Patents Assigned to Associated Technology
-
Patent number: 6721847Abstract: An application program (6) may issue a file access request to an operating system (4) accompanied by a caching hint. This caching hint may be selected in dependence upon the file type and file size of the computer file to which access has been requested. The data defining which hint type is to be used for each combination of file type and file size may be adaptively updated depending upon measured performance for the different hint types. The hint defining data may be initialised in dependence upon the operating system version and the installed memory size of the computer system concerned.Type: GrantFiled: February 20, 2001Date of Patent: April 13, 2004Assignee: Networks Associates Technology, Inc.Inventor: Neil John Hursey
-
Patent number: 6718469Abstract: A system and method for executing computer virus definitions containing general purpose programming language extensions is described. One or more virus definition records are stored in a computer virus data file. Each virus definition record includes an identifier, a virus detection section and an extension sentence. The identifier uniquely identifies a computer virus. The virus detection section includes object code providing operations to detect the identified computer virus within a computer system. The extension sentence includes object code providing reusable operations implemented in a general purpose computing language. For each virus definition record, at least one of the object code of the virus detection section and the extension sentence is interpreted.Type: GrantFiled: August 1, 2001Date of Patent: April 6, 2004Assignee: Networks Associates Technology, Inc.Inventors: Michael Chin-Hwan Pak, Andrei Ouchakov, Khai Nhu Pham, Dmitry O. Gryaznov, Victor Kouznetsov
-
Patent number: 6714513Abstract: A system, method and computer program product are provided for analyzing a network utilizing an agent. Initially, a signal is sent from a computer to a host controller utilizing a network. Next, a response to the signal is received from the host controller. Information is then collected relating to network traffic involving the computer based on the response. The information is subsequently sent to the host controller on a periodic basis.Type: GrantFiled: December 21, 2001Date of Patent: March 30, 2004Assignee: Networks Associates Technology, Inc.Inventors: Herbert V. Joiner, Ravi Verma, Praveen Raghuraman, Ken W. Elwell
-
Patent number: 6707794Abstract: A method, system and computer program product for analyzing link failure in a network is described, wherein a protocol analyzer captures handshake protocol frames exchanged by two nodes attempting to establish a physical link. The captured handshake protocol frames ordered sets are displayed to the user in a merged, time-ordered list, and the information contained in the frames is decoded and displayed. If an attempt to establish a link fails, the symptoms of the failure and a possible diagnosis are identified and displayed. The user is thereby provided with a complete, understandable picture of the events leading up to the link failure, and with symptoms and possible cause of the link failure.Type: GrantFiled: November 15, 1999Date of Patent: March 16, 2004Assignee: Networks Associates Technology, Inc.Inventors: Pak-Tak Patrick Leong, King L. Won
-
Patent number: 6701440Abstract: A system and method for a remote or network-based application service offering virus scanning, sniffing, or detecting of e-mail viruses prior to the e-mail messages arriving at the destination system or server are disclosed. The method protects a computer system that is configured to receive an e-mail message addressed to a destination e-mail address from viruses in an incoming e-mail message. The method generally includes receiving the incoming e-mail message at a remote e-mail receiving server, scanning the e-mail message for virus, forwarding the e-mail message if it is clean to a remote e-mail sending server, attempting to clean the e-mail message if it is infected to generate a cleaned e-mail message, forwarding the cleaned e-mail message, if any, to the remote e-mail sending server, and forwarding the clean or cleaned e-mail message, if any, to the destination e-mail address from the remote e-mail sending server.Type: GrantFiled: January 6, 2000Date of Patent: March 2, 2004Assignee: Networks Associates Technology, Inc.Inventors: Do K. Kim, Christopher L. Pearce, Jeffrey J. Constantine
-
Patent number: 6701441Abstract: A system, method, and computer program product for delivery and automatic execution of security, management, or optimization software over an Internet connection to a user computer responsive to a user request entered via a web browser on the user computer. In a preferred embodiment, the user directs the Internet browser to a Internet clinical services provider web site computer and logs in to the site using an identifier and a secure password and optionally makes a selection of the type of servicing desired, wherein an automatically-executing software package encapsulated within a markup language communication unit deliverable across the Internet is delivered, to the user computer, the automatically-executing software package being adapted to perform security, management, or optimization functions on the user computer. User identifiers and passwords enabling the downloads may be provided on a per-download basis or on a subscription basis.Type: GrantFiled: June 25, 2002Date of Patent: March 2, 2004Assignee: Networks Associates Technology, Inc.Inventors: Chandrasekar Balasubramaniam, Ravi Kannan, Siddaraya Basappa Revashetti, Srivats Sampath, Babu Katchapalayam
