Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Mcafee Inc
Mcafee Inc A Delaware Corporation
Mcafee Inc_20131212

Mcafee Inc patents


Recent patent applications related to Mcafee Inc. Mcafee Inc is listed as an Agent/Assignee. Note: Mcafee Inc may have other listings under different names/spellings. We're not affiliated with Mcafee Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "M" | Mcafee Inc-related inventors


 new patent  Trust establishment between a trusted execution environment and peripheral devices

Technologies are provided in embodiments to establish trust between a trusted execution environment (TEE) and a peripheral device. Embodiments are configured to communicate with an attestation server to generate an encryption key, and to establish, using the encryption key, a secure connection with an authentication server to enable communication between... Mcafee Inc

Context-aware reputation of a place

A mobile device including: a position locator; a user data engine; and a reputation engine client configured to: receive a location from the position locator; operate the user data engine to provide a user profile, intent, and context data for a user, the context data including dynamic factors about the... Mcafee Inc

Graymail filtering-based on user preferences

A graymail detection and filtering system predicts whether a user will consider an email to be graymail using a classifier model based on features extracted from the email. The email is labelled as graymail or non-graymail based on the prediction. User actions are tracked on the email to determine whether... Mcafee Inc

Mitigation of ransomware

Particular embodiments described herein provide for an electronic device that can be configured to allow for the mitigation of ransomware. For example, the system can determine that an application begins to execute, determine that the application attempts to modify a file, determine a file type for the file, and create... Mcafee Inc

Data verification using enclave attestation

Particular embodiments described herein provide for an electronic device that can be configured to receive untrusted input data at an enclave in an electronic device, isolate the untrusted input data from at least a portion of the enclave, communicate at least a portion of the untrusted data to an integrity... Mcafee Inc

Method and processes for securely autofilling data fields in a software application

The present invention gives the methods and processes for automatically servicing user driven requests to find place-holder fields, fill them in with relevant data in a secure manner and securely communicating the data related thereto to the appropriate Android™ device and/or application. More particularly, it relates to the methods and... Mcafee Inc

System and method to mitigate malicious calls

Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call... Mcafee Inc

Cloud email message scanning with local policy application in a network environment

A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least... Mcafee Inc

System and method to detect bypass of a sandbox application

Particular embodiments described herein provide for an electronic device that can be configured to receive data related to execution of a sandboxed process, determine if a high privileged process was created by the sandboxed process, and block the sandboxed process from executing if the high privileged process was created by... Mcafee Inc

Ransomware protection for cloud file storage

A cloud storage server-based approach allows detection of ransomware activity in cloud storage systems caused by ransomware infections on an endpoint device. A heuristic or rule-based technique is employed for recognizing sequences of file operations that may indicate ransomware activity. In some embodiments, users may be offered an opportunity to... Mcafee Inc

String similarity score

Particular embodiments described herein provide for an electronic device that can be configured to acquire a string, convert the string to an image, compare the image of the string to an image of a test string, and determine a similarity score. The similarity score provides an indication as to how... Mcafee Inc

Cloud assisted behavioral automated testing

A computer readable storage medium, system and method for improving automated testing systems to include a first and second behavioral data. The first behavioral data is collected periodically and the second behavioral data is collected in real time. The receipt of the first behavioral data and a second behavioral data... Mcafee Inc

Array of interconnected sensors

In an example, there is disclosed an apparatus, having a geometry detector; an ambient environment sensor to detect an ambient environment variable; a network interface; and one or more logic elements, including at least one hardware logic element, providing a data engine to: identify a neighbor apparatus via the geometry... Mcafee Inc

System and redirected firewall discovery in a network environment

A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. In other embodiments, a network flow may be received from a host... Mcafee Inc

System and protecting specified data combinations

A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token... Mcafee Inc

Server-assisted anti-malware client

A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. It is determined whether local reputation data for the file is available at the host device for the file. A query is sent to an antimalware support system relating to... Mcafee Inc

