Patents by Inventor Timothy Michael WYATT

Timothy Michael WYATT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10509911
    Abstract: Methods and systems are provided for conditionally granting access to service levels based on a determined security state of the device requesting access. A software component, upon receiving a request for access to a provider having a plurality of service levels, determines the current security state of the requesting device. The software component compares that security state to a policy associated with the provider. The software component then allows the requesting device access to the provider services where the device's current security state meets or exceeds the security state required for the service.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: December 17, 2019
    Assignee: LOOKOUT, INC.
    Inventors: Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Michael Wyatt, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, David Luke Richardson, Bruce Wootton, John G. Hering, Jonathan Pantera Grubb, Brian James Buck, William Robinson
  • Publication number: 20190303586
    Abstract: Methods and systems are provided for conditionally granting access to service levels based on a determined security state of the device requesting access. A software component, upon receiving a request for access to a provider having a plurality of service levels, determines the current security state of the requesting device. The software component compares that security state to a policy associated with the provider. The software component then allows the requesting device access to the provider services where the device's current security state meets or exceeds the security state required for the service.
    Type: Application
    Filed: June 17, 2019
    Publication date: October 3, 2019
    Inventors: Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Michael Wyatt, Anthony McKay Lineberry, Kyle Barton, Daniel Lee Evans, David Luke Richardson, Bruce Wootton, John G. Hering, Jonathan Pantera Grubb, Brian James Buck, William Robinson
  • Patent number: 9118720
    Abstract: A method and apparatus for selectively removing a data element that triggers a policy violation from a web request to an interactive website. In one method, the method identifies a policy for protecting source data, having a plurality of data elements. The method further evaluates a web request sent to an interactive website as part of a web-based application, and determines that the web request includes at least one data element triggering a violation of the policy. The method determines the data boundaries of the web request, and selectively removes data content within the data boundaries containing the at least one data element that triggered the violation to allow the web request to be processed by the interactive website as if it were the original web request containing the at least one data element.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: August 25, 2015
    Assignee: SYMANTEC CORPORATION
    Inventors: Shree Raman, John Gerald Ferguson, Bruce Christopher Wootton, Timothy Michael Wyatt, Hai Chen
  • Publication number: 20130326477
    Abstract: Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks.
    Type: Application
    Filed: March 5, 2013
    Publication date: December 5, 2013
    Applicant: LOOKOUT, INC.
    Inventors: Timothy Michael WYATT, Kevin Mahaffey, Derek Joseph HALLIDAY, David Richardson
  • Publication number: 20120233695
    Abstract: A system and method for preventing malware, spyware and other undesirable applications from affecting mobile communication devices uses a server to assist in identifying and removing undesirable applications. When scanning an application, a device transmits information about the application to a server for analysis. The server receives the information, produces a characterization assessment and can also provide a characterization re-assessment for the application, or data object, and transmits the assessment to the device. By performing analysis on a server, the invention allows a device to reduce the battery and performance cost of protecting against undesirable applications. The servers transmit notifications to devices that have installed applications that are discovered to be undesirable. The server can accumulate this data and then perform a characterization re-assessment of a data object it has previously assessed to provide an assessment based upon one of trust, distribution and ratings information.
    Type: Application
    Filed: May 2, 2012
    Publication date: September 13, 2012
    Applicant: Lookout, Inc., a California Corporation
    Inventors: Kevin Patrick MAHAFFEY, James David BURGESS, David GOLOMBEK, Timothy Michael WYATT, Anthony McKay LINEBERRY, Kyle BARTON, Daniel Lee EVANS, David Luke RICHARDSON, Ariel SALOMON