36 patents
Utility
Device-based security scoring
9 Jan 24
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian James Buck, Katelyn Clifford
Filed: 8 Nov 22
Utility
Evaluation server to compare data from mobile devices to historical device data to control deployment of security policies
2 Jan 24
A cloud server collects and stores context data from mobile devices.
Brian James Buck, David Richardson, Alex Richard Gladd
Filed: 17 Jun 22
Utility
Use of geolocation to improve security while protecting privacy
19 Dec 23
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 3 Nov 22
Utility
Coordinating multiple components
19 Dec 23
Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component.
Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
Filed: 15 Dec 21
Utility
Communicating with client device to determine security risk in allowing access to data of a service provider
14 Nov 23
An identity broker receives a request for access by a client device to a service provided by a server.
RĂ©da Zerrad, Dhruva Gopal, Sneha Sachidananda, Dayyan Yoon Lord, Varun Shimoga Prakash, Christopher Brandon Leach, Brian James Buck, Jeroen Martijn Wijdogen
Filed: 5 Jun 20
Utility
Service protecting privacy while monitoring password and username usage
17 Oct 23
A service monitors password and username use while maintaining username and password privacy by receiving a hash of a username, a hash of a password, and a host name and comparing the received hashes against a database of associated host names and hashes of usernames and passwords.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 20 Jan 23
Utility
Method and system for verifying device ownership upon receiving a tagged communication from the device
19 Sep 23
A mobile communications device is provided with a tagging module that tags outgoing communications.
Marc William Rogers, Brian James Buck
Filed: 9 Feb 22
Utility
Methods for monitoring and managing extended reality display
19 Sep 23
Methods and systems provide for context-based adaptation of extended reality images on a display.
Brian James Buck
Filed: 23 Nov 22
Utility
Monitoring a computing device to automatically obtain data in response to detecting background activity
8 Aug 23
An operating system monitors a computing device to determine that one or more events, including background activity, have occurred.
David Richardson, Kevin Patrick Mahaffey, Jonathan Grubb
Filed: 22 May 20
Utility
Methods for maintaning user access to computing devices based on determining user control
16 May 23
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device.
William Robinson, Kevin Patrick Mahaffey, Brian James Buck
Filed: 24 May 21
Utility
Methods and systems for addressing unreported theft or loss of mobile communications devices
2 May 23
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource.
Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
Filed: 10 Sep 21
Utility
System and method for permitting a request after verifying knowledge of first and second secrets
25 Apr 23
A method for multi-party authorization includes a security component determining that a request for the performance of an action on a computing device is from a first party.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc William Rogers
Filed: 2 Feb 21
Utility
System and method for pushing messages to a mobile communications device
21 Feb 23
A method disclosed herein provides for pushing messages to a mobile communications device.
Ariel Salomon, Kevin Patrick Mahaffey
Filed: 27 Dec 18
Utility
Protecting client privacy during browsing
31 Jan 23
Methods and systems provide for receiving an assessment of a full uniform resource locator (URL) in a browser session in advance of the browser accessing the URL, maintaining client privacy in the process using a proxy between the client device and an assessment component on a server.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 14 Mar 22
Utility
Device-based security scoring
27 Dec 22
Applications on a device are assigned scores based on their attributes, update status, and source.
Victoria Ashley Mosby, Bastien Bobe, Brian Buck, Katelyn Clifford
Filed: 5 Mar 20
Utility
Self-management of devices using personal mobile device management
6 Dec 22
An operating system of a mobile device defines an interface for an MDM to ensure security of the device.
Brian James Buck, Aaron David Cockerill
Filed: 25 Feb 20
Utility
Use of geolocation to improve security while protecting privacy
6 Dec 22
Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server.
Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
Filed: 5 Feb 20
Utility
Detecting realtime phishing from a phished client or at a security server
8 Nov 22
Disclosed herein are techniques for detecting phishing websites.
Jeremy Boyd Richards, Brian James Buck
Filed: 12 Nov 19
Utility
Computer systems and methods to protect user credential against phishing
1 Nov 22
Computer systems and methods to protect user credential against phishing with security measures applied based on determination of phishing risks of locations being visited, phishing susceptibility of users, roles of users, verification of senders of messages, and/or the timing of stages in accessing and interacting with the locations.
Jeremy Boyd Richards, Brian James Buck
Filed: 11 May 20
Utility
DNS prefetching based on triggers for increased security
19 Jul 22
Techniques for DNS prefetching based on application or contextual triggers to increase security in prefetching.
Brian James Buck
Filed: 7 Mar 19