Patents Assigned to McAfee, Inc.
  • Publication number: 20170063815
    Abstract: In an example, there is disclosed a computing apparatus, comprising: a trusted execution environment (TEE); and a security engine operable to: identify a key negotiation for an encrypted connection between a first device and a second device; request a service appliance key for the key negotiation; receive the service appliance key; and perform a service appliance function on traffic between the first device and the second device. There is also disclosed a method of providing the security engine, and a computer-readable medium having stored thereon executable instructions for providing the security engine.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 2, 2017
    Applicant: MCAFEE, INC.
    Inventors: Ned M. Smith, Simon Hunt, Venkata Ramanan Sambandam
  • Publication number: 20170063750
    Abstract: In an example, there is disclosed a computing apparatus, including a user notification interface; a context interface; and one or more logic elements forming a contextual privacy engine operable to: receive a notification; receive a context via the context interface; apply the context to the notification via a notification rule; and take an action via the user notification interface based at least in part on the applying. The contextual privacy engine may also be operable to mathematically incorporate user feedback into the notification rule. There is also described a method of providing a contextual privacy engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing a contextual privacy engine.
    Type: Application
    Filed: August 27, 2015
    Publication date: March 2, 2017
    Applicant: McAfee, Inc.
    Inventors: Raj Vardhan, Igor Tatourian, Dattatraya Kulkarni, Jeremy Bennett, Samrat Chitta, Reji Gopalakrishnan, Muralitharan Chithanathan
  • Publication number: 20170061164
    Abstract: In an example, there is disclosed a system and method for a two-device scrambled display. A first device displays content in a scrambled form. A second device acts as an interpreter, including an input driver for receiving a scrambled input; an output driver for displaying an organically perceptible output; and one or more logic elements comprising a unscrambling engine operable for: receiving an input on the input driver; detecting that at least a portion of the input is scrambled; unscrambling the scrambled portion of the input; and outputting an unscrambled analog of the scrambled input via the output driver.
    Type: Application
    Filed: June 27, 2015
    Publication date: March 2, 2017
    Applicant: McAfee, Inc.
    Inventors: Craig D. Schmugar, Clint R. Merrill, Erdem Aktas, James Bean, Cedric Cochin, John D. Teddy
  • Patent number: 9576142
    Abstract: A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. Each execution environment is in the group comprising a native binary execution environment configured to execute native machine language instructions and a non-native execution environment configured to execute at least one program to process non-native machine language instructions to yield native machine language instructions. The inventory is maintained based on a result of the considering step. The inventory may be used to exercise control over what executables are allowed to execute on the computer system.
    Type: Grant
    Filed: October 3, 2013
    Date of Patent: February 21, 2017
    Assignee: McAfee, Inc.
    Inventors: Rishi Bhargava, E. John Sebes
  • Patent number: 9578052
    Abstract: Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. Embodiments are configured to request a threat intelligence reputation score based on the hash of the application, to determine an action to be taken by the end host based, at least in part, on one or more policies and at least one of the threat intelligence reputation score and the endpoint reputation score, and to send a response indicating the action to be taken by the end host. Further embodiments request another threat intelligence reputation score based on another hash of a dynamic link library module loaded by the process on the end host, and the action is determined based, at least in part, on the other threat intelligence score.
    Type: Grant
    Filed: October 24, 2013
    Date of Patent: February 21, 2017
    Assignee: McAfee, Inc.
    Inventors: Chandan CP, Srinivasan Narasimhan
  • Publication number: 20170046511
    Abstract: Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to determine a series of checksums for a file, compare the series of checksums to a checksum tree, where the checksum tree includes a plurality of nodes that each include a fuzzy checksum of known malware, and assign one or more classifications to the file, where each of the one or more classifications is based on each node of the checksum tree that matches a checksum in the series of checksums and includes whether the file includes malware or benign checksums.
    Type: Application
    Filed: October 11, 2016
    Publication date: February 16, 2017
    Applicant: McAfee, Inc.
    Inventors: Christoph Alme, Slawa Hahn, Sebastian Thoene
  • Patent number: 9571507
    Abstract: A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. The virtual security appliance performs security inspections on network packets sent from the virtual machine. In more specific embodiments, the method further includes creating an intercept mechanism in the virtual server to intercept the network packets from the virtual machine. In further embodiments, one or more security policies identify one or more virtual security appliances to process the network packets from the virtual machine.
    Type: Grant
    Filed: October 21, 2012
    Date of Patent: February 14, 2017
    Assignee: McAfee, Inc.
    Inventors: Geoffrey Howard Cooper, Manuel Nedbal, Hemang Satish Nadkarni
  • Patent number: 9571520
    Abstract: A method for preventing malware attacks includes the steps of detecting an attempt on an electronic device to access a task scheduler, determining an entity associated with the attempt to access the task scheduler, determining a malware status of the entity, and, based on the malware status of the entity, allowing or denying the attempted access to the task scheduler. The task scheduler is configured to launch one or more applications at a specified time or interval.
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: February 14, 2017
    Assignee: McAfee, Inc.
    Inventors: Anil Ramabhatta, Harinath Vishwanath Ramachetty, Nandi Dharma Kishore
  • Publication number: 20170039368
    Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.
    Type: Application
    Filed: December 21, 2013
    Publication date: February 9, 2017
    Applicant: McAfee, Inc.
    Inventors: Steve Grobman, Carl Woodward, James D. Beaney, Jr., Jimmy Scott Raynor
  • Patent number: 9565214
    Abstract: Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: February 7, 2017
    Assignee: McAfee, Inc.
    Inventors: Aditya Kapoor, Jonathan L. Edwards, Craig Schmugar, Vladimir Konobeev, Michael Hughes
  • Patent number: 9565194
    Abstract: Technologies for providing access control for a network are disclosed. The method may include receiving a request from a user to access a network, receiving a plurality of data associated with the user, the plurality of data comprising a plurality of social data associated with the user's relationship to a social circle, identifying an electronic security policy based at least on the plurality of social data, and authenticating the user to the network if the electronic security policy permits authentication based at least on the plurality of social data.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: February 7, 2017
    Assignee: McAfee, Inc.
    Inventors: Jayakrishnan K. Nair, Simon Hunt, Prasanna Venkateswaran
  • Publication number: 20170034128
    Abstract: A method for containing a threat in network environment using dynamic firewall policies is provided. In one example embodiment, the method can include detecting a threat originating from a first node having a source address in a network, applying a local firewall policy to block connections with the source address, and broadcasting an alert to a second node in the network. In more particular embodiments, an alert may be sent to a network administrator identifying the source address and providing remedial information. In yet other particular embodiments, the method may also include applying a remote firewall policy to the first node blocking outgoing connections from the first node.
    Type: Application
    Filed: June 27, 2016
    Publication date: February 2, 2017
    Applicant: McAfee, Inc.
    Inventors: Manabendra Paul, Praveen Ravichandran Sudharma
  • Publication number: 20170032122
    Abstract: An executable file is loaded into memory. The executable file is analyzed to determine whether one or more dynamically linked libraries are referenced in an import table of the file.
    Type: Application
    Filed: December 27, 2013
    Publication date: February 2, 2017
    Applicant: McAfee, Inc.
    Inventors: Neeraj THAKAR, Amit MALIK
  • Patent number: 9560014
    Abstract: A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic flow to a server. In specific embodiments, a security module may add information about the application to traffic flow. A trapping module may monitor for a memory condition and identify the memory condition. The trapping module may also, responsive to identifying the memory condition, initiate a virtual environment for the application, and check the integrity of the traffic flow.
    Type: Grant
    Filed: January 23, 2013
    Date of Patent: January 31, 2017
    Assignee: McAfee, Inc.
    Inventors: Steve Grobman, Raj Samani, Ofir Arkin, Sven Schrecker
  • Patent number: 9558348
    Abstract: Disclosed are systems and methods to combine a reputation score for a software application publisher or vendor and code analysis techniques to provide a method of ranking software applications. A user downloading a software application may be confident that the software application is reliable and does not contain malicious content based on the ranking applied to the particular software application. Code analysis techniques allow for an application ranking even when there may not be enough historical information about the publisher/vendor to create a solid reputation score. A software application rank may be used internally to a software application store prior to making the software application available to the public.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: January 31, 2017
    Assignee: McAfee, Inc.
