237 patents
Page 9 of 12
Utility
Preventing application installation using system-level messages
9 Nov 20
Methods and systems are provided for preventing the installation of malicious applications using system-level messages.
Shrikant Pawar, Sharad Subhash Mhaske, Arif Mohammed Shaikh
Filed: 15 Mar 18
Utility
Systems and methods for protecting against outgoing calls to malicious phone numbers
26 Oct 20
The disclosed computer-implemented method for protecting against outgoing calls to malicious phone numbers may include (1) intercepting, at a computing device, an attempt to initiate an outgoing phone call, (2) disabling, at the computing device and at least temporarily, the attempt, (3) querying a reputation server for a reputation of an outgoing phone number associated with the attempt, (4) receiving, at the computing device, reputation results from the reputation server, and (5) performing a security action comprising displaying, on a user display of the computing device and prior to enabling the attempt, at least a portion of the reputation results.
Anand Darak, Anuradha Joshi
Filed: 18 Sep 18
Utility
Method to determine whether device location indicates person location
26 Oct 20
Techniques are disclosed to predict whether a current location of a mobile device corresponds to a user of that mobile device.
Keith Newstadt, Ilya Sokolov
Filed: 15 Aug 16
Utility
Systems and methods for validating a user's physical location
26 Oct 20
The disclosed computer-implemented method for validating a user's physical location may include (i) identifying a plurality of sensor-equipped devices that are connected to a local network, wherein the local network is associated with a physical location, (ii) receiving a request to validate that a user is present at the physical location that is associated with the local network, (iii) instructing, in response to receiving the request, the user to interact with at least one sensor-equipped device in the plurality of sensor-equipped devices, (iv) confirming, based on observing a response of the sensor-equipped device, that the user has interacted with the at least one sensor-equipped device, and (v) validating, in response to confirming that the user has interacted with the at least one sensor-equipped device, that the user is present at the physical location.
Ilya Sokolov, Keith Newstadt
Filed: 30 Oct 17
Utility
Systems and methods for performing reputation-based identification of applications on unmanaged mobile devices
26 Oct 20
The disclosed computer-implemented method for performing reputation-based identification of applications on unmanaged mobile devices may include (i) receiving screen content displayed on an unmanaged mobile device, (ii) analyzing, by a machine-learning algorithm, the screen content to identify a set of applications stored on the unmanaged mobile device, (iii) querying a reputation service for reputation data associated with each of the applications, the reputation data including a security classification describing potential threats against the unmanaged mobile device, (iv) associating the reputation data with each of the applications, and (v) generating a notification comprising a list of the applications and the associated reputation data for utilization by the unmanaged mobile device to perform one or more protective actions against the potential threats.
Josh Opos
Filed: 26 Feb 19
Utility
Systems and methods for certifying geolocation coordinates of computing devices
19 Oct 20
The disclosed computer-implemented method for certifying geolocation coordinates of computing devices may include (i) receiving, from a client computing device, a set of geolocation coordinates that purport to identify the physical location of the client computing device, (ii) identifying, in response to receiving the geolocation coordinates, at least one cooperating geolocation device that is within physical proximity to the geolocation coordinates provided by the client computing device, (iii) performing a proximity validation check that demonstrates that the client computing device is within physical proximity to the cooperating geolocation device, and (iv) certifying, based on the proximity validation check, the geolocation coordinates as valid geolocation coordinates.
Ilya Sokolov, Keith Newstadt
Filed: 21 Mar 17
Utility
Automatically adjusting backup set rules based on anomalous backup activity
19 Oct 20
Backup metrics are received from multiple endpoints.
Lei Gu, Ilya Sokolov
Filed: 30 Jul 17
Utility
System and method of dynamic backup policy generation
19 Oct 20
A system and method of dynamic backup policy generation based upon a user's behavior is provided.
Lei Gu, Ilya Sokolov
Filed: 12 May 16
Utility
Systems and methods for executing application launchers
12 Oct 20
The disclosed computer-implemented method for executing application launchers may include (i) creating a security sandbox within an operating system environment, (ii) executing an original application launcher within the security sandbox, and (iii) registering the security sandbox as a new application launcher within the operating system environment such that the original application launcher is still available to a user through the security sandbox and the security sandbox supplements the original application launcher by providing a layer of protection for the user.
Radoslav Stanev, Jonathon Salehpour, Somard Kruayatidee
Filed: 19 Feb 18
Utility
Systems and methods for preventing sensitive data sharing
12 Oct 20
The disclosed computer-implemented method for preventing sensitive data sharing may include a computing device determining that a content item is to be shared with an application.
