Patents Assigned to NortonLifeLock Inc.
  • Patent number: 10891648
    Abstract: A computer-implemented method for tracking the flow of user information over a network may include (i) recording user information transmitted from a user's computing device, (ii) identifying at least one third-party communication that utilizes at least a portion of the user information, (iii) deriving communication metadata from the third-party communication, (iv) generating, based on the communication metadata and the recorded user information, an information flow report that describes (A) the user information that was transmitted over the network connection, (B) at least one third-party communication that utilized elements of the user information, and (C) at least one element of user information utilized by the third-party communication, and (v) providing the information flow report to the user via a graphical user interface (GUI). Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: January 12, 2021
    Assignee: NORTONLIFELOCK, INC.
    Inventor: Spencer Smith
  • Patent number: 10893058
    Abstract: As described, embodiments presented herein provide techniques for detecting malware on computing devices connected to a local network segment by observing the traffic flows of such devices and generating signatures characterizing such traffic flows. Doing so allows instances of malware to be detected on a variety of devices which can be connected to a computing network, but which lack the capability of directly detecting and preventing malware applications from infecting such devices.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: January 12, 2021
    Assignee: NORTONLIFELOCK, INC.
    Inventors: Jim Casaburi, Steven P. Stockman
  • Patent number: 10887351
    Abstract: A method for implementing security of Internet of Things (IoT) home voice assistants is described. In one embodiment, a computer-implemented method for implementing a security policy with a voice assistant includes obtaining, by one or more computing devices, encrypted traffic from a voice assistant; identifying, by the one or more computing devices, a user voice command in the encrypted traffic based at least in part on one or more identifiable attributes of the encrypted traffic; determining, by the one or more computing devices, the user voice command triggers at least one security policy; and upon determining the user voice command triggers the at least one security policy, performing, by the one or more computing devices, a security action that implements the at least one security policy. In some cases, the method may include obtaining an audio recording of the user voice command with a microphone built into the router.
    Type: Grant
    Filed: May 2, 2018
    Date of Patent: January 5, 2021
    Assignee: NortonLifeLock Inc.
    Inventors: Susanta K. Nanda, Yuqiong Sun, Saurabh Shintre
  • Patent number: 10885223
    Abstract: The disclosed computer-implemented method for anonymizing user accounts may include (i) receiving an instruction to anonymize a user account to protect a user's personally identifiable information, (ii) accessing, by a security program, a settings portal for the user account in response to receiving the instruction to anonymize the user account, (iii) replacing, by the security program, original values within at least two fields within the settings portal for the user account with anonymized values to mask the user's personally identifiable information, and (iv) storing the anonymized values within a protected vault to enable the user to login to the user account. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: January 5, 2021
    Assignee: NortonLifeLock, Inc.
    Inventors: SriHarsha Angara, Michael Lo, John Meehan, Srinivas Chillappa, Simon Tiku, Viral Mehta
  • Patent number: 10887339
    Abstract: The disclosed computer-implemented method for protecting a cloud storage against suspected malware may include (1) receiving a backup of one or more encrypted files over a network, (2) determining that the one or more encrypted files match one or more criteria associated with suspected malware, and (3) performing a security action that protects a computing device against the suspected malware. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 26, 2018
    Date of Patent: January 5, 2021
    Assignee: NORTONLIFELOCK, INC.
    Inventors: Ilya Sokolov, Lei Gu, Mark Kennedy
  • Patent number: 10885226
    Abstract: The disclosed computer-implemented method for enforcing secure shared access on computing devices by content state pinning may include (1) receiving, from a user, a selection of a content view to be shared with an additional user from content displayed on a computing device by an application, (2) associating, by the computing device, a change event with the content view, (3) detecting, by the computing device, the change event in response to an action by the additional user to change the content view, and (4) performing, by the computing device, a security action to protect the computing device from potentially malicious activity associated with the action by the additional user to change the content view. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 6, 2018
    Date of Patent: January 5, 2021
    Assignee: NORTONLIFELOCK, INC.
    Inventors: Anuradha Joshi, Pallavi Rajput, Anand Darak
  • Patent number: 10880265
    Abstract: The disclosed computer-implemented method for improving network efficiency may include (i) receiving, from a client device, and at a publicly available on-demand cloud computing platform, a network packet that indicates an origination network address of an intermediary local network gateway that forwarded the network packet rather than an actual network address of the client device, and (ii) inserting, into the network packet, and at the publicly available on-demand cloud computing platform, network address translation information indicating a path to the actual network address of the client device to enable a virtual node within the publicly available on-demand cloud computing platform to identify the client device. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: December 29, 2020
    Assignee: NORTONLIFELOCK, INC.
