Patents Assigned to McAfee, LLC
  • Patent number: 9906537
    Abstract: A system, method, and computer program product are provided for conditionally performing an action based on an attribute. In use, at least one attribute associated with an object is determined. Additionally, an event associated with the object is identified. Further, at least one action is conditionally performed in association with the event, based on the at least one attribute.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: February 27, 2018
    Assignee: McAfee, LLC
    Inventors: Joel R. Spurlock, Gregory William Dalcher
  • Patent number: 9904782
    Abstract: Providing synchronous processing of the designated computing events using hardware-assisted virtualization technology by performing at least the following: detecting a designated computing event using a high priority, low capability routine, creating a copy code in an alternate memory space of a first code located in a first memory space, modifying the copy code to call for analysis of at least a portion of the copy code that corresponds to the first code, switching execution of the first code with the modified copy code using an address translation data structure that translates a guest memory address to a host memory address after a return of the high priority, low capability routine; and analyzing synchronously the at least a portion of the code within the copy code that corresponds to the first code based on the replacement of the first code with the modified copy code.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: February 27, 2018
    Assignee: McAfee, LLC
    Inventors: Carl D. Woodward, Jennifer Mankin, Dmitri Rubakha, Palanivel Rajan Shanmugavelayutham, Vadim Sukhomlinov
  • Patent number: 9898605
    Abstract: Embodiments are directed to hooking a call for a malware monitoring logic into a JavaScript API engine interpreter. Upon JavaScript being placed into heap memory, the malware monitoring logic can initiate an evaluation or analysis of the heap spray to determine whether the JavaScript includes malware or other malicious agents prior to execution of the JavaScript shell code. Upon execution of the JavaScript within the sandbox, the malware monitoring logic can initiate monitoring of the JavaScript using malware analysis and/or execution profiling techniques. Inferences can be made of the presence of malware based on a start and end time of the JavaScript execution.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: February 20, 2018
    Assignee: McAfee, LLC
    Inventors: Ravi Sahita, Xiaoning Li, Lixin Lu, Lu Deng, Alexander Shepsen, Xiang Xu, Liangjun Huang, Hua Liu, Kai Huang
  • Patent number: 9894079
    Abstract: System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (I/O) functionality of the mobile computing device. A data loss prevention (DLP) policy is identified that is applicable to the particular system call. An action is performed on the particular system call based at least in part on the DLP policy.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: February 13, 2018
    Assignee: McAfee, LLC
    Inventors: Ratinder Paul Singh Ahuja, Balbir Singh, Rajbir Bhattacharjee, Dattatraya Kulkarni
  • Publication number: 20180041473
    Abstract: A device, system, and method for defending a computer network are described. network communications are received by a traffic filter, which dynamically determines whether the communications include an anomaly (i.e., are “anomalous” communications), or whether the communications are normal, and do not include an anomaly. The traffic filter routes normal communications to the correct device within its network for servicing he service requested by the communications. The traffic filter routes any anomalous communications to a virtual space engine, which is configured to fake a requested service (e.g., to entice deployment of a malicious payload). Anomalous communications are analyzed using an analytical engine, which can dynamically develop rules for handling anomalous communications in-line, and the rules developed by the analytical engine can be employed by the traffic filter against future received communications.
