Patents Assigned to McAfee, Inc.
-
Publication number: 20170090821Abstract: In an example, there is disclosed a computing apparatus, including a processor, including a trusted execution instruction set; a memory having an enclave portion, wherein the enclave is accessible only via the trusted execution instruction set; a swap file; and a memory management engine operable to: allocate a buffer within the enclave; receive a scope directive to indicate that the buffer is in scope; and protect the buffer from swapping to the swap file while the buffer is in scope. There is further disclosed an method of providing a memory management engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing the memory management engine.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Carl D. Woodward, Venkata Ramanan Sambandam, Dmitri Rubakha
-
Publication number: 20170091453Abstract: Particular embodiments described herein provide for an electronic device that can be configured to determine a file characteristic for a characteristic of a file, determine that the file has been modified to create a new file, determine a new characteristic for the characteristic of the new file, and create a security event if the new file characteristic does not match the file characteristic.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventor: Cedric Cochin
-
Publication number: 20170091972Abstract: A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A particular grouping of assets in a plurality of asset groupings within the particular computing system is identified as including the particular computing device. A source of the particular security event is also identified and at least one of a geographic location and a grouping of assets in the plurality of asset groupings is associated with the identified source. Data is generated that is adapted to cause a presentation of a graphical representation of the particular security event on a display device, the graphical representation including a first graphical element representing the particular computing device as included in the particular grouping of assets and a second graphical element representing the source associated with the at least one of a geographic location and a grouping of assets.Type: ApplicationFiled: May 28, 2016Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Derek Patton Pearcy, Jessica Anne Heinrich, Jessica Jeanne Gaskins
-
Publication number: 20170091654Abstract: In an example, there is disclosed a computing apparatus, including one or more logic elements comprising a classification engine operable to identify at least one overlapping class pair comprising at least two classes selected from a class group, wherein the overlapping class pair may be characterized by a substantial mutual false positive rate; and assign an object to at least one assigned class selected from the class group.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Nidhi Singh, Craig Philip Olinsky
-
Publication number: 20170088142Abstract: In an example, there is disclosed a computing apparatus, including: a driver identity detector to detect the identity of a driver; and one or more logic elements providing a driver competency engine, operable to: detect the identity of the driver; evaluate the driver's operation of a vehicle; and build a driver competency profile based at least in part on the evaluating. The driver competency engine may further be operable to detect a context of the operation, such as environmental factors. There is also described a method of providing a driver competency engine, and one or more computer readable mediums having stored thereon executable instructions for providing a driver competency engine.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Simon Hunt, Venkata Ramanan Sambandam, Prasanna Venkateswaran
-
Publication number: 20170091467Abstract: There is disclosed in an example, a computing apparatus, including: a trusted execution environment (TEE); and one or more logic elements providing a collaboration engine within the TEE, operable to: receive a change to a secured document via a trusted channel; apply a change to the secured document; log the change to a ledger; and display the document to a client device via a protected audio-video path (PAVP). There is also disclosed a method of providing a collaboration engine, and a computer-readable medium having stored thereon executable instructions for providing a collaboration engine.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Oleg Pogorelik, Alex Nayshtut, Ned M. Smith, Igor Muttik, Omer Ben-Shalom
-
Publication number: 20170090929Abstract: In an example, there is disclosed a computing apparatus, including a processor operable to execute a plurality of instructions forming a program; and a verification engine, operable to: receive an execution control data (ECD) for the program; and monitor execution of only some instructions of the program to ensure that they are consistent with the ECD. In some embodiments, the monitoring engine may include a correctness monitoring unit (CMU) in processor hardware. There is also disclosed one or more computer-readable storage mediums having stored thereon executable instructions for providing a monitoring engine, and a computer-implemented method of providing a monitoring engine.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Igor Muttik, Boris A. Babayan, Alexander V. Ermolovich, Alexander Y. Ostanevich, Sergey A. Rozhkov
-
Publication number: 20170091444Abstract: There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.Type: ApplicationFiled: September 26, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Carl D. Woodward, Jennifer Eligius Mankin, Jeremy Bennett
-
Publication number: 20170093803Abstract: In an example, there is disclosed a computing apparatus having one or more logic elements forming a non-encrypted flow processor engine; and one or more logic elements forming a service selection engine, wherein the one or more logic elements include a trusted execution environment (TEE), and wherein the service selection engine is operable to; receive from the flow processor engine an encrypted payload; determine that the encrypted payload satisfies at least one selection criterion; and provide a notification of satisfaction to the flow engine. There is further disclosed a method of performing the operations disclosed, and one or more computer-readable mediums having stored thereon executable instructions to perform the method.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Applicant: McAfee, Inc.Inventors: Alex Nayshtut, Oleg Pogorelik, Omer Ben-Shalom, Igor Muttik
-
Patent number: 9607150Abstract: A file stored in a first portion of a computer memory of a computer is determined to be a malicious file. A duplicate of the file is stored in a quarantine area in the computer memory, the quarantine area being in a second portion of the computer memory that is different from the first portion of the computer memory. One or more protection processes are performed on the file. The determination that the file is a malicious file is determined to be a false positive and the file is restored, during a boot sequence, to a state prior to the one or more protection processes being performed on the file.Type: GrantFiled: May 11, 2015Date of Patent: March 28, 2017Assignee: McAfee, Inc.Inventors: Prabhat Kumar Singh, Nitin Jyoti, Gangadharasa Srinivasa
-
Patent number: 9607086Abstract: In one example, a data security system may determine prevalence of a file based query data for an object (e.g., a file or a hash or a file). An example algorithm may provide using a statistically justifiable estimate of the prevalence while storing few data records, and therefore may provide prevalence information in O(1) time complexity (i.e., constant time). Such an algorithm may be applied in near real-time to provide, e.g., an immediate response to a query for the prevalence of a file.Type: GrantFiled: March 27, 2014Date of Patent: March 28, 2017Assignee: McAfee, Inc.Inventors: Richard Morrey, Guy Roberts, Ramnath Venugopalan, Nick Wilson
-
Patent number: 9609005Abstract: In an example, a cross-view detection engine is disclosed for detecting malware behavior. Malware may attempt to avoid detection by remaining in volatile memory for as long as possible, and writing to disk only when necessary. To avoid detection, the malware may also provide a pseudo-driver at a file system level that performs legitimate-looking dummy operations. A firmware-level driver may simultaneously perform malicious operations. The cross-view detection engine detects this behavior by deconstructing call traces from the file system-level operations, and reconstructing call traces from firmware-level operations. If the traces do not match, the object may be flagged as suspicious.Type: GrantFiled: September 25, 2014Date of Patent: March 28, 2017Assignee: McAfee, Inc.Inventors: Simon Hunt, Jennifer Mankin, Jeffrey Zimmerman
-
Patent number: 9602515Abstract: On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the host. In an enforcement mode, the change requests are logged and additionally compared against authorized change policies and a determination is made whether to allow the change to take effect or to block the changes, thereby enforcing the authorized change policies on the host. Tracking and enforcement can be done in real-time. In either mode and at any time, the logged changes can be reconciled against a set of approved change orders in order to identify classes of changes, including changes that were deployed but not approved and changes that were approved but not deployed.Type: GrantFiled: September 9, 2015Date of Patent: March 21, 2017Assignee: McAfee, Inc.Inventors: Rahul Roy-Chowdhury, E. John Sebes, Jay Vaishnav
-
Patent number: 9602548Abstract: A method is provided in one example embodiment and it includes receiving a state request and determining whether a state exists in a translation dictionary for the state request. The method further includes reproducing the state if it is not in the dictionary and adding a new state to the dictionary. In more specific embodiments, the method includes compiling a rule, based on the state, into a given state table. The rule affects data management for one or more documents that satisfy the rule. In yet other embodiments, the method includes determining that the state represents a final state such that a descriptor is added to the state. In one example, if the state is not referenced in the algorithm, then the state is released. If the state is referenced in the algorithm, then the state is replaced with the new state.Type: GrantFiled: November 16, 2015Date of Patent: March 21, 2017Assignee: McAfee, Inc.Inventors: William Deninger, Ratinder Paul Singh Ahuja, Lee C. Cheung
-
Patent number: 9594881Abstract: A method in one example implementation includes synchronizing a first memory page set with a second memory page set of a virtual guest machine, inspecting the first memory page set off-line, and detecting a threat in the first memory page set. The method further includes taking an action based on the threat. In more specific embodiments, the method includes updating the first memory page set with a subset of the second memory page set at an expiration of a synchronization interval, where the subset of the second memory page set was modified during the synchronization interval. In other more specific embodiments, the second memory page set of the virtual guest machine represents non-persistent memory of the virtual guest machine. In yet other specific embodiments, the action includes at least one of shutting down the virtual guest machine and alerting an administrator.Type: GrantFiled: September 9, 2011Date of Patent: March 14, 2017Assignee: McAfee, Inc.Inventor: Rishi Bhargava
-
Patent number: 9596257Abstract: A combination of shim and back-end server applications may be used to identify and block the installation of malicious applications on mobile devices. In practice, a shim application registers with a mobile device's operating system to intercept application installation operations. Upon intercepting an attempted installation operation, the shim application identifies the application seeking to be installed, generates a key uniquely identifying the application, and transmits the key over a network connection to a back-end server. The back-end server may be configured to crawl the Internet to identify malicious applications and compile and maintain a database of such applications. Upon receiving a key from the shim application, the back-end server can search its database to locate a matching application and, if found, respond to the mobile device with the application's status (e.g., malicious or not). The shim application can utilize this information to allow or block installation of the application.Type: GrantFiled: September 11, 2015Date of Patent: March 14, 2017Assignee: McAfee, Inc.Inventors: Sudeep Das, Jayasankar Divakarla, Pramod Sharma
-
Patent number: 9596604Abstract: A method, system, and computer program product for securing wireless network devices improves the security of wireless networks and devices, such as Bluetooth networks and devices, to prevent security attacks on and hacking of such networks and devices. A method for secure wireless communications, comprises the steps of requesting a connection with a wireless device, determining whether the wireless device is trusted, determining a security policy of the wireless device, and establishing a connection with the wireless device if the wireless device is trusted and if the security policy of the wireless device is as expected.Type: GrantFiled: September 24, 2015Date of Patent: March 14, 2017Assignee: McAfee, Inc.Inventors: Rajesh Shinde, Harish Mohan Awasthi
-
Patent number: 9591028Abstract: In one example, a visualization data engine may be responsible for rendering the visualization data obtained from the backend data server and providing the user interface (UI) necessary to allow an administrator to analyze the data. An example UI may include the ability to filter, organize, reorganize, and choose the raw data to be transformed. The UI may also provide interactions that expand and compress sections of the dataset, drill into the underlying dataset that is represented to the user, and move the data from one visualization to another.Type: GrantFiled: December 13, 2013Date of Patent: March 7, 2017Assignee: McAfee, Inc.Inventors: Grant Babb, Matthew Briercliffe, Paul Diercks, Robert P. Glamm, Kirby Koster
-
Patent number: 9591021Abstract: A technique allows associating host applications and user agents in network traffic and detecting possible malware without relying on signatures of the user agents. A database of host applications and user agents is maintained, allowing automatic update of the database when a new application or new application to user agent mapping is discovered. Partial matches may be made when a change is made to the application, allowing learning the new mapping automatically. If an application is associated with more than a threshold number of user agents, an indication may be generated that the application is suspicious and possibly malware.Type: GrantFiled: August 20, 2014Date of Patent: March 7, 2017Assignee: McAfee, Inc.Inventor: Manish Kumar
-
Patent number: D781874Type: GrantFiled: December 10, 2014Date of Patent: March 21, 2017Assignee: McAfee Inc.Inventor: Andrew Dunn