Patents by Inventor James M. Hugard

James M. Hugard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9811667
    Abstract: A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a program, and updating the program by adding a new vulnerability to the vulnerability set. More specific embodiments include a program that includes a scan, creating the vulnerability set by generating a query including one or more conditions associated with the vulnerabilities, and creating the vulnerability set by selecting one or more vulnerabilities from a plurality of vulnerabilities. Other embodiments include a program that includes a report template, adding a vulnerability set to the report template by generating a query to include a condition associated with the vulnerability set, running a scan, and generating a report including one or more results from the scan meeting the condition associated with the vulnerability set.
    Type: Grant
    Filed: September 21, 2011
    Date of Patent: November 7, 2017
    Assignee: McAfee, Inc.
    Inventors: James M. Hugard, IV, Alexander Lawrence Leroux, Charles Mallabarapu, Jorge Armando Muniz, Braden C. Russell, Zengjue Wu
  • Patent number: 9251351
    Abstract: A system and method in one embodiment includes modules for creating an asset tag including one or more conditions of an asset on a network, adding the asset tag to an asset report template, and generating an asset report from the asset report template. More specific embodiments include creating the asset tag by generating a query for the one or more conditions. The asset tag may include a second asset tag configured to be updated automatically, and a third asset tag configured to be updated manually, and the second asset tag may be updated automatically when the asset tag is updated. Other embodiments include creating a vulnerability set including a selection of vulnerabilities from a plurality of vulnerabilities, adding the vulnerability set to the asset report template, and scanning a plurality of assets on the network.
    Type: Grant
    Filed: October 11, 2011
    Date of Patent: February 2, 2016
    Assignee: McAfee, Inc.
    Inventors: James M. Hugard, IV, Alexander Lawrence Leroux, Charles Mallabarapu, Jorge Armando Muniz, Braden C. Russell, Zengjue Wu
  • Patent number: 8789190
    Abstract: A method in one embodiment includes identifying a set of known vulnerabilities and a set of new vulnerabilities in an asset, selecting one or more scripts that include checks for vulnerabilities in a union of the set of known vulnerabilities and the set of new vulnerabilities, and using the selected scripts to scan the asset. Known vulnerabilities and new vulnerabilities may be identified by accessing results of previous scans on the asset. The method may also include identifying a plurality of assets to scan in a network, identifying a plurality of sets of known vulnerabilities and a plurality of sets of new vulnerabilities in substantially all assets in the plurality of assets, and inserting checks for vulnerabilities included in a union of the plurality of sets of known vulnerabilities and the plurality of sets of new vulnerabilities into the selected scripts.
    Type: Grant
    Filed: December 23, 2011
    Date of Patent: July 22, 2014
    Assignee: McAfee, Inc.
    Inventors: Braden Russell, Charles Mallabarapu, James M. Hugard, IV
  • Publication number: 20130247207
    Abstract: A system and method in one embodiment includes modules for creating an asset tag including one or more conditions of an asset on a network, adding the asset tag to an asset report template, and generating an asset report from the asset report template. More specific embodiments include creating the asset tag by generating a query for the one or more conditions. The asset tag may include a second asset tag configured to be updated automatically, and a third asset tag configured to be updated manually, and the second asset tag may be updated automatically when the asset tag is updated. Other embodiments include creating a vulnerability set including a selection of vulnerabilities from a plurality of vulnerabilities, adding the vulnerability set to the asset report template, and scanning a plurality of assets on the network.
    Type: Application
    Filed: October 11, 2011
    Publication date: September 19, 2013
    Inventors: James M. Hugard, IV, Alexander Lawrence Leroux, Charles Mallabarapu, Jorge Armando Muniz, Braden C. Russell, Zengjue Wu
  • Publication number: 20130247206
    Abstract: A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a program, and updating the program by adding a new vulnerability to the vulnerability set. More specific embodiments include a program that includes a scan, creating the vulnerability set by generating a query including one or more conditions associated with the vulnerabilities, and creating the vulnerability set by selecting one or more vulnerabilities from a plurality of vulnerabilities. Other embodiments include a program that includes a report template, adding a vulnerability set to the report template by generating a query to include a condition associated with the vulnerability set, running a scan, and generating a report including one or more results from the scan meeting the condition associated with the vulnerability set.
    Type: Application
    Filed: September 21, 2011
    Publication date: September 19, 2013
    Inventors: James M. Hugard, IV, Alexander Lawrence Leroux, Charles Mallabarapu, Jorge Armando Muniz, Braden C. Russell, Zengjue Wu
  • Publication number: 20130167238
    Abstract: A method in one embodiment includes identifying a set of known vulnerabilities and a set of new vulnerabilities in an asset, selecting one or more scripts that include checks for vulnerabilities in a union of the set of known vulnerabilities and the set of new vulnerabilities, and using the selected scripts to scan the asset. Known vulnerabilities and new vulnerabilities may be identified by accessing results of previous scans on the asset. The method may also include identifying a plurality of assets to scan in a network, identifying a plurality of sets of known vulnerabilities and a plurality of sets of new vulnerabilities in substantially all assets in the plurality of assets, and inserting checks for vulnerabilities included in a union of the plurality of sets of known vulnerabilities and the plurality of sets of new vulnerabilities into the selected scripts.
    Type: Application
    Filed: December 23, 2011
    Publication date: June 27, 2013
    Inventors: Braden Russell, Charles Mallabarapu, James M. Hugard, IV
  • Patent number: 5745669
    Abstract: A computer utility automatically monitors changes in configuration files stored on the computer hard disk. The recovery tool indicates to the user when changes are detected in the configuration files and provides the option to restore the configuration files to their state before they were changed if the computer system operates improperly. In addition, the recovery tool monitors selected application files for changes in the files or missing files, and prompts the user when a change is detected. The recovery tool also provides for monitoring of the CMOS memory which stores computer system operating functions and parameters. If possible corruption of the CMOS memory is detected, the recovery tool restores the contents of the CMOS to their proper state. Finally, the computer utility provides the option of making a bootable floppy diskette containing the computer system configuration.
    Type: Grant
    Filed: June 21, 1996
    Date of Patent: April 28, 1998
    Assignee: AST Research, Inc.
    Inventors: James M. Hugard, Duane W. Cowgill
  • Patent number: 5136711
    Abstract: A system for integrating incompatible hard disk partitioning systems in a single hard disk drive provides a method for installing and operating multiple incompatible absolute zero sector operating systems on the same hard disk drive with a first operating system and its associated boot loader located at absolute physical sector zero and a second operating system and its associated boot loader located at an absolute physical sector other than zero. The system includes a second BIOS that automatically offsets physical addresses for disk requests from the second operating system so that correct absolute physical address of the disk is accessed. This facilitates the use of a single hard disk drive in dual-compatible computers which functions selectively in an IBM AT compatible mode and a non-IBM AT compatible mode.
    Type: Grant
    Filed: October 17, 1990
    Date of Patent: August 4, 1992
    Assignee: AST Research
    Inventors: James M. Hugard, George C. Y. Li