The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 24, 2024

Filed:

May. 22, 2023
Applicant:

Lookout, Inc., Boston, MA (US);

Inventors:

Timothy Micheal Wyatt, Toronto, CA;

Brian James Buck, Livermore, CA (US);

Nitin Shridhar Desai, Dublin, CA (US);

Robert Blaine Elwell, Atlanta, GA (US);

Eike Christian Falkenberg, Walnut Creek, CA (US);

Meng Hu, Sunnyvale, CA (US);

Assignee:

Lookout, Inc., Boston, MA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/56 (2013.01); G06F 21/57 (2013.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04L 43/10 (2022.01); H04L 43/12 (2022.01); H04L 67/01 (2022.01);
U.S. Cl.
CPC ...
H04L 63/1466 (2013.01); G06F 21/56 (2013.01); G06F 21/577 (2013.01); H04L 9/3265 (2013.01); H04L 43/10 (2013.01); H04L 43/12 (2013.01); H04L 63/1425 (2013.01); H04L 63/0823 (2013.01); H04L 63/0884 (2013.01); H04L 67/01 (2022.05);
Abstract

The security of network connections on a computing device is protected by detecting and preventing compromise of the network connections, including man-in-the-middle (MITM) attacks. Communications are intercepted by a client-side proxy before being sent to a recipient designated by an application. The intercepted communication is inspected, and a first connection is determined to be used to send the communication based on the inspection. Finally, before the communication is sent via the first connection, an action is performed by the client-side proxy resulting in an indication that the first connection is compromised. The action may include comparing data associated with the first connection to data associated with known compromised connections. In various embodiments, additional security responses may subsequently be performed by the client-side proxy based on the indication that the first connection is compromised.


Find Patent Forward Citations

Loading…