Computer-implemented method for improving a social network site computer network, and terminal, system and computer readable medium for the same

ABSTRACT

A method, at a terminal in a digital communications network, comprising: establishing direct or indirect communication access and linkage between the user-operated terminal and at least one remote computer(s) on which are stored, or by which access is available to prevent legible display of, stored user account object data; displaying indicia, or broadcasting data, representative of or indicating one or more predetermined criteria for selecting a subset of the stored user account object data; collecting data, representative of, or indicating, only the subset of the stored user account object data; and transmitting instructions to prevent legible display of the subset of the stored user account object data, according to the collected data representative of, or indicating, the one or more predetermined criteria for selecting the subset of the stored user account object data, from the terminal to the at least one remote computer(s). A terminal, system, and computer readable medium are also disclosed.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. patent application Ser. No.15/206,340, filed Jul. 11, 2016, under 35 U.S.C. § 120, which claims thebenefit of U.S. patent application Ser. No. 14/712,882, filed May 14,2015, under 35 U.S.C. § 120, which claims the benefit of U.S. patentapplication Ser. No. 62/098,305, filed Dec. 30, 2014, under 35 U.S.C. §119(e), the entire contents all of which are hereby incorporated hereinby reference.

TECHNICAL FIELD

The present disclosure relates to a computer-implemented method for oneor more of increasing data processing efficiency and improving datasecurity, of one or more computers communicatively connected to adigitally stored and operated social network site computer network; anda terminal, a system and a computer-readable medium for the same.

BACKGROUND

Current attempts to control the shear amount, the digital manipulation,the aggregation, and the dissemination of sensitive personal informationstored across computer-implemented social network site storage networksare resource, energy, and time consuming. These attempts consumeresources, energy, and time—on all three of individual, organizationaland large-and-mega-scale digital computer server and non-servernetworks.

Some advocate abstinence or discontinued use, which negates thetechnological advantages of social network site computer networks.

Others suggest sacrificing security by allowing all information toproliferate without reservation or with minimal reservation, whichcauses an overabundance of distributed content.

Still others teach identification management by identifying Facebook®and Twitter® content containing text (e.g., profanity) or objects inphotos (e.g., beer cans), which have been previously defined in ablacklist. Blacklist techniques suffer from several problems such as theinability to technically scale them for network-wide use, such thatlarge volumes of data cannot be managed. They also lead to falsepositives, wherein valued objects are unduly deleted.

On an individual scale, it is estimated that, for example, an averageFacebook user account stores nearly 8500 new data objects per year,which it is estimated would take more than two days to identify anddelete on an item-by-item basis assuming that it takes about 5 secondsto identify and remove each object.

It would be desirable to provide a more effective method of creatingmore efficient digital privacy management, which would reduce thestorage space required to store, the bandwidth to aggregate andcalculate, and/or the computing resources, time, and energy previouslyrequired, especially as regarding management of redundant and private,sensitive personal data.

SUMMARY

As used herein, an “account user terminal” is a terminal authorized, viaa unique set of social network site account user-held accesscredentials, to control a particular social network site user dataprofile assigned or related to a particular social network site accountuser.

First and second aspects of the disclosure may or may not be directed torespective method and computer readable medium (or alternatelythroughout “computer storage apparatus”) causing operations, for eachcomprising any one or more of: collecting or accessing data uniquelyrepresentative of, or uniquely indicating, one or more social networksite user account(s) and transmitting data necessary to access andcontrol the one or more digitally stored and operated social networksite user account(s) to at least one computer(s); establishing direct orindirect communication access and linkage between the terminal and theat least one computer(s) on which are stored, or by which access isavailable to control, stored user account object data that were input ormodified during prior access to and control over the one or more socialnetwork site user account(s) or associated social network site useraccount(s) that at some prior time had permission to edit data in, orappend data to, the stored user account object data of the one or moresocial network site user account(s), the stored user account data of theone or more user account(s) uniquely accessible based on access datadigitally pre-assigned to the one or more social network site useraccount(s); displaying indicia, or broadcasting data, representative ofor indicating one or more predetermined criteria for selecting a subsetof the stored user account object data; collecting data representativeof, or indicating, the subset of the stored user account object databased on the one or more predetermined criteria for selecting the subsetof the stored user account object data that were input or modifiedduring prior access to and control over the one or more user account(s)or associated social network site user account(s) that at some priortime had permission to edit data in, or append data to, the user accountobject data of the one or more user account(s); and transmittinginstructions to prevent display of the subset of the stored user accountobject data at every user account terminal in the social network sitecomputer networks, according to the collected data representative of, orindicating, the one or more predetermined criteria for selecting thesubset of the stored user account object data, from the terminal to theat least one remote computer(s); wherein the instructions are calculatedto prevent the display of the selected subset of the stored user accountobject data at at least one user account terminal in the social networksite computer network, based on the one or more predetermined criteria.

Third and fourth aspects of the disclosure may or may not be directed torespective processor-based terminal and processor-based system, eachcomprising any one or more of: a first module arranged to collect oraccess data uniquely representative of, or uniquely indicating, the oneor more social network site user account(s) and transmitting datanecessary to access and control the one or more digitally stored andoperated social network site user account(s) to at least one remotecomputer(s); a second module arranged to establish direct or indirectcommunication access and linkage between the terminal and the at leastone remote computer(s) on which are stored, or by which access isavailable to control, stored user account object data that were input ormodified during prior access to and control over the one or more socialnetwork site user account(s) or associated social network site useraccount(s) that at some prior time had permission to edit data in, orappend data to, the stored user account object data of the one or moresocial network site user account(s), the stored user account data of theone or more user account(s) uniquely accessible based on access datadigitally pre-assigned to the one or more social network site useraccount(s); a third module arranged to display indicia, or broadcastdata, representative of or indicating one or more predetermined criteriafor selecting a subset of the stored user account object data; a forthmodule arranged to collect data representative of, or indicating, thesubset of the stored user account object data based on the one or morepredetermined criteria for selecting the subset of the stored useraccount object data that were input or modified during prior access toand control over the one or more user account(s) or associated socialnetwork site user account(s) that at some prior time had permission toedit data in, or append data to, the user account object data of the oneor more user account(s); and a fifth module arranged to transmitinstructions to prevent display of the subset of the stored user accountobject data at every user account terminal in the social network sitecomputer networks, according to the collected data representative of, orindicating, the one or more predetermined criteria for selecting thesubset of the stored user account object data, from the terminal to theat least one remote computer(s); wherein the instructions are calculatedto prevent display of the selected subset of the stored user accountobject data at at least one user account terminal of the social networksite computer network, based on the one or more predetermined criteria.

Additional or alternative aspects of the disclosure are found in theappended claims. Further aspects, embodiments, features, and advantagesof the embodiments, as well as the structure and operation of variousembodiments are described in detail below with reference to accompanyingdrawings.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings, which form a part of the specification andare to be read in conjunction therewith, and in which like referencenumerals are used to indicate like features in the various views:

FIG. 1 is a schematic diagram of three exemplary digitally stored andoperated social network site computer network environments, in whichembodiments may be implemented;

FIG. 2 is a diagram of software components, according to an embodiment;

FIG. 3 is a flow diagram showing an exemplary overall operation,according to an embodiment;

FIG. 4 illustrates an example computer useful for implementingcomponents of the embodiments, along with several network features thatmay be used in embodiments; and

FIG. 5 illustrates an exemplary embodiment of the computer of FIG. 4 ina mobile terminal.

DETAILED DESCRIPTION

Embodiments of the disclosure are concerned with the calculation of oneor more data set transformation instructions, in certain cases thetransmission of those instructions to at least one remote computer(s)(e.g., but not limited to, any combination of one or more of, a bank of,and geographically disparate communicatively connected, server(s) thatmanipulate user data). Ultimately, though not in certain method,terminal, system and computer-readable media embodiments, theseinstructions may or may not also be executed at one or more server(s),storage device(s) or other computer hardware holding or capable ofselectively preventing display of the data set(s) being operated on.

The data available for viewing on a user account terminal of a socialnetwork site computer network are reduced by one or more of deletingdata from one or more storage devices or data structures, restrictingdata transmission through the network, disabling receipt of transmitteddata, and non-legible display or data to one or more user accountterminals in the social network site computer network.

