Abstract: A security analysis of data received on a mobile communications device includes gathering information about the data through at least two of multiple network interfaces, each of the at least two network interfaces having different protocols. Based upon the gathering, a first protocol is assigned to the data received from a first of the at least two network interfaces. A second protocol is assigned to the data received from a second of the at least two network interfaces. A common security analysis is performed on at least a part of the data received from each of the first and second network interfaces to determine whether the data received by the mobile communications device is safe or malicious.
Abstract: An identification of software assets and a defined manner of usage for the software assets are received over a network. Software applications previously or currently being installed on a plurality of user devices are monitored. From this monitoring, at least one of the software assets that is being used in one or more of the applications inconsistently with the defined manner of usage is identified. A report is sent over the network to a developer regarding the inconsistent usage determined from the monitoring.
Type:
Application
Filed:
April 15, 2014
Publication date:
June 18, 2015
Applicant:
LOOKOUT, INC.
Inventors:
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
Abstract: Software applications to be installed on user devices are monitored. Authenticity of the applications is evaluated using a plurality of inputs to provide a result. The plurality of inputs may include trust factors. The trust factors may be used to generate a security evaluation. In response to the result, an action is performed such as providing a notification to a developer of a fraudulent version of an application or providing a security assessment for an application.
Type:
Application
Filed:
June 10, 2014
Publication date:
June 18, 2015
Applicant:
LOOKOUT, INC.
Inventors:
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
Abstract: Authenticity of a new application being installed on a mobile device is evaluated to provide a result. The evaluation uses a plurality of inputs. In response to the result, an action is performed (e.g., on the mobile device itself and/or a server performing or assisting with the evaluation). For example, the evaluating may be done for an application that a user of the mobile device desires to install from an application marketplace. In another example, the action is sending of a notification to the mobile device, and the notification includes an assessment of authenticity of the new application.
Type:
Application
Filed:
December 13, 2013
Publication date:
June 18, 2015
Applicant:
LOOKOUT, INC.
Inventors:
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
Abstract: Software applications previously or currently being installed on a plurality of user devices are monitored. In one embodiment, a first set of the installed applications that is signed with a signing identifier of a developer are identified. A report is then sent to the developer that includes an identification of the first set. In another embodiment, the authenticity of a first application is evaluated including determining, based on a respective signing identifier for each of a plurality of applications, that the applications are similar to the first application. A notification is sent to the developer that identifies applications having a signing identifier that is different from the signing identifier of the developer.
Type:
Application
Filed:
April 15, 2014
Publication date:
June 18, 2015
Applicant:
LOOKOUT, INC.
Inventors:
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
Abstract: Data is collected from a set of devices. The data is associated with the devices, mobile application programs (apps), web applications, users, or combinations of these. A norm is established using the collected data. The norm is compared with data collected from a particular device. If there is a deviation outside of a threshold deviation between the norm and the data collected from the particular device, a response is initiated.
Type:
Application
Filed:
December 6, 2013
Publication date:
June 11, 2015
Applicant:
LOOKOUT, INC.
Inventors:
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, John Gunther Hering, Amit Gupta, Alex Cameron Abey
Abstract: A crawler program collects and stores application programs including application binaries and associated metadata from any number of sources such as official application marketplaces and alternative application marketplaces. An analysis including comparisons and correlations are performed among the collected data in order to detect and warn users about pirated or maliciously modified applications.
Type:
Grant
Filed:
May 30, 2012
Date of Patent:
May 26, 2015
Assignee:
LOOKOUT, INC.
Inventors:
Timothy M. Wyatt, Tim Strazzere, Kevin Patrick Mahaffey, Yogesh Swami
Abstract: Systems and methods for uploading location information based on device movement are disclosed. In some embodiments, location information may be received or determined by a mobile communications device. The location information may be associated with a physical location of the mobile communications device. A rate of movement of the mobile communications device may be identified. In some embodiments, the location information may be transmitted or uploaded from the mobile communications device to a server. The frequency of the transmitting or uploading of the location information may be based on the rate of movement of the mobile communications device.
