Patents Assigned to McAfee, Inc.
  • Patent number: 9419927
    Abstract: A method, system, and computer program product for scanning incoming emails reduces the server resources needed, which improves server throughput and reduces costs. A method for processing incoming email messages comprised the steps of scanning incoming email messages to obtain an address of a sender of each incoming email message and to determine whether the email message is spam, for each email message that is determined to be spam, incrementing a count of email messages that are spam for a sender of the email message, determining that a count of email messages that are spam for a sender of an email message has exceeded a threshold, and thereafter, discarding all incoming email messages from the sender for which the count of email messages that are spam for a sender of an email message has exceeded a threshold without scanning the email messages to determine whether they are spam.
    Type: Grant
    Filed: August 27, 2013
    Date of Patent: August 16, 2016
    Assignee: McAfee, Inc.
    Inventors: Rajesh Shinde, Harish Mohan Awasthi
  • Patent number: 9419953
    Abstract: A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular domain. Secure posture data corresponding to attributes of the computing device is identified in secured memory of the computing device. The secure identifier and security posture is sent in a secured container to a management device of the particular domain. The particular domain can utilize the information in the secured container to authenticate the computing device and determine a security task to be performed relating to interactions of the computing device with the particular domain.
    Type: Grant
    Filed: December 23, 2012
    Date of Patent: August 16, 2016
    Assignee: McAfee, Inc.
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith
  • Patent number: 9413785
    Abstract: A method is described in example embodiments below that include receiving a content tag associated with transferring a file over a network connection. A session descriptor may also be received. The session descriptor and the content tag may be correlated with a network policy, which may be applied to the network connection. In some embodiments, the content tag may be received with the session descriptor. The file may be tainted by another file in some embodiments, and the content tag may be associated with other file.
    Type: Grant
    Filed: May 15, 2014
    Date of Patent: August 9, 2016
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Robert Ma
  • Publication number: 20160224792
    Abstract: A method is provided in one example embodiment that includes receiving in an external handler an event notification associated with an event in a virtual partition. A thread in the process in the virtual partition that caused the event can be parked. Other threads and processes may be allowed to resume while a security handler evaluates the event for potential threats. A helper agent within the virtual partition may be instructed to execute a task, such as collecting and assembling event context within the virtual partition, and results based on the task can be returned to the external handler. A policy action can be taken based on the results returned by the helper agent, which may include, for example, instructing the helper agent to terminate the process that caused the event.
    Type: Application
    Filed: March 28, 2016
    Publication date: August 4, 2016
    Applicant: McAfee, Inc.
    Inventors: Gregory W. Dalcher, Jonathan L. Edwards
  • Patent number: 9407653
    Abstract: A particular scan set to be performed on at least a portion of a computing environment is identified. A particular scan engine, in a plurality of scan engines, is identified that is adapted to perform at least one scan in the particular scan set, each scan engine in the plurality of scan engines adapted to perform one or more scans on one or more host devices in the computing environment. A request is sent to the particular scan engine to perform the at least one scan in the particular scan set and scan result data is received from the particular scan engine corresponding to the at least one scan in the particular scan set.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: August 2, 2016
    Assignee: McAfee, Inc.
    Inventors: Ryan Tadashi Nakawatase, James Michael Hugard, IV, Sven Schrecker
  • Publication number: 20160219063
    Abstract: In an example, a context-aware network is disclosed, including threat intelligence services provided over a data exchange layer (DXL). The data exchange layer may be provided on an enterprise service bus, and may include services for classifying objects as malware or not malware. One or more DXL brokers may provide messaging services including, for example, publish-subscribe messaging and request-response messaging. Advantageously, DXL endpoint devices must make very few assumptions about other DXL endpoint devices.
    Type: Application
    Filed: December 19, 2013
    Publication date: July 28, 2016
    Applicant: McAfee, Inc.
    Inventors: Hemang NADKARNI, Sudeep DAS
  • Publication number: 20160212239
    Abstract: In an example, there is disclosed a method or system for merging multiple system trees of different resources based in multiple locations over a data exchange layer. In one embodiment, there is disclosed a system for merging assets of different types within one or more tree-based locations. For example, an end node may be represented in a single location, a single message broker may provide services for and be represented in multiple locations. The asset to asset relationships within merged trees may be used to ensure availability of services and visualization of the system for management purposes.
    Type: Application
    Filed: December 19, 2013
    Publication date: July 21, 2016
    Applicant: McAfee, Inc.
