68 patents
Page 3 of 4
Utility
Quarantine of Software by an Evaluation Server Based on Authenticity Analysis of User Device Data
16 Jun 22
In one approach, a request for software evaluation is received by an evaluation server from a user device.
Timothy Micheal Wyatt, William Neil Robinson, Brian James Buck, Alex Richard Gladd
Filed: 3 Mar 22
Utility
Phishing protection using cloning detection
7 Jun 22
Techniques for phishing protection using cloning detection are described herein.
Jeremy Boyd Richards, Brian James Buck
Filed: 19 Nov 19
Utility
Determining a Security State Based on Communication with an Authenticity Server
2 Jun 22
For increased security, a source is determined for software to be installed on a computing device.
David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
Filed: 17 Feb 22
Utility
Methods and systems for providing a secure connection to a mobile communications device with the level of security based on a context of the communication
31 May 22
Based on context received regarding a mobile communications device a server determines whether an existing network connection employed by the mobile communications device offers a level of security that is appropriate.
Kevin Patrick Mahaffey, Timothy Strazzere, Brian James Buck
Filed: 17 Jan 19
Utility
Evaluating authenticity of applications based on assessing user device context for increased security
17 May 22
Software applications to be installed on user devices are monitored.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
Filed: 5 Aug 19
Utility
Mobile device security using a secure execution context
17 May 22
A device includes a secure execution context that is segregated from an operating system of the device.
Brian James Buck, Karina Levitian, Francis Kelly, Sebastian Krawczuk, Michael Murray
Filed: 5 Mar 20
Utility
Domain Name and Url Visual Verification for Increased Security
21 Apr 22
Techniques for providing domain name and URL visual verifications to increase security of operations on a device.
Brian James Buck
Filed: 27 Dec 21
Utility
Security during domain name resolution and browsing
15 Mar 22
Methods and systems provide for resolving domain names by employing a proxy server between the client device and the resolving server.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 5 Jun 20
Utility
Determining a security state designation for a computing device based on a source of software
22 Feb 22
For increased security, a source is determined for software to be installed on a computing device.
David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
Filed: 21 Nov 19
Utility
Method and system for providing a security component to a mobile communications device in an application
15 Feb 22
A security code module is provided that a developer may include in an application.
Marc William Rogers, Brian James Buck
Filed: 15 Nov 19
Utility
Coordinating multiple components
1 Feb 22
Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component.
Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
Filed: 16 Sep 19
Utility
Domain name and URL visual verification for increased security
1 Feb 22
Techniques for providing domain name and URL visual verifications to increase security of operations on a device.
Brian James Buck
Filed: 7 Mar 19
Utility
Methods and Systems for Addressing Unreported Theft or Loss of Mobile Communications Devices
30 Dec 21
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
Filed: 10 Sep 21
Utility
Providing a Mobile Communications Device with Access to a Provider Service Conditioned Upon a Device Security Level Determination
4 Nov 21
Methods and systems are provided for providing a mobile communications device with access to a provider with a plurality of security levels.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Brian James Buck, William Robinson
Filed: 13 Jul 21
Utility
Methods and systems for enhancing electronic device security by intercepting and analyzing a communication
14 Sep 21
Systems and methods enhance the security of an electronic device by causing an application on the device to intercept and analyze a communication.
Kevin Patrick Mahaffey, David Luke Richardson, Ayan Mandal, Cherry Mangat, Vance Grkov
Filed: 24 Mar 20
Utility
Methods for Maintaning User Access to Computing Devices Based on Determining User Control
9 Sep 21
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device.
William Robinson, Kevin Patrick Mahaffey, Brian James Buck
Filed: 24 May 21
Utility
Device-Based Security Scoring
9 Sep 21
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian Buck, Katelyn Clifford
Filed: 5 Mar 20
Utility
Privacy Preservation In Network Connections
19 Aug 21
Methods and systems provide for reducing privacy leaks in DNS request by using a private DNS service.
Brian James Buck
Filed: 18 Feb 21
Utility
Configuring Access to a Network Service Based on a Security State of a Mobile Device
19 Aug 21
In one approach, a first computing device receives a request from a second computing device.
Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
Filed: 4 May 21
Utility
Detecting an Attempted Access of Personal Information on Client Computing Devices
5 Aug 21
Systems and methods are disclosed for managing personal data on a client computer in which personal data stored at one or more locations on the client computer is identified by a policy management module on the computer or a server.
Timothy Micheal Wyatt, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck, Marc William Rogers
Filed: 12 Apr 21