Loading...
Docoh

NortonLifeLock (NLOK)

Utility
Secure computer peripheral devices
2 Aug 22
A method for improving security of peripheral devices is described.
Chengi Jimmy Kuo, Haik Mesropian, Petrus Johannes Viljoen, David Kane
Filed: 19 Mar 19
Utility
Routing server communications through a nearby mobile device
2 Aug 22
Routing server communications through a nearby mobile device.
Anand Darak, Sharad Subhash Mhaske
Filed: 18 May 20
Utility
Systems and methods for adaptively managing data drift in a classifier
19 Jul 22
The disclosed computer-implemented method for adaptively managing data drift in a classifier may include (i) receiving, at a computing device, an input sample of digital information having an unknown reputation and (ii) performing a security action that may include (A) identifying the input sample as benign or malicious based on a result obtained by classifying the input sample using a machine learning model trained using activity regularization, (B) calculating an internal activity of the machine learning model occurring during the classifying, (C) calculating an activation entropy of the machine learning model occurring during the classifying, (D) comparing a combination of the internal activity and the activation entropy to a threshold, and (E) when the combination of the internal activity and the activation entropy meets or exceeds the threshold, identifying the result as a low-confidence result.
Keith Kenemer, Javier Echauz, Sarfaraz Hussein
Filed: 10 Sep 19
Utility
Systems and methods for hindering malicious computing actions
19 Jul 22
The disclosed computer-implemented method for hindering malicious computing actions may include (i) identifying an attempt by an agent to perform an action on a computing resource that is vulnerable to attempted actions performed by unauthorized agents, (ii) requesting from the agent, in response to identifying the attempt to perform the action on the computing resource, a payment to an owner of the computing resource equal to a monetary value assigned to performing the action on the computing resource, (iii) receiving, by the owner of the computing resource, the payment of the monetary value from the agent, and (iv) allowing, in response to receiving the payment of the monetary value from the agent, the attempt by the agent to perform the action on the computing resource.
Efrain Ortiz
Filed: 27 Dec 17
Utility
Systems and methods for detecting malicious in application transactions
12 Jul 22
The disclosed computer-implemented method for detecting malicious in-application transactions may include identifying an application running on a computing device, wherein the application is granted access to a payment system, monitoring data between the application and the payment system, determining at least one characteristic associated with the application, determining the at least one characteristic is associated with a malicious transaction on the payment system, and performing at least one action to prevent the malicious transaction.
Josh Opos
Filed: 20 Jun 19
Utility
Optimizing networks of decision nodes
5 Jul 22
A method for optimizing network decision nodes is described.
Daniel Marino
Filed: 13 Jul 17
Utility
Analyzing and mitigating website privacy issues by automatically classifying cookies
5 Jul 22
Analyzing and mitigating website privacy issues by automatically classifying cookies.
Iskander Sanchez, Leylya Yumer
Filed: 12 Dec 19
Utility
Systems and methods to mitigate stalkerware by rendering it useless
21 Jun 22
The disclosed computer-implemented method for mitigating stalkerware by rendering it useless is performed, at least in part, by a computing device comprising at least one processor.
Anubhav Savant, Arif Mohammed Shaikh
Filed: 20 Dec 19
Utility
Identifying and protecting against a computer security threat while preserving privacy of individual client devices using differential privacy for text documents
14 Jun 22
Identifying and protecting against a computer security threat while preserving privacy of individual client devices using differential privacy for text documents.
Geoffrey So, Melanie Beck, Jasjeet Dhaliwal, Andrew B. Gardner, Aleatha Parker-Wood
Filed: 18 Dec 18
Utility
Systems and methods for detecting potentially malicious content in decentralized machine-learning model updates
14 Jun 22
The disclosed computer-implemented method for detecting potentially malicious content in decentralized machine-learning model updates may include (i) receiving messages communicated within a group of client devices for performing an update of a shared machine-learning model, (ii) determining a bias of a target message in the messages communicated from a target client device in the group with respect to a remaining number of the messages in the messages communicated from the other client devices in the group, (iii) assigning a confidence score to each of the other client devices based on the bias determined for the target message, the confidence score representing a likelihood of potentially malicious content in the target message, and (iv) performing, based on the confidence score, a security action that prevents the potentially malicious content from compromising the update of the shared machine-learning model.
