Patents by Inventor Brian James Buck

Brian James Buck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9350693
    Abstract: A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross notification component is at least configured to transmit notices to other devices, and to receive responses to its notice transmissions. In some devices, the cross notification component is at least configured to receive the notices transmitted by other devices, and to generate and transmit responses to received notices.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: May 24, 2016
    Assignee: LOOKOUT, INC.
    Inventors: Brian James Buck, David Luke Richardson
  • Publication number: 20160099963
    Abstract: Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Application
    Filed: December 17, 2015
    Publication date: April 7, 2016
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Patent number: 9305150
    Abstract: Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the method includes identifying alternative characters for at least one character of the entered password based on a location of a key corresponding to the character of the entered password on a keyboard used to enter the password. When the alternative characters are identified, a variation of the entered password is generated by replacing a character of the entered password with an alternative character of the character. When information relating to the variation matches information relating to the defined password, the entered password is determined to be valid.
    Type: Grant
    Filed: December 10, 2012
    Date of Patent: April 5, 2016
    Assignee: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Patent number: 9298916
    Abstract: A system and method for using file system events to trigger a security scan. A file system watches all writable directory paths for defined file system events on files in the watched paths. Upon occurrence of a watched event, the file is scanned using known security methods. A data structure stores events and can be used to update and track events. Cookies can be used to correlate MOVE events. A timer can be used to avoid repetitive scanning after discrete WRITE events.
    Type: Grant
    Filed: December 10, 2012
    Date of Patent: March 29, 2016
    Assignee: LOOKOUT, INC.
    Inventors: Matthew Quigley, David Kincade, Brian James Buck, Timothy Micheal Wyatt
  • Publication number: 20160066189
    Abstract: A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.
    Type: Application
    Filed: November 10, 2015
    Publication date: March 3, 2016
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal, Cherry Mangat, Brian James Buck, William Robinson
  • Patent number: 9210561
    Abstract: Security is enhanced for a user of a mobile communications device by providing a method for managing an emergency event includes detecting, by a mobile communication device having a GUI for displaying information to a user, an indication that an emergency event is occurring. Once the emergency event is detected, a plurality of event options is displayed on the GUI to a responding user who is not an owner of the mobile communication device. Each event option is associated with at least one instruction relating to an emergency action and/or response. When an indication selecting a first event option is received, the mobile communication device executes the instruction(s) associated with the first event option.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: December 8, 2015
    Assignee: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Patent number: 9208215
    Abstract: Data regarding user actions on a user device is gathered from the user device (and/or from another computing device) by a server. The data is analyzed to make a decision. The decision is sent by the server to the user device (e.g., directly or via another computing device) and then used by the user device to implement a new action on the user device. This process may be automatically repeated in order to provide real-time customization of the user device.
    Type: Grant
    Filed: December 27, 2012
    Date of Patent: December 8, 2015
    Assignee: Lookout, Inc.
    Inventors: Kevin Mahaffey, Brian James Buck, Thomson Van Nguyen
  • Patent number: 9210559
    Abstract: Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, information indicating that an electronic communication received at a mobile communications device of each user in the crowd should belong in a specific category is received from a crowd. If a number of users in the crowd exceeds a threshold value, information identifying the electronic communication is stored in a database as belonging in the specific category. The database is provided to a mobile communications device of a user, where when the electronic communication is transmitted to the mobile communications device of the user, the electronic communication is blocked at the mobile communications device of the user because the electronic communication is in the specific category.
    Type: Grant
    Filed: August 8, 2014
    Date of Patent: December 8, 2015
    Assignee: LOOKOUT, INC.
    Inventors: Stephen J. Edwards, Ankur Bharatbhushan Nandwani, Rohan Nagarakere Ramakrishna, Brian James Buck, Kesava Abhinav Yerra
  • Publication number: 20150302073
    Abstract: A user of electronic devices is provided with a method for providing a compatible version of an application to an electronic device. According to an embodiment, a compatible version of an application in a source electronic device can be installed by a target electronic device. When an application is selected, the source device collects cloning data associated with the selected application. Once the cloning data is collected, the source device transmits the cloning data, at least a portion of which is received by the target electronic device. The target electronic device then utilizes the portion of the cloning data to install a compatible version of the application onto the target electronic device.
