Patents Assigned to Networks Associates Technologies, Inc.
  • Patent number: 6587888
    Abstract: The present invention is directed at the implementation of a dynamic wrapper for discovery of non-exported functions and subsequent method interception. A practical usage of dynamic wrappers is for security software packages to augment access controls applied to the wrapped modules. The invention permits interception of distributed component object model (DCOM) client initiated method calls at a DCOM server during runtime. The interceptor of the method call denies or grants access to the DCOM method to be executed. The actual logic to determine access permissions need not be part of the interceptor. The interceptor runs as part of the DCOM server. It contains logic to distinguish at runtime the identity of the principal associated with the DCOM client requesting the execution of the function call. The technique works with commercial-off-the-shelf (COTS) software and does not require modification of the application source code.
    Type: Grant
    Filed: December 15, 1999
    Date of Patent: July 1, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventors: David Pai-wei Chieu, Dennis Hollingworth
  • Patent number: 6584508
    Abstract: A system and method for increasing the security of a data guard is disclosed. The data guard is based on a multi-part proxy that includes a first proxy agent that communicates with an inside computer network region, a second proxy agent that communicates with an outside computer network region, and a content-based filter application that reviews information that is passed between the first proxy agent and the second proxy agent. Both the first and second proxy agents can be based on existing firewall proxies. The proxy agents listen for protocol operations (e.g., IIOP requests or replies) and translate those protocol operations into protocol-independent data. The protocol independent data is then analyzed by a protocol-independent content-based filter. The behavior of the multi-part proxy can be further constrained through the use of software wrapper technology.
    Type: Grant
    Filed: December 30, 1999
    Date of Patent: June 24, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventors: Jeremy Epstein, Linda Thomas
  • Patent number: 6584504
    Abstract: A computer program product enables a computer device to implement a method of monitoring Web page traffic. The multi-step method begins by automatically sending a first ping at a first time to a first Internet address associated with a first Web page. A first response time for the first ping is measured to determine a first level of Internet traffic on the first Web page. Using the first response time, a first value is assigned to a perceptible characteristic of a first graphical object, which is then displayed on a display device associated with the computer device. Next, a second ping is automatically sent to the first Internet address at a second time. The second response time to the second ping is measured to determine a second level of Internet traffic on the first Web page. Based on the second response time a second value is assigned to the perceptible characteristic of the first graphical object, which is then redisplayed on the display device.
    Type: Grant
    Filed: May 26, 2000
    Date of Patent: June 24, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventor: Kerry M. Choe
  • Publication number: 20030079145
    Abstract: A system, method and computer program product are provided for scanning a mobile wireless device for malware. Initially, a platform abstraction layer of a mobile wireless device is called. Further, an anti-malware scanner-related function module on the mobile wireless device is initiated utilizing the platform abstraction layer. Such platform abstraction layer enables the anti-malware scanner-related function module to be initiated on any of a plurality of different mobile wireless devices.
    Type: Application
    Filed: April 12, 2002
    Publication date: April 24, 2003
    Applicant: NETWORKS ASSOCIATES TECHNOLOGY, INC.
    Inventors: Victor Kouznetsov, Davide Libenzi, Martin Fallenstedt, David W. Palmer, Michael C. Pak
  • Patent number: 6546493
    Abstract: A system, method and computer program product are provided for scanning a source of suspicious network communications. Initially, network communications are monitored for violations of policies. Then, it is determined whether the network communications violate at least one of the policies. Further, a source of the network communications that violate at least one of the policies is identified. Upon it being determined that the network communications violate at least one of the policies, the source of the network communications is automatically scanned.
    Type: Grant
    Filed: November 30, 2001
    Date of Patent: April 8, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier
  • Patent number: 6542943
    Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database.
    Type: Grant
    Filed: April 17, 2002
    Date of Patent: April 1, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventors: William Cheng, Kenneth Hwang, Ravi Kannan, Babu Katchapalayam, Bing Liu, Balaji Narasimhan, Gopal Ramanujam, Jonathan Tran
  • Patent number: 6523023
    Abstract: A method for searching the Internet is provided that includes generating search criteria for an Internet search utilizing a first search agent that is resident on a first computer, distributing search tasks related to the Internet search to other search agents that are resident on their computers, utilizing the other search agents to perform the distributed search tasks, and then reporting the results of each search task back to the first search agent. In a preferred embodiment, the other search agents also retrieve the results of their distributed search tasks, so that the search results may be more easily accessed by the person that initiated the search. In an embodiment, the computers that host the search agents have connections to a common intranet and the search tasks are distributed only to search agents that have been identified as being available to support Internet searching.
    Type: Grant
    Filed: September 22, 1999
    Date of Patent: February 18, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventor: Glen Sonnenberg
  • Patent number: 6513122
    Abstract: A system, method and computer program product are provided for detecting attacks on a network. Initially, data is received from a remote source which is destined for a target. A portion of such data is then discarded based on a predetermined set of rules utilizing a firewall which is coupled to the remote source. Remaining data is subsequently passed to an intrusion detection system coupled between the firewall and the target. Such data is parsed to identify data representing text (i.e. ASCII or UNICODE text) therein utilizing the intrusion detection system. Thereafter, the data representing text- is compared to a predetermined list of data representing text-associated with attacks utilizing the intrusion detection system. Based on the comparison, some of the data representing text are marked as hostile. The data representing text-that are marked as hostile are then acted upon in order to prevent an attack.
    Type: Grant
    Filed: June 29, 2001
    Date of Patent: January 28, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventors: James S. Magdych, Tarik Rahmanovic, John R. McDonald, Brock E. Tellier, Anthony C. Osborne, Nishad P. Herath
  • Patent number: 6510448
    Abstract: A software virtual machine mechanism that increases the efficiency of context switching is disclosed. In an application to the networking environment, the software virtual machine is operative to increase the efficiency of handling input/output operations through the improved control of switching between contexts. The software virtual machine supports restartable instructions such that the resumption of a previously blocked context will continue at the instruction that had previously blocked.
    Type: Grant
    Filed: January 31, 2000
    Date of Patent: January 21, 2003
    Assignee: Networks Associates Technology, Inc.
    Inventor: Peter J. Churchyard
  • Patent number: 6499109
    Abstract: A method and computer executable program code are disclosed to verify the source of software downloaded from a remote site to a client computer over a computer network before the software can be executed on the client computer.
    Type: Grant
    Filed: February 11, 1999
    Date of Patent: December 24, 2002
    Assignee: Networks Associates Technology, Inc.
    Inventors: Chandrasekar Balasubramaniam, Ravi Kannan, Siddaraya Basappa Revashetti, Srivats Sampath, Babu Katchapalayam
  • Patent number: 6496875
    Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database.
    Type: Grant
    Filed: April 30, 2002
    Date of Patent: December 17, 2002
    Assignee: Networks Associates Technology, Inc.
    Inventors: William Cheng, Kenneth Hwang, Ravi Kannan, Babu Katchapalayam, Bing Liu, Balaji Narasimhan, Gopal Ramanujam, Jonathan Tran
  • Patent number: 6460126
    Abstract: A system and method for managing scarce computer system memory resources has three aspects. A first aspect allows large data structures to be replaced by a pointer that causes an intentional fault to occur. The fault is trapped, and the invention interposes the required data. A second aspect associates data structures with both the task and the module that own the structure. The structure can be eliminated from memory when both the owning task and the owning module have terminated. A third aspect utilizes swapping techniques to maintain multiple local data areas for multiple tasks. In conjunction the three aspects of the invention provide improved resource availability and substantially unimpaired system performance.
    Type: Grant
    Filed: November 13, 1998
    Date of Patent: October 1, 2002
    Assignee: Networks Associates Technology, Inc.
    Inventors: Michael L. Spilo, Jonathan A. Daub
  • Publication number: 20020138505
    Abstract: A method and an apparatus for measuring the temperature parameters of an ISFET that uses hydrogenated amorphous silicon as a sensing film, which uses the measurements of the temperature parameters and the source/drain current and gate voltage in an unknown solution to sense the ion concentration and the pH value of the unknown solution.
    Type: Application
    Filed: January 24, 2001
    Publication date: September 26, 2002
    Applicant: Networks Associates Technology, Inc.
    Inventors: Daniel Fabrizio, Jonathan Daub
  • Patent number: 6457076
    Abstract: A system and method update client computers of various end users with software updates for software products installed on the client computers, the software products manufacturered by diverse, unrelated software vendors. The system includes a service provider computer system, a number of client computers and software vendor computer systems communicating on a common network. The service provider computer system stores in an update database information about the software updates of the diverse software vendors, identifying the software products for which software updates are available, their location on the network at the various software vendor computer systems, information for identifying in the client computers the software products stored thereon, and information for determining for such products, which have software updates available. Users of the client computers connect to the service provider computer and obtain a current version of portions of the database.