    Inventor: Qing Li
  • Patent number: 10877946
    Abstract: A computer system stores incident records in a database. When a user wants to resolve a particular current incident, the computer system will access the current incident record from an incident queue. The computer system also identifies historical incident records that share one or more attributes with the current incident record. The computer system creates a plurality of clusters from the current incident record and the selected historical incident records. The clusters are then arranged into a hierarchical tree. This hierarchical tree is presented in a graphical user interface. A user can select a node to access additional information for that node. The computer system generates a first suggested response to a particular current incident based on the incident records included in the selected node. The computer system presents the first suggested response to the particular current incident in a graphical user interface.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: December 29, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: David Silva, Matteo Dell'Amico, Kevin Alejandro Roundy, Michael Hart, Christopher Gates
  • Patent number: 10872133
    Abstract: Software activation using a picture-based activation key. In some embodiments, a method may include presenting, on a display of the network device, a request for a user to enter a picture-based activation key in order to activate a software application on the network device. The method may also include receiving, at the network device, the picture-based activation key that includes pictures. The method may also include confirming, at the network device, that the received picture-based activation key is a valid picture-based activation key for the software application. The method may further include, in response to confirming that the received picture-based activation key is a valid picture-based activation key for the software application, activating the software application on the network device.
    Type: Grant
    Filed: June 18, 2018
    Date of Patent: December 22, 2020
    Assignee: NORTONLIFELOCK INC.
    Inventors: Somard Kruayatidee, Jonathon Salehpour
  • Patent number: 10867035
    Abstract: The disclosed computer-implemented method for detecting malicious programmatic clicks directed to view elements displayed on touchscreens may include (1) receiving an indication of a click event directed to a view element of a user interface displayed on a touchscreen of a computing device, (2) determining that the click event was not immediately preceded by a touch event directed to the view element displayed on the touchscreen, (3) classifying, in response to determining that the click event was not immediately preceded by the touch event directed to the view element, the click event as potentially malicious, and (4) performing, in response to classifying the click event as potentially malicious, a security action that prevents performance of an operation requested by the click event. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: December 15, 2020
    Assignee: NORTONLIFELOCK, INC.
    Inventor: Sachin Chauhan
  • Patent number: 10869089
    Abstract: The disclosed computer-implemented method for preventing display of blocked content may include (i) displaying, by the computing device, content to a user, (ii) receiving, from a user, an indication to block the content, (iii) adding the content to a block list, (iv) receiving, at a later time, the content to display to the user, (v) determining the content is on the block list, and (vi) in response to determining the content is on the block list, performing a security action to prevent display of the content. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 24, 2018
    Date of Patent: December 15, 2020
    Assignee: NORTONLIFELOCK, INC.
    Inventor: Santhanakrishnan KC
  • Patent number: 10846405
    Abstract: The disclosed computer-implemented method for detecting and protecting against malicious software may include loading an untrusted application having a defined entry point into an emulated computing environment, executing a first instance of the untrusted application in the emulated computing environment beginning at the defined entry point, executing a second instance of the untrusted application beginning at a second entry point downstream from the defined entry point so as to bypass at least a portion of the untrusted application executed in the first instance, identifying the untrusted application as a potential threat based on information extracted from the second instance of the untrusted application, and performing a security action to protect against the untrusted application identified as a threat. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 19, 2018
    Date of Patent: November 24, 2020
    Assignee: NORTONLIFELOCK INC.
    Inventors: Mircea Ciubotariu, Dumitru Stama
  • Patent number: 10831883
    Abstract: Methods and systems are provided for preventing the installation of malicious applications using system-level messages. One example method generally includes intercepting a request sent via an operating system of the computing device; determining the request is to access an application in a remote application repository; obtaining information associated with the application from the request; transmitting, over a network, the information to a security server; and receiving, over the network, a security recommendation for the application from the security server.
