Patents by Inventor Sharad Mhaske
Sharad Mhaske has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11606689Abstract: The disclosed computer-implemented method for authenticating application points of entry to prevent unauthorized use of locked mobile applications may include (i) identifying one or more mobile applications having an access restriction and a group of application entry points associated with at least one mobile application function, (ii) intercepting a series of device inputs from a user for accessing the application entry points to bypass the access restriction for the mobile applications, (iii) requesting authentication credentials to bypass the access restriction from the application entry points, (iv) determining that the requested authentication credentials are invalid, and (v) performing a security action that protects against potentially malicious activity associated with unauthorized access to the mobile applications upon determining that the requested authentication credentials are invalid. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 4, 2020Date of Patent: March 14, 2023Assignee: Gen Digital Inc.Inventors: Sharad Mhaske, Anand Darak
-
Patent number: 11540134Abstract: The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device. The method may additionally include capturing, by the at least one processor employing the network extension feature, a phone number in the network traffic. The method may also include comparing, by the at least one processor employing the network extension feature, the phone number to a plurality of entries in a spam/scam repository. The method may further include performing, by the at least one processor, a security action in response to the comparison. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 9, 2020Date of Patent: December 27, 2022Assignee: Gen Digital Inc.Inventors: Anand Darak, Sharad Mhaske
-
Patent number: 11438382Abstract: The disclosed computer-implemented method for increasing cybersecurity protection may include (i) receiving, at a subscription-management computing device, an alert indication that indicates (A) a cybersecurity status score on a protected computing device is lower than a threshold value and (B) the protected computing device is associated with an expired subscription to a cybersecurity service and (ii) performing, responsive to receiving the alert indication, a security action comprising sending, from the subscription-management computing device to a server, a transfer instruction directing the server to transfer, to the protected computing device, at least a portion of a duration of a valid subscription to the cybersecurity service. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: February 27, 2019Date of Patent: September 6, 2022Assignee: NortonLifeLock Inc.Inventor: Sharad Mhaske
-
Patent number: 11157621Abstract: The disclosed computer-implemented method for detecting and preventing auto-click attacks may include (1) detecting, by the computing device, a click input, (2) detecting, by the computing device, a finger in proximity to the computing device, (3) analyzing, by the computing device, at least one event associated with the finger, (4) determining, by the computing device, that the click input is an auto-click based on the analysis of the at least one event associated with the finger, and (5) performing a security action in response to determining that the click input is an auto-click. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 6, 2018Date of Patent: October 26, 2021Assignee: NortonLifeLock Inc.Inventors: Sharad Mhaske, Shrikant Pawar
-
Patent number: 11003798Abstract: The disclosed computer-implemented method for enforcing age-based application constraints may include (1) receiving a selection of age-based use constraints to be associated with one or more applications installed on the computing device, (2) associating the age-based use constraints with the applications, (3) determining that a user attempting to access the applications does not meet the age-based use constraints, and (4) performing a security action that restricts user access to the applications when the user does not meet the age-based use constraints. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 18, 2018Date of Patent: May 11, 2021Assignee: NortonLifeLock Inc.Inventors: Sharad Mhaske, Anand Darak, Anuradha Joshi
-
Patent number: 10972497Abstract: The disclosed computer-implemented method for recovering an infected endpoint may include receiving an acoustic signal having an embedded command for executing a security application at the infected endpoint, decoding the acoustic signal to obtain the embedded command, and executing the embedded command to start a security application at the infected endpoint, where the security application is operable to mitigate the infected endpoint. Various other methods, systems and computer-readable media are also disclosed.Type: GrantFiled: September 21, 2018Date of Patent: April 6, 2021Assignee: NortonLifeLock Inc.Inventors: Shrikant Pawar, Sharad Mhaske
-
Patent number: 10966096Abstract: The disclosed computer-implemented method for system recovery from a system user interface process malfunction may include (i) determining that a system user interface (UI) process is executing on the computing device, (ii) determining that a message indicating a malfunction of the system UI process is displayed on the computing device, (iii) identifying a mobile application that was executing on the computing device at a time of the malfunction of the system UI process, and (iv) in response to identifying the mobile application that was executing at the time of the malfunction of the system UI process, performing a security action for recovery from the malfunction of the system UI process. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 18, 2018Date of Patent: March 30, 2021Assignee: NortonLifeLock Inc.Inventors: Sharad Mhaske, Shrikant Pawar
-
Patent number: 10783728Abstract: The disclosed computer-implemented method for controlling access may include (i) installing on a personal mobile device a mobile device application that enforces an authorization security policy for protected premises, (ii) checking, by the mobile device application and in response to installing the mobile device application, whether the personal mobile device satisfies a condition of the authorization security policy, (iii) granting authorization for the personal mobile device to function as an access card based on a result of checking whether the personal mobile device satisfies the condition of the authorization security policy, and (iv) enforcing an additional access security policy on the personal mobile device after granting authorization for the personal mobile device to function as the access card. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 20, 2018Date of Patent: September 22, 2020Assignee: NortonLifeLock Inc.Inventors: Sharad Mhaske, Anuradha Joshi
-
Patent number: 10341858Abstract: The disclosed computer-implemented method for obscuring user location may include (i) detecting a motion of a user mobile device through a motion sensor of the user mobile device, (ii) checking whether the motion of the user mobile device satisfies a specified threshold that defines a threshold level of motion, (iii) determining that the motion of the user mobile device satisfies the specified threshold that defines the threshold level of motion, and (iv) protecting a user of the user mobile device by obscuring, in response to determining that the motion of the user mobile device satisfies the specified threshold, an actual location of the user mobile device by outputting information indicating a decoy location of the user mobile device that deviates from the actual location of the user mobile device. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 13, 2018Date of Patent: July 2, 2019Assignee: Symantec CorporationInventors: Shrikant Pawar, Sharad Mhaske