Patents Assigned to McAfee, Inc.
-
Publication number: 20160021129Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 25, 2015Publication date: January 21, 2016Applicant: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Publication number: 20160019392Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: September 25, 2015Publication date: January 21, 2016Applicant: MCAFEE, INC.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9235706Abstract: A method for preventing malware attacks includes the steps of detecting an attempt on an electronic device to access a task scheduler, determining an entity associated with the attempt to access the task scheduler, determining a malware status of the entity, and, based on the malware status of the entity, allowing or denying the attempted access to the task scheduler. The task scheduler is configured to launch one or more applications at a specified time or interval.Type: GrantFiled: December 2, 2011Date of Patent: January 12, 2016Assignee: McAfee, Inc.Inventors: Anil Ramabhatta, Harinath Vishwanath Ramachetty, Nandi Dharma Kishore
-
Patent number: 9237171Abstract: A method is provided in one example embodiment that includes monitoring a first interface, monitoring a second interface, and taking a policy action if the second interface is not executed before the first interface. In more particular embodiments, monitoring the second interface may include walking a call stack associated with the first interface. Moreover, a program context for calling code associated with the second interface may be identified and acted upon.Type: GrantFiled: April 8, 2014Date of Patent: January 12, 2016Assignee: McAfee, Inc.Inventor: Gregory W. Dalcher
-
Publication number: 20160006757Abstract: A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers with a mobile device's operating system to intercept application installation operations. Upon intercepting an attempted installation operation, the shim application identifies the application seeking to be installed, generates a key uniquely identifying the application, and transmits the key over a network connection to a back-end server. The back-end server may be configured to crawl the Internet to identify malicious applications and compile and maintain a database of such applications. Upon receiving a key from the shim application, the back-end server can search its database to locate a matching application and, if found, respond to the mobile device with the application's status (e.g., malicious or not). The shim application can utilize this information to allow or block installation of the application.Type: ApplicationFiled: September 11, 2015Publication date: January 7, 2016Applicant: McAfee, Inc.Inventors: Sudeep Das, Jayasankar Divakarla, Pramod Sharma
-
Patent number: 9231976Abstract: An apparatus, computer readable medium, and method are provided in one example embodiment and include a network device, an analysis module, and a tag module. The analysis module may be configured to perform a number of actions on the network data to identify network information about the network data. The tag module may be configured to determine whether a destination for the network data is within a set of destinations; and responsive to a determination that the destination for the network data is within the set of destinations: generate a metadata tag based on the network information, associate the metadata tag with the network data, and transmit the network information and the metadata tag.Type: GrantFiled: March 15, 2013Date of Patent: January 5, 2016Assignee: McAfee, Inc.Inventors: Shivakumar Buruganahalli, Manuel Nedbal
-
Publication number: 20150379264Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to determine a series of checksums for a file, compare the series of checksums to a checksum tree, where the checksum tree includes a plurality of nodes that each include a fuzzy checksum of known malware, and assign one or more classifications to the file, where each of the one or more classifications is based on each node of the checksum tree that matches a checksum in the series of checksums and includes whether the file includes malware or benign checksums.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Applicant: McAfee, Inc.Inventors: Christoph Alme, Slawa Hahn, Sebastian Thoene
-
Publication number: 20150381658Abstract: A tracking station detects a mobile data processing system (DPS) within communication range of a short range wireless module of the tracking station. In response to detecting the mobile DPS, the tracking station obtains identification data for the mobile DPS from a security module of the mobile DPS. The tracking station uses the identification data to obtain credentials to access secure storage on the mobile DPS. The tracking station automatically generates security configuration data for the mobile DPS, based on multiple factors pertaining to the mobile DPS, such as identity of the mobile DPS, a location of the mobile DPS, capabilities of the mobile DPS, etc. The tracking station uses the credentials to write the security configuration data to the secure storage of the mobile DPS. The security configuration data calls for the mobile DPS to automatically disable or enable at least one component. Other embodiments are described and claimed.Type: ApplicationFiled: December 4, 2014Publication date: December 31, 2015Applicant: McAfee, Inc.Inventors: Rajesh Poornachandran, Shahrokh Shahidzadeh, Sudeep Das, Vincent J. Zimmer, Sumant Vashisth, Pramod Sharma
-
Publication number: 20150382191Abstract: In an example, an audio stream such as a voice call or live-streaming service may have mixed therein a user identification, which may identify the user as an authorized participant in the audio stream. For example, a user may identify himself to a smart phone, and then initiate a call with his bank. The smart phone may mix a user identification into the voice stream. A receiving device at the bank may demix the identification, and determine that the user is authorized to call about this account. In another example, identification may be used for DRM purposes, to identify a user as a legitimate participant in an audio stream. When a user is not authorized, an appropriate action may be taken, such as dropping the user, degrading the quality of the audio stream, or providing a notification that the user is not authorized.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Applicant: McAfee, Inc.Inventor: Igor Muttik
-
Patent number: 9223874Abstract: A first user computing device is identified as being collocated with a second user computing device and an invitation is sent over a wireless communication channel for delivery to the first user computing device. The invitation invites the first user computing device to join a collaborative search session with the second user computing device. A first one of a plurality of search contexts is selected for use by the second user computing device within the collaborative search session. The first user computing device uses a second, different one of the plurality of search contexts during the collaborative search session, and presentations of search results within the collaborative search session are organized according to the first search context on the second user computing device and organized according to the second search context on the first user computing device.Type: GrantFiled: November 10, 2014Date of Patent: December 29, 2015Assignee: McAfee, Inc.Inventor: Derek Patton Pearcy
-
Publication number: 20150373542Abstract: A first communication device is detected as being substantially collocated with a second communication device using a short-range wireless network. A connection is established between the first and second communication devices over the short-range wireless network. In some instances, authentication data can be sent from the second communication device to the first communication device to authenticate a user to the first communication device. Further, input is received from the first communication device over the short-range wireless network specifying a telephone number for a telephone call using the second communication device. A connection is established between the second communication device and a cellular base station to initiate the telephone call with a third communication device associated with the telephone number. In some instances, the second communication device is a wireless headset device.Type: ApplicationFiled: August 31, 2015Publication date: December 24, 2015Applicant: McAfee, Inc.Inventor: Sven Schrecker
-
Publication number: 20150365380Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.Type: ApplicationFiled: August 17, 2015Publication date: December 17, 2015Applicant: MCAFEE, INC.Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
-
Publication number: 20150363598Abstract: A method is provided in one example embodiment and includes initiating an execution of a compiled script, evaluating a function called in the compiled script, detecting an execution event based on at least a first criterion, and storing information associated with the execution event in an execution event queue. The method also includes verifying a correlation signature based on information associated with at least one execution event in the execution event queue. In specific embodiments, the method includes evaluating an assignment statement of a script during compilation of the script by a compiler, detecting a compilation event based on at least a second criterion, and storing information associated with the compilation event in a compilation event queue. In yet additional embodiments, the verification of the correlation signature is based in part on information associated with one or more compilation events in the compilation event queue.Type: ApplicationFiled: January 16, 2014Publication date: December 17, 2015Applicant: MCAFEE, INC.Inventors: Chong XU, Bing SUN, Navtej SINGH, Yichong LIN, Zheng BU
-
Patent number: 9215197Abstract: A system, method, and computer program product are provided for preventing data loss associated with an image. In use, an image is identified, and it is determined whether the image includes predetermined data. In addition, an action is performed based on the determination, for preventing data loss.Type: GrantFiled: March 24, 2012Date of Patent: December 15, 2015Assignee: McAfee, Inc.Inventors: Prasanna Ganapathi Basavapatna, Gopi Krishna Chebiyyam
-
Patent number: 9210111Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.Type: GrantFiled: December 25, 2012Date of Patent: December 8, 2015Assignee: McAfee, Inc.Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
-
Patent number: 9210193Abstract: An example method includes capturing session attributes associated with a communication session initiated by a node in a network environment, querying external attributes associated with the node, deriving a response attribute according to an access control policy rule based on at least one of the session attributes and at least one of the external attributes, and applying the response attribute to the communication session. The session attributes can include remote authentication dial in user service RADIUS vendor specific attribute information from an unknown vendor. The method may further include auditing the communication session, enforcing the response attribute, or ignoring the access control policy. Enforcing the response attribute can include taking an access control action according to the response attribute. The access control action may include allowing the node to access a virtual local area network in the network environment, denying access to the network environment, etc.Type: GrantFiled: September 24, 2014Date of Patent: December 8, 2015Assignee: McAfee, Inc.Inventors: Manuel Nedbal, Manoj Ahluwalia, Charles Slate
-
Publication number: 20150347755Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: ApplicationFiled: May 11, 2015Publication date: December 3, 2015Applicant: MCAFEE, INC.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9202048Abstract: A method for analyzing a computing system includes the steps of at a first moment in time, scanning the resources of the computing system for indications of malware, at a second moment in time scanning the resources of the computing system for indications of malware and determining the system executable objects loaded on the computing system, determining malware system changes, identifying a relationship between the malware system changes and the system executable objects loaded on the computing system, and identifying as suspected malware the system executable objects loaded on the computing system which have a relationship with the malware system changes. The malware system changes include differences between the results of scanning the resources of the computing system for indications of malware at the second and first moment of time.Type: GrantFiled: November 5, 2012Date of Patent: December 1, 2015Assignee: McAfee, Inc.Inventor: Ahmed Said Sallam
-
Patent number: 9195937Abstract: A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for the state request. The method further includes reproducing the state if it is not in the dictionary and adding a new state to the dictionary. In more specific embodiments, the method includes compiling a rule, based on the state, into a given state table. The rule affects data management for one or more documents that satisfy the rule. In yet other embodiments, the method includes determining that the state represents a final state such that a descriptor is added to the state. In one example, if the state is not referenced in the algorithm, then the state is released. If the state is referenced in the algorithm, then the state is replaced with the new state.Type: GrantFiled: March 30, 2012Date of Patent: November 24, 2015Assignee: McAfee, Inc.Inventors: William Deninger, Ratinder Paul Singh Ahuja, Lee C. Cheung
-
Patent number: D746832Type: GrantFiled: September 30, 2013Date of Patent: January 5, 2016Assignee: McAfee, Inc.Inventors: Derek Patton Pearcy, Jessica J. Gaskins, Jessica A. Heinrich