-
公开(公告)号:US11194925B1
公开(公告)日:2021-12-07
申请号:US16224358
申请日:2018-12-18
申请人: NortonLifeLock Inc.
IPC分类号: G06F21/00 , G06F21/62 , G06F21/55 , G06F16/958 , G06F9/54 , G06F16/955 , H04L12/58
摘要: Methods and systems are provided for monitoring private information exposure. One example method generally includes detecting, at a computing device, a potentially exposing post on a publicly-accessible server and determining, by an exposure model operated by the computing device, an exposure chance for the potentially exposing post. The method further includes transmitting an initial notification of the potentially exposing post from the computing device to a client device based on the exposure chance from the exposure model and detecting an update event associated with the potentially exposing post. The method further includes updating the exposure model based on the update event and transmitting a personalized notification from the computing device to the client device based on the update event.
-
公开(公告)号:US11188393B1
公开(公告)日:2021-11-30
申请号:US17190219
申请日:2021-03-02
申请人: NORTONLIFELOCK INC.
发明人: Qing Li
摘要: The disclosed computer-implemented method for performing load balancing and distributed high-availability may include (i) detecting through a group communication channel that links all nodes of a computing cluster that an overburdened node of the computing cluster has fallen below a predefined performance level, (ii) determining to transfer a specific microservice transaction from the overburdened node to a helper node in the computing cluster, (iii) copying data for the specific microservice transaction from a portion of a central data store that is reserved for the overburdened node to another data store that is reserved for the helper node, and (iv) completing, by the helper node, the specific microservice transaction by referencing the copied data for the specific microservice transaction in the data store that is reserved for the helper node. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US11172258B1
公开(公告)日:2021-11-09
申请号:US17158892
申请日:2021-01-26
申请人: NortonLifeLock Inc.
IPC分类号: H04N21/454 , G06K9/00 , G06K9/62 , H04N21/44 , H04N21/437 , H04N21/466 , H04N21/2187
摘要: Protecting against an impersonation scam in a live video stream. In some embodiments, a method may include periodically extracting and storing signature features from verified video streams of verified streamers, identifying an unverified live video stream of an unverified streamer being viewed by one or more users, extracting and storing signature features from the unverified live video stream, computing overall distance scores between the signature features of the unverified live video stream and the signature features of the verified video streams, determining whether the unverified streamer is impersonating one or more of the verified streamers by determining whether one or more of the overall distance scores are less than a distance threshold, determining whether one or more text signature features of the unverified live video stream include an impersonation scam, and performing a remedial action to protect the one or more users from the impersonation scam.
-
公开(公告)号:US11124195B1
公开(公告)日:2021-09-21
申请号:US17081703
申请日:2020-10-27
申请人: NORTONLIFELOCK INC.
发明人: Lei Gu , Matt Boucher
摘要: A computer-implemented method for retrieving driver safety scores by passenger devices may include (i) determining that an operator of a mobile device is a passenger in a vehicle, (ii) gathering, via one or more sensors of the mobile device, identifying information about at least one of the vehicle and a current driver of the vehicle, (iii) identifying, based on the identifying information gathered by the one or more sensors of the mobile device, the current driver of the vehicle, (iv) retrieving a driver safety score for the current driver of the vehicle from a collection of driver safety scores, and (v) performing, by the mobile device, a security action in response to retrieving the driver safety score. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10924880B1
公开(公告)日:2021-02-16
申请号:US15434602
申请日:2017-02-16
申请人: NortonLifeLock Inc.
发明人: Ilya Sokolov , Keith Newstadt
摘要: The present disclosure includes a method for maintaining a dynamic geofence. The method receives a set of digital IDs and data pairs from a monitored user credential. Each digital ID was received by the monitored user credential as part of a wireless transmission from a node device, and each digital ID includes one or more attributes. The method retrieves a user policy that includes a required attribute and a threshold distance. The method determines whether at least one of the digital IDs includes an attribute matching the required attribute, and verifies any digital id containing the attribute matching the required attribute. The method determines the distance between the monitored user credential and the node device using the data paired with the digital ID, and determines whether the distance between the monitored user credential and the node device is less than the threshold distance.
-
公开(公告)号:US10820137B1
公开(公告)日:2020-10-27
申请号:US15238580
申请日:2016-08-16
申请人: NortonLifeLock Inc.
发明人: Keith Newstadt , Ilya Sokolov
摘要: Techniques are disclosed to predict whether a current location of a mobile device corresponds to a user of that mobile device. To do so, the mobile device may evaluate information from sensors that indicate a current state of the device or device surroundings. Based on the probability, the mobile device may send the current location and the probability to a user of the mobile device, an application on the device, or another party.
-
公开(公告)号:US10798294B1
公开(公告)日:2020-10-06
申请号:US16228372
申请日:2018-12-20
申请人: SYMANTEC CORPORATION
发明人: Santhanakrishnan K C
摘要: Remotely controlling access to a digital camera. In some embodiments, a method may include defining at least one parameter associated with a capture of media by a camera coupled to a monitored computer device, determining that the camera is capturing media, determining that the at least one parameter is present in the captured media; determining that the presence of the at least one parameter is not approved, and sending an instruction to the monitored computer device to disable use of the camera coupled to the monitored computer device for a pre-determined period of time based on determining that the presence of the at least one parameter is not approved.
-
公开(公告)号:US10797870B1
公开(公告)日:2020-10-06
申请号:US16000920
申请日:2018-06-06
申请人: Symantec Corporation
IPC分类号: H04L9/08 , H04L29/06 , H04L29/08 , G06F21/46 , G06F16/9038
摘要: The disclosed computer-implemented method for generating passwords may include (i) accessing a vault of confidential information describing a user, (ii) extracting, from the vault, a set of multiple items of confidential information describing the user, (iii) executing a programmed heuristic on the set of multiple items of confidential information to generate multiple candidate passwords that each derives from a respective semirandom permutation of the multiple items of confidential information, and (iv) displaying electronically the multiple candidate passwords to the user to enable the user to select a password from the multiple candidate passwords as a specific password for accessing a protected computing resource. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10791116B1
公开(公告)日:2020-09-29
申请号:US15281126
申请日:2016-09-30
申请人: Symantec Corporation
摘要: The disclosed computer-implemented method for securing Universal Plug and Play connections may include (1) detecting, by a network device within a local network, an attempt by a remote device to establish a connection with a client device within the local network via a UPnP protocol, (2) identifying a forwarding rule applied by the network device on the client device based at least in part on an identity of the client device, (3) determining at least one restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, and then in response to determining the restriction placed on UPnP connections between the client device and remote devices by the forwarding rule, (4) enforcing the restriction on the connection attempted by the remote device with the client device via the UPnP protocol. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US10778840B1
公开(公告)日:2020-09-15
申请号:US16292561
申请日:2019-03-05
申请人: Symantec Corporation
发明人: Brendon Woirhaye , Radoslav Stanev , Anuj Sahai
摘要: The disclosed computer-implemented method for identifying unsolicited communications on a computing device may include a computing device receiving a communication from an unrecognized phone number; obtaining the unrecognized phone number from the communication; obtaining classification data associated with the unrecognized phone number based on categories of other computing devices contacted by the unrecognized phone number; obtaining a category associated with a phone number of the computing device; determining that the communication is an unsolicited communication based on the classification data and the category associated with the phone number of the computing device; and in response to determining that the communication is unsolicited, performing a security action to manage interactions with the communication from the unrecognized phone number. Various other methods, systems, and computer-readable media are also disclosed.
-
-
-
-
-
-
-
-
-