Patents by Inventor Daniel Joseph Wolff
Daniel Joseph Wolff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120030766Abstract: A method for defining an area to record changes made to a computer system is disclosed. The method includes defining a safe area on a primary storage device of the computer system and storing information on the location of the safe area on a secondary storage device. The method further includes booting the computer system utilizing a backup device and changing data on the primary storage device. The changes are recorded in the safe area of the primary storage device and are accessible when the computer system is booted from the backup device.Type: ApplicationFiled: October 4, 2011Publication date: February 2, 2012Inventors: Lee Codel Lawson Tarbotton, Paul Nicholas Gartside, Daniel Joseph Wolff
-
Patent number: 8069480Abstract: A method for defining an area to record changes made to a computer system is provided. A safe area is defined on a primary storage device of the computer system and information is stored on the location of the safe area on a secondary storage device. Further, the computer system is booted utilizing a backup device and data is changed on the primary storage device. The changes are recorded in the safe area of the primary storage device and are accessible when the computer system is booted from the backup device.Type: GrantFiled: September 30, 2002Date of Patent: November 29, 2011Assignee: McAfee, Inc.Inventors: Lee Codel Lawson Tarbotton, Paul Nicholas Gartside, Daniel Joseph Wolff
-
Patent number: 7346781Abstract: When a user commands execution of a computer program to commence, a loader program 2 is first started. This loader program 2 reads an encrypted version of the computer program 6 and decrypts it using a public key. This generates an executable version of the computer program 9 which is written directly to the computer memory 8. When the loader program 2 has decrypted the whole of the computer program 9 it starts execution of the computer program 9 it has written into the computer memory 8 and terminates itself or is terminated by the computer program it started. The computer program 9 written into the computer memory 8 will be written into its own memory space and will have its own execution thread. The encryption used may be public key/private key encryption.Type: GrantFiled: December 6, 2001Date of Patent: March 18, 2008Assignee: McAfee, Inc.Inventors: Neil Andrew Cowie, Igor Garrievich Muttik, Daniel Joseph Wolff
-
Patent number: 7281267Abstract: A software audit system is provided in conjunction with an anti-virus system. A computer virus scan request received by the anti-virus system (16) is used to trigger an audit data generator (18) to generate audit data. The audit data generator (18) may also serve to ban certain computer programs from execution and monitor the concurrent usage of other computer programs.Type: GrantFiled: February 20, 2001Date of Patent: October 9, 2007Assignee: McAfee, Inc.Inventors: Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Timothy James Page
-
Patent number: 7272724Abstract: An anti computer virus program uses a library of virus drivers that includes an indication of whether a particular virus can cause irreparable damage and data indicating enhanced user warnings and actions that might be associated with such viruses. If a detected computer virus is one that can cause irreparable damage, then an enhanced user warning (16) is issued indicating this to the user and a notification (28) of the possibility of such corruption is added into the repaired computer file. The notification may take the form of an electronically signed (30) banner message or the like.Type: GrantFiled: February 20, 2001Date of Patent: September 18, 2007Assignee: McAfee, Inc.Inventors: Lee Codel Lawson Tarbotton, Robert Edward Moore, Daniel Joseph Wolff
-
Patent number: 7228565Abstract: An event report, such as a virus detection event, is sent from a reporting computer 2 to a receiving computer 6 via an internet link 4. The report data may take the form of a URL requesting a web page 28 to be provided by the receiving computer 6, the URL bearing an encrypted form 24 of the report data that is used to identify the requested web page as well as pass further information to the receiving computer 6. Alternatively, the report data may be collated in the reporting computer 2 and passed to the receiving computer 6 when a computer virus definition data update is requested. The report data seeks to uniquely identify the event by incorporating the MAC address of the reporting computer 2, the date, time, computer product identifier, version identifier, update identifier and driver triggered. Additionally, a checksum derived from the infected file together with an indication of the corrective action, if any, taken by the reporting computer 2 may be included.Type: GrantFiled: May 15, 2001Date of Patent: June 5, 2007Assignee: McAfee, Inc.Inventors: Daniel Joseph Wolff, Lee Codel Lawson Tarbotton, Edward Moore
-
Patent number: 7150042Abstract: The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware.Type: GrantFiled: December 6, 2001Date of Patent: December 12, 2006Assignee: McAfee, Inc.Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
