Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Lookout Inc patents


Recent patent applications related to Lookout Inc. Lookout Inc is listed as an Agent/Assignee. Note: Lookout Inc may have other listings under different names/spellings. We're not affiliated with Lookout Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "L" | Lookout Inc-related inventors


Methods and systems for providing secure network connections to mobile communications devices

A secure network connection is established between a server and a mobile communications device after the creation of a secure network account. The server, while analyzing traffic over the secure network connection identifies a triggering event or condition. ... Lookout Inc

Methods and systems for causing mobile communications devices to emit sounds with encoded information

A method is provided for comparing a usage of a mobile communications device to a stored pattern of usage. When a measure associated with a difference between the usage and the stored usage pattern exceeds a threshold, the mobile communications device is caused to emit a sound encoded with information that may be decoded by another electronic device.. ... Lookout Inc

Determining source of side-loaded software using an administrator server

An action may be performed in response to a determination of a source of side-loaded software. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. ... Lookout Inc

System and method for authorizing payment transaction based on device locations

A method for authorizing a mobile payment transaction is provided that is based on device locations. The method includes receiving, by a server, a request from a point of sale (pos) device to authorize a payment transaction involving a payment facilitating device. ... Lookout Inc

Method for changing mobile communication device functionality based upon receipt of a second code

The method disclosed herein provides for performing device authentication based on the of proximity to another device, such as a key device. When a key device is not near a mobile communications device, an unlock screen is allowed to be presented on a display screen. ... Lookout Inc

Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device

Methods and systems are provided for sharing information and improving the functioning of devices by blocking the installation of an application based on an assessment. In the methods and systems disclosed, a server may receive data pertaining to an application from the mobile communications device. ... Lookout Inc

Methods and systems for detecting and preventing network connection compromise

The security of network connections on a computing device is protected by detecting and preventing compromise of the network connections, including man-in-the-middle (mitm) attacks. Active probing and other methods are used to detect the attacks. ... Lookout Inc

Modifying mobile device settings for contextual substitution

Security is enhanced for a user of a mobile communications device by monitoring device usage and modifying an operational context for device usage. By monitoring current activities of the mobile communications device, a current context for operation of the mobile communications device is identified, and the current context indicates that a first activity is scheduled to be performed by a first resource. ... Lookout Inc

Response generation after distributed monitoring and evaluation of multiple devices

Data is collected from a set of devices according to a data collection policy. The data is associated with device configuration, device state, or device behavior. ... Lookout Inc

Coordinating multiple security components

A system and method for coordinating security components, including: determining, by an application executing on a client device, a need to perform a sharable functional task; identifying a first security component and a second security component installed on the client device and capable of performing variations of the sharable functional task, where variations of the sharable functional task are functionally overlapping and not identical; identifying a set of characteristics characterizing the first security component and the second security component; selecting the second security component as a primary security component for performing a variation of the sharable functional task based on the set of characteristics; delegating, by one or more processors, performance of the sharable functional task to the primary security component; and instructing the processors to cause functionality associated with the first security component to be at least partially suspended.. . ... Lookout Inc

System and method for assessing data objects on mobile communications devices

A server receives from a mobile communication device information about a data object (e.g., application) on the device when the device cannot assess the data object. The server uses the information along with other information stored at the server to assess the data object. ... Lookout Inc

System and method for creating a policy for managing personal data on a mobile communications device

A system and method to create a policy for managing personal data on a mobile communications device are disclosed. Personal data stored at one or more locations on the mobile communications device is identified by a policy management module on the mobile communications device. ... Lookout Inc

System and method for permitting an action based on verification information and a challenge token

A computing device creates verification information and a challenge token and sends the verification information and token to a server. A server receives a command and authentication information and uses the verification information to verify the authentication information. ... Lookout Inc

Methods and systems for sharing risk responses to improve the functioning of mobile communications devices

Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. ... Lookout Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Lookout Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Lookout Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###