Trusted updates

In an example, a system and method are described for providing trusted updaters and trusted processes. An updater may be subject to a whitelist of files that it, and any child processes, are allowed to modify. But trust inheritance may break across reboots and over interprocess communication. Thus, it is... Mcafee Inc

Protecting user identity by sharing a secret between personal iot devices

A wearable device provides protection for personal identity information by fragmenting a key needed to release the personal identity information among members of a body area network of wearable devices. A shared secret algorithm is used to allow unlocking the personal identity information with fragmental keys from less than all... Mcafee Inc

Systems and methods for real-time user verification in online education

Systems and methods for real-time user verification in online education are disclosed. In certain example embodiments, user identifying information associated with a user and a request to access online education content may be received from a user device. A face template including historical facial image data for the user can... Mcafee Inc

Agent presence for self-healing

In one or more examples, there is disclosed a system and method of detecting agent presence for self-healing. An out-of-band monitoring process, such as Intel® AMT, or any process in firmware executing on a co-processor, may monitor one or more processes to determine if one goes down or otherwise meets... Mcafee Inc

Personalization of delivery of notifications

Particular embodiments described herein provide for system that can be configured to deliver a notification to a user based on the user's preference for each device that receives the notification. The user's preference is based on how the user interacted with similar notifications in the past and the system can... Mcafee Inc

Computing platform security methods and apparatus

Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine... Mcafee Inc

Computing platform security methods and apparatus

Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine... Mcafee Inc

Content classification

Particular embodiments described herein provide for an electronic device that can be configured to analyze data to determine one or more unique topics for a first class and one or more common topics that are common with the first class and a second class, where the topics that are common... Mcafee Inc

System, performing secure memory training and management in a trusted environment

In one embodiment, a system includes: a processor; a security processor to execute in a trusted executed environment (TEE), the security processor to execute memory reference code (MRC) stored in a secure storage of the TEE to train a memory coupled to the processor; and the memory coupled to the... Mcafee Inc

Iot and pos anti-malware strategy

Providing security to a device includes detecting, in a first device, a first function call, determining whether the first function call is forbidden for the first device, and in response to determining that the particular function is forbidden for the first device, preventing the function call from executing.... Mcafee Inc

Device lock while in motion

In an example, a mobile device is configured to automatically lock when a detector, such as a GPS receiver, determines that the device is in motion above a certain speed threshold, such as 10 mph. Additional detectors may be used to determine whether the device is operated by the user... Mcafee Inc

System and method to mitigate malware

Particular embodiments described herein provide for an electronic device that can be configured to receive script data, determine a checksum tree for the script data, compare each checksum of the checksum tree to one or more subtree checksums, and assign one or more classifications to the script data. In one... Mcafee Inc

Providing a virtual security appliance architecture to a virtual cloud infrastructure

A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method... Mcafee Inc

Discovery of malicious strings

Particular embodiments described herein provide for an electronic device that can be configured to determine a string sample of data, determine a hash of the string sample of data, automatically cluster the hash with other hashes from other string samples of data, and automatically create a signature hash string for... Mcafee Inc

Trusted indicators to secure visual outputs

Providing secure graphics outputs by performing at least the following: receive secure output data corresponding to a digital image, obtain one or more security keys, create a secure output marker for the secure output data, wherein the secure output marker comprises location information corresponding to a trusted output area of... Mcafee Inc

Beacon cloud reputation service

A technique for determining the safety of the content of beacon transmissions. A user device extracts beacon identification information from a beacon transmission. The user device queries the beacon registry to obtain the targeted content. The user device provides the targeted content and beacon identification information to a validation service.... Mcafee Inc

Bootstrap os protection and recovery

A method, system, and computer program product for protecting a computer system provides bootstrap operating system detection and recovery and provides the capability to detect malware, such as rootkits, before the operating system has been loaded and provides the capability to patch malfunctions that block the ability of the computer... Mcafee Inc

