Patents Assigned to McAfee, Inc.
  • Patent number: 9652607
    Abstract: A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems. The method also includes verifying an authorization of the object by computing a checksum for the object and comparing the checksum to a plurality of stored checksums in a memory element. The execution of the object is denied if it is not authorized. In other embodiments, the method can include evaluating a plurality of entries within the memory element of the computer, wherein the entries include authorized binaries and kernel modules. In other embodiments, the method can include intercepting an attempt from a remote computer to execute code from a previously authorized binary.
    Type: Grant
    Filed: October 3, 2014
    Date of Patent: May 16, 2017
    Assignee: McAfee, Inc.
    Inventors: Amit Dang, Preet Mohinder
  • Publication number: 20170134957
    Abstract: A method is provided in one example embodiment and includes receiving information for network traffic in a wireless network; correlating the information with a subscriber of a plurality of subscribers; and generating a behavior profile for the subscriber based on the information over a period of time.
    Type: Application
    Filed: November 9, 2015
    Publication date: May 11, 2017
    Applicant: MCAFEE, INC.
    Inventors: Bikram Kumar Gupta, Sudarshan Swamy, Srikant Vissamsetti
  • Publication number: 20170134436
    Abstract: A method in one example implementation includes selecting at least one criterion for controlling data transmission from within a virtual machine. At least one application is included within the virtual machine, which includes a policy module. The selected criterion corresponds to at least one policy associated with the policy module. The method also includes evaluating the selected criterion of the policy to permit an attempt to transmit the data from within the virtual machine. In more specific embodiments, the policy may include a plurality of criteria with a first selected criterion permitting transmission of the data to a first application and a second selected criterion prohibiting transmission of the data to a second application. In another specific embodiment, the method may include updating the policy module through an administration module to modify the selected criterion.
    Type: Application
    Filed: January 23, 2017
    Publication date: May 11, 2017
    Applicant: McAfee, Inc.
    Inventors: Sonali Agarwal, Lee Codel Lawson Tarbotton
  • Patent number: 9648035
    Abstract: A predetermined particular behavioral profile is identified associated with at least one particular user of a computing system, the particular behavioral profile identifying expected behavior of the at least one user within the computing system. Activities associated with use of the computing system by the particular user are identified and it is determined whether the identified activities correlate with the particular behavioral profile. Identifying an activity that deviates from the particular behavioral profile beyond a particular threshold triggers a risk event relating to the particular user.
    Type: Grant
    Filed: November 3, 2014
    Date of Patent: May 9, 2017
    Assignee: McAfee, Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Michael Mason Moyle, Sven Schrecker
  • Publication number: 20170126502
    Abstract: Embodiments of the present disclosure include an Orchestrator to commission a point of presence (PoP) node based on receiving an internet protocol (IP) address, the IP address associated with a geographic location; and a global routing manager for assigning a client device to a PoP node based on the received IP address. Embodiments also include a performance manager to acquire performance information about each PoP node.
    Type: Application
    Filed: October 31, 2015
    Publication date: May 4, 2017
    Applicant: McAfee, Inc.
    Inventors: Ralf Horstmann, Juergen Kendzorra, Pavan Kumar Madikonda, Andre Stein, Martin Stecher
  • Publication number: 20170126720
    Abstract: Embodiments of the present disclosure are directed to updating categorization of online content. An analytics engine implemented at least partially in hardware can receive an engagement indicator across a network interface; identify a type of the engagement indicator, the type of the engagement indicator comprising one of a positive engagement indicator or a negative engagement indicator; and update the reputation data stored in memory based on the type of the engagement indicator. A safe harbor time window is described during with user activity with online content is not reported to system administrators.
    Type: Application
    Filed: October 31, 2015
    Publication date: May 4, 2017
    Applicant: McAfee, Inc.
    Inventor: Craig Philip Olinsky
  • Publication number: 20170125014
    Abstract: Embodiments include a system, method, and apparatus for creating a trusted speech transcription. Transcription logic can receive a signal of audible speech from an audio source and convert the audible speech signal into text. Sampling logic can receive the signal of the audible speech and record a portion of the of the audible speech as a digital audio recording of the audible speech. Packaging logic can create a trusted speech transcription data record that includes the text and the digital audio recording and to digitally sign the transcription file to securely associate the text with the digital audio recording.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Applicant: McAfee, Inc.
    Inventors: Oleg Pogorelik, Alex Nayshtut, Igor Muttik, Adi Shaliv
  • Publication number: 20170124325
    Abstract: Embodiments of the present disclosure include methods, devices, and computer program products for detecting malware in a file. Embodiments include identifying a plurality of features of the file, categorizing each of the plurality of features to define a plurality of categories of features, building a first decision tree based on a first category from the plurality of categories, the first category comprising a first set of features of the file, and building a second decision tree based on a second category from the plurality of categories, the second decision tree comprising a second set of features of the file, the second set different from the first set. Some embodiments include comparing results from each decision tree to determine the presence or absence of malware.
    Type: Application
    Filed: October 31, 2015
    Publication date: May 4, 2017
    Applicant: McAfee, Inc.
    Inventors: Christoph Alme, Joachim Gehweiler, Oliver Helge Marquardt
  • Publication number: 20170126413
    Abstract: A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic flow to a server. In specific embodiments, a security module may add information about the application to traffic flow. A trapping module may monitor for a memory condition and identify the memory condition. The trapping module may also, responsive to identifying the memory condition, initiate a virtual environment for the application, and check the integrity of the traffic flow.
    Type: Application
    Filed: January 6, 2017
    Publication date: May 4, 2017
    Applicant: McAfee, Inc.
    Inventors: Steve Grobman, Raj Samani, Ofir Arkin, Sven Schrecker
  • Patent number: 9641495
    Abstract: A method for user identification, the method comprising relaying an identifier of an application server user to a database associated with the application server, wherein the relaying is performed via a transaction request from the application server to the database.
    Type: Grant
    Filed: October 14, 2008
    Date of Patent: May 2, 2017
    Assignee: MCAFEE, INC.
    Inventor: Slavik Markovich
  • Publication number: 20170118228
    Abstract: Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. Embodiments are configured to request a threat intelligence reputation score based on the hash of the application, to determine an action to be taken by the end host based, at least in part, on one or more policies and at least one of the threat intelligence reputation score and the endpoint reputation score, and to send a response indicating the action to be taken by the end host. Further embodiments request another threat intelligence reputation score based on another hash of a dynamic link library module loaded by the process on the end host, and the action is determined based, at least in part, on the other threat intelligence score.
    Type: Application
    Filed: January 5, 2017
    Publication date: April 27, 2017
    Applicant: McAfee, Inc.
    Inventors: Chandan CP, Srinivasan Narasimhan
  • Patent number: 9635047
    Abstract: A particular activity performed by a particular user of a computing device is identified, for instance, by an agent installed on the computing device. It is determined that the particular activity qualifies as a particular use violation in a plurality of pre-defined use violations. A behavioral risk score for the particular score for the user is determined based at least in part on the determination that the particular activity of the particular user qualifies as a particular use violation. Determining that the particular activity qualifies as a particular use violation can include determining that the particular activity violates a particular rule or event trigger corresponding to a particular pre-defined use violation.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: April 25, 2017
    Assignee: McAfee, Inc.
    Inventors: Michael Mason Moyle, Prasanna Ganapathi Basavapatna, Sven Schrecker
  • Patent number: 9628513
    Abstract: A system, method, and computer program product are provided for scanning an electronic message for unwanted content and associated unwanted sites in response to a request. In use, a request is received via a network to scan an electronic message prior to opening the electronic message, utilizing an electronic message manager. In addition, the electronic message is scanned for unwanted content and associated unwanted sites, in response to the request. Further, a response to the request is sent via the network.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: April 18, 2017
    Assignee: McAfee, Inc.
    Inventors: Paul Nicholas Gartside, George L. Heron, Christopher S. Bolin
  • Patent number: 9621547
    Abstract: Technologies are provided in embodiments to establish trust between a trusted execution environment (TEE) and a peripheral device. Embodiments are configured to communicate with an attestation server to generate an encryption key, and to establish, using the encryption key, a secure connection with an authentication server to enable communication between the authentication server and the peripheral device. Embodiments are also configured to receive a pairwise master key if the peripheral device is authenticated and to receive a trusted communication from the peripheral device based, at least in part, on the pairwise master key. Embodiments may also be configured to identify a connection to the peripheral device before the peripheral device is authenticated to the authentication server, receive an identifier from the peripheral device, and establish a connection to an attestation server based on at least a portion of the identifier.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: April 11, 2017
    Assignee: McAfee, Inc.
    Inventors: Avishay Sharaga, Alex Nayshtut, Oleg Pogorelik, Igor Muttik, Ned M. Smith
  • Patent number: 9614866
    Abstract: A system, method and computer program product are provided for sending information extracted from a potentially unwanted data sample to generate a signature. In use, information is extracted from a portion of a sample of potentially unwanted data. Further, the information is sent to generate a signature.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: April 4, 2017
    Assignee: McAfee, Inc.
    Inventors: Igor Muttik, Joel R. Spurlock
  • Patent number: 9613126
    Abstract: A database system uses indexes to improve performance. The system can use one or more of the following: differentiated subfields for index clustering; set function calculations to reduce the amount of I/O; and/or using an inferred index in a circular table.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: April 4, 2017
    Assignee: McAfee, Inc.
    Inventors: Howard D. Stewart, Kenneth Russell, Paul H. Whittington
  • Patent number: 9614823
    Abstract: A system, method, and computer program product are provided for a pre-deactivation grace period on a processing device (e.g., mobile device). In operation, a deactivation request is detected for a deactivation event. Further, the commencement of the deactivation event is delayed for a predetermined time period, in response to the deactivation request. Additionally, the deactivation event is commenced, after the predetermined time period. To return to full functionality of the processing device while in the deactivation grace period all that may be required is entry of a authentication information (e.g., password) that is weaker than a stronger authentication information initially used to log into the processing device.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: April 4, 2017
    Assignee: McAfee, Inc.
    Inventors: Rajkaran Dhesi, Simon Hunt, Paul Parke
  • Patent number: 9613212
    Abstract: Technologies for assembling an execution profile of an event are disclosed. The system and method may include recording a plurality of branch records, generating a first test event substantially identical to the event, verifying legitimacy of an owner of a code segment associated with the event, establishing an initial point of an execution chain associated with the event, establishing a final point of the execution chain associated with the event, analyzing branch records for an address associated with the code segment, installing a plurality of primary monitors within the execution chain associated with the event, and triggering the plurality of primary monitors.
    Type: Grant
    Filed: March 5, 2013
    Date of Patent: April 4, 2017
    Assignee: McAfee, Inc.
    Inventor: Gregory William Dalcher
  • Patent number: 9614865
    Abstract: A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. It is determined whether local reputation data for the file is available at the host device for the file. A query is sent to an antimalware support system relating to the file. Particular reputation data is received from the antimalware support system corresponding to the query. It is determined whether to allow the file to be loaded on the host device based at least in part on the particular reputation data.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: April 4, 2017
    Assignee: McAfee, Inc.
    Inventors: John Teddy, James Douglas Bean, Gregory William Dalcher, Jeff Hetzler
  • Patent number: D783683
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: April 11, 2017
    Assignee: McAfee, Inc.
    Inventors: David L. Graumann, Rahuldeva Ghosh, Ranjit S. Narjala