Patents Assigned to McAfee, Inc.
  • Patent number: 9122877
    Abstract: A method is provided in one example embodiment and includes receiving a reputation value based on a hash of a file making a network connection and on a network address of a remote end of the network connection. The network connection may be blocked if the reputation value indicates the hash or the network address is associated with malicious activity. In more specific embodiments, the method may also include sending a query to a threat analysis host to request the reputation value. Additionally or alternatively the reputation value may be based on query patterns in particular embodiments. In yet more specific embodiments, the network connection may be an inbound connection and/or an outbound connection, and the reputation value may be based on a file reputation associated with the hash and a connection reputation associated with the network address of the remote end of the network connection.
    Type: Grant
    Filed: March 21, 2011
    Date of Patent: September 1, 2015
    Assignee: McAfee, Inc.
    Inventors: Dmitri Alperovitch, Sven Krasser
  • Patent number: 9112830
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Grant
    Filed: February 23, 2011
    Date of Patent: August 18, 2015
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
  • Patent number: 9112896
    Abstract: A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: August 18, 2015
    Assignee: McAfee, Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Satish Kumar Gaddala, Sven Schrecker, David Moshe Goldschlag
  • Patent number: 9106478
    Abstract: A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another portion of the data.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: August 11, 2015
    Assignee: MCAFEE, INC.
    Inventors: Stephen Owen Hearnden, Martin J. Lucas, Christopher M. Hinton, Nicolas K. Wilson
  • Patent number: 9106680
    Abstract: A method is provided in one example embodiment that includes generating a fingerprint based on properties extracted from data packets received over a network connection and requesting a reputation value based on the fingerprint. A policy action may be taken on the network connection if the reputation value received indicates the fingerprint is associated with malicious activity. The method may additionally include displaying information about protocols based on protocol fingerprints, and more particularly, based on fingerprints of unrecognized protocols. In yet other embodiments, the reputation value may also be based on network addresses associated with the network connection.
    Type: Grant
    Filed: June 27, 2011
    Date of Patent: August 11, 2015
    Assignee: McAfee, Inc.
    Inventors: Dmitri Alperovitch, Zheng Bu, David Frederick Diehl, Sven Krasser
  • Patent number: 9092624
    Abstract: A system, method, and computer program product are provided for conditionally performing a scan of data based on an associated data structure. In use, at least one aspect is identified for each of a first plurality of scanners utilized to perform a scan on data at a first network device. Additionally, at least one data structure is associated with the data, where the at least one data structure reflects the at least one aspect of each of the first plurality of scanners. Furthermore, a subsequent scan on the data is conditionally performed utilizing each of a second plurality of scanners at a second network device, based on the at least one data structure.
    Type: Grant
    Filed: October 1, 2012
    Date of Patent: July 28, 2015
    Assignee: McAfee, Inc.
    Inventors: Deepakeswaran Kolingivadi, Muthu Nivas Hariharasubramanian
  • Patent number: 9094338
    Abstract: A system and method for capturing objects and balancing systems resources in a capture system are described. An object is captured, metadata associated with the objected generated, and the object and metadata stored.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: July 28, 2015
    Assignee: McAFEE, INC.
    Inventors: Ratinder Paul Singh Ahuja, William Deninger, Erik de la Iglesia, Rick Lowe
  • Patent number: 9092471
    Abstract: In one embodiment of the present invention, a rule compiler can compress a plurality of rules to be parsed over a block of data into one state table tree structure. In one embodiment of the present invention, rue parsing over the block of data includes selecting a unit of the block of data, indexing into a state table of the state table tree using the selected unit. The state table indexed into can be used for determining whether a decision regarding the block of data can be reached based on the indexed entry, and for selecting a next state table indicated by the indexed entry if the decision regarding the block of data cannot be reached.
    Type: Grant
    Filed: February 14, 2014
    Date of Patent: July 28, 2015
    Assignee: McAfee, Inc.
    Inventors: Erik de la Iglesia, William J. Deninger
  • Patent number: 9094434
    Abstract: A prevention-based network auditing system includes a central compliance server providing a user interface allowing a user to schedule and configure a network audit. The configured audit is stored in an audit repository until its scheduled time. At such a time, the compliance server automatically invokes one or more audit servers to gather information about the network. The compliance server receives the gathered information and electronically applies a network policy to the information for determining compliance with the policy. A remediation task may be generated if the policy has been violated, and the task monitored until its completion.
    Type: Grant
    Filed: August 26, 2013
    Date of Patent: July 28, 2015
    Assignee: McAfee, Inc.
    Inventors: John Leslie Williams, Brian Costello, John Patrick Ravenel, Stephen J. Ritter, John Pelly, M. Celeste Rutherford, John Payne
  • Patent number: 9087199
    Abstract: In one embodiment, a system for launching a security architecture includes an electronic device comprising a processor and one or more operating systems, a security agent, and a launching module. The launching module comprises a boot manager and a secured launching agent. The boot manager is configured to boot the secured launching agent before booting the operating systems, and the secured launching agent is configured to load a security agent. The security agent is configured to execute at a level below all operating systems of the electronic device, intercept a request to access a resource of the electronic device, the request originating from the operational level of one of one or more operating systems of the electronic device, and determine if a request is indicative of malware. In some embodiments, the secured launching agent may be configured to determine whether the security agent is infected with malware prior to loading the security agent.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: July 21, 2015
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9077684
    Abstract: A system, method, and computer program product are provided for determining whether an electronic mail message is compliant with an etiquette policy. In use, a predetermined event associated with an electronic mail message is identified. Additionally, it is determined whether the electronic mail message is compliant with an etiquette policy, in response to the predetermined event. Furthermore, a reaction is performed, based on the determination.
