Patents by Inventor Robin Keir
Robin Keir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9847965Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.Type: GrantFiled: June 2, 2015Date of Patent: December 19, 2017Assignee: McAfee, LLCInventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Publication number: 20160057101Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.Type: ApplicationFiled: June 2, 2015Publication date: February 25, 2016Applicant: McAfee, Inc.Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Patent number: 9049207Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.Type: GrantFiled: April 11, 2012Date of Patent: June 2, 2015Assignee: McAfee, Inc.Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Patent number: 8954573Abstract: A first Internet protocol version 6 (IPv6) address of a particular computing device within a network is identified using a first passive discovery sensor performing a first discovery task. A second discovery task is caused to be performed using the first IPv6 address and an attribute of the particular computing device is identified from results of the second discovery task. The first IPv6 address and attribute of the particular device is added to a repository maintaining a record of detected IPv6 addresses within the network. In some instances, a first passive discovery sensor can be one of an event-based discovery sensor, a latent-type discovery sensor, and an indirect-type discovery sensor.Type: GrantFiled: April 11, 2012Date of Patent: February 10, 2015Assignee: McAfee Inc.Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Patent number: 8955036Abstract: A plurality of system entities described in an asset repository are identified, the asset repository defining a particular hierarchical organization of the plurality of system entities within a computing environment. A particular system entity in the plurality of system entities is tagged with a particular tag. The particular system entity is associated with a particular security policy based on the particular system entity being tagged with the particular tag. The particular security policy is applied to system entities in the asset repository tagged with one or more tags in a particular set of tags including the particular tag.Type: GrantFiled: April 11, 2012Date of Patent: February 10, 2015Assignee: McAfee, Inc.Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Patent number: 8621073Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 31, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8621060Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 31, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8615582Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: February 15, 2012Date of Patent: December 24, 2013Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20130275575Abstract: A first Internet protocol version 6 (IPv6) address of a particular computing device within a network is identified using a first passive discovery sensor performing a first discovery task. A second discovery task is caused to be performed using the first IPv6 address and an attribute of the particular computing device is identified from results of the second discovery task. The first IPv6 address and attribute of the particular device is added to a repository maintaining a record of detected IPv6 addresses within the network. In some instances, a first passive discovery sensor can be one of an event-based discovery sensor, a latent-type discovery sensor, and an indirect-type discovery sensor.Type: ApplicationFiled: April 11, 2012Publication date: October 17, 2013Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Publication number: 20130276053Abstract: A plurality of system entities described in an asset repository are identified, the asset repository defining a particular hierarchical organization of the plurality of system entities within a computing environment. A particular system entity in the plurality of system entities is tagged with a particular tag. The particular system entity is associated with a particular security policy based on the particular system entity being tagged with the particular tag. The particular security policy is applied to system entities in the asset repository tagged with one or more tags in a particular set of tags including the particular tag.Type: ApplicationFiled: April 11, 2012Publication date: October 17, 2013Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Publication number: 20130275574Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.Type: ApplicationFiled: April 11, 2012Publication date: October 17, 2013Inventors: James Michael Hugard IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
-
Publication number: 20120151595Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120151596Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120151594Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 14, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20120144476Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: February 15, 2012Publication date: June 7, 2012Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 8135830Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: June 1, 2009Date of Patent: March 13, 2012Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Publication number: 20090259748Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: June 1, 2009Publication date: October 15, 2009Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 7543056Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: GrantFiled: September 14, 2006Date of Patent: June 2, 2009Assignee: McAfee, Inc.Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
-
Patent number: 7519954Abstract: An automated system performs multiple tests for identifying an operating system executed by a network node. A combination of multiple tests may be calibrated to generate an acceptably accurate operating system identification. An identification module makes an overall identification based on identifications of the tests. A plurality of identification rules may determine which of the individual tests is likely to be most accurate. The system also may include a conflict resolution module that resolves conflicts among the multiple tests. The conflict resolution module may employ a plurality of conflict resolution definitions that define special cases in which the general identification rules may be overridden to make an identification without regard to the general identification rules. Alternatively, the conflict resolution module may be configured to work in combination with the general identification rules to make an operating system identification.Type: GrantFiled: April 8, 2004Date of Patent: April 14, 2009Assignee: McAfee, Inc.Inventors: Marshall Beddoe, Robin Keir
-
Publication number: 20070283007Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.Type: ApplicationFiled: May 14, 2007Publication date: December 6, 2007Inventors: Robin Keir, Stephen Ecker