Patents by Inventor John Teddy
John Teddy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11580219Abstract: A technique for detecting malware involves loading known malware information, finding a string in the known malware information, saving the string in a first database, identifying a first contiguous string block from the known malware information, assigning a confidence indicator to the first contiguous string block, attempting to find the first contiguous string block in a second database containing one or more contiguous string blocks extracted from known malware, and responsive to a determination the first contiguous string block meets a predetermined threshold of similarity with a second contiguous string block contained in the second database, labelling the first contiguous string block.Type: GrantFiled: January 25, 2018Date of Patent: February 14, 2023Assignee: McAfee, LLCInventors: Craig Schmugar, Zheng Zhang, John Teddy, Michael Hughes
-
Patent number: 11496368Abstract: A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. The computer-readable medium comprising instructions which, when executed, cause a programmable device to: determine, based on a plurality of service-related metrics from a network node, upstream network nodes and downstream network nodes in a network; query the upstream network nodes and the downstream network nodes with a multicast request for an additional plurality of service-related metrics; extrapolate a current network topology based on the plurality of service-related metrics and the additional plurality of service-related metrics; determine whether or not an upstream backup server is present for the network node; determine a set of critical service delivery points in the network based on the determination of the upstream backup server; and generate a network service alert responsive to a service interruption from the set of critical service delivery points.Type: GrantFiled: September 4, 2020Date of Patent: November 8, 2022Assignee: MCAFEE, LLCInventors: Thiago J. Macieira, Ned M. Smith, Zheng Zhang, John Teddy, Arthur S. Zeigler
-
Patent number: 11206261Abstract: Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.Type: GrantFiled: July 15, 2019Date of Patent: December 21, 2021Assignee: McAfee, LLCInventors: Glen J. Anderson, John Teddy, Chakradhar Kotamraju
-
Patent number: 10944636Abstract: A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. Service-related metrics are received from all IoT network elements in a network. The service-related metrics are parsed to extrapolate a network topology. From the topology, a set of critical service delivery points are determined based on data extracted from the service-related metrics. The critical service delivery points may be monitored for service interruptions and alerts may be generated in response to interruptions. Additionally the extrapolated network topology may be compared to a previously recorded topology of the network, and based on the delta, alerts may be generated when the delta meets a threshold.Type: GrantFiled: September 28, 2016Date of Patent: March 9, 2021Assignee: McAfee, LLCInventors: Thiago J. Macieira, Ned M. Smith, Zheng Zhang, John Teddy, Arthur S. Zeigler
-
Publication number: 20200403878Abstract: A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. The computer-readable medium comprising instructions which, when executed, cause a programmable device to: determine, based on a plurality of service-related metrics from a network node, upstream network nodes and downstream network nodes in a network; query the upstream network nodes and the downstream network nodes with a multicast request for an additional plurality of service-related metrics; extrapolate a current network topology based on the plurality of service-related metrics and the additional plurality of service-related metrics; determine whether or not an upstream backup server is present for the network node; determine a set of critical service delivery points in the network based on the determination of the upstream backup server; and generate a network service alert responsive to a service interruption from the set of critical service delivery points.Type: ApplicationFiled: September 4, 2020Publication date: December 24, 2020Inventors: Thiago J. Macieira, Ned M. Smith, Zheng Zhang, John Teddy, Arthur S. Zeigler
-
Patent number: 10726129Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.Type: GrantFiled: April 18, 2019Date of Patent: July 28, 2020Assignee: McAfee, LLCInventors: Craig Schmugar, John Teddy, Cedric Cochin
-
Publication number: 20200223905Abstract: Provided herein are antibodies that bind to neuraminidase (NA) of different strains of influenza B virus, host cells for producing such antibodies, and kits comprising such antibodies. Also provided herein are compositions comprising antibodies that bind to NA of different strains of influenza B virus and methods of using such antibodies to diagnose, prevent or treat influenza virus disease.Type: ApplicationFiled: April 6, 2018Publication date: July 16, 2020Applicant: ICAHN SCHOOL OF MEDICINE AT MOUNT SINAIInventors: Peter PALESE, Florian KRAMMER, John Teddy WOHLBOLD, Adolfo GARCIA-SASTRE
-
