Loading...
Docoh

NortonLifeLock (NLOK)

206 patents

Page 7 of 11
Utility
Efficient incident response through tree-based visualizations of hierarchical clustering
28 Dec 20
A computer system stores incident records in a database.
David Silva, Matteo Dell'Amico, Kevin Alejandro Roundy, Michael Hart, Christopher Gates
Filed: 30 May 17
Utility
Systems and methods for improving network efficiency
28 Dec 20
The disclosed computer-implemented method for improving network efficiency may include (i) receiving, from a client device, and at a publicly available on-demand cloud computing platform, a network packet that indicates an origination network address of an intermediary local network gateway that forwarded the network packet rather than an actual network address of the client device, and (ii) inserting, into the network packet, and at the publicly available on-demand cloud computing platform, network address translation information indicating a path to the actual network address of the client device to enable a virtual node within the publicly available on-demand cloud computing platform to identify the client device.
Qing Li
Filed: 30 Jan 19
Utility
Software application activation using a picture-based activation key
21 Dec 20
Software activation using a picture-based activation key.
Somard Kruayatidee, Jonathon Salehpour
Filed: 17 Jun 18
Utility
Systems and methods for detecting malicious programmatic clicks directed to view elements displayed on touchscreens
14 Dec 20
The disclosed computer-implemented method for detecting malicious programmatic clicks directed to view elements displayed on touchscreens may include (1) receiving an indication of a click event directed to a view element of a user interface displayed on a touchscreen of a computing device, (2) determining that the click event was not immediately preceded by a touch event directed to the view element displayed on the touchscreen, (3) classifying, in response to determining that the click event was not immediately preceded by the touch event directed to the view element, the click event as potentially malicious, and (4) performing, in response to classifying the click event as potentially malicious, a security action that prevents performance of an operation requested by the click event.
Sachin Chauhan
Filed: 19 Mar 17
Utility
Systems and methods for preventing display of blocked content
14 Dec 20
The disclosed computer-implemented method for preventing display of blocked content may include (i) displaying, by the computing device, content to a user, (ii) receiving, from a user, an indication to block the content, (iii) adding the content to a block list, (iv) receiving, at a later time, the content to display to the user, (v) determining the content is on the block list, and (vi) in response to determining the content is on the block list, performing a security action to prevent display of the content.
Santhanakrishnan KC
Filed: 23 Sep 18
Utility
Systems and methods for detecting and protecting against malicious software
23 Nov 20
The disclosed computer-implemented method for detecting and protecting against malicious software may include loading an untrusted application having a defined entry point into an emulated computing environment, executing a first instance of the untrusted application in the emulated computing environment beginning at the defined entry point, executing a second instance of the untrusted application beginning at a second entry point downstream from the defined entry point so as to bypass at least a portion of the untrusted application executed in the first instance, identifying the untrusted application as a potential threat based on information extracted from the second instance of the untrusted application, and performing a security action to protect against the untrusted application identified as a threat.
Mircea Ciubotariu, Dumitru Stama
Filed: 18 Jun 18
Utility
Preventing application installation using system-level messages
9 Nov 20
Methods and systems are provided for preventing the installation of malicious applications using system-level messages.
Shrikant Pawar, Sharad Subhash Mhaske, Arif Mohammed Shaikh
Filed: 15 Mar 18
Utility
Systems and methods for validating a user's physical location
26 Oct 20
The disclosed computer-implemented method for validating a user's physical location may include (i) identifying a plurality of sensor-equipped devices that are connected to a local network, wherein the local network is associated with a physical location, (ii) receiving a request to validate that a user is present at the physical location that is associated with the local network, (iii) instructing, in response to receiving the request, the user to interact with at least one sensor-equipped device in the plurality of sensor-equipped devices, (iv) confirming, based on observing a response of the sensor-equipped device, that the user has interacted with the at least one sensor-equipped device, and (v) validating, in response to confirming that the user has interacted with the at least one sensor-equipped device, that the user is present at the physical location.
Ilya Sokolov, Keith Newstadt
Filed: 30 Oct 17
Utility
Method to determine whether device location indicates person location
26 Oct 20
Techniques are disclosed to predict whether a current location of a mobile device corresponds to a user of that mobile device.
Keith Newstadt, Ilya Sokolov
Filed: 15 Aug 16
Utility
Systems and methods for protecting against outgoing calls to malicious phone numbers
26 Oct 20
The disclosed computer-implemented method for protecting against outgoing calls to malicious phone numbers may include (1) intercepting, at a computing device, an attempt to initiate an outgoing phone call, (2) disabling, at the computing device and at least temporarily, the attempt, (3) querying a reputation server for a reputation of an outgoing phone number associated with the attempt, (4) receiving, at the computing device, reputation results from the reputation server, and (5) performing a security action comprising displaying, on a user display of the computing device and prior to enabling the attempt, at least a portion of the reputation results.
