Patents Assigned to McAfee, Inc.
-
Patent number: 9723006Abstract: There is disclosed in an example a computing apparatus, including: a process deprivilging engine operable for: recognizing that a process has an undetermined reputation; intercepting a first access request directed to a first resource; determining that the first resource is not owned by the process; and at least partially blocking access to the first resource. There is further disclosed a method of providing the process deprivileging engine, and one or more computer-readable mediums having stored thereon executable instructions for providing the process deprivileging engine.Type: GrantFiled: June 27, 2015Date of Patent: August 1, 2017Assignee: McAfee, Inc.Inventors: Zheng Zhang, John D. Teddy, Craig D. Schmugar, Erdem Aktas, Clint R. Merrill, Kunal Mehta
-
Publication number: 20170213035Abstract: A method, system, and computer program product for protecting a computer system provides bootstrap operating system detection and recovery and provides the capability to detect malware, such as rootkits, before the operating system has been loaded and provides the capability to patch malfunctions that block the ability of the computer system to access the Internet. A method for protecting a computer system includes reading stored status information indicating whether network connectivity was available the last time an operating system of the computer system was operational, when the stored status information indicates that network connectivity was not available, obtaining a software patch, and executing and applying the software patch.Type: ApplicationFiled: March 11, 2016Publication date: July 27, 2017Applicant: McAfee, Inc.Inventors: Akos Horvath, Alessandro Faieta
-
Patent number: 9715597Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive untrusted input data at an enclave in an electronic device, isolate the untrusted input data from at least a portion of the enclave, communicate at least a portion of the untrusted data to an integrity verification module using an attestation channel, and receive data integrity verification of the untrusted input data from the integrity verification module. The integrity verification module can perform data integrity attestation functions to verify the untrusted data and the data integrity attestation functions include a data attestation policy and a whitelist.Type: GrantFiled: September 25, 2014Date of Patent: July 25, 2017Assignee: McAfee, Inc.Inventors: Ned Smith, Esteban Gutierrez, Andrew Woodruff, Aditya Kapoor
-
Patent number: 9715621Abstract: Systems and methods for real-time user verification in online education are disclosed. In certain example embodiments, user identifying information associated with a user and a request to access online education content may be received from a user device. A face template including historical facial image data for the user can be identified. Current facial image data can be compared to the face template to determine if a match exists. Biometric sensor data, such as heart rate data, may also be received for the user. The biometric sensor data may be evaluated to determine if the user is currently located at the user device. If the user is currently located at the user device and the current facial image data matches the face template, access to the online education content may be provided to the user at the user device.Type: GrantFiled: December 22, 2014Date of Patent: July 25, 2017Assignee: MCAFEE, INC.Inventors: Ansuya Negi, Igor Tatourian
-
Patent number: 9712545Abstract: Particular embodiments described herein provide for an electronic device that can be configured to determine when a peripheral is connected to the electronic device, determine a peripheral identification for the peripheral, and monitor the data going to and from the peripheral. Based on the monitored data, a type for the peripheral can be determine. The peripheral identification can be compared with the determined type for the peripheral and if they do not match, then communication to and from the peripheral can be blocked.Type: GrantFiled: December 23, 2014Date of Patent: July 18, 2017Assignee: McAfee, Inc.Inventors: Jonathan L. Edwards, Cedric Cochin, Aditya Kapoor
-
Patent number: 9703958Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: September 25, 2015Date of Patent: July 11, 2017Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9703878Abstract: A first user computing device is identified as being collocated with a second user computing device and an invitation is sent over a wireless communication channel for delivery to the first user computing device. The invitation invites the first user computing device to join a collaborative search session with the second user computing device. A first one of a plurality of search contexts is selected for use by the second user computing device within the collaborative search session. The first user computing device uses a second, different one of the plurality of search contexts during the collaborative search session, and presentations of search results within the collaborative search session are organized according to the first search context on the second user computing device and organized according to the second search context on the first user computing device.Type: GrantFiled: December 21, 2015Date of Patent: July 11, 2017Assignee: McAfee, Inc.Inventor: Derek Patton Pearcy
-
Patent number: 9703957Abstract: A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting memory modifications into the contiguous block of memory. The electronic device includes a plurality of processing entities. The method also includes disabling all but one of a plurality of processing entities of the electronic device, scanning the memory of the electronic device for modifications performed by malware, and, if a memory modification is detected, repairing the memory modification. The method also includes enabling the processing entities that were disabled. The remaining processing entity executes the instructions for detecting memory modifications.Type: GrantFiled: December 13, 2016Date of Patent: July 11, 2017Assignee: McAfee, Inc.Inventor: Ahmed Said Sallam
-
Patent number: 9705889Abstract: A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.Type: GrantFiled: May 20, 2015Date of Patent: July 11, 2017Assignee: McAfee, Inc.Inventors: Nicholas Liebmann, Peter Neal, Michael G. Bishop, Justin Cragin, Michael Driscoll
-
Publication number: 20170185777Abstract: Embodiments of the present disclosure are directed to a self-check application to determine whether an indirect branch execution is permissible for an executable application. The self-check application uses one or more parameters received from an execution profiling module to determine whether the indirect branch execution is permitted by one or more self-check policies.Type: ApplicationFiled: December 24, 2015Publication date: June 29, 2017Applicant: McAfee, Inc.Inventors: Xiaoning Li, Lixin Lu, Ravi Sahita
-
Publication number: 20170187690Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a message, determine that at least a portion of the message includes sensitive data, obfuscate the portion of the message that includes sensitive data, and communicate the message to an electronic device, where the obfuscated portion of the message can be recognized and understood by a recipient associated with the electronic device. In an example, the obfuscated portion of the message can be recognized and understood by a user without the need of special software or hardware but cannot be readily analyzed by a text parsing bot. In some instances, the obfuscation is a human intelligence task element.Type: ApplicationFiled: December 24, 2015Publication date: June 29, 2017Applicant: McAfee, Inc.Inventors: German Lancioni, Igor Muttik, Patricio A. Maller, Maria Eugenia Castagnola
-
Publication number: 20170187525Abstract: In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There is also disclosed a method of providing an HGDI engine, and one or more computer-readable mediums having stored thereon executable instructions for providing an HGDI.Type: ApplicationFiled: December 24, 2015Publication date: June 29, 2017Applicant: McAfee, Inc.Inventors: Matthew L. Rosenquist, Igor Tatourian
-
Publication number: 20170187799Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a broadcast query from a network element, receive information from a plurality of devices, process the information, and generate an integrated group response, wherein the integrated group response summarizes the information about the plurality of devices and removes identification information that could allow data to be linked to a specific device from the plurality of devices. The integrated group response can be communicated back to the network element in response to the query.Type: ApplicationFiled: December 24, 2015Publication date: June 29, 2017Applicant: McAfee, Inc.Inventors: Oleg Pogorelik, Alex Nayshtut, Ned M. Smith, Igor Muttik, Michael Raziel
-
Publication number: 20170185536Abstract: Embodiments of this disclosure are directed to an execution profiling handler configured for intercepting an invocation of memory allocation library and observing memory allocation for an executable application process. The observed memory allocation can be used to update memory allocation meta-data for tracking purposes. The execution profiling handler can also intercept indirect branch calls to prevent heap allocation from converting to execution and intercept exploitation of heap memory to block execution.Type: ApplicationFiled: December 24, 2015Publication date: June 29, 2017Applicant: McAfee, Inc.Inventors: Xiaoning Li, Lixin Lu, Ravi Sahita
-
Publication number: 20170185667Abstract: Particular embodiments described herein provide for an electronic device that can be configured to analyze data using an ensemble and assign a classification to the data based, at least in part, on the results of the analyses using the ensemble. The ensemble can include one or more multinomial classifiers and each multinomial classifier can assign two or more classifications to the data.Type: ApplicationFiled: December 24, 2015Publication date: June 29, 2017Applicant: McAfee, Inc.Inventors: Nidhi Singh, Craig Philip Olinsky
-
Publication number: 20170185778Abstract: Embodiments include identifying, at a logical path node, a first logical path and a second logical path; executing, by a processor implemented at least partially in hardware, a first set of instructions to follow the first logical path; storing, in a memory, a first set of information obtained from following the first logical path; evaluating, by a malware handler module implemented at least partially in hardware, the first set of information for malware; restoring, from the memory, environmental data for the first logical path node; executing, by the processor, a second set of instructions to follow the second logical path; storing, in a memory, a second set of information obtained from following the second logical path; and evaluating, by the malware handler module, the second set of information for malware.Type: ApplicationFiled: December 24, 2015Publication date: June 29, 2017Applicant: McAfee, Inc.Inventors: Ravi Sahita, Xiaoning Li, Lixin Lu, Lu Deng, Alexander Shepsen, Xiang Xu, Liangjun Huang, Hua Liu, Kai Huang
-
Patent number: 9691278Abstract: Systems and methods for real-time emergency vehicle authentication at traffic signal and tollgates are disclosed. In certain example embodiments, a dispatch server can provide identifying credentials and time-bounded intersection tickets (TBIT) to traffic signals and tollgates for conducting authentication of emergency vehicles. The emergency vehicles can transmit a traffic light control message requesting expedited access through a traffic signal or tollgate. The traffic signal or tollgate can decrypt the message using the TBIT. It can further determine if the identifying credential received from the emergency vehicle is authorized for expedited access and if the message was received within a required time period. In response, the traffic signal or tollgate can determine its current signal or gate position and determine if a change needs to be made to provide expedited access to the emergency vehicle.Type: GrantFiled: July 28, 2015Date of Patent: June 27, 2017Assignee: McAfee, Inc.Inventors: Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Saurabh Dadu, Sven Schrecker
-
Patent number: 9690928Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.Type: GrantFiled: October 25, 2014Date of Patent: June 27, 2017Assignee: McAfee, Inc.Inventors: Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
-
Publication number: 20170180237Abstract: There is disclosed a network device having a network interface; and one or more logic elements comprising a flow table engine operable to: receive a network packet via the network interface; perform a logging action to make the network packet traceable; and notify a software-defined networking (SDN) controller of the logging action via the network interface. There is also disclosed an SDN controller having a network interface; first one or more logic elements comprising a software-defined networking (SDN) controller engine to provide SDN controller services; and second one or more logic elements comprising a route tracing engine, operable to: receive a logging action for a network packet from a network device via the network interface; and update a logging table from the logging action. There is further disclosed a method of providing the foregoing, and computer-readable mediums for providing the foregoing.Type: ApplicationFiled: December 22, 2015Publication date: June 22, 2017Applicant: McAfee, Inc.Inventors: Shivakrishna Anandam Mulka, Jayakrishnan Nair
-
Publication number: 20170177417Abstract: In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave; execute the external workload within the TCM enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a TCM agent, and a method of providing a TCM agent.Type: ApplicationFiled: December 22, 2015Publication date: June 22, 2017Applicant: McAfee, Inc.Inventors: Howard C. Herbert, Jennifer Eligius Mankin, Simon Hunt, Venkata Ramanan Sambandam, Mark E. Scott-Nash, Katalin Klara Bartfai-Walcott, Rameshkumar Illikkal