68 patents
Utility
Device-based security scoring
9 Jan 24
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian James Buck, Katelyn Clifford
Filed: 8 Nov 22
Utility
Evaluation server to compare data from mobile devices to historical device data to control deployment of security policies
2 Jan 24
A cloud server collects and stores context data from mobile devices.
Brian James Buck, David Richardson, Alex Richard Gladd
Filed: 17 Jun 22
Utility
Client Device Security for Domain Name Resolution and Browsing
28 Dec 23
Methods and systems provide for improved security for domain name resolution (DNS) and browsing.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 8 Sep 23
Utility
CorrectedMethods for Maintaning User Access to Computing Devices Based on Determining User Control
28 Dec 23
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device.
Kevin Patrick Mahaffey, Brian James Buck
Filed: 24 May 21
Utility
Use of geolocation to improve security while protecting privacy
19 Dec 23
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 3 Nov 22
Utility
Coordinating multiple components
19 Dec 23
Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component.
Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
Filed: 15 Dec 21
Utility
Communicating with client device to determine security risk in allowing access to data of a service provider
14 Nov 23
An identity broker receives a request for access by a client device to a service provided by a server.
RĂ©da Zerrad, Dhruva Gopal, Sneha Sachidananda, Dayyan Yoon Lord, Varun Shimoga Prakash, Christopher Brandon Leach, Brian James Buck, Jeroen Martijn Wijdogen
Filed: 5 Jun 20
Utility
Privacy Preservation In Network Connections
9 Nov 23
Methods and systems provide for reducing privacy leaks in DNS request by using a private DNS service.
Brian James Buck
Filed: 14 Jul 23
Utility
Service protecting privacy while monitoring password and username usage
17 Oct 23
A service monitors password and username use while maintaining username and password privacy by receiving a hash of a username, a hash of a password, and a host name and comparing the received hashes against a database of associated host names and hashes of usernames and passwords.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 20 Jan 23
Utility
Methods and Systems for Detecting and Preventing Compromised Network Connections
28 Sep 23
The security of network connections on a computing device is protected by detecting and preventing compromise of the network connections, including man-in-the-middle (MITM) attacks.
Timothy Micheal Wyatt, Brian James Buck, Nitin Shridhar Desai, Robert Blaine Elwell, Eike Christian Falkenberg, Meng Hu
Filed: 22 May 23
Utility
Method and system for verifying device ownership upon receiving a tagged communication from the device
19 Sep 23
A mobile communications device is provided with a tagging module that tags outgoing communications.
Marc William Rogers, Brian James Buck
Filed: 9 Feb 22
Utility
Methods for monitoring and managing extended reality display
19 Sep 23
Methods and systems provide for context-based adaptation of extended reality images on a display.
Brian James Buck
Filed: 23 Nov 22
Utility
Methods for Managing User Access to Computing Devices Based on Evaluation of Authentication and Maintenance of User Control
7 Sep 23
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a second device based on the user maintaining control of a first device.
Kevin Patrick Mahaffey, Brian James Buck
Filed: 15 May 23
Utility
System and Computer Readable Media Enabling Methods for Permitting a Request after Verifying Knowledge of First and Second Secrets
17 Aug 23
Systems and Computer Readable Media for enabling methods for multi-party authorization including a security component determining that a request for the performance of an action on a computing device is from a first party.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc WIlliam Rogers
Filed: 24 Apr 23
Utility
Monitoring a computing device to automatically obtain data in response to detecting background activity
8 Aug 23
An operating system monitors a computing device to determine that one or more events, including background activity, have occurred.
David Richardson, Kevin Patrick Mahaffey, Jonathan Grubb
Filed: 22 May 20
Utility
Methods and Systems for Addressing Unreported Theft or Loss of Mobile Communications Devices
3 Aug 23
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
Filed: 12 Apr 23
Utility
Service Protecting Privacy While Monitoring Password and Username Usage
25 May 23
A service monitors password and username use while maintaining username and password privacy by receiving a hash of a username, a hash of a password, and a host name and comparing the received hashes against a database of associated host names and hashes of usernames and passwords.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 20 Jan 23
Utility
Methods for maintaning user access to computing devices based on determining user control
16 May 23
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device.
William Robinson, Kevin Patrick Mahaffey, Brian James Buck
Filed: 24 May 21
Utility
Methods and systems for addressing unreported theft or loss of mobile communications devices
2 May 23
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
Filed: 10 Sep 21
Utility
System and method for permitting a request after verifying knowledge of first and second secrets
25 Apr 23
A method for multi-party authorization includes a security component determining that a request for the performance of an action on a computing device is from a first party.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc William Rogers
Filed: 2 Feb 21