Patents by Inventor Kevin Jiang

Kevin Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10331879
    Abstract: A computer-implemented method for automatically generating passwords that comply with password restrictions may include (1) maintaining a database that stores password criteria for a plurality of websites, (2) determining that a user is accessing a website that requests creation of a password, (3) determining a set of password complexity rules for the website by querying the database that stores the password criteria, (4) using the set of password complexity rules to automatically generate the password for the website such that the password complies with the password criteria for the website, and (5) providing the password for use in the website that requested creation of the password. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: June 25, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov
  • Patent number: 10289865
    Abstract: A computer-implemented method for providing kinship-based accessibility to securely stored data may include (1) identifying encrypted data that is encrypted with a first cryptographic key which was derived from heritable biometric information obtained from a first person, (2) receiving heritable biometric information obtained from a second person related to the first person within a predetermined degree, (3) generating a second cryptographic key based at least in part on the heritable biometric information obtained from the second person, and (4) decrypting the encrypted data that is encrypted with the first cryptographic key derived from the heritable biometric information obtained from the first person by using the second cryptographic key generated based at least in part on the heritable biometric information obtained from the second person. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: May 14, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang
  • Patent number: 10292047
    Abstract: A computer-implemented method for preventing tracking of mobile devices may include (1) identifying, from a first device with wireless networking capability, an initial service set identifier used by the first device as identification for a wireless network, where a second device with wireless networking capability also uses the initial service set identifier, (2) determining, based at least in part on a time indicator at the first device, that the initial service set identifier is to be changed, (3) generating a new service set identifier for use by the first device instead of the initial service set identifier, where the new service set identifier is generated with an identifier generation algorithm that is also used by the second device, and (4) replacing use of the initial service set identifier by the first device with use of the new service set identifier. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 23, 2015
    Date of Patent: May 14, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Michael Shavell, Matt Boucher
  • Patent number: 10284556
    Abstract: A computer-implemented method for verifying authentication requests using IP addresses may include (i) collecting, by a computing system, data on IP address changes from a set of endpoint devices, (ii) creating, by the computing system using the data on IP address changes, a virtual IP address distance map based on a likelihood of change from at least one origin IP address to at least one destination IP address, (iii) automatically detecting, by the computing system, a change in an IP address of a client device, (iv) determining, by the computing system and based on the virtual IP address distance map, that the change in the IP address of the client device indicates that an authentication request from the client device is suspicious, and (v) performing, by the computing system, a security action to secure the client device. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 11, 2016
    Date of Patent: May 7, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang
  • Patent number: 10257202
    Abstract: The disclosed computer-implemented method for logging users out of online accounts may include (i) receiving, from a first computing device of a user, a request from the user to log into an online account hosted by an online platform, (ii) establishing, between the online platform and a second computing device of the user, a network session that both (a) verifies the identity of the user to the online platform and (b) at least partially disrupts the functionality of the second computing device, (iii) logging the user into the online account via the first computing device, (iv) detecting a request from the user to log out of the online account, and then (v) in response to the request to log out of the online account, (a) restoring full functionality of the second computing device by terminating the network session and (b) logging the user out of the online account.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: April 9, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov, Rickey Ray
  • Patent number: 10248769
    Abstract: The disclosed computer-implemented method for authenticating users on touchscreen devices may include (i) detecting that the computing device is at an authentication step that requires valid authentication input from a user in order to authenticate the user to a service on the computing device, (ii) detecting that the computing device is physically oriented such that a touchscreen of the computing device is facing away from the user of the computing device, (iii) receiving input from the user via the touchscreen, (iv) determining that the input from the user comprises a mirrored version of the valid authentication input that is flipped along a vertical axis relative to the touchscreen, and (v) authenticating the user to the service in response to determining that the input comprises the mirrored version of the valid authentication input. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 10, 2016
    Date of Patent: April 2, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov
  • Patent number: 10219157
    Abstract: A first mobile device securely transmits selected verified attributes concerning the corresponding user to a second mobile device. The first device broadcasts verified, signed biometric information concerning its user, and the user's public key. The second device confirms the received broadcasted biometric information, based on sensor input. For example, sensors on the second device generate images of the first user, who is physically proximate, and information gleaned from the images is compared to broadcasted biometric information. In response to confirming the broadcasted biometric information, the second device transmits a request to establish a secure channel, and both devices generate a session key. The first device selects specific verified attributes to provide to the second device, based on context, policy and/or user directive. The first device then encrypts the attributes using the session key, and transmits them to the second device. The second device receives and decrypts the attributes.
    Type: Grant
    Filed: October 5, 2016
    Date of Patent: February 26, 2019
    Assignee: SYMANTEC CORPORATION
    Inventors: Kevin Jiang, Ilya Sokolov
  • Patent number: 10206110
    Abstract: Techniques are described for network security. One method includes identifying a network-access boundary associated with a network for a location, generating a credential for the network based at least in part on the identified network-access boundary, receiving a request from a user equipment (UE) to access the network associated with the location, and transmitting the credential associated with the network based at least in part on the network-access boundary.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: February 12, 2019
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Lei Gu, Ilya Sokolov, Kevin Jiang
  • Patent number: 10200359
    Abstract: The disclosed method for creating credential vaults that use multi-factor authentication to automatically authenticate users to online services may include (1) detecting a user account for an online service that uses multi-factor authentication comprising a token that generates a cryptographic authentication code, (2) creating a virtual representation of the token that is capable of generating the cryptographic authentication code, (3) storing the virtual representation of the token and a set of credentials for the user account in a credential vault for a user, (4) sending a message to the online service that associates the virtual representation of the token with the user account, (5) authenticating the user to the credential vault, and (6) automating the multi-factor authentication process for the online service by providing the cryptographic authentication code and the set of credentials to the online service. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: February 5, 2019
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang
  • Patent number: 10193899
    Abstract: Methods, apparatuses, and systems relating to narrow beam communications and wireless networking are disclosed. Exemplary methods for wireless networking and communications may include identifying a geographic area, receiving topography data related to the geographic area, analyzing the topography data, identifying a first line of sight path related to a first access point location and one or more customer premises device locations based at least in part on the analyzing, and identifying a second line of sight path based at least in part on a predetermined amount.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: January 29, 2019
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang
  • Patent number: 10193880
    Abstract: The disclosed computer-implemented method for registering user accounts with multi-factor authentication schemes used by online services may include (1) determining that a user is associated with an account with an online service that allows the user to register the account with an MFA scheme that requests the user to complete multiple authentication steps before being allowed to access the account, (2) identifying, based on an analysis of the online service, at least a portion of the information that is requested by the online service to register the account with the MFA scheme, and (3) providing the requested information to the online service such that the account is registered with the MFA scheme. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 9, 2015
    Date of Patent: January 29, 2019
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov
  • Patent number: 10178122
    Abstract: The disclosed computer-implemented method for disseminating location-based reputations for link-layer wireless attacks may include (i) receiving, at a server from a first wireless client, a wireless-attack report for a location that includes (a) information that indicates that the first wireless client detected a link-layer wireless attack (e.g., a wireless-access-point spoofing attack or a deauthentication attack) at the location or (b) information that indicates that the first wireless client did not detect any link-layer wireless attacks at the location, (ii) using, at the server, the wireless-attack report to generate a reputation for link-layer wireless attacks for the location, (iii) receiving, at the server from a second wireless client, a request for the reputation of the location, and (iv) responding to the request with the reputation of the location. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: January 8, 2019
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang
  • Patent number: 10148631
    Abstract: The disclosed computer-implemented method for preventing session hijacking may include (1) determining that a user is attempting to complete at least a portion of an authentication session on a first computing system, (2) using input from one or more input devices of the first computing system to obtain environmental context associated with the user's attempt to complete the authentication session, (3) preventing the authentication session from authenticating the user while using the environmental context to determine whether the authentication session is valid, where using the environmental context to determine whether the authentication session is valid includes (a) transmitting the environmental context to a second computing system and (b) requesting an indication of whether, based on an evaluation of the environmental context at the second computing system, the authentication session is valid. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: December 4, 2018
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Kevin Jiang
  • Patent number: 10097560
