Patents by Inventor Kevin Mahaffey
Kevin Mahaffey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10489862Abstract: Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device.Type: GrantFiled: May 18, 2015Date of Patent: November 26, 2019Assignee: LOOKOUT, INC.Inventors: John Gunther Hering, Kevin Mahaffey, Brian James Buck, William Neil Robinson
-
Patent number: 10165083Abstract: A software application is automatically launched on a first computing device. The launch of the application is a first execution of the application by the first computing device. In response to this launching, the application executes to automatically obtain data from the first computing device. The data is sent to a second computing device that is configured to provide a service to the first computing device (e.g., based on the data).Type: GrantFiled: February 22, 2016Date of Patent: December 25, 2018Assignee: LOOKOUT, INC.Inventors: David Richardson, Kevin Mahaffey, Jonathan Grubb
-
Publication number: 20160343083Abstract: Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device.Type: ApplicationFiled: May 18, 2015Publication date: November 24, 2016Inventors: John Gunther Hering, Kevin Mahaffey, Brian James Buck, William Neil Robinson
-
Patent number: 9407443Abstract: Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks.Type: GrantFiled: December 3, 2012Date of Patent: August 2, 2016Assignee: Lookout, Inc.Inventors: Timothy Micheal Wyatt, Kevin Mahaffey, Derek Joseph Halliday
-
Publication number: 20160173647Abstract: A software application is automatically launched on a first computing device. The launch of the application is a first execution of the application by the first computing device. In response to this launching, the application executes to automatically obtain data from the first computing device. The data is sent to a second computing device that is configured to provide a service to the first computing device (e.g., based on the data).Type: ApplicationFiled: February 22, 2016Publication date: June 16, 2016Inventors: David Richardson, Kevin Mahaffey, Jonathan Grubb
-
Patent number: 9307412Abstract: A method for evaluating security during an interactive service operation by a mobile communications device includes launching, by a mobile communications device, an interactive service configured to access a server over a network during an interactive service operation, and generating a security evaluation based on a plurality of trust factors related to a current state of the mobile communications device, to a security feature of the application, and/or to a security feature of the network. When the security evaluation is generated, an action is performed based on the security evaluation.Type: GrantFiled: November 5, 2013Date of Patent: April 5, 2016Assignee: LOOKOUT, INC.Inventors: Derek Halliday, Bruno Bergher, Kevin Mahaffey, Brian Buck, Abheek Gupta
-
Patent number: 9288608Abstract: Mobile devices often communicate with network services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to automatically create an account associating a mobile device to a network service after a new application is installed on the mobile device. In an embodiment, a new application is remotely installed on a mobile device. After the installation, the device monitors itself for an occurrence of an event. In response to detecting the occurrence, the device launches the new application. After the launch, the new application automatically obtains data from the mobile device, and then sends the data to a server that automatically creates an account for the user. The server also provides a service associated with the account.Type: GrantFiled: November 25, 2014Date of Patent: March 15, 2016Assignee: Lookout, Inc.Inventors: David Richardson, Kevin Mahaffey, Jonathan Grubb
-
Patent number: 9245119Abstract: Systems and methods disclosed herein provide a security component on a server that may be in communication with a database containing mobile device security information. The server security component may receive event information regarding a mobile device from a local security component on the mobile device. The event information may be processed by the server to assess the security state of the mobile device by comparing the event information to the mobile device security information. Based on the processing, an assessment of the security state of the mobile device may be output by the server for display.Type: GrantFiled: August 29, 2014Date of Patent: January 26, 2016Assignee: LOOKOUT, INC.Inventors: Kevin Mahaffey, John G. Hering, James Burgess
-
Patent number: 9215074Abstract: Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks.Type: GrantFiled: March 5, 2013Date of Patent: December 15, 2015Assignee: Lookout, Inc.Inventors: Timothy Micheal Wyatt, Kevin Mahaffey, Derek Joseph Halliday, David Richardson
-
Patent number: 9208215Abstract: Data regarding user actions on a user device is gathered from the user device (and/or from another computing device) by a server. The data is analyzed to make a decision. The decision is sent by the server to the user device (e.g., directly or via another computing device) and then used by the user device to implement a new action on the user device. This process may be automatically repeated in order to provide real-time customization of the user device.Type: GrantFiled: December 27, 2012Date of Patent: December 8, 2015Assignee: Lookout, Inc.Inventors: Kevin Mahaffey, Brian James Buck, Thomson Van Nguyen
-
Patent number: 9065846Abstract: A security analysis of data received on a mobile communications device includes gathering information about the data through at least two of multiple network interfaces, each of the at least two network interfaces having different protocols. Based upon the gathering, a first protocol is assigned to the data received from a first of the at least two network interfaces. A second protocol is assigned to the data received from a second of the at least two network interfaces. A common security analysis is performed on at least a part of the data received from each of the first and second network interfaces to determine whether the data received by the mobile communications device is safe or malicious.Type: GrantFiled: June 17, 2013Date of Patent: June 23, 2015Assignee: LOOKOUT, INC.Inventor: Kevin Mahaffey
-
Publication number: 20150087270Abstract: Mobile devices often communicate with network services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to automatically create an account associating a mobile device to a network service after a new application is installed on the mobile device. In an embodiment, a new application is remotely installed on a mobile device. After the installation, the device monitors itself for an occurrence of an event. In response to detecting the occurrence, the device launches the new application. After the launch, the new application automatically obtains data from the mobile device, and then sends the data to a server that automatically creates an account for the user. The server also provides a service associated with the account.Type: ApplicationFiled: November 25, 2014Publication date: March 26, 2015Inventors: David Richardson, Kevin Mahaffey, Jonathan Grubb
-
Patent number: 8938810Abstract: Mobile devices may often communicate with network (“cloud”) services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to create an account associating a mobile device to a network service without requiring a user to explicitly enter authentication information, such as a username and password. In an embodiment, data corresponding to a mobile device is obtained to generate authentication information which is then sent to messaging address of a user. In another embodiment, in response to an event, a mobile device obtains an identifier for a user, sends the identifier to a server, where the server transmits one set of authentication information to a messaging address associated with the user and another set of authentication information to the device.Type: GrantFiled: February 23, 2012Date of Patent: January 20, 2015Assignee: Lookout, Inc.Inventors: David Richardson, Kevin Mahaffey, Jonathan Grubb
-
Publication number: 20140373162Abstract: Systems and methods disclosed herein provide a security component on a server that may be in communication with a database containing mobile device security information. The server security component may receive event information regarding a mobile device from a local security component on the mobile device. The event information may be processed by the server to assess the security state of the mobile device by comparing the event information to the mobile device security information. Based on the processing, an assessment of the security state of the mobile device may be output by the server for display.Type: ApplicationFiled: August 29, 2014Publication date: December 18, 2014Inventors: Kevin Mahaffey, John G. Hering, James Burgess
-
Publication number: 20140325586Abstract: A method for evaluating security during an interactive service operation by a mobile communications device includes launching, by a mobile communications device, an interactive service configured to access a server over a network during an interactive service operation, and generating a security evaluation based on a plurality of trust factors related to a current state of the mobile communications device, to a security feature of the application, and/or to a security feature of the network. When the security evaluation is generated, an action is performed based on the security evaluation.Type: ApplicationFiled: November 5, 2013Publication date: October 30, 2014Applicant: LOOKOUT, INC.Inventors: Derek Halliday, Bruno Bergher, Kevin Mahaffey, Brian Buck, Abheek Gupta
-
Patent number: 8855601Abstract: Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Techniques are provided for determining when an audio transmission should be established between a device and one or more clients, and sending a command to initiate the audio transmission. The determination may be based on receiving a request from a client, detecting at a server that the device is lost or stolen, or detecting at the device that the device is missing. The audio transmission may be established without user intervention at the device or in response to user action at the portable electronic device. Device settings such as audio settings at the device may be overridden in connection with the audio transmission.Type: GrantFiled: March 2, 2012Date of Patent: October 7, 2014Assignee: Lookout, Inc.Inventors: Vance Grkov, David Richardson, Ayan Mandal, Cherry Mangat, Kevin Mahaffey
-
Patent number: RE46768Abstract: The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the mobile communication device, such as its operating system, firmware version, or software configuration, is transmitted to a server for assessment. The server accesses a data storage storing information about vulnerabilities. Based on the received information, the server may identify those vulnerabilities affecting the mobile communication device, and may transmit a notification to remediate those vulnerabilities. The server may also transmit result information about the vulnerabilities affecting the mobile communication device. The server may also store the received information about the device, so that in the event the server learns of new vulnerabilities, it may continue to assess whether the device is affected, and may accordingly notify or remediate the device.Type: GrantFiled: December 17, 2013Date of Patent: March 27, 2018Assignee: LOOKOUT, INC.Inventors: John G. Hering, Kevin Mahaffey, James Burgess
-
Patent number: RE47757Abstract: The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the mobile communication device, such as its operating system, firmware version, or software configuration, is transmitted to a server for assessment. The server accesses a data storage storing information about vulnerabilities. Based on the received information, the server may identify those vulnerabilities affecting the mobile communication device, and may transmit a notification to remediate those vulnerabilities. The server may also transmit result information about the vulnerabilities affecting the mobile communication device. The server may also store the received information about the device, so that in the event the server learns of new vulnerabilities, it may continue to assess whether the device is affected, and may accordingly notify or remediate the device.Type: GrantFiled: February 15, 2018Date of Patent: December 3, 2019Assignee: LOOKOUT, INC.Inventors: John G. Hering, Kevin Mahaffey, James Burgess
-
Patent number: RE48669Abstract: The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the mobile communication device, such as its operating system, firmware version, or software configuration, is transmitted to a server for assessment. The server accesses a data storage storing information about vulnerabilities. Based on the received information, the server may identify those vulnerabilities affecting the mobile communication device, and may transmit a notification to remediate those vulnerabilities. The server may also transmit result information about the vulnerabilities affecting the mobile communication device. The server may also store the received information about the device, so that in the event the server learns of new vulnerabilities, it may continue to assess whether the device is affected, and may accordingly notify or remediate the device.Type: GrantFiled: October 31, 2019Date of Patent: August 3, 2021Assignee: Lookout, Inc.Inventors: John G. Hering, Kevin Mahaffey, James Burgess
-
Patent number: RE49634Abstract: The invention is a system and method for identifying, assessing, and responding to vulnerabilities on a mobile communication device. Information about the mobile communication device, such as its operating system, firmware version, or software configuration, is transmitted to a server for assessment. The server accesses a data storage storing information about vulnerabilities. Based on the received information, the server may identify those vulnerabilities affecting the mobile communication device, and may transmit a notification to remediate those vulnerabilities. The server may also transmit result information about the vulnerabilities affecting the mobile communication device. The server may also store the received information about the device, so that in the event the server learns of new vulnerabilities, it may continue to assess whether the device is affected, and may accordingly notify or remediate the device.Type: GrantFiled: August 2, 2021Date of Patent: August 29, 2023Assignee: Lookout, Inc.Inventors: John G. Hering, Kevin Mahaffey, James Burgess