Patents by Inventor Ahmed Said

Ahmed Said has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8819826
    Abstract: A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. The malware executable objects includes the executable objects that are associated with the open network connections that are connected to the first network destination.
    Type: Grant
    Filed: January 27, 2010
    Date of Patent: August 26, 2014
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8813227
    Abstract: A system for securing an electronic device may include a memory, a processor; one or more operating systems residing in the memory for execution by the processor; and a security agent configured to execute on the electronic device at a level below all of the operating systems of the electronic device accessing the memory. The security agent may be further configured to: (i) trap attempted accesses to the memory, wherein each of such attempted accesses may, individually or in the aggregate, indicate the presence of self-modifying malware; (ii) in response to trapping each attempted access to the memory, record information associated with the attempted access in a history; and (iii) in response to a triggering attempted access associated with a particular memory location, analyze information in the history associated with the particular memory location to determine if suspicious behavior has occurred with respect to the particular memory location.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: August 19, 2014
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8785623
    Abstract: The present invention relates to ferromagnetic materials based on nano-sized bacterial cellulose templates. More specifically, the present invention provides an agglomerate free magnetic nanoparticle cellulose material and a method of forming such magnetic nanoparticle cellulose material. Further, the magnetic nonoparticles are physically attached on the cellulose material and evenly distribute.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: July 22, 2014
    Assignee: Cellutech AB
    Inventors: Richard T. Olsson, My Ahmed Said Samir Azizi, Lars Berglund, Ulf W. Gedde
  • Publication number: 20140196146
    Abstract: A system, method and computer program product are provided. In use, a COM server dynamic link library is identified. Further, an emulation layer is inserted in association with the COM server dynamic link library to emulate interfaces exported by the COM server dynamic link library. As an option, it may be determined whether the COM server DLL is loaded, and the emulation layer may be inserted in response to the determination.
    Type: Application
    Filed: July 11, 2006
    Publication date: July 10, 2014
    Inventor: Ahmed Said Sallam
  • Publication number: 20140130157
    Abstract: A method for analyzing a computing system includes the steps of at a first moment in time, scanning the resources of the computing system for indications of malware, at a second moment in time scanning the resources of the computing system for indications of malware and determining the system executable objects loaded on the computing system, determining malware system changes, identifying a relationship between the malware system changes and the system executable objects loaded on the computing system, and identifying as suspected malware the system executable objects loaded on the computing system which have a relationship with the malware system changes. The malware system changes include differences between the results of scanning the resources of the computing system for indications of malware at the second and first moment of time.
    Type: Application
    Filed: November 5, 2012
    Publication date: May 8, 2014
    Inventor: Ahmed Said Sallam
  • Publication number: 20140071111
    Abstract: An electronic display includes a display panel. The display panel includes a pixel array and receives a supply voltage. The display panel also includes a panel driver configured to generate a gate line voltage. The panel driver also supplies the gate line voltage to the display panel based on a comparison between the gate line voltage and the supply voltage.
    Type: Application
    Filed: November 9, 2012
    Publication date: March 13, 2014
    Applicant: APPLE INC.
    Inventors: Taif Ahmed Said, Kevin J. White, Sang Y. Youn
  • Patent number: 8650642
    Abstract: A below-operating system security agent may be configured to: (i) trap attempted accesses to the components of the operating system and the set of drivers executing on the electronic device; (ii) in response to trapping an attempted access, compare contextual information associated with the attempted access to an access map; and (iii) determine if the attempted access is trusted based on the comparison. The access map may be generated by: (i) trapping, at a level below all of the operating systems of a second electronic device accessing components of the second operating system and the second set of drivers executing on the second electronic device and each substantially free of malware, accesses to components of the second operating system and the second set of drivers executing on the second electronic device; and (ii) in response to trapping the accesses, recording contextual information regarding the accesses to the access map.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: February 11, 2014
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8650641
    Abstract: A system for protecting an electronic system against malware includes an operating system configured to execute on the electronic device, a driver coupled to the operating system, and a below-operating-system security agent. The below-operating-system security agent is configured to identify one or more resources for changing filters of the driver, trap an attempted access of the one or more resources that originates from the operational level of the operating system, access one or more security rules to determine whether the attempted access is indicative of malware, and operate at a level below all of the operating systems of the electronic system accessing the one or more resources for changing filters of the driver.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: February 11, 2014
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8621620
    Abstract: In one embodiment, a system for securing a storage device includes an electronic device comprising a processor, a storage device communicatively coupled to the processor, and a security agent. The security agent is configured to execute at a level below all of the operating systems of the electronic device, intercept a request to access the storage device, identify a requesting entity responsible for initiating the request, and utilize one or more security rules to determine if the request from the requesting entity is authorized. In some embodiments, the security agent is configured to determine whether the request involves a protected area of the storage device. If the request involves a protected area of the storage device, the security agent may be configured to allow the request if the requesting entity is authorized to access the protected area of the storage device.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8613006
    Abstract: A system, method, and computer program product are provided for terminating a hidden kernel process. In use, a hidden kernel process structure associated with a hidden kernel process is identified. In addition, the hidden kernel process structure is inserted into an active process list. Further, the hidden kernel process is terminated.
