Patents by Inventor Carl Woodward
Carl Woodward has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11907362Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user, and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine it the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.Type: GrantFiled: May 1, 2020Date of Patent: February 20, 2024Assignee: MAfee, LLCInventors: Steve Grobman, Carl Woodward, James D. Beaney, Jr., Jimmy Scott Raynor
-
Publication number: 20230334906Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to detect deepfake content. An example apparatus to determine whether input media is authentic includes a classifier to generate a first probability based on a first output of a local binary model manager, a second probability based on a second output of a filter model manager, and a third probability based on a third output of an image quality assessor, a score analyzer to obtain the first, second, and third probabilities from the classifier, and in response to obtaining a first result and a second result, generate a score indicative of whether the input media is authentic based on the first result, the second result, the first probability, the second probability, and the third probability.Type: ApplicationFiled: June 22, 2023Publication date: October 19, 2023Inventors: Utkarsh Verma, Sherin M. Mathews, Amanda House, Carl Woodward, Celeste Fralick, Jonathan King
-
Patent number: 11727721Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to detect deepfake content. An example apparatus to determine whether input media is authentic includes a classifier to generate a first probability based on a first output of a local binary model manager, a second probability based on a second output of a filter model manager, and a third probability based on a third output of an image quality assessor, a score analyzer to obtain the first, second, and third probabilities from the classifier, and in response to obtaining a first result and a second result, generate a score indicative of whether the input media is authentic based on the first result, the second result, the first probability, the second probability, and the third probability.Type: GrantFiled: September 29, 2020Date of Patent: August 15, 2023Assignee: MCAFEE, LLCInventors: Utkarsh Verma, Sherin M Mathews, Amanda House, Carl Woodward, Celeste Fralick, Jonathan King
-
Publication number: 20230032194Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to classify a sample as clean or malicious. An example apparatus includes instruction identifies circuitry to convert a sample into a sequence of instructions, abstract language circuitry to transform the sequence of instructions into an abstract language representation, transition matrix circuitry to create a Markov transition matrix, the Markov transition matrix to represent transitions within the abstract language representation, and classifier circuitry to classify an unknown sample as clean or malicious, the classification in response to whether the Markov transition matrix is closer to a clean group of Markov transition matrices or a malicious group of Markov transition matrices.Type: ApplicationFiled: December 23, 2021Publication date: February 2, 2023Inventors: German Lancioni, Carl Woodward, Jonathan Edwards
-
Patent number: 11184373Abstract: There is disclosed in one example a computing apparatus, including: a processor; and logic encoded into one or more computer-readable mediums, the logic to instruct the processor to: capture first data from an intermediate data source across a first temporal interval; perform partial signal processing on the first data to classify the first temporal interval as either suspicious or not suspicious, wherein the first temporal interval is classified as suspicious if it is determined to potentially represent at least a portion of a cryptomining operation; classify second through N temporal intervals as either suspicious or not suspicious; based on the first through N temporal intervals, classify the apparatus as either operating a cryptomining function or not; and upon classifying the apparatus as operating a cryptomining function and determining that the cryptomining function is not authorized, take remedial action on the apparatus.Type: GrantFiled: August 9, 2018Date of Patent: November 23, 2021Assignee: McAfee, LLCInventors: German Lancioni, Kunal Mehta, Carl Woodward
-
Patent number: 11063974Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: GrantFiled: October 31, 2019Date of Patent: July 13, 2021Assignee: McAfee, LLCInventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Publication number: 20210097260Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to detect deepfake content. An example apparatus to determine whether input media is authentic includes a classifier to generate a first probability based on a first output of a local binary model manager, a second probability based on a second output of a filter model manager, and a third probability based on a third output of an image quality assessor, a score analyzer to obtain the first, second, and third probabilities from the classifier, and in response to obtaining a first result and a second result, generate a score indicative of whether the input media is authentic based on the first result, the second result, the first probability, the second probability, and the third probability.Type: ApplicationFiled: September 29, 2020Publication date: April 1, 2021Inventors: Utkarsh Verma, Sherin M. Mathews, Amanda House, Carl Woodward, Celeste Fralick, Jonathan King
-
Publication number: 20200257795Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user, and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine it the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.Type: ApplicationFiled: May 1, 2020Publication date: August 13, 2020Applicant: McAfee, LLCInventors: Steve Grobman, Carl Woodward, James D. Beaney, JR., Jimmy Scott Raynor
-
