Patents by Inventor Sven Schrecker

Sven Schrecker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9112896
    Abstract: A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
    Type: Grant
    Filed: March 6, 2014
    Date of Patent: August 18, 2015
    Assignee: McAfee, Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Satish Kumar Gaddala, Sven Schrecker, David Moshe Goldschlag
  • Publication number: 20150222629
    Abstract: An opportunity for a computing device to participate in a secure session with a particular domain is identified. A secured microcontroller of the computing device is used to identify a secured, persistent seed corresponding to the particular domain and stored in secured memory of the computing device. A secure identifier is derived based on the seed and sent for use by the particular domain in authenticating the computing device to the particular domain for the secure session. The particular domain can further apply security policies to transactions involving the computing device and particular domain based at least in part on the secure identifier.
    Type: Application
    Filed: February 9, 2015
    Publication date: August 6, 2015
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith
  • Publication number: 20150200937
    Abstract: An opportunity for a computing device to participate in a secure session with a particular domain is identified. A domain identifier of the particular domain is received and a secured microcontroller of the computing device is used to identify a secured, persistent hardware identifier of the computing device stored in secured memory of the computing device. A secure identifier is derived for a pairing of the computing device and the particular domain based on the hardware identifier and domain identifier of the particular domain and the secure identifier is transmitted over a secured channel to the particular domain. The particular domain can verify identity of the computing device from the secure identifier and apply security policies to transactions involving the computing device and the particular domain based at least in part on the secure identifier.
    Type: Application
    Filed: September 29, 2014
    Publication date: July 16, 2015
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith
  • Patent number: 9058486
    Abstract: A particular activity performed by a particular user of a computing device is identified, for instance, by an agent installed on the computing device. It is determined that the particular activity qualifies as a particular use violation in a plurality of pre-defined use violations. A behavioral risk score for the particular score for the user is determined based at least in part on the determination that the particular activity of the particular user qualifies as a particular use violation. Determining that the particular activity qualifies as a particular use violation can include determining that the particular activity violates a particular rule or event trigger corresponding to a particular pre-defined use violation.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: June 16, 2015
    Assignee: McAfee, Inc.
    Inventors: Michael Mason Moyle, Prasanna Ganapathi Basavapatna, Sven Schrecker
  • Patent number: 9049207
    Abstract: A pluggable asset detection engine is used to identify devices within a network. The pluggable asset detection engine includes a set of pluggable discovery sensors and is adapted to identify particular address information of a particular computing device within a network, using a first pluggable discovery sensor in the set of discovery sensors, and send an identification of the particular address information of the particular computing device to an asset management system for inclusion of the particular address information in an asset repository managed by the asset management system.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: June 2, 2015
    Assignee: McAfee, Inc.
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Patent number: 9021595
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for asset risk analysis. One method includes receiving threat definition data for threats, vulnerability detection data for assets, and countermeasure detection data for assets. The method further includes determining a respective risk metric for each of the assets for each of the threats. This includes analyzing the vulnerability detection data for an asset to determine whether the asset is vulnerable to a threat, determining from the threat definition data and the countermeasure detection data whether the asset is protected by one of the countermeasures identified for the threat, and determining the risk metric for the asset for the threat according to whether the asset is vulnerable to the threat and whether the asset is protected by one of the countermeasures identified for the threat.
    Type: Grant
    Filed: July 23, 2013
    Date of Patent: April 28, 2015
    Assignee: McAfee, Inc.
    Inventors: Sven Schrecker, Stephen Ritter, Ryan Nakawatase
  • Patent number: 9015793
    Abstract: A management controller of a computing device is identified on a network and queried for attributes of the computing device. The management controller is securely implemented in hardware of the computing device and is independent of a central processing unit (CPU) of the computing device. Data is received from the management controller that identifies one or more attributes of the computing device. A security policy of the network is implemented for the computing device based on the one or more attributes.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: April 21, 2015
    Assignee: McAfee, Inc.
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker
  • Publication number: 20150106926
    Abstract: A predetermined particular behavioral profile is identified associated with at least one particular user of a computing system, the particular behavioral profile identifying expected behavior of the at least one user within the computing system. Activities associated with use of the computing system by the particular user are identified and it is determined whether the identified activities correlate with the particular behavioral profile. Identifying an activity that deviates from the particular behavioral profile beyond a particular threshold triggers a risk event relating to the particular user.
    Type: Application
    Filed: November 3, 2014
    Publication date: April 16, 2015
    Inventors: Prasanna Ganapathi Basavapatna, Michael Mason Moyle, Sven Schrecker
  • Patent number: 8954573
    Abstract: A first Internet protocol version 6 (IPv6) address of a particular computing device within a network is identified using a first passive discovery sensor performing a first discovery task. A second discovery task is caused to be performed using the first IPv6 address and an attribute of the particular computing device is identified from results of the second discovery task. The first IPv6 address and attribute of the particular device is added to a repository maintaining a record of detected IPv6 addresses within the network. In some instances, a first passive discovery sensor can be one of an event-based discovery sensor, a latent-type discovery sensor, and an indirect-type discovery sensor.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: February 10, 2015
    Assignee: McAfee Inc.
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Patent number: 8955075
    Abstract: An opportunity for a computing device to participate in a secure session with a particular domain is identified. A secured microcontroller of the computing device is used to identify a secured, persistent seed corresponding to the particular domain and stored in secured memory of the computing device. A secure identifier is derived based on the seed and sent for use by the particular domain in authenticating the computing device to the particular domain for the secure session. The particular domain can further apply security policies to transactions involving the computing device and particular domain based at least in part on the secure identifier.