    Type: Application
    Filed: October 23, 2017
    Publication date: February 8, 2018
    Applicant: MCAFEE, LLC
    Inventor: Christopher J. Jordan
  • Patent number: 9886579
    Abstract: A method for proactively detecting shared libraries suspected of association with malware includes the steps of determining one or more shared libraries loaded on an electronic device, determining that one or more of the shared libraries include suspicious shared libraries by determining that the shared library is associated with indications that the shared library may have been maliciously injected, loaded, and/or operating on the electronic device, and identifying the suspicious shared libraries to a reputation server.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: February 6, 2018
    Assignee: MCAFEE, LLC
    Inventor: Ahmed S. Sallam
  • Patent number: 9886577
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identify regions of code to be monitored, probe and lock code pages that include the identified regions of code, and remap the code pages as execute only to assist with the mitigation of malicious invocation of sensitive code. The code pages can be remapped as execute only in an alternate extended page table view to allow for the detection and mitigation of malicious invocation of sensitive code.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: February 6, 2018
    Assignee: McAfee, LLC
    Inventors: Ravi Sahita, Lu Deng, Vedvyas Shanbhogue, Lixin Lu, Alexander Shepsen, Igor Tatourian
  • Patent number: 9881072
    Abstract: In an example, a network is described with a plurality of data sources. Each data source may provide a feature, such as a data type that the data source collects or generates. A data aggregator may be connected to the network, and configured to collect, classify, and merge features as appropriate. The data aggregator includes a discriminator for classifying features, a merger, unmerger, converter, and evaluator. Features are provided to one or more expert systems configured to control one or more systems based on the features. Feedback to the data aggregator is used to evaluate the success of a merge. When a merge is found to be unhelpful, features may be unmerged.
    Type: Grant
    Filed: August 14, 2014
    Date of Patent: January 30, 2018
    Assignee: McAfee, LLC.
    Inventors: Igor Muttik, Paul H. Whittington
  • Patent number: 9882876
    Abstract: A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host without metadata associated with the flow, and a discovery redirect may be sent to the host. Metadata may then be received and correlated with the flow to identify a network policy action to apply to the flow.
    Type: Grant
    Filed: May 28, 2016
    Date of Patent: January 30, 2018
    Assignee: McAfee, LLC
    Inventors: Geoffrey Cooper, Michael W. Green, John Richard Guzik
  • Patent number: 9876763
    Abstract: A firewall cluster system comprises a first node operable to receive a connection in a firewall cluster having three or more nodes, monitor packets of the received connection and determining application state data associated with the connection from the monitored packets in the first node, and share application state data with at least another node in the firewall cluster.
    Type: Grant
    Filed: June 9, 2014
    Date of Patent: January 23, 2018
    Assignee: McAfee, LLC
    Inventors: Spencer Minear, Paul Meyer
  • Patent number: 9876818
    Abstract: A network adapter system and associated method are provided. The network adapter system includes a processor positioned on a network adapter coupled between a computer and a network. Such processor is configured for scanning network traffic transmitted between the computer and the network.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: January 23, 2018
    Assignee: McAfee, LLC.
    Inventors: Anton C. Rothwell, William R. Dennis, Luke D. Jagger
  • Patent number: 9876806
    Abstract: In an example, a detection engine identifies potential malware objects according to behavior. In order to circumvent blacklists and fingerprint-based detection, a malware server may frequently change domain names, and change the fingerprints of distributed malware agents. A malware agent may perform only an initial DNS lookup, and thereafter communicate with the malware command-and-control server via “naked” HTTP packets using the raw IP address of the server. The detection engine identifies malware agents by this behavior. In one example, if an executable object makes repeated HTTP requests to an address after the DNS lookup “time to live” has expired, the object may be flagged as potential malware.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: January 23, 2018
    Assignee: McAfee, LLC
    Inventors: Stephen Mondiguing, Benjamin Cruz
  • Patent number: 9866528
    Abstract: A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel.
    Type: Grant
    Filed: August 17, 2015
    Date of Patent: January 9, 2018
    Assignee: McAfee, LLC
    Inventors: Geoffrey Howard Cooper, David Frederick Diehl, Vinay A. Mahadik, Ramnath Venugopalan
  • Patent number: 9866585
    Abstract: Scanning for computer viruses or E-mail and data content filtering is performed using a distributed programming approach. A master computer 4 serves to divide the scanning operation into a plurality of tasks that are allocated to further computers 8, 10, 12, 14, 20. These further computers then separately perform the tasks and return the results to the master computer 4. The master computer 4 can check the update status of the further computers prior to them starting operation in order to check that they have the latest data defining the scanning to be performed.
    Type: Grant
    Filed: December 26, 2014
    Date of Patent: January 9, 2018
    Assignee: McAfee, LLC
    Inventor: Robert Grupe
  • Patent number: 9864868
    Abstract: A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems.
