Patents Assigned to Bluebox Security Inc.
  • Patent number: 8925077
    Abstract: Applications that have the ability to be debugged also provide an access to violate the security of the application. The present invention provides a means to ensure that the debugging aspects of an application can be defeated after development and other test procedures, to keep persons or other applications from starting a debugging procedure that can lead to the discovery of secured or sensitive information and data. The application of the present invention is greatly automated such that anyone beginning a debugging program against the application in a device will be stymied by the application shutting down the debugging before data or other sensitive information can be released.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: December 30, 2014
    Assignee: Bluebox Security, Inc.
    Inventors: Felix Matenaar, Jeffrey Forristal
  • Patent number: 8887150
    Abstract: The present invention provides a mechanism to change how mobile device applications, particularly Android applications, work; essentially selectively modifying their behavior. Where an application provides a useful operation but also has functionality that can be detrimental to the desired action of a device, use of the application becomes problematic. The present invention provides a method of modifying the use of the application without invasive reprogramming of the code. The present invention provides a means to make modifications to the functionality without modifying the application. As a result, performance of the desired outcome is not affected and because there is no modification of the actual software, legal boundaries are maintained.
    Type: Grant
    Filed: March 12, 2014
    Date of Patent: November 11, 2014
    Assignee: Bluebox Security Inc.
    Inventors: Felix Matenaar, Patrick Schulz
  • Publication number: 20140282465
    Abstract: The present invention provides a mechanism to change how mobile device applications, particularly Android applications, work; essentially selectively modifying their behavior. Where an application provides a useful operation but also has functionality that can be detrimental to the desired action of a device, use of the application becomes problematic. The present invention provides a method of modifying the use of the application without invasive reprogramming of the code. Prior art attempts to modify applications included software modifications and rewrites and would often cause buggy operation of the application; even to the extent of damaging the desired functionality. Such modifications could be contrary to intellectual property rights and software licensing. The present invention provides a means to make modifications to the functionality without modifying the application.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 18, 2014
    Applicant: Bluebox Security Inc.
    Inventors: Felix Matenaar, Patrick Schulz
  • Publication number: 20140273880
    Abstract: The present invention provides a computer-implemented method in a mobile device programmed for the method, includes receiving in the mobile device, an indication to enter a limited functionality mobile device state, and initiating in the mobile device, a limited functionality mobile device state. In this way a mobile device can be temporarily suspended in some or all operations, including functionality that could cause the loss of private or privileged information or data. The method permits a manager to exercise discretion at the potential loss of the device or the potential recovery of the device so as to save its functionality by suspending for periods of time or acting to sever the device permanently. The method further allows automatic triggers to cause a device to enter a limited functionality state and emerge therefrom when the triggering situation no longer exists.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 18, 2014
    Applicant: Bluebox Security Inc.
    Inventors: Caleb Sima, Jeffrey Forristal, Khiem Chan Truong
  • Publication number: 20140258491
    Abstract: The present invention is directed to a method of making Internet network trafficking easier and more secure while resolving a DNS inquiry in systems having both IPv4 and IPv6 elements in the new world situation of two competing DNS systems. The method utilizes a computing system DNS transfer policy to inquire and then provide a response to DNS inquiries that can include differing Internet Protocols. By including the policy inquiry and allowing the system to encode IPv4 addresses within IPv6 addresses, a more secure and quick response is provided allowing business, government and individual users to safely use the Internet in association with any number of Internet capable devices.
    Type: Application
    Filed: March 10, 2014
    Publication date: September 11, 2014
    Applicant: Bluebox Security Inc.
    Inventors: Jeffrey Forristal, Adam Ely
  • Publication number: 20140259162
    Abstract: Applications that have the ability to be debugged also provide an access to violate the security of the application. The present invention provides a means to ensure that the debugging aspects of an application can be defeated after development and other test procedures, to keep persons or other applications from starting a debugging procedure that can lead to the discovery of secured or sensitive information and data. The application of the present invention is greatly automated such that anyone beginning a debugging program against the application in a device will be stymied by the application shutting down the debugging before data or other sensitive information can be released.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 11, 2014
    Applicant: Bluebox Security Inc.
    Inventors: Felix Matenaar, Jeffrey Forristal
  • Publication number: 20140253412
    Abstract: A computer-implemented process for outputting sensitive data to a user, so that the data is perceivable in a manner that is more private than displaying the data on a primary computer screen is provided. The method is implemented on a computing system and includes receiving a plurality of data for display on a display on the computing system, determining what is sensitive data from the plurality of data, and transmitting that which as been determined to be sensitive data apart from the plurality of data to an auxiliary system. In this manner, sensitive data can be perceived privately and as desired or programmed, ordinary data can be displayed on a primary visual device.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 11, 2014
    Applicant: Bluebox Security Inc.
    Inventors: Andrew Blaich, Jeffrey Forristal
  • Publication number: 20140258511
    Abstract: A computer-implemented, method for monitoring and establishing a secure communication session to a client computing system by a secure communication server system programmed to perform the method including monitoring in the secure communication server system, a network traffic level between the client computing system and the secure communication server system, determining in the secure communication server system, whether the network traffic level drops below a set network traffic level, and wherein when the network traffic level is determined by the secure communication server system to drop below the set network traffic level, the method includes sending with the secure communication server system, a management communication to the client computing system to reestablish a secure communication session with the secure communication server system. A subsequent secure communication session between the client computing system and the secure communication server system may or may not be established.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 11, 2014
    Applicant: Bluebox Security Inc.
    Inventors: Caleb Sima, Jeffrey Forristal