Publication number: 20200167467Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a graphics processor; and a graphics driver to facilitate access to the graphics processor, the graphics driver including: an authenticator to establish a trusted channel between the graphics driver and an application driver via mutual authentication of the graphics driver and the application driver; an offloader to offload a computing task to the graphics processor via the trusted channel, the computing task associated with the application driver; and a hypervisor to monitor memory associated with the offloaded computing task for an unauthorized access attempt.Type: ApplicationFiled: January 28, 2020Publication date: May 28, 2020Inventors: Paritosh Saxena, Adrian M.M.T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
-
Patent number: 10572660Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.Type: GrantFiled: February 1, 2018Date of Patent: February 25, 2020Assignee: McAfee, LLCInventors: Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
-
Publication number: 20190342291Abstract: Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.Type: ApplicationFiled: July 15, 2019Publication date: November 7, 2019Inventors: Glen J. Anderson, John Teddy, Chakradhar Kotamraju
-
Publication number: 20190243975Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.Type: ApplicationFiled: April 18, 2019Publication date: August 8, 2019Inventors: Craig Schmugar, John Teddy, Cedric Cochin
-
Patent number: 10367813Abstract: Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.Type: GrantFiled: September 30, 2016Date of Patent: July 30, 2019Assignee: McAfee, LLCInventors: Glen J. Anderson, John Teddy, Chakradhar Kotamraju
-
Publication number: 20190228151Abstract: A technique for detecting malware involved loading known malware information, finding a string in the known malware information, saving the string in a first database, identifying a first contiguous string block from the known malware information, assigning a confidence indicator to the first contiguous string block, attempting to find the first contiguous string block in a second database containing one or more contiguous string blocks extracted from known malware, and labelling the first contiguous string block, responsive to a determination the first contiguous string block meets a predetermined threshold of similarity with a second contiguous string block contained in the second database.Type: ApplicationFiled: January 25, 2018Publication date: July 25, 2019Inventors: Craig Schmugar, Zheng Zhang, John Teddy, Michael Hughes
-
Patent number: 10360398Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.Type: GrantFiled: June 6, 2017Date of Patent: July 23, 2019Assignee: McAfee, LLCInventors: Atul Kabra, Michael Hughes, John Teddy
-
Patent number: 10303876Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.Type: GrantFiled: December 27, 2016Date of Patent: May 28, 2019Assignee: McAfee, LLCInventors: Craig Schmugar, John Teddy, Cedric Cochin
-
Patent number: 10073972Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.Type: GrantFiled: October 25, 2014Date of Patent: September 11, 2018Assignee: MCAFEE, LLCInventors: Paritosh Saxena, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
-
Patent number: 10061919Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.Type: GrantFiled: June 23, 2017Date of Patent: August 28, 2018Assignee: McAfee, LLCInventors: Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
-
Publication number: 20180181753Abstract: A technique for detecting malware looks at startup hooks that may be created by malware to assist in ensuring that the malware is started upon a reboot of a programmable device. After enumerating startup hooks in the system, startup hooks associated with untrusted executables are deleted. If the startup hook is restored, that is an indication that the untrusted executable may be malware. An indication may then be passed to an anti-malware software to analyze the executable further.Type: ApplicationFiled: December 27, 2016Publication date: June 28, 2018Inventors: Craig Schmugar, John Teddy, Cedric Cochin
-
Publication number: 20180157832Abstract: Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.Type: ApplicationFiled: February 1, 2018Publication date: June 7, 2018Inventors: Paritosh Saxena, Adrian M.M.T. Dunbar, Michael S. Hughes, John Teddy, David Michael Durham, Balaji Vembu, Prashant Dewan, Debra Cablao, Nicholas D. Triantafillou, Jason M. Surprise
-
Publication number: 20180098284Abstract: Pairing two devices includes detecting, by a first device, a trigger event that indicates that a second device is within a predetermined proximity, obtaining a first time stamp indicating a time of the trigger event as recorded by the first device, determining whether a difference between the first time stamp and a second time stamp satisfy a predetermine threshold, where the second time stamp indicates a time of the trigger event as recorded by the second device, and in response to determining that the difference between the first time stamp and the second time stamp satisfies the predetermined threshold, allowing the first device to pair with the second device.Type: ApplicationFiled: September 30, 2016Publication date: April 5, 2018Inventors: Glen J. Anderson, John Teddy, Chakradhar Kotamraju