-
公开(公告)号:US11336684B2
公开(公告)日:2022-05-17
申请号:US16810446
申请日:2020-03-05
申请人: Lookout Inc.
摘要: A device includes a secure execution context that is segregated from an operating system of the device. A security application executing in the operating system interfaces with the secure execution context to obtain verified data. The secure execution context may verify that operating system files are free of malware, obtain sensor readings that may be cryptographically signed, verify functioning of a baseband processor, and verify other aspects of the function and security of the device. The verified data may be used for various purposes such as verifying location of the device, training a machine learning model, and the like.
-
12.
公开(公告)号:US11336458B2
公开(公告)日:2022-05-17
申请号:US16532304
申请日:2019-08-05
申请人: Lookout, Inc.
发明人: Kevin Patrick Mahaffey , Timothy Micheal Wyatt , Daniel Lee Evans , Emil Barker Ong , Timothy Strazzere , Matthew John Joseph LaMantia , Brian James Buck
IPC分类号: G06F11/00 , G06F12/14 , G06F12/16 , G06F21/57 , G06F8/60 , G06F11/36 , G06F8/70 , G06F21/44 , G08B23/00 , G06Q10/02 , H04L9/32 , H04L12/26 , G06Q30/02 , H04L43/04 , H04L43/06
摘要: Software applications to be installed on user devices are monitored. Authenticity of the applications is evaluated using trust factors. In some cases, the trust factors relate to security associated with a network being accessed by a user device. In response to the evaluation, an action is performed such as configuring or disabling execution of one or more components of an application.
-
13.
公开(公告)号:US20210279320A1
公开(公告)日:2021-09-09
申请号:US17328882
申请日:2021-05-24
申请人: LOOKOUT, INC.
摘要: The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device. The continued control may be based on determining the user's continued possession of the first device, or determining an acceptable proximity of the user to the first device. The proximity of the user may be determined using a second device associated with the user, or sensors associated with the first device.
-
14.
公开(公告)号:US20210160232A1
公开(公告)日:2021-05-27
申请号:US17165054
申请日:2021-02-02
申请人: LOOKOUT, INC.
发明人: Kevin Patrick Mahaffey , Timothy Micheal Wyatt , Brian James Buck , Matthew Robert Baker , Danielle Hewson Kingsley , Elaine P. Teoh , Marc William Rogers
IPC分类号: H04L29/06 , H04W12/069 , H04W12/084 , H04L9/06 , H04L9/32
摘要: A method for multi-party authorization includes a security component determining that a request for the performance of an action on a computing device is from a first party. The security component initiates transmissions to the computing device of first and second information indicating knowledge of first and second secrets provisioned on the computing device. The computing device, upon verifying the knowledge of first and second secrets, then permits the requested action.
-
15.
公开(公告)号:US10749877B1
公开(公告)日:2020-08-18
申请号:US16596621
申请日:2019-10-08
申请人: Lookout, Inc.
摘要: In response to a computing device of a user being reported as lost or stolen, various steps associated with security for the computing device are performed. In one approach, a database is marked to indicate that the computing device is lost or stolen. Applications that are installed on the lost or stolen computing device are determined, and a security action is selected based on this determination. In some cases, the selected security action reduces or denies service to the computing device, and/or blackholes traffic to or from the installed application. A service provider associated with the installed application is determined, and a notification is sent to the service provider. The notification indicates the installed application, and that the computing device of the user has been lost or stolen.
-
公开(公告)号:US10523706B1
公开(公告)日:2019-12-31
申请号:US16295996
申请日:2019-03-07
申请人: Lookout, Inc.
摘要: Techniques for phishing protection using cloning detection are described herein. The techniques described herein can include a server which hosts a website detecting that a fetcher is a cloning toolkit or an entity known for using a cloning toolkit. The techniques can also include a server which hosts a downloadable application (such as a mobile application) detecting that a fetcher for the application is a cloning toolkit or an entity known for using a cloning toolkit. The detection can be done in several ways, such as by analyzing data logs for patterns associated with cloning toolkits or entities known for using cloning toolkits. The techniques described herein can also include a part of an end user device (such as a part of a mobile device) detecting a clone (such as a clone website or application) that was cloned by a cloning toolkit. Then, upon detection, security actions can be taken.
-
公开(公告)号:US10509910B2
公开(公告)日:2019-12-17
申请号:US16443682
申请日:2019-06-17
申请人: LOOKOUT, INC.
发明人: Kevin Patrick Mahaffey , John G. Hering , James David Burgess , Brian James Buck , William Robinson
摘要: A software component, upon receiving a request for access to a provider having a plurality of service levels, determines the current security state of the requesting device. The security state of the requesting device varies according to severity levels of device security events. The software component compares that security state to a policy associated with the provider. The software component then allows the requesting device access to the provider services where the device's current security state meets or exceeds the security state required for the service.
-
18.
公开(公告)号:US10419222B2
公开(公告)日:2019-09-17
申请号:US14301007
申请日:2014-06-10
申请人: Lookout, Inc.
发明人: Kevin Patrick Mahaffey , Timothy Micheal Wyatt , Daniel Lee Evans , Emil Barker Ong , Timothy Strazzere , Matthew John Joseph LaMantia , Brian James Buck
摘要: Software applications to be installed on user devices are monitored. Authenticity of the applications is evaluated using a plurality of inputs to provide a result. The plurality of inputs may include trust factors. The trust factors may be used to generate a security evaluation. In response to the result, an action is performed such as providing a notification to a developer of a fraudulent version of an application or providing a security assessment for an application.
-
公开(公告)号:US20190158540A1
公开(公告)日:2019-05-23
申请号:US16250852
申请日:2019-01-17
申请人: LOOKOUT, INC.
摘要: Based on context received regarding a mobile communications device a server determines whether an existing network connection employed by the mobile communications device offers a level of security that is appropriate. When the server determines that the level of security is appropriate, the mobile communications device is allowed to continue using the network connection. Otherwise, the server directs the mobile communications device to terminate the network connection.
-
公开(公告)号:US20190130382A1
公开(公告)日:2019-05-02
申请号:US16234297
申请日:2018-12-27
申请人: LOOKOUT, INC.
摘要: A method includes receiving, by a payment server, a request for a payment from a mobile communication device; and, generating, a request to verify the location of the mobile communication device. In response to receiving the location of the mobile communication device, determining whether or not to authorize the requested payment.
-
-
-
-
-
-
-
-
-