Loading...
Docoh

NortonLifeLock (NLOK)

200 patents

Page 2 of 10
Utility
Systems and methods for protecting users from security threats
22 Feb 22
The disclosed computer-implemented method for protecting users from security threats may include (i) receiving a photograph of a target that a user is attempting to acquire, (ii) extracting, from the photograph, an identifier of the target, (iii) applying the identifier of the target to a software security policy that indicates whether the target is safe for the user, and (iv) releasing locked resources to enable the user to acquire the target based on a determination that the software security policy indicates that the target is safe for the user.
Santhana Krishnan K. C.
Filed: 11 Aug 20
Utility
Systems and Methods for Protecting Against Misleading Clicks on Websites
17 Feb 22
The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL.
Iskander Sanchez, David Silva
Filed: 12 Aug 20
Utility
Systems and methods for customizing security alert reports
8 Feb 22
The disclosed computer-implemented method for customizing security alert reports may include (i) identifying a local machine learning model that predicts how a client responds to security alerts generated for the client, (ii) identifying a set of peer machine learning models that predict how a set of peers of the client each responds to security alerts generated for each respective peer, (iii) measuring a level of similarity between the client and each respective peer of the set of peers according to a similarity metric to create a similarity model, (iv) aggregating the local machine learning model and at least one of the set of peer machine learning models based on the similarity model to create an aggregated machine learning model, and (v) protecting the client by applying the aggregated machine learning model to customize an electronically displayed security alert report.
Daniel Kats, Kevin Roundy
Filed: 4 Apr 18
Utility
Controlling access to a computing device with a wireless device using wireless signal strength measurements
8 Feb 22
A method for controlling access to a computing device includes detecting one or more wireless devices configured as wireless access points.
Vlad Mihai Buliga, Alexandru Cosmin Vlajoaga, Raluca Iulia Stanciu, Robert A. Clyde
Filed: 24 Apr 19
Utility
Systems and methods for protecting users
25 Jan 22
The disclosed computer-implemented method for protecting users may include (i) identifying a first light-and-radio frequency signature that was captured by a security device based on signals emanating from a mobile computing device at a first time and location, (ii) identifying a second light-and-radio frequency signature that was captured by a same or different security device based on signals emanating from the same mobile computing device at a second time and location, (iii) determining that the first light-and-radio frequency signature and the second light-and-radio frequency signature match such that an inference is made that an individual possessing the mobile computing device was present at both the first time and location and the second time and location, and (iv) performing, based on the inference, a security action to protect a user.
Qing Li, Brian Varner, Stanley Kiefer, Daniel Kats, Yun Shen, David Silva
Filed: 18 Mar 21
Utility
Systems and methods for verifying decentralized federated data using influence evaluation
18 Jan 22
The disclosed computer-implemented method for verifying decentralized federated data using influence evaluation may include (i) calculate an influence score for each of a group of data instances, (ii) rank the data instances based on the influence scores, (iii) determine an anomaly score for each of the ranked data instances, (iv) select the ranked data instances with the highest anomaly scores as containing potentially malicious data, and (v) perform a security action that protects against the potentially malicious data.
Christopher Gates, Yufei Han
Filed: 29 Mar 19
Utility
Systems and methods for password breach monitoring and notification
11 Jan 22
The disclosed computer-implemented method for password breach monitoring and notification may include (i) detecting a set of authentication credentials for a user, (ii) generating a one-way hash for a password associated with the authentication credentials, (iii) selecting a hash prefix including a subset of data in the hash, (iv) sending the hash prefix to a backend service for matching with a set of hash suffixes associated with known compromised passwords, (v) determining that a breach has occurred based on the password associated with the authentication credentials being compromised when the hash prefix matches a hash suffix in the set of hash suffixes, and (vi) performing a security action that protects against an additional breach associated with the compromised password.
SriHarsha Angara, Adam Stiles, Mahesh Kamsala
Filed: 23 Dec 19
Utility
Employing beacon messages to restart an application on a mobile device
4 Jan 22
Employing beacon messages to restart an application on a mobile device.
Lei Gu, Sharad Subhash Mhaske
Filed: 18 May 20
Utility
Systems and methods for automatically recovering from malware attacks
4 Jan 22
The disclosed computer-implemented methods for automatically recovering from malware attacks may include (1) saving, in response to determining that a reputation of a process is unknown, a backup copy of a file on a remote storage device prior to allowing the process to modify the file; (2) determining, after the process has modified the file, that the process is potentially malicious; and (3) restoring, in response to determining that the process is potentially malicious, the backup copy of the file from the remote storage device.
Lei Gu, Ilya Sokolov
Filed: 13 Sep 17
Utility
Systems and methods for selectively encrypting controlled information for viewing by an augmented reality device
4 Jan 22
The disclosed computer-implemented method for selectively encrypting controlled information for viewing by an augmented reality device may include (i) automatically identifying, at a computing device and using at least one of natural language processing and/or a pre-defined data loss prevention policy, a portion of a source text including controlled information, (ii) tokenizing the portion of the source text, and (iii) performing a security action that may include (A) generating a public key, (B) encrypting the tokenized portion of the source text with the public key to produce an encrypted marker, and (C) replacing the portion of the source text with the encrypted marker to produce a replacement document.
David Silva, Johann Roturier, Pratyush Banerjee
Filed: 24 Jun 19
Utility
Systems and methods for training malware classifiers
28 Dec 21
The disclosed computer-implemented method for training malware classifiers may include (1) perturbing, at a computing device, a binary file in a manner that maintains functionality of the binary file, (2) classifying the perturbed binary file with a first machine learning classifier to produce a classification result, (3) producing a transformed file by repeating the perturbing and classifying steps until the transformed file becomes misclassified, and (4) performing a security action comprising training a second machine learning classifier with the transformed file and an associated correct classification result.
Mahmood Sharif, Saurabh Shintre, Kevin Roundy, Sandeep Bhatkar
Filed: 25 Sep 18
Utility
Systems and methods for identifying privacy leakage information
21 Dec 21
The disclosed computer-implemented method for identifying privacy leakage information may include (1) identifying, at the computing device, at least one informative word in a digital text and (2) performing a security action that identifies privacy leakage information, where the security action includes (A) determining, for at least one identified informative word, a type of privacy leakage and a respective confidence score indicating a probability the identified informative word causes the type of privacy leakage, (B) determining, using the respective confidence score, a combined confidence score for each respective element within a level of detail to display, and (C) displaying, on a display device, the combined confidence score for each respective element within the level of detail to display.
Ashwin Kayyoor, Petros Efstathopoulos
Filed: 20 Dec 18
Utility
User-based cyber risk communications using personalized notifications
7 Dec 21
Methods and systems are provided for monitoring private information exposure.
Johann Roturier, Petros Efstathopoulos
Filed: 18 Dec 18
Utility
Systems and methods for performing load balancing and distributed high-availability
30 Nov 21
The disclosed computer-implemented method for performing load balancing and distributed high-availability may include (i) detecting through a group communication channel that links all nodes of a computing cluster that an overburdened node of the computing cluster has fallen below a predefined performance level, (ii) determining to transfer a specific microservice transaction from the overburdened node to a helper node in the computing cluster, (iii) copying data for the specific microservice transaction from a portion of a central data store that is reserved for the overburdened node to another data store that is reserved for the helper node, and (iv) completing, by the helper node, the specific microservice transaction by referencing the copied data for the specific microservice transaction in the data store that is reserved for the helper node.
Qing Li
Filed: 2 Mar 21
Utility
Adaptive security filtering on a client device
30 Nov 21
Adaptive security filtering on a client device.
Daniel Marino, Daniel Kats, Brian Schlatter
Filed: 7 Mar 19
Utility
Privacy preserving secure task automation
23 Nov 21
Privacy preserving secure task automation.
Sandeep Bhatkar, Susanta K. Nanda, Yuqiong Sun, Saurabh Shintre
Filed: 28 Sep 18
Utility
Systems and methods for crowd-storing encrypiion keys
23 Nov 21
The disclosed computer-implemented method for crowd-storing encryption keys may include (i) sending, from a client computing device and to a server, a recovery request, (ii) creating a first public-private key pair, (iii) receiving a plurality of encrypted shares of an encryption key from the server in response to the recovery request, where the encrypted shares are encrypted with a first public key of the first public-private key pair, and (iv) performing a security action including (A) decrypting the plurality of encrypted shares of the encryption key with a first private key of the first public-private key pair and (B) recovering the encryption key from the decrypted plurality of shares of the encryption key.
Ilya Sokolov, Lei Gu, Daniel Kats
Filed: 24 Dec 18
Utility
Identifying and protecting against evolving cyberattacks using temporal word embeddings
23 Nov 21
Identifying and protecting against evolving cyberattacks using temporal word embeddings.
Yun Shen
Filed: 30 Jul 19
Utility
Systems and methods for generating user profiles
16 Nov 21
The disclosed computer-implemented method for generating user profiles may include (i) analyzing a data set of user profiles for services, (ii) detecting a measurement of obfuscation that was applied to a specific attribute across multiple user profiles for a specific service, (iii) applying the measurement of obfuscation to true data for a new user by fuzzing the true data to create a fuzzed value, and (iv) generating automatically a new user profile for the specific service by populating the specific attribute within the new user profile with the fuzzed value.
Daniel Kats, Petros Efstathopoulos, Chris Gates
Filed: 28 Nov 18
Utility
Systems and Methods for Identifying Software Vulnerabilities In Embedded Device Firmware
11 Nov 21
The disclosed computer-implemented method for identifying software vulnerabilities in embedded device firmware may include (i) collecting a firmware image for an Internet-of-Things device, (ii) extracting library dependencies from the firmware image for the Internet-of-Things device, (iii) identifying a true version of a library specified in the firmware image by checking a ground truth database that records confirmed values for true versions for previously encountered libraries, and (iv) performing a security action to protect a user from a security risk based on identifying the true version of the library specified in the firmware image.
Johannes Krupp, Pierre-Antoine Vervier, Yun Shen
Filed: 8 May 20
Patents are sorted by USPTO publication date, most recent first