Patents by Inventor Robin Keir

Robin Keir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9847965
    Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.
    Type: Grant
    Filed: June 2, 2015
    Date of Patent: December 19, 2017
    Assignee: McAfee, LLC
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Publication number: 20160057101
    Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.
    Type: Application
    Filed: June 2, 2015
    Publication date: February 25, 2016
    Applicant: McAfee, Inc.
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Patent number: 9049207
    Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Patent number: 8954573
    Abstract: A first Internet protocol version 6 (IPv6) address of a particular computing device within a network is identified using a first passive discovery sensor performing a first discovery task. A second discovery task is caused to be performed using the first IPv6 address and an attribute of the particular computing device is identified from results of the second discovery task. The first IPv6 address and attribute of the particular device is added to a repository maintaining a record of detected IPv6 addresses within the network. In some instances, a first passive discovery sensor can be one of an event-based discovery sensor, a latent-type discovery sensor, and an indirect-type discovery sensor.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: February 10, 2015
    Assignee: McAfee Inc.
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Patent number: 8955036
    Abstract: A plurality of system entities described in an asset repository are identified, the asset repository defining a particular hierarchical organization of the plurality of system entities within a computing environment. A particular system entity in the plurality of system entities is tagged with a particular tag. The particular system entity is associated with a particular security policy based on the particular system entity being tagged with the particular tag. The particular security policy is applied to system entities in the asset repository tagged with one or more tags in a particular set of tags including the particular tag.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: February 10, 2015
    Assignee: McAfee, Inc.
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Patent number: 8621073
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8621060
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 31, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8615582
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 24, 2013
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20130275575
    Abstract: A first Internet protocol version 6 (IPv6) address of a particular computing device within a network is identified using a first passive discovery sensor performing a first discovery task. A second discovery task is caused to be performed using the first IPv6 address and an attribute of the particular computing device is identified from results of the second discovery task. The first IPv6 address and attribute of the particular device is added to a repository maintaining a record of detected IPv6 addresses within the network. In some instances, a first passive discovery sensor can be one of an event-based discovery sensor, a latent-type discovery sensor, and an indirect-type discovery sensor.
    Type: Application
    Filed: April 11, 2012
    Publication date: October 17, 2013
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Publication number: 20130276053
    Abstract: A plurality of system entities described in an asset repository are identified, the asset repository defining a particular hierarchical organization of the plurality of system entities within a computing environment. A particular system entity in the plurality of system entities is tagged with a particular tag. The particular system entity is associated with a particular security policy based on the particular system entity being tagged with the particular tag. The particular security policy is applied to system entities in the asset repository tagged with one or more tags in a particular set of tags including the particular tag.
    Type: Application
    Filed: April 11, 2012
    Publication date: October 17, 2013
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Publication number: 20130275574
    Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.
    Type: Application
    Filed: April 11, 2012
    Publication date: October 17, 2013
    Inventors: James Michael Hugard IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Publication number: 20120151595
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120151596
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120151594
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 14, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20120144476
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: February 15, 2012
    Publication date: June 7, 2012
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 8135830
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: March 13, 2012
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Publication number: 20090259748
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: June 1, 2009
    Publication date: October 15, 2009
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 7543056
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Grant
    Filed: September 14, 2006
    Date of Patent: June 2, 2009
    Assignee: McAfee, Inc.
    Inventors: Stuart C. McClure, George Kurtz, Robin Keir, Marshall A. Beddoe, Michael J. Morton, Christopher M. Prosise, David M. Cole, Christopher Abad
  • Patent number: 7519954
    Abstract: An automated system performs multiple tests for identifying an operating system executed by a network node. A combination of multiple tests may be calibrated to generate an acceptably accurate operating system identification. An identification module makes an overall identification based on identifications of the tests. A plurality of identification rules may determine which of the individual tests is likely to be most accurate. The system also may include a conflict resolution module that resolves conflicts among the multiple tests. The conflict resolution module may employ a plurality of conflict resolution definitions that define special cases in which the general identification rules may be overridden to make an identification without regard to the general identification rules. Alternatively, the conflict resolution module may be configured to work in combination with the general identification rules to make an operating system identification.
    Type: Grant
    Filed: April 8, 2004
    Date of Patent: April 14, 2009
    Assignee: McAfee, Inc.
    Inventors: Marshall Beddoe, Robin Keir
  • Publication number: 20070283007
    Abstract: A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
    Type: Application
    Filed: May 14, 2007
    Publication date: December 6, 2007
    Inventors: Robin Keir, Stephen Ecker