Though un-expectantly, it becomes apparent that data security andtechnological leveraging seemingly cannot coexist, creating atechnically derived tension. For example, the social network website,Facebook® boasts about 829 million daily active users. Every day, theseusers upload more than 4.75 billion items of content (e.g., statusupdates, wall posts, photos, videos, comments, tags and other metadata),‘like’ more than 4.5 billion items, and send more than 10 billionmessages,—contributing to the 600 terabytes of data collected byFacebook® every day. This unprecedented deluge of information revelationcan be attributed to the technical efficiencies provided by itsparticular digital interaction platform. Other social network sitespresent similar challenges, including but not limited to Twitter®.LinkedIn®, Instagram®, Snapchat®, etc.

It is also realized un-expectantly that, yet, because the advantage ofwidespread identity revelations require an audience, leveraging thetechnical advances necessarily means relationships, which are impossiblewithout others—sometimes others who on a wide-scale network at somepoint tend to misuse or compromise such data.

In embodiments, certain of the below-indicated non-limiting technicaladvantages and/or others, each of which depend upon what particularcombination of features disclosed herein is found in an embodiment, arerealized only upon persistent and arduous study through both (a)discovering the very existence of the above-indicated technical tension,and (b) inventing the technical solutions disclosed in part herein.

In embodiments, resulting deletion, non-transmission, non-receipt, ornon-legible display, and/or non-display of user-designated private orpersonal data thereby frees up processing resources both at anindividual level such as at a terminal, and all the more socollectively, across even a global network of data storage andprocessing infrastructure facilitating the ebb and flow of personal andbusiness related data of millions, if not even billions, of socialnetwork site users. These embodiments quite un-expectantly provide theunpredictable result(s) of reducing unwanted, unnecessary, andprivacy-compromising data flow to and from various terminals and othercomputers communicatively connected to one or more digitally stored andoperated social network site(s).

In embodiments, operations by which data set transformations are madeimprove data security by preserving or reclaiming the privacy of certainuser account data objects.

In embodiments, operations by which data set transformations are madeincrease system operational efficiency at each terminal.

In embodiments, operations by which data set transformations are madestrike an optimal balance between improving data security by preservingor reclaiming the privacy of certain user account data objects on theone hand, and increasing system operational efficiency, on the otherhand, all the while allowing continued data exchange and aggregationbetween one or more user computers communicatively connected to at leastone digitally stored and operated social network site.

In embodiments, the outcomes (alternately or additionally) affect quiteunpredictable technical advantages of continued connectivity to one ormore such sites (full utilization of these sites' own inherentcommunication and data transfer efficiencies), while reducing thecomputing time and energy required to receive individual or step-by-stepimplementations of merely small batch instructions to remove orotherwise secure relatively very little user account information.

The following describes a system for managing social networking sitecomputer network data, according to embodiments illustrated in FIGS.1-5. FIG. 1 is a diagram of computer network 451 including threeexemplary environments, in which embodiments may be implemented. Whilethe following is described in terms of FIG. 1, the embodiments are notlimited to the environment(s) illustrated in FIG. 1. For example, anysystem having generally the structure of FIG. 1, or that would benefitfrom the operation, methods and functions as described herein may beused.

In exemplary embodiments, system 451 shows terminal clients 201-251 eachor collectively comprising one or more browser(s) 10 of terminal 247(browser also in each of other terminals, but not shown), which is/areused to connect to server(s) 500 over one or more networks W13, W14, andW15.

According to embodiments, browser 10 may include any device, applicationor module that enables a user or computer to navigate and/or retrievedata from another data source, typically over a network. Browser 10 mayinclude any conventional web browser such as those that are widelyavailable. According to further embodiments, browser 10 may also beconfigured to use any number of protocols, known now or developed in thefuture, including protocols such as HTTP, FTP, and underlying protocolssuch as TCP/IP or UDP. In embodiments, browser 10 is configured to run(or execute) web applications without a GUI as a headless browser. Webapplications are applications that can be hosted within a web browser orthose that can be accessed, for example, over a network such as theInternet or an intranet.

Browser 10 can further communicate with an input (not shown) to allow auser to input data, to input commands, or to provide other controlinformation to browser 10. Browser 10 may request content from one ormore server(s) 50, based on prior user input that is stored at one ormore terminal(s) or server(s) 50 before accessing server(s) 50, and uponwhich instructions later sent to server 50 are calculated. Server(s) 50may respond to the request by providing content back to browser 10 andclient 201 via network W13. Browser 10 may also be configured toretrieve content from server(s) 50 without user intervention.

In embodiments, network(s) W13, W14, and W15 can be any type of datanetwork or combination of data networks including, but not limited to, alocal area network (LAN) accessed locally or remotely such as via a VPN,a medium area network, or a wide area network such as the Internet.Network W13, for example, can be a wired or wireless network that allowsclient 247 and server(s) 50 to communicate with each other. Network W13can further support world-wide-web (e.g., Internet) protocols andservices.

Server(s) 50 provides content (e.g., web pages, applications (or“apps”), audio, video, etc.) that can be retrieved by client 247 overnetwork W13. Content retrieved by client 247 can be disseminated viabrowser 10. In various embodiments, server(s) 50 and/or browser 10includes one or more features of content manager 200, which is describedfurther below.

As illustrated in FIG. 1, in embodiments, terminal and/or system dataflow configurations selectively delete (or otherwise prevent(s) legibledisplay of) user account data with an unexpected technical efficiencynot previously seen, in view of the above seemingly irreconcilabletensions. A base functional component of one aspect of the disclosure iscomposed of at least one of a plurality of terminals 201 to 251,configured to be ordered by predetermined default settings oruser-selected settings and/or software instructions into one or moredynamically changing and rearranging user terminal groupings. Certainnetwork terminals and/or systems, e.g., system 451, connect and allowexchange of information between local or far flung terminals within andfrom at least, but not limited to, three distinct types of networks W13,W14, and W15.

In embodiments, terminal group 401 comprises terminals 201 to 215,terminal group 403 comprises terminals 217 to 233, and terminal group405 comprises terminals 235 to 251, each group and collective groupsillustrating flow of data, albeit on a very small scale, among andacross varied networks, such as clear network W13, darknet or darkwebW14 (e.g., employed via The Onion Router (Tor)), and peer-to-peernetwork W15 via at least one (or more) server(s) 50. Server(s) 50receive, store, retrieve and deliver, across and at numerous andgeographically disparate locations, user account data on one or moredatabases 600.

In embodiments, terminal and system operations may or may not in wholeor in part be effectuated, executed, or implemented on or via clearnetwork W13 (comprising at least all of, or just a portion of, terminalgroups 403 and 405) whereby individual terminals, server(s) 50, or acombination thereof, calculate the actions to be taken on respectivedata sets, and propagate(s) those actions out to the network viaserver(s) 50 and beyond to all other users.

In embodiments, terminal and system operations may or may not in wholeor in part effectuated, executed, or implemented on or via dark net W14(comprising at least all of, or just a portion of, terminal groups 401and 405) whereby individual terminals, server(s) 50, or a combinationthereof calculate the actions to be taken on respective data sets, andpropagate(s) those actions out to the network via server(s) 50 andbeyond to all other users.

In embodiments, terminal and system operations may or may not in wholeor in part effectuated, executed, or implemented on or via a peer topeer network W15 (comprising at least all of, or just a portion of,terminal groups 401 and 403) whereby one or more terminals, server(s)50, or a combination thereof, calculate the actions to be taken onrespective data sets, and propagate(s) those actions out to the network.

In embodiments, server(s) 50 execute instructions for user account datadeletion after a retention period—and not immediately upon server(s) 50receiving the instructions to delete certain data from one or moreterminals, and/or not immediately upon terminal(s) receiving theinstructions to delete certain data at one or more terminals.

In embodiments, at least one of terminals 201 to 251 transmitinstructions to server(s) 50 to execute instructions causing successfuldeletion of associated user account object data from database(s) 600. Inturn, associated account terminals, such as used by “friends” onFacebook®, may (or may not) receive alerting data indicating theeffectiveness of one or more of the herein disclosed embodiments,thereby creating an acceleration and scaling of at least several of thetechnical advantages of various herein disclosed embodiments.

In embodiments, each terminal may or may not be geographically remotefrom or local to the computers that access and control the storagedevices on which social network site user data are stored.

In embodiments, each terminal may or may not be part of one or moredevice set(s), the one or more device set(s) that may or may notcomprising only one or multiple-single user, entity (e.g., informalgroup) or participant—controlled, owned or used device(s).

In embodiments, any one or more of these terminal(s) or device set(s)may or may not include for example remote log-on and/or remote usage viaany Web-capable device to a Web-based ASP or peer-to-peer decentralizednetwork even though device ownership, possession and/or control is onlytemporary and/or through established via other-user-owned or installedapplications, such as by embedded or remote implementation via a widelyused social media site application or website.

In embodiments, client terminal 247 and server 50 can each beimplemented on a computing device. Such a computing device includes, butis not limited to, a personal computer, mobile device such as a mobilephone, workstation, embedded system, game console, television, set-topbox, or any other computing device that can support web browsing. Such acomputing device may include, but is not limited to, a device having aprocessor and memory for executing and storing instructions. Such acomputing device may include software, firmware, and hardware. Thecomputing device may also have multiple processors and multiple sharedor separate memory components. Software may include one or moreapplications and an operating system. Hardware can include, but is notlimited to, a processor, memory and graphical user interface display. Anoptional input device, such as a mouse or touch screen, may be used.

Software Modules

FIG. 2 illustrates content manager 200, according to embodiments.Content manager 200 may include one or more modules 1, 3, 5, and 7. Theterm “module” as used herein shall mean software, such as instructionsor code, but not hardware, such as a semiconductor hardwired logiccircuit in a processor.

Content manager 200 enables embodiments to delete server 50 and/ordatabase 600 content selections. In embodiments, content manager 200 canbe implemented in server 50 (e.g., as a server side component). In otherembodiments, content manager 200 can be implemented in browser 10. Inyet other embodiments, content manager 200 can be implemented in bothserver 50 and browser 10. As shown in FIG. 2, content manager 200 may ormay not include, access module 1, deletion indicia collection module 3,deletion module 5, and calculation module 7.

In embodiments, access module 1 optionally includes displaying orbroadcasting a request for credentials to access a social network siteuser account 11. It then may include accessing and/or collecting datarepresenting the account or accounts such as credentials 13. It may alsoinclude transmitting or receiving instructions to create a communicationlink between the relevant social network owned, controlled and/oroperated servers and/or social network site owned, controlled oroperated databases on which a social network site stores user data onone hand, and a terminal used to access the site on the other hand, inaccordance with an embodiment herein disclosed 15. It may also includecommunication and data transfer to access both objects uploaded to thesocial network site by a user and/or friends, or one or more usersassociated by the site to the account user 17.

In embodiments, the displaying, broadcasting and or transmittinginstructions to obtain or access user account credentials may be madefrom any one or more of an account user operated and/or controlledterminal, a third party operated and/or controlled terminal, and asocial network site operated and controlled terminal or server(s).

As used herein, display or displaying are respectively a type ofbroadcast or a type of broadcasting, and broadcast and broadcasting eachinclude any digital data signal transduction into one or morereadily-understandable-by-human form, and which may be limited tobroadcast by only one device or more than one device.

In embodiments, indicia collection module 3 includes display orbroadcast of indicia or data that seek entry of what type of criteriaare to be used to determine what account object data are to be deleted19. It may then include collecting or searching for object data thatmeet the criteria selected 21. It may then determine whether all suchdata are collected by verifying through a secondary search on awebserver portal such as Google® and comparing the collected data withwhat is found in the secondary search 23. If not, the request for whattype of data is to be deleted 19 and the search and collection 21 areperformed again. Once no additional secondary (or subsequent) searchobject data are found or identified, the results of the items in termsof their type identity, upload and/or storage-date marking, size, and/ortotal number of items, may be calculated and/or stored in a datastructure, such as in a table in a store at the terminal (or local tothe data and/or under the control of the social network site operators)25.

In embodiments, deletion module 5 may include preparing instructions todelete data including, but not necessarily limited to, all text objectsdefined according to the deletion criteria 27, all photographic objectsdefined according to the deletion criteria 29 and all video objectsdefined according to the deletion criteria 31. Module 5 may determine ifall objects previously and optionally stored in, for example, a terminaldata structure table are identified in the transmitted instructions 33,and if not, another request for the desired deletion criteria issolicited 19 to confirm what objects are to be deleted, followed byreprocessing. If all stored objects types or identities are accountedfor deletion module 5 may then transmit the requests to delete anddisplay that requests to delete the objects have been transmitted 56, orcontinue to further optionally to calculate what objects to delete inaccordance with the specific requirements of the social network site todelete at least one copy of the selected objects.

In embodiments, calculation module 7 may include specific calculation inaccordance with specific API and other requirements particular to eachsocial network site computer network, which may vary over time, varyfrom object to object, vary from object type to object type, vary fromO/S to O/S, and/or vary from account user to account user. Thesecalculations may include, for example, separate determinations for text35, photographs 37, and videos 39. The required calculation(s) (such asa particular set of instructions) may be available only internally tothe operators of the social network site, to account users, and/or tothe public at large, for example.

In embodiments, calculation module 7 may for example cause aterminal(s), upon failure to remove one or more data object(s), toreport the failure to one or more update computer(s) (either operatedand/or controlled by or not operated and/or controlled by those whooperate and/or control the social network site), e.g., but not limitedto one or more of Google® Analytics server(s). These failure results maybe one or more of digitally corrected by widely broadcasting update(s)(e.g., pushing out a revised version of instructions) such as tonon-limiting content manager 300 below. User notification(s) of theupdate(s) may or may not occur in either foreground or backgroundembodiments.

In particular embodiments, where a social network site computer networkserver or database data undergo change(s), e.g., in one or more datastructures, thereby causing failure(s), instructions from one or moreterminal(s) cause broadcasting of report of the failure to one or moreof (1) other use terminal(s) and (2) the one or more update computer(s),either (a) on the social network site computer network or (b)interfacing with one or more computers that are one or more of never,previously, currently, and subsequently, on the social network computernetwork. In embodiments, update instructions transmitted by the one ormore update computer(s) may be broadcast via, e.g., but not limited to,Google® Play and Apple® App Store.

For example, in one or more of both foreground and background mode(s),when a calculating module or other module(s) encounter(s) one or morechange to Facebook®'s website that prevents execution of data deletionor other instruction, one or more error description(s) of the problem(s)is/are transmitted to one or more update server.

Such description(s) may include, but need not include nor be limited toinclude, transmission of metadata such as regarding date, time,application version number for a particular terminal O/S (e.g., Androidor iOS) and/or level or type of service.

For example, instructions to perform a task of one or more module fromthe terminal(s) have corresponding specific instructions that may or maynot vary from, that may or may not depend on, and/or that may or may notbe based on, one or more metadata characteristic(s), such as the O/S orother characteristics of each terminal or set of terminals found in acurrent or prior report associated with that terminal(s). Thesevariances and characteristics for example may or may not include, when aterminal transmits instructions requesting action at Facebook® servers,those instructions/request(s) may be based on an expectation that therequest should contain certain pieces of information to have an intendedeffect.

In particular non-limiting embodiments, instructions may or may notinclude determining whether the expected one or more piece(s) ofinformation are present in the instructions. If so, then instructionsproceed. If not, at least one error report is calculated and/ortransmitted from the terminal(s) that fail to send (directly orindirectly) successful instructions, to the update computer(s).

In embodiments, if determining whether the expected one or more piece(s)of information are not present in the instructions, at least one errorreport is calculated and/or transmitted from a computer(s) other thanthe terminal(s) that fail to send (directly or indirectly) successfulinstructions (e.g., from computer(s) on which one or more of text,terminal model and/or O/S-specific features of error report, etc., arestored), to the update computer(s). Where many common sets of terminalinstructions—for example, regarding massive numbers of data objectsdeleted according to instructions from the same or like-featured phoneor O/S-specific web application—confront the same basic failures for thesame basic reasons; having such designated first party, second party orthird party servers will help allow scaling.

In embodiments, instructions, e.g. to connect to or select data from ageneral or specific data structure of Facebook®'s server or database,that do not receive a response or otherwise fail (after analysing aresponse to request access or data), cause further instructions totransmit an error report. In embodiments, problem description(s) and/orreports may be in part or in whole, pre-defined and pre-stored based onany one or more of (but not limited to), pre-defined message(s)describing the problem, filename(s) containing the instruction(s) thatled to the error(s), and the line number(s) in the filename containingthe instruction(s) that led to the error(s). If an error arises, thenthe module(s) may or may not proceed.

In foreground or background mode embodiments, the terminal(s) maypresent a terminal user(s) with the message “This app is currentlyunavailable.” In alternate foreground or background mode embodiments,terminal(s) may or may not ignore some errors and reschedule the taskfor a later time, until one or module instructions are patched before anext run (see below).

