Patents by Inventor John Teddy

John Teddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11775634
    Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a graphics processor; and a graphics driver to facilitate access to the graphics processor, the graphics driver including: an authenticator to establish a trusted channel between the graphics driver and an application driver via mutual authentication of the graphics driver and the application driver; an offloader to offload a computing task to the graphics processor via the trusted channel, the computing task associated with the application driver; and a hypervisor to monitor memory associated with the offloaded computing task for an unauthorized access attempt.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: October 3, 2023
    Assignee: MCAFEE, LLC
    Inventors: Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
  • Patent number: 11580219
    Abstract: A technique for detecting malware involves loading known malware information, finding a string in the known malware information, saving the string in a first database, identifying a first contiguous string block from the known malware information, assigning a confidence indicator to the first contiguous string block, attempting to find the first contiguous string block in a second database containing one or more contiguous string blocks extracted from known malware, and responsive to a determination the first contiguous string block meets a predetermined threshold of similarity with a second contiguous string block contained in the second database, labelling the first contiguous string block.
    Type: Grant
    Filed: January 25, 2018
    Date of Patent: February 14, 2023
    Assignee: McAfee, LLC
    Inventors: Craig Schmugar, Zheng Zhang, John Teddy, Michael Hughes
  • Patent number: 11496368
    Abstract: A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. The computer-readable medium comprising instructions which, when executed, cause a programmable device to: determine, based on a plurality of service-related metrics from a network node, upstream network nodes and downstream network nodes in a network; query the upstream network nodes and the downstream network nodes with a multicast request for an additional plurality of service-related metrics; extrapolate a current network topology based on the plurality of service-related metrics and the additional plurality of service-related metrics; determine whether or not an upstream backup server is present for the network node; determine a set of critical service delivery points in the network based on the determination of the upstream backup server; and generate a network service alert responsive to a service interruption from the set of critical service delivery points.
    Type: Grant
    Filed: September 4, 2020
    Date of Patent: November 8, 2022
    Assignee: MCAFEE, LLC
    Inventors: Thiago J. Macieira, Ned M. Smith, Zheng Zhang, John Teddy, Arthur S. Zeigler
  • Patent number: 11206261
    Abstract: Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.
    Type: Grant
    Filed: July 15, 2019
    Date of Patent: December 21, 2021
    Assignee: McAfee, LLC
    Inventors: Glen J. Anderson, John Teddy, Chakradhar Kotamraju
  • Patent number: 10944636
    Abstract: A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. Service-related metrics are received from all IoT network elements in a network. The service-related metrics are parsed to extrapolate a network topology. From the topology, a set of critical service delivery points are determined based on data extracted from the service-related metrics. The critical service delivery points may be monitored for service interruptions and alerts may be generated in response to interruptions. Additionally the extrapolated network topology may be compared to a previously recorded topology of the network, and based on the delta, alerts may be generated when the delta meets a threshold.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: March 9, 2021
    Assignee: McAfee, LLC
    Inventors: Thiago J. Macieira, Ned M. Smith, Zheng Zhang, John Teddy, Arthur S. Zeigler
  • Publication number: 20200403878
    Abstract: A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. The computer-readable medium comprising instructions which, when executed, cause a programmable device to: determine, based on a plurality of service-related metrics from a network node, upstream network nodes and downstream network nodes in a network; query the upstream network nodes and the downstream network nodes with a multicast request for an additional plurality of service-related metrics; extrapolate a current network topology based on the plurality of service-related metrics and the additional plurality of service-related metrics; determine whether or not an upstream backup server is present for the network node; determine a set of critical service delivery points in the network based on the determination of the upstream backup server; and generate a network service alert responsive to a service interruption from the set of critical service delivery points.
    Type: Application
    Filed: September 4, 2020
    Publication date: December 24, 2020
    Inventors: Thiago J. Macieira, Ned M. Smith, Zheng Zhang, John Teddy, Arthur S. Zeigler
  • Patent number: 10726129
    Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.
