ОБНАРУЖЕНИЕ ВРЕДОНОСНОГО ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ С ПЕРЕКРЕСТНЫМ ОБЗОРОМ

    公开(公告)号:RU2667052C2

    公开(公告)日:2018-09-13

    申请号:RU2017105533

    申请日:2015-08-25

    Applicant: MCAFEE INC

    Abstract: Изобретениеотноситсяк областикомпьютернойбезопасности. Техническийрезультатзаключаетсяв болеенадежномопределенииподозрительногоисполняемогообъекта, которыйможетпредставлятьсобойвредоносноепрограммноеобеспечение. Раскрытовычислительноеустройстводляопределенияподозрительногоисполняемогообъекта, содержащеезапоминающееустройствои одинилиболееаппаратныхи/илипрограммныхлогическихэлементов, содержащихмеханизмобнаруженияс перекрестнымобзором, выполненныйс возможностью: наблюдениязапервойоперацией, выполняемойисполняемымобъектомв запоминающемустройственапервомуровнеабстракции; наблюденияза, посуществу, одновременнойвторойоперацией, выполняемойисполняемымобъектомв запоминающемустройственавторомуровнеабстракции, причемвторойуровеньабстракцииотличаетсяотпервогоуровняабстракции; определения, чтоперваяоперация, посуществу, вызываетинойвычислительныйрезультат, чемвтораяоперация, приэтомопределениесодержитпреобразованиепервойоперациии второйоперациив сравнимыйформат; иобозначенияисполняемогообъектакакподозрительного. 3 н. и 20 з.п. ф-лы, 5 ил.

    SELF-CONFIGURING LOCAL AREA NETWORK SECURITY

    公开(公告)号:AU2013237704A1

    公开(公告)日:2014-10-02

    申请号:AU2013237704

    申请日:2013-09-30

    Applicant: MCAFEE INC

    Abstract: SELF-CONFIGURING LOCAL AREA NETWORK SECURITY Technologies for providing electronic security to a first network are disclosed. The system may include a user equipment, a gateway device configured to mediate communication between a first network and a second network for the user equipment, and an electronic security device communicatively coupled to the gateway device. The electronic security device may include a gateway interface module configured to assume an identity associated with the gateway device, a network interface module configured to present the identity to the second network, and a traffic inspection module configured to monitor traffic without substantially affecting a topology of the first network, wherein the electronic security device is configured to identify undesirable traffic; and implement a security policy. 100-.

    Utilizing A Social Graph For Network Access and Admission Control

    公开(公告)号:AU2013237709A1

    公开(公告)日:2014-05-08

    申请号:AU2013237709

    申请日:2013-09-30

    Applicant: MCAFEE INC

    Abstract: UTILIZING A SOCIAL GRAPH FOR NETWORK ACCESS AND ADMISSION Technologies for providing access control for a network are disclosed. The method may include receiving a request from a user to access a network, receiving a plurality of data associated with the user, the plurality of data comprising a plurality of social data associated with the user's relationship to a social circle, identifying an electronic security policy based at least on the plurality of social data, and authenticating the user to the network if the electronic security policy permits authentication based at least on the plurality of social data. 302 Identify social graph 304 Identify new user 306 Select security policy 308 Implement security policy

    PREVENTION OF FORGERY OF WEB REQUESTS TO A SERVER

    公开(公告)号:AU2013237707A1

    公开(公告)日:2014-10-02

    申请号:AU2013237707

    申请日:2013-09-30

    Applicant: MCAFEE INC

    Abstract: PREVENTION OF FORGERY OF WEB REQUESTS TO A SERVER Technologies for prevention of forgery of a network communication request to a server include a system for security of a network communication request. The system includes a communication module configured to receive the network 5 communication request from a client. The network communication request may have a content parameter. The communication module may be configured to generate a string of content parameters comprising the content parameters and a hash of the content parameter, and communicate portions of a result of the network communication request to the client incorporating the encrypted string of content 10 parameters. Furthermore, the communication module may receive a subsequent request from the client. The subsequent request may be associated with the network communication request. As a result of authenticating the subsequent request, the communication module may complete the network communication request. 104 126 100 PROCESSOR 1L2] CUENT COMMUNICATION 102 ENCRYPT/DECRYPT

    LOCATION VERIFICATION AND SECURE NO-FLY LOGIC FOR UNMANNED AERIAL VEHICLES
    5.
    发明申请
    LOCATION VERIFICATION AND SECURE NO-FLY LOGIC FOR UNMANNED AERIAL VEHICLES 审中-公开
    定位验证和无人驾驶飞行器的安全无飞行逻辑

    公开(公告)号:WO2017078813A3

    公开(公告)日:2017-06-22

    申请号:PCT/US2016046026

    申请日:2016-08-08

    Applicant: MCAFEE INC

    Abstract: Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as "drones"). In some embodiments, an unmanned aerial vehicle engaged in autonomous flight may determine its location using a satellite-based navigation system. The location may be evaluated against location data obtained from one or more secondary factors, such as public broadcast beacons, cellular towers, wireless network identifiers, visual markers, or any combination thereof. If the location is determined to be invalid, the unmanned aerial vehicle may be instructed to take a mitigation action. Additionally, certain embodiments also include the verification of a flight plan for the unmanned aerial vehicle using secure no-fly logic to verify a flight plan does not violate no-fly zones. If the flight plan is verified, the flight plan may be signed using a cryptographic signature and provided to a navigation module that verifies the signature and executes the flight plan.

