numerals denote like elements and wherein:
It will be appreciated that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of illustrated embodiments of the present invention.
The disclosure of U.S. patent application Ser. No. 17/033,582, filed Sep. 25, 2020 and entitled “Communication System for Mitigating Incoming Spoofed Callers Using Social Media,” is incorporated herein by reference.
The description of exemplary embodiments of the present invention provided below is merely exemplary and is intended for purposes of illustration only; the following description is not intended to limit the scope of the invention disclosed herein. Moreover, recitation of multiple embodiments having stated features is not intended to exclude other embodiments having additional features or other embodiments incorporating different combinations of the stated features.
As set forth in more detail below, exemplary embodiments of the disclosure relate to electronic communication systems, and corresponding methods performed by such systems, that can, for example, improve a user's ability to connect to trusted contacts. In brief, the system (and corresponding method(s) implemented by such a system) is adapted for mitigating (e.g., identifying, controlling, blocking, and the like) undesirable social media contacts through the use of a trusted contacts database.
As used herein, the terms application, module, analyzer, engine, and the like can refer to computer program instructions, encoded on computer storage medium for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions can be encoded on an artificially-generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, which is generated to encode information for transmission to suitable receiver apparatus for execution by a data processing apparatus. A computer storage medium can be, or be included in, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination of one or more of the substrates and devices. Moreover, while a computer storage medium is not a propagated signal, a computer storage medium can be a source or destination of computer program instructions encoded in an artificially-generated propagated signal. The computer storage medium can also be, or be included in, one or more separate physical components or media (e.g., solid-state memory that forms part of a device, disks, or other storage devices).
The trusted contacts in the one or more trusted contacts directories and in trusted contacts database 140 are those of the user and could include one or more of (1) work contacts (such as fellow employees, customers, clients, vendors, and/or contractors) (2) former work contacts, (3) friends, (4) family members, (5) social media contacts that are already connections and trusted contacts from one or more social media sites other than social media platform 130, and/or (6) potentially, depending upon the user's preference or the parameters of system 100, contacts, members, or groups of any of (1)-(5), above.
A trusted contact may be an individual, social or special interest group (such as groups pertaining to sports, nature, school alumni, music, or politics) business, or other entity or organization. Thus, the trusted contacts directories could be Outlook contacts, social media contacts, or other electronically available contacts lists.
In
In
Social media platform 130 may be indirectly accessible by user device 120 over the communications network 104 via connections 122 and 106, or directly accessible via link 250. The social media platform 130 may be Twitter™, Instagram™, LinkedIn™ Facebook™, or the like, as the present invention is useful with essentially any social media server, such as server 214.
User device 120 can be or can include any suitable device with wired or wireless communication features that can connect to communications network 104 and/or directly to social media platform 130. For example, user device 120 can be either a wearable device, a tablet, a computer, a wired phone, a mobile (or cellular) phone, a personal (e.g., laptop or desktop) computer, a streaming device, such as a game console, or other media streaming device.
As shown in
User device 120 may be used to store, create, or assist in creating one or more trusted contacts directories via connection 108 (such as first trusted contact directory 142 and/or second trusted contact directory 144, although there may be any number of trusted contact directories) that collectively form or are stored in a trusted contacts database 140. In this regard, a user may utilize user device 120 to store into memory 246, either by typing or automatically, such as by using a link or command, contact information for a trusted contact.
User device 120 is in communication with a trusted contacts database 140, which may be located in user device 120 or be remote to user device 120. Trusted contacts database 140 includes contacts of the user from one or more trusted contact directories, and a first trusted contacts directory 142 and a second trusted contacts directory 144 are shown in this exemplary embodiment. Alternatively, trusted contacts database 140 may be comprised of one or more trusted contacts directories. Trusted contacts database 140 may be remote to user device 120 and communicate directly with communications network 104 via link 114, wherein communications network 104 communicates with user device 120 via link 122.
Processor 232 may, in some embodiments, have a default stored in memory 246 to accept or rejection connection requests, or the default can be set by the user of user device 120. For example, the memory 246 may be configurable to instruct processor 232 to automatically accept connection requests 222 from potential contacts that are in the trusted contacts database 140 and/or to automatically reject connection requests 222 from potential contacts that are not in the trusted contacts database 140.
When a potential social media contact (or “potential contact”) attempts to connect 222 on social media platform 130 with the user, social media server 214 communicates via link 106 through communications network 104 (or directly to I/O 234 and processor 232 via link 250) of the connection attempt. Processor 232 compares the potential contact identity 224 to the trusted contacts database 140 to determine if the potential contact is or is not a trusted contact.
Processor 232 than causes display 236 to display a connect message 238, wherein the connect message 238 alerts the user that the potential contact has sent a connection request 222 to connect to the user, the identification 224 of the potential contact, and whether the potential contact is in the trusted contacts database 140. The message 238 may take the form of an alert, an icon, and/or a message identifying the potential contact and whether the potential contact is a trusted contact, allowing the operator of the user device 120 to allow or prevent/block the requested connection from potential contact C.
The processor 232 further operates to execute code/instructions and/or run software loaded onto device 120 (e.g., onto memory 246, onto processor 232, or into social media app 240) to provide the functionality of social media app 240. Memory 246 may also be used to store data (at least temporarily) for display 236 and/or for the first trusted contacts directory 142, or it may store trusted contact information and part of trusted contacts database 140.
Processor 232 can then cause display 236 to show a connecting message 238 that includes at least the identity of the potential contact and whether the potential contact is a trusted contact. The user can then utilize GUI 237 to accept or decline the connection 228. The social media application 240 also can also be programed automatically or by the user to simply reject a connection if the potential contact is not in the trusted contacts database 140 and/or accept a connection if the potential contact is in the trusted contacts database 140. In some cases, the potential contact may be indicated on display 236 as being a trusted contact or not being a trusted contact by using a notification (e.g., <Incoming_Contact_Name> is a “◯ Trusted Contact” (with the circle being shown green or otherwise indicating the potential contact is a trusted contact). A red circle would indicate that the potential contact is not a trusted contact.
Alternatively, the user could set user device 120 to be selective in automatically accepting and/or rejecting potential contacts. For example, using GUI 237 the user may instruct processor 232 and social media App 240 to block or accept defined potential contacts, for example, “Block all contacts except those that are members of my ‘I Love Nature’ site,” or “Block all contacts with connections to the ‘How to Build a Bomb’ site), and/or “Connect to all members of my ‘Classic rock music’ site,” or “Connect to all members of my ‘College alumni’ site.”
Display 236 may also show additional information stored in trusted database 140 about the potential contact if it is a trusted contact. The information may include one or more of the following regarding the potential contact: (1) the nature of other contacts between the user and the potential contact, (2) information described above that may be in the trusted contacts database 140, (3) address, (4) phone number, (5) employer, (6) work title, and (7) email address. Display 236 may automatically show the additional information or the user may instruct processor 232 to show the additional information on display 236.
The social media platform 130, which may be provided via one or more servers and data storage devices, includes one or more processors 212 running software or executing code/instructions 213 to provide functions of both a social media platform server 214 (e.g., to provide social media services by interacting with social media application 240 in client device 120). The one or more processors 212 manage access to data storage 220. The data storage 220 is used to store in one or more databases 222, which includes the potential contact requests 222 to connect to the user, which further includes at least the identification 224 of the potential contact. Other optional information in identification 224 could include (1) mutual connections on social media platform 130 between the user and the potential contact, (2) any past attempts to connect to the user, and (3) any prior disconnections (e.g., unfriending) between the user and the potential contact and which party initiated the disconnection.
In step 306 a potential contact on social media platform 130 attempts to connect 222 to the user, such as by sending a friend request, or sends a request for the user to join a group, or to otherwise connect. After the request to connect (222/step 306), which includes the identify 224 of the potential connection, it is transmitted to and received by the social media application 240 of user device 120.
At step 308 processor 232 queries trusted contacts database 140 to determine whether the potential contact is a trusted contact. Processor 232 then causes display 236 to display a connecting message that includes at least the identity of the potential contact and whether the potential contact is a trusted contact (step 310) or is not a trusted contact (step 318).
If the potential contact is a trusted contact (step 310) user device 120 may optionally assign a trust rating (step 312) to the potential contact. The trust rating may be on a scale, for example, A-C, with A being the highest level of trust and C being the lowest, or from 1-5 with 1 being the highest level and 5 being the lowest. The trust rating could be based on one or more of any of the factors described above with respect to how members in the trusted contacts database are determined. And the user may enter trust ratings into user device 120 for various types of trusted contacts based on personal preferences and/or past experience.
At step 314, processor 232 causes display 216 to show at least the identification of the potential contact and whether the potential contact is a trusted contact. At step 314 the processor may also cause display 216 to display, or provide a link, to one or more of the following to the extent available: (1) the potential contact's trust rating (if any) as assigned by processor 232, (2) optional information in identification 224 as described above, and (3) the nature of other contacts between the user and the potential contact, (4) information described above that may be in the trusted contacts database 140, (5) address, (6) phone number, (7) employer, (8) work title, and (9) email address.
At step 316 the user transmits a message via social media app 240 to social media platform 130 to either connect or not to connect to the potential contact. Alternatively, in step 316A, user device 120 automatically sends a message to connect to the potential contact if the potential contact is in trusted database 140 (and otherwise meets criteria entered into user device 120 by the user), and automatically sends a message to not connect to the potential contact if the potential contact is not in the trusted database 140 (and does not fall into an exception entered into user device 120 by the user).
Turning to step 318, if the potential social media contact is not a trusted contact in trusted contacts database 140, user device 120 may automatically signal social media platform 130 to reject the potential contact's request to connect at step 320. Alternatively, the potential contact who is not a trusted contact may still be shown on display 236 of user device 120 at step 314 so the user can make a final determination at step 316 of whether to connect to the potential contact.
It will be appreciated from the above description that the communication systems taught herein may be used to provide auto-verification of potential contacts in real time using a cost effective and pre-established trusted contacts database 140. Such levels of “trust” can be configured or defined for the user. Note, the “trust” may be applied on a person-by-person level and/or may be applied to groups of possible potential contacts including businesses or organizations.
The present invention has been described above with reference to a number of exemplary embodiments and examples. It should be appreciated that the particular embodiments shown and described herein are illustrative of the invention and its best mode and are not intended to limit in any way the scope of the invention as set forth in the claims. The features of the various embodiments may stand alone or be combined in any combination. Further, unless otherwise noted, various illustrated steps of a method can be performed sequentially or at the same time, and not necessarily be performed in the order illustrated. It will be recognized that changes and modifications may be made to the exemplary embodiments without departing from the scope of the present invention. These and other changes or modifications are intended to be included within the scope of the present invention, as expressed in the following claims.