Mobile device security using a secure execution context

    公开(公告)号:US11336684B2

    公开(公告)日:2022-05-17

    申请号:US16810446

    申请日:2020-03-05

    申请人: Lookout Inc.

    IPC分类号: H04L9/32 H04L29/06

    摘要: A device includes a secure execution context that is segregated from an operating system of the device. A security application executing in the operating system interfaces with the secure execution context to obtain verified data. The secure execution context may verify that operating system files are free of malware, obtain sensor readings that may be cryptographically signed, verify functioning of a baseband processor, and verify other aspects of the function and security of the device. The verified data may be used for various purposes such as verifying location of the device, training a machine learning model, and the like.

    Performing a security action in response to a determination that a computing device is lost or stolen

    公开(公告)号:US10749877B1

    公开(公告)日:2020-08-18

    申请号:US16596621

    申请日:2019-10-08

    申请人: Lookout, Inc.

    IPC分类号: H04L29/06 G06F21/60

    摘要: In response to a computing device of a user being reported as lost or stolen, various steps associated with security for the computing device are performed. In one approach, a database is marked to indicate that the computing device is lost or stolen. Applications that are installed on the lost or stolen computing device are determined, and a security action is selected based on this determination. In some cases, the selected security action reduces or denies service to the computing device, and/or blackholes traffic to or from the installed application. A service provider associated with the installed application is determined, and a notification is sent to the service provider. The notification indicates the installed application, and that the computing device of the user has been lost or stolen.

    Phishing protection using cloning detection

    公开(公告)号:US10523706B1

    公开(公告)日:2019-12-31

    申请号:US16295996

    申请日:2019-03-07

    申请人: Lookout, Inc.

    IPC分类号: H04L29/06 H04L29/08

    摘要: Techniques for phishing protection using cloning detection are described herein. The techniques described herein can include a server which hosts a website detecting that a fetcher is a cloning toolkit or an entity known for using a cloning toolkit. The techniques can also include a server which hosts a downloadable application (such as a mobile application) detecting that a fetcher for the application is a cloning toolkit or an entity known for using a cloning toolkit. The detection can be done in several ways, such as by analyzing data logs for patterns associated with cloning toolkits or entities known for using cloning toolkits. The techniques described herein can also include a part of an end user device (such as a part of a mobile device) detecting a clone (such as a clone website or application) that was cloned by a cloning toolkit. Then, upon detection, security actions can be taken.