Patents by Inventor Carl D. Woodward

Carl D. Woodward has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180063091
    Abstract: There is disclosed in an example a computing apparatus, comprising: a network interface; a messaging application to communicate via the network interface; and one or more logic elements comprising a security layer, discrete from the messaging application, to: generate a message; secure the message; and send the message via the messaging application.
    Type: Application
    Filed: December 28, 2016
    Publication date: March 1, 2018
    Applicant: McAfee, Inc.
    Inventors: German Lancioni, Carl D. Woodward, Mario Leandro Bertogna
  • Patent number: 9904782
    Abstract: Providing synchronous processing of the designated computing events using hardware-assisted virtualization technology by performing at least the following: detecting a designated computing event using a high priority, low capability routine, creating a copy code in an alternate memory space of a first code located in a first memory space, modifying the copy code to call for analysis of at least a portion of the copy code that corresponds to the first code, switching execution of the first code with the modified copy code using an address translation data structure that translates a guest memory address to a host memory address after a return of the high priority, low capability routine; and analyzing synchronously the at least a portion of the code within the copy code that corresponds to the first code based on the replacement of the first code with the modified copy code.
    Type: Grant
    Filed: October 27, 2015
    Date of Patent: February 27, 2018
    Assignee: McAfee, LLC
    Inventors: Carl D. Woodward, Jennifer Mankin, Dmitri Rubakha, Palanivel Rajan Shanmugavelayutham, Vadim Sukhomlinov
  • Publication number: 20180018458
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to allow for the mitigation of ransomware. For example, the system can determine that an application begins to execute, determine that the application attempts to modify a file, determine a file type for the file, and create a security event if the application is not authorized to modify the file type. In another example, the system determines an entropy value between the file and the attempted modification of the file, and create a security event if the entropy value satisfies a threshold or determine a system entropy value that includes a rate at which other files on the system are being modified by the application, and create a security event if the system entropy value satisfies a threshold.
    Type: Application
    Filed: July 14, 2016
    Publication date: January 18, 2018
    Applicant: McAfee, Inc.
    Inventors: Craig D. Schmugar, Cedric Cochin, Andrew Furtak, Adam James Carrivick, Yury Bulygin, John J. Loucaides, Oleksander Bazhaniuk, Christiaan Beek, Carl D. Woodward, Ronald Gallella, Gregory Michael Heitzmann, Joel R. Spurlock
  • Patent number: 9870466
    Abstract: There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.
    Type: Grant
    Filed: September 26, 2015
    Date of Patent: January 16, 2018
    Assignee: McAfee, Inc.
    Inventors: Carl D. Woodward, Jennifer Eligius Mankin, Jeremy Bennett
  • Publication number: 20170187748
    Abstract: Protecting personally identifiable information data collected and/or stored in physical objects with embedded electronic devices by performing at least the following: obtaining a plurality of personally identifiable information algorithms for a plurality of electronic user devices, determining a relevant personally identifiable information algorithm from the plurality of personally identifiable information algorithms, executing the relevant personally identifiable information algorithm over the relevant personally identifiable information from one of the electronic user devices to construct a personally identifiable information data result, and transmitting the personally identifiable information data result without transmitting the relevant personally identifiable information to a remote computing system.
    Type: Application
    Filed: December 23, 2015
    Publication date: June 29, 2017
    Inventors: Ryan M. Durand, Carl D. Woodward, Kunal Mehta, Lynda M. Grindstaff
  • Publication number: 20170177884
    Abstract: In an example, there is disclosed a computing apparatus, comprising: a psychological state data interface to receive psychological state data; one or more logic elements, including at least one hardware element, comprising a verification engine to: receive a requested user action; receive a psychological state input via the psychological state data interface; analyze the psychological state input; and bar the requested user action at least partly responsive to the analyzing.
    Type: Application
    Filed: December 21, 2015
    Publication date: June 22, 2017
    Applicant: McAfee, Inc.
