Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Mcafee Llc patents


Recent patent applications related to Mcafee Llc. Mcafee Llc is listed as an Agent/Assignee. Note: Mcafee Llc may have other listings under different names/spellings. We're not affiliated with Mcafee Llc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "M" | Mcafee Llc-related inventors


Data loss prevention for mobile computing devices

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (i/o) functionality of the mobile computing device. ... Mcafee Llc

Optical feedback for visual recognition authentication

Providing optical watermark signals for a visual authentication session by performing at least the following: receive, at an anti-spoof engine, an instruction to perform visual authentication operations for a visual authentication session, generate, with the anti-spoof engine, an optical watermark signal based on receiving the instruction, wherein the optical watermark signal includes at least one optical identifier to authenticate images captured during the visual authentication session, obtain, with the anti-spoof engine, an image source that includes captured images of the visual authentication session, determine, with the anti-spoof engine, whether the image source includes a reflected optical watermark signal, and compare, with the anti-spoof engine, whether the reflected optical watermark signal matches the generated optical watermark signal based on the determination that the image source includes the reflected optical watermark signal.. . ... Mcafee Llc

System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session

A system, method, and computer program product are provided for preventing access to data associated with a data access attempt. In use, a data access attempt associated with a remote data sharing session is identified. ... Mcafee Llc

Location verification and secure no-fly logic for unmanned aerial vehicles

Apparatus, methods and systems to associate a flight plan of an unmanned aerial vehicle (e.g., a drone) with a cryptographic signature are disclosed herein. Some disclosed examples include one or more non-transitory computer-readable media including computer-executable instructions. ... Mcafee Llc

Social-graph aware policy suggestion engine

Systems, devices and methods are disclosed to assist in configuring devices and policies to protect a regional network (e.g., home network) and its users. Users on the network are monitored to determine appropriate configuration settings and preferences by utilizing a combination of internally configured information and externally gathered information for each user. ... Mcafee Llc

Proximity-based radio advertising activation

Pairing two devices includes detecting, by a first device, a trigger event that indicates that a second device is within a predetermined proximity, obtaining a first time stamp indicating a time of the trigger event as recorded by the first device, determining whether a difference between the first time stamp and a second time stamp satisfy a predetermine threshold, where the second time stamp indicates a time of the trigger event as recorded by the second device, and in response to determining that the difference between the first time stamp and the second time stamp satisfies the predetermined threshold, allowing the first device to pair with the second device.. . ... Mcafee Llc

Safe sharing of sensitive data

In an example, there is disclosed a computing apparatus having: a processor; a memory; a data interface; and one or more logic elements providing a verification engine to: receive via the data interface an input script including a request to access enterprise data; analyze the input script to determine that the input script complies with a data request criterion; apply an application programming interface (api) to the input script to collect the enterprise data; and send the enterprise data via the data interface.. . ... Mcafee Llc

Distributed authentication with thresholds in iot devices

Managing authentication of a child device includes receiving, by a host device, sensor data from a child device, deriving simplified authentication data from the sensor data based on a capability of the child device, storing the simplified authentication data in an authentication profile for the child device, and transmitting the simplified authentication data to the child device, wherein the simplified authentication data is sufficient to allow the child device to authenticate a user without the host device.. . ... Mcafee Llc

Static and dynamic device profile reputation using cloud-based machine learning

Disclosed herein are cloud-based machine learning systems and methods for monitoring networked devices to identify and classify characteristics, to infer typical or atypical behavior and assign reputation profiles across various networked devices, and to make remediation recommendations. In some embodiments, a cloud-based machine learning system may learn the typical operation and interfacing of a plurality of reputable devices that are known to be free from malicious software and other threats. ... Mcafee Llc

Detection of return oriented programming attacks in a processor

In an embodiment, a processor for return oriented programming (rop) detection includes at least one execution unit; a plurality of event counters, each event counter associated with a unique type of a plurality of types of control transfer events; and a rop detection unit. The rop detection unit may be to: adjust a first event counter in response to detection of a first type of control transfer events; in response to a determination that the first event counter exceeds a first threshold, access a first configuration register associated with the first event counter to read configuration data; identify a set of rop heuristic checks based on the configuration data read from the first configuration register; and perform each rop heuristic check of the identified set of rop heuristic checks. ... Mcafee Llc

Wireless token device

A first computing device is detected as substantially collocated with a wireless token device, using a short-range wireless communication network, and a connection is established between the first computing device and the wireless token device over the short-range wireless network. Authentication data stored in memory of the wireless token device is sent from the wireless token device to the first computing device over the short-range wireless network. ... Mcafee Llc

Dynamically identifying criticality of services and data sources

A method, a computer-readable medium, and a device for dynamically identifying criticality of services and data sources. Service-related metrics are received from all iot network elements in a network. ... Mcafee Llc

Survivable networks that use opportunistic devices to offload services

Dynamically identifying and utilizing an opportunistic device by performing at least the following within a discovery offloading module: receive an offloading alert message from a service device, wherein the offloading alert message indicates the service device is unable to provide one or more services to the client device, receive a discovery message from a candidate device, wherein the discovery message indicates the candidate device is capable of performing the services provided to the client device, select, using the dedicated execution environment, an opportunistic service device based on the discovery message from the candidate device; and trigger the restart of host execution instruction within the client device by obtaining the one or more services from the opportunistic service device, wherein the discovery offloading module operates independently from the host execution instructions within the client device.. . ... Mcafee Llc

Security broker

An attempted transaction is identified involving a customer device and the first customer device is redirected to a security broker. A security report for the first customer device is received from the security broker. ... Mcafee Llc

03/29/18 / #20180089457

Secure disk access control

A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (api) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. ... Mcafee Llc

03/29/18 / #20180089041

Query optimized distributed ledger system

Disclosed herein are distributed ledger systems and methods for efficiently creating and updating a query optimized distributed ledger. In particular, the present disclosure introduces methods and apparatuses for efficiently updating indexes when new blocks are added to the distributed ledger by using snapshots of data and appending new snapshot tables and indexes to previous snapshot tables and indexes.. ... Mcafee Llc

03/29/18 / #20180089014

Monitoring and analyzing watchdog messages in an internet of things network environment

