Patents Assigned to McAfee, Inc.
  • Patent number: 9791998
    Abstract: A system, method and computer program product are provided for managing a plurality of applications via a single interface. It is initially identified as to which of a plurality of applications are installed on a computer. A status of each of the applications is then presented via a single graphical user interface.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: October 17, 2017
    Assignee: McAfee, Inc.
    Inventors: Brent J. Lymer, Atri Chatterjee
  • Patent number: 9794254
    Abstract: A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. In specific embodiments, at least one data element is an expression element having a character pattern matching a predefined expression pattern that represents at least two words and a separator between the words. In other embodiments, at least one data element is a word defined by a character pattern of one or more consecutive essential characters. Other specific embodiments include determining an end of the record by recognizing a predefined delimiter.
    Type: Grant
    Filed: August 11, 2014
    Date of Patent: October 17, 2017
    Assignee: McAfee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, William J. Deninger
  • Publication number: 20170286521
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to analyze data to determine one or more unique topics for a first class and one or more common topics that are common with the first class and a second class, where the topics that are common with the first class and the second class include one or more subtopics, assign one or more classifications to the data based, at least in part, on the one or more subtopics, and store the one or more classifications assigned to the data in memory. The one or more unique topics and one or more common topics can be determined by using a Jaccard Index. Also, the one or more subtopics can be determined using Latent Dirichlet Allocation.
    Type: Application
    Filed: April 2, 2016
    Publication date: October 5, 2017
    Applicant: McAfee, Inc.
    Inventors: Nidhi Singh, Craig Philip Olinsky
  • Publication number: 20170289343
    Abstract: In an example, a mobile device is configured to automatically lock when a detector, such as a GPS receiver, determines that the device is in motion above a certain speed threshold, such as 10 mph. Additional detectors may be used to determine whether the device is operated by the user or by a passenger, so that intelligent decisions can be made about whether to lock the device. During the lock, certain selected apps such as a GPS navigation system or music player may be enabled, with limited controls as appropriate. In some cases, hands-free operations may be available. The mobile device may also be configured to provide an automated response to incoming calls and messages.
    Type: Application
    Filed: August 25, 2015
    Publication date: October 5, 2017
    Applicant: McAfee, Inc.
    Inventors: John Ying, Eming Saung, Yi Zheng
  • Patent number: 9780951
    Abstract: Technologies for prevention of forgery of a network communication request to a server include a system for security of a network communication request. The system includes a communication module configured to receive the network communication request from a client. The network communication request may have a content parameter. The communication module may be configured to generate a string of content parameters comprising the content parameters and a hash of the content parameter, and communicate portions of a result of the network communication request to the client incorporating the encrypted string of content parameters. Furthermore, the communication module may receive a subsequent request from the client. The subsequent request may be associated with the network communication request. As a result of authenticating the subsequent request, the communication module may complete the network communication request.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: October 3, 2017
    Assignee: McAfee, Inc.
    Inventors: Simon Hunt, Balbir Singh, Nitin Munjal, Nitin Jaglan
  • Patent number: 9779251
    Abstract: A system, method, and computer program product are provided for monitoring an execution flow of a function. In use, data associated with a function is identified within a call stack. Additionally, a call stack frame is determined from freed memory in the call stack. Further, an execution flow of the function is monitored, utilizing the call stack frame from the freed memory.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: October 3, 2017
    Assignee: McAfee, Inc.
    Inventor: Gregory William Dalcher
  • Patent number: 9773116
    Abstract: A system, method and computer readable medium pertaining to evaluation of events from a computer system to assess security risks to that system. Events are evaluated according to the aspects of each event and the aspects are used to make a preliminary determination regarding violation of a security rule. In addition to a preliminary determination of a rule violation, exceptions to the rule may be identified.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: September 26, 2017
    Assignee: McAfee, Inc.
    Inventors: Gregory William Dalcher, Hemang Satish Nadkarni
  • Publication number: 20170270298
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive script data, determine a checksum tree for the script data, compare each checksum of the checksum tree to one or more subtree checksums, and assign one or more classifications to the script data. In one example, the checksum tree is an abstract syntax tree.
    Type: Application
    Filed: June 2, 2017
    Publication date: September 21, 2017
    Applicant: McAfee, Inc.
    Inventors: Christoph Alme, Slawa Hahn, Stefan Finke
  • Patent number: 9767283
    Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. In addition, the system can determine the return address for the function call and block the function call if the return address does not belong to the trusted module. Further, the system can determine a parameter for the function call, determine if the parameter is a known parameter used by the process that called the function, and block the function call if the parameter is not the known parameter used by the process that called the function.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: September 19, 2017
    Assignee: McAfee, Inc.
    Inventors: Peter Szor, Rachit Mathur
  • Patent number: 9769200
    Abstract: A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. The malware executable objects includes the executable objects that are associated with the open network connections that are connected to the first network destination.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: September 19, 2017
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9766957
    Abstract: The present invention gives the methods and processes for automatically servicing user driven requests to find placeholder fields, fill them in with relevant data in a secure manner and securely communicating the data related thereto to the appropriate Androidâ„¢ device and/or application. More particularly, it relates to the methods and processes for authenticated users to automatically obtain and use the correct filled-in data that allows them to access or use any of a multiple number of Androidâ„¢ applications and/or services at any time.
    Type: Grant
    Filed: April 4, 2014
    Date of Patent: September 19, 2017
    Assignee: McAfee, Inc.
    Inventor: Etienne Caron
  • Patent number: 9769186
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to monitor network traffic to and from a device, compare the monitored network traffic to characteristics of the device to determine if the monitored traffic is outside the characteristics of the device, and take remedial action if the monitored traffic is outside the characteristics of the device.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: September 19, 2017
    Assignee: McAfee, Inc.
    Inventors: John D. Teddy, Ramnath Venugopalan, Cedric Cochin, Joel R. Spurlock
  • Patent number: 9769133
    Abstract: A wearable device provides protection for personal identity information by fragmenting a key needed to release the personal identity information among members of a body area network of wearable devices. A shared secret algorithm is used to allow unlocking the personal identity information with fragmental keys from less than all of the wearable devices in the body area network. The wearable devices may also provide protection for other personal user data by employing a disconnect and erase protocol that causes wearable devices to drop connections with an external personal data space and erase locally stored personal information if a life pulse from a connectivity root device is not received within a configurable predefined period.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: September 19, 2017
    Assignee: McAfee, Inc.
    Inventors: Oleg Pogorelik, Alex Nayshtut, Igor Muttik, Justin Lipman
  • Publication number: 20170264622
    Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.
    Type: Application
    Filed: January 6, 2017
    Publication date: September 14, 2017
    Applicant: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
  • Patent number: 9762591
    Abstract: In an example, a system and method are provided for validating the sender of a message, such as an e-mail, text message, voice mail, network message, internet posting, or other electronic message. An authenticity server engine may first prescreen the message with anti-spam, anti-malware, and other filters. The screened message is then provided to the end user. If the end user deems the message suspicious, he may request additional validation. The authenticity server engine may then apply an example four-phase validation scheme, including analyzing header data for consistency with the message body, analyzing public data sources, analyzing private data sources, and receiving a result of an off-channel challenge to the sender. The server may then assign the message a sender validity confidence score.
    Type: Grant
    Filed: December 27, 2014
    Date of Patent: September 12, 2017
    Assignee: McAfee, Inc.
    Inventors: Neeta Srivastava, Yi Zheng, Jeremy Bennett
  • Patent number: 9762539
    Abstract: System and methods for connection processing with limited data leakage. The system records state associated with a connection request in a connection state engine, records state associated with a connection acknowledgement in the connection state engine, stores data sent after the connection acknowledgement in a buffer and determines, without a proxy, whether to allow or deny a connection as a function of the data stored in the buffer.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: September 12, 2017
    Assignee: McAfee, Inc.
    Inventors: Paul Meyer, David Diehl, Spencer Minear
  • Publication number: 20170255776
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to determine a string sample of data, determine a hash of the string sample of data, automatically cluster the hash with other hashes from other string samples of data, and automatically create a signature hash string for the string sample of data.
    Type: Application
    Filed: May 22, 2017
    Publication date: September 7, 2017
    Applicant: McAfee, Inc.
    Inventors: Zheng Zhang, Craig D. Schmugar
  • Patent number: 9747443
    Abstract: A system for securing an electronic device includes a non-volatile memory, a processor coupled to the non-volatile memory, a resource of the electronic device, firmware residing in the non-volatile memory and executed by the processor, and a firmware security agent residing in the firmware. The firmware is communicatively coupled to the resource of an electronic device. The firmware security agent is configured to, at a level below all of the operating systems of the electronic device accessing the resource, intercept a request for the resource and determine whether the request is indicative of malware.
    Type: Grant
    Filed: April 15, 2016
    Date of Patent: August 29, 2017
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 9741032
    Abstract: An attempted transaction is identified involving a customer device and the first customer device is redirected to a security broker. A security report for the first customer device is received from the security broker. The security report is based on security data transmitted from the customer device to the security broker. An action can be performed in association with the attempted transaction based at least in part on the received security report. In some aspects, the security broker receives security data describing security conditions on the customer device in connection with the transaction between the customer device and a transaction partner. A risk tolerance policy is identified that corresponds to the transaction partner, such as an ecommerce provider. A security report is generated based on a comparison of the risk tolerance policy and the security data and the security report.
    Type: Grant
    Filed: December 18, 2012
    Date of Patent: August 22, 2017
    Assignee: McAfee, Inc.
    Inventors: Michael Condry, Sven Schrecker
  • Patent number: 9727710
    Abstract: A system and method of detecting and limiting unsolicited data uploads. Downloaded content such as web pages and emails are scanned for web forms and/or links. A watermark is added where appropriate and the modified downloaded content is forwarded to the person who requested the content. A check is made to determine whether information received from a user includes appropriate watermarks. If so, the watermark is removed and the information is forwarded to its destination.
    Type: Grant
    Filed: August 6, 2015
    Date of Patent: August 8, 2017
    Assignee: McAfee, Inc.
    Inventor: Christoph Alme