Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
McAfee, Inc. Patents
Assignee:
McAfee, Inc.
Address:
Santa Clara, CA
No. of patents:
401
Patents:


1 2 3 4 5 6 7 8 9










Patent Number Title Of Patent Date Issued
D693845 Computer having graphical user interface November 19, 2013
D692912 Computer having graphical user interface November 5, 2013
D692911 Computer having graphical user interface November 5, 2013
D692454 Computer having graphical user interface October 29, 2013
D692453 Computer having graphical user interface October 29, 2013
D692452 Computer having graphical user interface October 29, 2013
D692451 Computer having graphical user interface October 29, 2013
8590041 Application sandboxing using a dynamic optimization framework November 19, 2013
A method for preventing malware attacks may include rewriting instructions that are intercepted from an application launched on an electronic device. The instructions are determined to have attempted to access a sensitive system resource. The rewritten instructions are executed on th
8590039 System, method and computer program product for sending information extracted from a potentially November 19, 2013
A system, method and computer program product are provided for sending information extracted from a potentially unwanted data sample to generate a signature. In use, information is extracted from a portion of a sample of potentially unwanted data. Further, the information is sent to
8590002 System, method and computer program product for maintaining a confidentiality of data on a netwo November 19, 2013
A data processing system, method and computer program product are provided. In use, data on a network is identified. In addition, a policy is identified. Further, the data is processed based on the policy for maintaining a confidentiality of the data.
8589503 Prioritizing network traffic November 19, 2013
Methods and systems for operation upon one or more data processors for prioritizing transmission of communications associated with an entity based upon reputation information associated with the entity.
8584195 Identities correlation infrastructure for passive network monitoring November 12, 2013
User names and user groups serve as the basis of a formal policy in a network. A passive monitor examines network traffic in near real time and indicates: which network traffic is flowing on the network as before; which users or user groups were logged into workstations initiating this
8583792 Probe election in failover configuration November 12, 2013
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating probing responsibilities between a primary sensor and a secondary sensor. In one aspect, a method includes determining a first probe type, the first probe type being the prob
8578480 Systems and methods for identifying potentially malicious messages November 5, 2013
Computer-implemented systems and methods for identifying illegitimate messaging activity on a system using a network of sensors.
8578142 System and method for shared data storage November 5, 2013
Systems and methods for sharing data storage on an electronic device are disclosed. A system may include a memory and a processor, an operating system executing on the electronic device, a preboot application executing on the electronic device, and a virtual drive. The operating syst
8578051 Reputation based load balancing November 5, 2013
Methods and systems for operation upon one or more data processors for efficiently processing communications based upon reputation of an entity associated with the communication.
8577968 Method and system for handling unwanted email messages November 5, 2013
A method, system, and computer program product for scanning incoming emails reduces the server resources needed, which improves server throughput and reduces costs. A method for processing incoming email messages comprised the steps of scanning incoming email messages to obtain an ad
8572745 System, method, and computer program product for selecting a wireless network based on security October 29, 2013
A system, method, and computer program product are provided for selecting a wireless network based on security information. In use, a plurality of wireless networks is identified. Further, security information associated with each of the wireless networks is collected, such that one of t
8572732 System, method, and computer program product for enabling communication between security systems October 29, 2013
A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication
8572729 System, method and computer program product for interception of user mode code execution and red October 29, 2013
A system, method and computer program product are provided. In use, code is executed in user mode. Further, the execution of the code is intercepted. In response to the interception, operations are performed in kernel mode.
