Patents by Inventor William Neil Robinson
William Neil Robinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10218697Abstract: A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation of the first computing device; and performing, by the second computing device, an action (e.g., authorizing access to the service) based on the evaluation.Type: GrantFiled: June 9, 2017Date of Patent: February 26, 2019Assignee: LOOKOUT, INC.Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Publication number: 20180359244Abstract: A method includes: receiving a request regarding access by a first computing device (e.g., a mobile device of a user) to a service; in response to the request, performing, by a second computing device (e.g., a device risk evaluation server, or a server of an identity provider), an evaluation of the first computing device; and performing, by the second computing device, an action (e.g., authorizing access to the service) based on the evaluation.Type: ApplicationFiled: June 9, 2017Publication date: December 13, 2018Inventors: Aaron Cockerill, David Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck, Kevin Patrick Mahaffey
-
Publication number: 20180189478Abstract: An action may be performed in response to a determination of a source of side-loaded software. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: receiving, from the mobile device, a first application identifier and a first source identifier, each for a first application; sending the first application identifier and the first source identifier over a network to an administrator server; receiving, from the administrator server, a first state designation for the first application; setting a second state designation based on the first state designation; and sending the second state designation to the mobile device.Type: ApplicationFiled: March 1, 2018Publication date: July 5, 2018Inventors: David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
-
Patent number: 9940454Abstract: A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier, a first application identifier, and a signature of authorship for the first application to a different computing device.Type: GrantFiled: February 8, 2017Date of Patent: April 10, 2018Assignee: LOOKOUT, INC.Inventors: David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
-
Publication number: 20170346853Abstract: The security of network connections on a computing device is protected by detecting and preventing compromise of the network connections, including man-in-the-middle (MITM) attacks. Active probing and other methods are used to detect the attacks. Responses to detection include one or more of displaying a warning to a user of the computing device, providing an option to disconnect the network connection, blocking the network connection, switching to a different network connection, applying a policy, and sending anomaly information to a security server.Type: ApplicationFiled: May 30, 2017Publication date: November 30, 2017Applicant: LOOKOUT, INC.Inventors: Timothy Micheal Wyatt, David Luke Richardson, Kevin Patrick Mahaffey, Brian James Buck, William Neil Robinson, David William Cowden, Nitin Shridhar Desai, Prasad Deshpande, Robert Blaine Elwell, Eike Christian Falkenberg, Meng Hu, Alex Shoykhet
-
Publication number: 20170277570Abstract: A system and method for coordinating security components, including: determining, by an application executing on a client device, a need to perform a sharable functional task; identifying a first security component and a second security component installed on the client device and capable of performing variations of the sharable functional task, where variations of the sharable functional task are functionally overlapping and not identical; identifying a set of characteristics characterizing the first security component and the second security component; selecting the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics; delegating, by one or more processors, performance of the sharable functional task to the primary security component; and instructing the processors to cause functionality associated with the first security component to be at least partially suspended.Type: ApplicationFiled: June 12, 2017Publication date: September 28, 2017Inventors: Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
-
Patent number: 9740531Abstract: A system and method including: determining, by a manager module, a need to determine a primary software component of a client device; identifying a first software component and a second software component of the client device; identifying a set of characteristics of the first software component and the second software component; determining that the first software component is the primary software component based on the set of characteristics of each software component, where determining the primary software component further includes comparing the set of characteristics of each software component and selecting the primary software component based on the set of characteristics with a highest priority; and instructing, by the manager module, the one or more processors to cause functionality associated with the second software component to be at least partially suspended.Type: GrantFiled: September 1, 2015Date of Patent: August 22, 2017Assignee: Lookout, Inc.Inventors: Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
-
Publication number: 20170147810Abstract: A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier, a first application identifier, and a signature of authorship for the first application to a different computing device.Type: ApplicationFiled: February 8, 2017Publication date: May 25, 2017Inventors: David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
-
Patent number: 9589129Abstract: A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier and a first application identifier for the first application to a different computing device.Type: GrantFiled: June 4, 2015Date of Patent: March 7, 2017Assignee: LOOKOUT, INC.Inventors: David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
-
Publication number: 20160378558Abstract: A system and method including: determining, by a manager module, a need to determine a primary software component of a client device; identifying a first software component and a second software component of the client device; identifying a set of characteristics of the first software component and the second software component; determining that the first software component is the primary software component based on the set of characteristics of each software component, where determining the primary software component further includes comparing the set of characteristics of each software component and selecting the primary software component based on the set of characteristics with a highest priority; and instructing, by the manager module, the one or more processors to cause functionality associated with the second software component to be at least partially suspended.Type: ApplicationFiled: September 1, 2015Publication date: December 29, 2016Inventors: Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards, William Neil Robinson
-
