US 12,216,797 B2
Using fake personal data to create a policy to protect personal information on client computing devices
Timothy Micheal Wyatt, Toronto (CA); Kevin Patrick Mahaffey, San francisco, CA (US); David Luke Richardson, San Francisco, CA (US); Brian James Buck, Livermore, CA (US); and Marc William Rogers, Moraga, CA (US)
Assigned to Lookout, Inc., Boston, MA (US)
Filed by Lookout, Inc., Boston, MA (US)
Filed on Jun. 10, 2024, as Appl. No. 18/738,931.
Application 18/738,931 is a continuation of application No. 17/228,159, filed on Apr. 12, 2021, abandoned.
Application 17/228,159 is a continuation of application No. 16/564,678, filed on Sep. 9, 2019, granted, now 10,990,696, issued on Apr. 27, 2021.
Application 16/564,678 is a continuation of application No. 15/473,252, filed on Mar. 29, 2017, granted, now 10,452,862, issued on Oct. 22, 2019.
Application 15/473,252 is a continuation of application No. 14/063,342, filed on Oct. 25, 2013, granted, now 9,642,008, issued on May 2, 2017.
Prior Publication US 2024/0330509 A1, Oct. 3, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); H04L 9/40 (2022.01); H04W 12/02 (2009.01); H04W 12/08 (2021.01); H04W 88/02 (2009.01)
CPC G06F 21/6245 (2013.01) [H04L 63/20 (2013.01); H04W 12/02 (2013.01); H04W 12/08 (2013.01); H04W 88/02 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A method comprising:
identifying, by a policy management module on a client computing device, personal data associated with the client computing device;
receiving, by the policy management module, from a server, an analysis associated with the client computing device, wherein the analysis is generated by:
creating, by the server, a set of fake personal data;
transmitting, by the server, the fake personal data to the client computing device;
tracking, by the server, access of the fake personal data by an application installed on the client computing device; and
identifying, by the server, the application that accessed the fake personal data;
creating, by the policy management module, a policy to disallow access of the personal data by the identified application;
assigning the created policy to the client computing device; and,
generating a report by the server to alert a user of the client computing device, the alert including access of fake personal data by the application.