257 patents
Page 10 of 13
Utility
Systems and methods for protecting against outgoing calls to malicious phone numbers
26 Oct 20
The disclosed computer-implemented method for protecting against outgoing calls to malicious phone numbers may include (1) intercepting, at a computing device, an attempt to initiate an outgoing phone call, (2) disabling, at the computing device and at least temporarily, the attempt, (3) querying a reputation server for a reputation of an outgoing phone number associated with the attempt, (4) receiving, at the computing device, reputation results from the reputation server, and (5) performing a security action comprising displaying, on a user display of the computing device and prior to enabling the attempt, at least a portion of the reputation results.
Anand Darak, Anuradha Joshi
Filed: 18 Sep 18
Utility
Systems and methods for performing reputation-based identification of applications on unmanaged mobile devices
26 Oct 20
The disclosed computer-implemented method for performing reputation-based identification of applications on unmanaged mobile devices may include (i) receiving screen content displayed on an unmanaged mobile device, (ii) analyzing, by a machine-learning algorithm, the screen content to identify a set of applications stored on the unmanaged mobile device, (iii) querying a reputation service for reputation data associated with each of the applications, the reputation data including a security classification describing potential threats against the unmanaged mobile device, (iv) associating the reputation data with each of the applications, and (v) generating a notification comprising a list of the applications and the associated reputation data for utilization by the unmanaged mobile device to perform one or more protective actions against the potential threats.
Josh Opos
Filed: 26 Feb 19
Utility
Systems and methods for certifying geolocation coordinates of computing devices
19 Oct 20
The disclosed computer-implemented method for certifying geolocation coordinates of computing devices may include (i) receiving, from a client computing device, a set of geolocation coordinates that purport to identify the physical location of the client computing device, (ii) identifying, in response to receiving the geolocation coordinates, at least one cooperating geolocation device that is within physical proximity to the geolocation coordinates provided by the client computing device, (iii) performing a proximity validation check that demonstrates that the client computing device is within physical proximity to the cooperating geolocation device, and (iv) certifying, based on the proximity validation check, the geolocation coordinates as valid geolocation coordinates.
Ilya Sokolov, Keith Newstadt
Filed: 21 Mar 17
Utility
System and method of dynamic backup policy generation
19 Oct 20
A system and method of dynamic backup policy generation based upon a user's behavior is provided.
Lei Gu, Ilya Sokolov
Filed: 12 May 16
Utility
Automatically adjusting backup set rules based on anomalous backup activity
19 Oct 20
Backup metrics are received from multiple endpoints.
Lei Gu, Ilya Sokolov
Filed: 30 Jul 17
Utility
Systems and methods for executing application launchers
12 Oct 20
The disclosed computer-implemented method for executing application launchers may include (i) creating a security sandbox within an operating system environment, (ii) executing an original application launcher within the security sandbox, and (iii) registering the security sandbox as a new application launcher within the operating system environment such that the original application launcher is still available to a user through the security sandbox and the security sandbox supplements the original application launcher by providing a layer of protection for the user.
Radoslav Stanev, Jonathon Salehpour, Somard Kruayatidee
Filed: 19 Feb 18
Utility
Systems and methods for preventing sensitive data sharing
12 Oct 20
The disclosed computer-implemented method for preventing sensitive data sharing may include a computing device determining that a content item is to be shared with an application.
Pallavi Rajput, Anand Darak, Anuradha Joshi
Filed: 24 Jun 18
Utility
Systems and methods for protecting users
12 Oct 20
The disclosed computer-implemented method for protecting users may include (i) detecting, by a sensor component, an electromagnetic signal radiating from an eavesdropping device, (ii) receiving, by a mobile computing device, information identifying the electromagnetic signal, and (iii) displaying, by the mobile computing device, an augmented reality display that overlays a visual indication of a location of the eavesdropping device on an image captured by a camera of the mobile computing device to enable a user to locate the eavesdropping device.
Qing Li, Brian Varner, Stanley Kiefer
Filed: 26 Nov 19
Utility
Systems and methods for generating passwords
5 Oct 20
The disclosed computer-implemented method for generating passwords may include (i) accessing a vault of confidential information describing a user, (ii) extracting, from the vault, a set of multiple items of confidential information describing the user, (iii) executing a programmed heuristic on the set of multiple items of confidential information to generate multiple candidate passwords that each derives from a respective semirandom permutation of the multiple items of confidential information, and (iv) displaying electronically the multiple candidate passwords to the user to enable the user to select a password from the multiple candidate passwords as a specific password for accessing a protected computing resource.
Duong Nguyen-Huu, Bruce McCorkendale
Filed: 5 Jun 18
Utility
Remotely controlling access to a digital camera
5 Oct 20
Remotely controlling access to a digital camera.
Santhanakrishnan K C
Filed: 19 Dec 18
Utility
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
5 Oct 20
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP).
Mehmet Emre Gursoy, Acar Tamersoy
Filed: 27 Sep 18
Utility
Systems and methods for automatically adjusting parental controls of computing devices to accommodate holidays
5 Oct 20
The disclosed computer-implemented method for automatically adjusting parental controls of computing devices to accommodate holidays may include (i) identifying, at a computing device, a geolocation of the computing device from geolocation information and (ii) performing, at the computing device, a security action.
Manjunath Rajendrababu, Trijimon Padmalayam Rajan
Filed: 30 May 19
Utility
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
28 Sep 20
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP).
Mehmet Emre Gursoy, Acar Tamersoy
Filed: 27 Sep 18
Utility
Systems and methods for securing universal plug and play connections
28 Sep 20
The disclosed computer-implemented method for securing Universal Plug and Play connections may include (1) detecting, by a network device within a local network, an attempt by a remote device to establish a connection with a client device within the local network via a UPnP protocol, (2) identifying a forwarding rule applied by the network device on the client device based at least in part on an identity of the client device, (3) determining at least one restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, and then in response to determining the restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, (4) enforcing the restriction on the connection attempted by the remote device with the client device via the UPnP protocol.
Bruce McCorkendale, Ramakrishnan Meenakshi Sundaram, Justin Harmon, Srini Chillappa
Filed: 29 Sep 16
Utility
Systems and methods for preventing sensitive information exposure based on a surrounding audience
21 Sep 20
The disclosed computer-implemented method for preventing sensitive information exposure based on a surrounding audience may include (1) detecting, from one or more communication devices, surrounding audience data associated with an audience presentation on a presentation device, the audience presentation including sensitive information and non-sensitive information, (2) determining an audience profile based on the surrounding audience data, the audience profile identifying one or more unintended audience members in the surrounding audience, (3) assigning an information exposure policy to the audience presentation based on the audience profile, and (4) performing a security action to enforce the information exposure policy on the presentation device such that the sensitive information is prevented from being exposed to the surrounding audience during the audience presentation.
Lei Gu, Ilya Sokolov
Filed: 15 May 18
Utility
Systems and methods for controlling access
21 Sep 20
The disclosed computer-implemented method for controlling access may include (i) installing on a personal mobile device a mobile device application that enforces an authorization security policy for protected premises, (ii) checking, by the mobile device application and in response to installing the mobile device application, whether the personal mobile device satisfies a condition of the authorization security policy, (iii) granting authorization for the personal mobile device to function as an access card based on a result of checking whether the personal mobile device satisfies the condition of the authorization security policy, and (iv) enforcing an additional access security policy on the personal mobile device after granting authorization for the personal mobile device to function as the access card.
Sharad Mhaske, Anuradha Joshi
Filed: 19 Dec 18
Utility
Identifying evidence of attacks by analyzing log text
21 Sep 20
Log text is encoded into a low dimensional feature vector.
Yufei Han, Michael Hart, Joseph Lopilato
Filed: 27 Sep 18
Utility
Detecting and preventing phishing phone calls through verified attribute analysis
14 Sep 20
A method for detecting and preventing phishing phone calls through verified attribute analysis is described.
Keith Newstadt, Ilya Sokolov, Venkadesan Marimuthu
Filed: 29 Mar 18
Utility
Systems and methods for identifying unsolicited communications on a computing device
14 Sep 20
The disclosed computer-implemented method for identifying unsolicited communications on a computing device may include a computing device receiving a communication from an unrecognized phone number; obtaining the unrecognized phone number from the communication; obtaining classification data associated with the unrecognized phone number based on categories of other computing devices contacted by the unrecognized phone number; obtaining a category associated with a phone number of the computing device; determining that the communication is an unsolicited communication based on the classification data and the category associated with the phone number of the computing device; and in response to determining that the communication is unsolicited, performing a security action to manage interactions with the communication from the unrecognized phone number.
Brendon Woirhaye, Radoslav Stanev, Anuj Sahai
Filed: 4 Mar 19
Utility
Systems and methods for identifying data breaches
7 Sep 20
The disclosed computer-implemented method for detecting unauthorized data shares may include (1) providing a user of an anonymized inbox with an email alias to use for a particular online entity, (2) identifying one or more emails sent to the email alias from one or more different entities that are different from the particular online entity, (3) determining, based on the one or more emails having been sent by the different entities, that the particular online entity has shared the user's email alias with other entities, and (4) creating a privacy score for the particular online entity based at least in part on the determination that the particular online entity has shared the user's email alias with other entities.
SriHarsha Angara, Michael Lo, Srini Chillappa, Simon Tiku, Viral Mehta, John Meehan
Filed: 8 Jun 18