Type:
Grant
Filed:
April 15, 2013
Date of Patent:
May 26, 2015
Assignee:
LOOKOUT, INC.
Inventors:
Brian James Buck, Kevin Patrick Mahaffey, Kesava Abhinav Yerra, Matthew John Joseph LaMantia
Abstract: Context information associated with a mobile communications device and a network connection for the mobile communications device is collected. A security policy is applied to determine whether the security offered by the network connection is appropriate for the context. If the security offered by the network connection is not appropriate for the context, the network connection may be made more secure, less secure, or a different network connection having an appropriate level of security may be used for the data associated with the context.
Type:
Application
Filed:
November 4, 2013
Publication date:
May 7, 2015
Applicant:
LOOKOUT, INC.
Inventors:
Kevin Patrick Mahaffey, Timothy Strazzere, Brian James Buck
Abstract: A system and method to create and assign a policy for a mobile communications device are disclosed. The policy may be created based on personal data associated with the mobile communications device. For example, known sources of personal data on the mobile communications device may be identified and a policy may be created based on the known personal data. The policy may then be used to identify additional personal data associated with the mobile communications device. Thus, the personal data associated with the mobile communications device may be monitored. If an application attempts to access the monitored personal data, the access will be detected.
Type:
Application
Filed:
October 25, 2013
Publication date:
April 30, 2015
Applicant:
Lookout, Inc.
Inventors:
Timothy Micheal Wyatt, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck, Marc William Rogers
Abstract: Methods for assessing the current security state of a mobile communications device. A security component installed in either the server or the mobile communications device is configured to assess the current security state by processing security data generated by the mobile communications device. If the security data is not current, then security events on the mobile communications device are evaluated to determine a severity level for the security events, and this determination is used to assess the current security state of the mobile communications device.
Type:
Grant
Filed:
September 23, 2013
Date of Patent:
March 31, 2015
Assignee:
Lookout, Inc.
Inventors:
Kevin Patrick Mahaffey, John G. Hering, James David Burgess
Abstract: A system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application has an adverse effect or has the potential to cause an adverse effect on a mobile device or a network the mobile device may connect to. A mobile device may monitor behavioral data, apply a model to the data, and transmit a disposition to the server. The server may aggregate behavioral data or disposition information from multiple devices. The server may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, the server may enact corrective actions, such as generating device or network configuration data.
Type:
Grant
Filed:
February 23, 2011
Date of Patent:
March 17, 2015
Assignee:
Lookout, Inc.
Inventors:
Kevin Patrick Mahaffey, David Golombek, David Luke Richardson, Timothy Micheal Wyatt, James David Burgess, John G. Hering
Abstract: The security and privacy of a user is enhanced by monitoring the background environment in which the user is working for changes. In an embodiment, a first or reference image is acquired using a front-facing camera of the user's computing device. A second or target image is acquired using the front-facing camera. The images are compared and an alert is generated if there is a change in background that exceeds a threshold. The change may be a person who has entered the environment and is watching the computing device screen. The alert may include reducing the visibility of information shown on the screen.
Abstract: Mobile devices may often communicate with network (“cloud”) services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to create an account associating a mobile device to a network service without requiring a user to explicitly enter authentication information, such as a username and password. In an embodiment, data corresponding to a mobile device is obtained to generate authentication information which is then sent to messaging address of a user. In another embodiment, in response to an event, a mobile device obtains an identifier for a user, sends the identifier to a server, where the server transmits one set of authentication information to a messaging address associated with the user and another set of authentication information to the device.
Type:
Grant
Filed:
February 23, 2012
Date of Patent:
January 20, 2015
Assignee:
Lookout, Inc.
Inventors:
David Richardson, Kevin Mahaffey, Jonathan Grubb