Pallavi Rajput, Anand Darak, Anuradha Joshi
Filed: 24 Jun 18
Utility
Systems and methods for protecting users
12 Oct 20
The disclosed computer-implemented method for protecting users may include (i) detecting, by a sensor component, an electromagnetic signal radiating from an eavesdropping device, (ii) receiving, by a mobile computing device, information identifying the electromagnetic signal, and (iii) displaying, by the mobile computing device, an augmented reality display that overlays a visual indication of a location of the eavesdropping device on an image captured by a camera of the mobile computing device to enable a user to locate the eavesdropping device.
Qing Li, Brian Varner, Stanley Kiefer
Filed: 26 Nov 19
Utility
Systems and methods for generating passwords
5 Oct 20
The disclosed computer-implemented method for generating passwords may include (i) accessing a vault of confidential information describing a user, (ii) extracting, from the vault, a set of multiple items of confidential information describing the user, (iii) executing a programmed heuristic on the set of multiple items of confidential information to generate multiple candidate passwords that each derives from a respective semirandom permutation of the multiple items of confidential information, and (iv) displaying electronically the multiple candidate passwords to the user to enable the user to select a password from the multiple candidate passwords as a specific password for accessing a protected computing resource.
Duong Nguyen-Huu, Bruce McCorkendale
Filed: 5 Jun 18
Utility
Remotely controlling access to a digital camera
5 Oct 20
Remotely controlling access to a digital camera.
Santhanakrishnan K C
Filed: 19 Dec 18
Utility
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
5 Oct 20
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP).
Mehmet Emre Gursoy, Acar Tamersoy
Filed: 27 Sep 18
Utility
Systems and methods for automatically adjusting parental controls of computing devices to accommodate holidays
5 Oct 20
The disclosed computer-implemented method for automatically adjusting parental controls of computing devices to accommodate holidays may include (i) identifying, at a computing device, a geolocation of the computing device from geolocation information and (ii) performing, at the computing device, a security action.
Manjunath Rajendrababu, Trijimon Padmalayam Rajan
Filed: 30 May 19
Utility
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
28 Sep 20
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP).
Mehmet Emre Gursoy, Acar Tamersoy
Filed: 27 Sep 18
Utility
Systems and methods for securing universal plug and play connections
28 Sep 20
The disclosed computer-implemented method for securing Universal Plug and Play connections may include (1) detecting, by a network device within a local network, an attempt by a remote device to establish a connection with a client device within the local network via a UPnP protocol, (2) identifying a forwarding rule applied by the network device on the client device based at least in part on an identity of the client device, (3) determining at least one restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, and then in response to determining the restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, (4) enforcing the restriction on the connection attempted by the remote device with the client device via the UPnP protocol.
Bruce McCorkendale, Ramakrishnan Meenakshi Sundaram, Justin Harmon, Srini Chillappa
Filed: 29 Sep 16
Utility
Systems and methods for controlling access
21 Sep 20
The disclosed computer-implemented method for controlling access may include (i) installing on a personal mobile device a mobile device application that enforces an authorization security policy for protected premises, (ii) checking, by the mobile device application and in response to installing the mobile device application, whether the personal mobile device satisfies a condition of the authorization security policy, (iii) granting authorization for the personal mobile device to function as an access card based on a result of checking whether the personal mobile device satisfies the condition of the authorization security policy, and (iv) enforcing an additional access security policy on the personal mobile device after granting authorization for the personal mobile device to function as the access card.
Sharad Mhaske, Anuradha Joshi
Filed: 19 Dec 18
Utility
Systems and methods for preventing sensitive information exposure based on a surrounding audience
21 Sep 20
The disclosed computer-implemented method for preventing sensitive information exposure based on a surrounding audience may include (1) detecting, from one or more communication devices, surrounding audience data associated with an audience presentation on a presentation device, the audience presentation including sensitive information and non-sensitive information, (2) determining an audience profile based on the surrounding audience data, the audience profile identifying one or more unintended audience members in the surrounding audience, (3) assigning an information exposure policy to the audience presentation based on the audience profile, and (4) performing a security action to enforce the information exposure policy on the presentation device such that the sensitive information is prevented from being exposed to the surrounding audience during the audience presentation.
Lei Gu, Ilya Sokolov
Filed: 15 May 18
Utility
Identifying evidence of attacks by analyzing log text
21 Sep 20
Log text is encoded into a low dimensional feature vector.
Yufei Han, Michael Hart, Joseph Lopilato
Filed: 27 Sep 18