In embodiments, when an update computer(s) (e.g., Google® Analytics)receives an error report from a user terminal(s), the update computer(s)sends the report(s) to another terminal(s) (optionally one or more ofnever, previously, currently and subsequently) on the social networksite computer network, indicating the error(s) and/or source of theerror(s). This error report(s) is then used to identify one or more ofthe precise module instruction(s) that fail to work. One or more modulemay or may not be updated by one or more module that recalculateinstructions to create patch or new module instructions, which aredistributed to user terminal(s), e.g. as a new version available (e.g.,but not limited to, via Google® Play for Android or Apple® App Store).

In embodiments, a terminal's O/S will periodically check for app updates(e.g., via Google® Play or Apple® App Store) and may automaticallydownload and install such updates. Hence, by creating and distributingnew module version(s) to user terminal(s), terminal(s) includeup-to-date versions of modules. It follows that many terminal users willnever know that modules encountered a problem, because module(s) will beautomatically or manually fixed before a user notices any failure.

In embodiments, one or more modules include at least one reportingmechanism instructions to manage statistics. e.g., a module reports howmany statuses have been deleted, to Google® Analytics.

In alternate or additional embodiments, a terminal operating systemautomatically discovers the revised instructions transmitted due to thefailure(s) and update the instructions on the terminal.

After (or as soon as) calculating module 7 instructions for one or moreof connecting to, accessing or selecting data at, and deleting datafrom, a social network site server/database are calculated andtransmitted, a secondary search is made on the social network site,either immediately or at a time appropriate to account for any timedelay caused by a particular social network site in deleting objects, toverify whether each object is deleted 41. If not, the process beginsagain with any aspect of indicia collection module 3. If so, a messageto broadcast to the user to indicate any expected time delay, asnecessary 9.

Once complete deletion is independently verified, a message is displayedor otherwise broadcast to indicate successful object deletion 56. Inalternate embodiments, partial success, and for example, object byobject reporting may be broadcast to a user.

In embodiments, any one or more of the modules above or other modules inaccordance with other embodiments, may alternately be replaced byindividual means for performing one or more functions of the modules,steps, and individual features disclosed herein.

In embodiments, objects are deleted based on how long ago they areposted to an account. The terminal displays an adjustable objectretention selection period. For instance, it can be variously extendedas recently as one day, and as far back in time as 10 or even 20 years,though any time in years, months, days may be selected. Selection andsetting of the retention time affects what objects are deleted, suchthat all objects or all objects of a certain type are subjected todeletion when an instruction to delete objects is transmitted to the atleast one remote or local servers or storage devices on which theobjects are stored.

Non-limiting examples of object data that may be deleted include accountuser status text, videos, photographs, and URLs originally self-uploadedby an account user to an individual user account (which may or may notbe reported to other user accounts), and account user-identifying tagsthat are associated with photographic or video content. Non-limitingspecific examples are one or more of photographs and/or accompanyingtext object(s); videos and/or accompanying text object(s); URLs and/oraccompanying text object(s); self-posted comments and other usercomments on status text objects, videos, photographs, and URLs.

In embodiments, after objects are deleted instructions may betransmitted to search for the deleted object(s) either individually,immediately after its deletion is instructed, or only after all objectsin the selected subset are deleted. In accordance with whether an objectis found, a notification is displayed or broadcast, accounting for eachundeleted and/or deleted object is, either collectively or individually(on an object-by-object basis).

FIG. 3 illustrates method 300, which is an exemplary overall operationof content manager 200, according to embodiments in one or more terminal(or alternately in one or more server, or in any combination thereof).The following workflow can, for example, be instantiated solely orcollectively by any combination of instructions from one or more of anapp GUI, and the terminal's O/S (as a background process). Inembodiments, categories of object data to be deleted are loaded from astorage device (step 1), if previously stored. (At first or subsequentinstallation of content manager 200 the steps of method 300, usernameand password or other social network site credentials may be previouslyobtained and stored in the terminal or a remote store, for examplebefore a terminal is disconnected and reconnected to the social networksite computer network). Whether deletion categories are marked orselected is determined (step 3). If not, the terminal displays orotherwise broadcasts that no items are marked for deletion (step 5).Then, the terminal receives input of data that indicate or select whatcategories of data are to be deleted. (step 7), and such categories areagain loaded or otherwise accessed.

If the deletion categories (and/or non-default retention period) aresuccessfully accessed, whether a network connection is established isdetermined (step 9). If no network connected is established, theterminal displays or otherwise broadcasts that the network isunavailable (step 11) and optionally continues to determine whether thenetwork connection is established, until it is established.

After (or as soon as) a network connection is established, method 300determines whether a user subscription is current and available (step13). If not, then the terminal displays or otherwise broadcasts that thesubscription is not current (step 15) and the method waits to proceeduntil the subscription is up-to-date in payment and having validstanding and or updates.

If the application subscription is current and valid, the methoddetermines if errors are to be handled (step 17) and if so the terminaldisplays or otherwise broadcasts instructions to re-enter relevantmissing or incorrect information (step 19). These and other errordetermination(s) may alternately be performed at any one or more earlieror later stage(s), be variously repeated, and/or be split into varioustypes and performed separately or concurrently at once or at variousstages and in various orders.

In embodiments, error handling may alternately or additionally include,optionally at any terminal user's option, reporting to a serverinformation such as metadata about batch or specific object data relatedfailed connections or tasks regarding any one or more of the steps (orfeatures of steps) undertaken by method 300.

In embodiments, though not required in the same sequence as method 300,access to a social network site user account is initiated (step 21),either by acquiring social network site access (such as, but not limitedto, login user name and password) credentials at a GUI or by accessingpreloaded or pre-stored access credentials from a store (located in theterminal or from an external device such as a remote store).

Method 300 then determines whether the credentials are defined, i.e. arestored as a set of user credentials associated with content manager 200or the subscription (step 23). If not, the terminal displays orotherwise broadcasts that no credentials are found, entered or exist(step 25). If so, the retention period defined by the user and stored inthe terminal or elsewhere are loaded, or a default retention period isloaded if no user-supplied value is stored, accessed or retrieved (step27)

In embodiments, social network site access credentials are transmittedto servers or databases on which access permission may be granted, toauthenticate and establish digital communication connection with thesocial network site server(s) (step 29). This step (and/or other steps)may be performed directly from one terminal to a server or indirectlyfrom a terminal to several other terminals or servers. In embodiments,method 300 sends requests that search for items not dated within thedesignated retention period (step 31). In embodiments, found objectsthat fall outside of the retention period are deleted from the store,such as database 600, on which they are stored (step 33).

Steps 29, 31, and 33 differ depending on each social network siteaccessed and managed. In an exemplary method regarding a Facebook®account, a headless browser performs step 29. Then, the method searchesfor the designated or selected objects using either Facebook®'s API orheadless browsing. Finally, headless browsing is used to delete itemsidentified in the search. The precise way in which objects are deletedwill depend upon the object type, e.g., deletion of a user namephotograph tag will differ from status update texts on Facebook®.

In embodiments, method 300 includes causing the terminal to display orotherwise broadcast results of the prior steps (step 35).

In embodiments, the sequence of the above steps may be altered assuitable to achieve any one or more of the functionality and effectsindicated herein. For example, collection of access information such aslogin credentials may occur intermittently between instructions beingsent to server 50 (or database 600 if via a LAN).

In embodiments, various steps and various combinations of features ofsteps of content manager 200 may be running in the same or differentsequences, either in the foreground or background. If, for example,running in the foreground, all feedback is provided directly to a uservia the content manager's 200 GUI as data are deleted, for example on anobject-by-object basis. When content manager 200 is running in thebackground, all feedback is provided via a phone or PC O/S, for exampleafter all data within a manually set expiration date are deleted.

In embodiments, more (or less) detailed feedback may be provided in theforeground mode, because a GUI provides a relatively higher (orlower)-bandwidth channel. By comparison, feedback may be more limited(or less limited) in background mode, because an O/S provides arelatively lower (or higher)-bandwidth information channel (e.g.,limiting display of results and updates to one to a few lines of text).

System and Digital Communications Network Hardware

Another aspect of the disclosure is a computer system. Referring to FIG.4 and according to at least one embodiment, the techniques describedherein are implemented by one or more special-purpose computing devices.The special-purpose computing devices may be hard-wired to perform thetechniques, or may include digital electronic devices such as one ormore application-specific integrated circuits (ASICs) or fieldprogrammable gate arrays (FPGAs) that are persistently programmed toperform the techniques, or may include one or more general purposehardware processors programmed to perform the techniques pursuant toprogram instructions in firmware, memory, other storage, or acombination. Such special-purpose computing devices may also combinecustom hard-wired logic, ASICs. or FPGAs with custom programming toaccomplish the techniques. The special-purpose computing devices may bedesktop computer systems, portable computer systems, handheld devices,networking devices or any other device that incorporates hard-wiredand/or program logic to implement the techniques.

