36 patents
Page 2 of 2
Utility
Deployment of passive and active security policies to mobile devices
21 Jun 22
Techniques for deployment of policies to computing devices are described herein.
Brian James Buck, David Richardson, Alex Richard Gladd
Filed: 9 Nov 20
Utility
Phishing protection using cloning detection
7 Jun 22
Techniques for phishing protection using cloning detection are described herein.
Jeremy Boyd Richards, Brian James Buck
Filed: 19 Nov 19
Utility
Methods and systems for providing a secure connection to a mobile communications device with the level of security based on a context of the communication
31 May 22
Based on context received regarding a mobile communications device a server determines whether an existing network connection employed by the mobile communications device offers a level of security that is appropriate.
Kevin Patrick Mahaffey, Timothy Strazzere, Brian James Buck
Filed: 17 Jan 19
Utility
Evaluating authenticity of applications based on assessing user device context for increased security
17 May 22
Software applications to be installed on user devices are monitored.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
Filed: 5 Aug 19
Utility
Mobile device security using a secure execution context
17 May 22
A device includes a secure execution context that is segregated from an operating system of the device.
Brian James Buck, Karina Levitian, Francis Kelly, Sebastian Krawczuk, Michael Murray
Filed: 5 Mar 20
Utility
Security during domain name resolution and browsing
15 Mar 22
Methods and systems provide for resolving domain names by employing a proxy server between the client device and the resolving server.
Brian James Buck, Stephen Lind, Brian Sullivan
Filed: 5 Jun 20
Utility
Determining a security state designation for a computing device based on a source of software
22 Feb 22
For increased security, a source is determined for software to be installed on a computing device.
David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
Filed: 21 Nov 19
Utility
Method and system for providing a security component to a mobile communications device in an application
15 Feb 22
A security code module is provided that a developer may include in an application.
Marc William Rogers, Brian James Buck
Filed: 15 Nov 19
Utility
Coordinating multiple components
1 Feb 22
Systems and methods for coordinating components can include: determining, by a first application executing on a client device, a need to perform a sharable functional task; identifying a first software component installed on the client device and capable of performing a first variation of the sharable functional task; identifying a second software component installed on the client device and capable of performing a second variation of the sharable functional task, wherein the second variation of the sharable functional task is functionally overlapping with and not identical to the first variation; identifying a set of characteristics of both the first software component and the second software component; selecting the second software component for performing the sharable functional task based on the set of characteristics, where the set of characteristics includes at least a version number; and delegating performance of the sharable functional task to the second software component.
Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
Filed: 16 Sep 19
Utility
Domain name and URL visual verification for increased security
1 Feb 22
Techniques for providing domain name and URL visual verifications to increase security of operations on a device.
Brian James Buck
Filed: 7 Mar 19
Utility
Methods and systems for enhancing electronic device security by intercepting and analyzing a communication
14 Sep 21
Systems and methods enhance the security of an electronic device by causing an application on the device to intercept and analyze a communication.
Kevin Patrick Mahaffey, David Luke Richardson, Ayan Mandal, Cherry Mangat, Vance Grkov
Filed: 24 Mar 20
Utility
Methods and systems for analyzing data after initial analyses by known good and known bad security components
3 Aug 21
Methods and systems are provided for conditionally allowing a mobile communications device to process received data.
Kevin Patrick Mahaffey
Filed: 31 Oct 19
Utility
System and method for processing a command based on verification information and a challenge token
29 Jun 21
A computing device creates verification information and a challenge token and sends the verification information and token to a server.
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh, Marc William Rogers
Filed: 18 Sep 19
Utility
Managing access to services based on fingerprint matching
15 Jun 21
A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation that includes creating a fingerprint of the first computing device; and determining, by the second computing device, whether the fingerprint matches a fingerprint of one or more other computing devices.
Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
Filed: 7 Jan 19
Utility
Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device
25 May 21
The method disclosed herein provides for performing device authentication based on the of proximity to another device, such as a key device.
William Robinson, Kevin Patrick Mahaffey, Brian James Buck
Filed: 3 Jun 19
Utility
Methods and systems for detecting attempts to access personal information on mobile communications devices
27 Apr 21
Systems and methods are disclosed for managing personal data on a mobile communications device in which personal data stored at one or more locations on the mobile communications device is identified by a policy management module on the mobile communications device.
Timothy Micheal Wyatt, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck, Marc William Rogers
Filed: 9 Sep 19