    Type: Grant
    Filed: December 15, 2011
    Date of Patent: December 17, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8549648
    Abstract: A security module may be configured to execute on the electronic device at a level below all of the operating systems of an electronic device accessing the one or more system resources. The security module may be configured to: trap one or more attempts to access system resources of the electronic device, the one or more attempts made from a less privileged ring of execution than the first security module; record information identifying one or more processes attempting to access the system resources of the electronic device; compare the information identifying one or more processes attempting to access the system resources with the enumerated one or more processes visible to the operating system; and based on the comparison, determine one or more hidden processes, the hidden processes determined by at least identifying processes whose information was recorded by first security module but were not enumerated by the second security module.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: October 1, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8549644
    Abstract: A method for protecting an electronic device against malware includes consulting one or more security rules to determine a processor resource to protect, in a module below the level of all operating systems of the electronic device, intercepting an attempted access of the processor resource, accessing a processor resource control structure to determine a criteria by which the attempted access will be trapped, trapping the attempted access if the criteria is met, and consulting the one or more security rules to determine whether the attempted access is indicative of malware. The attempted access originates from the operational level of one of one or more operating systems of the electronic device.
    Type: Grant
    Filed: March 28, 2011
    Date of Patent: October 1, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Publication number: 20130247024
    Abstract: A system, method, and computer program product are provided for populating a list of known wanted data. In use, an update to data is identified. In addition, a list of known wanted data is populated with the data, in response to the update.
    Type: Application
    Filed: March 31, 2008
    Publication date: September 19, 2013
    Inventor: Ahmed Said Sallam
  • Patent number: 8527978
    Abstract: A system, method, and computer program product are provided for populating a list of known wanted data. In use, an update to data is identified. In addition, a list of known wanted data is populated with the data, in response to the update.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: September 3, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Publication number: 20130197896
    Abstract: Some implementations provide techniques and arrangements to perform automated translation from a source language to a target language. For example, an out-of-vocabulary word may be identified and a morphological analysis may be performed to determine whether the out-of-vocabulary word reduces to at least one stem. If the out-of-vocabulary word reduces to a stem, the stem may be translated. The translated stem may be inflected if the out-of-vocabulary word is inflected. If the out-of-vocabulary word has any affixes, the affixes may be translated. In some cases, the translated affixes may be reordered before being combined with the inflected and translated stem. If the out-of-vocabulary word is misspelled, the spelling of the out-of-vocabulary word may be corrected before performing the morphological analysis. If the out-of-vocabulary word is a colloquial form of a formal word, the out-of-vocabulary word may be replaced with the formal word before performing the morphological analysis.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Achraf Chalabi, Ahmed Said Morsy, Hany Awadalla, Mohamed El-Sharqwi, Sayed Hassan
  • Patent number: 8474039
    Abstract: A method for detecting malware memory infections includes the steps of scanning a memory on an electronic device, determining a suspicious entry present in the memory, accessing information about the suspicious entry in a reputation system, and evaluating whether the suspicious entry indicates a malware memory infection. The memory includes memory known to be modified by malware. The suspicious entry is not recognized as a safe entry. The reputation system is configured to store information on suspicious entries. The evaluation is based upon historical data regarding the suspicious entry.
    Type: Grant
    Filed: January 27, 2010
    Date of Patent: June 25, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8458794
    Abstract: A system, method, and computer program product are provided for determining whether a hook is associated with potentially unwanted activity. In use, a hook is identified in a data section or a code section. Additionally, a first enumeration of objects associated with the data section or the code section is performed, and a second enumeration of objects associated with the data section or the code section is performed. Further, results of the first enumeration and results of the second enumeration are compared for determining whether the hook is associated with potentially unwanted activity.
    Type: Grant
    Filed: September 6, 2007
    Date of Patent: June 4, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8365276
    Abstract: A system, method and computer program product are provided for sending, to a central system, information associated with unwanted activity. In use, information associated with unwanted activity is identified utilizing a plurality of different types of security systems. Further, the information is sent to a central system.
    Type: Grant
    Filed: December 10, 2007
    Date of Patent: January 29, 2013
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8307434
    Abstract: A method for analyzing a computing system includes the steps of at a first moment in time, scanning the resources of the computing system for indications of malware, at a second moment in time scanning the resources of the computing system for indications of malware and determining the system executable objects loaded on the computing system, determining malware system changes, identifying a relationship between the malware system changes and the system executable objects loaded on the computing system, and identifying as suspected malware the system executable objects loaded on the computing system which have a relationship with the malware system changes. The malware system changes include differences between the results of scanning the resources of the computing system for indications of malware at the second and first moment of time.
    Type: Grant
    Filed: January 27, 2010
    Date of Patent: November 6, 2012
    Assignee: McAfee, Inc.
    Inventor: Ahmed Said Sallam
  • Patent number: 8291494
    Abstract: A system, method, and computer program product are provided for detecting unwanted activity associated with an object, based on an attribute associated with the object. In use, an object is labeled with an attribute of a predetermined behavior based on detection of the predetermined behavior in association with the object. Additionally, unwanted activity associated with the object is detected, utilizing the attribute.
    Type: Grant
    Filed: July 8, 2008
    Date of Patent: October 16, 2012
    Assignee: McAfee, Inc.
    Inventors: Ahmed Said Sallam, Joel R. Spurlock