For example, FIG. 4 is a block diagram that illustrates a computersystem 500 upon which an embodiment may be implemented. Computer system500 includes a bus 502 or other communication mechanism forcommunicating information, and a hardware processor 504 coupled with bus502 for processing information. Hardware processor 504 may be, forexample, a general purpose microprocessor.

Computer system 500 also includes a main memory 506, such as a randomaccess memory (RAM) or other dynamic storage device, coupled to bus 502for storing information and instructions to be executed by processor504. Main memory 506 also may be used for storing temporary variables orother intermediate information during execution of instructions to beexecuted by processor 504. Such instructions, when stored innon-transitory storage media accessible to processor 504, rendercomputer system 500 into a special-purpose machine that is customized toperform the operations specified in the instructions.

Computer system 500 further includes a read only memory (ROM) 508 orother static storage device coupled to bus 502 for storing staticinformation and instructions for processor 504. A storage device 510,such as a magnetic disk or optical disk, is provided and coupled to bus502 for storing information and instructions.

Computer system 500 may be coupled via bus 502 to a display 512, such asa cathode ray tube (CRT), for displaying information to a computer user.An input device 514, including alphanumeric and other keys, is coupledto bus 502 for communicating information and command selections toprocessor 504. Another type of user input device is cursor control 516,such as a mouse, a trackball, or cursor direction keys for communicatingdirection information and command selections to processor 504 and forcontrolling cursor movement on display 512. This input device typicallyhas two degrees of freedom in two axes, a first axis (e.g., x) and asecond axis (e.g., y), that allows the device to specify positions in aplane.

Computer system 500 may implement the techniques described herein usingcustomized hard-wired logic, one or more ASICs or FPGAs, firmware and/orprogram logic which in combination with the computer system causes orprograms computer system 500 to be a special-purpose machine. Accordingto at least one embodiment, the techniques herein are performed bycomputer system 500 in response to processor 504 executing one or moresequences of one or more instructions contained in main memory 506. Suchinstructions may be read into main memory 506 from another storagemedium, such as storage device 510. Execution of the sequences ofinstructions contained in main memory 506 causes processor 504 toperform the process operations described herein. In alternativeembodiments, hard-wired circuitry may be used in place of or incombination with software instructions.

The terms “storage media” and “storage device” as used herein refer toany non-transitory media that store data and/or instructions that causea machine to operate in a specific fashion. Such storage media maycomprise non-volatile media and/or volatile media. Non-volatile mediaincludes, for example, optical or magnetic disks, such as storage device510. Volatile media includes dynamic memory, such as main memory 506.Common forms of storage media include, for example, a floppy disk, aflexible disk, hard disk, solid state drive, magnetic tape, or any othermagnetic data storage medium, a CD-ROM, any other optical data storagemedium, any physical medium with patterns of holes, a RAM, a PROM, andEPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge.

Storage media and storage device are distinct from but may be used inconjunction with transmission media. Transmission media participates intransferring information between storage media/devices. For example,transmission media includes coaxial cables, copper wire and fiberoptics, including the wires that comprise bus 502. Transmission mediacan also take the form of acoustic or light waves, such as thosegenerated during radio-wave and infra-red data communications.

Various forms of media may be involved in carrying one or more sequencesof one or more instructions to processor 504 for execution. For example,the instructions may initially be carried on a magnetic disk or solidstate drive of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to computer system 500 canreceive the data on the telephone line and use an infra-red transmitterto convert the data to an infra-red signal. An infra-red detector canreceive the data carried in the infra-red signal and appropriatecircuitry can place the data on bus 502. Bus 502 carries the data tomain memory 506, from which processor 504 retrieves and executes theinstructions. The instructions received by main memory 506 mayoptionally be stored on storage device 510 either before or afterexecution by processor 504.

Computer system 500 also includes a communication interface 518 coupledto bus 502. Communication interface 518 provides a two-way datacommunication coupling to a network link 520 that is connected to alocal network 522. For example, communication interface 518 may be anintegrated services digital network (ISDN) card, cable modem, satellitemodem, or a modem to provide a data communication connection to acorresponding type of telephone line. As another example, communicationinterface 518 may be a local area network (LAN) card to provide a datacommunication connection to a compatible LAN. Wireless links may also beimplemented. In at least one such implementation, communicationinterface 518 sends and receives one or more of electrical,electromagnetic and optical signals (as with all uses of “one or more”herein implicitly including any combination of one or more of these)that carry digital data streams representing various types ofinformation.

Network link 520 typically provides data communication through one ormore networks to other data devices. For example, network link 520 mayprovide a connection through local network 522 to a host computer 524 orto data equipment operated by an Internet Service Provider (ISP) 526.ISP 526 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the“Internet” 528. Local network 522 and Internet 528 both use electrical,electromagnetic or optical signals that carry digital data streams. Thesignals through the various networks and the signals on network link 520and through communication interface 518, which carry the digital data toand from computer system 500, are example forms of transmission media.

Computer system 500 can send messages and receive data, includingprogram code, through the network(s), network link 520 and communicationinterface 518. In at least one embodiment of the Internet example, aserver 530 might transmit a requested code for an application programthrough Internet 528. ISP 526, local network 522 and communicationinterface 518.

In embodiments, the received code may be one or more of executed byprocessor 504 as it is received, and/or stored in storage device 510, orother non-volatile storage for later execution.

Now referring to FIG. 5, in at least one embodiment a device used inaccordance with this disclosure is or comprises mobile display or touchscreen input smart phone or tablet 535, which is shown displaying directuser-to-device input message text and or image(s), or remotely receivedmessage text and/or image(s) 540.

Computer-Readable Medium

Another aspect of the disclosure is one or more computer-readable media(or computer storage apparatus) having a program, which when executed byone or more processors, such part of one or more of the systemsdescribed herein, causes the one or more processors to enable, allow orcause devices to perform any one of the methods as variously comprisingany one or more of its various embodiments or sub-embodiments describedabove or otherwise covered by the appended claims.

In embodiments, the one or more computer-readable media arenon-transitory media such as, but not limited to HDD and SSD diskdrives, thumb and other flash drives, DVDs, CDs, various static anddynamic storage devices and other numerous storage media.

In embodiments, the one or more computer-readable media comprise or areone or more transitory electronic signals.

The following numbered clauses set forth various embodiments of thedisclosure:

1. At least one (a) computer-implemented method, (b) terminal by way ofmeans or software module(s) for performing operation(s), (c) system byway of means or software module(s) for performing operations(s), or (d)transitory or non-transitory computer-readable medium (or alternatelyalso herein throughout, computer storage apparatus) containinginstructions which when executed by one or more computers each orcollectively comprising one or more processors cause operation(s),according to any one of the preceding clauses, the operation(s)comprising:

collecting or accessing data uniquely representative of, or uniquelyindicating, one or more digitally stored and operated social networksite user account(s) and transmitting data necessary to access andcontrol the one or more digitally stored and operated social networksite user account(s) to at least one remote (or local) computer(s);

2. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising displaying indicia, broadcasting data, ortransmitting instructions, to solicit collection of or to access datauniquely representative of, or uniquely indicating, one or moredigitally stored and operated social network site user account(s);

3. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising establishing direct or indirect communication accessand linkage between the terminal and at least one remote (or local,optionally for any and/or all instances herein) computer(s) on which arestored, or by which access is available to control (e.g., delete),stored user account object data that were input or modified during prioraccess to and control over:

-   -   the one or more social network site user account(s) or    -   associated social network site user account(s) that at some        prior time had permission to edit data in, or append data to,        the stored user account object data of the one or more social        network site user account(s).        the stored user account data of the one or more user account(s)        uniquely accessible based on access data digitally pre-assigned        only to the one or more social network site user account(s);

4. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising displaying indicia, or broadcasting data,representative of or indicating one or more predetermined criteria forselecting a subset of the stored user account object data;

5. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising collecting data, representative of, or indicating,(optionally only, as with respect to the user account object data) thesubset of the stored user account object data based on the one or morepredetermined criteria for selecting the subset of the stored useraccount object data that were input or modified during prior access toand control over the one or more user account(s) or associated socialnetwork site user account(s) that at some prior time had permission toedit data in, or append data to, the user account object data of the oneor more user account(s);

6. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising transmitting instructions to delete or otherwiseprevent legible display of (optionally only or optionally only for oneor more of certain types of object data such as certain types of one ormore of text, video, and photographic object data items, or only fromone or more of certain data sources, user accounts, and user accountdata profile(s)) the subset of the stored user account object data,according to the collected data representative of, or indicating, theone or more (predetermined and/or pre-stored on one or more of the atleast one remote or local computer and the terminal or terminals)criteria for selecting the subset of the stored user account objectdata, from the terminal to the at least one remote computer(s)

7. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the instructions are calculated to cause the at least one remotecomputer(s) on which are stored, or by which access is available tocontrol (e.g., delete), the stored user account object data, to,optionally in whole or in part, prevent display of (e.g., delete) theselected subset of the stored user account object data (optionally, fromat least one database on which are stored the subset of the stored useraccount object data) at every (or all, most, about 10%, about 20%, about30%, about 40%, about 50%, about 60%, about 70%, about 80%, about 90%,or about 100%, at any given time) user account terminal of the socialnetwork site computer network, based on the one or more predeterminedcriteria, the instructions including selection and deletion of at leastone copy of all stored user account object data in the subset of theuser account object data.

8. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the collecting or accessing of data representative of, orindicating, the subset of the user account object data, is one or moreof (1) simultaneous in time with respect to each and every one of theobjects in the subset, and (2) performed at predetermined times based onat least one predetermined (and/or prestored) set of digitalinstructions, the at least one predetermined set being optionallypre-determined at a time prior to or at least before predetermination ofthe data representative of, or indicting, the display, broadcast orcollection of data representative or indicating the predeterminedcriteria.

9. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) are one or more of operatedand controlled by a user or set of users other than the user or set ofusers of the terminal.

10. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising storing the data representative of, or indicating,the one or more predetermined criteria for selecting the subset of thestored personal data.

11. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) at one time (optionallywhich herein is defined to account for reasonable and normal tolerancesin micro-processing speed, bus transmission (or other hardware; oroptionally subject only to limitations specific to the social networksite computer network after instructions are transmitted from theterminal) and intra-computer and/or intra-network speeds to execute allinstructions for the selected objects) receive, forward to other of theat least one remote computers or database for execution, then execute.(or optionally initiate execution of), the instructions for all theobjects in the selected subset.

12. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the terminal transmits, or initiates simultaneous or (optionallydigitally predetermined) periodic transmission over a digitallypredetermined time of, each and every instruction for all objects in theselected subset to the at least one remote computer(s).

13. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the instructions to prevent display of (e.g., delete, nottransmit, not receive, not legibly display) the selected subset areexecuted to delete each and every object of the selected subset, at arate according to and limited only by the processing speed(s) and datatransmission speed(s) of the at least one remote computer(s) and/or inthe case of non-display, the processing speed(s) and data transmissionspeed(s) as between the at least one remote computers and other accountuser terminals.

14. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the speed or speeds at which the at least one remote computer(s)store and initiate execution of, the instructions is/are limited only bythe time(s) at which one or more of the at least one remote computersreceive (or the single time or multiple times the terminal starts toprocess, or processes, all of) the instructions for the objects in theselected subset, and the time(s) between which the at least one remotecomputers receive (or the single time or multiple times the terminalstarts to process, or processes, all of) the instructions for theobjects in the selected subset and the time(s) when the at least oneremote computers initiate (or the single time or multiple times theterminal starts or completes) execution of the instructions to deletethe objects in the selected subset.

15. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the terminal periodically transmits (or receives or executes)the instructions of the subset, on an object-by-object orgroup-of-objects-by-group-of-objects basis, at one or more regularintervals of time, at one or more irregular intervals of time, togetherat one time, or in any combination thereof.

16. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) is communicatively connectedto one or more databases on which are stored the selected subset, andwherein the at least one remote computer(s) (or terminal(s)) initiateexecution of, or execute, the instructions to delete (or otherwiseprevent display of) the selected subset, in a predetermined time periodbased on instructions that are stored by the at least one remotecomputer(s) before any of the instructions to delete (or otherwiseprevent display of) the selected subset are received by the at least oneremote computer(s) (optionally, if they are received or sent from theterminal at all).

17. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the calculation is performed in whole or in part by the terminalor by a terminal that is not under the control or operation of a user orusers of the at least one remote computer(s).

18. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the calculation is performed in whole or in part by one or moreof the at least one remote computer(s) and a second set of at least oneremote computers, any or all of which the at least one remotecomputer(s) and second set of at least one remote computers beinglocated in a domestic or foreign national country.

19. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the instructions are calculated to simulate data acquisitionbased on sequential and stepwise GUI or other peripheral data collectionvia one or more of keyboard, mouse, and other peripherals connected tothe terminal, wherein peripheral data collection is generated based ondisplay or other peripheral output.

20. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein data received from one or more peripherals is simulated in orderto collect the data representative of, or indicating, the subset ofstored user account object data.

21. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein date-criteria data used in the calculation of the instructionsis deduced from scanning user account object data for one or more ofdate-embedded, date-classified and date-uploaded media objectscomprising one or more of photographic data, video data, and text data.

22. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein

-   -   the data representative of, or indicating, the one or more        predetermined criteria for selecting the subset of the stored        user account object data that were input or modified during        prior access to and control over the one or more user account(s)        or associated user social network site accounts that at some        prior time had permission to edit data in, or append data to,        the stored user account object data, and    -   date-criteria data, optionally such that date-criteria data        comprises a date such that data objects stored or uploaded to        the at least one remote computer(s) before the date are        identified for deletion or included in a set for deletion;        are used to determine the subset of the stored user account        object data.

23. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the at least one remote computer(s) is controlled by one or moreremote user(s), the one or more remote computer(s) not having access tocontrol what criteria data are collected to calculate the subset of theuser account object data at the terminal.

24. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein at least one remote computer(s) execute(s) instructions to storeobject data uniquely associated with a different user account, whichindicate successful deletion (or display prevention) of associated useraccount object data that were stored on the at least one database, andtransmit the indicative data to other terminals associated with otheruser accounts.

25. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,further comprising displaying or broadcasting confirmation that thesubset of stored user account object data have been deleted from the atleast one remote computer(s).

26. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the deleted subset of the stored user account object dataincludes all of the stored user account object data that were

-   -   input or modified during prior access to and control over the        one or more social network site user account(s) and input or        modified via and access and control over associated social        network site user account(s) that at some prior time had        permission to edit data in, or append data to, the stored user        account object data of the one or more social network site user        account(s); and    -   stored on the database(s) at least as early as,        before a specific date, which is the one or more predetermined        criteria.

27. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein the terminal initiates simultaneous or (optionally digitallypredetermined) periodic execution over a digitally predetermined timeof, each and every instruction for all objects in the selected subset tothe at least one remote computer(s).

28. A method, terminal, system or, transitory or non-transitorycomputer-readable medium according to any one of the preceding clauses,wherein when the terminal indirectly or directly transmits at least oneinstruction to the at least one remote (or local) computer(s) and the atleast one instruction fails, one or more of:

-   -   the terminal indirectly or directly transmits (1) at least one        error report, or (2) information on which the at least one error        report is based,    -   at least one update computer (optionally on or not on the social        network site computer network) receives at least one error        report (directly or indirectly) from the terminal or another        computer.    -   the update computer(s) sends instructions or information based        on the error report(s) directly or indirectly to another        terminal(s) that are one or more of previously, currently and        subsequently on the social network site computer network,        indicating error(s) and/or source of error(s), and    -   a recalculation module (on any one or more of the terminal,        another terminal, or on another computer) updates one or more of        the modules (implicitly or explicitly) disclosed herein, by        recalculating instructions, optionally to create new module        instructions, which are distributed directly or indirectly to        the terminal;    -   the terminal receives recalculated or updated instructions,        optionally used to create new module(s) instructions.

29. A method, terminal, system, or computer readable media according toany one of the preceding clauses, comprising any one or more of:

a software module arranged to access, collect, and/or store one or morecredentials data, deletion criteria data, and deletion timing data, eachrelating to the terminal or one or more social network site useraccount(s);

transceiving module arranged to receive deletion criteria data, eitherdirectly or indirectly to transmit the collected deletion criteria data(or optionally or alternately data representative of the collecteddeletion criteria data) to at least one computer (geographically localor geographically) remote from the terminal, the at least one remotecomputer having social network site user account object data storedthereon (or providing access to one or more databases on which theaccount object data are stored);

one or more of a store arranged to store and a display or usercommunication module arranged to display or broadcast results, includingone or more of error indicia and completion indicia;

a second user communication module comprising a display module and/or abroadcast module arranged to display confirmation that object data havebeen deleted from the at least one remote computer.

