31 patents
Page 2 of 2
Utility
Determining a Security State Based on Communication with an Authenticity Server
2 Jun 22
For increased security, a source is determined for software to be installed on a computing device.
David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
Filed: 17 Feb 22
Utility
Domain Name and Url Visual Verification for Increased Security
21 Apr 22
Techniques for providing domain name and URL visual verifications to increase security of operations on a device.
Brian James Buck
Filed: 27 Dec 21
Utility
Methods and Systems for Addressing Unreported Theft or Loss of Mobile Communications Devices
30 Dec 21
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
Filed: 10 Sep 21
Utility
Providing a Mobile Communications Device with Access to a Provider Service Conditioned Upon a Device Security Level Determination
4 Nov 21
Methods and systems are provided for providing a mobile communications device with access to a provider with a plurality of security levels.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Brian James Buck, William Robinson
Filed: 13 Jul 21
Utility
Methods for Maintaning User Access to Computing Devices Based on Determining User Control
9 Sep 21
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device.
William Robinson, Kevin Patrick Mahaffey, Brian James Buck
Filed: 24 May 21
Utility
Device-Based Security Scoring
9 Sep 21
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian Buck, Katelyn Clifford
Filed: 5 Mar 20
Utility
Privacy Preservation In Network Connections
19 Aug 21
Methods and systems provide for reducing privacy leaks in DNS request by using a private DNS service.
Brian James Buck
Filed: 18 Feb 21
Utility
Configuring Access to a Network Service Based on a Security State of a Mobile Device
19 Aug 21
In one approach, a first computing device receives a request from a second computing device.
Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
Filed: 4 May 21
Utility
Detecting an Attempted Access of Personal Information on Client Computing Devices
5 Aug 21
Systems and methods are disclosed for managing personal data on a client computer in which personal data stored at one or more locations on the client computer is identified by a policy management module on the computer or a server.
Timothy Micheal Wyatt, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck, Marc William Rogers
Filed: 12 Apr 21
Utility
Use Of Geolocation To Improve Security While Protecting Privacy
5 Aug 21
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 5 Feb 20
Utility
System and Method for Permitting a Request after Verifying Knowledge of First and Second Secrets
27 May 21
A method for multi-party authorization includes a security component determining that a request for the performance of an action on a computing device is from a first party.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc William Rogers
Filed: 2 Feb 21