David Luke Richardson - San Francisco CA, US Ayan Kanti Mandal - Oakland CA, US Christopher Michael Jones - San Francisco CA, US John Gunther Hering - San Francisco CA, US Kevin Patrick Mahaffey - San Francisco CA, US Brian James Buck - Livermore CA, US
Assignee:
Lookout, Inc. - San Francisco CA
International Classification:
G06F 3/0481 G06F 3/048
US Classification:
715772
Abstract:
Security is enhanced for a user of an electronic device by providing a method for visually monitoring the progress of a security operation on an electronic device that provides a plurality of objects including at least one of an application, a document, a file, an image, and a record. When a security operation is launched for at least some of the plurality of objects, an operation window is displayed on the electronic device's display screen. The operation window includes a first operation icon corresponding to a first object on which the security operation is currently being performed. The first operation icon includes a thumbnail icon representing the first object and an operation completion indicator that visually indicates a completion level of the security operation currently being performed on the first object.
Methods And Systems For Providing A Secure Connection To A Mobile Communications Device With The Level Of Security Based On A Context Of The Communication
- San Francisco CA, US Timothy Strazzere - Oakland CA, US Brian James Buck - Livermore CA, US
Assignee:
LOOKOUT, INC. - San Francisco CA
International Classification:
H04L 9/40 H04W 12/086
Abstract:
Based on context received regarding a computing device and a security policy, a computing device evaluates a request by an application program to determine whether or not to allow the establishment of an application connection.
Methods And Systems For Addressing Unreported Theft Or Loss Of Mobile Communications Devices
- San Francisco CA, US John G. Hering - San Francisco CA, US James David Burgess - Alameda CA, US Vance Grkov - Seattle WA, US David Luke Richardson - San Francisco CA, US Ayan Mandal - Oakland CA, US Cherry Mangat - San Francisco CA, US Brian James Buck - Livermore CA, US William Robinson - Brentwood CA, US
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.
Providing A Mobile Communications Device With Access To A Provider Service Conditioned Upon A Device Security Level Determination
- San Francisco CA, US John G. Hering - San Francisco CA, US James David Burgess - Alameda CA, US Brian James Buck - Livermore CA, US William Robinson - Brentwood CA, US
Methods and systems are provided for providing a mobile communications device with access to a provider with a plurality of security levels. The security state of the device varies according to severity levels of device security events. The mobile communications device generates data regarding security events and provides the data to the provider, which compares that security state to a policy associated with the provider. The mobile communications device is allowed to access to a provider service where the device's current security state meets or exceeds the security state required for the provider service.
Methods For Maintaning User Access To Computing Devices Based On Determining User Control
- San Francisco CA, US Kevin Patrick Mahaffey - San Francisco CA, US Brian James Buck - Livermore CA, US
Assignee:
LOOKOUT, INC. - San Francisco CA
International Classification:
G06F 21/35 H04W 12/06 H04L 29/06
Abstract:
The method disclosed herein provides for performing user authentication and maintaining user authentication and access to a first device based on the user maintaining control of the first device. The continued control may be based on determining the user's continued possession of the first device, or determining an acceptable proximity of the user to the first device. The proximity of the user may be determined using a second device associated with the user, or sensors associated with the first device.
Configuring Access To A Network Service Based On A Security State Of A Mobile Device
- San Francisco CA, US David Richardson - Moraga CA, US Daniel Thanos - Burlington, CA William Neil Robinson - Brentwood CA, US Brian James Buck - Livermore CA, US Kevin Patrick Mahaffey - San Francisco CA, US
International Classification:
H04L 29/06
Abstract:
In one approach, a first computing device receives a request from a second computing device. The request is for access by the second computing device to a service provided by a third computing device over a network. In response to receiving the request, the first computing device performs a security evaluation of the second computing device. The evaluation determines a risk level. The first computing device generates, based on the evaluation, a token for the second computing device. The token includes data encoding the risk level. The token is sent to the second computing device and/or third computing device. The sent data is used to configure the service provided to the second computing device.
Detecting An Attempted Access Of Personal Information On Client Computing Devices
- San Francisco CA, US Kevin Patrick Mahaffey - San Francisco CA, US David Luke Richardson - San Francisco CA, US Brian James Buck - Livermore CA, US Marc William Rogers - Moraga CA, US
Assignee:
LOOKOUT, INC. - San Francisco CA
International Classification:
G06F 21/62 H04W 12/08 H04L 29/06 H04W 12/02
Abstract:
Systems and methods are disclosed for managing personal data on a client computer in which personal data stored at one or more locations on the client computer is identified by a policy management module on the computer or a server. A policy is then created based on the identified personal data. The policy management module monitors at least the personal data stored in the one or more locations and detects attempts to access the monitored data and determines whether the attempts are in violation of the policy.
Quarantine Of Software Based On Analysis Of Updated Device Data
- San Francisco CA, US William Neil Robinson - Sunnyvale CA, US Brian James Buck - Livermore CA, US Alex Richard Gladd - Crofton MD, US
International Classification:
G06F 21/57 G06F 8/61 G06F 21/56 G06F 21/55
Abstract:
A method includes: after installation of software on a first mobile device, receiving new data from a second mobile device; analyzing, using a data repository, the new data to provide a security assessment; determining, based on the security assessment, a new security threat associated with the software; and in response to determining the new security threat, causing the first mobile device to implement a quarantine of the software.
Name / Title
Company / Classification
Phones & Addresses
Mr Brian Buck President
Luxury Motors Online Luxury Motors Online Inc Auto Dealers - Used Cars
1020 SE Market St, Portland, OR 97214 5032367281, 5035366618
Brian Buck Vice President
Workman Corporation Home Builders · New Single-Family General Contrs
1250 E Copeland Rd STE 940, Arlington, TX 76011 8176352700
Brian Buck
DIESEL MACHINERY REPAIR, LLC
Brian Buck
BUCK STORAGE, INC
Brian Buck
BUCK WAREHOUSE, INC
Brian Buck
BRIAN BUCK ENTERPRISES, INC
Brian Buck President
Luxury Motors Online Inc Ret Misc Vehicles
526 SE 6 Ave, Portland, OR 97214 PO Box 2985, Happy Valley, OR 97015
Medical School University of Texas Medical Branch at Galveston Graduated: 1983
Procedures:
Neurological Testing
Conditions:
Intervertebral Disc Degeneration
Description:
Dr. Buck graduated from the University of Texas Medical Branch at Galveston in 1983. He works in West Lake Hills, TX and specializes in Physical Medicine & Rehabilitation. Dr. Buck is affiliated with Arise Austin Medical Center and Austin Lakes Hospital.
Lisle, IL 60532Outstanding track record of driving software company growth via innovative product creation/evolution and aggressive M&A activity as CTO of private and public... Outstanding track record of driving software company growth via innovative product creation/evolution and aggressive M&A activity as CTO of private and public software companies.
Skill set includes visionary product, technology & market strategy creation; intellectual property creation &...
Sisler High School Winnipeg Palestinian Territory, Occupie 1987-1988, R. B. Russell Vocational High School Winnipeg Palestinian Territory, Occupie 1987-1991