Personal safety and emergency services

A safety event is determined as affecting a user based at least in part context data collected at a user device associated with the user. In some aspects, context data is detected from sensors on the client device, the context data describing a present context of the user. A deviation... Mcafee Inc

Detecting data corruption by control flow interceptions

Embodiments of this disclosure are directed to an execution profiling handler configured for intercepting an invocation of memory allocation library and observing memory allocation for an executable application process. The observed memory allocation can be used to update memory allocation meta-data for tracking purposes. The execution profiling handler can also... Mcafee Inc

06/29/17 / #20170185667

Content classification

Particular embodiments described herein provide for an electronic device that can be configured to analyze data using an ensemble and assign a classification to the data based, at least in part, on the results of the analyses using the ensemble. The ensemble can include one or more multinomial classifiers and... Mcafee Inc

06/29/17 / #20170185756

Secure license enforcement for expandable peripherals on iot ( sleepi) devices

Managing playback of a media file, including detecting, while a media file is playing, a trigger mechanism indicating a change in optimal play characteristics of the media file from an original format, wherein the playback of the media file is associated with a first license, in response to detecting the... Mcafee Inc

06/29/17 / #20170185774

Monitoring executed script for zero-day attack of malware

Embodiments are directed to hooking a call for a malware monitoring logic into a JavaScript API engine interpreter. Upon JavaScript being placed into heap memory, the malware monitoring logic can initiate an evaluation or analysis of the heap spray to determine whether the JavaScript includes malware or other malicious agents... Mcafee Inc

06/29/17 / #20170185777

Hardware assisted branch transfer self-check mechanism

Embodiments of the present disclosure are directed to a self-check application to determine whether an indirect branch execution is permissible for an executable application. The self-check application uses one or more parameters received from an execution profiling module to determine whether the indirect branch execution is permitted by one or... Mcafee Inc

06/29/17 / #20170185778

Executing full logical paths for malware detection

Embodiments include identifying, at a logical path node, a first logical path and a second logical path; executing, by a processor implemented at least partially in hardware, a first set of instructions to follow the first logical path; storing, in a memory, a first set of information obtained from following... Mcafee Inc

06/29/17 / #20170185789

Method and hardware based file/document expiry timer enforcement

A technique for secure network storage includes generating, by a trusted execution environment in a first device, an encryption key and a certificate for a document, wherein the certificate comprises expiry information for the document and the encryption key, encrypting, by a general execution environment in the first device, the... Mcafee Inc

06/29/17 / #20170187525

Hardware-generated dynamic identifier

In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (HGDI). There... Mcafee Inc

06/29/17 / #20170187690

Mitigating bot scans of sensitive communications

Particular embodiments described herein provide for an electronic device that can be configured to receive a message, determine that at least a portion of the message includes sensitive data, obfuscate the portion of the message that includes sensitive data, and communicate the message to an electronic device, where the obfuscated... Mcafee Inc

06/29/17 / #20170187746

Safer password manager, trusted service, and anti-phishing process

Preventing anomalous connections includes detecting by a programmable device an attempt by a first device to connect to a second device, detecting a first connection anomaly responsive to characteristics of the first device and characteristics of one or more other devices, and prohibiting a connection between the first device and... Mcafee Inc

06/29/17 / #20170187799

Protected data collection in a multi-node network

Particular embodiments described herein provide for an electronic device that can be configured to receive a broadcast query from a network element, receive information from a plurality of devices, process the information, and generate an integrated group response, wherein the integrated group response summarizes the information about the plurality of... Mcafee Inc

06/22/17 / #20170180314

Attestation device custody transfer protocol

A custody transfer of a device can include sending a start of transfer request to an attestation device over a short range wireless communication channel, a nonce is received from the attestation device in association with the start of transfer request, and the nonce is signed at the particular gateway... Mcafee Inc

