Patents Assigned to McAfee, Inc.
-
Publication number: 20170370713Abstract: In an example, there is disclosed an apparatus, having a geometry detector; an ambient environment sensor to detect an ambient environment variable; a network interface; and one or more logic elements, including at least one hardware logic element, providing a data engine to: identify a neighbor apparatus via the geometry detector; build an individual positional profile based at least in part on the identifying; and report the ambient environment variable.Type: ApplicationFiled: June 28, 2016Publication date: December 28, 2017Applicant: McAfee, Inc.Inventors: Simon Hunt, Igor Muttik
-
Publication number: 20170374030Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.Type: ApplicationFiled: August 24, 2017Publication date: December 28, 2017Applicant: McAfee, Inc.Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
-
Publication number: 20170374064Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.Type: ApplicationFiled: September 11, 2017Publication date: December 28, 2017Applicant: McAfee, Inc.Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
-
Publication number: 20170366560Abstract: A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. It is determined whether local reputation data for the file is available at the host device for the file. A query is sent to an antimalware support system relating to the file. Particular reputation data is received from the antimalware support system corresponding to the query. It is determined whether to allow the file to be loaded on the host device based at least in part on the particular reputation data.Type: ApplicationFiled: April 3, 2017Publication date: December 21, 2017Applicant: McAfee, Inc.Inventors: John Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
-
Patent number: 9843564Abstract: A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.Type: GrantFiled: November 17, 2014Date of Patent: December 12, 2017Assignee: McAfee, Inc.Inventors: Elad Zucker, Eran Werner, Mattias Weidhagen
-
Patent number: 9832207Abstract: In an example, a computing device may an input verification engine (IVE) that provides input verification services within a trusted execution environment (TEE), including a memory enclave. Taking a Java-based Android application as an example, the IVE securely verifies and validates user inputs for sensitive computing applications, without exposing the inputs to external applications. The IVE may be implemented in native C/C++ or similar, or may provide instructions to dynamically provision an enclave and import a minimal Java Virtual Machine (JVM) into the enclave so that the IVE can run in Java. The IVE may also contain binary analysis tools to analyze an input binary to identify and tag portions that receive user input, so that in a binary translation, those portions can be run within the enclave.Type: GrantFiled: December 23, 2014Date of Patent: November 28, 2017Assignee: McAfee, Inc.Inventors: Dmitri Rubakha, Matthew D. Brinkley
-
Patent number: 9817843Abstract: In an example, one or more computing devices operate to provide a context-aware reputation of a place, such as in relation to a human user. Context may include the user's identity and purpose, as well as environmental factors such as time of day, weather, and political drivers. The device may communicate with a server to receive globalized safety intelligence. When the user enters a zone, the device may determine a context-sensitive reputation, such as “Green,” “Yellow,” or “Red.” Depending on the reputation, the device may then take an appropriate action, such as warning the user or providing additional information.Type: GrantFiled: September 26, 2014Date of Patent: November 14, 2017Assignee: McAfee, Inc.Inventors: Joydeb Mukherjee, Saravana Kumar Subramanian, Raj Vardhan, Rangaswamy Narayana, Shankar Subramanian, Dattatraya Kulkarni, Javed Hasan
-
Patent number: 9817676Abstract: A technique for cognitive protection of a system can include digital and analog sensors to measure or calculate operational parameters of a system. Digital sensors may be used to determine measured or primary operational parameters. The analog sensors are used to measure analog sensor information related to operation of the system. Analog sensor information that is measured may be used to calculate secondary operational parameters that includes the same operating parameters as the primary operational parameters. Lockstep analysis may be used to compare the primary operational parameters with the secondary operational parameters so as to determine a discrepancy in the operational parameters in the system.Type: GrantFiled: June 23, 2015Date of Patent: November 14, 2017Assignee: McAfee, Inc.Inventors: Igor Alan Tatourian, Alex Nayshtut, Oleg Pogorelik, Simon Hunt
-
Patent number: 9811674Abstract: A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system.Type: GrantFiled: September 18, 2015Date of Patent: November 7, 2017Assignee: McAfee, Inc.Inventors: Manabendra Paul, Abhilash Chandran
-
Patent number: 9811663Abstract: A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with hardware assisted virtualization, hardware virtualization features may be used to iteratively unpack a packed executable in a controlled manner without needing knowledge of a packing technique. Once the executable is completely unpacked, malware detection techniques, such as signature scanning, may be employed to determine whether the executable contains malware. Hardware assisted virtualization may be used to facilitate the scanning of the run-time executable in memory.Type: GrantFiled: September 16, 2016Date of Patent: November 7, 2017Assignee: McAfee, Inc.Inventor: Deepak Gupta
-
Patent number: 9811667Abstract: A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a program, and updating the program by adding a new vulnerability to the vulnerability set. More specific embodiments include a program that includes a scan, creating the vulnerability set by generating a query including one or more conditions associated with the vulnerabilities, and creating the vulnerability set by selecting one or more vulnerabilities from a plurality of vulnerabilities. Other embodiments include a program that includes a report template, adding a vulnerability set to the report template by generating a query to include a condition associated with the vulnerability set, running a scan, and generating a report including one or more results from the scan meeting the condition associated with the vulnerability set.Type: GrantFiled: September 21, 2011Date of Patent: November 7, 2017Assignee: McAfee, Inc.Inventors: James M. Hugard, IV, Alexander Lawrence Leroux, Charles Mallabarapu, Jorge Armando Muniz, Braden C. Russell, Zengjue Wu