8572676 System, method, and device for mediating connections between policy source servers, corporate re October 29, 2013
The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The
8572014 Pattern recognition using transition table templates October 29, 2013
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for using transition table templates. In one aspect, a method includes receiving a transition table for a current state of a finite automaton and determining whether the transition table f
8566942 System, method, and computer program product for tracking the migration of objects to determine October 22, 2013
A system, method, and computer program product are provided for tracking the migration of objects to determine whether to perform a network based check. In operation, an object is identified. Furthermore, a first security niche associated with the object is determined. Additionally, it
8566726 Indicating website reputations based on website handling of personal information October 22, 2013
An aspect of the present invention relates to the methods and systems involved in receiving an indicator of an attempt by a user to interact with a website and presenting indicia of the website's reputation to the user, the reputation may be at least in part based on information about
8565726 System, method and device for mediating connections between policy source servers, corporate rep October 22, 2013
The invention relates to providing policy from an integrated policy server to a mobile device, comprising identifying a policy in an integrated policy server applicable to the mobile device and supplying policy elements to policy transports for transmission to the mobile device. The
8301904 System, method, and computer program product for automatically identifying potentially unwanted October 30, 2012
A system, method, and computer program product are provided for automatically identifying potentially unwanted data as unwanted. In use, data determined to be potentially unwanted (e.g. potentially malicious) is received. Additionally, the data is automatically identified as unwanted
8301767 System, method and computer program product for controlling network communications based on poli October 30, 2012
A policy management system, method and computer program product are provided. In use, information is received over a network relating to at least one subset of computers that are at least potentially out of compliance with a policy. Further, such information is sent to a plurality of
8301727 System, method, and computer program product for receiving security content utilizing a serial o October 30, 2012
A system, method, and computer program product are provided for receiving security content utilizing a serial over LAN connection. In use, an unsuccessful attempt to connect to a network for accessing security content at a remote second device is indicated by a first device, where th
8301635 Tag data structure for maintaining relational data over captured objects October 30, 2012
Objects captured over a network by a capture system can be indexed to provide enhanced search and content analysis capabilities. In one embodiment the objects can be indexed using a data structure having a source address field to indicate an origination address of the object, a desti
8296664 System, method, and computer program product for presenting an indicia of risk associated with s October 23, 2012
A system, method, and computer program product comprise presenting a plurality of search results within a graphical user interface. Further, an indicia of risk associated with the search results is presented, in real-time, within the graphical user interface.
8291505 Detecting computer data containing compressed video data as banned computer data October 16, 2012
Computer data containing compressed video data is examined to see if it is banned computer data, for example containing pirate or copyright-infringing video material, by examining the identifier of the video codec associated with the compressed video data. Certain video codec identif
8291494 System, method, and computer program product for detecting unwanted activity associated with an October 16, 2012
A system, method, and computer program product are provided for detecting unwanted activity associated with an object, based on an attribute associated with the object. In use, an object is labeled with an attribute of a predetermined behavior based on detection of the predetermined
8291493 Windows registry modification verification October 16, 2012
A method and system is provided by which unauthorized changes to the registry may be detected and that provides the capability to verify whether registry, or other system configuration data, changes that occur on a computer system are undesirable or related to possible malware attack
8290763 Emulation system, method, and computer program product for passing system calls to an operating October 16, 2012
An emulation system, method, and computer program product are provided for passing system calls to an operating system for direct execution. In operation, a file is loaded into memory and instructions associated with the loaded file are emulated. Furthermore, system calls resulting from
8289854 System, method, and computer program product for analyzing a protocol utilizing a state machine October 16, 2012
A system, method, and computer program product are provided for analyzing a protocol utilizing a state machine, based on a token determined utilizing another state machine. In use, a state of a protocol used within a data stream is identified. Additionally, at least one taken capable
8286248 System and method of web application discovery via capture and analysis of HTTP requests for ext October 9, 2012
A method for discovering the structure, state transitions, and patterns of behavior of users of a web application includes a method for causing the web application to make HTTP requests for resources from an external supplier; capture of the requests for the external resources; extractio
8285958 System, method, and computer program product for copying a modified page table entry to a transl October 9, 2012