Patent number: 10721248Abstract: Methods, apparatus, systems and articles of manufacture to detect steganographically hidden content in a media file are disclosed. An example system includes a media classifier to determine type of a media file, and a detector to apply a detection technique to the media file. The detector selects the detection technique from a plurality of steganographically-based detection techniques based on the media file type. The system also includes a remediator to apply a remediation technique to the media file based on whether the detector detects steganographically hidden content in the media file.Type: GrantFiled: December 7, 2017Date of Patent: July 21, 2020Assignee: McAfee, LLCInventors: German Lancioni, Sherin Mathews, Fernando Ruiz, Carl Woodward
-
Patent number: 10678908Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.Type: GrantFiled: December 21, 2013Date of Patent: June 9, 2020Assignee: McAfee, LLCInventors: Steve Grobman, Carl Woodward, James D. Beaney, Jr., Jimmy Scott Raynor
-
Publication number: 20200067960Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Publication number: 20200053109Abstract: There is disclosed in one example a computing apparatus, including: a processor; and logic encoded into one or more computer-readable mediums, the logic to instruct the processor to: capture first data from an intermediate data source across a first temporal interval; perform partial signal processing on the first data to classify the first temporal interval as either suspicious or not suspicious, wherein the first temporal interval is classified as suspicious if it is determined to potentially represent at least a portion of a cryptomining operation; classify second through N temporal intervals as either suspicious or not suspicious; based on the first through N temporal intervals, classify the apparatus as either operating a cryptomining function or not; and upon classifying the apparatus as operating a cryptomining function and determining that the cryptomining function is not authorized, take remedial action on the apparatus.Type: ApplicationFiled: August 9, 2018Publication date: February 13, 2020Applicant: McAfee, LLCInventors: German Lancioni, Kunal Mehta, Carl Woodward
-
Publication number: 20200034538Abstract: There is disclosed in one example a computing apparatus, including: a hardware platform including a performance monitoring unit (PMU); and one or more tangible, non-transitory computer-readable mediums having stored thereon executable instructions to provide a kernel space threat detection engine to: receive a PMU event; correlate the PMU event to a computer security threat including extracting artifacts from the PMU event, and correlating the artifacts to an artifact profile for a known attack; and identify a process associated with the PMU event as a potential attack.Type: ApplicationFiled: July 30, 2018Publication date: January 30, 2020Applicant: McAfee, LLCInventors: Carl Woodward, Kunal Mehta
-
Patent number: 10476899Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: GrantFiled: September 25, 2015Date of Patent: November 12, 2019Assignee: McAfee, LLCInventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Publication number: 20190182268Abstract: Methods, apparatus, systems and articles of manufacture to detect steganographically hidden content in a media file are disclosed. An example system includes a media classifier to determine type of a media file, and a detector to apply a detection technique to the media file. The detector selects the detection technique from a plurality of steganographically-based detection techniques based on the media file type. The system also includes a remediator to apply a remediation technique to the media file based on whether the detector detects steganographically hidden content in the media file.Type: ApplicationFiled: December 7, 2017Publication date: June 13, 2019Inventors: German Lancioni, Sherin Mathews, Fernando Ruiz, Carl Woodward
-
Publication number: 20170357313Abstract: A system and method of securing data displayed to two or more individuals on two or more displays, wherein the two or more displays include a first display and a second display. One or more fixations of a first individual on the first display are determined. One or more fixations of a second individual on the second display are determined. A first frame buffer is associated with the first display. A second frame buffer is associated with the second display. Segments of the content in the first and second frame buffers are displayed while other segments are obfuscated.Type: ApplicationFiled: May 15, 2017Publication date: December 14, 2017Inventors: Ned M. Smith, Vincent Weafer, Alan Krassowski, Carl Woodward
-
Patent number: 9652033Abstract: A system and method of securing data displayed to two or more individuals on two or more displays, wherein the two or more displays include a first display and a second display. One or more fixations of a first individual on the first display are determined. One or more fixations of a second individual on the second display are determined. A first frame buffer is associated with the first display. A second frame buffer is associated with the second display. Segments of the content in the first and second frame buffers are displayed while other segments are obfuscated.Type: GrantFiled: December 19, 2013Date of Patent: May 16, 2017Assignee: Intel CorporationInventors: Ned M. Smith, Vincent Weafer, Alan Krassowski, Carl Woodward
-
Publication number: 20170093897Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Publication number: 20170039368Abstract: In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.Type: ApplicationFiled: December 21, 2013Publication date: February 9, 2017Applicant: McAfee, Inc.Inventors: Steve Grobman, Carl Woodward, James D. Beaney, Jr., Jimmy Scott Raynor
-
Publication number: 20160291689Abstract: A system and method of securing data displayed to two or more individuals on two or more displays, wherein the two or more displays include a first display and a second display. One or more fixations of a first individual on the first display are determined. One or more fixations of a second individual on the second display are determined. A first frame buffer is associated with the first display. A second frame buffer is associated with the second display. Segments of the content in the first and second frame buffers are displayed while other segments are obfuscated.Type: ApplicationFiled: December 19, 2013Publication date: October 6, 2016Inventors: Ned M. Smith, Vincent Weafer, Alan Krassowski, Carl Woodward