-
Patent number: 6697337Abstract: A wireless analyzer device for an IEEE 802.11 Wireless LAN is programmed to perform both a per packet processing routine to obtain packet statistics, and a one second timer routine, followed by arranging the packet statistics in a logical manner for display on a computer monitor.Type: GrantFiled: September 17, 2001Date of Patent: February 24, 2004Assignee: Networks Associates Technology, Inc.Inventors: Dominick Anthony Cafarelli, James Peter Anderson
-
Patent number: 6697871Abstract: A system and method for the efficient encoding and decoding of protocol messages is described. In one embodiment, an offset from a beginning of a memory buffer is calculated based upon a maximum size of a header portion of the message. A variable length portion of the message is encoded beginning at the offset, and the header portion of the message is encoded based upon an encoded size of the variable portion and a size of the header portion. The encoding of the header portion begins at the offset less the encoded size of the header portion. Further, a set of object identifiers are decoded into a data structure. If a value portion corresponding to an object identifier of the set of object identifiers is variable in length, the value portion is decoded into the data structure.Type: GrantFiled: September 21, 1999Date of Patent: February 24, 2004Assignee: Network Associates Technology, Inc.Inventor: Daniel Hansen
-
Patent number: 6697870Abstract: In a probe system for monitoring and analyzing data flow and associated activities between devices connected in common to a point in a network, the probe's driver runs in a “Kernel mode” on Windows NT for analyzing packets of data retrieved from the network, whereby programming is provided for operating the Kernel mode driver to monitor the rate of traffic or data packets entering an NIC card buffer, for causing the CPU to respond to an interrupt issued by the NIC everytime a data packet is received at a traffic rate below a predetermined threshold to access data packets entering the NIC card buffer, and to cause the CPU to respond to polling pulses at regular predetermined intervals to access data packets, when the traffic rate exceeds the predetermined threshold, for providing more CPU cycles to analyze the data packets.Type: GrantFiled: January 28, 2000Date of Patent: February 24, 2004Assignee: Networks Associates Technology, Inc.Inventors: Dominick Anthony Cafarelli, III, Daniel Hansen
-
Patent number: 6697950Abstract: One embodiment of the present invention provides a system that detects a macro virus in a computer system by statically analyzing macro operations within a document. The system operates by receiving the document containing the macro operations. The system locates the macro operations within the document, and performs a flow analysis on the macro operations within the document to determine associated values for variables within the macro operations. Next, the system compares the macro operations including the associated values for variables against a profile containing information about suspect macro operations and associated values for variables to determine whether the document contains suspect macro operations. If so, the system informs a user that the document contains suspect macro operations. In one embodiment of the present invention, after informing the user, the system receives instructions from the user specifying an action to take with regards to the document.Type: GrantFiled: December 22, 1999Date of Patent: February 24, 2004Assignee: Networks Associates Technology, Inc.Inventor: Cheuk W. Ko
-
Patent number: 6693888Abstract: A method and apparatus provides for wirelessly monitoring data packets or frames transmitted in a wireless LAN, that permits a user to selectively filter out unwanted ones of the data packets or frames with respect to the source and destination hardware addresses, and to the frame type and subtypes.Type: GrantFiled: June 6, 2001Date of Patent: February 17, 2004Assignee: Networks Associates Technology, Inc.Inventors: Dominick Anthony Cafarelli, Kazim Orhan Yildiz
-
Patent number: 6684329Abstract: A system and method for minimizing the likelihood of flaws in a firewall proxy is disclosed. Software wrappers are used to introduce fine-grained controls on the operation of existing proxy applications. These fine-grained controls create an extra measure of assurance that bugs (or malicious software) will not subvert the intent of the firewall. To provide even further assurance, the firewall system can be totally wrapped. A totally wrapped system includes a wrapper for the proxies plus a separate wrapper for everything else on the firewall system that can potentially interfere with the wrappers and the proxies. The software wrappers can also be integrated with an intrusion detection system. The fine-grained controls of the software wrapper enables it to be uniquely positioned to generate alerts based on an indication that a flaw exists in the proxy and that the proxy is misbehaving.Type: GrantFiled: December 30, 1999Date of Patent: January 27, 2004Assignee: Networks Associates Technology, Inc.Inventors: Jeremy Epstein, Linda Thomas
-
