Loading...
Docoh

NortonLifeLock (NLOK)

199 patents

Page 4 of 10
Utility
Thwarting one-time password theft
7 Sep 21
Thwarting one-time password (OTP) theft.
Venkadesan Marimuthu
Filed: 28 Jan 20
Utility
Systems and methods for managing file backup
7 Sep 21
A computer-implemented method for managing file backup may include (i) detecting, by a computing device, an attempt to upload a file to a backup storage, (ii) calculating a degree of difference between the file and a previous version of the file on the backup storage, (iii) comparing, by the computing device, a list of applications that have written to the file with a list of acceptable applications for the file, (iv) calculating, based on the degree of difference and the comparison of the list of applications, a change score for the file, and (v) applying, based on the change score, a backup policy to the attempt to upload the file.
Mohit Jha, Vinith Raj, Chengi Jimmy Kuo, Amitrajit Banerjee
Filed: 19 Jun 17
Utility
Systems and methods for providing persistent visual warnings for application launchers
7 Sep 21
The disclosed computer-implemented method for providing persistent visual warnings for application launchers may include (i) loading an application launcher into a sandbox, (ii) monitoring one or more functions of an application from the application launcher, (iii) querying a malware detection manager using information obtained from monitoring the functions of the application to determine whether the application is potentially harmful, and (iv) modifying, based on determining that the application is potentially harmful, an icon for the application launched from the sandbox to notify a user that the application is potentially harmful.
Jonathon Salehpour, Somard Kruayatidee, Radoslav Stanev
Filed: 15 Aug 19
Utility
Securing a network device by forecasting an attack event using a recurrent neural network
31 Aug 21
Securing a network device by forecasting an attack event using a recurrent neural network.
Yun Shen, Pierre-Antoine Vervier
Filed: 29 Mar 18
Utility
Systems and methods for identifying a malicious user interface
24 Aug 21
The disclosed computer-implemented method for identifying a malicious user interface may include (1) detecting, at a computing device, a launch of a user interface (UI), (2) gathering characteristics of the UI including a UI image, (3) identifying the UI is not permissible by comparing the UI image to a whitelist including permissible UI images, and (4) performing, when the UI image is not permissible, a security action.
Vinith Raj, Mohit Jha
Filed: 4 Apr 18
Utility
Systems and methods for categorizing web applications based on age restrictions in online content policies
24 Aug 21
The disclosed computer-implemented method for categorizing web applications based on age restrictions in online content policies may include (i) accessing a web application associated with a group of application pages, (ii) determining policy data for accessing content from the web application in the application pages, (iii) extracting one or more age restrictions for accessing the web application from the policy data, and (iv) performing a security action that prevents underage access to the web application based on the age restrictions.
Daniel Kats, Trijimon Padmalayam Rajan, Manjunath Rajendrababu
Filed: 5 Sep 19
Utility
Systems and methods for protecting passwords
17 Aug 21
The disclosed computer-implemented method for protecting passwords may include (i) intercepting network traffic indicating an attempted login procedure at a workload device to login to a protected resource, (ii) prompting a user, in response to intercepting the network traffic, and at an authentication device that has been registered to the user, to indicate whether to approve the attempted login procedure, (iii) collecting, at the authentication device, a credential for the attempted login procedure that was stored in a protected vault of the authentication device, (iv) providing, by the authentication device to the workload device, an authentication decision based on the collected credential, and (v) injecting, at the workload device, the authentication decision into a browser session to enable the user to complete the attempted login procedure to login to the protected resource.
Ilya Sokolov, Keith Newstadt
Filed: 24 Sep 18
Utility
Systems and methods for delegating endpoint security operations to a nearby computing device
17 Aug 21
The disclosed computer-implemented method for delegating endpoint security operations to a nearby computing device may include (i) receiving device state data from one or more computing devices, (ii) determining a device state reputation for each of the one or more computing devices based on the device state data, (iii) selecting a device from the one or more computing devices based on the device state reputation for each of the one or more computing devices, and (iv) in response to selecting the device, delegating one or more operations for a security action to the selected device.
Anand Darak, Sachin Patil
Filed: 27 Dec 18
Utility
Systems and methods for enabling multi-factor authentication for seamless website logins
3 Aug 21
The disclosed computer-implemented method for enabling multi-factor authentication for seamless website logins may include (1) generating a numerical sequence utilized for authenticating a user for multi-factor authentication on a website, (2) detecting user login credentials for initiating a multi-factor authentication session on the website, (3) receiving, in response to the user login credentials, a request for multi-factor authentication data associated with the numerical sequence from the website, (4) retrieving, utilizing an application programming interface (API), the multi-factor authentication data from a secure storage associated with the user, and (5) providing, utilizing the API, the multi-factor authentication data to the website to login the user.
SriHarsha Angara, Michael Lo, Simon Tiku, John Meehan
Filed: 24 Sep 18
Utility
Query learning for automated incident investigation and remediation
27 Jul 21
A method for learning queries in automated incident remediation is performed by one or more computing devices, each comprising one or more processors.
Daniel Kats, Brian Schlatter, Michael Hart, Steven Meckl, Jung Hui Yoon, Matteo Dell'Amico
Filed: 29 Jun 18
Utility
Systems and methods for preventing malicious applications from exploiting application services