-
Patent number: 7093002Abstract: The present invention provides a load balancing device, computer program product, and method for balancing the load across a plurality of proxy devices arranged to perform malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device. The load balancing device is arranged so as to intercept access requests issued to the file storage device, and comprises a client interface for receiving an access request issued to the file storage device using the dedicated file access protocol.Type: GrantFiled: December 6, 2001Date of Patent: August 15, 2006Assignee: McAfee, Inc.Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
-
Patent number: 7043634Abstract: When a file is created on a computer, an archive copy of that file is also created and separately stored. Upon a subsequent access to the active copy of that file, a comparison between the active copy and the full archived copy is made to detect any changes. If there are not any changes, then the active copy of the file is assumed to be clean from malicious alteration and the access request is permitted. If an alteration has been made and is detected, then further countermeasures are triggered, such as full virus scanning of that file or blocking of its use. This archiving and comparison technique may be selectively applied to a subset of file types, such as executable files and dynamic link libraries, which are known to be infrequently modified during normal user operations.Type: GrantFiled: May 15, 2001Date of Patent: May 9, 2006Assignee: McAfee, Inc.Inventors: Daniel Joseph Wolff, Mark Harris, Michael Kenneth Glover
-
Patent number: 7023861Abstract: A network bridge (14) has an associated malware scanner (16) that serves to concatenate portions of a data file from within data packets intercepted by the network bridge (14) and then scan the data file concerned before the data file is forwarded to its intended recipient by the network bridge (14). The network bridge (14) may be inserted in a network topology without requiring significant network configuration changes. The network bridge (14) may include a packet analysis unit (56) that serves to intercept only data packets having a predetermined network layer protocol or a predetermined application layer protocol.Type: GrantFiled: July 26, 2001Date of Patent: April 4, 2006Assignee: McAfee, Inc.Inventors: Graham Arthur Makinson, Eamonn John Baulk, Daniel Joseph Wolff
-
Patent number: 7013330Abstract: A source computer 2 having a copy of a computer file that it is desired to download to a plurality of target computers issues broadcast messages via a computer network linked to those target computers. The broadcast messages indicate the availability of the computer file for download and include a download qualifying parameter. The download qualifying parameter is used by receiving target computers to determine whether or not they qualify to attempt a download from the source computer in response to the received broadcast message. Only those target computers that do qualify attempt a download. The source computer monitors how many target computers make a download attempt in response to a particular broadcast message and adjusts the download qualifying parameters in subsequent broadcast messages so that the target computers progressively download the new computer file without overloading the source computer.Type: GrantFiled: October 3, 2000Date of Patent: March 14, 2006Assignee: Networks Associates Technology, Inc.Inventors: Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Paul Nicholas Gartside, Graham Arthur Makinson, Nicholas Paul Kelly
-
Patent number: 6971023Abstract: A system for scanning computer files for unwanted properties, such as containing computer viruses or being spam e-mail, allocates a priority to pending scan requests based upon the identity of a computer user associated with the scan request. In the case of a normal file access request, the computer user associated with the scan request may be the file access request or in the case of an on-demand scan, then the computer user associated with a particular scan request for a computer file may be the owner or creator of that computer file. In the case of scan requests associated with e-mails, the sender or recipient computer user may be used in the allocation of a priority level for the scan request.Type: GrantFiled: October 3, 2000Date of Patent: November 29, 2005Assignee: McAfee, Inc.Inventors: Graham Arthur Makinson, Daniel Joseph Wolff
-
Patent number: 6968461Abstract: A computer virus scanning system is described in which during the scanning operation a measurement value indicative of the amount of data processing performed is calculated and this measurement value used to trigger breaks in the virus scanning operation. The triggered breaks can be used to perform a determination as to whether or not the virus scanning operations should be early terminated. One possibility is to measure the total size of the data processed during the virus scanning operation and calculate a ratio of this compared to the size of the computer file being virus scanned. If this calculated ratio exceeds a predetermined threshold, then virus scanning may be terminated. Another possibility is to associate a complexity value with each of a plurality of tests applied in the virus scanning operation. A total for these complexity values may be used to trigger the breaks and also to trigger early termination upon exceeding of respective threshold levels.Type: GrantFiled: October 3, 2000Date of Patent: November 22, 2005Assignee: Networks Associates Technology, Inc.Inventors: Martin James Lucas, Daniel Joseph Wolff
-
Patent number: 6836860Abstract: A scan of computer files for predefined properties indicative of such things as viruses is disclosed. The scan is performed in a circular manner, such that when all of the files to be scanned have been scanned it starts again from the first file. The ability to update the data defining the properties to be scanned for during a scan is provided.Type: GrantFiled: September 4, 2001Date of Patent: December 28, 2004Assignee: Networks Associates Technology, Inc.Inventors: Igor Muttik, Daniel Joseph Wolff, Lee Codel Lawson Tarbotton
-
Patent number: 6802012Abstract: A system for scanning computer files for unwanted properties, such as containing computer viruses or being spam e-mail, allocates a priority to pending scan requests based upon the identity of a computer user associated with the scan request. In the case of a normal file access request, the computer user associated with the scan request may be the file access request or in the case of an on-demand scan, then the computer user associated with a particular scan request for a computer file may be the owner or creator of that computer file. In the case of scan requests associated with e-mails, the sender or recipient computer user may be used in the allocation of a priority level for the scan request.Type: GrantFiled: October 3, 2000Date of Patent: October 5, 2004Assignee: Networks Associates Technology, Inc.Inventors: Robert Hugh Smithson, Daniel Joseph Wolff
-
Patent number: 6757830Abstract: Received e-mail messages are subject to a minimum delay period determined in dependence upon characteristics of the e-mail message received. Prior to release of the e-mail message upon expiry of the minimum delay period a check is made that the most up-to-date anti-virus and anti-spamming tests have been applied to the e-mail message. Characteristics that may be used to determine the minimum delay period applied include sender characteristics, recipient characteristics, attachment type characteristics and message content type characteristics.Type: GrantFiled: October 3, 2000Date of Patent: June 29, 2004Assignee: Networks Associates Technology, Inc.Inventors: Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Nicholas Paul Kelly
-
Publication number: 20030110258Abstract: The present invention provides a load balancing device, computer program product, and method for balancing the load across a plurality of proxy devices arranged to perform malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device. The load balancing device is arranged so as to intercept access requests issued to the file storage device, and comprises a client interface for receiving an access request issued to the file storage device using the dedicated file access protocol.Type: ApplicationFiled: December 6, 2001Publication date: June 12, 2003Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
-
Publication number: 20030110387Abstract: When a user commands execution of a computer program to commence, a loader program 2 is first started. This loader program2 reads an encrypted version of the computer program 6 and decrypts it using a public key. This generates an executable version of the computer program 9 which is written directly to the computer memory 8. When the loader program 2 has decrypted the whole of the computer program 9 it starts execution of the computer program 9 it has written into the computer memory 8 and terminates itself or is terminated by the computer program it started. The computer program 9 written into the computer memory 8 will be written into its own memory space and will have its own execution thread. The encryption used may be public key/private key encryption.Type: ApplicationFiled: December 6, 2001Publication date: June 12, 2003Inventors: Neil Andrew Cowie, Igor Garrievich Muttik, Daniel Joseph Wolff
-
Publication number: 20030110391Abstract: The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware.Type: ApplicationFiled: December 6, 2001Publication date: June 12, 2003Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
-
Publication number: 20030046611Abstract: A scan of computer files for predefined properties indicative of such things as viruses is disclosed. The scan is performed in a circular manner, such that when all of the files to be scanned have been scanned it starts again from the first file. The ability to update the data defining the properties to be scanned for during a scan is provided.Type: ApplicationFiled: September 4, 2001Publication date: March 6, 2003Inventors: Igor Muttik, Daniel Joseph Wolff, Lee Codel Lawson Tarbotton