    Inventors: Kunal Mehta, Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt
  • Patent number: 9678687
    Abstract: In an example, there is disclosed a computing apparatus, including a processor, including a trusted execution instruction set; a memory having an enclave portion, wherein the enclave is accessible only via the trusted execution instruction set; a swap file; and a memory management engine operable to: allocate a buffer within the enclave; receive a scope directive to indicate that the buffer is in scope; and protect the buffer from swapping to the swap file while the buffer is in scope. There is further disclosed an method of providing a memory management engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing the memory management engine.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: June 13, 2017
    Assignee: McAfee, Inc.
    Inventors: Carl D. Woodward, Venkata Ramanan Sambandam, Dmitri Rubakha
  • Publication number: 20170116419
    Abstract: Providing synchronous processing of the designated computing events using hardware-assisted virtualization technology by performing at least the following: detecting a designated computing event using a high priority, low capability routine, creating a copy code in an alternate memory space of a first code located in a first memory space, modifying the copy code to call for analysis of at least a portion of the copy code that corresponds to the first code, switching execution of the first code with the modified copy code using an address translation data structure that translates a guest memory address to a host memory address after a return of the high priority, low capability routine; and analyzing synchronously the at least a portion of the code within the copy code that corresponds to the first code based on the replacement of the first code with the modified copy code.
    Type: Application
    Filed: October 27, 2015
    Publication date: April 27, 2017
    Inventors: Carl D. Woodward, Jennifer Mankin, Dmitri Rubakha, Palanivel Rajan Shanmugavelayutham, Vadim Sukhomlinov
  • Publication number: 20170116418
    Abstract: A combination of hardware monitoring and binary translation software allow detection of return-oriented programming (ROP) exploits with low overhead and low false positive rates. Embodiments may use various forms of hardware to detect ROP exploits and indicate the presence of an anomaly to a device driver, which may collect data and pass the indication of the anomaly to the binary translation software to instrument the application code and determine whether an ROP exploit has been detected. Upon detection of the ROP exploit, the binary translation software may indicate the ROP exploit to an anti-malware software, which may take further remedial action as desired.
    Type: Application
    Filed: October 26, 2015
    Publication date: April 27, 2017
    Inventors: Palanivelrajan Rajan Shanmugavelayutham, Koichi Yamada, Vadim Sukhomlinov, Igor Muttik, Oleksandr Bazhaniuk, Yuriy Bulygin, Dmitri Rubakha, Jennifer Eligius Mankin, Carl D. Woodward, Sevin F. Varoglu, Dima Mirkin, Alex Nayshtut
  • Publication number: 20170111388
    Abstract: A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a secured storage communicatively coupled to the client. The system further includes a client application including computer-executable instructions on the medium. The instructions are readable by the processor. The application is configured to manage a trusted image of software of a client in a secured storage and, upon a signal indicating malware on the client, restore the trusted image to the client independent of an operating system and user processes of the client.
    Type: Application
    Filed: April 1, 2016
    Publication date: April 20, 2017
    Inventors: Kunal Mehta, Dmitri Rubakha, Carl D. Woodward, Steven L. Grobman, Adrian R. Pearson, Faraz A. Siddiqi
  • Publication number: 20170090821
    Abstract: In an example, there is disclosed a computing apparatus, including a processor, including a trusted execution instruction set; a memory having an enclave portion, wherein the enclave is accessible only via the trusted execution instruction set; a swap file; and a memory management engine operable to: allocate a buffer within the enclave; receive a scope directive to indicate that the buffer is in scope; and protect the buffer from swapping to the swap file while the buffer is in scope. There is further disclosed an method of providing a memory management engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing the memory management engine.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Applicant: McAfee, Inc.
    Inventors: Carl D. Woodward, Venkata Ramanan Sambandam, Dmitri Rubakha
  • Publication number: 20170091444
    Abstract: There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.
    Type: Application
    Filed: September 26, 2015
    Publication date: March 30, 2017
    Applicant: McAfee, Inc.
    Inventors: Carl D. Woodward, Jennifer Eligius Mankin, Jeremy Bennett