Managing access to services based on fingerprint matching

    公开(公告)号:US11038876B2

    公开(公告)日:2021-06-15

    申请号:US16241504

    申请日:2019-01-07

    申请人: Lookout, Inc.

    IPC分类号: H04L29/06

    摘要: A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation that includes creating a fingerprint of the first computing device; and determining, by the second computing device, whether the fingerprint matches a fingerprint of one or more other computing devices. The second computing devices determines whether to authorize access to the service based on the evaluation.

    System and method for authorizing payment transaction based on device locations

    公开(公告)号:US10699273B2

    公开(公告)日:2020-06-30

    申请号:US15805889

    申请日:2017-11-07

    申请人: LOOKOUT, INC.

    摘要: A method for authorizing a mobile payment transaction is provided that is based on device locations. The method includes receiving, by a server, a request from a point of sale (POS) device to authorize a payment transaction involving a payment facilitating device. In an embodiment, the request includes payment information of the payment transaction and location information of the POS device. When the request is received, an authorizing client device for the payment transaction is identified based on the payment information from the payment facilitating device. The request to authorize the payment transaction is granted when it is determined that the authorizing client device is located within a predetermined distance from the POS device.

    METHODS AND SYSTEMS FOR ANALYZING DATA AFTER INITIAL ANALYSES BY KNOWN GOOD AND KNOWN BAD SECURITY COMPONENTS

    公开(公告)号:US20200097665A1

    公开(公告)日:2020-03-26

    申请号:US16670227

    申请日:2019-10-31

    申请人: LOOKOUT, INC.

    摘要: Methods and systems are provided for conditionally allowing a mobile communications device to process received data. Initially, the data is analyzed by a known good component without the component determining that the data is safe, and the data is analyzed by a known bad component without the component determining that the data is malicious. Subsequently, the data is analyzed by a decision component on the mobile communications device. When the decision component determines the data to be safe, the decision component allows the mobile communications device to process the data. When the decision component determined the data to be malicious, the decision component prevents the mobile communications device from processing the data.