06/22/17 / #20170177417

Trusted computing resource meter

In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave;... Mcafee Inc

06/22/17 / #20170177884

Verified social media content

In an example, there is disclosed a computing apparatus, comprising: a psychological state data interface to receive psychological state data; one or more logic elements, including at least one hardware element, comprising a verification engine to: receive a requested user action; receive a psychological state input via the psychological state... Mcafee Inc

06/22/17 / #20170180191

Security content over a management band

There is disclosed in one example, a computing apparatus, having: first one or more logic elements comprising at least a processor and a memory to provide an operational environment; and second one or more logic elements providing an out-of-band management engine to function independently of the operational environment, and to:... Mcafee Inc

06/22/17 / #20170180234

Identifying a source device in a software-defined network

In an example, there is disclosed a computing apparatus, having: a network interface to communicatively couple to a software-defined network (SDN); first one or more logic elements providing an SDN controller engine to provide a control function for the SDN; and second one or more logic elements providing a route... Mcafee Inc

06/22/17 / #20170180237

Intelligent devices in a software-defined network

There is disclosed a network device having a network interface; and one or more logic elements comprising a flow table engine operable to: receive a network packet via the network interface; perform a logging action to make the network packet traceable; and notify a software-defined networking (SDN) controller of the... Mcafee Inc

06/22/17 / #20170180341

Simplified sensor integrity

An apparatus is provided that includes at least one processor device, an energy storage module to power the apparatus, memory to store a secret such that powering down and restarting the apparatus causes the secret to be lost, logic executable by the at least one processor device to generate attestation... Mcafee Inc

06/22/17 / #20170180391

Secure over-the-air updates

In an example, there is disclosed a computing apparatus having: a network interface to communicate with a second device; a contextual data interface to receive and store contextual data; and one or more logic elements comprising a contextual security agent, operable to: receive a contextual data packet via the network... Mcafee Inc

06/08/17 / #20170163616

System, providing privacy preserving interaction with a computing system

In one embodiment, a system including one or more hardware processors is: to receive a user request to access a website; sign a nonce with at least some of the plurality of group private keys, the at least some of the plurality of group private keys corresponding to personalization attributes... Mcafee Inc

06/08/17 / #20170163620

Methods and apparatus to enhance security of authentication

A system is disclosed that includes a processor including watermark logic to output a first watermark to an output device that outputs a first watermark signal, based on the first watermark, to an acoustic transmission medium. The processor also includes recording logic to capture, at a first time period, an... Mcafee Inc

05/25/17 / #20170149839

Real-time mobile security posture

In an example, there is described a server apparatus, comprising: a network connection; and one or more logic elements, including at least a processor and a memory, comprising a mobile device management (MDM) engine to: instruct an MDM agent to register a mobile security posture event; receive from the MDM... Mcafee Inc

05/18/17 / #20170140168

Execution environment file inventory

A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system.... Mcafee Inc

05/11/17 / #20170134419

Zero day threat detection using host application/program to user agent mapping

A technique allows associating host applications and user agents in network traffic and detecting possible malware without relying on signatures of the user agents. A database of host applications and user agents is maintained, allowing automatic update of the database when a new application or new application to user agent... Mcafee Inc

05/11/17 / #20170134436

System and preventing data loss using virtual machine wrapped applications

A method in one example implementation includes selecting at least one criterion for controlling data transmission from within a virtual machine. At least one application is included within the virtual machine, which includes a policy module. The selected criterion corresponds to at least one policy associated with the policy module.... Mcafee Inc

05/11/17 / #20170134957

System and correlating network information with subscriber information in a mobile network environment

A method is provided in one example embodiment and includes receiving information for network traffic in a wireless network; correlating the information with a subscriber of a plurality of subscribers; and generating a behavior profile for the subscriber based on the information over a period of time.... Mcafee Inc

