Patents by Inventor Simon Crowe

Simon Crowe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10097951
    Abstract: A geo-location provider station signs geo-location data and a previous signature provided by a mobile device, returning a new signature to the mobile device. The mobile device uses the new signature when requesting a signature from another geo-location provider station. The mobile device stores the geo-location data and the signatures provided by geo-location provider stations. The stored geo-location data may be verified upon request by using the stored signature data.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: October 9, 2018
    Assignee: McAfee, LLC
    Inventors: Igor Muttik, Simon Crowe, Joel Silber, Stephen Pearce, Stephen Hearnden
  • Patent number: 9870469
    Abstract: In an example, a stack protection engine is disclosed for preventing or ameliorating stack corruption attacks. The stack protection engine may operate transparently to user-space processes. After a call to a subroutine from a parent routine, the stack protection engine encodes the return address on the stack, such as with an exclusive or cipher and a key selected from a key array. After the subroutine returns control to the main routine, the stack protection engine decodes the address, and returns control. If a stack corruption attack occurs, the malicious return address is not properly encoded, so that when decoding occurs, the program may simply crash rather than returning control to the malicious code.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: January 16, 2018
    Assignee: McAfee, Inc.
    Inventor: Simon Crowe
  • Publication number: 20160092676
    Abstract: In an example, a stack protection engine is disclosed for preventing or ameliorating stack corruption attacks. The stack protection engine may operate transparently to user-space processes. After a call to a subroutine from a parent routine, the stack protection engine encodes the return address on the stack, such as with an exclusive or cipher and a key selected from a key array. After the subroutine returns control to the main routine, the stack protection engine decodes the address, and returns control. If a stack corruption attack occurs, the malicious return address is not properly encoded, so that when decoding occurs, the program may simply crash rather than returning control to the malicious code.
    Type: Application
    Filed: September 26, 2014
    Publication date: March 31, 2016
    Inventor: Simon Crowe
  • Publication number: 20150281888
    Abstract: A geo-location provider station signs geo-location data and a previous signature provided by a mobile device, returning a new signature to the mobile device. The mobile device uses the new signature when requesting a signature from another geo-location provider station. The mobile device stores the geo-location data and the signatures provided by geo-location provider stations. The stored geo-location data may be verified upon request by using the stored signature data.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Inventors: IGOR MUTTIK, SIMON CROWE, JOEL SILBER, STEPHEN PEARCE, STEPHEN HEARNDEN
  • Patent number: 7093121
    Abstract: A request for secure data sent from a client computer 2 to a webtsite server computer 4 is redirected to a proxy computer 6. A secure connection is established with the proxy computer 6 using a protocol such as HTTP and Certificate Exchange. The proxy computer 6 then establishes its own secure connection with the website server 4. The data requested is passed in encrypted form from the website server computer 4 to the proxy computer 6. The proxy computer 6 decrypts this data and then scans it for illegal content, such as computer viruses, worms, Trojans, banned computer files, banned words, banned combinations of words or banned images and the like. Providing no illegal content is found, the data is encrypted again for transfer over the secure link between the proxy computer 6 and the client computer 2. The proxy computer 6 may conveniently be the firewall computer within a local area network.
    Type: Grant
    Filed: January 10, 2002
    Date of Patent: August 15, 2006
    Assignee: McAfee, Inc.
    Inventors: Christopher Andrew Barton, Graham Andrew Clarke, Simon Crowe
  • Publication number: 20030131259
    Abstract: A request for secure data sent from a client computer 2 to a webtsite server computer 4 is redirected to a proxy computer 6. A secure connection is established with the proxy computer 6 using a protocol such as HTTPS and Certificate Exchange. The proxy computer 6 then establishes its own secure connection with the website server 4. The data requested is passed in encrypted form from the website server computer 4 to the proxy computer 6. The proxy computer 6 decrypts this data and then scans it for illegal content, such as computer viruses, worms, Trojans, banned computer files, banned words, banned combinations of words or banned images and the like. Providing no illegal content is found, the data is encrypted again for transfer over the secure link between the proxy computer 6 and the client computer 2. The proxy computer 6 may conveniently be the firewall computer within a local area network.
    Type: Application
    Filed: January 10, 2002
    Publication date: July 10, 2003
    Inventors: Christopher Andrew Barton, Graham Andrew Clarke, Simon Crowe