Patents by Inventor Bruce Wootton

Bruce Wootton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11747806
    Abstract: A method in accordance with the invention controls movements of an actor, such as an autonomous vehicle. The method includes collecting one or more data sets of location information from sources that include a first actor, a second actor, and a fixed agent. Each data set indicates a current location of an object from one or more objects. The method also includes merging the data sets to generate a second set of current location information of the one or more objects, filtering the second set of current location information to remove location information of static objects to generate a subset of the current locations corresponding to a subset of the objects, using the subset of current locations to predict future locations of the subset of objects, and coordinating the movement of the first actor based on the predicted future locations to optimize one or more pre-determined criteria.
    Type: Grant
    Filed: May 23, 2019
    Date of Patent: September 5, 2023
    Assignee: AV-Connect, Inc.
    Inventors: Bruce Wootton, Pravin Varaiya, Jacopo Guanetti
  • Patent number: 10509911
    Abstract: Methods and systems are provided for conditionally granting access to service levels based on a determined security state of the device requesting access. A software component, upon receiving a request for access to a provider having a plurality of service levels, determines the current security state of the requesting device. The software component compares that security state to a policy associated with the provider. The software component then allows the requesting device access to the provider services where the device's current security state meets or exceeds the security state required for the service.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: December 17, 2019
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Michael Wyatt, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, David Luke Richardson, Bruce Wootton, John G. Hering, Jonathan Pantera Grubb, Brian James Buck, William Robinson
  • Publication number: 20190311134
    Abstract: A software component, upon receiving a request for access to a provider having a plurality of service levels, determines the current security state of the requesting device. The security state of the requesting device varies according to severity levels of device security events. The software component compares that security state to a policy associated with the provider. The software component then allows the requesting device access to the provider services where the device's current security state meets or exceeds the security state required for the service.
    Type: Application
    Filed: June 17, 2019
    Publication date: October 10, 2019
    Inventors: Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Micheal Wyatt, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, David Luke Richardson, Bruce Wootton, John G. Hering, Jonathan Pantera Grubb, Brian James Buck, William Robinson
  • Publication number: 20190303586
    Abstract: Methods and systems are provided for conditionally granting access to service levels based on a determined security state of the device requesting access. A software component, upon receiving a request for access to a provider having a plurality of service levels, determines the current security state of the requesting device. The software component compares that security state to a policy associated with the provider. The software component then allows the requesting device access to the provider services where the device's current security state meets or exceeds the security state required for the service.
    Type: Application
    Filed: June 17, 2019
    Publication date: October 3, 2019
    Inventors: Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Michael Wyatt, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, David Luke Richardson, Bruce Wootton, John G. Hering, Jonathan Pantera Grubb, Brian James Buck, William Robinson
  • Patent number: 10417432
    Abstract: Methods and systems are provided for sharing information and improving the functioning of devices by blocking potentially harmful communications. In the methods and systems disclosed, a security component on an electronic device may receive a policy. The security component may also receive, from a local device proxy on the electronic device, information pertaining to a communication. The security component may compare the information pertaining to the communication to the policy. The comparison may result in a determination that the communication is potentially harmful. The security component may then instruct the local device proxy to block the communication from proceeding past the local device proxy.
    Type: Grant
    Filed: June 5, 2018
    Date of Patent: September 17, 2019
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Publication number: 20180293389
    Abstract: Methods and systems are provided for sharing information and improving the functioning of devices by blocking potentially harmful communications. In the methods and systems disclosed, a security component on an electronic device may receive a policy. The security component may also receive, from a local device proxy on the electronic device, information pertaining to a communication. The security component may compare the information pertaining to the communication to the policy. The comparison may result in a determination that the communication is potentially harmful. The security component may then instruct the local device proxy to block the communication from proceeding past the local device proxy.