    Type: Grant
    Filed: September 13, 2000
    Date of Patent: September 24, 2002
    Assignee: Networks Associates Technology, Inc.
    Inventors: William Cheng, Kenneth Hwang, Ravi Kannan, Babu Katchapalayam, Bing Liu, Balaji Narasimhan, Gopal Ramanujam, Jonathan Tran
  • Publication number: 20020120853
    Abstract: A system, method and computer program product can include a test performed by a computer to determine whether a requestor of resources is a human user or a computer software scripted agent. If the test is passed, then the computer of the present invention assumes that the requestor of resources is a valid human user and access to resources is granted. In an exemplary embodiment of the present invention a system, method and computer program product for controlling access to resources. In an exemplary embodiment the method can include the steps of receiving a request from an entity; presenting the entity with a test; determining from the test whether or not the entity is an intelligent being; and granting the request only if the entity is determined to be an intelligent being.
    Type: Application
    Filed: February 27, 2001
    Publication date: August 29, 2002
    Applicant: NETWORKS ASSOCIATES TECHNOLOGY, INC.
    Inventor: David Spencer Tyree
  • Patent number: 6442686
    Abstract: A cryptographic-enabled messaging system providing a “Policy Management Agent” is described. The Policy Management Agent works in conjunction with a standard mail server, such as an SMTP (Simple Mail Transport Protocol) mail server, to ensure that incoming and outgoing e-mail adheres to the policies that are specified for a given site. Specifically, the Agent intercepts e-mail normally bound for the mail server and checks to make sure that it conforms with policies configured for one's site (e.g., corporate site). If the e-mail adheres to the policies for the site, it is forwarded to the mail server where it is routed to the intended recipient. If the e-mail does not adhere to the policies specified for the site, a message of one's choosing is sent to the client indicating that the e-mail was rejected. In an exemplary embodiment (e.g.
    Type: Grant
    Filed: September 21, 1998
    Date of Patent: August 27, 2002
    Assignee: Networks Associates Technology, Inc.
    Inventors: Mark James McArdle, Steven Blair Schoenfeld
  • Publication number: 20020016959
    Abstract: A computer file update triggering technique uses tags embedded within e-mail messages sent to connected computers to indicate the existence of an updated version of a computer file to those connected computers. The connected computers may then automatically download the updated version of the computer file. The notification via e-mail of the existence of the updated computer files may be provided as a subscription service by the computer file provider.
    Type: Application
    Filed: September 4, 2001
    Publication date: February 7, 2002
    Applicant: NETWORKS ASSOCIATES TECHNOLOGY, INC.
    Inventors: Christopher Andrew Barton, Kristian John Pine, Paul Nicholas Gartside
  • Patent number: 6336186
    Abstract: A cryptosystem having a Certificate (Key) Server for storing and maintaining certificate or key information in a certificate database is described. The Certificate Server allows clients to submit and retrieve keys from a database based on a set of policy constraints which are set for one's particular site (e.g., company). Access to the Certificate Server is maintained by a Certificate Policy Agent, which makes sure that the policy is enforced for a given site based on the information supplied during the configuration. During operation, the Certificate Server responds to client requests to add, search for, and retrieve certificates. The server accepts or rejects certificates based on configurable parameters enforced by a Certificate Policy Agent. When a certificate is submitted to the server, the Certificate Policy Agent checks to see if it meets the criteria for a given site based on the settings specified during the configuration.
    Type: Grant
    Filed: September 16, 1998
    Date of Patent: January 1, 2002
    Assignee: Networks Associates Technology, Inc.
    Inventors: Marc David Dyksterhouse, Jonathan David Callas, Mark James McArdle
  • Patent number: 6314190
    Abstract: A cryptosystem is described which automatically provides an extra “message recovery” recipient(s) when an encrypted message is generated in the system. The system is typically configured such that the extra recipient or “message recovery agent” (MRA)—an entity which itself has a public key (i.e., a MRA public key)—is automatically added, under appropriate circumstances, as a valid recipient for an encrypted message created by a user. In a corporate setting, for example, the message recovery agent is the “corporate” message recovery agent designated for that company (firm, organization, or other group) and the user is an employee (or member) of that company (or group). In operation, the system embeds a pointer (or other reference mechanism) to the MRA public key into the public key of the user or employee, so that encrypted messages sent to the company's employees from outside users (e.g.
    Type: Grant
    Filed: June 4, 1998
    Date of Patent: November 6, 2001
    Assignee: Networks Associates Technology, Inc.
    Inventor: Philip Zimmermann