-
Publication number: 20170316204Abstract: In one or more examples, there is disclosed a system and method of detecting agent presence for self-healing. An out-of-band monitoring process, such as Intel® AMT, or any process in firmware executing on a co-processor, may monitor one or more processes to determine if one goes down or otherwise meets a security criterion. Crashed processes may be reported to an enterprise security controller (ESC). The ESC may notice trends among affected machines and instruct the machines to take appropriate remedial action, such as booting from a remedial image.Type: ApplicationFiled: December 27, 2014Publication date: November 2, 2017Applicant: McAfee, Inc.Inventors: Shashin Thakur, Arvind K. Boggarapu, Harvir Singh
-
Patent number: 9807118Abstract: In an example, there is disclosed a computing apparatus, including: a network interface; one or more logic elements providing a security orchestration server engine operable for: receiving contextual data from a client via a network interface; providing the contextual data to a security orchestration state machine, the security orchestration state machine operable for deriving a policy decision from the contextual data; and receiving the policy decision from the policy orchestration state machine. There is also disclosed one or more tangible, non-transitory computer-readable mediums having stored thereon executable instructions for providing a security orchestration engine, and a method of providing a security orchestration engine.Type: GrantFiled: June 27, 2015Date of Patent: October 31, 2017Assignee: McAfee, Inc.Inventor: Hemang Nadkarni
-
Patent number: 9804948Abstract: A system, method, and computer program product are provided for simulating at least one of a virtual environment and a debugging environment to prevent unwanted code from executing. In use, at least one of a virtual environment and a debugging environment is simulated. Additionally, unwanted code is prevented from executing as a result of the simulation.Type: GrantFiled: June 25, 2014Date of Patent: October 31, 2017Assignee: McAfee, Inc.Inventors: Dirk Kolberg, Lukesh Kumar, Kevin Andrew Gudgion
-
Patent number: 9798559Abstract: In an example, a computing device may include a trusted execution environment (TEE) for executing signed and verified code. The device may receive a trusted binary object in a first form, but the object may need to be converted to a second format, either on-the-fly, or in advance. This may include, for example, a bytecode interpreter, script interpreter, runtime engine, compiler, just-in-time compiler, or other species of binary translator. The binary translator may be run from the TEE, and the output may then be signed by the TEE and treated as a new trusted binary.Type: GrantFiled: December 27, 2014Date of Patent: October 24, 2017Assignee: McAfee, Inc.Inventors: Samir Shah, Ned M. Smith, Jason Martin, Micah J. Sheller, Somnath Chakrabarti, Bin Xing
-
Patent number: 9800468Abstract: Techniques are disclosed for provisioning Internet of Things (IoT) devices in accordance with a state machine model. More particularly, collections of IoT devices may be organized into enclaves, groups or “shoals” that operate as autonomous or semi-autonomous groups of devices functioning as a collective having a common objective or mission. IoT devices participating in a shoal may be provisioned with shoal-specific context information as part of their device-specific provisioning activity. By way of example, a shoal context object can include a current state variable and a target next state variable. The shoal's target next state variable establishes a goal (e.g., for provisioning activity) without dictating how the individual shoal members (IoT device) are to achieve that goal. This mechanism may be used to drive a shoal's separate devices through their individual provisioning state machines until the shoal itself is made operational.Type: GrantFiled: September 16, 2016Date of Patent: October 24, 2017Assignee: McAfee, Inc.Inventors: Ned Smith, Sven Schrecker
-
Patent number: 9800548Abstract: A device, system, and method for defending a computer network are described, network communications are received by a traffic filter, which dynamically determines whether the communications include an anomaly (i.e., are “anomalous” communications), or whether the communications are normal, and do not include an anomaly. The traffic filter routes normal communications to the correct device within its network for servicing he service requested by the communications. The traffic filter routes any anomalous communications to a virtual space engine, which is configured to fake a requested service (e.g., to entice deployment of a malicious payload). Anomalous communications are analyzed using an analytical engine, which can dynamically develop rules for handling anomalous communications in-line, and the rules developed by the analytical engine can be employed by the traffic filter against future received communications.Type: GrantFiled: September 15, 2014Date of Patent: October 24, 2017Assignee: McAfee, Inc.Inventor: Christopher J. Jordan
-
System, method, and computer program product for crawling a website based on a scheme of the website
Patent number: 9798809Abstract: A system, method, and computer program product are provided for crawling a website based on a scheme of the website. In use, a difference between a first content and second content of a website is identified. Additionally, a scheme of the website is identified based on the difference. Furthermore, the website is crawled based on the scheme.Type: GrantFiled: June 5, 2014Date of Patent: October 24, 2017Assignee: McAfee, Inc.Inventor: Gabriel Pack -
Patent number: 9798895Abstract: In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.Type: GrantFiled: September 25, 2014Date of Patent: October 24, 2017Assignee: McAfee, Inc.Inventors: Alex Nayshtur, Ned Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Michael Raziel, Avi Priev, Adi Shaliv, Igor Muttik
-
Publication number: 20170302609Abstract: Particular embodiments described herein provide for system that can be configured to deliver a notification to a user based on the user's preference for each device that receives the notification. The user's preference is based on how the user interacted with similar notifications in the past and the system can change how it will deliver similar notifications to the user in the future based on how the user interacts with the notification.Type: ApplicationFiled: July 2, 2016Publication date: October 19, 2017Applicant: McAfee, Inc.Inventors: Raj Vardhan, Arvind Sankarasubramanian, Kranthi Kumar Gadde, Srikanth Nalluri, Dattatraya Kulkarni