Lookout Inc. | Date: 2017-01-19
A computing device creates verification information and a challenge token and sends the verification information and token to a server. A server receives a command and authentication information and uses the verification information to verify the authentication information. The server creates authentication credentials based on the authentication information and the challenge token. The computing device receives the command and the authentication credentials from the server, determines whether the credentials are valid, and then processes the command if the credentials are valid.
Lookout Inc. | Date: 2017-04-26
A server receives from a mobile communication device information about a data object (e.g., application) on the device when the device cannot assess the data object. The server uses the information along with other information stored at the server to assess the data object. Based on the assessment, the device may be permitted to access the data object or the device may not be permitted to access the data object. The other information stored at the server can include data objects known to be bad, data objects known to be good, or both.
Lookout Inc. | Date: 2017-03-29
A system and method to create a policy for managing personal data on a mobile communications device are disclosed. Personal data stored at one or more locations on the mobile communications device is identified by a policy management module on the mobile communications device. A policy is then created based on the personal data stored at the one or more locations. The policy management module on the mobile communications device monitors at least the personal data stored in the one or more locations on the mobile communications device.
Lookout Inc. | Date: 2017-02-08
A source of side-loaded software is determined. An action may be performed in response to the determination of the source. In one case, the handling of an application on a mobile device may be based on whether the source of the application is trusted or untrusted. If a software application being newly-installed on a mobile device of a user is determined to be untrusted, installation or execution is blocked. In one approach, the determination of the source includes: determining whether a first source identifier of a first application matches a white list of source identifiers or a black list of source identifiers; and sending the first source identifier, a first application identifier, and a signature of authorship for the first application to a different computing device.
Lookout Inc. | Date: 2016-12-28
Methods and systems are provided for sharing security risk information between collections of computing devices, such as mobile communications devices, to improve the functioning of devices associated with the collections. The methods and systems disclosed may share security risk information by identifying a security risk response by a first collection and then providing the security risk response to a second collection when a relationship database profile for the first collection indicates the security response may be shared with the second collection. Methods and systems are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.
Van Rooij E.,Lookout Inc.
Circulation Research | Year: 2011
Originally identified as moderate biological modifiers, microRNAs have recently emerged as powerful regulators of diverse cellular processes with especially important roles in disease and tissue remodeling. The rapid pace of studies on microRNA regulation and function necessitates the development of suitable techniques for measuring and modulating microRNAs in different model systems. This review summarizes experimental strategies for microRNA research and highlights the strengths and weaknesses of different approaches. The development of more specific and sensitive assays will further illuminate the biology behind microRNAs and will advance opportunities to safely pursue them as therapeutic modalities. © 2011 American Heart Association, Inc.
Lookout Inc. | Date: 2016-07-25
The method disclosed herein provides for performing device security corrective action based on loss of proximity to another device, such as a key device. While a mobile communication device is locked, a mobile communication device determines whether or not a key device is within a specified distance. If the key device is not within the specified distance from the mobile communication device, a notification may be displayed on the mobile communication device. If a user responds to the notification, the user may prevent or alter the mobile communication device from performing at least one device security corrective action. If, however, the user does not respond to the notification within a specified time period, the at least one device security corrective action is performed on the mobile communication device.
Lookout Inc. | Date: 2016-06-22
Security is enhanced for a user of a mobile communications device by monitoring and controlling resource usage. First information associated with each of a plurality of mobile communications devices is collected, including configurations and settings for applications, components, resources and external resources for each mobile communications device. The collected information is used to identify an application, component, resource or external resource that is currently active on two of the mobile communications devices. Second information is transmitted to the first of the two mobile communications devices to reduce or terminate usage of the identified application, component, resource or external resource on the first mobile communications device.
Lookout Inc. | Date: 2016-02-22
A software application is automatically launched on a first computing device. The launch of the application is a first execution of the application by the first computing device. In response to this launching, the application executes to automatically obtain data from the first computing device. The data is sent to a second computing device that is configured to provide a service to the first computing device (e.g., based on the data).
Lookout Inc. | Date: 2015-12-17
Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device.