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: November 10, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Shrikant Pawar, Sharad Subhash Mhaske, Arif Mohammed Shaikh
  • Patent number: 10819847
    Abstract: The disclosed computer-implemented method for protecting against outgoing calls to malicious phone numbers may include (1) intercepting, at a computing device, an attempt to initiate an outgoing phone call, (2) disabling, at the computing device and at least temporarily, the attempt, (3) querying a reputation server for a reputation of an outgoing phone number associated with the attempt, (4) receiving, at the computing device, reputation results from the reputation server, and (5) performing a security action comprising displaying, on a user display of the computing device and prior to enabling the attempt, at least a portion of the reputation results. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 19, 2018
    Date of Patent: October 27, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Anand Darak, Anuradha Joshi
  • Patent number: 10820205
    Abstract: The disclosed computer-implemented method for performing reputation-based identification of applications on unmanaged mobile devices may include (i) receiving screen content displayed on an unmanaged mobile device, (ii) analyzing, by a machine-learning algorithm, the screen content to identify a set of applications stored on the unmanaged mobile device, (iii) querying a reputation service for reputation data associated with each of the applications, the reputation data including a security classification describing potential threats against the unmanaged mobile device, (iv) associating the reputation data with each of the applications, and (v) generating a notification comprising a list of the applications and the associated reputation data for utilization by the unmanaged mobile device to perform one or more protective actions against the potential threats. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 27, 2019
    Date of Patent: October 27, 2020
    Assignee: NortonLifeLock, Inc.
    Inventor: Josh Opos
  • Patent number: 10820137
    Abstract: Techniques are disclosed to predict whether a current location of a mobile device corresponds to a user of that mobile device. To do so, the mobile device may evaluate information from sensors that indicate a current state of the device or device surroundings. Based on the probability, the mobile device may send the current location and the probability to a user of the mobile device, an application on the device, or another party.
    Type: Grant
    Filed: August 16, 2016
    Date of Patent: October 27, 2020
    Assignee: NortonLifeLock, Inc.
    Inventors: Keith Newstadt, Ilya Sokolov
  • Patent number: 10819707
    Abstract: The disclosed computer-implemented method for validating a user's physical location may include (i) identifying a plurality of sensor-equipped devices that are connected to a local network, wherein the local network is associated with a physical location, (ii) receiving a request to validate that a user is present at the physical location that is associated with the local network, (iii) instructing, in response to receiving the request, the user to interact with at least one sensor-equipped device in the plurality of sensor-equipped devices, (iv) confirming, based on observing a response of the sensor-equipped device, that the user has interacted with the at least one sensor-equipped device, and (v) validating, in response to confirming that the user has interacted with the at least one sensor-equipped device, that the user is present at the physical location. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: October 27, 2020
    Assignee: NortonLifeLock, Inc.
    Inventors: Ilya Sokolov, Keith Newstadt
  • Patent number: 10812981
    Abstract: The disclosed computer-implemented method for certifying geolocation coordinates of computing devices may include (i) receiving, from a client computing device, a set of geolocation coordinates that purport to identify the physical location of the client computing device, (ii) identifying, in response to receiving the geolocation coordinates, at least one cooperating geolocation device that is within physical proximity to the geolocation coordinates provided by the client computing device, (iii) performing a proximity validation check that demonstrates that the client computing device is within physical proximity to the cooperating geolocation device, and (iv) certifying, based on the proximity validation check, the geolocation coordinates as valid geolocation coordinates. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: October 20, 2020
    Assignee: NortonLifeLock, Inc.
    Inventors: Ilya Sokolov, Keith Newstadt
  • Patent number: 10810088
    Abstract: A system and method of dynamic backup policy generation based upon a user's behavior is provided. The method may include detecting a user's usage pattern of files within a computing system based upon the user's backup or restore activities. In some embodiments, the backup system may identify the files that have been modified and calculate the percentage of modification away from a predetermined baseline or another previously stored version. The system may generate a list of the identified files along with these percentages to form the user's usage pattern. The method may further include generating a user's profile including files having high access rates in accordance with this usage pattern and adjusting a backup policy based upon the user's profile such that these files are backed-up more frequently. The backup policy may also be adjusted based upon a detected level of risk associated with the user.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: October 20, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Lei Gu, Ilya Sokolov
  • Patent number: 10810089
    Abstract: Backup metrics are received from multiple endpoints. Backup baselines are established, based on backup metrics received over a period of time. Each established backup baseline specifies an empirically determined baseline level of backup activity according to specific criteria. Changes in backup behavior are detected, as measured against established backup baselines, based on analyzing received backup metrics. Such changes can be detected by applying a non-supervised machine learning technique to backup metrics. Detected backup behavior changes that meet a corresponding threshold are further analyzed to determine whether to alter corresponding backup activity in response. Backup activity on endpoints can be modified, in response to the analysis. This can take the form of omitting specific files or folders from corresponding backups, or changing default backup configuration(s). For example, a new or modified default backup configuration can be transmitted to one or more endpoints.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: October 20, 2020
    Assignee: NORTONLIFELOCK INC.
    Inventors: Lei Gu, Ilya Sokolov