05/04/17 / #20170124325

Decision forest compilation

Embodiments of the present disclosure include methods, devices, and computer program products for detecting malware in a file. Embodiments include identifying a plurality of features of the file, categorizing each of the plurality of features to define a plurality of categories of features, building a first decision tree based on... Mcafee Inc

05/04/17 / #20170125014

Trusted speech transcription

Embodiments include a system, method, and apparatus for creating a trusted speech transcription. Transcription logic can receive a signal of audible speech from an audio source and convert the audible speech signal into text. Sampling logic can receive the signal of the audible speech and record a portion of the... Mcafee Inc

05/04/17 / #20170126413

System and an endpoint hardware assisted network firewall in a security environment

A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic... Mcafee Inc

05/04/17 / #20170126502

Establishing nodes for global routing manager

Embodiments of the present disclosure include an Orchestrator to commission a point of presence (PoP) node based on receiving an internet protocol (IP) address, the IP address associated with a geographic location; and a global routing manager for assigning a client device to a PoP node based on the received... Mcafee Inc

05/04/17 / #20170126653

Techniques for identification of location of relevant fields in a credential-seeking web page

Techniques allow identification of credential fields in a credential form on a web page that can be stored in a credential manager database to allow a credential manager application to fill the credential fields with saved credentials managed by the credential manager.... Mcafee Inc

Patent Packs
05/04/17 / #20170126720

Implicit crowdsourcing for untracked correction or verification of categorization information

Embodiments of the present disclosure are directed to updating categorization of online content. An analytics engine implemented at least partially in hardware can receive an engagement indicator across a network interface; identify a type of the engagement indicator, the type of the engagement indicator comprising one of a positive engagement... Mcafee Inc

04/27/17 / #20170116416

Advanced threat protection cross-product security controller

A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security controller is configured to determine a suspicious file from a... Mcafee Inc

04/27/17 / #20170116418

Hardware heuristic-driven binary translation-based execution analysis for return-oriented programming malware detection

A combination of hardware monitoring and binary translation software allow detection of return-oriented programming (ROP) exploits with low overhead and low false positive rates. Embodiments may use various forms of hardware to detect ROP exploits and indicate the presence of an anomaly to a device driver, which may collect data... Mcafee Inc

04/27/17 / #20170116420

End-point visibility

A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a monitoring application comprising computer-executable instructions on the medium. The instructions are readable by the processor. The monitoring application is configured to receive an indication that a client has been affected by... Mcafee Inc

04/27/17 / #20170118228

Agent assisted malicious application blocking in a network environment

Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. Embodiments are configured to request a threat intelligence reputation score... Mcafee Inc

04/27/17 / #20170118281

Dynamic sharding for state-based processing

Enabling a distributed data processing system to process a data set from local storage devices by dynamically reallocating portions of the data set.... Mcafee Inc

04/20/17 / #20170111333

System, migrating a device having a platform group

In one embodiment, an apparatus comprises a processor to execute instructions and having at least a first logic to execute in a trusted execution environment, a secure storage to store a platform group credential, and a first logical device comprising at least one hardware logic. The platform group credential may... Mcafee Inc

04/20/17 / #20170111388

Centralized and automated recovery

A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a secured storage communicatively coupled to the client. The system further includes a client application including computer-executable instructions on the medium. The instructions are readable by the processor. The application is configured... Mcafee Inc

04/13/17 / #20170103225

Remote provisioning and authenticated writes to secure storage devices

A system for securing electronic devices includes a storage device including a storage device controller processor, at least one non-transitory machine readable storage medium in firmware of the storage device communicatively coupled to the storage device controller processor, and a monitor application comprising computer-executable instructions on the medium. The instructions... Mcafee Inc

04/13/17 / #20170105171

Multilayer access control for connected devices

A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub,... Mcafee Inc

03/30/17 / #20170088142

Contextual scoring of automobile drivers

In an example, there is disclosed a computing apparatus, including: a driver identity detector to detect the identity of a driver; and one or more logic elements providing a driver competency engine, operable to: detect the identity of the driver; evaluate the driver's operation of a vehicle; and build a... Mcafee Inc