    Type: Grant
    Filed: April 18, 2019
    Date of Patent: July 28, 2020
    Assignee: McAfee, LLC
    Inventors: Craig Schmugar, John Teddy, Cedric Cochin
  • Publication number: 20200223905
    Abstract: Provided herein are antibodies that bind to neuraminidase (NA) of different strains of influenza B virus, host cells for producing such antibodies, and kits comprising such antibodies. Also provided herein are compositions comprising antibodies that bind to NA of different strains of influenza B virus and methods of using such antibodies to diagnose, prevent or treat influenza virus disease.
    Type: Application
    Filed: April 6, 2018
    Publication date: July 16, 2020
    Applicant: ICAHN SCHOOL OF MEDICINE AT MOUNT SINAI
    Inventors: Peter PALESE, Florian KRAMMER, John Teddy WOHLBOLD, Adolfo GARCIA-SASTRE
  • Publication number: 20200167467
    Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a graphics processor; and a graphics driver to facilitate access to the graphics processor, the graphics driver including: an authenticator to establish a trusted channel between the graphics driver and an application driver via mutual authentication of the graphics driver and the application driver; an offloader to offload a computing task to the graphics processor via the trusted channel, the computing task associated with the application driver; and a hypervisor to monitor memory associated with the offloaded computing task for an unauthorized access attempt.
    Type: Application
    Filed: January 28, 2020
    Publication date: May 28, 2020
    Inventors: Paritosh Saxena, Adrian M.M.T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
  • Patent number: 10572660
    Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: February 25, 2020
    Assignee: McAfee, LLC
    Inventors: Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
  • Publication number: 20190342291
    Abstract: Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.
    Type: Application
    Filed: July 15, 2019
    Publication date: November 7, 2019
    Inventors: Glen J. Anderson, John Teddy, Chakradhar Kotamraju
  • Publication number: 20190243975
    Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.
    Type: Application
    Filed: April 18, 2019
    Publication date: August 8, 2019
    Inventors: Craig Schmugar, John Teddy, Cedric Cochin
  • Patent number: 10367813
    Abstract: Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: July 30, 2019
    Assignee: McAfee, LLC
    Inventors: Glen J. Anderson, John Teddy, Chakradhar Kotamraju
  • Publication number: 20190228151
    Abstract: A technique for detecting malware involved loading known malware information, finding a string in the known malware information, saving the string in a first database, identifying a first contiguous string block from the known malware information, assigning a confidence indicator to the first contiguous string block, attempting to find the first contiguous string block in a second database containing one or more contiguous string blocks extracted from known malware, and labelling the first contiguous string block, responsive to a determination the first contiguous string block meets a predetermined threshold of similarity with a second contiguous string block contained in the second database.
    Type: Application
    Filed: January 25, 2018
    Publication date: July 25, 2019
    Inventors: Craig Schmugar, Zheng Zhang, John Teddy, Michael Hughes
  • Patent number: 10360398
    Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.
    Type: Grant
    Filed: June 6, 2017
    Date of Patent: July 23, 2019
    Assignee: McAfee, LLC
    Inventors: Atul Kabra, Michael Hughes, John Teddy
  • Patent number: 10303876
    Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.
    Type: Grant
    Filed: December 27, 2016
    Date of Patent: May 28, 2019
    Assignee: McAfee, LLC
    Inventors: Craig Schmugar, John Teddy, Cedric Cochin
  • Patent number: 10073972
    Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.
    Type: Grant
    Filed: October 25, 2014
    Date of Patent: September 11, 2018
    Assignee: MCAFEE, LLC
    Inventors: Paritosh Saxena, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
  • Patent number: 10061919
    Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.
    Type: Grant
    Filed: June 23, 2017
    Date of Patent: August 28, 2018
    Assignee: McAfee, LLC
    Inventors: Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
  • Publication number: 20180181753
    Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.
    Type: Application
    Filed: December 27, 2016
    Publication date: June 28, 2018
    Inventors: Craig Schmugar, John Teddy, Cedric Cochin
  • Publication number: 20180157832
    Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.
    Type: Application
    Filed: February 1, 2018
    Publication date: June 7, 2018
    Inventors: Paritosh Saxena, Adrian M.M.T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise