Loading...
Docoh

NortonLifeLock (NLOK)

Utility
Systems and methods to mitigate stalkerware by rendering it useless
21 Jun 22
The disclosed computer-implemented method for mitigating stalkerware by rendering it useless is performed, at least in part, by a computing device comprising at least one processor.
Anubhav Savant, Arif Mohammed Shaikh
Filed: 20 Dec 19
Utility
Identifying and protecting against a computer security threat while preserving privacy of individual client devices using differential privacy for text documents
14 Jun 22
Identifying and protecting against a computer security threat while preserving privacy of individual client devices using differential privacy for text documents.
Geoffrey So, Melanie Beck, Jasjeet Dhaliwal, Andrew B. Gardner, Aleatha Parker-Wood
Filed: 18 Dec 18
Utility
Systems and methods for detecting potentially malicious content in decentralized machine-learning model updates
14 Jun 22
The disclosed computer-implemented method for detecting potentially malicious content in decentralized machine-learning model updates may include (i) receiving messages communicated within a group of client devices for performing an update of a shared machine-learning model, (ii) determining a bias of a target message in the messages communicated from a target client device in the group with respect to a remaining number of the messages in the messages communicated from the other client devices in the group, (iii) assigning a confidence score to each of the other client devices based on the bias determined for the target message, the confidence score representing a likelihood of potentially malicious content in the target message, and (iv) performing, based on the confidence score, a security action that prevents the potentially malicious content from compromising the update of the shared machine-learning model.
Christopher Gates, Yufei Han
Filed: 28 Mar 19
Utility
Analyzing and mitigating privacy issues on a computing device using cookie generation flows
7 Jun 22
Analyzing and mitigating privacy issues on a computing device using cookie generation flows.
Iskander Sanchez, Leylya Yumer
Filed: 21 Jun 19
Utility
Realtime financial transaction approval
24 May 22
A method for approving financial transactions is described.
Radoslav Stanev
Filed: 28 Mar 19
Utility
Employing SNI hostname extraction to populate a reverse DNS listing to protect against potentially malicious domains
17 May 22
Server Name Indication (SNI) hostname extraction to populate a reverse Domain Name System (DNS) listing to protect against potentially malicious domains.
Bruce McCorkendale
Filed: 7 May 20
Utility
Systems and methods for securing communications
3 May 22
The disclosed computer-implemented method for securing communications may include (i) establishing an overlay network within a publicly available on-demand cloud computing platform, the overlay network enabling secure communications between devices by maintaining within the overlay network a services mapping table that defines access rights to at least one of shared data or services, and (ii) transferring data, by the overlay network acting as an intermediary, from a first device that has securely connected to the overlay network to a second device that has securely connected to the overlay network, in accordance with the access rights defined in the services mapping table.
Qing Li
Filed: 30 Jan 19
Utility
Systems and methods for protecting users
26 Apr 22
The disclosed computer-implemented method for protecting users may include (i) intercepting, through a cloud-based security proxy service, network traffic originating from a mobile application at a mobile device connected to a local area network protected by the cloud-based security proxy service, (ii) detecting, by the cloud-based security proxy service, a threat indicator indicated by the mobile application, and (iii) modifying the network traffic originating from the mobile application at the mobile device by applying, by the cloud-based security proxy service based on detecting the threat indicator indicated by the mobile application, a security policy to protect the local area network from a candidate threat corresponding to the threat indicator.
Qing Li, Samir Kapuria, Wenjing Wang, Howard Chen
Filed: 12 Aug 19
Utility
Identifying and protecting against surveillance apps installed on client devices
5 Apr 22
Identifying and protecting against malicious apps installed on client devices.
Kevin Alejandro Roundy, Acar Tamersoy
Filed: 26 Feb 19
Utility
Systems and methods for restoring applications
29 Mar 22
The disclosed computer-implemented method for restoring applications may include (i) detecting an indication to restore a previous version of an application installed within a mobile operating system environment, (ii) retrieving the previous version of the application from a protected location within the mobile operating system environment where a sandboxing security component stored the previous version of the application, and (iii) executing the previous version of the application within a security sandbox managed by the sandboxing security component.
Jonathon Salehpour, Radoslav Stanev, Somard Kruayatidee
Filed: 29 Mar 19
Utility
Systems and methods for managing connections
22 Mar 22
The disclosed computer-implemented method for managing connections may include (i) detecting, by a security agent on an endpoint, an attempt by another application on the endpoint to establish a connection according to a specific Internet protocol, and (ii) injecting, by the security agent on the endpoint, into an options field within a header of a network packet within the connection, the header formatted according to the specific Internet protocol, at least one byte that reveals identifying information about the application to enable an in-line proxy security device to manage the connection according to the revealed identifying information.