    Type: Grant
    Filed: August 6, 2008
    Date of Patent: July 7, 2015
    Assignee: McAfee, Inc.
    Inventor: Gopi Krishna Chebiyyam
  • Patent number: 9075993
    Abstract: A method in one embodiment includes determining a frequency range corresponding to a subset of a plurality of program files on a plurality of hosts in a network environment. The method also includes generating a first set of counts including a first count that represents an aggregate amount of program files in a first grouping of one or more program files of the subset, where each of the one or more program files of the first grouping includes a first value of a primary attribute. In specific embodiments, each program file is unknown. In further embodiments, the primary attribute is one of a plurality of file attributes provided in file metadata. Other specific embodiments include either blocking or allowing execution of each of the program files of the first grouping. More specific embodiments include determining a unique identifier corresponding to at least one program file of the first grouping.
    Type: Grant
    Filed: January 24, 2011
    Date of Patent: July 7, 2015
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, David P. Reese, Jr.
  • Patent number: 9069960
    Abstract: A system, method, and computer program product are provided for avoiding an on-access scan of data after an on-demand scan of the data. In use, an on-demand scan is performed on data accessible by a collaborative portal application. Further, an on-access scan of the data is avoided, after the on-demand scan.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: June 30, 2015
    Assignee: McAfee, Inc.
    Inventor: Basant Kumar
  • Patent number: 9069586
    Abstract: A system and method for rootkit protection in a hypervisor environment includes modules for creating a soft whitelist having entries corresponding to each guest kernel page of a guest operating system in a hypervisor environment, wherein each entry is a duplicate page of the corresponding guest kernel page, generating a page fault when a process attempts to access a guest kernel page, and redirecting the process to the corresponding duplicate page. If the page fault is a data page fault, the method includes fixing the page fault, and marking a page table entry corresponding to the guest kernel page as non-executable and writeable. If the page fault is an instruction page fault, the method includes marking a page table entry corresponding to the guest kernel page as read-only. Redirecting changing a machine page frame number in a shadow page table of the hypervisor to point to the corresponding duplicate page.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: June 30, 2015
    Assignee: McAfee, Inc.
    Inventors: Amit Dang, Preet Mohinder, Vivek Srivastava
  • Patent number: 9058486
    Abstract: A particular activity performed by a particular user of a computing device is identified, for instance, by an agent installed on the computing device. It is determined that the particular activity qualifies as a particular use violation in a plurality of pre-defined use violations. A behavioral risk score for the particular score for the user is determined based at least in part on the determination that the particular activity of the particular user qualifies as a particular use violation. Determining that the particular activity qualifies as a particular use violation can include determining that the particular activity violates a particular rule or event trigger corresponding to a particular pre-defined use violation.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: June 16, 2015
    Assignee: McAfee, Inc.
    Inventors: Michael Mason Moyle, Prasanna Ganapathi Basavapatna, Sven Schrecker
  • Publication number: 20150161381
    Abstract: By injecting bytecode into a predetermined method of a sandbox environment, an application that uses an exploit to attempt to escape from the sandbox environment may be detected without knowledge of the application or the exploit used to attempt to escape from the sandbox environment. Upon indicating that the application has escaped the sandbox, the application may be terminated or the escape may be reported, allowing further monitoring of the application.
    Type: Application
    Filed: December 5, 2013
    Publication date: June 11, 2015
    Applicant: McAfee, Inc.
    Inventors: Bing Sun, Xiaobo Chen, Chong Xu, Hirosh Joseph
  • Patent number: 9055098
    Abstract: A network adapter system and associated method are provided. The network adapter system includes a processor positioned on a network adapter coupled between a computer and a network. Such processor is configured for scanning network traffic transmitted between the computer and the network.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: June 9, 2015
    Assignee: McAfee, Inc.
    Inventors: Anton C. Rothwell, William R. Dennis, Luke D. Jagger
  • Patent number: 9049235
    Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
  • Patent number: 9049118
    Abstract: A first sensor transmits one or more probes to a host device identified on a network, each probe used to obtain information regarding the host and the plurality of probes are prioritized according to probe type. A set of replies to the plurality of probes are received and it is determined that a first of the plurality of probes is the highest priority probe for which a reply from the host device was received. A second probe transmitted by a second sensor is identified as the highest priority probe for which a reply from the host device was received by the second sensor, where the first sensor is designated as a primary sensor and the second sensor is designated as a secondary sensor. Respective priorities of the probe types of the first and second probes are compared to determine whether to perform a probe handover to the second sensor.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventor: Srinivasan Narasimhan
  • Patent number: 9049171
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Grant
    Filed: February 23, 2011
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan