Patents by Inventor Brian James Buck

Brian James Buck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8774338
    Abstract: A method for providing a bit string on at least two electronic devices is provided. A sensor input is received by sensors in the electronic devices and recorded by the electronic devices. Sensor profiles corresponding to the sensor input are generated by each of the electronic devices. Each sensor profile includes data points, at least one of which is associated with a peak amplitude and at least one of which is associated with a valley amplitude. Each device determines a respective sampling frequency based on a time interval between a data point associated with a zero amplitude and either a nearest data point associated with a peak amplitude or a nearest data point associated with a valley amplitude. Each device then generates a bit string based on sampled data points identified using the determined sampling frequency.
    Type: Grant
    Filed: February 13, 2013
    Date of Patent: July 8, 2014
    Assignee: Lookout, Inc.
    Inventor: Brian James Buck
  • Publication number: 20140188886
    Abstract: Data regarding user actions on a user device is gathered from the user device (and/or from another computing device) by a server. The data is analyzed to make a decision. The decision is sent by the server to the user device (e.g., directly or via another computing device) and then used by the user device to implement a new action on the user device. This process may be automatically repeated in order to provide real-time customization of the user device.
    Type: Application
    Filed: December 27, 2012
    Publication date: July 3, 2014
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Mahaffey, Brian James Buck, Thomson Van Nguyen
  • Publication number: 20140189808
    Abstract: Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a network resource through an authentication platform that issues a challenge in response to the request requiring authentication of the user identity through a reply from the client computer, determining one or more items of context information related to at least one of the user, the request, and the client computer, and determining a disposition of the request based on the reply and the one or more items of context information. The reply includes a user password and may be provided by an authorizing client device coupled to the client computer over a wireless communications link.
    Type: Application
    Filed: March 15, 2013
    Publication date: July 3, 2014
    Applicant: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, David Luke Richardson, Ariel Salomon, R. Tyler Croy, Samuel Alexander Walker, Brian James Buck, Sergio Ivan Marcin Gorrino, David Golombek
  • Publication number: 20140187202
    Abstract: A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden ROM that configures a security component to work separate and apart from the OS. A secondary transceiver is configured with the security component to send and receive security transmissions, also separate and apart from the OS and the primary transceiver of the OS. Logic to detect specified trigger events is hard-coded into the hidden ROM, and detection of such an event places the mobile communications device into a special security mode. While in the special security mode, the secondary transceiver can send and receive security messages, including the location of the mobile communications device. Further, depending upon the received messages or commands, the security component can take pre-programmed security actions, such as erasing or faking data in the device.
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Applicant: Lookout, Inc.
    Inventors: Brian James Buck, Jinggang Wang
  • Publication number: 20140181721
    Abstract: A graphical user interface for improved text character entry is disclosed. In some embodiments, the graphical user interface may be displayed on a mobile communications device. The graphical user interface may display a message field, a soft keyboard, and at least one visual foveal echo field. The message field may display text characters of a message being authored by a user interacting with the soft keyboard. The visual foveal echo field may be placed adjacent to a soft keyboard row and contain a portion of the message being authored by the user.
    Type: Application
    Filed: March 4, 2013
    Publication date: June 26, 2014
    Applicant: LOOKOUT, INC.
    Inventor: Brian James Buck
  • Publication number: 20140172140
    Abstract: A method and apparatus for providing cross device sharing of audio content. Computing devices are configured with an audio sharing component, and the audio sharing components of multiple computing devices are connected through a communications link thus forming a virtual audio channel. One computing device is selected as the destination receiver device, and the other computing devices are source devices for generating audio content. The audio sharing component of the source devices transmits audio content onto the virtual channel, where it is received by the selected destination device.
    Type: Application
    Filed: December 31, 2012
    Publication date: June 19, 2014
    Applicant: Lookout Inc.
    Inventor: Brian James Buck
  • Publication number: 20140173026
    Abstract: A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross notification component is at least configured to transmit notices to other devices, and to receive responses to its notice transmissions. In some devices, the cross notification component is at least configured to receive the notices transmitted by other devices, and to generate and transmit responses to received notices.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 19, 2014
    Applicant: Lookout, Inc.
    Inventors: Brian James Buck, David Luke Richardson
  • Publication number: 20140165169
    Abstract: Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the method includes identifying alternative characters for at least one character of the entered password based on a location of a key corresponding to the character of the entered password on a keyboard used to enter the password. When the alternative characters are identified, a variation of the entered password is generated by replacing a character of the entered password with an alternative character of the character. When information relating to the variation matches information relating to the defined password, the entered password is determined to be valid.
    Type: Application
    Filed: December 10, 2012
    Publication date: June 12, 2014
    Applicant: Lookout, Inc.
    Inventor: Brian James Buck
  • Publication number: 20140156784
    Abstract: Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an application in a source electronic device can be cloned from the source electronic device to a target electronic device. According to an embodiment, when the application is selected, the source device can be configured to automatically collect the selected application and configuration information, state information and/or application data associated with the selected application. The collected information is referred to as “cloning data.” Once the cloning data is collected, the source device can be configured to transmit at least a portion of the cloning data to the target electronic device, which can utilize the cloning data to clone the application into the target electronic device.
