31 patents
Utility
Client Device Security for Domain Name Resolution and Browsing
28 Dec 23
Methods and systems provide for improved security for domain name resolution (DNS) and browsing.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 8 Sep 23
Utility
CorrectedMethods for Maintaning User Access to Computing Devices Based on Determining User Control
28 Dec 23
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device.
Kevin Patrick Mahaffey, Brian James Buck
Filed: 24 May 21
Utility
Privacy Preservation In Network Connections
9 Nov 23
Methods and systems provide for reducing privacy leaks in DNS request by using a private DNS service.
Brian James Buck
Filed: 14 Jul 23
Utility
Methods and Systems for Detecting and Preventing Compromised Network Connections
28 Sep 23
The security of network connections on a computing device is protected by detecting and preventing compromise of the network connections, including man-in-the-middle (MITM) attacks.
Timothy Micheal Wyatt, Brian James Buck, Nitin Shridhar Desai, Robert Blaine Elwell, Eike Christian Falkenberg, Meng Hu
Filed: 22 May 23
Utility
Methods for Managing User Access to Computing Devices Based on Evaluation of Authentication and Maintenance of User Control
7 Sep 23
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a second device based on the user maintaining control of a first device.
Kevin Patrick Mahaffey, Brian James Buck
Filed: 15 May 23
Utility
System and Computer Readable Media Enabling Methods for Permitting a Request after Verifying Knowledge of First and Second Secrets
17 Aug 23
Systems and Computer Readable Media for enabling methods for multi-party authorization including a security component determining that a request for the performance of an action on a computing device is from a first party.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc WIlliam Rogers
Filed: 24 Apr 23
Utility
Methods and Systems for Addressing Unreported Theft or Loss of Mobile Communications Devices
3 Aug 23
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
Filed: 12 Apr 23
Utility
Service Protecting Privacy While Monitoring Password and Username Usage
25 May 23
A service monitors password and username use while maintaining username and password privacy by receiving a hash of a username, a hash of a password, and a host name and comparing the received hashes against a database of associated host names and hashes of usernames and passwords.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 20 Jan 23
Utility
Privacy Preservation In Network Connections
23 Mar 23
Methods and systems provide for reducing privacy leaks in DNS request by using a private DNS service.
Brian James Buck
Filed: 23 Nov 22
Utility
Device-Based Security Scoring
9 Mar 23
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian James Buck, Katelyn Clifford
Filed: 8 Nov 22
Utility
Self-Management of Devices Using Personal Mobile Device Management
9 Mar 23
An operating system of a mobile device defines an interface for an MDM to ensure security of the device.
Brian James Buck, Aaron David Cockerill
Filed: 3 Nov 22
Utility
Use Of Geolocation To Improve Security While Protecting Privacy
23 Feb 23
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device’s location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 3 Nov 22
Utility
Computer Systems and Methods to Protect User Credential Against Phishing
9 Feb 23
Computer systems and methods to protect user credential against phishing with security measures applied based on determination of phishing risks of locations being visited, phishing susceptibility of users, roles of users, verification of senders of messages, and/or the timing of stages in accessing and interacting with the locations.
Jeremy Boyd Richards, Brian James Buck
Filed: 25 Oct 22
Utility
Identification of Triggering Events Correlated with DNS Requests for Increased Security
3 Nov 22
A triggering event correlated with domain name system (DNS) requests is identified.
Brian James Buck
Filed: 13 Jul 22
Utility
Evaluation Server to Compare Data from Mobile Devices to Historical Device Data to Control Deployment of Security Policies
6 Oct 22
A cloud server collects and stores context data from mobile devices.
Brian James Buck, David Richardson, Alex Richard Gladd
Filed: 17 Jun 22
Utility
Method and System for Verifying Device Ownership Upon Receiving a Tagged Communication from the Device
25 Aug 22
A mobile communications device is provided with a tagging module that tags outgoing communications.
Marc William Rogers, Brian James Buck
Filed: 9 Feb 22
Utility
Methods and Systems for Providing a Secure Connection to a Mobile Communications Device with the Level of Security Based on a Context of the Communication
18 Aug 22
Based on context received regarding a computing device and a security policy, a computing device evaluates a request by an application program to determine whether or not to allow the establishment of an application connection.
Kevin Patrick Mahaffey, Timothy Strazzere, Brian James Buck
Filed: 6 May 22
Utility
Improving Mobile Device Security Using A Secure Execution Context
28 Jul 22
A device includes a secure execution context that is segregated from an operating system of the device.
Brian James Buck, Karina Livitian, Francis Kelly, Sebastian Krawczuk, Michael Murray
Filed: 12 Apr 22
Utility
Protecting Client Privacy During Browsing
30 Jun 22
Methods and systems provide for receiving an assessment of a full uniform resource locator (URL) in a browser session in advance of the browser accessing the URL, maintaining client privacy in the process using a proxy between the client device and an assessment component on a server.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 14 Mar 22
Utility
Quarantine of Software by an Evaluation Server Based on Authenticity Analysis of User Device Data
16 Jun 22
In one approach, a request for software evaluation is received by an evaluation server from a user device.
Timothy Micheal Wyatt, William Neil Robinson, Brian James Buck, Alex Richard Gladd
Filed: 3 Mar 22