    Type: Grant
    Filed: December 23, 2012
    Date of Patent: February 10, 2015
    Assignee: McAfee Inc
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith
  • Patent number: 8955036
    Abstract: A plurality of system entities described in an asset repository are identified, the asset repository defining a particular hierarchical organization of the plurality of system entities within a computing environment. A particular system entity in the plurality of system entities is tagged with a particular tag. The particular system entity is associated with a particular security policy based on the particular system entity being tagged with the particular tag. The particular security policy is applied to system entities in the asset repository tagged with one or more tags in a particular set of tags including the particular tag.
    Type: Grant
    Filed: April 11, 2012
    Date of Patent: February 10, 2015
    Assignee: McAfee, Inc.
    Inventors: James Michael Hugard, IV, Robin Keir, Joshua Cajetan Rebelo, Ofir Arkin, Sven Schrecker
  • Patent number: 8949993
    Abstract: At least one available wireless access point is identified at a particular location and a connection is established with the available wireless access point. Communication is attempted with a trusted endpoint over the wireless access point and the attempted communication with the trusted endpoint over the wireless access point is monitored to assess risk associated with the wireless access point. Results of the assessment, in some instances, can be reported to an access point risk manager and risk associated with future attempts to use the wireless access point can be assessed based at least in part on the reported assessment results.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: February 3, 2015
    Assignee: McAfee Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Satish Kumar Gaddala, Sven Schrecker, David Moshe Goldschlag
  • Patent number: 8881289
    Abstract: A predetermined particular behavioral profile is identified associated with at least one particular user of a computing system, the particular behavioral profile identifying expected behavior of the at least one user within the computing system. Activities associated with use of the computing system by the particular user are identified and it is determined whether the identified activities correlate with the particular behavioral profile. Identifying an activity that deviates from the particular behavioral profile beyond a particular threshold triggers a risk event relating to the particular user.
    Type: Grant
    Filed: December 22, 2011
    Date of Patent: November 4, 2014
    Assignee: McAfee, Inc.
    Inventors: Prasanna Ganapathi Basavapatna, Michael Mason Moyle, Sven Schrecker
  • Patent number: 8850543
    Abstract: An opportunity for a computing device to participate in a secure session with a particular domain is identified. A domain identifier of the particular domain is received and a secured microcontroller of the computing device is used to identify a secured, persistent hardware identifier of the computing device stored in secured memory of the computing device. A secure identifier is derived for a pairing of the computing device and the particular domain based on the hardware identifier and domain identifier of the particular domain and the secure identifier is transmitted over a secured channel to the particular domain. The particular domain can verify identity of the computing device from the secure identifier and apply security policies to transactions involving the computing device and the particular domain based at least in part on the secure identifier.
    Type: Grant
    Filed: December 23, 2012
    Date of Patent: September 30, 2014
    Assignee: McAfee, Inc.
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith
  • Publication number: 20140250533
    Abstract: A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
    Type: Application
    Filed: March 6, 2014
    Publication date: September 4, 2014
    Inventors: Prasanna Ganapathi Basavapatna, Satish Kumar Gaddala, Sven Schrecker, David Moshe Goldschlag
  • Patent number: 8819445
    Abstract: Authentication data is received, from a first computing device, based on data received by the first computing device from a wireless token device, the authentication data used to authenticate a first user to a particular computing session hosted remote from the first computing device. The first computing device is authenticated to the particular computing session based on the received authentication data. The first computing device is permitted to consume resources of the particular computing session. In some instances, the data received by the first computing device from the wireless token device includes the authentication data.
    Type: Grant
    Filed: April 9, 2012
    Date of Patent: August 26, 2014
    Assignee: McAfee, Inc.
    Inventor: Sven Schrecker
  • Patent number: 8806645
    Abstract: A security metrics system receives security information data for a network system of computers and metric definitions from metric sources. Each metric definition defines a heuristic for calculating a score for the network system from one or more security signal values at a time in the plurality of times, wherein the score quantifies a security metric for the network system. The system calculates each metric definition for a plurality of times and selecting metric definitions that are related to the performance of and are indicative of one or more other metric definitions as candidates to be key performance indicators.
    Type: Grant
    Filed: April 1, 2011
    Date of Patent: August 12, 2014
    Assignee: McAfee, Inc.
    Inventors: Ryan Nakawatase, Stephen Ritter, Sven Schrecker
  • Patent number: 8800046
    Abstract: A scan engine receives a request to perform a particular scan on at least a portion of a computing environment. The scan engine identifies a particular language interpreter in a set of available language interpreters for use in performing the particular scan and performs the particular scan using the particular language interpreter. The scan engine returns results of the particular scan. In some implementations, the scan engine is implemented on an agent enabling communication between the scan engine and an asset management system.
    Type: Grant
    Filed: April 10, 2012
    Date of Patent: August 5, 2014
    Assignee: McAfee, Inc.
    Inventors: Ryan Tadashi Nakawatase, James Michael Hugard, IV, Sven Schrecker
  • Publication number: 20140208413
    Abstract: A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic flow to a server. In specific embodiments, a security module may add information about the application to traffic flow. A trapping module may monitor for a memory condition and identify the memory condition. The trapping module may also, responsive to identifying the memory condition, initiate a virtual environment for the application, and check the integrity of the traffic flow.
    Type: Application
    Filed: January 23, 2013
    Publication date: July 24, 2014
    Inventors: Steve Grobman, Raj Samani, Ofir Arkin, Sven Schrecker
  • Publication number: 20140181891
    Abstract: A management controller of a computing device is identified on a network and queried for attributes of the computing device. The management controller is securely implemented in hardware of the computing device and is independent of a central processing unit (CPU) of the computing device. Data is received from the management controller that identifies one or more attributes of the computing device. A security policy of the network is implemented for the computing device based on the one or more attributes.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Inventors: Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker