Patents by Inventor Carl Woodward

Carl Woodward has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11063974
    Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: July 13, 2021
    Assignee: McAfee, LLC
    Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
  • Publication number: 20210097260
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to detect deepfake content. An example apparatus to determine whether input media is authentic includes a classifier to generate a first probability based on a first output of a local binary model manager, a second probability based on a second output of a filter model manager, and a third probability based on a third output of an image quality assessor, a score analyzer to obtain the first, second, and third probabilities from the classifier, and in response to obtaining a first result and a second result, generate a score indicative of whether the input media is authentic based on the first result, the second result, the first probability, the second probability, and the third probability.
    Type: Application
    Filed: September 29, 2020
    Publication date: April 1, 2021
    Inventors: Utkarsh Verma, Sherin M. Mathews, Amanda House, Carl Woodward, Celeste Fralick, Jonathan King
  • Publication number: 20200257795
    Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user, and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine it the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.
    Type: Application
    Filed: May 1, 2020
    Publication date: August 13, 2020
    Applicant: McAfee, LLC
    Inventors: Steve Grobman, Carl Woodward, James D. Beaney, JR., Jimmy Scott Raynor
  • Patent number: 10721248
    Abstract: Methods, apparatus, systems and articles of manufacture to detect steganographically hidden content in a media file are disclosed. An example system includes a media classifier to determine type of a media file, and a detector to apply a detection technique to the media file. The detector selects the detection technique from a plurality of steganographically-based detection techniques based on the media file type. The system also includes a remediator to apply a remediation technique to the media file based on whether the detector detects steganographically hidden content in the media file.
    Type: Grant
    Filed: December 7, 2017
    Date of Patent: July 21, 2020
    Assignee: McAfee, LLC
    Inventors: German Lancioni, Sherin Mathews, Fernando Ruiz, Carl Woodward
  • Patent number: 10678908
    Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.
    Type: Grant
    Filed: December 21, 2013
    Date of Patent: June 9, 2020
    Assignee: McAfee, LLC
    Inventors: Steve Grobman, Carl Woodward, James D. Beaney, Jr., Jimmy Scott Raynor
  • Publication number: 20200067960
    Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.
    Type: Application
    Filed: October 31, 2019
    Publication date: February 27, 2020
    Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
  • Publication number: 20200053109
    Abstract: There is disclosed in one example a computing apparatus, including: a processor; and logic encoded into one or more computer-readable mediums, the logic to instruct the processor to: capture first data from an intermediate data source across a first temporal interval; perform partial signal processing on the first data to classify the first temporal interval as either suspicious or not suspicious, wherein the first temporal interval is classified as suspicious if it is determined to potentially represent at least a portion of a cryptomining operation; classify second through N temporal intervals as either suspicious or not suspicious; based on the first through N temporal intervals, classify the apparatus as either operating a cryptomining function or not; and upon classifying the apparatus as operating a cryptomining function and determining that the cryptomining function is not authorized, take remedial action on the apparatus.
    Type: Application
    Filed: August 9, 2018
    Publication date: February 13, 2020
    Applicant: McAfee, LLC
    Inventors: German Lancioni, Kunal Mehta, Carl Woodward
  • Publication number: 20200034538
    Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform including a performance monitoring unit (PMU); and one or more tangible, non-transitory computer-readable mediums having stored thereon executable instructions to provide a kernel space threat detection engine to: receive a PMU event; correlate the PMU event to a computer security threat including extracting artifacts from the PMU event, and correlating the artifacts to an artifact profile for a known attack; and identify a process associated with the PMU event as a potential attack.
    Type: Application
    Filed: July 30, 2018
    Publication date: January 30, 2020
    Applicant: McAfee, LLC
    Inventors: Carl Woodward, Kunal Mehta
  • Patent number: 10476899
    Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: November 12, 2019
    Assignee: McAfee, LLC
    Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
  • Publication number: 20190182268
    Abstract: Methods, apparatus, systems and articles of manufacture to detect steganographically hidden content in a media file are disclosed. An example system includes a media classifier to determine type of a media file, and a detector to apply a detection technique to the media file. The detector selects the detection technique from a plurality of steganographically-based detection techniques based on the media file type. The system also includes a remediator to apply a remediation technique to the media file based on whether the detector detects steganographically hidden content in the media file.
    Type: Application
    Filed: December 7, 2017
    Publication date: June 13, 2019
    Inventors: German Lancioni, Sherin Mathews, Fernando Ruiz, Carl Woodward
  • Publication number: 20170357313
    Abstract: A system and method of securing data displayed to two or more individuals on two or more displays, wherein the two or more displays include a first display and a second display. One or more fixations of a first individual on the first display are determined. One or more fixations of a second individual on the second display are determined. A first frame buffer is associated with the first display. A second frame buffer is associated with the second display. Segments of the content in the first and second frame buffers are displayed while other segments are obfuscated.
    Type: Application
    Filed: May 15, 2017
    Publication date: December 14, 2017
    Inventors: Ned M. Smith, Vincent Weafer, Alan Krassowski, Carl Woodward
  • Patent number: 9652033
    Abstract: A system and method of securing data displayed to two or more individuals on two or more displays, wherein the two or more displays include a first display and a second display. One or more fixations of a first individual on the first display are determined. One or more fixations of a second individual on the second display are determined. A first frame buffer is associated with the first display. A second frame buffer is associated with the second display. Segments of the content in the first and second frame buffers are displayed while other segments are obfuscated.
    Type: Grant
    Filed: December 19, 2013
    Date of Patent: May 16, 2017
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Vincent Weafer, Alan Krassowski, Carl Woodward
  • Publication number: 20170093897
    Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
  • Publication number: 20170039368
    Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.
    Type: Application
    Filed: December 21, 2013
    Publication date: February 9, 2017
    Applicant: McAfee, Inc.
    Inventors: Steve Grobman, Carl Woodward, James D. Beaney, Jr., Jimmy Scott Raynor
  • Publication number: 20160291689
    Abstract: A system and method of securing data displayed to two or more individuals on two or more displays, wherein the two or more displays include a first display and a second display. One or more fixations of a first individual on the first display are determined. One or more fixations of a second individual on the second display are determined. A first frame buffer is associated with the first display. A second frame buffer is associated with the second display. Segments of the content in the first and second frame buffers are displayed while other segments are obfuscated.
    Type: Application
    Filed: December 19, 2013
    Publication date: October 6, 2016
    Inventors: Ned M. Smith, Vincent Weafer, Alan Krassowski, Carl Woodward
  • Publication number: 20160006754
    Abstract: By way of example, a computing system may include an enclave or other similar secured memory location or process. When the system receives new content or data, it may classify the content as potentially harmful and initially render and display the content in the enclave. The user may then select portions of the content to enable or disable in a final version. The content may also be converted to a known “safe” equivalent format that always renders in the enclave. Enclave-rendered content may be signed by the enclave so that they can be considered “trusted” so long as the certificate remains valid and the content is correctly signed.
    Type: Application
    Filed: June 18, 2015
    Publication date: January 7, 2016
    Inventors: Carl Woodward, Ofir Arkin
  • Patent number: 7163702
    Abstract: This present invention discloses use of a chloroform/solvent mixture extraction at different solvent-to-feed ratios, followed by evaporation and extraction with ethyl acetate/water; followed by chromatography of the water phase in Teflon or other non-polar resin and Silica gel column chromatography for recovering of individual triterpene glycosides (saponins) of high purity from the freeze dried or spray dried cooking water or dried powderized tissues of the industrial processed sea cucumber Cucumaria frondosa. A resulting glycoside Frondoside A stimulates lysosomal activity of peritoneal macrophages, phagocytosis and oxidative burst in the macrophages at concentrations significantly less than for acute toxicity, hemolysis and sea urchin embryo toxicity.
    Type: Grant
    Filed: June 6, 2005
    Date of Patent: January 16, 2007
    Inventors: Sergey Anatolievuch Avilov, Vladimir Ivanovich Kalinin, Alexandra Sergeevna Silchenko, Dmitry Lvovich Aminin, Irina Grigorevna Agafonova, Valentin Aronovich Stonik, Peter D. Collin, Carl Woodward
  • Patent number: 6123848
    Abstract: A process and apparatus for purifying water-insoluble particles is disclosed. The process comprises the steps of continuously recirculating a fluid aqueous suspension of the water-insoluble particles between a filtration system and a suspension reservoir; continuously conducting ultrafiltration of the recirculating suspension at the filtration system to separate an aqueous permeate containing the water-soluble impurities from the recirculating fluid aqueous suspension; continuously discharging the permeate generated by ultrafiltration; adding water to the recirculating fluid aqueous suspension undergoing ultrafiltration at approximately the same volumetric rate per hour as permeate is being discharged; monitoring the purity of the recirculating fluid aqueous suspension; and recovering the purified fluid aqueous suspension after the recirculating fluid aqueous suspension has reached a predetermined purity condition. An apparatus is also disclosed for carrying out the above process.
    Type: Grant
    Filed: February 12, 1998
    Date of Patent: September 26, 2000
    Assignee: Warner-Jenkinson Company, Inc.
    Inventors: Rosa Isabel Quepons Dominguez, Lance Eugene Solter, Danny Thomas Lauff, John David Mitchell, Edward Charles Jantosik, Jr., David Carl Woodward