    Abstract translation: 本文的某些实施例涉及用于自主无人驾驶飞行器(也称为“无人机”)的位置验证。 在一些实施例中,参与自主飞行的无人驾驶飞行器可以使用基于卫星的导航系统来确定其位置。 可以针对从一个或多个次要因素(例如公共广播信标,蜂窝塔,无线网络标识符,可视标记或其任何组合)获得的位置数据来评估位置。 如果该位置被确定为无效,则可以指示无人驾驶飞行器采取缓解措施。 另外,某些实施例还包括使用安全的禁止飞行逻辑来验证无人驾驶飞行器的飞行计划以验证飞行计划不违反禁飞区。 如果验证了飞行计划,则可以使用加密签名对飞行计划进行签名,并将其提供给验证签名并执行飞行计划的导航模块。

    EFFICIENT VIRTUAL MACHINE DEPLOYMENT METHODOLOGY
    6.
    发明公开
    EFFICIENT VIRTUAL MACHINE DEPLOYMENT METHODOLOGY 审中-公开
    方法论虚拟计算机的有效使用

    公开(公告)号:EP2907074A4

    公开(公告)日:2016-05-11

    申请号:EP13846105

    申请日:2013-10-10

    Applicant: MCAFEE INC

    Inventor: HUNT SIMON

    CPC classification number: G06F8/63 G06F8/61

    Abstract: Technologies for distribution of a shared image include determining results of a first hash operation applied to a plurality of elements of an image of a software installation, determining results of the first hash operation applied to the plurality of contents of a client, comparing results of the first hash operation applied to the plurality of elements of the image with the results of the first hash operation applied to the plurality of contents of the client, determining that one or more of the plurality of elements of the image are unavailable on the client based on the comparison of the results of the first hash operation applied to the plurality of elements of the image with the results of the first hash operation applied to the plurality of contents of the client, and causing the transmission of the elements to the client.

    REPUTATION SERVICES FOR A SOCIAL MEDIA IDENTITY
    7.
    发明公开
    REPUTATION SERVICES FOR A SOCIAL MEDIA IDENTITY 审中-公开
    信誉服务社会化媒体IDENTITY

    公开(公告)号:EP2777011A4

    公开(公告)日:2015-06-17

    申请号:EP12847047

    申请日:2012-11-02

    Applicant: MCAFEE INC

    Abstract: Reputation services can determine a "reputation" to associate with a Social Media Identity. For example, a social media identity may develop a trustworthy or an untrustworthy reputation. An untrustworthy reputation can be attained if a user (i.e., identity) posts content similar to email spam messages or links to inappropriate content. Inappropriate content can include illegal copies of material (e.g., violation of copyright) or malicious content among other types. Reputation can be used to inform other users of the potential "quality" of that identity's posts or to filter posts from a particular identity so as not to "bother" other users. An identity's reputation could also be calculated across a plurality of Social Media sites when identifying information from each site can be related to a real world entity. Individual users could set their own filtering options to enhance and refine their own experience on Social Media sites.

    JUST-IN-TIME, EMAIL EMBEDDED URL REPUTATION DETERMINATION
    8.
    发明公开
    JUST-IN-TIME, EMAIL EMBEDDED URL REPUTATION DETERMINATION 有权
    ZEITGERECHTE,E-MAIL-EINGEBETTETE URL-REPUTATIONSBESTIMMUNG

    公开(公告)号:EP2936375A4

    公开(公告)日:2016-09-21

    申请号:EP13866110

    申请日:2013-12-12

    Applicant: MCAFEE INC

    CPC classification number: H04L51/08 H04L51/12 H04L51/18 H04L67/02

    Abstract: A system allows just-in-time checking of information about an email in which a hyperlink is embedded. Upon receipt of the email containing the hyperlink, the resource locator of the hyperlink is modified to allow checking the reputation of the email upon traversal of the hyperlink. At traversal of the hyperlink, the current reputation of the resource locator and the current reputation of the email are both determined, and one or more actions are performed responsive to the determination.

    Abstract translation: 系统允许即时检查关于嵌入超链接的电子邮件的信息。 在收到包含超链接的电子邮件后,修改超链接的资源定位器,以允许在遍历超链接时检查电子邮件的声誉。 在遍历超链接时,确定资源定位器的当前信誉和电子邮件的当前信誉,并且响应于确定执行一个或多个动作。

Patent Agency Ranking