03/30/17 / #20170090821

User mode heap swapping

In an example, there is disclosed a computing apparatus, including a processor, including a trusted execution instruction set; a memory having an enclave portion, wherein the enclave is accessible only via the trusted execution instruction set; a swap file; and a memory management engine operable to: allocate a buffer within... Mcafee Inc

03/30/17 / #20170090929

Hardware-assisted software verification and secure execution

In an example, there is disclosed a computing apparatus, including a processor operable to execute a plurality of instructions forming a program; and a verification engine, operable to: receive an execution control data (ECD) for the program; and monitor execution of only some instructions of the program to ensure that... Mcafee Inc

03/30/17 / #20170091163

Crowd-source as a backup to asynchronous identification of a type of form and relevant fields in a credential-seeking web page

A technique allows a credential manager application on a client computer system to identify fields and forms on a web page. An analysis server may automatically crawl web pages and identify the fields and form, then push the information to the client computer system for use by the credential manager.... Mcafee Inc

03/30/17 / #20170091290

Distributed data query

Performing content exploration includes obtaining an exploration script indicating page characteristics to explore and a definition of webpages to explore, locating DOMs required for exploration script based on the definition of webpages to explore, generating a queue of DOMs required for the exploration script, and distributing the DOMS in the... Mcafee Inc

Patent Packs
03/30/17 / #20170091434

Secure communication between a virtual smartcard enclave and a trusted i/o enclave

A system for accessing a trusted execution environment includes instructions to transmit, from a first trusted execution environment, a request for a biometric match claim, receive, in response to the request for a biometric match claim, biometric data from a biometric capture device, perform a match of the biometric data... Mcafee Inc

03/30/17 / #20170091444

Hardware-enforced code paths

There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive... Mcafee Inc

03/30/17 / #20170091452

Atomic detection and repair of kernel memory

A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting memory modifications into the contiguous block of memory. The electronic device includes a plurality of processing entities. The method also includes disabling all but one of a... Mcafee Inc

03/30/17 / #20170091453

Enforcement of file characteristics

Particular embodiments described herein provide for an electronic device that can be configured to determine a file characteristic for a characteristic of a file, determine that the file has been modified to create a new file, determine a new characteristic for the characteristic of the new file, and create a... Mcafee Inc

03/30/17 / #20170091467

Provable traceability

There is disclosed in an example, a computing apparatus, including: a trusted execution environment (TEE); and one or more logic elements providing a collaboration engine within the TEE, operable to: receive a change to a secured document via a trusted channel; apply a change to the secured document; log the... Mcafee Inc

03/30/17 / #20170091654

Multi-label classification for overlapping classes

In an example, there is disclosed a computing apparatus, including one or more logic elements comprising a classification engine operable to identify at least one overlapping class pair comprising at least two classes selected from a class group, wherein the overlapping class pair may be characterized by a substantial mutual... Mcafee Inc

03/30/17 / #20170091972

Geo-mapping system security events

A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A particular grouping of assets in a plurality of asset groupings within the particular computing system is identified as including the particular computing device. A source of the... Mcafee Inc

03/30/17 / #20170093572

Systems and methods for utilizing hardware assisted protection for media content

This disclosure describes systems and methods related to utilizing hardware assisted protection for media content. In some embodiments, a provided method comprises: receiving, from a content server and by a computing device processor of a secure enclave of a device, first encrypted media content; decrypting, by the computing device processor,... Mcafee Inc

03/30/17 / #20170093803

Secure service matching

In an example, there is disclosed a computing apparatus having one or more logic elements forming a non-encrypted flow processor engine; and one or more logic elements forming a service selection engine, wherein the one or more logic elements include a trusted execution environment (TEE), and wherein the service selection... Mcafee Inc

