-
公开(公告)号:US11874921B2
公开(公告)日:2024-01-16
申请号:US17741700
申请日:2022-05-11
Applicant: McAfee, LLC
Inventor: Dattatraya Kulkarni , Srikanth Nalluri , Kamlesh Halder , Venkatasubrahmanyam Krishnapur , Sailaja K. Shankar , Kaushal Kumar Dhruw
CPC classification number: G06F21/56 , G06F21/567 , G06F21/577 , G06F2221/033 , G06F2221/034
Abstract: The present disclosure relates to a system and method for performing anti-malware scanning of data files that is data-centric rather than device-centric. In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware. After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan. The originating device may also scan the data for malware contextually-relevant to a second device.
-
公开(公告)号:US20220269783A1
公开(公告)日:2022-08-25
申请号:US17741700
申请日:2022-05-11
Applicant: McAfee, LLC
Inventor: Dattatraya Kulkarni , Srikanth Nalluri , Kamlesh Halder , Venkatasubrahmanyam Krishnapur , Sailaja K. Shankar , Kaushal Kumar Dhruw
Abstract: The present disclosure relates to a system and method for performing anti-malware scanning of data files that is data-centric rather than device-centric. In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware. After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan. The originating device may also scan the data for malware contextually-relevant to a second device.
-
公开(公告)号:US10114950B2
公开(公告)日:2018-10-30
申请号:US15652623
申请日:2017-07-18
Applicant: McAfee, LLC
Inventor: Srikanth Nalluri , Dattatraya Kulkarni , Raja Sinha , Venkatasubrahmanyam Krishnapur , Kaushal Kumar Dhruw , Kamlesh Halder
Abstract: Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (API) calls of the particular platform. A set of behaviors of the particular application is identified based on the analysis of the code and a particular one of the set of behaviors is identified as an undesired behavior. The particular application can be automatically modified to remediate the undesired behavior. The particular application can be assigned to one of a plurality of device modes, and access to the particular application on a user device can be based on which of the plurality of device modes is active on the user device.
-
4.
公开(公告)号:US20240143546A1
公开(公告)日:2024-05-02
申请号:US18410342
申请日:2024-01-11
Applicant: McAfee, LLC
Inventor: Kranthikumar Gadde , Mitesh Kumar , Kamlesh Halder , Raj Vardhan , Srikanth Nalluri , Dattatraya Kulkarni , Susmita Nayak , Krishnapur Venkatasubrahmanyam
IPC: G06F16/13 , G06F16/17 , G06F16/178 , G06F16/182 , G06F21/62
CPC classification number: G06F16/13 , G06F16/1734 , G06F16/178 , G06F16/1844 , G06F21/6218
Abstract: Disclosed examples include causing transmission of an indication to a server. The indication indicates that a file on a host storage location is designated as a favorite file. The indication causes a copy of the file to be stored in a favorites storage device. Disclosed examples also include generating a modified copy of the file by modifying the file at the host storage location, and causing synchronization of the modified copy of the file from the host storage location to replace the copy of the file at the favorites storage device.
-
公开(公告)号:US11347848B2
公开(公告)日:2022-05-31
申请号:US16572579
申请日:2019-09-16
Applicant: McAfee, LLC
Inventor: Dattatraya Kulkarni , Srikanth Nalluri , Kamlesh Halder , Venkatasubrahmanyam Krishnapur , Sailaja K. Shankar , Kaushal Kumar Dhruw
Abstract: The present disclosure relates to a system and method for performing anti-malware scanning of data files that is data-centric rather than device-centric. In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware. After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan. The originating device may also scan the data for malware contextually-relevant to a second device.
-
公开(公告)号:US10735965B2
公开(公告)日:2020-08-04
申请号:US15286821
申请日:2016-10-06
Applicant: McAfee, LLC
Inventor: Himanshu Srivastava , Dattatraya Kulkarni , Srikanth Nalluri , Krishnapur N. Venkatasubrahmanyam , Kamlesh Halder , Raj Vardhan
Abstract: A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules. The rules may include definitions of access rights, with respect to the network enabled device, for users, applications, commands or queries made by applications, remote host devices, and network domains.
-
公开(公告)号:US20200012790A1
公开(公告)日:2020-01-09
申请号:US16572579
申请日:2019-09-16
Applicant: McAfee, LLC
Inventor: Dattatraya Kulkarni , Srikanth Nalluri , Kamlesh Halder , Venkatasubrahmanyam Krishnapur , Sailaja K. Shankar , Kaushal Kumar Dhruw
Abstract: The present disclosure relates to a system and method for performing anti-malware scanning of data files that is data-centric rather than device-centric. In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware. After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan. The originating device may also scan the data for malware contextually-relevant to a second device.
-
公开(公告)号:US11418513B2
公开(公告)日:2022-08-16
申请号:US16945141
申请日:2020-07-31
Applicant: McAfee, LLC
Inventor: Himanshu Srivastava , Dattatraya Kulkarni , Srikanth Nalluri , Krishnapur N. Venkatasubrahmanyam , Kamlesh Halder , Raj Vardhan
IPC: H04W4/70 , H04W12/08 , H04W12/086 , H04W12/088 , H04L67/63 , H04L9/40 , H04L67/53 , H04W12/10
Abstract: A system for controlling accesses to network enabled devices includes a network interface over which a hub communicates with network enabled devices, a processor, and a multilayer access control layer. The access control layer includes instructions that, when executed by the processor, cause the processor to detect, at the hub, a request representing an attempt by an application executing on a remote host device to access a network enabled device communicatively coupled to the hub, characterize the request according to a user of the remote host device, the application making the attempt, and the network enabled device, and determine whether to allow or deny the request based upon the characterization and a plurality of rules. The rules may include definitions of access rights, with respect to the network enabled device, for users, applications, commands or queries made by applications, remote host devices, and network domains.
-
公开(公告)号:US11157616B2
公开(公告)日:2021-10-26
申请号:US16138904
申请日:2018-09-21
Applicant: McAfee, LLC
Inventor: Srikanth Nalluri , Dattatraya Kulkarni , Raja Sinha , Venkatasubrahmanyam Krishnapur , Kaushal Kumar Dhruw , Kamlesh Halder
Abstract: Code of a particular application is analyzed against a semantic model of a software development kit of a particular platform. The semantic model associates a plurality of application behaviors with respective application programming interface (API) calls of the particular platform. A set of behaviors of the particular application is identified based on the analysis of the code and a particular one of the set of behaviors is identified as an undesired behavior. The particular application can be automatically modified to remediate the undesired behavior. The particular application can be assigned to one of a plurality of device modes, and access to the particular application on a user device can be based on which of the plurality of device modes is active on the user device.
-
10.
公开(公告)号:US20190138497A1
公开(公告)日:2019-05-09
申请号:US16234979
申请日:2018-12-28
Applicant: McAfee, LLC
Inventor: Kranthikumar Gadde , Mitesh Kumar , Kamlesh Halder , Raj Vardhan , Srikanth Nalluri , Dattatraya Kulkarni , Susmita Nayak , Krishnapur Venkatasubrahmanyam
IPC: G06F16/13 , G06F16/17 , G06F16/178 , G06F21/62
Abstract: Disclosed examples include receiving an indication that a file is designated as a favorite file from a user device; retrieving the file from a remote location; storing the file as a first favorite file on a favorites storage device; re-retrieving the file from the remote location; and updating the first favorite file with the re-retrieved file.
-
-
-
-
-
-
-
-
-