Anand Darak, Anuradha Joshi
Filed: 18 Sep 18
Utility
Systems and methods for performing reputation-based identification of applications on unmanaged mobile devices
26 Oct 20
The disclosed computer-implemented method for performing reputation-based identification of applications on unmanaged mobile devices may include (i) receiving screen content displayed on an unmanaged mobile device, (ii) analyzing, by a machine-learning algorithm, the screen content to identify a set of applications stored on the unmanaged mobile device, (iii) querying a reputation service for reputation data associated with each of the applications, the reputation data including a security classification describing potential threats against the unmanaged mobile device, (iv) associating the reputation data with each of the applications, and (v) generating a notification comprising a list of the applications and the associated reputation data for utilization by the unmanaged mobile device to perform one or more protective actions against the potential threats.
Josh Opos
Filed: 26 Feb 19
Utility
System and method of dynamic backup policy generation
19 Oct 20
A system and method of dynamic backup policy generation based upon a user's behavior is provided.
Lei Gu, Ilya Sokolov
Filed: 12 May 16
Utility
Automatically adjusting backup set rules based on anomalous backup activity
19 Oct 20
Backup metrics are received from multiple endpoints.
Lei Gu, Ilya Sokolov
Filed: 30 Jul 17
Utility
Systems and methods for certifying geolocation coordinates of computing devices
19 Oct 20
The disclosed computer-implemented method for certifying geolocation coordinates of computing devices may include (i) receiving, from a client computing device, a set of geolocation coordinates that purport to identify the physical location of the client computing device, (ii) identifying, in response to receiving the geolocation coordinates, at least one cooperating geolocation device that is within physical proximity to the geolocation coordinates provided by the client computing device, (iii) performing a proximity validation check that demonstrates that the client computing device is within physical proximity to the cooperating geolocation device, and (iv) certifying, based on the proximity validation check, the geolocation coordinates as valid geolocation coordinates.
Ilya Sokolov, Keith Newstadt
Filed: 21 Mar 17
Utility
Systems and methods for executing application launchers
12 Oct 20
The disclosed computer-implemented method for executing application launchers may include (i) creating a security sandbox within an operating system environment, (ii) executing an original application launcher within the security sandbox, and (iii) registering the security sandbox as a new application launcher within the operating system environment such that the original application launcher is still available to a user through the security sandbox and the security sandbox supplements the original application launcher by providing a layer of protection for the user.
Radoslav Stanev, Jonathon Salehpour, Somard Kruayatidee
Filed: 19 Feb 18
Utility
Systems and methods for preventing sensitive data sharing
12 Oct 20
The disclosed computer-implemented method for preventing sensitive data sharing may include a computing device determining that a content item is to be shared with an application.
Pallavi Rajput, Anand Darak, Anuradha Joshi
Filed: 24 Jun 18
Utility
Systems and methods for protecting users
12 Oct 20
The disclosed computer-implemented method for protecting users may include (i) detecting, by a sensor component, an electromagnetic signal radiating from an eavesdropping device, (ii) receiving, by a mobile computing device, information identifying the electromagnetic signal, and (iii) displaying, by the mobile computing device, an augmented reality display that overlays a visual indication of a location of the eavesdropping device on an image captured by a camera of the mobile computing device to enable a user to locate the eavesdropping device.
Qing Li, Brian Varner, Stanley Kiefer
Filed: 26 Nov 19
Utility
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
5 Oct 20
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP).
Mehmet Emre Gursoy, Acar Tamersoy
Filed: 27 Sep 18
Utility
Systems and methods for automatically adjusting parental controls of computing devices to accommodate holidays
5 Oct 20
The disclosed computer-implemented method for automatically adjusting parental controls of computing devices to accommodate holidays may include (i) identifying, at a computing device, a geolocation of the computing device from geolocation information and (ii) performing, at the computing device, a security action.
Manjunath Rajendrababu, Trijimon Padmalayam Rajan
Filed: 30 May 19
Utility
Systems and methods for generating passwords
5 Oct 20
The disclosed computer-implemented method for generating passwords may include (i) accessing a vault of confidential information describing a user, (ii) extracting, from the vault, a set of multiple items of confidential information describing the user, (iii) executing a programmed heuristic on the set of multiple items of confidential information to generate multiple candidate passwords that each derives from a respective semirandom permutation of the multiple items of confidential information, and (iv) displaying electronically the multiple candidate passwords to the user to enable the user to select a password from the multiple candidate passwords as a specific password for accessing a protected computing resource.
Duong Nguyen-Huu, Bruce McCorkendale
Filed: 5 Jun 18
Patents are sorted by USPTO publication date, most recent first