Patents by Inventor Daniel Joseph Wolff

Daniel Joseph Wolff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120030766
    Abstract: A method for defining an area to record changes made to a computer system is disclosed. The method includes defining a safe area on a primary storage device of the computer system and storing information on the location of the safe area on a secondary storage device. The method further includes booting the computer system utilizing a backup device and changing data on the primary storage device. The changes are recorded in the safe area of the primary storage device and are accessible when the computer system is booted from the backup device.
    Type: Application
    Filed: October 4, 2011
    Publication date: February 2, 2012
    Inventors: Lee Codel Lawson Tarbotton, Paul Nicholas Gartside, Daniel Joseph Wolff
  • Patent number: 8069480
    Abstract: A method for defining an area to record changes made to a computer system is provided. A safe area is defined on a primary storage device of the computer system and information is stored on the location of the safe area on a secondary storage device. Further, the computer system is booted utilizing a backup device and data is changed on the primary storage device. The changes are recorded in the safe area of the primary storage device and are accessible when the computer system is booted from the backup device.
    Type: Grant
    Filed: September 30, 2002
    Date of Patent: November 29, 2011
    Assignee: McAfee, Inc.
    Inventors: Lee Codel Lawson Tarbotton, Paul Nicholas Gartside, Daniel Joseph Wolff
  • Patent number: 7346781
    Abstract: When a user commands execution of a computer program to commence, a loader program 2 is first started. This loader program 2 reads an encrypted version of the computer program 6 and decrypts it using a public key. This generates an executable version of the computer program 9 which is written directly to the computer memory 8. When the loader program 2 has decrypted the whole of the computer program 9 it starts execution of the computer program 9 it has written into the computer memory 8 and terminates itself or is terminated by the computer program it started. The computer program 9 written into the computer memory 8 will be written into its own memory space and will have its own execution thread. The encryption used may be public key/private key encryption.
    Type: Grant
    Filed: December 6, 2001
    Date of Patent: March 18, 2008
    Assignee: McAfee, Inc.
    Inventors: Neil Andrew Cowie, Igor Garrievich Muttik, Daniel Joseph Wolff
  • Patent number: 7281267
    Abstract: A software audit system is provided in conjunction with an anti-virus system. A computer virus scan request received by the anti-virus system (16) is used to trigger an audit data generator (18) to generate audit data. The audit data generator (18) may also serve to ban certain computer programs from execution and monitor the concurrent usage of other computer programs.
    Type: Grant
    Filed: February 20, 2001
    Date of Patent: October 9, 2007
    Assignee: McAfee, Inc.
    Inventors: Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Timothy James Page
  • Patent number: 7272724
    Abstract: An anti computer virus program uses a library of virus drivers that includes an indication of whether a particular virus can cause irreparable damage and data indicating enhanced user warnings and actions that might be associated with such viruses. If a detected computer virus is one that can cause irreparable damage, then an enhanced user warning (16) is issued indicating this to the user and a notification (28) of the possibility of such corruption is added into the repaired computer file. The notification may take the form of an electronically signed (30) banner message or the like.
    Type: Grant
    Filed: February 20, 2001
    Date of Patent: September 18, 2007
    Assignee: McAfee, Inc.
    Inventors: Lee Codel Lawson Tarbotton, Robert Edward Moore, Daniel Joseph Wolff
  • Patent number: 7228565
    Abstract: An event report, such as a virus detection event, is sent from a reporting computer 2 to a receiving computer 6 via an internet link 4. The report data may take the form of a URL requesting a web page 28 to be provided by the receiving computer 6, the URL bearing an encrypted form 24 of the report data that is used to identify the requested web page as well as pass further information to the receiving computer 6. Alternatively, the report data may be collated in the reporting computer 2 and passed to the receiving computer 6 when a computer virus definition data update is requested. The report data seeks to uniquely identify the event by incorporating the MAC address of the reporting computer 2, the date, time, computer product identifier, version identifier, update identifier and driver triggered. Additionally, a checksum derived from the infected file together with an indication of the corrective action, if any, taken by the reporting computer 2 may be included.
    Type: Grant
    Filed: May 15, 2001
    Date of Patent: June 5, 2007
    Assignee: McAfee, Inc.