    Inventor: Igor Muttik
  • Patent number: 9560064
    Abstract: Systems and methods are provided for allowing subscriber message sending profiles to be maintained and used in conjunction with behavior-based anomaly detection techniques and traditional content-based spam signature filtering to enable application of appropriate message disposition policies to outbound subscriber message traffic. According to one embodiment, subscriber profiles are constructed for multiple subscriber accounts associated with a service provider based on outbound message flow originated from the subscriber accounts. Then, possible subscriber account misuse may be discovered by performing behavior-based anomaly detection, including a comparison of a subscriber profile associated with the subscriber account with recent subscriber account usage information, to identify one or more behavioral anomalies in outbound message flow originated from a subscriber account, the behavior-based anomaly detection.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: January 31, 2017
    Assignee: McAfee, Inc.
    Inventors: C. Scott Chasin, Wei Lin, Paul Kincaid-Smith
  • Patent number: 9560020
    Abstract: At least a portion of a transmission of an outgoing first email from a first email account to at least a second email account is encrypted. Second email address data is changed corresponding to the second email account to cause replies to the first email intended for the second email account to be sent to an intermediate device prior to being routed to the second email account. Replies to the first email are then sent to the intermediate device and sent over one or more encrypted channels. Replies to the first email including the changed email address data are decoded to identify the second email address data associated with the second email account. A reply to the first email is then sent to the second email account based on the identified second email address data.
    Type: Grant
    Filed: January 6, 2015
    Date of Patent: January 31, 2017
    Assignee: McAfee, Inc.
    Inventors: Nicholas Liebmann, Graeme McKerrell, Peter Neal
  • Patent number: 9552497
    Abstract: A method in one example implementation includes selecting at least one criterion for controlling data transmission from within a virtual machine. At least one application is included within the virtual machine, which includes a policy module. The selected criterion corresponds to at least one policy associated with the policy module. The method also includes evaluating the selected criterion of the policy to permit an attempt to transmit the data from within the virtual machine. In more specific embodiments, the policy may include a plurality of criteria with a first selected criterion permitting transmission of the data to a first application and a second selected criterion prohibiting transmission of the data to a second application. In another specific embodiment, the method may include updating the policy module through an administration module to modify the selected criterion.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: January 24, 2017
    Assignee: McAfee, Inc.
    Inventors: Sonali Agarwal, Lee Codel Lawson Tarbotton
  • Patent number: 9548994
    Abstract: A plurality of security events is detected in a computing system, each security event based on at least one policy in a plurality of security policies. Respective interactive graphical representations are presented in a graphical user interface (GUI) of either or both of the security events or security policies. The representations include interactive graphical elements representing the respective security events or security policies. User selection of a particular event element via the interactive GUI causes a subset of the security policies to be identified, each security policy in the subset serving as a basis for at least one particular security event represented by the particular event element. User selection of a particular policy element via the interactive GUI causes a subset of the security policies to be identified, each security event in the subset based at least in part on a particular security policy represented by the particular policy element.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: January 17, 2017
    Assignee: McAfee, Inc.
    Inventors: Derek Patton Pearcy, Jessica Anne Heinrich, Jessica Jeanne Gaskins, Craig Anthony Phillips
  • Patent number: 9547761
    Abstract: A first computing device is detected as substantially collocated with a wireless token device, using a short-range wireless communication network and a connection is established between the first computing device and the token device over the short-range wireless network. Authentication data is sent to the first computing device from the token device over the short-range wireless network to authenticate the token device at the first computing device. Authentication of the token device permits data accessible through the first computing device to be made available to a holder of the token device and to be presented on a user interface of the first computing device. In some instances, the wireless token device may otherwise lack user interfaces for presenting the data itself.
    Type: Grant
    Filed: April 9, 2012
    Date of Patent: January 17, 2017
    Assignee: McAfee, Inc.
    Inventor: Sven Schrecker