Technologies are provided in embodiments to monitor and analyze networks. The embodiments can cause a bit in a first bit sequence of a device filter to indicate a failure state based on not receiving a message from a node in a network during a reporting time interval, and upon the reporting time interval expiring, to combine the first bit sequence with a corresponding bit sequence of a shadow filter. ... Mcafee Llc

03/29/18 / #20180088928

Device-driven auto-recovery using multiple recovery sources

Updating computer program(s) installed on a programmable device using a distributed ledger that is based on cryptography and blockchain technology is described. A distributed ledger logic/module can commit, to the distributed ledger, a first configuration of a computer program installed on a device. ... Mcafee Llc

03/29/18 / #20180086453

Apparatus and methods for unmanned aerial vehicle servicing of modular device assembly

Particular embodiments described herein provide for modular device assemblies and methods for enabling maintenance and servicing, particularly by an unmanned aerial vehicle. A device assembly comprises a plurality of modules, each module having control circuitry, a communications port and contact points to couple the modules. ... Mcafee Llc

03/22/18 / #20180083983

Remote malware remediation

An opportunity to assist with remediation of a file at a remote particular host device is identified. One or more remediation techniques are identified that can be applied to assist with remediation of the file at the particular host device. ... Mcafee Llc

03/01/18 / #20180063091

Message protection

There is disclosed in an example a computing apparatus, comprising: a network interface; a messaging application to communicate via the network interface; and one or more logic elements comprising a security layer, discrete from the messaging application, to: generate a message; secure the message; and send the message via the messaging application.. . ... Mcafee Llc

02/15/18 / #20180048643

Trust establishment between a trusted execution environment and peripheral devices

Technologies are provided in embodiments to establish trust between a trusted execution environment (tee) and a peripheral device. Embodiments are configured to communicate with an attestation server to generate an encryption key, and to establish, using the encryption key, a secure connection with an authentication server to enable communication between the authentication server and the peripheral device. ... Mcafee Llc

02/08/18 / #20180041473

Device, system and method for defending a computer network

A device, system, and method for defending a computer network are described. Network communications are received by a traffic filter, which dynamically determines whether the communications include an anomaly (i.e., are “anomalous” communications), or whether the communications are normal, and do not include an anomaly. ... Mcafee Llc

01/25/18 / #20180026926

Graymail filtering-based on user preferences

A graymail detection and filtering system predicts whether a user will consider an email to be graymail using a classifier model based on features extracted from the email. The email is labelled as graymail or non-graymail based on the prediction. ... Mcafee Llc

01/25/18 / #20180025030

Context-aware reputation of a place

A mobile device including: a position locator; a user data engine; and a reputation engine client configured to: receive a location from the position locator; operate the user data engine to provide a user profile, intent, and context data for a user, the context data including dynamic factors about the user, and the profile including relative factors about the user that are relatively static with respect to the context data from the user data engine; and determine a reputation for the location, wherein the reputation is based at least in part on a combination of the user profile, intent, and context.. . ... Mcafee Llc

01/18/18 / #20180018476

Data verification using enclave attestation

Particular embodiments described herein provide for an electronic device that can be configured to receive untrusted input data at an enclave in an electronic device, isolate the untrusted input data from at least a portion of the enclave, communicate at least a portion of the untrusted data to an integrity verification module using an attestation channel, and receive data integrity verification of the untrusted input data from the integrity verification module. The integrity verification module can perform data integrity attestation functions to verify the untrusted data and the data integrity attestation functions include a data attestation policy and a whitelist.. ... Mcafee Llc

01/18/18 / #20180018458

Mitigation of ransomware

Particular embodiments described herein provide for an electronic device that can be configured to allow for the mitigation of ransomware. For example, the system can determine that an application begins to execute, determine that the application attempts to modify a file, determine a file type for the file, and create a security event if the application is not authorized to modify the file type. ... Mcafee Llc

01/04/18 / #20180007175

Cloud assisted behavioral automated testing

A computer readable storage medium, system and method for improving automated testing systems to include a first and second behavioral data. The first behavioral data is collected periodically and the second behavioral data is collected in real time. ... Mcafee Llc

01/04/18 / #20180007070

String similarity score

Particular embodiments described herein provide for an electronic device that can be configured to acquire a string, convert the string to an image, compare the image of the string to an image of a test string, and determine a similarity score. The similarity score provides an indication as to how visually similar the string is to the test string. ... Mcafee Llc

01/04/18 / #20180007069

Ransomware protection for cloud file storage

A cloud storage server-based approach allows detection of ransomware activity in cloud storage systems caused by ransomware infections on an endpoint device. A heuristic or rule-based technique is employed for recognizing sequences of file operations that may indicate ransomware activity. ... Mcafee Llc

01/04/18 / #20180007068

System and method to detect bypass of a sandbox application

Particular embodiments described herein provide for an electronic device that can be configured to receive data related to execution of a sandboxed process, determine if a high privileged process was created by the sandboxed process, and block the sandboxed process from executing if the high privileged process was created by the sandboxed process and the data indicates the sandboxed process is attempting a sandbox bypass attack. In an example, the high privileged process was created by the sandboxed process if a resource folder is associated with a sandbox folder. ... Mcafee Llc

01/04/18 / #20180007061

Cloud email message scanning with local policy application in a network environment

A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. ... Mcafee Llc

01/04/18 / #20180004951

System and method to mitigate malicious calls

Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to receive a function call, determine the location of a memory page that initiated the function call, determine if the memory page is associated with a trusted module, and block the function call if the memory page is not associated with the trusted module. ... Mcafee Llc

01/04/18 / #20180004584

Method and processes for securely autofilling data fields in a software application

The present invention gives the methods and processes for automatically servicing user driven requests to find place-holder fields, fill them in with relevant data in a secure manner and securely communicating the data related thereto to the appropriate android™ device and/or application. More particularly, it relates to the methods and processes for authenticated users to automatically obtain and use the correct filled-in data that allows them to access or use any of a multiple number of android™ applications and/or services at any time.. ... Mcafee Llc

12/28/17 / #20170374064

System and method for protecting specified data combinations

A method in one example implementation includes extracting a plurality of data elements from a record of a data file, tokenizing the data elements into tokens, and storing the tokens in a first tuple of a registration list. The method further includes selecting one of the tokens as a token key for the first tuple, where the token is selected because it occurs less frequently in the registration list than each of the other tokens in the first tuple. ... Mcafee Llc

12/28/17 / #20170374030

System and method for redirected firewall discovery in a network environment

A method is provided in one example embodiment that includes receiving metadata from a host over a metadata channel. The metadata may be correlated with a network flow and a network policy may be applied to the connection. ... Mcafee Llc

12/28/17 / #20170370713

Array of interconnected sensors

In an example, there is disclosed an apparatus, having a geometry detector; an ambient environment sensor to detect an ambient environment variable; a network interface; and one or more logic elements, including at least one hardware logic element, providing a data engine to: identify a neighbor apparatus via the geometry detector; build an individual positional profile based at least in part on the identifying; and report the ambient environment variable.. . ... Mcafee Llc

12/21/17 / #20170366560

Server-assisted anti-malware client

A host-based antimalware client can interface with a server-based antimalware support server. A file is identified at a host device. ... Mcafee Llc

12/07/17 / #20170351862

Trusted updates

In an example, a system and method are described for providing trusted updaters and trusted processes. An updater may be subject to a whitelist of files that it, and any child processes, are allowed to modify. ... Mcafee Llc

11/30/17 / #20170346799

Protecting user identity by sharing a secret between personal iot devices

A wearable device provides protection for personal identity information by fragmenting a key needed to release the personal identity information among members of a body area network of wearable devices. A shared secret algorithm is used to allow unlocking the personal identity information with fragmental keys from less than all of the wearable devices in the body area network. ... Mcafee Llc

11/09/17 / #20170323152

Systems and methods for real-time user verification in online education

Systems and methods for real-time user verification in online education are disclosed. In certain example embodiments, user identifying information associated with a user and a request to access online education content may be received from a user device. ... Mcafee Llc

10/12/17 / #20170293758

Computing platform security methods and apparatus

Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.. ... Mcafee Llc

10/05/17 / #20170289343

Device lock while in motion

In an example, a mobile device is configured to automatically lock when a detector, such as a gps receiver, determines that the device is in motion above a certain speed threshold, such as 10 mph. Additional detectors may be used to determine whether the device is operated by the user or by a passenger, so that intelligent decisions can be made about whether to lock the device. ... Mcafee Llc

10/05/17 / #20170289183

Iot and pos anti-malware strategy

Providing security to a device includes detecting, in a first device, a first function call, determining whether the first function call is forbidden for the first device, and in response to determining that the particular function is forbidden for the first device, preventing the function call from executing.. . ... Mcafee Llc

10/05/17 / #20170286679

System, apparatus and method for performing secure memory training and management in a trusted environment

In one embodiment, a system includes: a processor; a security processor to execute in a trusted executed environment (tee), the security processor to execute memory reference code (mrc) stored in a secure storage of the tee to train a memory coupled to the processor; and the memory coupled to the processor. Other embodiments are described and claimed.. ... Mcafee Llc

10/05/17 / #20170286521

Content classification

Particular embodiments described herein provide for an electronic device that can be configured to analyze data to determine one or more unique topics for a first class and one or more common topics that are common with the first class and a second class, where the topics that are common with the first class and the second class include one or more subtopics, assign one or more classifications to the data based, at least in part, on the one or more subtopics, and store the one or more classifications assigned to the data in memory. The one or more unique topics and one or more common topics can be determined by using a jaccard index. ... Mcafee Llc

10/05/17 / #20170286172

Computing platform security methods and apparatus

Computing platform security methods and apparatus are disclosed. An example apparatus includes a security application to configure a security task, the security task to detect a malicious element on a computing platform, the computing platform including a central processing unit and a graphics processing unit; and an offloader to determine whether the central processing unit or the graphics processing unit is to execute the security task; and when the graphics processing unit is to execute the security task, offload the security task to the graphics processing unit for execution.. ... Mcafee Llc

09/21/17 / #20170270298

System and method to mitigate malware

Particular embodiments described herein provide for an electronic device that can be configured to receive script data, determine a checksum tree for the script data, compare each checksum of the checksum tree to one or more subtree checksums, and assign one or more classifications to the script data. In one example, the checksum tree is an abstract syntax tree.. ... Mcafee Llc

09/14/17 / #20170264622

Providing a virtual security appliance architecture to a virtual cloud infrastructure

A method in an embodiment includes detecting a change for a virtual machine in a virtual server of a virtual network infrastructure, determining whether a virtual security appliance is configured in the virtual server, and sending a request to create the virtual security appliance in the virtual server. The method further includes allowing the virtual machine to initiate when the virtual security appliance is created in the virtual machine. ... Mcafee Llc

09/07/17 / #20170255776

Discovery of malicious strings

Particular embodiments described herein provide for an electronic device that can be configured to determine a string sample of data, determine a hash of the string sample of data, automatically cluster the hash with other hashes from other string samples of data, and automatically create a signature hash string for the string sample of data.. . ... Mcafee Llc

08/10/17 / #20170230181

Trusted indicators to secure visual outputs

Providing secure graphics outputs by performing at least the following: receive secure output data corresponding to a digital image, obtain one or more security keys, create a secure output marker for the secure output data, wherein the secure output marker comprises location information corresponding to a trusted output area of the digital image and data information that represents data content found within the trusted output area of the digital image, encrypt the secure output marker using the one or more security keys, embed the secure output marker within the graphics image to create a trusted graphics image; and render the trusted graphics image for exposure onto the display device.. . ... Mcafee Llc

08/03/17 / #20170222980

Beacon cloud reputation service

A technique for determining the safety of the content of beacon transmissions. A user device extracts beacon identification information from a beacon transmission. ... Mcafee Llc

07/27/17 / #20170213035

Bootstrap os protection and recovery

A method, system, and computer program product for protecting a computer system provides bootstrap operating system detection and recovery and provides the capability to detect malware, such as rootkits, before the operating system has been loaded and provides the capability to patch malfunctions that block the ability of the computer system to access the internet. A method for protecting a computer system includes reading stored status information indicating whether network connectivity was available the last time an operating system of the computer system was operational, when the stored status information indicates that network connectivity was not available, obtaining a software patch, and executing and applying the software patch.. ... Mcafee Llc

07/06/17 / #20170195865

Personal safety and emergency services

A safety event is determined as affecting a user based at least in part context data collected at a user device associated with the user. In some aspects, context data is detected from sensors on the client device, the context data describing a present context of the user. ... Mcafee Llc

