Patents Assigned to Networks Associates Technologies, Inc.
  • Publication number: 20040209608
    Abstract: A system, method and computer program product are provided for accessing security or content analysis functionality utilizing a mobile communication device. Included is an operating system installed on a mobile communication device capable of communicating via a wireless network. Further provided is an application program installed on the mobile communication device and executed utilizing the operating system for performing tasks. A scanning subsystem remains in communication with the application program via an application program interface. Such scanning subsystem is adapted for accessing security or content analysis functionality in conjunction with the tasks performed by the application program.
    Type: Application
    Filed: August 11, 2003
    Publication date: October 21, 2004
    Applicants: NTT DoCoMo, INC., NETWORKS ASSOCIATES TECHNOLOGY, INC.
    Inventors: Victor Kouznetsov, Davide Libenzi, Michael C. Pak, Yasutaka Urakawa, Kenji Ishii, Masanori Fujita
  • Patent number: 6802012
    Abstract: A system for scanning computer files for unwanted properties, such as containing computer viruses or being spam e-mail, allocates a priority to pending scan requests based upon the identity of a computer user associated with the scan request. In the case of a normal file access request, the computer user associated with the scan request may be the file access request or in the case of an on-demand scan, then the computer user associated with a particular scan request for a computer file may be the owner or creator of that computer file. In the case of scan requests associated with e-mails, the sender or recipient computer user may be used in the allocation of a priority level for the scan request.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: October 5, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Robert Hugh Smithson, Daniel Joseph Wolff
  • Patent number: 6801940
    Abstract: A system, method, and computer program product are provided for expert application performance analysis. An application is monitored. Performance data is gathered during the monitoring. A set of metrics is generated based on the performance data. A performance of the application is measured from at least one of a client perspective, a server perspective, and a network perspective using the metrics.
    Type: Grant
    Filed: January 11, 2002
    Date of Patent: October 5, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Mike Moran, Tauras Liubinskas, Jack Goral
  • Patent number: 6801756
    Abstract: Aspects of the invention are found in an apparatus for monitoring data on a wireless network. The data is transmitted according to a wireless data network protocol across the network. The apparatus is contained on a portable wireless network analysis device. The portable wireless network analysis device has a wireless network interface that communicatively couples the portable wireless network analysis device to the wireless network. This allows the portable wireless network analysis device to receive data from the wireless network. The portable wireless network analysis device also has a network traffic analyzer. The network traffic analyzer is communicatively coupled to the wireless network interface. The analyzer receives and analyzes the data received from the wireless network. The portable wireless network analysis device is capable of being operated by user at one location and transported to second location.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: October 5, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Ajay Agrawal, Sriharsha Sathya, Yashovan Neelakantamurthy, Apurva Prakash, Raghavendra Malpani, Abhishek Saraswati, Suryaprashant Rao, Ashish Hate, Peter O. Schmitz
  • Patent number: 6799197
    Abstract: A secure method and system for administering to software on a plurality of client computers is disclosed. One or more pre-set policies for one or more client computers may be stored on and transmitted in a secure manner from a central server that is under the control of a system administrator to the client computers over a public network or e-mail systems. The central server is preferably an HTTP server containing software for creating packages of information and for protecting the integrity of the packages during transmission over a virtual secured pipe. The packages may contain policy for the various clients that are to be maintained. The policy may comprise software configurations for software that resides on the clients, software to be installed on one or more clients, or any other information and data that is needed to maintain and manage the clients.
    Type: Grant
    Filed: August 29, 2000
    Date of Patent: September 28, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Satish Shetty, Victor Kouznetsov, Dan Melchione
  • Patent number: 6792543
    Abstract: A system, method and article of manufacture are provided for programmable scanning for malicious content on a wireless client device. Initially, an anti-virus program having an instruction set is assembled in a programmable computing language. The anti-virus program is implemented in a wireless client device. A scan for malicious code is performed on the wireless client device utilizing the anti-virus program. A method for programmable scanning for malicious content on a thin client device is also provided. An anti-virus engine is assembled in a programmable computing language. The anti-virus engine is installed on a thin client device. A signature file is also assembled in a programmable computing language, the signature file containing an identifier uniquely identifying a computer virus and a virus detection section comprising object code providing operations to detect the identified computer virus on the thin client device. The signature file is also installed on the thin client device.