03/30/17 / #20170093805

Remote authentication and passwordless password reset

A passwordless reset technique includes actions to receive a request for a password reset, wherein the request password reset is initiated at a first device, determine that the first device is a trusted device, authenticate the user in order to obtain a cloud key from a network device, wherein the... Mcafee Inc

03/30/17 / #20170093829

Cumulative authentication for step-up increased authentication factors

Techniques are disclosed for providing an authentication service that performs authentication of users on behalf of a relying party. The authentication service receives authentication requirements from the relying party and compares those requirements with authentication capabilities of the user and user equipment. If the authentication requirements are met, the authentication... Mcafee Inc

03/30/17 / #20170093835

Automatic log-in and log-out of a session with session sharing`

A technique allows for transparently managing, suspending, restoring, sharing, limiting and migrating user sessions on a device without having access to user credentials. A user may automatically log in and out of each or all their online accounts instantaneously and, in doing so, the user may share sessions without sharing... Mcafee Inc

03/30/17 / #20170093839

Algorithm hardening in background context and external from the browser to prevent malicious intervention with the browser

A technique for hardening the entry of user credentials in web sites is described. A headless web browser authenticates the user to a target web site with credentials previously stored in a secure database, and generates a session cookie. The headless browser provides the session cookie to the user's web... Mcafee Inc

03/30/17 / #20170093897

Application phenotyping

A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known... Mcafee Inc

03/23/17 / #20170083508

Systems and methods for multilingual document filtering

Systems, apparatus, computer-readable media, and methods to provide filtering and/or search based at least in part on semantic representations of words in a document subject to the filtering and/or search are disclosed. Furthermore key words for conducting the filtering and/or search, such as taboo words and/or search terms, may be... Mcafee Inc

03/23/17 / #20170083510

Systems and methods for multi-path language translation

Systems, apparatus, computer-readable media, and methods to provide translation of words or phrases from an initial language to a target language using multiple pathways are disclosed. The multiple pathways may have independent or near independent errors and the use of multiple pathways may reduce the errors that may be encountered... Mcafee Inc

03/23/17 / #20170085551

Multi-ring encryption approach to securing a payload using hardware modules

Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key derived from a password, such that each subsequent ring of protection is protected by a key derived from the key used to encrypt the... Mcafee Inc

03/02/17 / #20170057634

Location verification and secure no-fly logic for unmanned aerial vehicles

Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as “drones”). In some embodiments, an unmanned aerial vehicle engaged in autonomous flight may determine its location using a satellite-based navigation system. The location may be evaluated against location data obtained from one or more... Mcafee Inc

03/02/17 / #20170061125

System and statistical analysis of comparative entropy

In accordance with one embodiment of the present disclosure, a method for determining the similarity between a first data set and a second data set is provided. The method includes performing an entropy analysis on the first and second data sets to produce a first entropy result, wherein the first... Mcafee Inc

03/02/17 / #20170061164

Two-device scrambled display

In an example, there is disclosed a system and method for a two-device scrambled display. A first device displays content in a scrambled form. A second device acts as an interpreter, including an input driver for receiving a scrambled input; an output driver for displaying an organically perceptible output; and... Mcafee Inc

03/02/17 / #20170063750

Contextual privacy engine for notifications

In an example, there is disclosed a computing apparatus, including a user notification interface; a context interface; and one or more logic elements forming a contextual privacy engine operable to: receive a notification; receive a context via the context interface; apply the context to the notification via a notification rule;... Mcafee Inc

03/02/17 / #20170063815

Sentinel appliance in an internet of things realm

In an example, there is disclosed a computing apparatus, comprising: a trusted execution environment (TEE); and a security engine operable to: identify a key negotiation for an encrypted connection between a first device and a second device; request a service appliance key for the key negotiation; receive the service appliance... Mcafee Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Mcafee Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Mcafee Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###