Patents by Inventor James Bean
James Bean has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230274756Abstract: An object can represent computer applications that play audio. Audio parameters associated with the audio can be determined based on size of the object so that when the object is large, the audio sounds like it originates from a large sound source or sources. When the object is small, the audio parameters are determined so that the audio sounds like it originates from a small sound source. Other aspects are described.Type: ApplicationFiled: February 15, 2023Publication date: August 31, 2023Inventors: Shai MESSINGHER LANG, Christopher T. EUBANK, Stephen E. PINTO, Kacper KOSIKOWSKI, James BEAN, Matthew S. CONNOLLY, David E. ROMBLOM
-
Patent number: 11063974Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: GrantFiled: October 31, 2019Date of Patent: July 13, 2021Assignee: McAfee, LLCInventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Patent number: 11032266Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identifying a digital certificate associated with data and assigning a reputation to the digital certificate, where the digital certificate is classified as trusted if the digital certificate is included in an entry in a whitelist and the digital certificate is classified as untrusted if the digital certificate is included in an entry in a blacklist.Type: GrantFiled: December 23, 2014Date of Patent: June 8, 2021Assignee: McAfee, LLCInventors: James Bean, Joel R. Spurlock, Cedric Cochin, Aditya Kapoor, Ramnath Venugopalan
-
Publication number: 20200067960Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Patent number: 10476899Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: GrantFiled: September 25, 2015Date of Patent: November 12, 2019Assignee: McAfee, LLCInventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Patent number: 10129291Abstract: Particular embodiments described herein provide for an electronic device that can be configured to monitor activities of objects in a system, compare the monitored activities to metadata for the system, and identify low prevalence outliers to detect potentially malicious activity. The monitored activities can include an analysis of metadata of the objects in the system to identify polymorphic threats, an object reuse analysis of the system to detect an object reusing metadata from another object, and a filename analysis of the system.Type: GrantFiled: June 27, 2015Date of Patent: November 13, 2018Assignee: McAfee, LLCInventors: James Bean, Joel R. Spurlock
-
Patent number: 10050980Abstract: There is disclosed in an example a computing apparatus configured to operate as an enterprise threat intelligence server, and including: a network interface configured to communicatively couple to a network; and one or more logic elements providing a reputation engine, operable for: receiving a first uniform resource locator (URL) identifier; determining that a first URL identified by the first URL identifier has an unknown enterprise reputation; and establishing a baseline reputation for the URL. There is further disclosed a method of providing the reputation engine, and one or more computer-readable mediums having stored thereon executable instructions for providing the reputation engine.Type: GrantFiled: June 27, 2015Date of Patent: August 14, 2018Assignee: McAfee, LLCInventors: James Bean, Joel R. Spurlock, Ramnath Venugopalan
-
Publication number: 20170093897Abstract: A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Inventors: Cedric Cochin, John D. Teddy, Ofir Arkin, James Bean, Joel R. Spurlock, Carl Woodward
-
Publication number: 20170061164Abstract: In an example, there is disclosed a system and method for a two-device scrambled display. A first device displays content in a scrambled form. A second device acts as an interpreter, including an input driver for receiving a scrambled input; an output driver for displaying an organically perceptible output; and one or more logic elements comprising a unscrambling engine operable for: receiving an input on the input driver; detecting that at least a portion of the input is scrambled; unscrambling the scrambled portion of the input; and outputting an unscrambled analog of the scrambled input via the output driver.Type: ApplicationFiled: June 27, 2015Publication date: March 2, 2017Applicant: McAfee, Inc.Inventors: Craig D. Schmugar, Clint R. Merrill, Erdem Aktas, James Bean, Cedric Cochin, John D. Teddy
-
Publication number: 20160380977Abstract: There is disclosed in an example a computing apparatus configured to operate as an enterprise threat intelligence server, and including: a network interface configured to communicatively couple to a network; and one or more logic elements providing a reputation engine, operable for: receiving a first uniform resource locator (URL) identifier; determining that a first URL identified by the first URL identifier has an unknown enterprise reputation; and establishing a baseline reputation for the URL. There is further disclosed a method of providing the reputation engine, and one or more computer-readable mediums having stored thereon executable instructions for providing the reputation engine.Type: ApplicationFiled: June 27, 2015Publication date: December 29, 2016Applicant: McAfee, Inc.Inventors: James Bean, Joel R. Spurlock, Ramnath Venugopalan
-
Publication number: 20160381041Abstract: Particular embodiments described herein provide for an electronic device that can be configured to monitor activities of objects in a system, compare the monitored activities to metadata for the system, and identify low prevalence outliers to detect potentially malicious activity. The monitored activities can include an analysis of metadata of the objects in the system to identify polymorphic threats, an object reuse analysis of the system to detect an object reusing metadata from another object, and a filename analysis of the system.Type: ApplicationFiled: June 27, 2015Publication date: December 29, 2016Applicant: McAfee, Inc.Inventors: James Bean, Joel R. Spurlock
-
Patent number: 9525707Abstract: This disclosure describes systems, methods, and computer-readable media related to an incident response tool using data exchange layer. In some embodiments, a data collector may be generated by an incident response server. The incident response server may transmit a data collector to multiple broker servers, where each broker server may transmit the data collector to multiple user devices associated with the broker server. The incident response server may receive data from the data collectors executing on the user devices and may analyze the received data.Type: GrantFiled: December 23, 2014Date of Patent: December 20, 2016Assignee: McAfee, Inc.Inventors: James Bean, Torry B. Campbell, Jonathan B. King
-
Publication number: 20160182566Abstract: This disclosure describes systems, methods, and computer-readable media related to an incident response tool using data exchange layer. In some embodiments, a data collector may be generated by an incident response server. The incident response server may transmit a data collector to multiple broker servers, where each broker server may transmit the data collector to multiple user devices associated with the broker server. The incident response server may receive data from the data collectors executing on the user devices and may analyze the received data.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Inventors: James Bean, Torry B. Campbell, Jonathan B. King
-
Publication number: 20160182492Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identifying a digital certificate associated with data and assigning a reputation to the digital certificate, where the digital certificate is classified as trusted if the digital certificate is included in an entry in a whitelist and the digital certificate is classified as untrusted if the digital certificate is included in an entry in a blacklist.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Applicant: McAfee, Inc.Inventors: James Bean, Joel R. Spurlock, Cedric Cochin, Aditya Kapoor, Ramnath Venugopalan
-
Publication number: 20160180087Abstract: Provided in some embodiments are systems and methods for remediating malware. Embodiments include receiving (from a process) a request to access data, determining that the process is an unknown process, providing the process with access to one or more data tokens in response to determining that the process is an unknown process, determining whether the process is engaging in suspicious activity with the one or more data tokens, and inhibiting execution of the process in response to determining that the process is engaging in suspicious activity with the one or more data tokens.Type: ApplicationFiled: December 23, 2014Publication date: June 23, 2016Inventors: Jonathan L. Edwards, Joel R. Spurlock, Aditya Kapoor, James Bean, Cedric Cochin, Craig D. Schmugar
-
Patent number: 9334086Abstract: A locking sample case used for displaying high-valued aromatic materials. The sample case has a stage for holding the material, a cover configured to mate with the stage, and a base to mate with the mated stage and cover assembly. The base has a lock mechanism to lock the stage to the base. The cover has tabs that secure the cover to the stage. The sample case is configured so that when the stage is mated to the base, the tabs cannot disengage from the base, so the cover cannot be removed from the stage when the stage is mated with the base. The cover has windows and closable vents to allow a potential buyer to see and smell the aromatic material. The sample case is configured to have a tether that can only be detached when the base is decoupled from the stage.Type: GrantFiled: July 30, 2015Date of Patent: May 10, 2016Assignee: SB Ventures, INC.Inventors: James Bean, Chol Pak
-
Publication number: 20160031605Abstract: A locking sample case used for displaying high-valued aromatic materials. The sample case has a stage for holding the material, a cover configured to mate with the stage, and a base to mate with the mated stage and cover assembly. The base has a lock mechanism to lock the stage to the base. The cover has tabs that secure the cover to the stage. The sample case is configured so that when the stage is mated to the base, the tabs cannot disengage from the base, so the cover cannot be removed from the stage when the stage is mated with the base. The cover has windows and closable vents to allow a potential buyer to see and smell the aromatic material. The sample case is configured to have a tether that can only be detached when the base is decoupled from the stage.Type: ApplicationFiled: July 30, 2015Publication date: February 4, 2016Inventors: James Bean, Chol Pak
-
Patent number: 9036941Abstract: Among other disclosed subject matter, a computer-implemented method includes receiving illustrated content. The illustrated content includes half-tone content. The method includes blurring at least part of the illustrated content. The blurring is performed according to a blur radius. The method includes downscaling the blurred illustrated content to an output size.Type: GrantFiled: February 10, 2014Date of Patent: May 19, 2015Assignee: Hachette Book Group, Inc.Inventors: Brian Doyle, Ralph Munsen, Eric Cole, James Bean
-
Publication number: 20140152701Abstract: Among other disclosed subject matter, a computer-implemented method includes receiving illustrated content. The illustrated content includes half-tone content. The method includes blurring at least part of the illustrated content. The blurring is performed according to a blur radius. The method includes downscaling the blurred illustrated content to an output size.Type: ApplicationFiled: February 10, 2014Publication date: June 5, 2014Applicant: Hachette Book Group, Inc.Inventors: Brian Doyle, Ralph Munsen, Eric Cole, James Bean
-
Patent number: 8675986Abstract: Among other disclosed subject matter, a computer-implemented method includes receiving illustrated content. The illustrated content includes half-tone content. The method includes blurring at least part of the illustrated content. The blurring is performed according to a blur radius. The method includes downscaling the blurred illustrated content to an output size.Type: GrantFiled: December 1, 2011Date of Patent: March 18, 2014Assignee: Hachette Book Group, Inc.Inventors: Brian Doyle, Ralph Munsen, Eric Cole, James Bean