Lookout. has been granted a patent for a method that evaluates software for security threats. The process involves an evaluation server receiving a request from a user device, sending data to an authenticity server for analysis, and quarantining the software if a threat is detected. GlobalData’s report on Lookout gives a 360-degree view of the company including its patenting strategy. Buy the report here.

Access deeper industry intelligence

Experience unmatched clarity with a single platform that combines unique data, AI, and human expertise.

Find out more

According to GlobalData’s company profile on Lookout, M2M network optimization was a key innovation area identified from patents. Lookout's grant share as of June 2024 was 73%. Grant share is based on the ratio of number of grants to total number of patents.

Software evaluation and threat detection method for user devices

Source: United States Patent and Trademark Office (USPTO). Credit: Lookout Inc

The patent US12026261B2 outlines a method and system for evaluating software on user devices to identify potential security threats. The process begins with a user device sending a request regarding specific software to an evaluation server. This server then forwards relevant data to an authenticity server, which assesses the software by comparing its components against data from applications on other computing devices. Based on the evaluation results, the evaluation server determines if a security threat exists. If a threat is identified, the system can instruct the user device to take actions such as inspecting network packets, blocking traffic from suspicious addresses, or quarantining the software.

Additionally, the patent describes various actions that can be taken in response to a detected threat, including deleting or uninstalling the software, preventing it from launching, or modifying its permissions. The evaluation process may involve multiple evaluations from both the authenticity server and an administrator server, with the results from these evaluations informing the threat assessment. The system is designed to operate over a communication network and can utilize a proxy on the user device to manage network traffic. The patent also includes provisions for querying external servers to verify the legitimacy of the software, enhancing the overall security framework for user devices.

To know more about GlobalData’s detailed insights on Lookout, buy the report here.

Data Insights

From

The gold standard of business intelligence.

Blending expert knowledge with cutting-edge technology, GlobalData’s unrivalled proprietary data will enable you to decode what’s happening in your market. You can make better informed decisions and gain a future-proof advantage over your competitors.

GlobalData

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData Patent Analytics tracks bibliographic data, legal events data, point in time patent ownerships, and backward and forward citations from global patenting offices. Textual analysis and official patent classifications are used to group patents into key thematic areas and link them to specific companies across the world’s largest industries.