    Abstract: The disclosed computer-implemented method for automatically adjusting user access permissions based on beacon proximity may include (1) identifying a network-enabled device that is attempting to access a network resource that is protected by a security policy, where the security policy identifies an access level at which one or more devices may access the network resource when the devices are within range of the short-range wireless signal from the secure beacon, (2) determining that the network-enabled device is within range of the short-range wireless signal from the secure beacon, and (3) establishing, according to the security policy, the access level at which the network-enabled device is allowed to access the network resource based at least in part on the network-enabled device being within range of the short-range wireless signal. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: October 9, 2018
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang, Ilya Sokolov, Lei Gu
  • Patent number: 10068089
    Abstract: A computer-implemented method for network security may include (1) obtaining initial information that at least partially identifies an initial access point for connecting to a network, (2) after obtaining the initial information, obtaining subsequent information that at least partially identifies a subsequent access point for connecting to the same network, (3) comparing, by a security program, the initial information and the subsequent information in an attempt to detect whether the initial access point and the subsequent access point are the same, (4) detecting, based on the comparison, an indication that the initial access point and the subsequent access point are different, and (5) performing, by the security program in response to detecting the indication that the initial access point and the subsequent access point are different, a remedial action to protect a user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: September 4, 2018
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Matt Boucher, Kevin Jiang
  • Patent number: 10061916
    Abstract: The disclosed computer-implemented method for measuring peer influence on a child may include (i) monitoring computing activity on at least one endpoint device of a child to identify (a) baseline behaviors that indicate expected behavior patterns of the child (b) an unusual behavior of the child that indicates a deviation from the baseline behaviors, (ii) identifying, based at least in part on the monitored computing activity, a peer of the child associated with the unusual behavior, (iii) determining, based at least in part on a comparison between the baseline behaviors and the unusual behavior, a level of influence the peer has on the child, and then (iv) performing a computing security action that prevents the child from engaging in potentially harmful behaviors by providing, to a guardian of the child, the level of influence of the peer. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: August 28, 2018
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Keith Newstadt, Lei Gu
  • Patent number: 10033732
    Abstract: The disclosed computer-implemented method for detecting cloning of security tokens may include (i) logging, at an authentic security token, one-time-use security codes that are derived at the authentic security token from a shared secret that is stored at the authentic security token, (ii) logging, at a validation server, one-time-use security codes that are derived from the shared secret and received at the validation server, (iii) determining that the authentic security token has been cloned by determining that the one-time-use security codes logged at the validation server include at least one additional one-time-use security code that is not included in the one-time-use security codes logged at the authentic security token, and (iv) performing a security action in response to determining that the authentic security token has been cloned. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 9, 2016
    Date of Patent: July 24, 2018
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Ilya Sokolov
  • Patent number: 10004986
    Abstract: Techniques are disclosed for monitoring and evaluating video game activity by scanning for communications between a gaming console and peripherals that wirelessly communicate with the gaming console. An activity tracker receives wireless communications sent between the gaming console and a peripheral. The activity tracker generates one or more usage metrics describing the wireless communications. The activity tracker evaluates the network data based on or more specified rules. Upon determining that the usage metrics trigger a specified rule, the activity tracker generates a notification to describing those usage metrics.
    Type: Grant
    Filed: May 19, 2016
    Date of Patent: June 26, 2018
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang, Matt Boucher
  • Patent number: 9918224
    Abstract: The disclosed computer-implemented method for preventing computing devices from sending wireless probe packets may include (1) storing a geolocation of at least one wireless network that was previously accessed by the computing device, (2) determining a current geolocation of the computing device, (3) determining that the current geolocation of the computing device is not within a predetermined distance of the geolocation of any previously accessed wireless network, and (4) preventing the computing device from sending any wireless probe packets in response to determining that the current geolocation of the computing device is not within the predetermined distance of the geolocation of any previously accessed wireless access point. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: March 13, 2018
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Kevin Jiang
  • Patent number: 9888377
    Abstract: Ongoing analytics streams are received over time from mobile computing devices. An analytics stream comprises data corresponding to monitored activity that occurred on the originating mobile computing device. Dynamic, personalized knowledge based authentication questions are generated from analytics stream data. In response to an authentication request from a user, the user is prompted to answer a given number of current dynamic, personalized knowledge based authentication questions.
    Type: Grant
    Filed: May 25, 2016
    Date of Patent: February 6, 2018
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, Ilya Sokolov, Kevin Jiang