1
Handong Wu, Jerome Freedman, Christopher J Ivory: Network intrusion detection and analysis system and method. McAfee, Zilka Kotab PC, Christopher J Hamaty, February 17, 2009: US07493659 (214 worldwide citation)

An intrusion detection and analysis system and method are disclosed. The system includes a data monitoring device comprising a capture engine operable to capture data passing through the network and configured to monitor network traffic, decode protocols, and analyze received data. The system furthe ...


2
Srivats Sampath, Chandrasekar Balasubramaniam, Ravi Lingarkar, Babu Katchapalayam, Ravi Kannan: Method and system for securing, managing or optimizing a personal computer. McAfee com Corporation, Pennie & Edmonds, July 24, 2001: US06266774 (200 worldwide citation)

A system, method, and computer program product for delivery and automatic execution of security, management, or optimization software over an Internet connection to a user computer responsive to a user request entered via a web browser on the user computer. In a preferred embodiment, the user direct ...


3
Michael C Pak, Victor Kouznetsov: Delayed-delivery quarantining of network communications having suspicious contents. McAfee, Zilka Kotab PC, Christopher J Hamaty, July 18, 2006: US07080408 (190 worldwide citation)

A system, method and computer program product are provided for network-based scanning for potentially malicious content. Incoming and/or outgoing network communications traveling over a network are monitored, preferably at a gateway. Potentially malicious content in the network communications is ide ...


4
Alexander James Hinchliffe, Fraser Peter Howard, Bobby Rai, Andrew Kemp: Updating data from a source computer to groups of destination computers. McAfee, Zilka Kotab PC, Christopher J Hamaty, January 2, 2007: US07159036 (187 worldwide citation)

A source computer 8 stores updated data that is to be distributed to a plurality of destination computers (12 to 30). The destination computers (12 to 30) are divided into groups sharing a common priority level (5, 4, 3, 2, 1). Each of these groups is then associated with a push update task to be ex ...


5
Stuart C McClure, George Kurtz, Robin Keir, Marshall A Beddoe, Michael J Morton, Christopher M Prosise, David M Cole, Christopher Abad: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, Christopher J Hamaty, December 19, 2006: US07152105 (169 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


6
David M Cole, Dennis J Hanzlik, Erik Caso: System and method for network vulnerability detection and reporting. McAfee, Zilka Kotab PC, Christopher J Hamaty, August 14, 2007: US07257630 (162 worldwide citation)

A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities ...


7
Dmitry Gryaznov: Automated Internet Relay Chat malware monitoring and interception. McAfee, Christopher J Hamaty, June 27, 2006: US07069316 (155 worldwide citation)

A method, system, and computer program product for providing monitoring and interception of malwares in Internet Relay Chat (IRC), which is secure, does not require significant system resources, and is capable of monitoring multiple IRC networks and servers. A method of detecting a computer malware ...


8
Majid Shahbazi: Mobile data security system and methods. McAfee, Patent Capital Group, July 23, 2013: US08495700 (152 worldwide citation)

The present invention is directed to security systems and methods for mobile network-based data environments. The present invention provides an integration of security, mobile computing, wireless and IT infrastructure management technology, to create a new level of automation and enforcement to enab ...


9
Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith: Hardware-based device authentication. McAfee, Patent Capital Group, February 10, 2015: US08955075 (146 worldwide citation)

An opportunity for a computing device to participate in a secure session with a particular domain is identified. A secured microcontroller of the computing device is used to identify a secured, persistent seed corresponding to the particular domain and stored in secured memory of the computing devic ...


10
William Deninger, Erik de la Iglesia: Attributes of captured objects in a capture system. McAfee, Patent Capital Group, June 1, 2010: US07730011 (145 worldwide citation)

Regular expressions used for searching for patterns in captured objects can be grouped into attributes. Such attributes can be associated with captured objects using tags stored in a database. In one embodiment, the present invention includes capturing an object being transmitted over a network, and ...