Patents by Inventor Jonathan L. Edwards

Jonathan L. Edwards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9317687
    Abstract: A method for monitoring for malware includes, during a boot process on an electronic device, determining a portion of memory, determining that the portion of memory is reserved for exclusive access by an entity on the electronic device, and, based on the determination that a portion of memory is reserved for exclusive access during the boot process, determining that the reservation is indicative of malware.
    Type: Grant
    Filed: May 21, 2012
    Date of Patent: April 19, 2016
    Assignee: McAfee, Inc.
    Inventors: Jonathan L. Edwards, Aditya Kapoor, Michael S. Hughes
  • Patent number: 9311126
    Abstract: A method is provided in one example embodiment that includes rebasing a module in a virtual partition to load at a fixed address and storing a hash of a page of memory associated with the fixed address. An external handler may receive a notification associated with an event affecting the page. An internal agent within the virtual partition can execute a task and return results based on the task to the external handler, and a policy action may be taken based on the results returned by the internal agent. In some embodiments, a code portion and a data portion of the page can be identified and only a hash of the code portion is stored.
    Type: Grant
    Filed: July 27, 2011
    Date of Patent: April 12, 2016
    Assignee: McAfee, Inc.
    Inventors: Jonathan L. Edwards, Gregory W. Dalcher, John D. Teddy
  • Patent number: 9311478
    Abstract: A behavioral tracking system, method, and computer program product are provided for undoing events based on user input. In use, a plurality of unclassified events is identified on a system utilizing behavioral tracking. Additionally, input associated with at least one of the unclassified events is received from a user of the system for classifying the at least one of the unclassified events as an unwanted event. Further, the at least one unwanted event is undone in response to the receipt of the input.
    Type: Grant
    Filed: June 10, 2014
    Date of Patent: April 12, 2016
    Assignee: McAfee, Inc.
    Inventors: Jonathan L. Edwards, Joel R. Spurlock, Gregory William Dalcher
  • Patent number: 9298910
    Abstract: A method is provided in one example embodiment that includes receiving in an external handler an event notification associated with an event in a virtual partition. A thread in the process in the virtual partition that caused the event can be parked. Other threads and processes may be allowed to resume while a security handler evaluates the event for potential threats. A helper agent within the virtual partition may be instructed to execute a task, such as collecting and assembling event context within the virtual partition, and results based on the task can be returned to the external handler. A policy action can be taken based on the results returned by the helper agent, which may include, for example, instructing the helper agent to terminate the process that caused the event.
    Type: Grant
    Filed: June 8, 2011
    Date of Patent: March 29, 2016
    Assignee: McAfee, Inc.
    Inventors: Gregory W. Dalcher, Jonathan L. Edwards
  • Patent number: 9275223
    Abstract: Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections.
    Type: Grant
    Filed: October 19, 2012
    Date of Patent: March 1, 2016
    Assignee: McAfee, Inc.
    Inventors: Aditya Kapoor, Jonathan L. Edwards, Craig Schmugar, Vladimir Konobeev, Michael Hughes
  • Publication number: 20140359762
    Abstract: A behavioral tracking system, method, and computer program product are provided for undoing events based on user input. In use, a plurality of unclassified events is identified on a system utilizing behavioral tracking. Additionally, input associated with at least one of the unclassified events is received from a user of the system for classifying the at least one of the unclassified events as an unwanted event. Further, the at least one unwanted event is undone in response to the receipt of the input.
    Type: Application
    Filed: June 10, 2014
    Publication date: December 4, 2014
    Inventors: Jonathan L. Edwards, Joel R. Spurlock, Gregory William Dalcher
  • Patent number: 8752171
    Abstract: A behavioral tracking system, method, and computer program product are provided for undoing events based on user input. In use, a plurality of unclassified events is identified on a system utilizing behavioral tracking. Additionally, input associated with at least one of the unclassified events is received from a user of the system for classifying the at least one of the unclassified events as an unwanted event. Further, the at least one unwanted event is undone in response to the receipt of the input.
    Type: Grant
    Filed: September 3, 2010
    Date of Patent: June 10, 2014
    Assignee: McAfee, Inc.
    Inventors: Jonathan L. Edwards, Joel R. Spurlock, Gregory William Dalcher
  • Publication number: 20140115652
    Abstract: Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections.
    Type: Application
    Filed: October 19, 2012
    Publication date: April 24, 2014
    Inventors: Aditya Kapoor, Jonathan L. Edwards, Craig Schmugar, Vladimir Konobeev, Michael Hughes
  • Patent number: 8645949
    Abstract: A system, method, and computer program product are provided for scanning data utilizing one of a plurality of virtual machines of a device. In use, data to be scanned is identified utilizing a first virtual machine of a device, where the device further includes at least one second virtual machine and a cache shared by the first virtual machine and the second virtual machine. Additionally, it is determined whether the data was previously scanned by the at least one second virtual machine, utilizing the cache. Furthermore, the data is conditionally scanned utilizing the first virtual machine based on the determination.
    Type: Grant
    Filed: June 3, 2008
    Date of Patent: February 4, 2014
    Assignee: McAfee, Inc.
    Inventors: Jonathan L. Edwards, John D. Teddy
  • Patent number: 8627305
    Abstract: A system, method, and computer program product are provided for hooking code inserted into an address space of a new process. In use, creation of a process is identified. Additionally, code is inserted into an address space of the process. Still yet, at least one module being loaded in association with the process is identified. Further, the code is hooked at an entry point of the at least one module based on a determination of whether the at least one module includes a predefined module.
