Patents Assigned to McAfee, Inc.
  • Patent number: 9049235
    Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
  • Patent number: 9043918
    Abstract: A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.
    Type: Grant
    Filed: October 13, 2011
    Date of Patent: May 26, 2015
    Assignee: McAfee, Inc.
    Inventors: Rajbir Bhattacharjee, Balbir Singh
  • Patent number: 9038176
    Abstract: A system for protecting an electronic device against malware includes a memory, an operating system configured to execute on the electronic device, and a below-operating-system security agent. The below-operating-system security agent is configured to trap an attempted access of a resource of the electronic device, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic device accessing the memory. The attempted access includes attempting to write instructions to the memory and attempting to execute the instructions.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: May 19, 2015
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9037668
    Abstract: A system, method, and computer program product are provided for scanning an electronic message for unwanted content and associated unwanted sites in response to a request. In use, a request is received via a network to scan an electronic message prior to opening the electronic message, utilizing an electronic message manager. In addition, the electronic message is scanned for unwanted content and associated unwanted sites, in response to the request. Further, a response to the request is sent via the network.
    Type: Grant
    Filed: November 19, 2013
    Date of Patent: May 19, 2015
    Assignee: McAfee, Inc.
    Inventors: Paul Nicholas Gartside, George L. Heron, Christopher S. Bolin
  • Patent number: 9032523
    Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: May 12, 2015
    Assignee: McAfee, Inc.
    Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
  • Patent number: 9032514
    Abstract: A reporting system, method, and computer program product are provided with respect to occurrences of potential data leakage. In use, a plurality of occurrences of potential data leakage is identified based on user behavior. In addition, a report is provided based on a determination of whether an aspect of the plurality of occurrences exceeds a predetermined threshold.
    Type: Grant
    Filed: August 21, 2007
    Date of Patent: May 12, 2015
    Assignee: McAfee, Inc.
    Inventors: Srinivasan Sankararaman, Deepakeswaran Kolingivadi
  • Patent number: 9032525
    Abstract: A system for protecting an electronic system against malware includes an operating system configured to execute on the electronic device, a driver coupled to the operating system, and a below-operating-system security agent. The below-operating-system security agent is configured to identify one or more resources for changing filters of the driver, trap an attempted access of the one or more resources that originates from the operational level of the operating system, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic system accessing the one or more resources for changing filters of the driver.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: May 12, 2015
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9027132
    Abstract: A system, method and computer program product are provided. In use, execution of a portion of internal code of an interface is identified. Further, in response to the execution of the portion of internal code, at least one aspect of an invocation of the interface is monitored and/or analyzed.
    Type: Grant
    Filed: September 30, 2013
    Date of Patent: May 5, 2015
    Assignee: McAfee, Inc.
    Inventor: Gregory William Dalcher
  • Patent number: 9026784
    Abstract: An example method includes identifying a transport layer security (TLS) session between a client and a server, parsing one or more TLS messages to identify a session ticket associated with the session, transforming the session ticket into a fixed size session token, and managing the session using the session token to identify the session. The transforming may include computing a hash value of the session ticket using a hashing algorithm. If any of the TLS messages is spread across more than one TLS protocol record, the method can include computing a hash value of a portion of the session ticket encountered in a TLS protocol record using a hashing algorithm, incrementally computing another hash value of another portion of the session ticket encountered in a subsequent TLS protocol record from the previously computed hash value, and repeating the incremental computing until portions of the session ticket have been processed.
    Type: Grant
    Filed: January 26, 2012
    Date of Patent: May 5, 2015
    Assignee: McAfee, Inc.
    Inventors: Shivakumar Buruganahalli, Venu Vissamsetty
  • Patent number: 9021595
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats, vulnerability detection data for assets, and countermeasure detection data for assets. The method further includes determining a respective risk metric for each of the assets for each of the threats. This includes analyzing the vulnerability detection data for an asset to determine whether the asset is vulnerable to a threat, determining from the threat definition data and the countermeasure detection data whether the asset is protected by one of the countermeasures identified for the threat, and determining the risk metric for the asset for the threat according to whether the asset is vulnerable to the threat and whether the asset is protected by one of the countermeasures identified for the threat.
    Type: Grant
    Filed: July 23, 2013
    Date of Patent: April 28, 2015
    Assignee: McAfee, Inc.
    Inventors: Sven Schrecker, Stephen Ritter, Ryan Nakawatase
  • Publication number: 20150113650
    Abstract: A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded on an electronic device, determining that one or more of the shared libraries include suspicious shared libraries by determining that the shared library is associated with indications that the shared library may have been maliciously injected, loaded, and/or operating on the electronic device, and identifying the suspicious shared libraries to a reputation server.
    Type: Application
    Filed: December 23, 2014
    Publication date: April 23, 2015
    Applicant: MCAFEE, INC.