    Inventors: Sudeep Das, Don R. Hanson, II
  • Publication number: 20160212225
    Abstract: In an example, there is disclosed a system and method for providing a service-oriented architecture, including request/response, over a publish/subscribe framework. In one embodiment, a system is disclosed for adding layers upon a publish/subscribe messaging framework for sophisticated messaging such as point-to-point (request/response) and the ability to query for available services, in a reliable, scalable manner.
    Type: Application
    Filed: December 20, 2013
    Publication date: July 21, 2016
    Applicant: McAfee, Inc.
    Inventors: Christopher Smith, Sudeep Das
  • Publication number: 20160212208
    Abstract: To provide a more seamless experience across multiple devices, task streaming systems and methods allow a user to create “task-contexts” and manage metadata of files stored across multiple data storage devices and user preferences associated with capabilities of the multiple devices for operating on the file. Furthermore, the task streaming systems and methods are provided to allow task-contexts to be shared from one device to another device. A task-context specifies one or more files and one or more operations to be performed on the one or more files. By providing a task-context from one device to the other device, a user can accomplish a task with a particular file and seamlessly transition between devices with minimal disruption and effort.
    Type: Application
    Filed: December 14, 2013
    Publication date: July 21, 2016
    Applicant: McAfee, Inc.
    Inventors: Dattatraya KULKARNI, Srikanth NALLURI, Kamlesh HALDER, Kaushal Kr. DHRUW, Shailaja SHANKAR, Venkatasubrahmanyam KRISHNAPUR, Kranthikumar GADDE
  • Publication number: 20160205089
    Abstract: In an example, a web gateway is described, including an authentication proxy engine (PAE). The PAE authenticates a user device via, for example, a username and password, biometric data, or two-factor authentication. The web gateway then provides seamless and transparent single sign-on (SSO) for one or more web services. When the user requests a web page from the web service, the PAE inserts custom code that detects a login action. When the user logs in, a one-time token may be provided to auto-fill the username and password field. When the user submits the form, the PAE provides the actual credentials to the web service. The PAE may also provide authentication via authentication headers.
    Type: Application
    Filed: September 25, 2014
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventors: Alexey Ott, Ulrich Homann, Jan F. Schnellbacher
  • Publication number: 20160205115
    Abstract: According to one example, a system and method are disclosed for malware and grayware remediation. For example, the system is operable to identify applications that have some legitimate behavior but that also exhibit some undesirable behavior. A remediation engine is provided to detect malware behavior in otherwise useful applications, and allow the useful parts of the application to run while blocking the malware behavior. In an example method of “healing,” this may involve modifying the application binary to remove undesirable behavior. In an example method of “personalization,” this may involve inserting control hooks through the operating system to prevent certain subroutines from taking effect.
    Type: Application
    Filed: December 21, 2013
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventors: Dattatraya Kulkarni, Srikanth Nalluri, Raja Sinha, Venkatasubrahmanyam Krishnapur
  • Publication number: 20160205138
    Abstract: In an example, there is disclosed a method and system for real-time policy and task distribution to endpoints over a data exchange layer. According to one embodiment, a persistent point-to-point messaging framework is used to distributed configuration policy and tasks to a distributed, disparate set of devices immediately upon policy definition. Advantageously, the data exchange layer may facilitate delivery of messages even to endpoints that sit, for example, behind a firewall or NAT.
    Type: Application
    Filed: December 19, 2013
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventor: Vijayasree KRISHNAPRASAD
  • Publication number: 20160205142
    Abstract: In an example, a security-connected platform is provided on a data exchange layer (DXL), which provides messaging on a publish-subscribe model. The DXL provides a plurality of DXL endpoints connected via DXL brokers. In one case, DXL endpoints designated as producers are authorized to produce certain types of messages, including security-related messages such as object reputations. Other DXL endpoints are designated as consumers of those messages. A domain master may also be provided, and may be configured to provide physical and logical location services via an asset management engine.
    Type: Application
    Filed: September 28, 2014
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventor: Ofir Arkin
  • Publication number: 20160205071
    Abstract: The present disclosure combines Software Defined Networks (SDN) concepts with Security concepts. The coordination between SDN and Security provides a myriad of advantageous use cases. One exemplary use case involves providing a fast path at network speeds using SDN by routing network traffic to bypass a security appliance once the security appliance determines that the security appliance no longer needs to inspect the network traffic. Another exemplary use case involves remote provisioning of security zones.