06/29/17 / #20170187799

Protected data collection in a multi-node network

Particular embodiments described herein provide for an electronic device that can be configured to receive a broadcast query from a network element, receive information from a plurality of devices, process the information, and generate an integrated group response, wherein the integrated group response summarizes the information about the plurality of devices and removes identification information that could allow data to be linked to a specific device from the plurality of devices. The integrated group response can be communicated back to the network element in response to the query.. ... Mcafee Llc

06/29/17 / #20170187746

Safer password manager, trusted service, and anti-phishing process

Preventing anomalous connections includes detecting by a programmable device an attempt by a first device to connect to a second device, detecting a first connection anomaly responsive to characteristics of the first device and characteristics of one or more other devices, and prohibiting a connection between the first device and the second device responsive to detecting the first connection anomaly.. . ... Mcafee Llc

06/29/17 / #20170187690

Mitigating bot scans of sensitive communications

Particular embodiments described herein provide for an electronic device that can be configured to receive a message, determine that at least a portion of the message includes sensitive data, obfuscate the portion of the message that includes sensitive data, and communicate the message to an electronic device, where the obfuscated portion of the message can be recognized and understood by a recipient associated with the electronic device. In an example, the obfuscated portion of the message can be recognized and understood by a user without the need of special software or hardware but cannot be readily analyzed by a text parsing bot. ... Mcafee Llc

06/29/17 / #20170187525

Hardware-generated dynamic identifier

In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (hgdi). There is also disclosed a method of providing an hgdi engine, and one or more computer-readable mediums having stored thereon executable instructions for providing an hgdi.. ... Mcafee Llc

06/29/17 / #20170185789

Method and apparatus for hardware based file/document expiry timer enforcement

A technique for secure network storage includes generating, by a trusted execution environment in a first device, an encryption key and a certificate for a document, wherein the certificate comprises expiry information for the document and the encryption key, encrypting, by a general execution environment in the first device, the document with the encryption key, transmitting the encryption key to a remote key manager, and transmitting the document to a remote network storage device, wherein a second device is allowed to decrypt the document based on the expiry information.. . ... Mcafee Llc

06/29/17 / #20170185778

Executing full logical paths for malware detection

Embodiments include identifying, at a logical path node, a first logical path and a second logical path; executing, by a processor implemented at least partially in hardware, a first set of instructions to follow the first logical path; storing, in a memory, a first set of information obtained from following the first logical path; evaluating, by a malware handler module implemented at least partially in hardware, the first set of information for malware; restoring, from the memory, environmental data for the first logical path node; executing, by the processor, a second set of instructions to follow the second logical path; storing, in a memory, a second set of information obtained from following the second logical path; and evaluating, by the malware handler module, the second set of information for malware.. . ... Mcafee Llc

06/29/17 / #20170185777

Hardware assisted branch transfer self-check mechanism

Embodiments of the present disclosure are directed to a self-check application to determine whether an indirect branch execution is permissible for an executable application. The self-check application uses one or more parameters received from an execution profiling module to determine whether the indirect branch execution is permitted by one or more self-check policies.. ... Mcafee Llc

06/29/17 / #20170185774

Monitoring executed script for zero-day attack of malware

Embodiments are directed to hooking a call for a malware monitoring logic into a javascript api engine interpreter. Upon javascript being placed into heap memory, the malware monitoring logic can initiate an evaluation or analysis of the heap spray to determine whether the javascript includes malware or other malicious agents prior to execution of the javascript shell code. ... Mcafee Llc

06/29/17 / #20170185756

Secure license enforcement for expandable peripherals on iot ( sleepi) devices

Managing playback of a media file, including detecting, while a media file is playing, a trigger mechanism indicating a change in optimal play characteristics of the media file from an original format, wherein the playback of the media file is associated with a first license, in response to detecting the trigger mechanism, instructing a trusted execution environment to request an updated license from a content provider of the media file, and upon receiving a second license for the media file, the trusted execution environment enforces play of the media file using the second license for a second format. The second license allows for the play of the media file to continue at the optimal play characteristics.. ... Mcafee Llc

06/29/17 / #20170185667

Content classification

Particular embodiments described herein provide for an electronic device that can be configured to analyze data using an ensemble and assign a classification to the data based, at least in part, on the results of the analyses using the ensemble. The ensemble can include one or more multinomial classifiers and each multinomial classifier can assign two or more classifications to the data.. ... Mcafee Llc

06/29/17 / #20170185536

Detecting data corruption by control flow interceptions

Embodiments of this disclosure are directed to an execution profiling handler configured for intercepting an invocation of memory allocation library and observing memory allocation for an executable application process. The observed memory allocation can be used to update memory allocation meta-data for tracking purposes. ... Mcafee Llc

06/22/17 / #20170180391

Secure over-the-air updates

In an example, there is disclosed a computing apparatus having: a network interface to communicate with a second device; a contextual data interface to receive and store contextual data; and one or more logic elements comprising a contextual security agent, operable to: receive a contextual data packet via the network interface; compare the contextual data packet to stored contextual data; and act on the comparing. The contextual data packet may optionally be provided out of band, and may be used to authenticate a substantive data packet, such as a patch or update.. ... Mcafee Llc

06/22/17 / #20170180341

Simplified sensor integrity

An apparatus is provided that includes at least one processor device, an energy storage module to power the apparatus, memory to store a secret such that powering down and restarting the apparatus causes the secret to be lost, logic executable by the at least one processor device to generate attestation data using the secret that data abstracts the secret, and a communications interface to send the attestation data to another device.. . ... Mcafee Llc

06/22/17 / #20170180314

Attestation device custody transfer protocol

A custody transfer of a device can include sending a start of transfer request to an attestation device over a short range wireless communication channel, a nonce is received from the attestation device in association with the start of transfer request, and the nonce is signed at the particular gateway device. The signed nonce is sent to the attestation device, a transfer confirmation message is received from the attestation device, and a transfer message is sent to a management system to report a transfer in custody of the attestation device involving the particular gateway device and another gateway device.. ... Mcafee Llc

06/22/17 / #20170180237

Intelligent devices in a software-defined network

There is disclosed a network device having a network interface; and one or more logic elements comprising a flow table engine operable to: receive a network packet via the network interface; perform a logging action to make the network packet traceable; and notify a software-defined networking (sdn) controller of the logging action via the network interface. There is also disclosed an sdn controller having a network interface; first one or more logic elements comprising a software-defined networking (sdn) controller engine to provide sdn controller services; and second one or more logic elements comprising a route tracing engine, operable to: receive a logging action for a network packet from a network device via the network interface; and update a logging table from the logging action. ... Mcafee Llc

06/22/17 / #20170180234

Identifying a source device in a software-defined network

In an example, there is disclosed a computing apparatus, having: a network interface to communicatively couple to a software-defined network (sdn); first one or more logic elements providing an sdn controller engine to provide a control function for the sdn; and second one or more logic elements providing a route tracing engine to: receive a tunneling notification from a network device agent, the tunneling notification associated with a network flow; and perform a backtracking traceroute operation to deterministically identify a source device for the flow. There is also disclosed a method of providing the foregoing, and one or more tangible, non-transitory computer-readable storage mediums for providing the foregoing.. ... Mcafee Llc

06/22/17 / #20170180191

Security content over a management band

There is disclosed in one example, a computing apparatus, having: first one or more logic elements comprising at least a processor and a memory to provide an operational environment; and second one or more logic elements providing an out-of-band management engine to function independently of the operational environment, and to: provide an out-of-band communication driver; determine that the operational environment has encountered an error that inhibits network communication; receive security content from a server via the out-of-band communication driver into a third-party storage area; and apply the security content to the computing apparatus. There is also disclosed a method of providing an out-of-band management engine, and one or more tangible, non-transitory computer-readable storage mediums having stored instructions for providing an out-of-band management engine.. ... Mcafee Llc

06/22/17 / #20170177884

Verified social media content

In an example, there is disclosed a computing apparatus, comprising: a psychological state data interface to receive psychological state data; one or more logic elements, including at least one hardware element, comprising a verification engine to: receive a requested user action; receive a psychological state input via the psychological state data interface; analyze the psychological state input; and bar the requested user action at least partly responsive to the analyzing.. . ... Mcafee Llc

06/22/17 / #20170177417

Trusted computing resource meter

In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (tcm) agent to: receive an external workload; provision a workload enclave; execute the external workload within the tcm enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a tcm agent, and a method of providing a tcm agent.. ... Mcafee Llc

06/08/17 / #20170163620

Methods and apparatus to enhance security of authentication

A system is disclosed that includes a processor including watermark logic to output a first watermark to an output device that outputs a first watermark signal, based on the first watermark, to an acoustic transmission medium. The processor also includes recording logic to capture, at a first time period, an authentication submission comprising the first watermark signal convolved, via the acoustic transmission medium, with a first passphrase signal. ... Mcafee Llc

06/08/17 / #20170163616

System, apparatus and method for providing privacy preserving interaction with a computing system

In one embodiment, a system including one or more hardware processors is: to receive a user request to access a website; sign a nonce with at least some of the plurality of group private keys, the at least some of the plurality of group private keys corresponding to personalization attributes of the website; and send the signed nonce to a web server to enable personalized interaction with the web server. Other embodiments are described and claimed.. ... Mcafee Llc

05/18/17 / #20170140168

Execution environment file inventory

A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine whether the container is executable in at least one of a plurality of execution environments characterizing the computer system. ... Mcafee Llc

05/11/17 / #20170134957

System and method for correlating network information with subscriber information in a mobile network environment

A method is provided in one example embodiment and includes receiving information for network traffic in a wireless network; correlating the information with a subscriber of a plurality of subscribers; and generating a behavior profile for the subscriber based on the information over a period of time.. . ... Mcafee Llc

05/11/17 / #20170134436

System and method for preventing data loss using virtual machine wrapped applications

A method in one example implementation includes selecting at least one criterion for controlling data transmission from within a virtual machine. At least one application is included within the virtual machine, which includes a policy module. ... Mcafee Llc

05/11/17 / #20170134419

Zero day threat detection using host application/program to user agent mapping

A technique allows associating host applications and user agents in network traffic and detecting possible malware without relying on signatures of the user agents. A database of host applications and user agents is maintained, allowing automatic update of the database when a new application or new application to user agent mapping is discovered. ... Mcafee Llc

05/04/17 / #20170126720

Implicit crowdsourcing for untracked correction or verification of categorization information

Embodiments of the present disclosure are directed to updating categorization of online content. An analytics engine implemented at least partially in hardware can receive an engagement indicator across a network interface; identify a type of the engagement indicator, the type of the engagement indicator comprising one of a positive engagement indicator or a negative engagement indicator; and update the reputation data stored in memory based on the type of the engagement indicator. ... Mcafee Llc

05/04/17 / #20170126653

Techniques for identification of location of relevant fields in a credential-seeking web page

Techniques allow identification of credential fields in a credential form on a web page that can be stored in a credential manager database to allow a credential manager application to fill the credential fields with saved credentials managed by the credential manager.. . ... Mcafee Llc

05/04/17 / #20170126502

Establishing nodes for global routing manager

Embodiments of the present disclosure include an orchestrator to commission a point of presence (pop) node based on receiving an internet protocol (ip) address, the ip address associated with a geographic location; and a global routing manager for assigning a client device to a pop node based on the received ip address. Embodiments also include a performance manager to acquire performance information about each pop node.. ... Mcafee Llc

05/04/17 / #20170126413

System and method for an endpoint hardware assisted network firewall in a security environment

A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic flow to a server. ... Mcafee Llc

05/04/17 / #20170125014

Trusted speech transcription

Embodiments include a system, method, and apparatus for creating a trusted speech transcription. Transcription logic can receive a signal of audible speech from an audio source and convert the audible speech signal into text. ... Mcafee Llc

05/04/17 / #20170124325

Decision forest compilation

Embodiments of the present disclosure include methods, devices, and computer program products for detecting malware in a file. Embodiments include identifying a plurality of features of the file, categorizing each of the plurality of features to define a plurality of categories of features, building a first decision tree based on a first category from the plurality of categories, the first category comprising a first set of features of the file, and building a second decision tree based on a second category from the plurality of categories, the second decision tree comprising a second set of features of the file, the second set different from the first set. ... Mcafee Llc

04/27/17 / #20170118281

Dynamic sharding for state-based processing

Enabling a distributed data processing system to process a data set from local storage devices by dynamically reallocating portions of the data set.. . ... Mcafee Llc

04/27/17 / #20170118228

Agent assisted malicious application blocking in a network environment

Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. ... Mcafee Llc

04/27/17 / #20170116420

End-point visibility

A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a monitoring application comprising computer-executable instructions on the medium. The instructions are readable by the processor. ... Mcafee Llc

04/27/17 / #20170116418

Hardware heuristic-driven binary translation-based execution analysis for return-oriented programming malware detection

A combination of hardware monitoring and binary translation software allow detection of return-oriented programming (rop) exploits with low overhead and low false positive rates. Embodiments may use various forms of hardware to detect rop exploits and indicate the presence of an anomaly to a device driver, which may collect data and pass the indication of the anomaly to the binary translation software to instrument the application code and determine whether an rop exploit has been detected. ... Mcafee Llc

04/27/17 / #20170116416

Advanced threat protection cross-product security controller

A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. ... Mcafee Llc

04/20/17 / #20170111388

Centralized and automated recovery

A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a secured storage communicatively coupled to the client. The system further includes a client application including computer-executable instructions on the medium. ... Mcafee Llc

04/20/17 / #20170111333

System, apparatus and method for migrating a device having a platform group

In one embodiment, an apparatus comprises a processor to execute instructions and having at least a first logic to execute in a trusted execution environment, a secure storage to store a platform group credential, and a first logical device comprising at least one hardware logic. The platform group credential may be dynamically provisioned into the apparatus and corresponding to an enhanced privacy identifier associated with the apparatus. ... Mcafee Llc

04/13/17 / #20170105171

Multilayer access control for connected devices

A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules. ... Mcafee Llc

04/13/17 / #20170103225

Remote provisioning and authenticated writes to secure storage devices

A system for securing electronic devices includes a storage device including a storage device controller processor, at least one non-transitory machine readable storage medium in firmware of the storage device communicatively coupled to the storage device controller processor, and a monitor application comprising computer-executable instructions on the medium. The instructions are readable by the storage device controller processor. ... Mcafee Llc

03/30/17 / #20170093897

Application phenotyping

A collection of techniques is disclosed to allow for the detection of malware that leverages pattern recognition and machine learning to effectively provide “content-less” malware detection, i.e., detecting a process as being an ‘anomaly’ not based on its particular content, but instead based on comparisons of its behavior to known (and characterized) ‘trusted’ application behaviors, i.e., the trusted applications' “phenotypes” and/or the phenotypes of known malware applications. By analyzing the patterns of normal behavior performed by trusted applications as well as malware applications, one can build a set of sophisticated, content-agnostic behavioral models (i.e., “application phenotypes”)—and later compare the processes executed on a user device to the stored behavioral models to determine whether the actual measured behavior reflects a “good” application, or if it differs from the stored behavioral models to a sufficient degree and with a sufficient degree of confidence, thus indicating a potentially malicious application or behavior.. ... Mcafee Llc

03/30/17 / #20170093839

Algorithm hardening in background context and external from the browser to prevent malicious intervention with the browser

A technique for hardening the entry of user credentials in web sites is described. A headless web browser authenticates the user to a target web site with credentials previously stored in a secure database, and generates a session cookie. ... Mcafee Llc

03/30/17 / #20170093835

Automatic log-in and log-out of a session with session sharing`

A technique allows for transparently managing, suspending, restoring, sharing, limiting and migrating user sessions on a device without having access to user credentials. A user may automatically log in and out of each or all their online accounts instantaneously and, in doing so, the user may share sessions without sharing passwords across client devices as well as with other authenticated and authorized users. ... Mcafee Llc

03/30/17 / #20170093829

Cumulative authentication for step-up increased authentication factors

Techniques are disclosed for providing an authentication service that performs authentication of users on behalf of a relying party. The authentication service receives authentication requirements from the relying party and compares those requirements with authentication capabilities of the user and user equipment. ... Mcafee Llc

03/30/17 / #20170093805

Remote authentication and passwordless password reset

A passwordless reset technique includes actions to receive a request for a password reset, wherein the request password reset is initiated at a first device, determine that the first device is a trusted device, authenticate the user in order to obtain a cloud key from a network device, wherein the cloud key is associated with the first device, derive a key encryption key using the cloud key, decrypt a local storage key using the key encryption key, decrypt a local storage using the local storage key to obtain a content encryption key, obtain a new password via user input, re-encrypt the content encryption key, and transmit it to the network device, derive a new authentication token using the new password, and transmit the new authentication token to the network device.. . ... Mcafee Llc

03/30/17 / #20170093803

Secure service matching

In an example, there is disclosed a computing apparatus having one or more logic elements forming a non-encrypted flow processor engine; and one or more logic elements forming a service selection engine, wherein the one or more logic elements include a trusted execution environment (tee), and wherein the service selection engine is operable to; receive from the flow processor engine an encrypted payload; determine that the encrypted payload satisfies at least one selection criterion; and provide a notification of satisfaction to the flow engine. There is further disclosed a method of performing the operations disclosed, and one or more computer-readable mediums having stored thereon executable instructions to perform the method.. ... Mcafee Llc

03/30/17 / #20170093572

Systems and methods for utilizing hardware assisted protection for media content

This disclosure describes systems and methods related to utilizing hardware assisted protection for media content. In some embodiments, a provided method comprises: receiving, from a content server and by a computing device processor of a secure enclave of a device, first encrypted media content; decrypting, by the computing device processor, the first encrypted media content using a first decryption key; generating, by the computing device processor, a second decryption key; encrypting, by the computing device processor, the first decrypted media content using the second key, thereby resulting in second encrypted media content; and sending, by the computing device processor and to one or more graphical processing units (gpus) comprised in a graphics component of the device, the second encrypted media content and the second decryption key.. ... Mcafee Llc

03/30/17 / #20170091972

Geo-mapping system security events

A particular security event is identified that has been detected as targeting a particular computing device included in a particular computing system. A particular grouping of assets in a plurality of asset groupings within the particular computing system is identified as including the particular computing device. ... Mcafee Llc

03/30/17 / #20170091654

Multi-label classification for overlapping classes

In an example, there is disclosed a computing apparatus, including one or more logic elements comprising a classification engine operable to identify at least one overlapping class pair comprising at least two classes selected from a class group, wherein the overlapping class pair may be characterized by a substantial mutual false positive rate; and assign an object to at least one assigned class selected from the class group.. . ... Mcafee Llc

03/30/17 / #20170091467

Provable traceability

There is disclosed in an example, a computing apparatus, including: a trusted execution environment (tee); and one or more logic elements providing a collaboration engine within the tee, operable to: receive a change to a secured document via a trusted channel; apply a change to the secured document; log the change to a ledger; and display the document to a client device via a protected audio-video path (pavp). There is also disclosed a method of providing a collaboration engine, and a computer-readable medium having stored thereon executable instructions for providing a collaboration engine.. ... Mcafee Llc

03/30/17 / #20170091453

Enforcement of file characteristics

Particular embodiments described herein provide for an electronic device that can be configured to determine a file characteristic for a characteristic of a file, determine that the file has been modified to create a new file, determine a new characteristic for the characteristic of the new file, and create a security event if the new file characteristic does not match the file characteristic.. . ... Mcafee Llc

03/30/17 / #20170091452

Atomic detection and repair of kernel memory

A method for detecting memory modifications includes allocating a contiguous block of a memory of an electronic device, and loading instructions for detecting memory modifications into the contiguous block of memory. The electronic device includes a plurality of processing entities. ... Mcafee Llc

03/30/17 / #20170091444

Hardware-enforced code paths

There is disclosed in one example, a computing apparatus, including: first one or more logic elements providing a code module, the code module comprising a member having a branching policy designating either a public or private member; second one or more logic elements providing a policy engine, operable to: receive a first branch instruction to the member; determine that the branch instructions does not meet the policy; and take a security action. There is also disclosed a method of providing a policy engine, and a computer-readable medium having stored thereon executable instructions for providing a policy engine.. ... Mcafee Llc

03/30/17 / #20170091434

Secure communication between a virtual smartcard enclave and a trusted i/o enclave

A system for accessing a trusted execution environment includes instructions to transmit, from a first trusted execution environment, a request for a biometric match claim, receive, in response to the request for a biometric match claim, biometric data from a biometric capture device, perform a match of the biometric data against biometric templates stored in the first trusted execution environment, and unseal a second trusted execution environment based on the match data.. . ... Mcafee Llc

03/30/17 / #20170091290

Distributed data query

Performing content exploration includes obtaining an exploration script indicating page characteristics to explore and a definition of webpages to explore, locating doms required for exploration script based on the definition of webpages to explore, generating a queue of doms required for the exploration script, and distributing the doms in the queue of doms to a plurality of exploration devices. Each exploration device opens a dom from the queue of doms in a web browser, executes the exploration script on the opened dom to obtain dom data for the opened dom, and associates the generated dom data with the opened dom in a knowledge store.. ... Mcafee Llc

03/30/17 / #20170091163

Crowd-source as a backup to asynchronous identification of a type of form and relevant fields in a credential-seeking web page

A technique allows a credential manager application on a client computer system to identify fields and forms on a web page. An analysis server may automatically crawl web pages and identify the fields and form, then push the information to the client computer system for use by the credential manager. ... Mcafee Llc

03/30/17 / #20170090929

Hardware-assisted software verification and secure execution

In an example, there is disclosed a computing apparatus, including a processor operable to execute a plurality of instructions forming a program; and a verification engine, operable to: receive an execution control data (ecd) for the program; and monitor execution of only some instructions of the program to ensure that they are consistent with the ecd. In some embodiments, the monitoring engine may include a correctness monitoring unit (cmu) in processor hardware. ... Mcafee Llc

03/30/17 / #20170090821

User mode heap swapping

In an example, there is disclosed a computing apparatus, including a processor, including a trusted execution instruction set; a memory having an enclave portion, wherein the enclave is accessible only via the trusted execution instruction set; a swap file; and a memory management engine operable to: allocate a buffer within the enclave; receive a scope directive to indicate that the buffer is in scope; and protect the buffer from swapping to the swap file while the buffer is in scope. There is further disclosed an method of providing a memory management engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing the memory management engine.. ... Mcafee Llc

03/30/17 / #20170088142

Contextual scoring of automobile drivers

In an example, there is disclosed a computing apparatus, including: a driver identity detector to detect the identity of a driver; and one or more logic elements providing a driver competency engine, operable to: detect the identity of the driver; evaluate the driver's operation of a vehicle; and build a driver competency profile based at least in part on the evaluating. The driver competency engine may further be operable to detect a context of the operation, such as environmental factors. ... Mcafee Llc

03/23/17 / #20170085551

Multi-ring encryption approach to securing a payload using hardware modules

Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key derived from a password, such that each subsequent ring of protection is protected by a key derived from the key used to encrypt the previous ring of protection. ... Mcafee Llc

03/23/17 / #20170083510

Systems and methods for multi-path language translation

Systems, apparatus, computer-readable media, and methods to provide translation of words or phrases from an initial language to a target language using multiple pathways are disclosed. The multiple pathways may have independent or near independent errors and the use of multiple pathways may reduce the errors that may be encountered in semantic vector based language translation. ... Mcafee Llc

03/23/17 / #20170083508

Systems and methods for multilingual document filtering

Systems, apparatus, computer-readable media, and methods to provide filtering and/or search based at least in part on semantic representations of words in a document subject to the filtering and/or search are disclosed. Furthermore key words for conducting the filtering and/or search, such as taboo words and/or search terms, may be semantically compared to the semantic representation of the words in the document. ... Mcafee Llc

03/02/17 / #20170063815

Sentinel appliance in an internet of things realm

In an example, there is disclosed a computing apparatus, comprising: a trusted execution environment (tee); and a security engine operable to: identify a key negotiation for an encrypted connection between a first device and a second device; request a service appliance key for the key negotiation; receive the service appliance key; and perform a service appliance function on traffic between the first device and the second device. There is also disclosed a method of providing the security engine, and a computer-readable medium having stored thereon executable instructions for providing the security engine.. ... Mcafee Llc

03/02/17 / #20170063750

Contextual privacy engine for notifications

In an example, there is disclosed a computing apparatus, including a user notification interface; a context interface; and one or more logic elements forming a contextual privacy engine operable to: receive a notification; receive a context via the context interface; apply the context to the notification via a notification rule; and take an action via the user notification interface based at least in part on the applying. The contextual privacy engine may also be operable to mathematically incorporate user feedback into the notification rule. ... Mcafee Llc