    Type: Grant
    Filed: November 30, 2001
    Date of Patent: September 14, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Michael C. Pak, Victor Kouznetsov, David W. Palmer
  • Patent number: 6789201
    Abstract: A system, method and computer program product are provided for affording virus-related services utilizing a network browser toolbar. Initially, a request for virus-related services is received over a network from a network browser associated with a computer. In response thereto, virus-related information is transmitted to the computer for being used in conjunction with the network browser to provide virus-related services. In use, the virus-related services are administered utilizing the virus-related information and a toolbar associated with the network browser.
    Type: Grant
    Filed: December 20, 2001
    Date of Patent: September 7, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Chris A. Barton, Lee Codel Lawson Tarbotton, Guy William Welch Roberts
  • Patent number: 6789082
    Abstract: One embodiment of the present invention provides a system that facilitates fast network management protocol replies in large tables. The system operates by first receiving a request for a next row from a network management protocol table. The system then compares the object identifier in the request with a pre-calculated object identifier. If the object identifier matches the pre-calculated object identifier, the system responds to the request with a pre-calculated response. If the object identifier does not match the pre-calculated object identifier, the system searches a management information base for the next row in the network management protocol table. Next, the system calculates a response, which includes data from requested columns of the next row. The system then responds to the request.
    Type: Grant
    Filed: July 13, 2001
    Date of Patent: September 7, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Jeffrey Y. Sternin, Steven C. Tung, Yongping Qi
  • Patent number: 6789202
    Abstract: One embodiment of the present invention provides a providing policy-driven intrusion detection system for a networked computer system. This system operates by receiving a global policy for intrusion detection for the networked computer system. This global policy specifies rules in the form of a global security condition for the networked computer system and a global response to be performed in response to the global security condition. The system compiles the global policy into local policies for local regions of the networked computer system. Each local policy specifies at least one rule in the form of a local security condition for an associated local region of the networked computer system and a local response to be performed in response to the local security condition. The system communicates the local policies to local analyzers that control security for the local regions. A local analyzer compiles a local policy into specifiers for local sensors in a local region associated with the local analyzer.
    Type: Grant
    Filed: October 15, 1999
    Date of Patent: September 7, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Cheuk W. Ko, Jaisook Rho
  • Patent number: 6789117
    Abstract: A system, method, and computer program product are provided for analyzing a network utilizing an agent/host controller interface. Initially, an agent is sent an interval setting from a host controller. Such agent is adapted to transmit network traffic information based on the interval setting. Such network traffic information is then received from the agent in accordance with the interval setting.
    Type: Grant
    Filed: December 21, 2001
    Date of Patent: September 7, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Herbert V. Joiner, Ken W. Elwell, Ravi Verma, Praveen Raghuraman
  • Patent number: 6785237
    Abstract: A method and system for passive quality of service monitoring of a network are described. In one embodiment, a number of signatures are extracted from a number of network packets at a number of monitoring points. In addition, at least one quality of service parameter is generated based upon the signatures.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: August 31, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventor: Zbigniew Sufleta
  • Patent number: 6785820
    Abstract: A system, method and computer program product are provided for updating security software on a client. Initially, a parameter indicating a difference between a security update file and a previous security update file is identified. Next, a security program is conditionally updated with the security update file based on the parameter.
    Type: Grant
    Filed: April 2, 2002
    Date of Patent: August 31, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Igor G. Muttik, Vincent P. Gulletten, Craig D. Schmugar
  • Patent number: 6779033
    Abstract: A system and method for transacting a validated application session in a networked computing environment is described. A hierarchical protocol stack having a plurality of interfaced protocol layers is defined. A connection-based session protocol layer is included. A session is opened with a requesting client responsive to a request packet containing a source address of uncertain trustworthiness. A client connection with the requesting client is negotiated. A stateless validation of the source address contained in the request packet is performed using encoded information obtained from the request packet headers. A server connection is negotiated with a responding server upon successful validation of the requesting client. The session is facilitated by translating packets independently exchanged over the client connection and the server connection. The session is closed through a controlled termination of each of the client connection and the server connection.
    Type: Grant
    Filed: December 28, 2000
    Date of Patent: August 17, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Robert N. M. Watson, Olafur Gudmundsson, Darrell Kindred
  • Patent number: 6775704
    Abstract: A system and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment is described. A hierarchical protocol stack defines a plurality of communicatively interfaced protocol layers. At least one protocol layer provides a client service via a remote procedure call interface. A request packet sent from a requesting client is intercepted. The request packet contains a service request being sent to a remote server via a remote procedure call. A token uniquely identifying the request packet is generated using data contained therein. The token is included with the request packet. The request packet and the included token is forwarded to the remote server indicated in the remote procedure call. A response packet containing a response sent from a remote server via the remote procedure call interface for the provided client service is received.
    Type: Grant
    Filed: December 28, 2000
    Date of Patent: August 10, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Robert N. M. Watson, Olafur Gudmundsson
  • Patent number: 6775780
    Abstract: One embodiment of the present invention provides a system for determining whether software is likely to exhibit malicious behavior by analyzing patterns of system calls made during emulation of the software. The system operates by emulating the software within an insulated environment in a computer system so that the computer system is insulated from malicious actions of the software. During the emulation process, the system records a pattern of system calls directed to an operating system of the computer system. The system compares the pattern of system calls against a database containing suspect patterns of system calls. Based upon this comparison, the system determines whether the software is likely to exhibit malicious behavior. In one embodiment of the present invention, if the software is determined to be likely to exhibit malicious behavior, the system reports this fact to a user of the computer system.
    Type: Grant
    Filed: March 16, 2000
    Date of Patent: August 10, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventor: Igor Muttik
  • Patent number: 6772345
    Abstract: A method, system, and computer program product for malware scanning of data that is being transferred or downloaded to a computer system that is performed at the protocol level, and is capable of blocking the spread of malwares that may not be blocked by operating system level scanning. A method of detecting a malware comprises the steps of: a) receiving a data stream, b) scanning the data stream at a protocol level to detect a malware, c) removing the detected malware from the data stream, and d) transmitting the data stream without the malware.
    Type: Grant
    Filed: February 8, 2002
    Date of Patent: August 3, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventor: Satish Shetty
  • Patent number: 6768991
    Abstract: A modified Boyer-Moore searching algorithm used within an E-mail filtering system for detecting the presence of a plurality of target band strings during a single traversal of the character data to be searched. A single jump table for the combined set of strings for which a search is being made is used. A hierarchical match table starting with the possible terminating letters of strings for which a search is being made is traversed to identify any strings as they are encountered.
    Type: Grant
    Filed: May 15, 2001
    Date of Patent: July 27, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventor: Stephen Owen Hearnden
  • Patent number: 6769016
    Abstract: A system, method and computer program product are provided for detecting an unwanted message. First, an electronic mail message is received. Text in the electronic mail message is decomposed. Statistics associated with the text are gathered using a statistical analyzer. A neural network engine coupled to the statistical analyzer is taught to recognize unwanted messages based on statistical indicators. The statistical indicators are analyzed utilizing the neural network engine for determining whether the electronic mail message is an unwanted message.
    Type: Grant
    Filed: July 26, 2001
    Date of Patent: July 27, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Anton C. Rothwell, Luke D. Jagger, William R. Dennis, David R. Clarke
  • Patent number: 6768721
    Abstract: An analyzer for a wireless network is configured for surfing a plurality of channels, each for an individually selectable period of time, for monitoring each channel to obtain packet information for analysis, to detect any defects in communication over each respective channel.
    Type: Grant
    Filed: October 26, 2001
    Date of Patent: July 27, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Peter O. Schmitz, Dominick A. Cafarelli, James P. Anderson, Elazar Rosenthal
  • Patent number: 6766458
    Abstract: A computer program for checking user configurable security settings operates as either an on-demand application or a memory resident application. The security checking program may enforce the recommended settings or may generate a report to the user as to where the recommended settings are not in place.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: July 20, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Mark Harris, Christopher Scott Bolin, David Emm