Loading...
Docoh

NortonLifeLock (NLOK)

Utility
Systems and Methods for Protecting Against Misleading Clicks on Websites
17 Feb 22
The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL.
Iskander Sanchez, David Silva
Filed: 12 Aug 20
Utility
Systems and Methods for Identifying Software Vulnerabilities In Embedded Device Firmware
11 Nov 21
The disclosed computer-implemented method for identifying software vulnerabilities in embedded device firmware may include (i) collecting a firmware image for an Internet-of-Things device, (ii) extracting library dependencies from the firmware image for the Internet-of-Things device, (iii) identifying a true version of a library specified in the firmware image by checking a ground truth database that records confirmed values for true versions for previously encountered libraries, and (iv) performing a security action to protect a user from a security risk based on identifying the true version of the library specified in the firmware image.
Johannes Krupp, Pierre-Antoine Vervier, Yun Shen
Filed: 8 May 20
Utility
Systems and Methods for Protecting Search Privacy
30 Sep 21
The disclosed computer-implemented method for protecting search privacy may include (i) receiving, via a search interface, a search query comprising at least one search term, (ii) determining a sensitivity level of the search query based on the at least one search term, (iii) directing the search query to a search engine that has a level of privacy correlated with the sensitivity level of the search query, and (iv) returning, via the search interface, at least one result of directing the search query to the search engine that has the level of privacy correlated with the sensitivity level of the search query.
Susanta Nanda, Kevin Roundy, Ashwin Kayyoor
Filed: 31 Mar 20
Utility
Systems and Methods for Utilizing an Information Trail to Enforce Data Loss Prevention Policies on Potentially Malicious File Activity
9 Oct 19
The disclosed computer-implemented method for utilizing an information trail to enforce data loss prevention policies on potentially malicious file activity may include (1) recording, by a computing device, one or more current activities associated with a file retrieved from a server, (2) linking, by the computing device, the current activities to one or more previously recorded activities associated with the file, (3) generating, by the computing device, a graph including nodes representing an information trail of related events associated with the current activities and the previously recorded activities, (4) determining, by the computing device, a severity of the information trail based on one or more rules, and (5) performing, by the computing device, a data loss prevention action on one or more operations associated with the file based on potential malicious activity.
Manish Pai, Prahalad Deshpande, Sumesh Jaiswal
Filed: 20 May 18
Utility
Systems and Methods for Providing Secure Memory
2 Oct 19
The disclosed computer-implemented method for providing secure memory may include reserving, by a hypervisor stored in a memory device of the computing device, a portion of the memory device as a secure memory during a boot sequence of the computing device and preventing access to the secure memory by an operating system (OS).
Haik Mesropian, Costin Ionescu, Melissa Mendonca, Tirth Sanyal
Filed: 28 Mar 18
Utility
Securing of Internet of Things Devices Based on Monitoring of Information Concerning Device Purchases
2 Oct 19
Purchasing related activity that is executed on computing devices on a LAN is monitored.
Ilya Sokolov, Bruce McCorkendale, Keith Newstadt
Filed: 29 Mar 18
  • 1
Patents are sorted by USPTO publication date, most recent first