Loading...
Docoh

NortonLifeLock (NLOK)

206 patents

Page 6 of 11
Utility
Systems and methods for virtual boundary enforcement using network filters
30 Mar 21
The disclosed computer-implemented method for virtual boundary enforcement using network filters may include (i) applying a network filter to network traffic associated with a target computing device, (ii) analyzing data generated by the network filter, (iii) identifying, based on an analysis of the data, a potential violation of a virtual boundary associated with the target computing device, and (iv) in response to identifying the potential violation, performing a security action to enforce the virtual boundary associated with the target computing device.
Lei Gu, Ilya Sokolov
Filed: 13 Dec 18
Utility
Systems and methods for system recovery from a system user interface process malfunction
30 Mar 21
The disclosed computer-implemented method for system recovery from a system user interface process malfunction may include (i) determining that a system user interface (UI) process is executing on the computing device, (ii) determining that a message indicating a malfunction of the system UI process is displayed on the computing device, (iii) identifying a mobile application that was executing on the computing device at a time of the malfunction of the system UI process, and (iv) in response to identifying the mobile application that was executing at the time of the malfunction of the system UI process, performing a security action for recovery from the malfunction of the system UI process.
Sharad Mhaske, Shrikant Pawar
Filed: 18 Dec 18
Utility
Systems and methods for verifying connection integrity
23 Mar 21
The disclosed computer-implemented method for verifying connection integrity may include (i) receiving a request from a client to initiate a connection to a server via a middlebox, (ii) receiving, from the client, via a side protocol executing in parallel with a transport layer security protocol, a request for a certificate for the middlebox, (iii) sending, to the client, via the side protocol, the certificate, (iv) receiving, from the client, via the side protocol, a request for an additional certificate from a device upstream of the middlebox, (v) requesting, from the device upstream of the middlebox, via the side protocol, the additional certificate, (vi) receiving, from the device upstream of the middlebox, via the side protocol, the additional certificate, (vii) sending, to the client, via the side protocol, the additional certificate, and (viii) relaying data via the connection.
Brian Witten, Qing Li, Ronald Frederick, Roelof Du Toit, Susanta Nanda, Saurabh Shintre, Darren Shou
Filed: 24 Mar 17
Utility
Rating communicating entities based on the sharing of insecure content
16 Mar 21
Communications received by a computing device originating from communicating entities that are members of the same group(s) as a user are tracked.
Anuradha Joshi, Anand Darak
Filed: 29 Aug 18
Utility
Systems and methods for dynamically adjusting a backup policy
9 Mar 21
The disclosed computer-implemented method for dynamically adjusting a backup policy may include dynamically adjusting a backup policy may include accessing a media file, evaluating an objective criterion of a difficulty to reproduce the media file to generate a difficulty rating, comparing the difficulty rating of the media file to an existing difficulty rating for at least one previous media file, and adjusting a backup policy for the media file based on the comparison of the difficulty rating.
Lei Gu, Ilya Sokolov
Filed: 6 Sep 18
Utility
Systems and methods for identifying malicious domain names from a passive domain name system server log
9 Mar 21
Disclosed computer-implemented methods for identifying malicious domain names from a passive domain name system server log (DNS log) may include, in some examples, (1) creating a pool of domain names from the DNS log, (2) identifying respective features of each name in the pool, (3) preparing a list of known benign names and respective features of each known benign name, (4) preparing a list of known malicious names and features of each known malicious name, (5) computing a classification model based on (A) the features of each benign name on the list of benign names and (B) the features of each malicious name on the list of malicious names, (6) identifying respective features of an unclassified domain name, and (7) classifying, using the classification model, the unclassified domain name as malicious, based on the respective features of the unclassified domain name.
Leyla Bilge, Pierre-Antoine Vervier
Filed: 25 Jun 18
Utility
Systems and methods for protecting users
2 Mar 21
The disclosed computer-implemented method for protecting users may include (i) intercepting an attempt to login to a user account of an application using a login credential, (ii) preventing a user corresponding to the user account from revealing personally identifiable information by populating a field for the login credential with a value for an identity-masking persona as a substitute for the personally identifiable information, and (iii) enabling a completion of the attempt to login to the user account of the application using the value for the identity-masking persona, rather than the personally identifiable information, to provide the user with access to an online resource through the application.
Qing Li, Wenjing Wang, Howard Chen, Samir Kapuria
Filed: 12 Aug 19
Utility
Uniform resource locator (URL) transformation and redirection with access control
23 Feb 21
Uniform Resource Locator (URL) transformation and redirection with access control.
Johann Roturier, David Luz Silva, Daniel Kats
Filed: 21 Dec 18
Utility
Thwarting potentially malicious online activity
23 Feb 21
Thwarting potentially malicious online activity.
Venkadesan Marimuthu
Filed: 10 Sep 18
Utility
Action detection and network security policy enforcement based on wireless-transmission interference patterns
16 Feb 21
Systems of the present disclosure can detect user activities on endpoint devices based on the interference patterns those actions produce in wireless transmissions between those endpoint devices and another device (e.g., an edge device operating as a web security gateway).
Ilya Sokolov, Keith Newstadt
Filed: 30 Mar 18
Utility
Systems and methods for managing location-based access control lists
16 Feb 21
The disclosed computer-implemented method for managing location-based access control lists may include (i) identifying a collection of devices that are located within a physical space, (ii) determining, based on user activity data received from the collection of devices, that an authorized user is attempting to modify, on a location-based access control list for a wireless network, the access rights of a target computing device near a location indicated by the authorized user in the physical space, (iii) detecting, based on the user activity data, the target computing device near the location indicated by the authorized user, and (iv) in response to detecting the target computing device indicated by the authorized user, modifying, on the location-based access control list, the access rights of the target computing device.
Lei Gu, Ilya Sokolov
Filed: 21 Dec 18
Utility
Geofencing and alerting around objects with verified attributes
16 Feb 21
The present disclosure includes a method for maintaining a dynamic geofence.
Ilya Sokolov, Keith Newstadt
Filed: 16 Feb 17
Utility
Systems and methods for utilizing custom tagging to protect against phishing attacks from malicious applications
2 Feb 21
The disclosed computer-implemented method for utilizing custom tagging to protect against phishing attacks from malicious applications may include (1) associating a tag with a source application such that the tag is displayed in a user interface generated by the source application (2) launching a target application sharing at least one common feature with the source application, (3) determining, upon launching the target application, whether a user interface generated by the target application is an attack by a malicious application potentially causing harm to the computing device based on a presence or absence of the tag in the user interface, and (4) performing a security action with respect to the target application to protect the computing device from the attack when the tag is determined be absent from the user interface generated by the target application.
Anuradha Joshi, Pallavi Rajput, Anand Darak
Filed: 13 Jun 18
Utility
Thwarting data leakage from a webpage
26 Jan 21
Thwarting data leakage from a webpage.
David Luz Silva, Johann Roturier
Filed: 26 Sep 18
Utility
Malware detection and alerting for network connected devices based on traffic flow analysis on local network
12 Jan 21
As described, embodiments presented herein provide techniques for detecting malware on computing devices connected to a local network segment by observing the traffic flows of such devices and generating signatures characterizing such traffic flows.
Jim Casaburi, Steven P. Stockman
Filed: 18 Dec 14
Utility
Systems and methods for tracking the flow of user information over a network
12 Jan 21
A computer-implemented method for tracking the flow of user information over a network may include (i) recording user information transmitted from a user's computing device, (ii) identifying at least one third-party communication that utilizes at least a portion of the user information, (iii) deriving communication metadata from the third-party communication, (iv) generating, based on the communication metadata and the recorded user information, an information flow report that describes (A) the user information that was transmitted over the network connection, (B) at least one third-party communication that utilized elements of the user information, and (C) at least one element of user information utilized by the third-party communication, and (v) providing the information flow report to the user via a graphical user interface (GUI).
Spencer Smith
Filed: 7 Mar 17
Utility
Security for IoT home voice assistants
4 Jan 21
A method for implementing security of Internet of Things (IoT) home voice assistants is described.
Susanta K. Nanda, Yuqiong Sun, Saurabh Shintre
Filed: 1 May 18
Utility
Systems and methods for anonymizing user accounts
4 Jan 21
The disclosed computer-implemented method for anonymizing user accounts may include (i) receiving an instruction to anonymize a user account to protect a user's personally identifiable information, (ii) accessing, by a security program, a settings portal for the user account in response to receiving the instruction to anonymize the user account, (iii) replacing, by the security program, original values within at least two fields within the settings portal for the user account with anonymized values to mask the user's personally identifiable information, and (iv) storing the anonymized values within a protected vault to enable the user to login to the user account.
SriHarsha Angara, Michael Lo, John Meehan, Srinivas Chillappa, Simon Tiku, Viral Mehta
Filed: 7 Dec 17
Utility
Systems and methods for enforcing secure shared access on computing devices by content state pinning
4 Jan 21
The disclosed computer-implemented method for enforcing secure shared access on computing devices by content state pinning may include (1) receiving, from a user, a selection of a content view to be shared with an additional user from content displayed on a computing device by an application, (2) associating, by the computing device, a change event with the content view, (3) detecting, by the computing device, the change event in response to an action by the additional user to change the content view, and (4) performing, by the computing device, a security action to protect the computing device from potentially malicious activity associated with the action by the additional user to change the content view.
Anuradha Joshi, Pallavi Rajput, Anand Darak
Filed: 5 Jun 18
Utility
Systems and methods for protecting a cloud storage against suspected malware
4 Jan 21
The disclosed computer-implemented method for protecting a cloud storage against suspected malware may include (1) receiving a backup of one or more encrypted files over a network, (2) determining that the one or more encrypted files match one or more criteria associated with suspected malware, and (3) performing a security action that protects a computing device against the suspected malware.
Ilya Sokolov, Lei Gu, Mark Kennedy
Filed: 25 Sep 18
Patents are sorted by USPTO publication date, most recent first