    Type: Application
    Filed: December 3, 2012
    Publication date: June 5, 2014
    Applicant: Lookout, Inc.
    Inventor: Brian James Buck
  • Publication number: 20140148120
    Abstract: Security is enhanced for a user of a mobile communications device by providing a method for managing an emergency event includes detecting, by a mobile communication device having a GUI for displaying information to a user, an indication that an emergency event is occurring. Once the emergency event is detected, a plurality of event options is displayed on the GUI to a responding user who is not an owner of the mobile communication device. Each event option is associated with at least one instruction relating to an emergency action and/or response. When an indication selecting a first event option is received, the mobile communication device executes the instruction(s) associated with the first event option.
    Type: Application
    Filed: November 28, 2012
    Publication date: May 29, 2014
    Inventor: Brian James Buck
  • Publication number: 20140128021
    Abstract: User activity on a mobile device is monitored and collected, and a resource usage model is constructed. The resource usage model describes a set of contexts in which the mobile device, and is the basis for determining a first exhaustion point for a resource. Based on the monitored activity, a prediction of a second exhaustion point for the resource time is made. If the second exhaustion point is prior to the first exhaustion point, usage of the resource is reduced.
    Type: Application
    Filed: November 27, 2013
    Publication date: May 8, 2014
    Applicant: Lookout, Inc.
    Inventors: Samuel Alexander WALKER, Ayan Kanti Mandal, Devesh Senapati, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck
  • Publication number: 20140128047
    Abstract: Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, an electronic communication identified by a phone number is intercepted at a mobile communications device before the electronic communication is received by an application program on the device. The phone number is sent to a server for the server to identify a category associated with the phone number. The category is received at the mobile communication device. Based on the received category, a determination is made as to whether the application program should be allowed to receive the electronic communication. If allowed, the electronic communication is forwarded to the application program; else, the electronic communication is not forwarded.
    Type: Application
    Filed: December 4, 2012
    Publication date: May 8, 2014
    Applicant: Lookout, Inc.
    Inventors: Stephen J. Edwards, Ankur Bharatbhushan Nandwani, Rohan Nagarakere Ramakrishna, Brian James Buck, Kesava Abhinav Yerra
  • Publication number: 20140120961
    Abstract: Systems and methods are provided for secure composition of security messages. A text message template may be displayed on a display of a mobile communications device. The text message template may include a first text field associated with a semantic category representing a plurality of items identified based on their meaning. At least one button associated with the semantic category may be presented on the display of the mobile communications device. An input may be received at the at least one button from a user of the mobile communications device. At least some of the plurality of items belonging to the semantic category associated with the first text field may be presented on the display of the mobile communications device. A selection of an item of the plurality of items may be received. The selected item may be presented in the first text field of the text message template.
    Type: Application
    Filed: December 28, 2012
    Publication date: May 1, 2014
    Applicant: LOOKOUT, INC.
    Inventor: Brian James BUCK
  • Publication number: 20140075365
    Abstract: Security is enhanced for a user of an electronic device by providing a method for visually monitoring the progress of a security operation on an electronic device that provides a plurality of objects including at least one of an application, a document, a file, an image, and a record. When a security operation is launched for at least some of the plurality of objects, an operation window is displayed on the electronic device's display screen. The operation window includes a first operation icon corresponding to a first object on which the security operation is currently being performed. The first operation icon includes a thumbnail icon representing the first object and an operation completion indicator that visually indicates a completion level of the security operation currently being performed on the first object.
    Type: Application
    Filed: December 14, 2012
    Publication date: March 13, 2014
    Applicant: Lookout, Inc.
    Inventors: Sophie Yuan Xie, David Luke Richardson, Ayan Kanti Mandal, Christopher Michael Jones, John Gunther Hering, Kevin Patrick Mahaffey, Brian James Buck
  • Patent number: 8655307
    Abstract: Security is enhanced for a user of a mobile device by monitoring and controlling resource usage. Usage information associated with a mobile device is collected. The collected information is used to build a usage model for a user of the mobile device that describes a set of contexts in which the mobile device is used. User activity on the device is monitored and the model is consulted to determine a first time after which it will be acceptable for a battery of the mobile device to fall below a threshold charge level. Based on the monitored activity, a prediction of a second time is made for when the battery will fall below the threshold charge level. If the second time is before or a predetermined amount of time before the first time, usage of the battery is reduced, else, usage of the battery is not reduced.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: February 18, 2014
    Assignee: Lookout, Inc.
    Inventors: Samuel Alexander Walker, Ayan Kanti Mandal, Devesh Senapati, Kevin Patrick Mahaffey, David Luke Richardson, Brian James Buck
  • Publication number: 20130237204
    Abstract: Systems and methods for uploading location information based on device movement are disclosed. In some embodiments, location information may be received or determined by a mobile communications device. The location information may be associated with a physical location of the mobile communications device. A rate of movement of the mobile communications device may be identified. In some embodiments, the location information may be transmitted or uploaded from the mobile communications device to a server. The frequency of the transmitting or uploading of the location information may be based on the rate of movement of the mobile communications device.
    Type: Application
    Filed: April 15, 2013
    Publication date: September 12, 2013
    Applicant: Lookout, Inc.
    Inventors: Brian James Buck, Kevin Patrick Mahaffey