Loading...
Docoh

NortonLifeLock (NLOK)

206 patents

Page 8 of 11
Utility
Remotely controlling access to a digital camera
5 Oct 20
Remotely controlling access to a digital camera.
Santhanakrishnan K C
Filed: 19 Dec 18
Utility
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
28 Sep 20
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP).
Mehmet Emre Gursoy, Acar Tamersoy
Filed: 27 Sep 18
Utility
Systems and methods for securing universal plug and play connections
28 Sep 20
The disclosed computer-implemented method for securing Universal Plug and Play connections may include (1) detecting, by a network device within a local network, an attempt by a remote device to establish a connection with a client device within the local network via a UPnP protocol, (2) identifying a forwarding rule applied by the network device on the client device based at least in part on an identity of the client device, (3) determining at least one restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, and then in response to determining the restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, (4) enforcing the restriction on the connection attempted by the remote device with the client device via the UPnP protocol.
Bruce McCorkendale, Ramakrishnan Meenakshi Sundaram, Justin Harmon, Srini Chillappa
Filed: 29 Sep 16
Utility
Systems and methods for preventing sensitive information exposure based on a surrounding audience
21 Sep 20
The disclosed computer-implemented method for preventing sensitive information exposure based on a surrounding audience may include (1) detecting, from one or more communication devices, surrounding audience data associated with an audience presentation on a presentation device, the audience presentation including sensitive information and non-sensitive information, (2) determining an audience profile based on the surrounding audience data, the audience profile identifying one or more unintended audience members in the surrounding audience, (3) assigning an information exposure policy to the audience presentation based on the audience profile, and (4) performing a security action to enforce the information exposure policy on the presentation device such that the sensitive information is prevented from being exposed to the surrounding audience during the audience presentation.
Lei Gu, Ilya Sokolov
Filed: 15 May 18
Utility
Systems and methods for controlling access
21 Sep 20
The disclosed computer-implemented method for controlling access may include (i) installing on a personal mobile device a mobile device application that enforces an authorization security policy for protected premises, (ii) checking, by the mobile device application and in response to installing the mobile device application, whether the personal mobile device satisfies a condition of the authorization security policy, (iii) granting authorization for the personal mobile device to function as an access card based on a result of checking whether the personal mobile device satisfies the condition of the authorization security policy, and (iv) enforcing an additional access security policy on the personal mobile device after granting authorization for the personal mobile device to function as the access card.
Sharad Mhaske, Anuradha Joshi
Filed: 19 Dec 18
Utility
Identifying evidence of attacks by analyzing log text
21 Sep 20
Log text is encoded into a low dimensional feature vector.
Yufei Han, Michael Hart, Joseph Lopilato
Filed: 27 Sep 18
Utility
Detecting and preventing phishing phone calls through verified attribute analysis
14 Sep 20
A method for detecting and preventing phishing phone calls through verified attribute analysis is described.
Keith Newstadt, Ilya Sokolov, Venkadesan Marimuthu
Filed: 29 Mar 18
Utility
Systems and methods for identifying unsolicited communications on a computing device
14 Sep 20
The disclosed computer-implemented method for identifying unsolicited communications on a computing device may include a computing device receiving a communication from an unrecognized phone number; obtaining the unrecognized phone number from the communication; obtaining classification data associated with the unrecognized phone number based on categories of other computing devices contacted by the unrecognized phone number; obtaining a category associated with a phone number of the computing device; determining that the communication is an unsolicited communication based on the classification data and the category associated with the phone number of the computing device; and in response to determining that the communication is unsolicited, performing a security action to manage interactions with the communication from the unrecognized phone number.
Brendon Woirhaye, Radoslav Stanev, Anuj Sahai
Filed: 4 Mar 19
Utility
Systems and methods for identifying data breaches
7 Sep 20
The disclosed computer-implemented method for detecting unauthorized data shares may include (1) providing a user of an anonymized inbox with an email alias to use for a particular online entity, (2) identifying one or more emails sent to the email alias from one or more different entities that are different from the particular online entity, (3) determining, based on the one or more emails having been sent by the different entities, that the particular online entity has shared the user's email alias with other entities, and (4) creating a privacy score for the particular online entity based at least in part on the determination that the particular online entity has shared the user's email alias with other entities.
SriHarsha Angara, Michael Lo, Srini Chillappa, Simon Tiku, Viral Mehta, John Meehan
Filed: 8 Jun 18
Utility
Systems and methods for authenticating a multimedia stream
31 Aug 20
The disclosed computer-implemented method for authenticating a multimedia stream may include generating a metadata transcript based on at least a portion of a multimedia stream and digitally signing the metadata transcript.
Ilya Sokolov, Keith Newstadt
Filed: 5 Apr 18