Christopher Gates, Yufei Han
Filed: 28 Mar 19
Utility
Analyzing and mitigating privacy issues on a computing device using cookie generation flows
7 Jun 22
Analyzing and mitigating privacy issues on a computing device using cookie generation flows.
Iskander Sanchez, Leylya Yumer
Filed: 21 Jun 19
Utility
Realtime financial transaction approval
24 May 22
A method for approving financial transactions is described.
Radoslav Stanev
Filed: 28 Mar 19
Utility
Employing SNI hostname extraction to populate a reverse DNS listing to protect against potentially malicious domains
17 May 22
Server Name Indication (SNI) hostname extraction to populate a reverse Domain Name System (DNS) listing to protect against potentially malicious domains.
Bruce McCorkendale
Filed: 7 May 20
Utility
Systems and methods for securing communications
3 May 22
The disclosed computer-implemented method for securing communications may include (i) establishing an overlay network within a publicly available on-demand cloud computing platform, the overlay network enabling secure communications between devices by maintaining within the overlay network a services mapping table that defines access rights to at least one of shared data or services, and (ii) transferring data, by the overlay network acting as an intermediary, from a first device that has securely connected to the overlay network to a second device that has securely connected to the overlay network, in accordance with the access rights defined in the services mapping table.
Qing Li
Filed: 30 Jan 19
Utility
Systems and methods for protecting users
26 Apr 22
The disclosed computer-implemented method for protecting users may include (i) intercepting, through a cloud-based security proxy service, network traffic originating from a mobile application at a mobile device connected to a local area network protected by the cloud-based security proxy service, (ii) detecting, by the cloud-based security proxy service, a threat indicator indicated by the mobile application, and (iii) modifying the network traffic originating from the mobile application at the mobile device by applying, by the cloud-based security proxy service based on detecting the threat indicator indicated by the mobile application, a security policy to protect the local area network from a candidate threat corresponding to the threat indicator.
Qing Li, Samir Kapuria, Wenjing Wang, Howard Chen
Filed: 12 Aug 19
Utility
Identifying and protecting against surveillance apps installed on client devices
5 Apr 22
Identifying and protecting against malicious apps installed on client devices.
Kevin Alejandro Roundy, Acar Tamersoy
Filed: 26 Feb 19
Utility
Systems and methods for restoring applications
29 Mar 22
The disclosed computer-implemented method for restoring applications may include (i) detecting an indication to restore a previous version of an application installed within a mobile operating system environment, (ii) retrieving the previous version of the application from a protected location within the mobile operating system environment where a sandboxing security component stored the previous version of the application, and (iii) executing the previous version of the application within a security sandbox managed by the sandboxing security component.
Jonathon Salehpour, Radoslav Stanev, Somard Kruayatidee
Filed: 29 Mar 19
Utility
Systems and methods for managing connections
22 Mar 22
The disclosed computer-implemented method for managing connections may include (i) detecting, by a security agent on an endpoint, an attempt by another application on the endpoint to establish a connection according to a specific Internet protocol, and (ii) injecting, by the security agent on the endpoint, into an options field within a header of a network packet within the connection, the header formatted according to the specific Internet protocol, at least one byte that reveals identifying information about the application to enable an in-line proxy security device to manage the connection according to the revealed identifying information.
Qing Li
Filed: 2 Mar 21
Utility
Management and protection of internet of things devices
22 Mar 22
A method to manage Internet of Things (IoT) devices is described.
Susanta K Nanda, Yuqiong Sun
Filed: 27 Feb 18
Utility
Systems and methods for detecting anomalous system command line data
15 Mar 22
The disclosed computer-implemented method for detecting anomalous system command line data may include (i) receiving command line data from a target computing system, (ii) building a baseline model that utilizes machine-learning to analyze the command line data, the baseline model comprising a support-vector machine (SVM), natural language processing, and a hashing function, (iii) assigning, utilizing the baseline model, a score to each of a plurality of instances of the command line data, and (iv) identifying, based on the score, anomalous commands comprising potentially malicious data when any of the instances of the command line data fails to exceed a threshold.
Lamine Aouad, Slawomir Grzonkowski
Filed: 31 Mar 19
Patents are sorted by USPTO publication date, most recent first