30. A method, terminal, system, or computer readable media according toany one of the preceding clauses, comprising any one or more of:

a first means arranged to collect or access data uniquely representativeof, or uniquely indicating, the one or more social network site useraccount(s) and transmitting data necessary to access and control the oneor more digitally stored and operated social network site useraccount(s) to at least one remote computer(s);

a second means arranged to establish direct or indirect communicationaccess and linkage between the terminal and the at least one remotecomputer(s) on which are stored, or by which access is available todelete, stored user account object data that were input or modifiedduring prior access to and control over:

-   -   the one or more social network site user account(s) or    -   associated social network site user account(s) that at some        prior time had permission to edit data in, or append data to,        the stored user account object data of the one or more social        network site user account(s),        the stored user account data of the one or more user account(s)        uniquely accessible based on access data digitally pre-assigned        only to the one or more social network site user account(s);

a third means arranged to display indicia, or broadcast data,representative of or indicating one or more predetermined criteria forselecting a subset of the stored user account object data;

a forth means arranged to collect data representative of, or indicating,the subset of the stored user account object data based on the one ormore predetermined criteria for selecting the subset of the stored useraccount object data that were input or modified during prior access toand control over the one or more user account(s) or associated socialnetwork site user account(s) that at some prior time had permission toedit data in, or append data to, the user account object data of the oneor more user account(s); and

a fifth means arranged to transmit instructions to delete only thesubset of the stored user account object data, according to thecollected data representative of, or indicating, the one or morepredetermined criteria for selecting the subset of the stored useraccount object data, from the terminal to the at least one remotecomputer(s);

wherein the instructions are calculated to cause the at least one remotecomputer(s) on which are stored, or by which access is available todelete, the stored user account object data, to, in whole (or optionallyin part), delete the selected subset of the stored user account objectdata from at least one database on which are stored the subset of thestored user account object data, based on the one or more predeterminedcriteria, the instructions including selection and deletion of at leastone copy of all stored user account object data in the subset of theuser account object data.

31. A system according to any one of the preceding clauses or belowclaims, wherein the collecting of data representative of, or indicating,the subset of the user account object data, is simultaneous or performedat predetermined times based on at least one predetermined set ofdigital instructions, optionally pre-determined at least before the datarepresentative of, or indicting, the display, broadcast or collection ofdata representative or indicating the predetermined criteria.

32. A system according to any one of the preceding clauses or belowclaims, further comprising storing the data representative of, orindicating, the one or more predetermined criteria for selecting thesubset of the stored personal data.

33. A system according to any one of the preceding clauses or belowclaims, wherein the instructions are calculated to simulate dataacquisition based on sequential and stepwise GUI or other peripheraldata collection via one or more of keyboard, mouse, and otherperipherals connected to the terminal, wherein peripheral datacollection is generated based on display or other peripheral output.

34. A system according to any one of the preceding clauses or belowclaims, wherein the deleted subset of the stored user account objectdata includes all of the stored user account object data that were

-   -   input or modified during prior access to and control over the        one or more social network site user account(s) and input or        modified via and access and control over associated social        network site user account(s) that at some prior time had        permission to edit data in, or append data to, the stored user        account object data of the one or more social network site user        account(s); and    -   stored on the database(s) at least as early as,        before a specific date, which is the one or more predetermined        criteria

35. A system according to any one of the preceding clauses, comprisingany one or more of, wherein if or when the terminal indirectly ordirectly transmits at least one instruction to the at least one remoteor local computer(s) and the at least one instruction fails, one or moreof:

-   -   the terminal indirectly or directly transmits (1) at least one        error report, or (2) information on which the at least one error        report is based.    -   at least one update computer on or not on the social network        site computer network receives at least one error report        directly or indirectly from the terminal or another computer.    -   the update computer(s) sends instructions or information based        on the error report(s) directly or indirectly to another        terminal(s) that are one or more of previously, currently and        subsequently on the social network site computer network,        indicating error(s) and/or source of error(s), and    -   a recalculation module (on any one or more of the terminal,        another terminal, or on another computer) updates one or more        module(s), by recalculating instructions, optionally to create        new module instructions, which are distributed directly or        indirectly to the terminal;    -   the terminal receives recalculated or updated instructions,        optionally used to create new module(s) instructions.

36. A computer storage apparatus according to any one of the precedingclauses or below claims, comprising any one or more of, wherein thecollecting of data representative of, or indicating, the subset of theuser account object data, is simultaneous or performed at predeterminedtimes based on at least one predetermined set of digital instructions,optionally pre-determined at least before the data representative of, orindicting, the display, broadcast or collection of data representativeor indicating the predetermined criteria.

37. A computer storage apparatus according to any one of the precedingclauses or below claims, further comprising storing the datarepresentative of, or indicating, the one or more predetermined criteriafor selecting the subset of the stored personal data.

38. A computer storage apparatus according to any one of the precedingclauses or below claims, wherein the instructions are calculated tosimulate data acquisition based on sequential and stepwise GUI or otherperipheral data collection via one or more of keyboard, mouse, and otherperipherals connected to the terminal, wherein peripheral datacollection is generated based on display or other peripheral output.

39. A computer storage apparatus according to any one of the precedingclauses or below claims, wherein the deleted subset of the stored useraccount object data includes all of the stored user account object datathat were

-   -   input or modified during prior access to and control over the        one or more social network site user account(s) and input or        modified via and access and control over associated social        network site user account(s) that at some prior time had        permission to edit data in, or append data to, the stored user        account object data of the one or more social network site user        account(s); and    -   stored on the database(s) at least as early as,        before a specific date, which is the one or more predetermined        criteria 40. A computer storage apparatus according to any one        of the preceding clauses or below claims, wherein if or when the        terminal indirectly or directly transmits at least one        instruction to the at least one remote (or local) computer(s)        and the at least one instruction fails, one or more of:    -   the terminal indirectly or directly transmits (1) at least one        error report, or (2) information on which the at least one error        report is based,    -   at least one update computer on or not on the social network        site computer network receives at least one error report        directly or indirectly from the terminal or another computer,    -   the update computer(s) sends instructions or information based        on the error report(s) directly or indirectly to another        terminal(s) that are one or more of previously, currently and        subsequently on the social network site computer network,        indicating error(s) and/or source of error(s), and    -   a recalculation module (on any one or more of the terminal,        another terminal, or on another computer) updates one or more        module(s), by recalculating instructions, optionally to create        new module instructions, which are distributed directly or        indirectly to the terminal;    -   the terminal receives recalculated or updated instructions,        optionally used to create new module(s) instructions.

Embodiments can work with software, hardware, and/or operating systemimplementations other than those described herein. Any software,hardware, and operating system implementations suitable for performingthe functions described herein can be used. Embodiments are applicableto both a client and to a server or a combination of both.

While it is apparent that the illustrative embodiments of the disclosureherein fulfil one or more objectives or inventive solutions, it isappreciated that numerous modifications and other embodiments may bedevised by those skilled in the art. Additionally, feature(s) and/orelement(s) from any embodiment may be used singly or in combination withother embodiment(s). Therefore, it will be understood that the appendedclaims are intended to cover all such modifications and embodiments thatwould come within the spirit and scope of the present disclosure.

The above embodiments are to be understood as illustrative examples ofthe disclosure. Further embodiments of the disclosure are envisaged. Itis to be understood that any feature described in relation to any one orone set of embodiments may be used alone, or in combination with otherfeatures described, and may also be used in combination with one or morefeatures of any other of the embodiments, or any combination of anyother of the embodiments. Furthermore, equivalents and modifications notdescribed above may also be employed without departing from the scope ofthe disclosure, which is defined in the accompanying claims.