Patent number: 6678887Abstract: A system that facilitates customizing a software package by modifying an implementation of a target method defined within an application programming interface (API) for the software package is presented. The system operates by receiving additional code for integration into a target method defined within the API and a command to integrate this code, wherein the API defines a plurality of methods that operate on objects. This command is received through a pre-defined method within the API. In response, the system links the additional code into the target method so that the additional code is executed upon invocation of the target method. In one embodiment the API defines: a method that creates an object; a method that deletes the object; a method that fetches the object; and a method that updates the object. In one embodiment the additional code causes the target method to operate on data from an alternative source.Type: GrantFiled: July 11, 2000Date of Patent: January 13, 2004Assignee: Networks Associates Technology, Inc.Inventors: Clinton J. Hallman, David Forney
-
Patent number: 6674738Abstract: A method and apparatus for detecting and diagnosing wireless network failures, provides for capturing, analyzing, and displaying detailed information relative to data packets and/or frames transmitted across a wireless network including an IEEE 802.11 LAN.Type: GrantFiled: September 17, 2001Date of Patent: January 6, 2004Assignee: Networks Associates Technology, Inc.Inventors: Kazim Orhan Yildiz, Bing Chen
-
Patent number: 6671812Abstract: A system, method, and computer program product are provided for cleaning a computer. Initially, a cleaning program is downloaded to a computer. Next, a search for undesired data and software is performed on the computer utilizing the cleaning program. Such undesired data and software is then deleted from the computer utilizing the cleaning program.Type: GrantFiled: October 4, 2002Date of Patent: December 30, 2003Assignee: Networks Associates Technology, Inc.Inventors: Chandrasekar Balasubramaniam, Ravi Kannan, Siddaraya Basappa Revashetti, Srivats Sampath, Babu Katchapalayam
-
Patent number: 6671368Abstract: A system, method and computer program product are provided for retrieving records in, for example, a computer telephony integration (CTI) architecture. Initially, a telephone call is received from a user. During the telephone call, an identifier associated with the user is ascertained. Information associated with the user is then retrieved utilizing the identifier. The retrieval of information is based on criterion that is customizable.Type: GrantFiled: June 30, 2000Date of Patent: December 30, 2003Assignee: Networks Associates Technology, Inc.Inventors: Salvatore J. Contino, Mei Ling
-
Patent number: 6668289Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database.Type: GrantFiled: October 4, 2002Date of Patent: December 23, 2003Assignee: Networks Associates Technology, Inc.Inventors: William Cheng, Kenneth Hwang, Ravi Kannan, Babu Katchapalayam, Bing Liu, Balaji Narasimhan, Gopal Ramanujam, Jonathan Tran
-
Patent number: 6668054Abstract: A system, method and computer program product are provided for allowing a user to remotely interface a computer telephony integration (CTI) architecture. A telephone call is initially received from a caller. Such telephone call is subsequently routed to a remote user. Before or during the telephone call, an identifier associated with the caller is ascertained. Information associated with the caller is then retrieved utilizing the identifier. Further, the information is sent to the remote user utilizing a network such as the Internet. The information is then capable of being viewed using a Hypertext Transfer Protocol (HTTP) application.Type: GrantFiled: June 30, 2000Date of Patent: December 23, 2003Assignee: Networks Associates Technology, Inc.Inventors: Salvatore J. Contino, Mei Ling
-
Patent number: 6663000Abstract: In a malware scanner containing an updating program 20, a malware scanner engine 22 and malware definition data 24, the malware scanner engine 22 and the malware definition data 24 cross-check each other for validity. More particularly, each includes its own signature 26, 30 as well as public key information 28, 32 for checking the other. There is no dependence upon the updating software 20 for information required in the validating of the malware scanner engine 22 or malware definition data 24. The malware definition data 24 can include program code operable to utilize the validating data 32 embedded within the malware definition data 24 for checking the signature 26 of the malware scanner engine 22.Type: GrantFiled: August 1, 2002Date of Patent: December 16, 2003Assignee: Networks Associates Technology, Inc.Inventors: Igor Garrievich Muttik, Alexander James Hinchliffe, Dirk Kollberg
-
Patent number: 6665269Abstract: Data frames or packets transmitted between stations on a selected channel from amongst a plurality of channels in a wireless communication network are captured, along with data frames or packets transmitted on other of the plurality of channels that appear on the selected channel due to crosstalk caused by channel overlap, are filtered to separate the data frames or packets originated on the selected channel from these due to crosstalk, for presentation to a user in respective individual traces or screen displays.Type: GrantFiled: January 30, 2002Date of Patent: December 16, 2003Assignee: Networks Associates Technology, Inc.Inventor: Peter O. Schmitz