    Type: Grant
    Filed: April 11, 2014
    Date of Patent: January 9, 2018
    Assignee: McAfee, LLC
    Inventors: Rishi Bhargava, Chiradeep Vittal, Swaroop Sayeram
  • Patent number: 9862488
    Abstract: Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as “drones”). In some embodiments, an unmanned aerial vehicle engaged in autonomous flight may determine its location using a satellite-based navigation system. The location may be evaluated against location data obtained from one or more secondary factors, such as public broadcast beacons, cellular towers, wireless network identifiers, visual markers, or any combination thereof. If the location is determined to be invalid, the unmanned aerial vehicle may be instructed to take a mitigation action. Additionally, certain embodiments also include the verification of a flight plan for the unmanned aerial vehicle using secure no-fly logic to verify a flight plan does not violate no-fly zones. If the flight plan is verified, the flight plan may be signed using a cryptographic signature and provided to a navigation module that verifies the signature and executes the flight plan.
    Type: Grant
    Filed: August 28, 2015
    Date of Patent: January 9, 2018
    Assignee: MCAFEE, LLC
    Inventors: Simon Hunt, Venkata Ramanan Sambandam, Samir Shah
  • Patent number: 9864615
    Abstract: Systems and methods allow a user to select one or more applications that are intended to be downloaded to a device (e.g., phone, tablet, PC) and create an emulation environment for testing aspects of the one or more applications prior to download. The emulation environment can be virtual (via emulation or virtual machine) or instrumented by remotely controlling actual hardware. Metrics collected from the emulation environment can include security and usability related aspects of the applications. Interaction between the applications themselves, the applications and other resources, and the user and the applications (e.g., configuration preferences, usage patterns) can be monitored by systems facilitating hosting of the emulation environment. For example, collected metrics can be used to create a measure for security, reputation, user-preference, etc. regarding the applications. Metrics can be shared amongst other potential users to assist in their purchase or usage of the applications.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: January 9, 2018
    Assignee: McAfee, LLC
    Inventor: Igor Muttik
  • Patent number: 9858407
    Abstract: A method and process for users to have secure access to multiple mobile, embedded or web based applications, is provided whereby each requires different authentication, and access to such applications is automated through the use of a single authenticating and authorizing software; the software thereby securely managing the individual authorizations and, in so doing, the authentication required by any individual application independent of the device used. To protect against any intrusion and manipulation while assuring that only legitimate user(s) that are properly authenticated have access to their applications the method secures the secret information required to access these applications and minimizes exposure to any sensitive information. Moreover, any secrets that protect information are themselves secured and made strong and the means of access is simplified and automated as much as possible while safeguarding security and confidentiality.
    Type: Grant
    Filed: April 4, 2014
    Date of Patent: January 2, 2018
    Assignee: McAfee, LLC
    Inventors: Etienne Caron, Kwaku Zigah, Mathieu René, Richard Bruno
  • Patent number: 9860240
    Abstract: Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key derived from a password, such that each subsequent ring of protection is protected by a key derived from the key used to encrypt the previous ring of protection. Further, hardware-based encryption may be employed in one or more of the rings of protection to bind the encrypted payload to the hardware. Such systems and methods may be used to reduce the ability to parallelize an attack on encrypted data while also permitting password-related data to be synchronized across a network.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: January 2, 2018
    Assignee: McAfee, LLC
    Inventor: David Webb
  • Patent number: 9860281
    Abstract: Systems, devices and methods are disclosed to assist in configuring devices and policies to protect a regional network (e.g., home network) and its users. Users on the network are monitored to determine appropriate configuration settings and preferences by utilizing a combination of internally configured information and externally gathered information for each user. For example, externally gathered information may include information obtained about a user from one or more social media Internet sites. Automatically obtained information may be used to provide or augment policy information such that a user's preference relative to internet content (e.g., content blocking software configuration) may be achieved without requiring an administrator to individually prepare each users security profile and configuration.
    Type: Grant
    Filed: June 28, 2014
    Date of Patent: January 2, 2018
    Assignee: McAfee, LLC
    Inventors: Jayakrishnan K. Nair, Prasanna Venkateswaran, Simon Hunt