68 patents
Page 4 of 4
Utility
Use Of Geolocation To Improve Security While Protecting Privacy
5 Aug 21
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 5 Feb 20
Reissue
System and method for identifying and [assessing] remediating vulnerabilities on a mobile communications device
3 Aug 21
The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device.
John G. Hering, Kevin Mahaffey, James Burgess
Filed: 31 Oct 19
Utility
Methods and systems for analyzing data after initial analyses by known good and known bad security components
3 Aug 21
Methods and systems are provided for conditionally allowing a mobile communications device to process received data.
Kevin Patrick Mahaffey
Filed: 31 Oct 19
Utility
System and method for processing a command based on verification information and a challenge token
29 Jun 21
A computing device creates verification information and a challenge token and sends the verification information and token to a server.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc William Rogers
Filed: 18 Sep 19
Utility
Managing access to services based on fingerprint matching
15 Jun 21
A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation that includes creating a fingerprint of the first computing device; and determining, by the second computing device, whether the fingerprint matches a fingerprint of one or more other computing devices.
Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
Filed: 7 Jan 19
Utility
System and Method for Permitting a Request after Verifying Knowledge of First and Second Secrets
27 May 21
A method for multi-party authorization includes a security component determining that a request for the performance of an action on a computing device is from a first party.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc William Rogers
Filed: 2 Feb 21
Utility
Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device
25 May 21
The method disclosed herein provides for performing device authentication based on the of proximity to another device, such as a key device.
William Robinson, Kevin Patrick Mahaffey, Brian James Buck
Filed: 3 Jun 19
Utility
Methods and systems for detecting attempts to access personal information on mobile communications devices
27 Apr 21
Systems and methods are disclosed for managing personal data on a mobile communications device in which personal data stored at one or more locations on the mobile communications device is identified by a policy management module on the mobile communications device.
Timothy Micheal Wyatt, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck, Marc William Rogers
Filed: 9 Sep 19