A system, method, and computer program product are provided for copying a modified page table entry to a translation look aside buffer. In use, a page table entry corresponding to an original page associated with original code is identified. In addition, a page mapping in a translation
8281405 System, method, and computer program product for securing data on a server based on a heuristic October 2, 2012
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is
8281393 Method and system for detecting windows rootkit that modifies the kernel mode system service dis October 2, 2012
A method, system, and computer program product for detecting a kernel-mode rootkit that hooks the System Service Dispatch Table (SSDT) is secure, avoids false positives, and does not disable security applications. A method for detecting a rootkit comprises the steps of calling a func
8271794 Verifying captured objects before presentation September 18, 2012
Objects can be extracted from data flows captured by a capture device. Each captured object can then be classified according to content. Meta-data about captured objects can be stored in a tag. In one embodiment, the present invention includes receiving a request to present a previou
8271642 System, method, and computer program product for isolating a device associated with at least pot September 18, 2012
A system, method, and computer program product are provided for isolating a device associated with at least potential data leakage activity, based on user input. In operation, at least potential data leakage activity associated with a device is identified. Furthermore, at least one actio
8266703 System, method and computer program product for improving computer network intrusion detection b September 11, 2012
A system, method and computer program product are provided for prioritized network security. Initially, a risk assessment scan is conducted for identifying vulnerabilities on a network device. Next, network communications are identified that exploit the vulnerabilities identified by
8266693 System, method, and computer program product for identifying unwanted data communicated via a se September 11, 2012
A system, method, and computer program product are provided for identifying unwanted data communicated via a session initiation protocol. In use, packets associated with an electronic message communicated over a network utilizing a session initiation protocol are identified. Addition
8264976 Network monitoring based on pointer information September 11, 2012
A computer system and method for identifying and extracting content from data traffic, the system including: a capture driver arranged to monitor data traffic and to copy data packets from the traffic to a buffer without disrupting the traffic flow, and to generate pointer information
8261093 System, method, and computer program product for disabling a communication channel during authen September 4, 2012
A system, method, and computer program product are provided for disabling a communication channel during authentication. In operation, an authentication request for an authentication event is detected. Furthermore, a communication channel is disabled, in response to the authenticatio
8260906 System and method for heuristic determination of network protocols September 4, 2012
A system, method and computer program product are provided for heuristically identifying protocols during network analysis utilizing a network analyzer. First provided is a sequencing and reassembly (SAR) engine module for sequencing and/or re-assembling network communications. Coupl
8259568 System and method for controlling mobile device access to a network September 4, 2012
The invention provides a method for managing access to a network resource on a network from a mobile device, the method including the steps of intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data
8239952 Method and system for detection of remote file inclusion vulnerabilities August 7, 2012
A method for detecting remote file inclusion vulnerabilities in a web application includes altering of extracted resource references from a web application, submission of altered references as HTTP requests to the web application, inspection of corresponding HTTP responses, and diagnosis
8239941 Push alert system, method, and computer program product August 7, 2012
A system, method and computer program product are provided for alerting users of a plurality of computers of a security event via a network. A security alert is first generated including information relating to a security event utilizing a server. The security alert is then pushed from
8234713 Enforcing alignment of approved changes and deployed changes in the software change life-cycle July 31, 2012
On a host, host content change requests are intercepted in real-time. In a tracking mode, the change requests are logged and allowed to take effect on the host. In an enforcement mode, the change requests are logged and additionally compared against authorized change policies and a d
1 2 3 4 5 6 7 8 9

 
 
  Recently Added Patents
Antibodies to CCR2
Systems, devices, methods, and compositions including fluidized x-ray shielding compositions
Printing apparatus having extendable functionality and method thereof
Substrate and patterning device for use in metrology, metrology method and device manufacturing method
Multi-room user interface
System and method for ranking content and applications through human assistance
Incentive based recommendation method for mobile station content
  Randomly Featured Patents
Machine stepper
Chlor-alkali diaphragm electrolysis process and relevant cell
Electroacoustic transducer
Method for manufacturing a semiconductor device wherein a semiconductor chip is connected to a lead frame by metal plating
Method and apparatus for densifying powder metal preforms
Electrophotographic photosensitive member, process cartridge and electrophotographic apparatus
Method and device of transmitting and parsing data in wireless communication network
Process for sputtering multilayers for magneto-optical recording
Battery charger
Laundry bar