Qing Li
Filed: 2 Mar 21
Utility
Management and protection of internet of things devices
22 Mar 22
A method to manage Internet of Things (IoT) devices is described.
Susanta K Nanda, Yuqiong Sun
Filed: 27 Feb 18
Utility
Systems and methods for detecting anomalous system command line data
15 Mar 22
The disclosed computer-implemented method for detecting anomalous system command line data may include (i) receiving command line data from a target computing system, (ii) building a baseline model that utilizes machine-learning to analyze the command line data, the baseline model comprising a support-vector machine (SVM), natural language processing, and a hashing function, (iii) assigning, utilizing the baseline model, a score to each of a plurality of instances of the command line data, and (iv) identifying, based on the score, anomalous commands comprising potentially malicious data when any of the instances of the command line data fails to exceed a threshold.
Lamine Aouad, Slawomir Grzonkowski
Filed: 31 Mar 19
Utility
Systems and methods for protecting users from security threats
22 Feb 22
The disclosed computer-implemented method for protecting users from security threats may include (i) receiving a photograph of a target that a user is attempting to acquire, (ii) extracting, from the photograph, an identifier of the target, (iii) applying the identifier of the target to a software security policy that indicates whether the target is safe for the user, and (iv) releasing locked resources to enable the user to acquire the target based on a determination that the software security policy indicates that the target is safe for the user.
Santhana Krishnan K. C.
Filed: 11 Aug 20
Utility
Systems and Methods for Protecting Against Misleading Clicks on Websites
17 Feb 22
The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL.
Iskander Sanchez, David Silva
Filed: 12 Aug 20
Utility
Systems and methods for customizing security alert reports
8 Feb 22
The disclosed computer-implemented method for customizing security alert reports may include (i) identifying a local machine learning model that predicts how a client responds to security alerts generated for the client, (ii) identifying a set of peer machine learning models that predict how a set of peers of the client each responds to security alerts generated for each respective peer, (iii) measuring a level of similarity between the client and each respective peer of the set of peers according to a similarity metric to create a similarity model, (iv) aggregating the local machine learning model and at least one of the set of peer machine learning models based on the similarity model to create an aggregated machine learning model, and (v) protecting the client by applying the aggregated machine learning model to customize an electronically displayed security alert report.
Daniel Kats, Kevin Roundy
Filed: 4 Apr 18
Utility
Controlling access to a computing device with a wireless device using wireless signal strength measurements
8 Feb 22
A method for controlling access to a computing device includes detecting one or more wireless devices configured as wireless access points.
Vlad Mihai Buliga, Alexandru Cosmin Vlajoaga, Raluca Iulia Stanciu, Robert A. Clyde
Filed: 24 Apr 19
Utility
Systems and methods for protecting users
25 Jan 22
The disclosed computer-implemented method for protecting users may include (i) identifying a first light-and-radio frequency signature that was captured by a security device based on signals emanating from a mobile computing device at a first time and location, (ii) identifying a second light-and-radio frequency signature that was captured by a same or different security device based on signals emanating from the same mobile computing device at a second time and location, (iii) determining that the first light-and-radio frequency signature and the second light-and-radio frequency signature match such that an inference is made that an individual possessing the mobile computing device was present at both the first time and location and the second time and location, and (iv) performing, based on the inference, a security action to protect a user.
Qing Li, Brian Varner, Stanley Kiefer, Daniel Kats, Yun Shen, David Silva
Filed: 18 Mar 21
Utility
Systems and methods for verifying decentralized federated data using influence evaluation
18 Jan 22
The disclosed computer-implemented method for verifying decentralized federated data using influence evaluation may include (i) calculate an influence score for each of a group of data instances, (ii) rank the data instances based on the influence scores, (iii) determine an anomaly score for each of the ranked data instances, (iv) select the ranked data instances with the highest anomaly scores as containing potentially malicious data, and (v) perform a security action that protects against the potentially malicious data.
Christopher Gates, Yufei Han
Filed: 29 Mar 19
Utility
Systems and methods for password breach monitoring and notification
11 Jan 22
The disclosed computer-implemented method for password breach monitoring and notification may include (i) detecting a set of authentication credentials for a user, (ii) generating a one-way hash for a password associated with the authentication credentials, (iii) selecting a hash prefix including a subset of data in the hash, (iv) sending the hash prefix to a backend service for matching with a set of hash suffixes associated with known compromised passwords, (v) determining that a breach has occurred based on the password associated with the authentication credentials being compromised when the hash prefix matches a hash suffix in the set of hash suffixes, and (vi) performing a security action that protects against an additional breach associated with the compromised password.
SriHarsha Angara, Adam Stiles, Mahesh Kamsala
Filed: 23 Dec 19
Patents are sorted by USPTO publication date, most recent first