Patents Assigned to McAfee, Inc.
  • Publication number: 20170370713
    Abstract: In an example, there is disclosed an apparatus, having a geometry detector; an ambient environment sensor to detect an ambient environment variable; a network interface; and one or more logic elements, including at least one hardware logic element, providing a data engine to: identify a neighbor apparatus via the geometry detector; build an individual positional profile based at least in part on the identifying; and report the ambient environment variable.
    Type: Application
    Filed: June 28, 2016
    Publication date: December 28, 2017
    Applicant: McAfee, Inc.
    Inventors: Simon Hunt, Igor Muttik
  • Publication number: 20170374030
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Application
    Filed: August 24, 2017
    Publication date: December 28, 2017
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Publication number: 20170374064
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Application
    Filed: September 11, 2017
    Publication date: December 28, 2017
    Applicant: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Publication number: 20170366560
    Abstract: A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. It is determined whether local reputation data for the file is available at the host device for the file. A query is sent to an antimalware support system relating to the file. Particular reputation data is received from the antimalware support system corresponding to the query. It is determined whether to allow the file to be loaded on the host device based at least in part on the particular reputation data.
    Type: Application
    Filed: April 3, 2017
    Publication date: December 21, 2017
    Applicant: McAfee, Inc.
    Inventors: John Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
  • Patent number: 9843564
    Abstract: A method and system for securing data in a computer system provides the capability to secure information even when it leaves the boundaries of the organization using a data loss agent integrated with encryption software. A method for securing data in a computer system comprises detecting attempted connection or access to a data destination to which sensitive data may be written, determining an encryption status of the data destination, allowing the connection or access to the data destination when the data destination is encrypted, and taking action to secure the sensitive data when the data destination is not encrypted.
    Type: Grant
    Filed: November 17, 2014
    Date of Patent: December 12, 2017
    Assignee: McAfee, Inc.
    Inventors: Elad Zucker, Eran Werner, Mattias Weidhagen
  • Patent number: 9832207
    Abstract: In an example, a computing device may an input verification engine (IVE) that provides input verification services within a trusted execution environment (TEE), including a memory enclave. Taking a Java-based Android application as an example, the IVE securely verifies and validates user inputs for sensitive computing applications, without exposing the inputs to external applications. The IVE may be implemented in native C/C++ or similar, or may provide instructions to dynamically provision an enclave and import a minimal Java Virtual Machine (JVM) into the enclave so that the IVE can run in Java. The IVE may also contain binary analysis tools to analyze an input binary to identify and tag portions that receive user input, so that in a binary translation, those portions can be run within the enclave.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: November 28, 2017
    Assignee: McAfee, Inc.
    Inventors: Dmitri Rubakha, Matthew D. Brinkley
  • Patent number: 9817843
    Abstract: In an example, one or more computing devices operate to provide a context-aware reputation of a place, such as in relation to a human user. Context may include the user's identity and purpose, as well as environmental factors such as time of day, weather, and political drivers. The device may communicate with a server to receive globalized safety intelligence. When the user enters a zone, the device may determine a context-sensitive reputation, such as “Green,” “Yellow,” or “Red.” Depending on the reputation, the device may then take an appropriate action, such as warning the user or providing additional information.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: November 14, 2017
    Assignee: McAfee, Inc.
    Inventors: Joydeb Mukherjee, Saravana Kumar Subramanian, Raj Vardhan, Rangaswamy Narayana, Shankar Subramanian, Dattatraya Kulkarni, Javed Hasan
  • Patent number: 9817676
    Abstract: A technique for cognitive protection of a system can include digital and analog sensors to measure or calculate operational parameters of a system. Digital sensors may be used to determine measured or primary operational parameters. The analog sensors are used to measure analog sensor information related to operation of the system. Analog sensor information that is measured may be used to calculate secondary operational parameters that includes the same operating parameters as the primary operational parameters. Lockstep analysis may be used to compare the primary operational parameters with the secondary operational parameters so as to determine a discrepancy in the operational parameters in the system.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: November 14, 2017
    Assignee: McAfee, Inc.
    Inventors: Igor Alan Tatourian, Alex Nayshtut, Oleg Pogorelik, Simon Hunt
  • Patent number: 9811674
    Abstract: A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system.
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: November 7, 2017
    Assignee: McAfee, Inc.
    Inventors: Manabendra Paul, Abhilash Chandran
  • Patent number: 9811663
    Abstract: A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with hardware assisted virtualization, hardware virtualization features may be used to iteratively unpack a packed executable in a controlled manner without needing knowledge of a packing technique. Once the executable is completely unpacked, malware detection techniques, such as signature scanning, may be employed to determine whether the executable contains malware. Hardware assisted virtualization may be used to facilitate the scanning of the run-time executable in memory.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: November 7, 2017
    Assignee: McAfee, Inc.
    Inventor: Deepak Gupta
  • Patent number: 9811667
    Abstract: A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a program, and updating the program by adding a new vulnerability to the vulnerability set. More specific embodiments include a program that includes a scan, creating the vulnerability set by generating a query including one or more conditions associated with the vulnerabilities, and creating the vulnerability set by selecting one or more vulnerabilities from a plurality of vulnerabilities. Other embodiments include a program that includes a report template, adding a vulnerability set to the report template by generating a query to include a condition associated with the vulnerability set, running a scan, and generating a report including one or more results from the scan meeting the condition associated with the vulnerability set.
    Type: Grant
    Filed: September 21, 2011
    Date of Patent: November 7, 2017
    Assignee: McAfee, Inc.