Utility
Thwarting an impersonation attack using online decoy text
24 Aug 20
Thwarting an impersonation attack using online decoy text.
Johann Roturier, David Luz Silva, Pratyush Banerjee
Filed: 25 Sep 18
Utility
Systems and methods for controlling an application launch based on a security policy
17 Aug 20
The disclosed computer-implemented method for controlling an application launch based on a security policy may include (1) loading an application launcher into a sandbox, (2) monitoring one or more functions associated with launching an application from the application launcher, (3) determining that the functions associated with launching the application have been invoked by the application launcher, (4) querying a policy manager comprising a security policy to determine whether the application is potentially harmful, and (5) performing, based on the security policy, a security action preventing the application launcher from launching the application from the sandbox upon determining that the application is potentially harmful.
Jonathon Salehpour, Somard Kruayatidee, Rad Stanev
Filed: 21 May 18
Utility
Systems and methods for modifying file backups in response to detecting potential ransomware
10 Aug 20
A computer-implemented method for modifying file backups in response to detecting potential ransomware may include (1) detecting, during a file backup process, an anomaly that is potentially indicative of ransomware on a computing device, (2) in response to detecting the anomaly that is potentially indicative of ransomware, storing a backup copy in a separate location from other backup copies, (3) confirming that the anomaly is indicative of ransomware on the computing device, (4) adjusting a backup policy in response to confirming that the anomaly is indicative of ransomware on the computing device, and (5) managing the backup copy based on the adjusted backup policy.
Lei Gu, Ilya Sokolov
Filed: 31 Jan 16
Utility
Detecting and preventing execution of a malicious computer application using utility driven graph summarization
10 Aug 20
Utility driven graph summarization for use in detecting and preventing malicious computer application.
Ashwin Kumar Kayyoor, Petros Efstathopoulos
Filed: 17 Apr 18
Utility
Content-based automatic backup of images
27 Jul 20
The content of each specific image file on an endpoint is analyzed.
Lei Gu, Ilya Sokolov
Filed: 1 Jan 18
Utility
Systems and methods for categorizing security incidents
20 Jul 20
The disclosed computer-implemented method for categorizing security incidents may include (i) generating, within a training dataset, a feature vector for each of a group of security incidents, the feature vector including features that describe the security incidents and the features including categories that were previously assigned to the security incidents as labels to describe the security incidents, (ii) training a supervised machine learning function on the training dataset such that the supervised machine learning function learns how to predict an assignment of future categories to future security incidents, (iii) assigning a category to a new security incident by applying the supervised machine learning function to a new feature vector that describes the new security incident, and (iv) notifying a client of the new security incident and the category assigned to the new security incident.
Matteo Dell'Amico, Chris Gates, Michael Hart, Kevin Roundy
Filed: 26 Feb 19
Utility
Systems and methods for detecting system attacks
20 Jul 20
The disclosed computer-implemented method for detecting system attacks may include (1) receiving, from a detecting system capable of detecting attacks, information that identifies an attack that originated from a compromised client system that is remote from the detecting system, (2) determining that the attack originated from the compromised client system, (3) determining that the compromised client system includes an anti-malware agent, and (4) notifying the anti-malware agent on the compromised client system that the compromised client system performed the attack.
Christopher Alexander
Filed: 17 Jul 14
Utility
Systems and methods for enforcing privacy in cloud security
6 Jul 20
A computer-implemented method for enforcing privacy in cloud security may include (i) identifying, by a computing device, a set of files in a backup process for a cloud service, (ii) determining, by the computing device, that at least one file in the set of files is a private file, (iii) modifying, by the computing device encrypting the private file, the set of files in the backup process, (iv) completing the backup process for the cloud service with the modified set of files, and (v) enforcing a security policy of the cloud service based on a scan of file hashes.
Ilya Sokolov, Lei Gu, Jason Holler, Tim van der Horst
Filed: 10 Jul 17
Utility
Systems and methods for protecting users
6 Jul 20
The disclosed computer-implemented method for protecting users may include (i) displaying, through a graphical user interface for a third-party security application executing within an operating system environment, a button for a user to select, (ii) displaying, through the graphical user interface, a prompt that prompts the user to select the button in order to receive a reward, (iii) configuring the graphical user interface such that selecting the button triggers both a conspicuous response that provides access to the reward and a more hidden response that initiates application of a security service to protect the user, and (iv) performing, based on receiving a selection of the button, both the conspicuous response and the more hidden response.
Qing Li, Samir Kapuria
Filed: 11 Aug 19
Utility
Consumer device generation of limited-use credit card numbers
22 Jun 20
Methods and systems for generating limited-use credit card numbers at a consumer device and verifying said numbers for completing transactions are provided.
Chengi Kuo
Filed: 19 Dec 17
Patents are sorted by USPTO publication date, most recent first