    Inventor: AHMED S. SALLAM
  • Patent number: 9015793
    Abstract: A management controller of a computing device is identified on a network and queried for attributes of the computing device. The management controller is securely implemented in hardware of the computing device and is independent of a central processing unit (CPU) of the computing device. Data is received from the management controller that identifies one or more attributes of the computing device. A security policy of the network is implemented for the computing device based on the one or more attributes.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: April 21, 2015
    Assignee: McAfee, Inc.
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker
  • Patent number: 9015829
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for responding to an attempt to disable a malware protection program and performing an identification process and one or more protection processes to prevent the execution of potentially malicious code. In one aspect, a method includes monitoring for attempts to disable a malware protection program, identifying a process that generated an attempt to disable the malware protection program, determining whether the process is an approved process, and in response, performing one or more protection processes on the process so as to prevent the execution of potentially malicious code.
    Type: Grant
    Filed: October 20, 2009
    Date of Patent: April 21, 2015
    Assignee: McAfee, Inc.
    Inventors: Nandi Dharma Kishore, Anil Bhadrarajapura Ramabhatta, Harinath Vishwanath Ramchetty
  • Patent number: 9015472
    Abstract: Systems and methods for marking electronic messages to indicate human origination are provided. According to one embodiment, an electronic message and information verifying the electronic message is human originated are received. Then, the fact that the electronic message is human originated is conveyed to one or more recipients of the electronic message by associating with the electronic message a human origination indication.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: April 21, 2015
    Assignee: McAfee, Inc.
    Inventor: C. Scott Chasin
  • Patent number: 9009321
    Abstract: Methods and systems for assigning reputation to communications entities include collecting communications data from distributed agents, aggregating the communications data, analyzing the communications data and identifying relationships between communications entities based upon the communications data.
    Type: Grant
    Filed: June 4, 2012
    Date of Patent: April 14, 2015
    Assignee: McAfee, Inc.
    Inventors: Dmitri Alperovitch, Tomo Foote-Lennox, Jeremy Gould, Paula Greve, Alejandro Manuel Hernandez, Paul Judge, Sven Krasser, Tim Lange, Phyllis Adele Schneck, Martin Stecher, Yuchun Tang, Aarjav Jyotindra Neeta Trivedi, Lamar Lorenzo Willis, Weilai Yang, Jonathan Alexander Zdziarski
  • Patent number: 9003314
    Abstract: A system, method, and computer program product are provided for detecting unwanted data based on an analysis of an icon. In use, an icon is analyzed. Furthermore, unwanted data is detected based on the analysis.
    Type: Grant
    Filed: August 6, 2008
    Date of Patent: April 7, 2015
    Assignee: McAfee, Inc.
    Inventors: Alexander James Hinchliffe, Oliver Georges Devane, Lee Codel Lawson Tarbotton
  • Patent number: 9002771
    Abstract: A system, method, and computer program product are provided for applying a rule to associated events. In use, a plurality of events is associated based on at least one identifier. Additionally, at least one rule is applied to the associated events. Further, a reaction is performed based on the application of the at least one rule.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: April 7, 2015
    Assignee: McAfee, Inc.
    Inventors: Paul Nicholas Gartside, Michael G. Bishop
  • Patent number: 9003501
    Abstract: A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is received at an electronic device from a remote device via a network and a loop operation is detected in the script that contains a write operation operable to write data to a memory of the electronic device. The amount of the data operable to be written to the memory by the write operation is determined and the data is prevented from being written to the memory if the amount of the data is greater than or equal to a threshold.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: April 7, 2015
    Assignee: McAfee, Inc.
    Inventors: J. McEnroe Samuel Navaraj, Rahul C. Kashyap
  • Patent number: 8997234
    Abstract: A system and method in one embodiment includes modules for identifying an asset with a vulnerability risk, identifying a service running on a port on the asset, identifying a connection to the port, calculating an operational dependence role of the asset as a function of the service and the connection, and modifying the vulnerability risk based on the operational dependence role. Other embodiments include identifying a protocol of a data packet at the port, classifying the protocol into a protocol category with a protocol importance score, calculating a connection average for the asset, classifying the connection average into a connection category with a connection score, and calculating a service dependence score. Other embodiments include calculating a host dependence score, assigning a data importance score to data communicated by the asset, and calculating the operational dependence role as a function of the host dependence score and data importance score.
    Type: Grant
    Filed: July 27, 2011
    Date of Patent: March 31, 2015
    Assignee: McAfee, Inc.
    Inventors: Stuart McClure, Michael Morgan Price
  • Patent number: 8990723
    Abstract: A system, method and computer program product are provided for managing a plurality of applications via a single interface. It is initially identified as to which of a plurality of applications are installed on a computer. A status of each of the applications is then presented via a single graphical user interface.
    Type: Grant
    Filed: December 13, 2002
    Date of Patent: March 24, 2015
    Assignee: McAfee, Inc.
    Inventors: Brent J. Lymer, Atri Chatterjee