Patents by Inventor Nicholas Neil Kralevich, IV
Nicholas Neil Kralevich, IV has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9275006Abstract: A method for updating configuration information includes, in a computing device including a processor, memory, and an operating system, initiating an update to at least one configuration setting of the computing device. The update may be downloaded from at least one update data source. The update may include configuration update data and configuration update metadata. The update may be verified by comparing the configuration update metadata with metadata associated with a current version of the at least one configuration setting. The update may be installed if it is verified. The update to the at least one configuration setting may be installed based on an intent from an unsecure component of the computing device. The unsecure component may include content consuming application installed on the device, a component of a computing platform of the device, and/or an update-seeker application installed on the device.Type: GrantFiled: December 18, 2012Date of Patent: March 1, 2016Assignee: Google Inc.Inventors: Adrian L. Ludwig, Curtis Gerald Condra, IV, Nicholas Neil Kralevich, IV
-
Patent number: 9143906Abstract: A device includes at least one processor, a messaging service operable by the at least one processor to determine whether an outgoing message is a likely premium message, and a user interface module operable by the at least one processor to responsive to determining that outgoing message is the likely premium message, output, for display, a prompt for confirmation to send the outgoing message to a likely premium code, and receive an indication of input detected within the prompt for confirmation. The module is further operable by the at least one processor to selectively send, based at least in part on the received indication of the user input, the outgoing message to the likely premium code.Type: GrantFiled: July 2, 2013Date of Patent: September 22, 2015Assignee: Google Inc.Inventors: Adrian Ludwig, Robert J. Greenwalt, III, Winthrop Lyon Saville, III, Nicholas Neil Kralevich, IV, Jake Hamby, Randall Sarafa, Alexander Faaborg
-
Patent number: 9117072Abstract: A method may include, in a computing device including a processor, memory, an operating system, and at least one installed application, detecting an attempted exploitation of at least one known vulnerability associated with the device. The attempted exploitation may be logged. At least one remedial action may be performed on the device based on the logged attempted exploitation. The known vulnerability may be associated with the operating system and/or the at least one installed application. The at least one known vulnerability may include one or more of at least one known coding flaw in the operating system or in the at least one installed application, at least one known weakness in a protocol running on the computing device, a known family of coding flaws in the operating system or in the at least one installed application, an unauthorized triggering of premium SMS services, and/or triggering of a hostile misconfiguration.Type: GrantFiled: December 18, 2012Date of Patent: August 25, 2015Assignee: Google Inc.Inventors: Adrian L. Ludwig, Curtis Gerald Condra, IV, Nicholas Neil Kralevich, IV
-
Publication number: 20140274172Abstract: A device includes at least one processor, a messaging service operable by the at least one processor to determine whether an outgoing message is a likely premium message, and a user interface module operable by the at least one processor to responsive to determining that outgoing message is the likely premium message, output, for display, a prompt for confirmation to send the outgoing message to a likely premium code, and receive an indication of input detected within the prompt for confirmation. The module is further operable by the at least one processor to selectively send, based at least in part on the received indication of the user input, the outgoing message to the likely premium code.Type: ApplicationFiled: July 2, 2013Publication date: September 18, 2014Inventors: Adrian Ludwig, Robert J. Greenwalt, III, Winthrop Lyon Saville, III, Nicholas Neil Kralevich, IV, Jake Hamby, Randall Sarafa, Alexander Faaborg
-
Publication number: 20140123285Abstract: A method may include, in a computing device including a processor, memory, an operating system, and at least one installed application, detecting an attempted exploitation of at least one known vulnerability associated with the device. The attempted exploitation may be logged. At least one remedial action may be performed on the device based on the logged attempted exploitation. The known vulnerability may be associated with the operating system and/or the at least one installed application. The at least one known vulnerability may include one or more of at least one known coding flaw in the operating system or in the at least one installed application, at least one known weakness in a protocol running on the computing device, a known family of coding flaws in the operating system or in the at least one installed application, an unauthorized triggering of premium SMS services, and/or triggering of a hostile misconfiguration.Type: ApplicationFiled: December 18, 2012Publication date: May 1, 2014Inventors: Adrian L. Ludwig, Curtis Gerald Condra, IV, Nicholas Neil Kralevich, IV
-
Publication number: 20140122862Abstract: A method for updating configuration information includes, in a computing device including a processor, memory, and an operating system, initiating an update to at least one configuration setting of the computing device. The update may be downloaded from at least one update data source. The update may include configuration update data and configuration update metadata. The update may be verified by comparing the configuration update metadata with metadata associated with a current version of the at least one configuration setting. The update may be installed if it is verified. The update to the at least one configuration setting may be installed based on an intent from an unsecure component of the computing device. The unsecure component may include content consuming application installed on the device, a component of a computing platform of the device, and/or an update-seeker application installed on the device.Type: ApplicationFiled: December 18, 2012Publication date: May 1, 2014Inventors: Adrian L. Ludwig, Curtis Gerald Condra, IV, Nicholas Neil Kralevich, IV
-
Patent number: 8505102Abstract: Systems, methods, routines and/or techniques for time delay on services (e.g., verification services) that detect undesirable content are described. In some embodiments, a flexible verification service prevents users (e.g., hackers) from using the verification service “as an oracle” to predict whether the user's application or software program will be detected by the verification service. The verification service, after receiving a verification request from a client device, may delay or prevent the communication of a verification response to the client device. The verification service may evaluate a verification request to determine a level of risk associated with the request. The verification service may communicate an initial response to the client device that submitted the verification request. The verification service may eventually communicate the verification response to the client device, for example, after a period of delay.Type: GrantFiled: January 14, 2013Date of Patent: August 6, 2013Assignee: Google Inc.Inventors: Richard Cannings, Kenneth Root, Sebastian Johannes Porst, Curtis Gerald Condra, Nicholas Neil Kralevich, IV, Adrian Ludwig, Peter Valchev