    Inventors: Daniel Joseph Wolff, Lee Codel Lawson Tarbotton, Edward Moore
  • Patent number: 7150042
    Abstract: The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware.
    Type: Grant
    Filed: December 6, 2001
    Date of Patent: December 12, 2006
    Assignee: McAfee, Inc.
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
  • Patent number: 7093002
    Abstract: The present invention provides a load balancing device, computer program product, and method for balancing the load across a plurality of proxy devices arranged to perform malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device. The load balancing device is arranged so as to intercept access requests issued to the file storage device, and comprises a client interface for receiving an access request issued to the file storage device using the dedicated file access protocol.
    Type: Grant
    Filed: December 6, 2001
    Date of Patent: August 15, 2006
    Assignee: McAfee, Inc.
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
  • Patent number: 7043634
    Abstract: When a file is created on a computer, an archive copy of that file is also created and separately stored. Upon a subsequent access to the active copy of that file, a comparison between the active copy and the full archived copy is made to detect any changes. If there are not any changes, then the active copy of the file is assumed to be clean from malicious alteration and the access request is permitted. If an alteration has been made and is detected, then further countermeasures are triggered, such as full virus scanning of that file or blocking of its use. This archiving and comparison technique may be selectively applied to a subset of file types, such as executable files and dynamic link libraries, which are known to be infrequently modified during normal user operations.
    Type: Grant
    Filed: May 15, 2001
    Date of Patent: May 9, 2006
    Assignee: McAfee, Inc.
    Inventors: Daniel Joseph Wolff, Mark Harris, Michael Kenneth Glover
  • Patent number: 7023861
    Abstract: A network bridge (14) has an associated malware scanner (16) that serves to concatenate portions of a data file from within data packets intercepted by the network bridge (14) and then scan the data file concerned before the data file is forwarded to its intended recipient by the network bridge (14). The network bridge (14) may be inserted in a network topology without requiring significant network configuration changes. The network bridge (14) may include a packet analysis unit (56) that serves to intercept only data packets having a predetermined network layer protocol or a predetermined application layer protocol.
    Type: Grant
    Filed: July 26, 2001
    Date of Patent: April 4, 2006
    Assignee: McAfee, Inc.
    Inventors: Graham Arthur Makinson, Eamonn John Baulk, Daniel Joseph Wolff
  • Patent number: 7013330
    Abstract: A source computer 2 having a copy of a computer file that it is desired to download to a plurality of target computers issues broadcast messages via a computer network linked to those target computers. The broadcast messages indicate the availability of the computer file for download and include a download qualifying parameter. The download qualifying parameter is used by receiving target computers to determine whether or not they qualify to attempt a download from the source computer in response to the received broadcast message. Only those target computers that do qualify attempt a download. The source computer monitors how many target computers make a download attempt in response to a particular broadcast message and adjusts the download qualifying parameters in subsequent broadcast messages so that the target computers progressively download the new computer file without overloading the source computer.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: March 14, 2006
    Assignee: Networks Associates Technology, Inc.
    Inventors: Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Paul Nicholas Gartside, Graham Arthur Makinson, Nicholas Paul Kelly
  • Patent number: 6971023
    Abstract: A system for scanning computer files for unwanted properties, such as containing computer viruses or being spam e-mail, allocates a priority to pending scan requests based upon the identity of a computer user associated with the scan request. In the case of a normal file access request, the computer user associated with the scan request may be the file access request or in the case of an on-demand scan, then the computer user associated with a particular scan request for a computer file may be the owner or creator of that computer file. In the case of scan requests associated with e-mails, the sender or recipient computer user may be used in the allocation of a priority level for the scan request.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: November 29, 2005
    Assignee: McAfee, Inc.
    Inventors: Graham Arthur Makinson, Daniel Joseph Wolff
  • Patent number: 6968461
    Abstract: A computer virus scanning system is described in which during the scanning operation a measurement value indicative of the amount of data processing performed is calculated and this measurement value used to trigger breaks in the virus scanning operation. The triggered breaks can be used to perform a determination as to whether or not the virus scanning operations should be early terminated. One possibility is to measure the total size of the data processed during the virus scanning operation and calculate a ratio of this compared to the size of the computer file being virus scanned. If this calculated ratio exceeds a predetermined threshold, then virus scanning may be terminated. Another possibility is to associate a complexity value with each of a plurality of tests applied in the virus scanning operation. A total for these complexity values may be used to trigger the breaks and also to trigger early termination upon exceeding of respective threshold levels.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: November 22, 2005
    Assignee: Networks Associates Technology, Inc.
    Inventors: Martin James Lucas, Daniel Joseph Wolff
  • Patent number: 6836860
    Abstract: A scan of computer files for predefined properties indicative of such things as viruses is disclosed. The scan is performed in a circular manner, such that when all of the files to be scanned have been scanned it starts again from the first file. The ability to update the data defining the properties to be scanned for during a scan is provided.
    Type: Grant
    Filed: September 4, 2001
    Date of Patent: December 28, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Igor Muttik, Daniel Joseph Wolff, Lee Codel Lawson Tarbotton
  • Patent number: 6802012
    Abstract: A system for scanning computer files for unwanted properties, such as containing computer viruses or being spam e-mail, allocates a priority to pending scan requests based upon the identity of a computer user associated with the scan request. In the case of a normal file access request, the computer user associated with the scan request may be the file access request or in the case of an on-demand scan, then the computer user associated with a particular scan request for a computer file may be the owner or creator of that computer file. In the case of scan requests associated with e-mails, the sender or recipient computer user may be used in the allocation of a priority level for the scan request.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: October 5, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Robert Hugh Smithson, Daniel Joseph Wolff
  • Patent number: 6757830
    Abstract: Received e-mail messages are subject to a minimum delay period determined in dependence upon characteristics of the e-mail message received. Prior to release of the e-mail message upon expiry of the minimum delay period a check is made that the most up-to-date anti-virus and anti-spamming tests have been applied to the e-mail message. Characteristics that may be used to determine the minimum delay period applied include sender characteristics, recipient characteristics, attachment type characteristics and message content type characteristics.
    Type: Grant
    Filed: October 3, 2000
    Date of Patent: June 29, 2004
    Assignee: Networks Associates Technology, Inc.
    Inventors: Lee Codel Lawson Tarbotton, Daniel Joseph Wolff, Nicholas Paul Kelly
  • Publication number: 20030110258
    Abstract: The present invention provides a load balancing device, computer program product, and method for balancing the load across a plurality of proxy devices arranged to perform malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device. The load balancing device is arranged so as to intercept access requests issued to the file storage device, and comprises a client interface for receiving an access request issued to the file storage device using the dedicated file access protocol.
    Type: Application
    Filed: December 6, 2001
    Publication date: June 12, 2003
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
  • Publication number: 20030110387
    Abstract: When a user commands execution of a computer program to commence, a loader program 2 is first started. This loader program2 reads an encrypted version of the computer program 6 and decrypts it using a public key. This generates an executable version of the computer program 9 which is written directly to the computer memory 8. When the loader program 2 has decrypted the whole of the computer program 9 it starts execution of the computer program 9 it has written into the computer memory 8 and terminates itself or is terminated by the computer program it started. The computer program 9 written into the computer memory 8 will be written into its own memory space and will have its own execution thread. The encryption used may be public key/private key encryption.
    Type: Application
    Filed: December 6, 2001
    Publication date: June 12, 2003
    Inventors: Neil Andrew Cowie, Igor Garrievich Muttik, Daniel Joseph Wolff
  • Publication number: 20030110391
    Abstract: The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware.
    Type: Application
    Filed: December 6, 2001
    Publication date: June 12, 2003
    Inventors: Daniel Joseph Wolff, Joel Robert Spurlock, Jonathan Lewis Edwards
  • Publication number: 20030046611
    Abstract: A scan of computer files for predefined properties indicative of such things as viruses is disclosed. The scan is performed in a circular manner, such that when all of the files to be scanned have been scanned it starts again from the first file. The ability to update the data defining the properties to be scanned for during a scan is provided.
    Type: Application
    Filed: September 4, 2001
    Publication date: March 6, 2003
    Inventors: Igor Muttik, Daniel Joseph Wolff, Lee Codel Lawson Tarbotton