    Inventors: James M. Hugard, IV, Alexander Lawrence Leroux, Charles Mallabarapu, Jorge Armando Muniz, Braden C. Russell, Zengjue Wu
  • Publication number: 20170316204
    Abstract: In one or more examples, there is disclosed a system and method of detecting agent presence for self-healing. An out-of-band monitoring process, such as Intel® AMT, or any process in firmware executing on a co-processor, may monitor one or more processes to determine if one goes down or otherwise meets a security criterion. Crashed processes may be reported to an enterprise security controller (ESC). The ESC may notice trends among affected machines and instruct the machines to take appropriate remedial action, such as booting from a remedial image.
    Type: Application
    Filed: December 27, 2014
    Publication date: November 2, 2017
    Applicant: McAfee, Inc.
    Inventors: Shashin Thakur, Arvind K. Boggarapu, Harvir Singh
  • Patent number: 9807118
    Abstract: In an example, there is disclosed a computing apparatus, including: a network interface; one or more logic elements providing a security orchestration server engine operable for: receiving contextual data from a client via a network interface; providing the contextual data to a security orchestration state machine, the security orchestration state machine operable for deriving a policy decision from the contextual data; and receiving the policy decision from the policy orchestration state machine. There is also disclosed one or more tangible, non-transitory computer-readable mediums having stored thereon executable instructions for providing a security orchestration engine, and a method of providing a security orchestration engine.
    Type: Grant
    Filed: June 27, 2015
    Date of Patent: October 31, 2017
    Assignee: McAfee, Inc.
    Inventor: Hemang Nadkarni
  • Patent number: 9804948
    Abstract: A system, method, and computer program product are provided for simulating at least one of a virtual environment and a debugging environment to prevent unwanted code from executing. In use, at least one of a virtual environment and a debugging environment is simulated. Additionally, unwanted code is prevented from executing as a result of the simulation.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: October 31, 2017
    Assignee: McAfee, Inc.
    Inventors: Dirk Kolberg, Lukesh Kumar, Kevin Andrew Gudgion
  • Patent number: 9798559
    Abstract: In an example, a computing device may include a trusted execution environment (TEE) for executing signed and verified code. The device may receive a trusted binary object in a first form, but the object may need to be converted to a second format, either on-the-fly, or in advance. This may include, for example, a bytecode interpreter, script interpreter, runtime engine, compiler, just-in-time compiler, or other species of binary translator. The binary translator may be run from the TEE, and the output may then be signed by the TEE and treated as a new trusted binary.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: October 24, 2017
    Assignee: McAfee, Inc.
    Inventors: Samir Shah, Ned M. Smith, Jason Martin, Micah J. Sheller, Somnath Chakrabarti, Bin Xing
  • Patent number: 9800468
    Abstract: Techniques are disclosed for provisioning Internet of Things (IoT) devices in accordance with a state machine model. More particularly, collections of IoT devices may be organized into enclaves, groups or “shoals” that operate as autonomous or semi-autonomous groups of devices functioning as a collective having a common objective or mission. IoT devices participating in a shoal may be provisioned with shoal-specific context information as part of their device-specific provisioning activity. By way of example, a shoal context object can include a current state variable and a target next state variable. The shoal's target next state variable establishes a goal (e.g., for provisioning activity) without dictating how the individual shoal members (IoT device) are to achieve that goal. This mechanism may be used to drive a shoal's separate devices through their individual provisioning state machines until the shoal itself is made operational.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: October 24, 2017
    Assignee: McAfee, Inc.
    Inventors: Ned Smith, Sven Schrecker
  • Patent number: 9800548
    Abstract: A device, system, and method for defending a computer network are described, network communications are received by a traffic filter, which dynamically determines whether the communications include an anomaly (i.e., are “anomalous” communications), or whether the communications are normal, and do not include an anomaly. The traffic filter routes normal communications to the correct device within its network for servicing he service requested by the communications. The traffic filter routes any anomalous communications to a virtual space engine, which is configured to fake a requested service (e.g., to entice deployment of a malicious payload). Anomalous communications are analyzed using an analytical engine, which can dynamically develop rules for handling anomalous communications in-line, and the rules developed by the analytical engine can be employed by the traffic filter against future received communications.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: October 24, 2017
    Assignee: McAfee, Inc.
    Inventor: Christopher J. Jordan
  • Patent number: 9798809
    Abstract: A system, method, and computer program product are provided for crawling a website based on a scheme of the website. In use, a difference between a first content and second content of a website is identified. Additionally, a scheme of the website is identified based on the difference. Furthermore, the website is crawled based on the scheme.
    Type: Grant
    Filed: June 5, 2014
    Date of Patent: October 24, 2017
    Assignee: McAfee, Inc.
    Inventor: Gabriel Pack
  • Patent number: 9798895
    Abstract: In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: October 24, 2017
    Assignee: McAfee, Inc.
    Inventors: Alex Nayshtur, Ned Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Michael Raziel, Avi Priev, Adi Shaliv, Igor Muttik
  • Publication number: 20170302609
    Abstract: Particular embodiments described herein provide for system that can be configured to deliver a notification to a user based on the user's preference for each device that receives the notification. The user's preference is based on how the user interacted with similar notifications in the past and the system can change how it will deliver similar notifications to the user in the future based on how the user interacts with the notification.
    Type: Application
    Filed: July 2, 2016
    Publication date: October 19, 2017
    Applicant: McAfee, Inc.
    Inventors: Raj Vardhan, Arvind Sankarasubramanian, Kranthi Kumar Gadde, Srikanth Nalluri, Dattatraya Kulkarni