68 patents
Page 2 of 4
Utility
Privacy Preservation In Network Connections
23 Mar 23
Methods and systems provide for reducing privacy leaks in DNS request by using a private DNS service.
Brian James Buck
Filed: 23 Nov 22
Utility
Device-Based Security Scoring
9 Mar 23
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian James Buck, Katelyn Clifford
Filed: 8 Nov 22
Utility
Self-Management of Devices Using Personal Mobile Device Management
9 Mar 23
An operating system of a mobile device defines an interface for an MDM to ensure security of the device.
Brian James Buck, Aaron David Cockerill
Filed: 3 Nov 22
Utility
Use Of Geolocation To Improve Security While Protecting Privacy
23 Feb 23
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device’s location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 3 Nov 22
Utility
System and method for pushing messages to a mobile communications device
21 Feb 23
A method disclosed herein provides for pushing messages to a mobile communications device.
Ariel Salomon, Kevin Patrick Mahaffey
Filed: 27 Dec 18
Utility
Computer Systems and Methods to Protect User Credential Against Phishing
9 Feb 23
Computer systems and methods to protect user credential against phishing with security measures applied based on determination of phishing risks of locations being visited, phishing susceptibility of users, roles of users, verification of senders of messages, and/or the timing of stages in accessing and interacting with the locations.
Jeremy Boyd Richards, Brian James Buck
Filed: 25 Oct 22
Utility
Protecting client privacy during browsing
31 Jan 23
Methods and systems provide for receiving an assessment of a full uniform resource locator (URL) in a browser session in advance of the browser accessing the URL, maintaining client privacy in the process using a proxy between the client device and an assessment component on a server.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 14 Mar 22
Utility
Device-based security scoring
27 Dec 22
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian Buck, Katelyn Clifford
Filed: 5 Mar 20
Utility
Self-management of devices using personal mobile device management
6 Dec 22
An operating system of a mobile device defines an interface for an MDM to ensure security of the device.
Brian James Buck, Aaron David Cockerill
Filed: 25 Feb 20
Utility
Use of geolocation to improve security while protecting privacy
6 Dec 22
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 5 Feb 20
Utility
Detecting realtime phishing from a phished client or at a security server
8 Nov 22
Disclosed herein are techniques for detecting phishing websites.
Jeremy Boyd Richards, Brian James Buck
Filed: 12 Nov 19
Utility
Identification of Triggering Events Correlated with DNS Requests for Increased Security
3 Nov 22
A triggering event correlated with domain name system (DNS) requests is identified.
Brian James Buck
Filed: 13 Jul 22
Utility
Computer systems and methods to protect user credential against phishing
1 Nov 22
Computer systems and methods to protect user credential against phishing with security measures applied based on determination of phishing risks of locations being visited, phishing susceptibility of users, roles of users, verification of senders of messages, and/or the timing of stages in accessing and interacting with the locations.
Jeremy Boyd Richards, Brian James Buck
Filed: 11 May 20
Utility
Evaluation Server to Compare Data from Mobile Devices to Historical Device Data to Control Deployment of Security Policies
6 Oct 22
A cloud server collects and stores context data from mobile devices.
Brian James Buck, David Richardson, Alex Richard Gladd
Filed: 17 Jun 22
Utility
Method and System for Verifying Device Ownership Upon Receiving a Tagged Communication from the Device
25 Aug 22
A mobile communications device is provided with a tagging module that tags outgoing communications.
Marc William Rogers, Brian James Buck
Filed: 9 Feb 22
Utility
Methods and Systems for Providing a Secure Connection to a Mobile Communications Device with the Level of Security Based on a Context of the Communication
18 Aug 22
Based on context received regarding a computing device and a security policy, a computing device evaluates a request by an application program to determine whether or not to allow the establishment of an application connection.
Kevin Patrick Mahaffey, Timothy Strazzere, Brian James Buck
Filed: 6 May 22
Utility
Improving Mobile Device Security Using A Secure Execution Context
28 Jul 22
A device includes a secure execution context that is segregated from an operating system of the device.
Brian James Buck, Karina Livitian, Francis Kelly, Sebastian Krawczuk, Michael Murray
Filed: 12 Apr 22
Utility
DNS prefetching based on triggers for increased security
19 Jul 22
Techniques for DNS prefetching based on application or contextual triggers to increase security in prefetching.
Brian James Buck
Filed: 7 Mar 19
Utility
Protecting Client Privacy During Browsing
30 Jun 22
Methods and systems provide for receiving an assessment of a full uniform resource locator (URL) in a browser session in advance of the browser accessing the URL, maintaining client privacy in the process using a proxy between the client device and an assessment component on a server.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 14 Mar 22
Utility
Deployment of passive and active security policies to mobile devices
21 Jun 22
Techniques for deployment of policies to computing devices are described herein.
Brian James Buck, David Richardson, Alex Richard Gladd
Filed: 9 Nov 20