    Type: Application
    Filed: June 29, 2015
    Publication date: October 22, 2015
    Inventor: Brian James BUCK
  • Patent number: 9094405
    Abstract: A method for providing a bit string on at least two electronic devices is provided. A sensor input is received by sensors in the electronic devices and recorded by the electronic devices. Data points are generated from the sensor input by each of the electronic devices. Each device samples its generated data points at a sampling frequency. A bit string is then generated by each device based on the sampled data points. The bit string of each device substantially matches one another, thereby allowing the electronic devices to share a secret, which may be used to allow secure communications between the at least two electronic devices.
    Type: Grant
    Filed: June 13, 2014
    Date of Patent: July 28, 2015
    Assignee: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Publication number: 20150188949
    Abstract: A method for managing the use of gateways on a network includes authenticating a user, determining and managing a path between a user computing device and a destination computing device, the path including at least one of the gateways, and managing user traffic on the path according to a policy associated with the user.
    Type: Application
    Filed: December 30, 2014
    Publication date: July 2, 2015
    Inventors: Kevin Patrick Mahaffey, John Gunther Hering, Brian James Buck
  • Patent number: 9071627
    Abstract: Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an application in a source electronic device can be cloned from the source electronic device to a target electronic device. According to an embodiment, when the application is selected, the source device can be configured to automatically collect the selected application and configuration information, state information and/or application data associated with the selected application. The collected information is referred to as “cloning data.” Once the cloning data is collected, the source device can be configured to transmit at least a portion of the cloning data to the target electronic device, which can utilize the cloning data to clone the application into the target electronic device.
    Type: Grant
    Filed: December 3, 2012
    Date of Patent: June 30, 2015
    Assignee: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Publication number: 20150169877
    Abstract: Software applications to be installed on user devices are monitored. Authenticity of the applications is evaluated using a plurality of inputs to provide a result. The plurality of inputs may include trust factors. The trust factors may be used to generate a security evaluation. In response to the result, an action is performed such as providing a notification to a developer of a fraudulent version of an application or providing a security assessment for an application.
    Type: Application
    Filed: June 10, 2014
    Publication date: June 18, 2015
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
  • Publication number: 20150172146
    Abstract: An identification of software assets and a defined manner of usage for the software assets are received over a network. Software applications previously or currently being installed on a plurality of user devices are monitored. From this monitoring, at least one of the software assets that is being used in one or more of the applications inconsistently with the defined manner of usage is identified. A report is sent over the network to a developer regarding the inconsistent usage determined from the monitoring.
    Type: Application
    Filed: April 15, 2014
    Publication date: June 18, 2015
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
  • Publication number: 20150172057
    Abstract: Authenticity of a new application being installed on a mobile device is evaluated to provide a result. The evaluation uses a plurality of inputs. In response to the result, an action is performed (e.g., on the mobile device itself and/or a server performing or assisting with the evaluation). For example, the evaluating may be done for an application that a user of the mobile device desires to install from an application marketplace. In another example, the action is sending of a notification to the mobile device, and the notification includes an assessment of authenticity of the new application.
    Type: Application
    Filed: December 13, 2013
    Publication date: June 18, 2015
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
  • Publication number: 20150172060
    Abstract: Software applications previously or currently being installed on a plurality of user devices are monitored. In one embodiment, a first set of the installed applications that is signed with a signing identifier of a developer are identified. A report is then sent to the developer that includes an identification of the first set. In another embodiment, the authenticity of a first application is evaluated including determining, based on a respective signing identifier for each of a plurality of applications, that the applications are similar to the first application. A notification is sent to the developer that identifies applications having a signing identifier that is different from the signing identifier of the developer.
    Type: Application
    Filed: April 15, 2014
    Publication date: June 18, 2015
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia, Brian James Buck
  • Publication number: 20150163121
    Abstract: Data is collected from a set of devices. The data is associated with the devices, mobile application programs (apps), web applications, users, or combinations of these. A norm is established using the collected data. The norm is compared with data collected from a particular device. If there is a deviation outside of a threshold deviation between the norm and the data collected from the particular device, a response is initiated.
    Type: Application
    Filed: December 6, 2013
    Publication date: June 11, 2015
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Brian James Buck, John Gunther Hering, Amit Gupta, Alex Cameron Abey
  • Patent number: D735215
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: July 28, 2015
    Assignee: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Patent number: D735238
    Type: Grant
    Filed: December 26, 2012
    Date of Patent: July 28, 2015
    Assignee: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Patent number: D738886
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: September 15, 2015
    Assignee: LOOKOUT, INC.
    Inventor: Brian James Buck