    Type: Application
    Filed: June 5, 2018
    Publication date: October 11, 2018
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Patent number: 9781148
    Abstract: Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: October 3, 2017
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Patent number: 9779253
    Abstract: Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: October 3, 2017
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Publication number: 20170103215
    Abstract: Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Application
    Filed: December 28, 2016
    Publication date: April 13, 2017
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Publication number: 20160099963
    Abstract: Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
    Type: Application
    Filed: December 17, 2015
    Publication date: April 7, 2016
    Inventors: Kevin Patrick Mahaffey, Brian James Buck, William Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt, David Golombek, David Luke Richardson, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, Ariel Salomon, Jonathan Pantera Grubb, Bruce Wootton, Timothy Strazzere, Yogesh Swami
  • Patent number: 9235704
    Abstract: Application programs for mobile communication devices are stored in a data store. The applications may be collected from any number of different sources such as through an application programming interface (API), from web crawling, from users, or combinations of these. The applications are analyzed and the analysis results reported. The applications may be “continuously” analyzed so that any changes in assessments can be reported. If an application for which an analysis is sought is not in the data store, information about a different, but related application may be provided.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: January 12, 2016
    Assignee: LOOKOUT, INC.
    Inventors: Bruce Wootton, Kevin Patrick Mahaffey, Timothy Micheal Wyatt
  • Patent number: 8863304
    Abstract: A method and apparatus for remediating backup data to control access to sensitive data is described. In one embodiment, the method for facilitating sensitive data remediation from backup images without a separate data store includes examining the backup images to identify sensitive data and modifying remediation information associated with the sensitive data, wherein the remediation information restricts access to the sensitive data to at least one corresponding access group.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: October 14, 2014
    Assignee: Symantec Corporation
    Inventors: Kuldeep Sureshrao Nagarkar, Gaurav Malhotra, Thomas G. Clifford, Bruce Wootton, Aleksey Tsibulya
  • Patent number: 8695090
    Abstract: A method and apparatus for classifying behavior of an application based on its data access pattern is described. In one embodiment, the method includes monitoring file access events associated with an application, and determining whether at least one of the file access events indicates the application's attempt to manipulate data of a file. If at least one file access event indicates the application's attempt to manipulate the data within the file, then at least one action is caused to be performed.
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: April 8, 2014
    Assignee: Symantec Corporation
    Inventors: Ian Barile, Bruce Wootton, Dirk Kessler, Rajesh Upadhyay
  • Publication number: 20120110174
    Abstract: Application programs for mobile communication devices are stored in a data store. The applications may be collected from any number of different sources such as through an application programming interface (API), from web crawling, from users, or combinations of these. The applications are analyzed and the analysis results reported. The applications may be “continuously” analyzed so that any changes in assessments can be reported. If an application for which an analysis is sought is not in the data store, information about a different, but related application may be provided.
    Type: Application
    Filed: December 22, 2011
    Publication date: May 3, 2012
    Applicant: Lookout, Inc.
    Inventors: Bruce Wootton, Kevin Patrick Mahaffey, Timothy Micheal Wyatt
  • Patent number: 8060596
    Abstract: A computer-implemented method for normalizing data-loss-prevention categorization information, at least a portion of the method being performed by a computing system comprising at least one processor, may identify a data object at a first time. The method may apply a first version of a set of data-loss-prevention rules to the data object to determine a set of categorizations of the data object. The method may distinguish a set of content-based categorizations in the set of categorizations from a set of context-based categorizations in the set of categorizations. The method may apply, based on the set of categorizations, a first data-loss-prevention policy to the data object. The method may identify the data object at a second time, and apply, based on the set of content-based categorizations, a second data-loss-prevention policy to the data object. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: November 15, 2011
    Assignee: Symantec Corporation
    Inventors: Bruce Wootton, Richard Dandliker, Aleksey Tsibulya, Oskar Bruening, Dirk Kessler
  • Publication number: 20100115614
    Abstract: A method and apparatus for classifying behavior of an application based on its data access pattern is described. In one embodiment, the method includes monitoring file access events associated with an application, and determining whether at least one of the file access events indicates the application's attempt to manipulate data of a file. If at least one file access event indicates the application's attempt to manipulate the data within the file, then at least one action is caused to be performed.
    Type: Application
    Filed: October 31, 2008
    Publication date: May 6, 2010
    Inventors: Ian Barile, Bruce Wootton, Dirk Kessler, Rajesh Upadhyay