Patents by Inventor Darrell Kienzle

Darrell Kienzle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9692772
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Grant
    Filed: February 8, 2016
    Date of Patent: June 27, 2017
    Assignee: Symantec Corporation
    Inventors: Michael Hart, Darrell Kienzle, Peter Ashley
  • Patent number: 9571372
    Abstract: A computer-implemented method for estimating ages of network devices may include (1) identifying at least one networked device that may be attached to a network, (2) identifying a media access control address of the networked device, the media access control address comprising an organizational unique identifier, (3) querying an organizational-unique-identifier database with the organizational unique identifier and receiving, in response, device-age information relating to an estimated age of the networked device and (4) determining the estimated age of the networked device based at least in part on the device-age information. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 24, 2013
    Date of Patent: February 14, 2017
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, Nathan Evans, Matthew Elder
  • Patent number: 9419986
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Grant
    Filed: March 26, 2014
    Date of Patent: August 16, 2016
    Assignee: Symantec Corporation
    Inventors: Michael Hart, Darrell Kienzle, Peter Ashley
  • Publication number: 20160156640
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Application
    Filed: February 8, 2016
    Publication date: June 2, 2016
    Inventors: Michael Hart, Darrell Kienzle, Peter Ashley
  • Patent number: 9219655
    Abstract: A computer-implemented method for discovering network topologies. The method may include (1) receiving, on a host system within a network, a switch-protocol message that includes a switch identifier, a port identifier, and/or a root path cost, (2) identifying a set of switches within the network based on the switch-protocol message, (3) determining how the set of switches are connected based on the switch-protocol message, and (4) mapping a topology of the network based on determining how the set of switches are connected. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 25, 2012
    Date of Patent: December 22, 2015
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, Nathan Evans, Matthew Elder
  • Publication number: 20150281257
    Abstract: A method to identify machines infected by malware is provided. The method includes determining whether a universal resource locator in a network request is present in a first cache and determining whether a fully qualified domain name from the uniform resource locator is present in a second cache. The method includes evaluating a parent hostname as to suspiciousness. The method includes indicating the computing device has a likelihood of infection, responsive to one of: the universal resource locator being present in the first cache with a first indication of suspiciousness, the fully qualified domain name being present in the second cache with a second indication of suspiciousness, or the evaluating the parent hostname having a third indication of suspiciousness, wherein at least one method operation is performed by the processor. A system and computer readable media are provided.
    Type: Application
    Filed: March 26, 2014
    Publication date: October 1, 2015
    Applicant: Symantec Corporation
    Inventors: Michael HART, Darrell KIENZLE, Peter ASHLEY
  • Patent number: 9007955
    Abstract: A computer-implemented method for mapping network topologies may include (1) identifying a network including a plurality of network switches and a plurality of host systems, (2) identifying a host system within the plurality of host systems connected to the network via a network switch within the plurality of network switches, (3) refreshing an address of the host system within the network switch, (4) allowing the address of the host system to expire from each network switch within the plurality of network switches except the network switch, (5) transmitting a probing frame from a probing host system within the plurality of host systems to the address of the host system, (6) identifying a subset of host systems within the plurality of host systems that received the probing frame, and then (7) mapping a topology of the network based on the identified subset. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: April 14, 2015
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, Matthew Cruz Elder, Ryan Persaud
  • Patent number: 8844041
    Abstract: Detection of network devices (e.g., stealth devices) and mapping network topology are performed via network introspection by collaborating endpoints/nodes. The method includes receiving (e.g., by a node on a network) an assignment to be a supernode that will manage multiple agents of a subnetwork within an overall network. This assigned supernode instructs two or more of the agents to perform a set of network traffic fingerprinting tests of the subnetwork by passing information across the subnetwork to each other. The supernode receives results of the tests from the clients and detects one or more intermediate devices located between the clients based on an effect of the intermediate devices on the information passed between the clients. The supernode can further map the topology of the subnetwork (including the detected devices) which can be used in mapping the overall network topology.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: September 23, 2014
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, William Gauvin, Matthew Elder, Robert Walters, Adam Schepis, Brian Hernacki
  • Patent number: 7934257
    Abstract: A method of monitoring events in a network associated with a node. An agent collects event information associated with the monitored activities, based on a set of collection rules. A determination is made whether a portion of the collected event information complies or potentially complies with one of a set of patterns. An agent selects event information from the collection based on the determination, and makes the selected event information available to a manager associated with the node and other nodes in the network. The agent manager receives event information from a plurality of agents. A triggering event is identified, as a function of the set of patterns, based on the event information. The agent manager sends at least one request to a selected set of the agents for additional event information when a triggering event is identified.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: April 26, 2011
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, Paul Swinton
  • Patent number: 7634811
    Abstract: Computer-implemented methods, apparati, and computer-readable media for thwarting computer attacks. A method embodiment of the present invention comprises the steps of examining (52) a digital certificate (20) presented by a server computer (2); compiling (53) a set of suspicion indications (31) gleaned from said examining step (52); and feeding (54) said suspicion indications (31) to a consequence engine (30).
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: December 15, 2009
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, Matthew Elder
  • Patent number: 7516488
    Abstract: An electronic message manager (100) examines (210) incoming electronic messages and determines (220) whether an incoming electronic message comprises at least one suspect link associated with a remote system. In response to the determination (220) that the incoming message comprises at least one suspect link, the electronic message manager (100) replaces (230) each suspect link with a redirection link. In response to a user attempting (240) to connect to the remote system by clicking on the redirection link, the electronic message manager directs the user to a remote analysis site for deciding (260) whether that incoming message comprises a phishing message.
    Type: Grant
    Filed: February 23, 2005
    Date of Patent: April 7, 2009
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, James Croall