Patents Assigned to Lookout, Inc.
  • Publication number: 20140195604
    Abstract: Client and user activity in an application or a browser are monitored to determine whether potential actions will result in a server being contacted. A DNS request to resolve the server's host name is generated to ensure the server's IP address is cached and available.
    Type: Application
    Filed: March 13, 2014
    Publication date: July 10, 2014
    Applicant: LOOKOUT, INC.
    Inventors: Timothy Micheal Wyatt, Anbu Anbalagapandian, Ayan Mandal
  • Publication number: 20140196158
    Abstract: A method for protecting privacy and enhancing security on an electronic device is provided. When sensor information associated with at least one user input action is collected by a sensor in an electronic device hosting a plurality of applications, the method includes intercepting a request to access the sensor information from a requesting application of the plurality of applications, and controlling access to the sensor information associated with the at least one user input action based on the requesting application. By controlling access to the sensor information, leakage of sensitive or secure information to a malicious background application is minimized and privacy and security are enhanced.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: Lookout, Inc.
    Inventor: Brian James Buck
  • Patent number: 8774338
    Abstract: A method for providing a bit string on at least two electronic devices is provided. A sensor input is received by sensors in the electronic devices and recorded by the electronic devices. Sensor profiles corresponding to the sensor input are generated by each of the electronic devices. Each sensor profile includes data points, at least one of which is associated with a peak amplitude and at least one of which is associated with a valley amplitude. Each device determines a respective sampling frequency based on a time interval between a data point associated with a zero amplitude and either a nearest data point associated with a peak amplitude or a nearest data point associated with a valley amplitude. Each device then generates a bit string based on sampled data points identified using the determined sampling frequency.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: July 8, 2014
    Assignee: Lookout, Inc.
    Inventor: Brian James Buck
  • Patent number: 8774788
    Abstract: Location information associated with a computing device may be received by a server. For example, the location information may indicate the current physical location of the computing device. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device has entered or left a location area. In response to such a determination, a communication may be transmitted to a user of the computing device. For example, an email may be transmitted to the user. The email may include information describing that the computing device has entered or left the location area.
    Type: Grant
    Filed: October 10, 2013
    Date of Patent: July 8, 2014
    Assignee: Lookout, Inc.
    Inventors: Kevin Patrick Mahaffey, John Gunther Hering, James Burgess
  • Publication number: 20140188886
    Abstract: Data regarding user actions on a user device is gathered from the user device (and/or from another computing device) by a server. The data is analyzed to make a decision. The decision is sent by the server to the user device (e.g., directly or via another computing device) and then used by the user device to implement a new action on the user device. This process may be automatically repeated in order to provide real-time customization of the user device.
    Type: Application
    Filed: December 27, 2012
    Publication date: July 3, 2014
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Mahaffey, Brian James Buck, Thomson Van Nguyen
  • Publication number: 20140187202
    Abstract: A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden ROM that configures a security component to work separate and apart from the OS. A secondary transceiver is configured with the security component to send and receive security transmissions, also separate and apart from the OS and the primary transceiver of the OS. Logic to detect specified trigger events is hard-coded into the hidden ROM, and detection of such an event places the mobile communications device into a special security mode. While in the special security mode, the secondary transceiver can send and receive security messages, including the location of the mobile communications device. Further, depending upon the received messages or commands, the security component can take pre-programmed security actions, such as erasing or faking data in the device.
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Applicant: Lookout, Inc.
    Inventors: Brian James Buck, Jinggang Wang
  • Publication number: 20140189808
    Abstract: Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a network resource through an authentication platform that issues a challenge in response to the request requiring authentication of the user identity through a reply from the client computer, determining one or more items of context information related to at least one of the user, the request, and the client computer, and determining a disposition of the request based on the reply and the one or more items of context information. The reply includes a user password and may be provided by an authorizing client device coupled to the client computer over a wireless communications link.
    Type: Application
    Filed: March 15, 2013
    Publication date: July 3, 2014
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, David Luke Richardson, Ariel Salomon, R. Tyler Croy, Samuel Alexander Walker, Brian James Buck, Sergio Ivan Marcin Gorrino, David Golombek
  • Publication number: 20140181721
    Abstract: A graphical user interface for improved text character entry is disclosed. In some embodiments, the graphical user interface may be displayed on a mobile communications device. The graphical user interface may display a message field, a soft keyboard, and at least one visual foveal echo field. The message field may display text characters of a message being authored by a user interacting with the soft keyboard. The visual foveal echo field may be placed adjacent to a soft keyboard row and contain a portion of the message being authored by the user.
    Type: Application
    Filed: March 4, 2013
    Publication date: June 26, 2014
    Applicant: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Publication number: 20140172140
    Abstract: A method and apparatus for providing cross device sharing of audio content. Computing devices are configured with an audio sharing component, and the audio sharing components of multiple computing devices are connected through a communications link thus forming a virtual audio channel. One computing device is selected as the destination receiver device, and the other computing devices are source devices for generating audio content. The audio sharing component of the source devices transmits audio content onto the virtual channel, where it is received by the selected destination device.
    Type: Application
    Filed: December 31, 2012
    Publication date: June 19, 2014
    Applicant: Lookout Inc.
    Inventor: Brian James Buck
  • Publication number: 20140173026
    Abstract: A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross notification component is at least configured to transmit notices to other devices, and to receive responses to its notice transmissions. In some devices, the cross notification component is at least configured to receive the notices transmitted by other devices, and to generate and transmit responses to received notices.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 19, 2014
    Applicant: Lookout, Inc.
    Inventors: Brian James Buck, David Luke Richardson
  • Publication number: 20140165190
    Abstract: A system and method for using file system events to trigger a security scan. A file system watches all writable directory paths for defined file system events on files in the watched paths. Upon occurrence of a watched event, the file is scanned using known security methods. A data structure stores events and can be used to update and track events. Cookies can be used to correlate MOVE events. A timer can be used to avoid repetitive scanning after discrete WRITE events.
    Type: Application
    Filed: December 10, 2012
    Publication date: June 12, 2014
    Applicant: Lookout Inc.
    Inventors: Matthew Quigley, David Kincade
  • Publication number: 20140165169
    Abstract: Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the method includes identifying alternative characters for at least one character of the entered password based on a location of a key corresponding to the character of the entered password on a keyboard used to enter the password. When the alternative characters are identified, a variation of the entered password is generated by replacing a character of the entered password with an alternative character of the character. When information relating to the variation matches information relating to the defined password, the entered password is determined to be valid.
    Type: Application
    Filed: December 10, 2012
    Publication date: June 12, 2014
    Applicant: Lookout, Inc.
    Inventor: Brian James Buck
  • Patent number: 8752176
    Abstract: A system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces a characterization assessment and can also provide a characterization re-assessment for the application, or data object, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The server transmits notifications to devices that have installed applications that are discovered to be undesirable. The server can accumulate this data and then perform a characterization re-assessment of a data object it has previously assessed to provide an assessment based upon one of trust, distribution and ratings information.
    Type: Grant
    Filed: May 2, 2012
    Date of Patent: June 10, 2014
    Assignee: Lookout, Inc.
    Inventors: Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Micheal Wyatt, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, David Luke Richardson, Ariel Salomon
  • Publication number: 20140156784
    Abstract: Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an application in a source electronic device can be cloned from the source electronic device to a target electronic device. According to an embodiment, when the application is selected, the source device can be configured to automatically collect the selected application and configuration information, state information and/or application data associated with the selected application. The collected information is referred to as “cloning data.” Once the cloning data is collected, the source device can be configured to transmit at least a portion of the cloning data to the target electronic device, which can utilize the cloning data to clone the application into the target electronic device.
    Type: Application
    Filed: December 3, 2012
    Publication date: June 5, 2014
    Applicant: Lookout, Inc.
    Inventor: Brian James Buck
  • Patent number: 8745739
    Abstract: A system and method prevent malware, spyware and other undesirable applications from affecting mobile communication devices, which use a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces a characterization assessment and can also provide a characterization re-assessment for the application, or data object, and transmits the assessment to the device. Performing analysis on a server reduces the battery and performance cost of protection. The server transmits notifications to devices that have installed applications that are discovered to be undesirable. The server receives data about applications from many devices, using the combined data to minimize false positives and provide comprehensive protection against known and unknown threats.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: June 3, 2014
    Assignee: Lookout, Inc.
    Inventors: Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Micheal Wyatt, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, David Luke Richardson, Ariel Salomon
  • Patent number: 8738765
    Abstract: When a mobile device interacts with a network service, synchronous DNS resolution can significantly impact user experience due to lossy or moderate-high latency conditions. Network services that rely on low-TTL DNS records for failover require a client to frequently resolve the service's host name. It is undesirable to block on these frequent resolutions. In an implementation, user activity on a mobile device is monitored to determine whether the user is engaged in an activity that would contact a server. If such an activity is in progress, then DNS requests to resolve the server's host name are periodically generated to make sure the server's IP address is cached. In an implementation, if a request to communicate with a server fails, the DNS cache expires the entry for that server so that a new DNS request can resolve the server's IP address in case the server's IP address has changed.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: May 27, 2014
    Assignee: Lookout, Inc.
    Inventors: Timothy Micheal Wyatt, Anbu Anbalagapandian, Ayan Mandal
  • Publication number: 20140128047
    Abstract: Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, an electronic communication identified by a phone number is intercepted at a mobile communications device before the electronic communication is received by an application program on the device. The phone number is sent to a server for the server to identify a category associated with the phone number. The category is received at the mobile communication device. Based on the received category, a determination is made as to whether the application program should be allowed to receive the electronic communication. If allowed, the electronic communication is forwarded to the application program; else, the electronic communication is not forwarded.
    Type: Application
    Filed: December 4, 2012
    Publication date: May 8, 2014
    Applicant: Lookout, Inc.
    Inventors: Stephen J. Edwards, Ankur Bharatbhushan Nandwani, Rohan Nagarakere Ramakrishna, Brian James Buck, Kesava Abhinav Yerra
  • Publication number: 20140128021
    Abstract: User activity on a mobile device is monitored and collected, and a resource usage model is constructed. The resource usage model describes a set of contexts in which the mobile device, and is the basis for determining a first exhaustion point for a resource. Based on the monitored activity, a prediction of a second exhaustion point for the resource time is made. If the second exhaustion point is prior to the first exhaustion point, usage of the resource is reduced.
    Type: Application
    Filed: November 27, 2013
    Publication date: May 8, 2014
    Applicant: Lookout, Inc.
    Inventors: Samuel Alexander WALKER, Ayan Kanti Mandal, Devesh Senapati, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck
  • Publication number: 20140120961
    Abstract: Systems and methods are provided for secure composition of security messages. A text message template may be displayed on a display of a mobile communications device. The text message template may include a first text field associated with a semantic category representing a plurality of items identified based on their meaning. At least one button associated with the semantic category may be presented on the display of the mobile communications device. An input may be received at the at least one button from a user of the mobile communications device. At least some of the plurality of items belonging to the semantic category associated with the first text field may be presented on the display of the mobile communications device. A selection of an item of the plurality of items may be received. The selected item may be presented in the first text field of the text message template.
    Type: Application
    Filed: December 28, 2012
    Publication date: May 1, 2014
    Applicant: LOOKOUT, INC.
    Inventor: Brian James BUCK
  • Publication number: 20140095298
    Abstract: A mobile communications device needs to be replaced. An evaluation is made as to which offers were effective in replacing devices of the same type as the mobile communications device. Based on the evaluation, an offer is generated to replace the mobile communications device with a replacement mobile communications device.
    Type: Application
    Filed: December 5, 2013
    Publication date: April 3, 2014
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, James David Burgess, John Gunther Hering