What is claimed is:
 1. A method of one or more of (a) selectivelyreducing data available to, or processed by one or more computerscommunicatively connected to, a digitally stored and operated socialnetwork site, (b) improving data security and (c) increasing operationalefficiency of the one or more computers communicatively connected to thedigitally stored and operated social network site, at a user-operatedpersonal terminal in a digital communications network, comprising:displaying indicia, broadcasting data, or transmitting instructions, tosolicit collection of or to access data uniquely representative of, oruniquely indicating, one or more digitally stored and operated socialnetwork site user account(s); collecting or accessing data uniquelyrepresentative of, or uniquely indicating, the one or more socialnetwork site user account(s) and transmitting data necessary to accessand control the one or more digitally stored and operated social networksite user account(s) to at least one remote computer(s); establishingdirect or indirect communication access and linkage between theuser-operated personal terminal and the at least one remote computer(s)on which are stored, or by which access is available to control storeduser account object data that were input or modified during prior accessto and control over: the one or more social network site user account(s)or associated social network site user account(s) that at some priortime had permission to edit data in, or append data to, the stored useraccount object data of the one or more social network site useraccount(s), the stored user account data of the one or more useraccount(s) uniquely accessible based on access data digitallypre-assigned only to the one or more social network site useraccount(s); displaying indicia, or broadcasting data, representative ofor indicating one or more predetermined criteria for selecting a subsetof the stored user account object data; collecting data representativeof, or indicating, the subset of the stored user account object databased on the one or more predetermined criteria for selecting the subsetof the stored user account object data that were input or modifiedduring prior access to and control over the one or more user account(s)or associated social network site user account(s) that at some priortime had permission to edit data in, or append data to, the user accountobject data of the one or more user account(s); and transmittinginstructions to prevent display of only the subset of the stored useraccount object data, according to the collected data representative of,or indicating, the one or more predetermined criteria for selecting thesubset of the stored user account object data, from the user-operatedpersonal terminal to the at least one remote computer(s); wherein theinstructions are calculated to cause the at least one remote computer(s)on which are stored, or by which access is available to control, thestored user account object data, to, in whole or in part, preventdisplay of the selected subset of the stored user account object datafrom at least one database on which are stored the subset of the storeduser account object data, based on the one or more predeterminedcriteria, the instructions including selection and display prevention ofat least one copy of all stored user account object data in the subsetof the user account object data; and wherein the instructions to preventthe display of the selected subset are executed to prevent display ofeach and every object of the selected subset.
 2. The method of claim 1wherein objects are prevented from being displayed based on how long agothey were posted to the account(s).
 3. The method of claim 1 whereinresponsive to the instructions the at least one remote computer(s)execute instructions for restricting data transmission through thenetwork.
 4. The method of claim 1 wherein responsive to the instructionsthe at least one remote computer(s) execute instructions for restrictingdata transmission through the network after a retention period.
 5. Themethod of claim 1 wherein responsive to the instructions the at leastone remote computer(s) execute instructions for restricting datatransmission through the network not immediately upon the at least onecomputer(s) receiving the instructions.
 6. The method of claim 1 whereinresponsive to the instructions the at least one remote computer(s)execute instructions for restricting data transmission through thenetwork not immediately upon the terminal receiving the instructions. 7.A method of one or more of (a) selectively reducing data available to,or processed by one or more computers communicatively connected to, adigitally stored and operated social network site, (b) improving datasecurity and (c) increasing operational efficiency of the one or morecomputers communicatively connected to the digitally stored and operatedsocial network site, at an account user terminal in a digitalcommunications network, comprising: displaying indicia, broadcastingdata, or transmitting instructions, to solicit collection of or toaccess data uniquely representative of, or uniquely indicating, one ormore digitally stored and operated social network site user account(s);collecting or accessing data uniquely representative of, or uniquelyindicating, the one or more social network site user account(s) andtransmitting data necessary to access and control the one or moredigitally stored and operated social network site user account(s) to atleast one remote computer(s); establishing direct or indirectcommunication access and linkage between the account user terminal andthe at least one remote computer(s) on which are stored, or by whichaccess is available to control stored user account object data that wereinput or modified during prior access to and control over: the one ormore social network site user account(s) or associated social networksite user account(s) that at some prior time had permission to edit datain, or append data to, the stored user account object data of the one ormore social network site user account(s), the stored user account dataof the one or more user account(s) uniquely accessible based on accessdata digitally pre-assigned only to the one or more social network siteuser account(s); displaying indicia, or broadcasting data,representative of or indicating one or more predetermined criteria forselecting a subset of the stored user account object data; collectingdata representative of, or indicating, the subset of the stored useraccount object data based on the one or more predetermined criteria forselecting the subset of the stored user account object data that wereinput or modified during prior access to and control over the one ormore user account(s) or associated social network site user account(s)that at some prior time had permission to edit data in, or append datato, the user account object data of the one or more user account(s); andtransmitting instructions to prevent display of only the subset of thestored user account object data, according to the collected datarepresentative of, or indicating, the one or more predetermined criteriafor selecting the subset of the stored user account object data, fromthe account user terminal to the at least one remote computer(s);wherein the instructions are calculated to cause the at least one remotecomputer(s) on which are stored, or by which access is available tocontrol, the stored user account object data, to, in whole or in part,prevent display of the selected subset of the stored user account objectdata from at least one database on which are stored the subset of thestored user account object data, based on the one or more predeterminedcriteria, the instructions including selection and display prevention ofat least one copy of all stored user account object data in the subsetof the user account object data; and wherein the instructions to preventthe display of the selected subset are executed to prevent display ofeach and every object of the selected subset.
 8. The method of claim 7wherein objects are prevented from being displayed based on how long agothey were posted to the account(s).
 9. The method of claim 7 whereinresponsive to the instructions the at least one remote computer(s)execute instructions for restricting data transmission through thenetwork.
 10. The method of claim 7 wherein responsive to theinstructions the at least one remote computer(s) execute instructionsfor restricting data transmission through the network after a retentionperiod.
 11. The method of claim 7 wherein responsive to the instructionsthe at least one remote computer(s) execute instructions for restrictingdata transmission through the network not immediately upon the at leastone computer(s) receiving the instructions.
 12. The method of claim 7wherein responsive to the instructions the at least one remotecomputer(s) execute instructions for restricting data transmissionthrough the network not immediately upon the terminal receiving theinstructions.
 13. A method of one or more of (a) selectively reducingdata available to, or processed by one or more computers communicativelyconnected to, a digitally stored and operated social network site, (b)improving data security and (c) increasing operational efficiency of theone or more computers communicatively connected to the digitally storedand operated social network site, at a terminal in a digitalcommunications network, comprising: displaying indicia, broadcastingdata, or transmitting instructions, to solicit collection of or toaccess data uniquely representative of, or uniquely indicating, one ormore digitally stored and operated social network site user account(s);collecting or accessing data uniquely representative of, or uniquelyindicating, the one or more social network site user account(s) andtransmitting data necessary to access and control the one or moredigitally stored and operated social network site user account(s) to atleast one remote computer(s); establishing direct or indirectcommunication access and linkage between the terminal and the at leastone remote computer(s) on which are stored, or by which access isavailable to control stored user account object data that were input ormodified during prior access to and control over: the one or more socialnetwork site user account(s) or associated social network site useraccount(s) that at some prior time had permission to edit data in, orappend data to, the stored user account object data of the one or moresocial network site user account(s), the stored user account data of theone or more user account(s) uniquely accessible based on access datadigitally pre-assigned only to the one or more social network site useraccount(s); displaying indicia, or broadcasting data, representative ofor indicating one or more predetermined criteria for selecting a subsetof the stored user account object data; collecting data representativeof, or indicating, the subset of the stored user account object databased on the one or more predetermined criteria for selecting the subsetof the stored user account object data that were input or modifiedduring prior access to and control over the one or more user account(s)or associated social network site user account(s) that at some priortime had permission to edit data in, or append data to, the user accountobject data of the one or more user account(s); and transmittinginstructions to prevent display of only the subset of the stored useraccount object data, according to the collected data representative of,or indicating, the one or more predetermined criteria for selecting thesubset of the stored user account object data, from the terminal to theat least one remote computer(s); wherein the instructions are calculatedto cause the at least one remote computer(s) on which are stored, or bywhich access is available to control, the stored user account objectdata, to, in whole or in part, prevent display of the selected subset ofthe stored user account object data from at least one database on whichare stored the subset of the stored user account object data, based onthe one or more predetermined criteria, the instructions includingselection and display prevention of at least one copy of all stored useraccount object data in the subset of the user account object data; andwherein the instructions to prevent the display of the selected subsetare executed to prevent display of each and every object of the selectedsubset.
 14. The method of claim 13 wherein objects are prevented frombeing displayed based on how long ago they were posted to theaccount(s).
 15. The method of claim 13 wherein responsive to theinstructions the at least one remote computer(s) execute instructionsfor restricting data transmission through the network.
 16. The method ofclaim 13 wherein responsive to the instructions the at least one remotecomputer(s) execute instructions for restricting data transmissionthrough the network after a retention period.
 17. The method of claim 13wherein responsive to the instructions the at least one remotecomputer(s) execute instructions for restricting data transmissionthrough the network not immediately upon the at least one computer(s)receiving the instructions.
 18. The method of claim 13 whereinresponsive to the instructions the at least one remote computer(s)execute instructions for restricting data transmission through thenetwork not immediately upon the terminal receiving the instructions.