13 Jul 21
The disclosed computer-implemented method for preventing malicious applications from exploiting application services may include (i) identifying an attempt by an application, executing within a sandboxed environment that isolates the application's data and code execution from at least one other application executing within an operating system on the computing device, to launch at least one application service, (ii) determining that the application represents a potential security risk, (iii) prompting a user of the computing device to remediate the potential security risk posed by the application by performing a recommended security action, and (iv) while waiting for the user to perform the recommended security action, securing the computing device by blocking the attempt by the application to launch the application service.
Mayur Dharmadhikari, Pankaj Meel, Nikhil Joshi
Filed: 29 Aug 17
Utility
Systems and methods for improving application analysis
13 Jul 21
The disclosed computer-implemented method for improving application analysis may include (i) configuring a computing environment to execute an application such that the computing environment spoofs a simulated geolocation that is detected by the application, (ii) performing a dynamic analysis of how the application behaves within the simulated geolocation, and (iii) generating a holistic security analysis of the application based on both a result of the dynamic analysis performed for the simulated geolocation and an additional result of at least one additional dynamic analysis performed for a second geolocation that is distinct from the simulated geolocation.
Qing Li, Brian Varner, Stan Kiefer, Samir Kapuria
Filed: 28 Aug 20
Utility
Systems and methods for controlling access to a peripheral device
6 Jul 21
The disclosed computer-implemented method for controlling access to a peripheral device may include receiving an input/output request related to a process attempting to access the peripheral device.
Boovaragavan Dasarathan
Filed: 20 Jun 18
Utility
Systems and methods for detecting misuse of online service access tokens
29 Jun 21
The disclosed computer-implemented method for detecting misuse of online service access tokens may include (1) receiving a user permission token to access an online service that manages one or more user resources, (2) monitoring, based on utilization of the user permission token, usage data associated with an access token issued to a relying party for accessing the user resources managed by the online service, (3) identifying, based on the usage data, activity associated with the access token being misused by the relying party, and (4) performing, a security action that protects the user resources against the activity associated with the access token being misused by the relying party.
Yuqiong Sun, Sandeep Bhatkar, Susanta Nanda, Mingliang Pei
Filed: 13 Sep 18
Utility
Controlling access to a computing device with a wireless device using wireless signal strength measurements
29 Jun 21
A method for controlling access to a computing device which involves detecting, at a key device, one or more wireless devices configured as wireless access points.
Vlad Mihai Buliga, Alexandru Cosmin Vlajoaga, Raluca Iulia Stanciu, Robert A. Clyde
Filed: 24 Apr 19
Utility
Systems and methods for detecting certificate pinning
22 Jun 21
The disclosed computer-implemented method for detecting certificate pinning may include (i) attempting, by a security network proxy, to break a network connection between a client device and a server device, (ii) detecting, by the security network proxy, whether the network connection between the client device and the server device is certificate pinned based on a result of attempting to break the network connection, and (iii) performing a security action by the security network proxy to protect the client device at least in part based on detecting whether the network connection between the client device and the server device is certificate pinned.
Qing Li, Stanley Stanton Kiefer, Brian Varner, Jacques Fourie, Samir Kapuria, Scott Wilde
Filed: 28 Aug 20
Utility
Systems and methods for issuing proactive parental control alerts
22 Jun 21
The disclosed computer-implemented method for issuing proactive parental control alerts may include (i) monitoring, through a sensor of the computing device, sensor data indicating an emotional state of a child consuming media content through the computing device, (ii) detecting, through analyzing the sensor data, that the media content has triggered an adverse emotional state within the child, and (iii) performing a security action, in response to detecting that the media content has triggered the adverse emotional state within the child, by issuing an alert in connection with a parental control software system that controls access by the child to media content.
Anand Darak, Pallavi Rajput
Filed: 29 Mar 19
Utility
Automatic adaptive policy based security
22 Jun 21
A method for implementing adaptive policy based computer security is described.
Mark Kennedy, Petrus Johannes Viljoen
Filed: 15 Mar 18
Utility
Systems and methods for detecting unauthorized use of an application
15 Jun 21
The disclosed computer-implemented method for detecting unauthorized use of an application may include (1) receiving, by the computing device, fingerprint data associated with a fingerprint, where the fingerprint data is received from the touchscreen, when a user interface of the application is displayed on the touchscreen, and in an absence of displaying a request for fingerprint data on the touchscreen, (2) comparing the received fingerprint data to a whitelist of authorized fingerprint data to determine a presence of a match, where the authorized fingerprint data indicates at least one fingerprint of at least one user that is authorized to access the application and (3) performing, when the received fingerprint data does not match the whitelist of authorized fingerprint data, a security action.
Sharad Subhash Mhaske, Arif Mohammed Shaikh, Shrikant Pawar
Filed: 26 Feb 18
Utility
Classification using projection of graphs into summarized spaces
8 Jun 21
A method for anomaly detection using grouping-based graph summarization is performed by one or more computing devices, each including one or more processors.
Petros Efstathopoulos, Ashwin Kumar Kayyoor
Filed: 18 Sep 18
Patents are sorted by USPTO publication date, most recent first