1
Majid Shahbazi: Mobile data security system and methods. McAfee, Patent Capital Group, July 23, 2013: US08495700 (135 worldwide citation)

The present invention is directed to security systems and methods for mobile network-based data environments. The present invention provides an integration of security, mobile computing, wireless and IT infrastructure management technology, to create a new level of automation and enforcement to enab ...


2
William Deninger, Erik de la Iglesia: Attributes of captured objects in a capture system. McAfee, Patent Capital Group, June 1, 2010: US07730011 (134 worldwide citation)

Regular expressions used for searching for patterns in captured objects can be grouped into attributes. Such attributes can be associated with captured objects using tags stored in a database. In one embodiment, the present invention includes capturing an object being transmitted over a network, and ...


3
Vincent Edward Von Bokern, Purushottam Goel, Sven Schrecker, Ned McArthur Smith: Hardware-based device authentication. McAfee, Patent Capital Group, February 10, 2015: US08955075 (123 worldwide citation)

An opportunity for a computing device to participate in a secure session with a particular domain is identified. A secured microcontroller of the computing device is used to identify a secured, persistent seed corresponding to the particular domain and stored in secured memory of the computing devic ...


4
Eran Werner, Elad Zucker, Ben Matzkel: Method and system for generic real time management of devices on computers connected to a network. McAfee, Patent Capital Group, July 9, 2013: US08484327 (116 worldwide citation)

A method and system for enterprise device management allows the administrator to set a policy of forbidden devices, monitor devices used in the organization, provide alerts and notification incase an unknown device is connected to a computer, and monitor or block connections of devices which do not ...


5
Rick Lowe, Stephen Broeker, Weimin Liu: File system for a capture system. McAfee, Patent Capital Group, May 24, 2011: US07949849 (110 worldwide citation)

A file system can be provided in a capture system to efficiently read and write captured objects. In one embodiment, such a file system includes a plurality of queues to queue captured objects to be written to a disk, each queue being associated with one of a plurality of object types, and each queu ...


6
William Deninger, Erik de la Iglesia: Attributes of captured objects in a capture system. McAfee, Patent Capital Group, May 8, 2012: US08176049 (103 worldwide citation)

Regular expressions used for searching for patterns in captured objects can be grouped into attributes. Such attributes can be associated with captured objects using tags stored in a database. In one embodiment, the present invention includes capturing an object being transmitted over a network, and ...


7
Steven G Andres, David M Cole, Thomas Gregory Cummings, Roberto Ramon Garcia, Brian Michael Kenyon, George R Kurtz, Stuart Cartier McClure, Christopher William Moore, Michael J O Dea, Ken D Saruwatari: System and method of managing network security risks. McAfee, Patent Capital Group, June 12, 2012: US08201257 (100 worldwide citation)

A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerabilit ...


8
Ratinder Paul Singh Ahuja, Faizel Lakhani: System and method for data mining and security policy management. McAfee, Patent Capital Group PC, May 21, 2013: US08447722 (77 worldwide citation)

A method is provided in one example and includes generating a query for a database for information stored in the database. The information relates to data discovered through a capture system. The method further includes generating an Online Analytical Processing (OLAP) element to represent informati ...


9
Sateesh K Addepalli, Ashok K Moghe, Lillian Lei Dai, Mohammand H Falaki: System and method for providing resource sharing, synchronizing, media coordination, transcoding, and traffic management in a vehicular environment. Cisco Technology, Patent Capital Group, July 14, 2015: US09083581 (76 worldwide citation)

A method in one embodiment includes maintaining a list of authorized devices; creating an association between a wireless device being operated by an end user and an onboard unit (OBU) element, which is provisioned in a vehicle; establishing a session over a designated port for an application to be e ...


10
Paul J Martino, Mark Pincus: Hierarchical posting systems and methods with social network filtering. Cisco Technology, Patent Capital Group, October 19, 2010: US07818392 (76 worldwide citation)

A hierarchal posting method includes determining a first plurality of social network relationship factors associated with a first plurality of users with respect to a first user, determining a second plurality of users from the first plurality of users that have associated social network relationshi ...