Patents by Inventor Keith Newstadt

Keith Newstadt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7860936
    Abstract: A parental control system is used to verify the identity of parents, based on children's instant messaging aliases. A plurality of verified parental accounts is maintained, each of which includes the identity of the parents and their children, including the children's instant messaging aliases. When a first child wishes to electronically communicate with a second child, s/he makes a request which includes the second child's alias. The parental accounts are searched for the second child's alias. If the alias is not found, instant messaging between the children is not allowed. If an account containing the alias is found, an identity verification request is transmitted, disclosing the identity of the first child's parents, and requesting reciprocal identity verification. Only if the second child's parents disclose their identity is the instant messaging between the children permitted.
    Type: Grant
    Filed: May 9, 2008
    Date of Patent: December 28, 2010
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Shaun Cooley
  • Patent number: 7827247
    Abstract: A parental control system is used to verify the identity of parents, based on children's instant messaging aliases. A plurality of verified parental accounts is maintained, each of which includes the identity of the parents and their children, including the children's instant messaging aliases. When a first child wishes to electronically communicate with a second child, s/he makes a request which includes the second child's alias and additional information identifying the target party. Only if an account containing the alias is found and the additional information can be verified, an identity verification request is transmitted, disclosing the identity of the first child's parents, and requesting reciprocal identity verification. Only if the second child's parents disclose their identity is the instant messaging between the children permitted.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: November 2, 2010
    Assignee: Symantec Corporation
    Inventors: Michael Paul Spertus, Keith Newstadt, Shaun Cooley
  • Patent number: 7805752
    Abstract: Techniques are disclosed for implementing dynamic endpoint compliance policy configuration. In one embodiment, a security service is provided that automates endpoint compliance policy configuration. A customer identifies its deployed client security products, and specifies the desired level of security. This security product and level information is used by the security service to generate endpoint compliance policies tailored to that customer's current network and/or security scheme. The security service can incorporate data obtained from early warning services that deliver timely and actionable security alerts into its policy generation process. In this way, the security service can provide endpoint compliance policies that protect its customers' machines from the very latest threats at any moment in time.
    Type: Grant
    Filed: November 9, 2005
    Date of Patent: September 28, 2010
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Tim Brown
  • Patent number: 7805640
    Abstract: Hardware independent performance metrics for application tasks are assembled and submitted to a central repository from multiple installations in the field. These metrics are requested by and provided to specific computing devices, and used to calculate expected performance times for given application tasks on specific hardware configurations. Computing devices can automatically identify performance problems by comparing actual performance times of application tasks to calculated expected performance times. Events that take longer than expected to execute indicate a computing device performance issue.
    Type: Grant
    Filed: March 10, 2008
    Date of Patent: September 28, 2010
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Shaun Cooley
  • Publication number: 20100235923
    Abstract: A computer-implemented method may intercept a file-system call associated with a media file. The computer-implemented method may determine an attribute of the media file. The computer-implemented method may also identify a parental-control policy associated with the attribute of the media file. The computer-implemented method may further apply the parental-control policy to the media file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: March 13, 2009
    Publication date: September 16, 2010
    Applicant: Symantec Corporation
    Inventors: Adam Schepis, Keith Newstadt
  • Publication number: 20100017889
    Abstract: A client communicates with a website usage server via a network to gain access to an account on a website. The client requests an indication of whether user access to the account on the website is permitted. The website usage server determines whether website usage is permitted based at least in part on a website usage policy associated with the website and the user. The website usage server provides restricted authentication credentials to the website responsive to determining that access to the account is permitted.
    Type: Application
    Filed: July 17, 2008
    Publication date: January 21, 2010
    Applicant: SYMANTEC CORPORATION
    Inventors: Keith Newstadt, Shaun P. Cooley
  • Publication number: 20090172793
    Abstract: Computer-implemented methods for delegating access to online accounts and for facilitating delegates' access to these online accounts are disclosed. In one embodiment, a method for delegating access to an online account comprises receiving a request to delegate access to a first online account to a first delegate, identifying the first online account, identifying a contact record for the first delegate, and delegating access to the first online account to the first delegate by associating the contact record for the first delegate with the first online account. Corresponding systems and computer-readable media are also disclosed.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: Symantec Corporation
    Inventors: Keith Newstadt, Shaun Cooley
  • Patent number: 7383568
    Abstract: A method includes defining areas of ownership for users of a computer system; receiving a proposed modification from a first user of the users, the first user being an owner of the proposed modification, wherein a set of the users are stakeholders in the proposed modification; and receiving decisions from a selected set of the stakeholders on approval of the proposed modification. Upon receiving the approvals from all of the selected stakeholders, the owner is granted permission to implement the proposed modification.
    Type: Grant
    Filed: May 5, 2004
    Date of Patent: June 3, 2008
    Assignee: Symantec Corporation
    Inventor: Keith Newstadt
  • Publication number: 20070107043
    Abstract: Techniques are disclosed for implementing dynamic endpoint compliance policy configuration. In one embodiment, a security service is provided that automates endpoint compliance policy configuration. A customer identifies its deployed client security products, and specifies the desired level of security. This security product and level information is used by the security service to generate endpoint compliance policies tailored to that customer's current network and/or security scheme. The security service can incorporate data obtained from early warning services that deliver timely and actionable security alerts into its policy generation process. In this way, the security service can provide endpoint compliance policies that protect its customers' machines from the very latest threats at any moment in time.
    Type: Application
    Filed: November 9, 2005
    Publication date: May 10, 2007
    Inventors: Keith Newstadt, Tim Brown
  • Publication number: 20060156401
    Abstract: Methods and systems for providing data security scanning in a network. A network device ascertains, based on a network's security policy, security technologies that are should or must be applied to the network traffic. The network device applies the not yet applied security technologies, based on a determination that the not yet applied security technologies are available to the network device. Next, the network device tags the network traffic with a security marker indicating the not yet applied security technologies as applied to reflect the security technologies applied to the network traffic.
    Type: Application
    Filed: January 12, 2005
    Publication date: July 13, 2006
    Inventors: Keith Newstadt, David Lin, William Gauvin