    Type: Application
    Filed: December 10, 2013
    Publication date: July 14, 2016
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Howard COOPER, John Richard GUZIK
  • Patent number: 9392016
    Abstract: A system for securing an electronic device may include a memory, a processor; one or more operating systems residing in the memory for execution by the processor; and a security agent configured to execute on the electronic device at a level below all of the operating systems of the electronic device accessing the memory. The security agent may be further configured to: (i) trap attempted accesses to the memory, wherein each of such attempted accesses may, individually or in the aggregate, indicate the presence of self-modifying malware; (ii) in response to trapping each attempted access to the memory, record information associated with the attempted access in a history; and (iii) in response to a triggering attempted access associated with a particular memory location, analyze information in the history associated with the particular memory location to determine if suspicious behavior has occurred with respect to the particular memory location.
    Type: Grant
    Filed: July 10, 2014
    Date of Patent: July 12, 2016
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9391858
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for collecting information of host devices. In one aspect, a method includes transmitting a plurality of information probes to the host device, including an agent probe that queries an agent installed on the host device for a unique agent identifier, monitoring for replies to the information probes from the host device during the host detection phase, ending the host detection phase in response to receiving a reply to the agent probe and that includes the unique agent identifier, resending the plurality of information probes and incrementing a repeat counter in response to not receiving a reply to the agent probe after the expiration of a time period and ending the host detection phase in response to a value of the repeat counter exceeding a maximum repeat value.
    Type: Grant
    Filed: October 6, 2009
    Date of Patent: July 12, 2016
    Assignee: McAfee, Inc.
    Inventors: Srinivasan Narasimhan, Parthiv Hejmadi, Vinod Kumar A. Porwal
  • Publication number: 20160197941
    Abstract: In an example, a threat intelligence controller is configured to operate on a data exchange layer (DXL). The threat intelligence controller acts as a DXL consumer of reputation data for a network object, which may be reported in various different types and from various different sources. Of the devices authorized to act as reputation data producers, each may have its own trust level. As the threat intelligence controller aggregates data from various providers, it may weight the reputation reports according to trust level. The threat intelligence engine thus builds a composite reputation for the object. When it receives a DXL message requesting a reputation for the object, it publishes the composite reputation on the DXL bus.
    Type: Application
    Filed: September 29, 2014
    Publication date: July 7, 2016
    Applicant: MCAFEE INC.
    Inventors: Christopher Smith, Edward T. McDonald, Don R. Hanson, II
  • Patent number: 9384345
    Abstract: An aspect of the present invention relates to methods and systems involving receiving a request for web content from a client computing facility, presenting the web content, and retrieving an indicia of a reputation assessment of the web content and delivering the indicia to the client computing facility in coordination with delivery of the web content to the client computing facility.
    Type: Grant
    Filed: January 26, 2006
    Date of Patent: July 5, 2016
    Assignee: McAfee, Inc.
    Inventors: Christopher John Dixon, Thomas Pinckney
  • Patent number: 9384349
    Abstract: A method for securing an electronic device includes, at a level below all of the operating systems of an electronic device, trapping a first attempt and second attempt to access sensitive system resources of the electronic device. The method also includes identifying the first attempt and second attempt as representing a potential malware attack, comparing the sequence of the first attempt and second attempt against a first anti-malware rule, and, based on the comparison of the sequence of the first attempt and second attempt against the first anti-malware rule, allowing the second attempt. The first attempt and second attempt originate from code of the same operating entity. The first anti-malware rule includes a requirement of a sequence of attempts including the first attempt followed by the second attempt.
    Type: Grant
    Filed: May 21, 2012
    Date of Patent: July 5, 2016
    Assignee: McAfee, Inc.
    Inventors: Aditya Kapoor, Guy Roberts
  • Patent number: 9385991
    Abstract: Disclosed are systems and methods to perform coordinated blocking of source addresses, such as an Internet Protocol (IP) addresses, across a plurality of network appliances (e.g., gateways). In one disclosed embodiment the method and system temporarily alter a configuration of one or more network appliances (based on user defined configuration parameters) to allow communication from a “blocked” IP address for a period of time. A network appliance can then “receive” an email and perform analysis and provide results of the analysis to a reputation service. Thereby, the temporarily allowed communication can be used to learn information about a threat which would not have been available if all communication from that IP address had actually been blocked at the network appliance.
    Type: Grant
    Filed: May 13, 2014
    Date of Patent: July 5, 2016
    Assignee: McAfee, Inc.
    Inventors: Nicholas Liebmann, Raoul Tiddy, Michael Bishop