03/02/17 / #20170061164

Two-device scrambled display

In an example, there is disclosed a system and method for a two-device scrambled display. A first device displays content in a scrambled form. ... Mcafee Llc

03/02/17 / #20170061125

System and method for statistical analysis of comparative entropy

In accordance with one embodiment of the present disclosure, a method for determining the similarity between a first data set and a second data set is provided. The method includes performing an entropy analysis on the first and second data sets to produce a first entropy result, wherein the first data set comprises data representative of a first one or more computer files of known content and the second data set comprises data representative of a one or more computer files of unknown content; analyzing the first entropy result; and if the first entropy result is within a predetermined threshold, identifying the second data set as substantially related to the first data set.. ... Mcafee Llc

03/02/17 / #20170057634

Location verification and secure no-fly logic for unmanned aerial vehicles

Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as “drones”). In some embodiments, an unmanned aerial vehicle engaged in autonomous flight may determine its location using a satellite-based navigation system. ... Mcafee Llc

02/23/17 / #20170054738

Data mining algorithms adopted for trusted execution environment

Distributed systems for protecting networked computer assets from compromise are disclosed. The distributed system includes one or more enterprise event sources, such as endpoint(s). ... Mcafee Llc

02/16/17 / #20170046511

Mitigation of malware

Systems and methods are provided in example embodiments for mitigating malicious calls. The system can be configured to determine a series of checksums for a file, compare the series of checksums to a checksum tree, where the checksum tree includes a plurality of nodes that each include a fuzzy checksum of known malware, and assign one or more classifications to the file, where each of the one or more classifications is based on each node of the checksum tree that matches a checksum in the series of checksums and includes whether the file includes malware or benign checksums.. ... Mcafee Llc

02/16/17 / #20170046196

Real-time code and data protection via cpu transactional memory suppport

A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking includes creating output code, identifying read-only memory regions in the output code and creating a map that is provided to a security monitoring thread. ... Mcafee Llc

02/09/17 / #20170041330

Systems and methods for phishing and brand protection

This disclosure describes systems, methods, and computer-readable media related to phishing and brand protection via copycat detection. In some embodiments, a temporary page profile associated with a webpage may be generated. ... Mcafee Llc

02/09/17 / #20170039368

Trusted execution of an executable object on a local device

In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device.. ... Mcafee Llc

02/02/17 / #20170034188

Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation

A method for detecting malware includes the steps of identifying a one or more open network connections of an electronic device, associating one or more executable objects on the electronic device with the one or more open network connections of the electronic device, determining the address of a first network destination that is connected to the open network connections of the electronic device, receiving an evaluation of the first network destination, and identifying one or more of the executable objects as malware executable objects. The evaluation includes an indication that the first network destination is associated with malware. ... Mcafee Llc

02/02/17 / #20170034128

System, method, and computer program for preventing infections from spreading in a network environment using dynamic application of a firewall policy

A method for containing a threat in network environment using dynamic firewall policies is provided. In one example embodiment, the method can include detecting a threat originating from a first node having a source address in a network, applying a local firewall policy to block connections with the source address, and broadcasting an alert to a second node in the network. ... Mcafee Llc

02/02/17 / #20170032670

Systems and methods for traffic control

Systems and methods for real-time emergency vehicle authentication at traffic signal and tollgates are disclosed. In certain example embodiments, a dispatch server can provide identifying credentials and time-bounded intersection tickets (tbit) to traffic signals and tollgates for conducting authentication of emergency vehicles. ... Mcafee Llc

02/02/17 / #20170032122

Segregating executable files exhibiting network activity

An executable file is loaded into memory. The executable file is analyzed to determine whether one or more dynamically linked libraries are referenced in an import table of the file. ... Mcafee Llc

01/26/17 / #20170024565

System, method, and computer program product for mounting an image of a computer system in a pre-boot environment for validating the computer system

A system, method, and computer program product are provided for controlling loading of an operating system, including mounting an image of an operating system in a pre-boot environment of a programmable device, identifying an untrusted component of the operating system registered to be automatically loaded or loaded during a boot-up stage of the operating system that is predetermined to be early, and substituting a trusted component for the untrusted component.. . ... Mcafee Llc

01/19/17 / #20170019427

Enabling dynamic authentication with different protocols on the same port for a switch

The invention enables a client device that does not support ieee 802.1x authentication to access at least some resources provided through a switch that supports 802.1x authentication by using dynamic authentication with different protocols. When the client device attempts to join a network, the switch monitors for an 802.1x authentication message from the client device. ... Mcafee Llc

01/05/17 / #20170006049

Frequency-based reputation

In an example embodiment, there is disclosed an anti-malware system and method that analyzes applications and other executable objects at the subroutine level. Each subroutine may be assigned an execution frequency score, which may be based on simulated execution in an insulated environment, on real-world operating conditions, or on static analysis. ... Mcafee Llc

01/05/17 / #20170006033

Security service for an unmanaged device

Particular embodiments described herein provide for a network element that can be configured to receive, from an electronic device, a request to access a network service. In response to the request, the network element can send data related to the network service to the electronic device and add a test link to the data related to the network service. ... Mcafee Llc

01/05/17 / #20170005961

Just-in-time, email embedded url reputation determination

A system allows just-in-time checking of information about an email in which a hyperlink is embedded. Upon receipt of the email containing the hyperlink, the resource locator of the hyperlink is modified to allow checking the reputation of the email upon traversal of the hyperlink. ... Mcafee Llc

01/05/17 / #20170005871

Goal-driven provisioning in iot systems

Techniques are disclosed for provisioning internet of things (iot) devices in accordance with a state machine model. More particularly, collections of iot devices may be organized into enclaves, groups or “shoals” that operate as autonomous or semi-autonomous groups of devices functioning as a collective having a common objective or mission. ... Mcafee Llc

01/05/17 / #20170004308

Generic unpacking of applications for malware detection

A technique for detecting malware in an executable allows unpacking of a packed executable before determining whether the executable is malware. In systems with hardware assisted virtualization, hardware virtualization features may be used to iteratively unpack a packed executable in a controlled manner without needing knowledge of a packing technique. ... Mcafee Llc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Mcafee Llc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Mcafee Llc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###