    Type: Grant
    Filed: March 24, 2009
    Date of Patent: January 7, 2014
    Assignee: McAfee, Inc.
    Inventors: Gregory William Dalcher, Jonathan L. Edwards
  • Publication number: 20130312095
    Abstract: A method for monitoring for malware includes, during a boot process on an electronic device, determining a portion of memory, determining that the portion of memory is reserved for exclusive access by an entity on the electronic device, and, based on the determination that a portion of memory is reserved for exclusive access during the boot process, determining that the reservation is indicative of malware.
    Type: Application
    Filed: May 21, 2012
    Publication date: November 21, 2013
    Applicant: MCAFEE, INC.
    Inventors: Jonathan L. Edwards, Aditya Kapoor, Michael S. Hughes
  • Publication number: 20130312099
    Abstract: A method for detecting malware includes determining one or more object-oriented components of an electronic device, trapping at a level below all of the operating systems of the electronic device an attempt to access an object-oriented component of the electronic device, determining an entity causing the attempt, accessing one or more security rules, and, based on the security rules, the entity causing the attempt, and the object-oriented component, determining whether the attempted access is indicative of malware.
    Type: Application
    Filed: May 21, 2012
    Publication date: November 21, 2013
    Applicant: MCAFEE, INC.
    Inventors: Jonathan L. Edwards, Aditya Kapoor
  • Patent number: 8572729
    Abstract: A system, method and computer program product are provided. In use, code is executed in user mode. Further, the execution of the code is intercepted. In response to the interception, operations are performed in kernel mode.
    Type: Grant
    Filed: January 30, 2006
    Date of Patent: October 29, 2013
    Assignee: McAfee, Inc.
    Inventors: Joe C. Lowe, Jonathan L. Edwards, Gregory William Dalcher
  • Publication number: 20130276119
    Abstract: A system, method, and computer program product are provided for reacting to a detection of an attempt by a process that is unknown to control a process that is known. In operation, an attempt by a first process that is unknown to control a second process that is known is detected. Furthermore, there is a conditional reaction based on the detection.
    Type: Application
    Filed: March 11, 2008
    Publication date: October 17, 2013
    Inventor: Jonathan L. Edwards
  • Publication number: 20130276120
    Abstract: A system, method, and computer program product are provided for determining whether a security status of data is known at a server. In use, a request for a security status of data is received over a network at a server. Additionally, it is determined whether the security status is known at the server using at least one of a whitelist and a blacklist. Furthermore, a result of the determination is transmitted over the network.
    Type: Application
    Filed: June 2, 2008
    Publication date: October 17, 2013
    Inventors: Gregory William Dalcher, Jonathan L. Edwards
  • Publication number: 20130276107
    Abstract: A behavioral tracking system, method, and computer program product are provided for undoing events based on user input. In use, a plurality of unclassified events is identified on a system utilizing behavioral tracking. Additionally, input associated with at least one of the unclassified events is received from a user of the system for classifying the at least one of the unclassified events as an unwanted event. Further, the at least one unwanted event is undone in response to the receipt of the input.
    Type: Application
    Filed: September 3, 2010
    Publication date: October 17, 2013
    Applicant: MCAFEE, INC.
    Inventors: Jonathan L. Edwards, Joel R. Spurlock, Gregory William Dalcher
  • Publication number: 20130275964
    Abstract: A system, method, and computer program product are provided for scanning data utilizing one of a plurality of virtual, machines of a device. In use, data to be scanned is identified utilizing a first virtual machine of a device, where the device further includes at least one second virtual machine and a cache shared by the first virtual machine and the second virtual machine. Additionally, it is determined whether the data was previously scanned by the at least one second virtual machine, utilizing the cache. Furthermore, the data is conditionally scanned utilizing the first virtual machine based on the determination.
    Type: Application
    Filed: June 3, 2008
    Publication date: October 17, 2013
    Inventors: Jonathan L. Edwards, John D. Teddy
  • Patent number: 8516478
    Abstract: A system, method, and computer program product are provided for processing a task utilizing a virtual machine as a function of an aspect of another virtual machine. In use, a task to be processed is identified. Furthermore, the task is processed utilizing at least one virtual machine located in a device as a function of at least one aspect of at least one other virtual machine located on the device.
    Type: Grant
    Filed: June 12, 2008
    Date of Patent: August 20, 2013
    Assignee: McAfee, Inc.
    Inventors: Jonathan L. Edwards, John D. Teddy
  • Publication number: 20130212581
    Abstract: A system, method and computer program product are provided for performing a security or maintenance operation in association with virtual disk data accessed independent of a virtual machine. In use, data stored on a virtual disk is accessed at least in part independent of a virtual machine. Further, a security or maintenance operation is performed in association with the accessed data.
    Type: Application
    Filed: January 7, 2013
    Publication date: August 15, 2013
    Applicant: McAfee, Inc.
    Inventors: Jonathan L. Edwards, John D. Teddy, Tracy E. Camp
  • Patent number: 8490186
    Abstract: A system, method, and computer program product are provided for detecting unwanted data based on scanning associated with a payload execution and a behavioral analysis. In use, an execution of a payload is detected, utilizing interface monitoring. Additionally, process memory associated with the execution of the payload is scanned. Further, a behavioral analysis is performed. Still yet, unwanted data is detected based on the scanning and the performance of the behavioral analysis.
    Type: Grant
    Filed: July 1, 2008
    Date of Patent: July 16, 2013
    Assignee: McAfee, Inc.
    Inventors: Gregory William Dalcher, Jonathan L. Edwards