Publication number: 20160343083Abstract: Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device.Type: ApplicationFiled: May 18, 2015Publication date: November 24, 2016Inventors: John Gunther Hering, Kevin Mahaffey, Brian James Buck, William Neil Robinson
-
Publication number: 20160321452Abstract: A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier and a first application identifier for the first application to a different computing device.Type: ApplicationFiled: June 4, 2015Publication date: November 3, 2016Inventors: David Richardson, Ahmed Mohamed Farrakha, William Neil Robinson, Brian James Buck
-
Patent number: 9033304Abstract: An apparatus includes a light foil device configured to move based on radiation pressure associated with light received by the light foil device. The apparatus includes a mechanism configured to transition between operational states in response to the movement of the light foil device, or includes a valve configured to control a flow of material through a conduit based, at least in part, on the movement of the light foil device.Type: GrantFiled: December 23, 2013Date of Patent: May 19, 2015Assignee: Intellectual Ventures Fund 79 LLCInventor: William Neil Robinson
-
Publication number: 20140110600Abstract: An apparatus includes a light foil device configured to move based on radiation pressure associated with light received by the light foil device. The apparatus includes a mechanism configured to transition between operational states in response to the movement of the light foil device, or includes a valve configured to control a flow of material through a conduit based, at least in part, on the movement of the light foil device.Type: ApplicationFiled: December 23, 2013Publication date: April 24, 2014Applicant: INTELLECTUAL VENTURES FUND 79 LLCInventor: William Neil Robinson
-
Patent number: 8646747Abstract: An apparatus includes a light foil device configured to move based on radiation pressure associated with light received by the light foil device. The apparatus includes a mechanism configured to transition between operational states in response to the movement of the light foil device, or includes a valve configured to control a flow of material through a conduit based, at least in part, on the movement of the light foil device.Type: GrantFiled: July 11, 2011Date of Patent: February 11, 2014Assignee: Intellectual Ventures Fund 79 LLCInventor: William Neil Robinson
-
Patent number: 7340266Abstract: An apparatus, such as a network element (112), for use in a system that communicates with a multimode receiving device (110), employs an information gating buffer (400) that is operably coupled to a first wireless system transmitter (404) and receives information to be transmitted by the first wireless system transmitter (404). A synchronization controller (402), operably coupled to the information gating buffer (400) receives synchronization information (132) from a second wireless system using a second wireless system receiver circuit (130), and uses the timing synchronization information (132) to control the information gating buffer (400) to gate broadcast information for transmission from a first wireless system transmission circuit (128) to the multimode receiving device (110).Type: GrantFiled: December 20, 2002Date of Patent: March 4, 2008Assignee: Motorola, Inc.Inventor: William Neil Robinson
-
Patent number: 7184774Abstract: Coordination among mobile stations enables a terminal device (114) to establish a most appropriate wireless network connection. According to the present invention, a connection request, including network connectivity requirements, is communicated from the terminal device (114) to a first mobile station (116). The first mobile station (116) then transmits the network connectivity requirements to a second mobile station (117–119) that is also capable of establishing a wireless network connection. A determination based in part or in whole on the network connectivity requirements is then made at one of the first and second mobile stations (116–119) which station can provide a most appropriate wireless network connection. A network connection is then established through one of the first and second mobile stations (116–119) based on the determination of which of the first and second mobile stations (116–119) can provide the most appropriate wireless network connection.Type: GrantFiled: October 30, 2001Date of Patent: February 27, 2007Assignee: Motorola, Inc.Inventors: William Neil Robinson, Jheroen Pieter Dorenbosch
-
Publication number: 20040203965Abstract: An apparatus, such as a network element (112), for use in a system that communicates with a multimode receiving device (110), employs an information gating buffer (400) that is operably coupled to a first wireless system transmitter (404) and receives information to be transmitted by the first wireless system transmitter (404). A synchronization controller (402), operably coupled to the information gating buffer (400) receives synchronization information (132) from a second wireless system using a second wireless system receiver circuit (130), and uses the timing synchronization information (132) to control the information gating buffer (400) to gate broadcast information for transmission from a first wireless system transmission circuit (128) to the multimode receiving device (110).Type: ApplicationFiled: December 20, 2002Publication date: October 14, 2004Inventor: William Neil Robinson
-
Patent number: 6751464Abstract: A data handling system comprising a terminal (122) and a communications network (100), the terminal (122) being capable of communicating with the communications network (100), the network (100) comprising a host platform (124) for receiving an agent (30) associated with the terminal (122), the agent (130) being adapted to communicate, at the platform (124), with the at least one other agent.Type: GrantFiled: February 22, 2001Date of Patent: June 15, 2004Assignee: Motorola, Inc.Inventors: Bernard Joseph Burg, William Neil Robinson, Philippe Sartori, Nicolas Dubois, Abdelkrim Benamar
-
Publication number: 20030083061Abstract: Coordination among mobile stations enables a terminal device (114) to establish a most appropriate wireless network connection. According to the present invention, a connection request, including network connectivity requirements, is communicated from the terminal device (114) to a first mobile station (116). The first mobile station (116) then transmits the network connectivity requirements to a second mobile station (117-119) that is also capable of establishing a wireless network connection. A determination based in part or in whole on the network connectivity requirements is then made at one of the first and second mobile stations (116-119) which station can provide a most appropriate wireless network connection. A network connection is then established through one of the first and second mobile stations (116-119) based on the determination of which of the first and second mobile stations (116-119) can provide the most appropriate wireless network connection.Type: ApplicationFiled: October 30, 2001Publication date: May 1, 2003Applicant: MOTOROLA, INC.Inventors: William Neil Robinson, Jheroen Pieter Dorenbosch