Patents by Inventor Ahmed Said Sallam

Ahmed Said Sallam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10740463
    Abstract: A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded on an electronic device, determining that one or more of the shared libraries include suspicious shared libraries by determining that the shared library is associated with indications that the shared library may have been maliciously injected, loaded, and/or operating on the electronic device, and identifying the suspicious shared libraries to a reputation server.
    Type: Grant
    Filed: February 5, 2018
    Date of Patent: August 11, 2020
    Assignee: McAfee, LLC
    Inventor: Ahmed Said Sallam
  • Publication number: 20180157836
    Abstract: A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded on an electronic device, determining that one or more of the shared libraries include suspicious shared libraries by determining that the shared library is associated with indications that the shared library may have been maliciously injected, loaded, and/or operating on the electronic device, and identifying the suspicious shared libraries to a reputation server.
    Type: Application
    Filed: February 5, 2018
    Publication date: June 7, 2018
    Inventor: Ahmed Said Sallam
  • Patent number: 9917867
    Abstract: A computer-implemented method of conducting online meetings includes gathering sensed environment information from a set of intelligent sensor devices in physical user environments, along with meeting information describing online meetings in which the users participate while located in the respective environments. The sensed environment information and meeting information are stored in an event database, intelligent environment-control devices in the physical user environments are configured for subsequent online meetings. The configuring includes operating a stateful behavioral engine using the sensed environment information and meeting information from the event database to identify patterns of user behavior and to configure the intelligent environment-control devices according to the identified patterns of user behavior.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: March 13, 2018
    Assignee: Citrix Systems, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9781090
    Abstract: Continuous user authentication includes receiving authentication event information including (1) transaction information describing authentication transactions, the transaction information received from authentication providers and including identification of users and instances of authentication of the users by the authentication providers, and (2) user identification and activity information describing presence and state (e.g. location) of the users, this information received from (a) mobile sensing devices in physical proximity of users independent of user location, and (b) stationary sensing devices at fixed locations of the users.
    Type: Grant
    Filed: May 11, 2015
    Date of Patent: October 3, 2017
    Assignee: Citrix Systems, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9769200
    Abstract: A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. The malware executable objects includes the executable objects that are associated with the open network connections that are connected to the first network destination.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: September 19, 2017
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9747443
    Abstract: A system for securing an electronic device includes a non-volatile memory, a processor coupled to the non-volatile memory, a resource of the electronic device, firmware residing in the non-volatile memory and executed by the processor, and a firmware security agent residing in the firmware. The firmware is communicatively coupled to the resource of an electronic device. The firmware security agent is configured to, at a level below all of the operating systems of the electronic device accessing the resource, intercept a request for the resource and determine whether the request is indicative of malware.
    Type: Grant
    Filed: April 15, 2016
    Date of Patent: August 29, 2017
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9703957
    Abstract: A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting memory modifications into the contiguous block of memory. The electronic device includes a plurality of processing entities. The method also includes disabling all but one of a plurality of processing entities of the electronic device, scanning the memory of the electronic device for modifications performed by malware, and, if a memory modification is detected, repairing the memory modification. The method also includes enabling the processing entities that were disabled. The remaining processing entity executes the instructions for detecting memory modifications.
    Type: Grant
    Filed: December 13, 2016
    Date of Patent: July 11, 2017
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9679136
    Abstract: A method for analyzing a computing system includes the steps of at a first moment in time, scanning the resources of the computing system for indications of malware, at a second moment in time scanning the resources of the computing system for indications of malware and determining the system executable objects loaded on the computing system, determining malware system changes, identifying a relationship between the malware system changes and the system executable objects loaded on the computing system, and identifying as suspected malware the system executable objects loaded on the computing system which have a relationship with the malware system changes. The malware system changes include differences between the results of scanning the resources of the computing system for indications of malware at the second and first moment of time.
    Type: Grant
    Filed: November 17, 2015
    Date of Patent: June 13, 2017
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Publication number: 20170091452
    Abstract: A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting memory modifications into the contiguous block of memory. The electronic device includes a plurality of processing entities. The method also includes disabling all but one of a plurality of processing entities of the electronic device, scanning the memory of the electronic device for modifications performed by malware, and, if a memory modification is detected, repairing the memory modification. The method also includes enabling the processing entities that were disabled. The remaining processing entity executes the instructions for detecting memory modifications.
    Type: Application
    Filed: December 13, 2016
    Publication date: March 30, 2017
    Inventor: Ahmed Said Sallam
  • Publication number: 20170034188
    Abstract: A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. The malware executable objects includes the executable objects that are associated with the open network connections that are connected to the first network destination.
    Type: Application
    Filed: October 12, 2016
    Publication date: February 2, 2017
    Inventor: Ahmed Said Sallam
  • Patent number: 9536089
    Abstract: A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting memory modifications into the contiguous block of memory. The electronic device includes a plurality of processing entities. The method also includes disabling all but one of a plurality of processing entities of the electronic device, scanning the memory of the electronic device for modifications performed by malware, and, if a memory modification is detected, repairing the memory modification. The method also includes enabling the processing entities that were disabled. The remaining processing entity executes the instructions for detecting memory modifications.
    Type: Grant
    Filed: September 2, 2010
    Date of Patent: January 3, 2017
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9530001
    Abstract: A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a below-operating-system security agent. The below-operating-system security agent is configured to trap an attempted access of a resource of the electronic device, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic device accessing the memory. The attempted access includes attempting to write instructions to the memory and attempting to execute the instructions.
    Type: Grant
    Filed: May 18, 2015
    Date of Patent: December 27, 2016
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Publication number: 20160337459
    Abstract: A computer-implemented method of conducting online meetings includes gathering sensed environment information from a set of intelligent sensor devices in physical user environments, along with meeting information describing online meetings in which the users participate while located in the respective environments. The sensed environment information and meeting information are stored in an event database, intelligent environment-control devices in the physical user environments are configured for subsequent online meetings. The configuring includes operating a stateful behavioral engine using the sensed environment information and meeting information from the event database to identify patterns of user behavior and to configure the intelligent environment-control devices according to the identified patterns of user behavior.
    Type: Application
    Filed: May 11, 2015
    Publication date: November 17, 2016
    Inventor: Ahmed Said Sallam
  • Publication number: 20160337413
    Abstract: A computer-implemented method of conducting an online meeting includes maintaining, by processing circuitry, an enterprise content management system storing metadata describing computer-renderable stored content items. The method further includes continually recognizing and analyzing, by the processing circuitry, speech of one or more participants in the online meeting to extract participant speech content. The method further includes continually searching the enterprise content management system using extracted participant speech content and the metadata to identify matching stored content items, and dynamically providing links or other controls to the participant during the online meeting to enable the participant to view and selectively share the matching stored content items in the online meeting.
    Type: Application
    Filed: May 11, 2015
    Publication date: November 17, 2016
    Inventor: Ahmed Said Sallam
  • Publication number: 20160337328
    Abstract: Continuous user authentication includes receiving authentication event information including (1) transaction information describing authentication transactions, the transaction information received from authentication providers and including identification of users and instances of authentication of the users by the authentication providers, and (2) user identification and activity information describing presence and state (e.g. location) of the users, this information received from (a) mobile sensing devices in physical proximity of users independent of user location, and (b) stationary sensing devices at fixed locations of the users.
    Type: Application
    Filed: May 11, 2015
    Publication date: November 17, 2016
    Inventor: Ahmed Said Sallam
  • Patent number: 9479530
    Abstract: A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. The malware executable objects includes the executable objects that are associated with the open network connections that are connected to the first network destination.
    Type: Grant
    Filed: August 25, 2014
    Date of Patent: October 25, 2016
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Publication number: 20160277242
    Abstract: A computer-implemented technique conducts an online meeting. The technique involves collecting, by processing circuitry, configuration data for a plurality of user I/O devices available to a particular user. The technique further involves generating, by the processing circuitry, a user behavior model for the particular user based on the configuration data. The user behavior model includes, for each user I/O device of the plurality of user I/O devices, a set of device settings to customize operation of that user I/O device for the particular user. The technique further involves customizing, by the processing circuitry, the plurality of user I/O devices based on the user behavior model to communicate user I/O between the particular user and other users during a current online meeting.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventor: Ahmed Said Sallam
  • Publication number: 20160277456
    Abstract: Techniques for conducting online meetings involve expanding the scope of devices beyond basic peripheral devices, such as built-in cameras or displays, that are part of user computing devices serving as clients in online meeting sessions. A disclosed technique includes gathering device information for an augmented set of peripheral IO devices accessible to users, the augmented set of peripheral IO devices being separate from such basic peripheral devices. Gathered device information is stored in an augmented environment database, and the peripheral IO devices of the augmented set of peripheral devices are configured for use in the online meeting using the device information obtained from the augmented environment database, peripheral IO devices either replacing or supplementing corresponding peripheral devices of the basic set of peripheral devices for use in the online meeting.
    Type: Application
    Filed: March 18, 2015
    Publication date: September 22, 2016
    Inventor: Ahmed Said Sallam
  • Publication number: 20160232348
    Abstract: A system for securing an electronic device includes a non-volatile memory, a processor coupled to the non-volatile memory, a resource of the electronic device, firmware residing in the non-volatile memory and executed by the processor, and a firmware security agent residing in the firmware. The firmware is communicatively coupled to the resource of an electronic device. The firmware security agent is configured to, at a level below all of the operating systems of the electronic device accessing the resource, intercept a request for the resource and determine whether the request is indicative of malware.
    Type: Application
    Filed: April 15, 2016
    Publication date: August 11, 2016
    Inventor: Ahmed Said Sallam
  • Patent number: RE48043
    Abstract: A system, method and computer program product are provided for sending, to a central system, information associated with unwanted activity. In use, information associated with unwanted activity is identified utilizing a plurality of different types of security systems. Further, the information is sent to a central system.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: June 9, 2020
    Assignee: McAfee, LLC
    Inventor: Ahmed Said Sallam