Patents by Inventor Shaun Cooley
Shaun Cooley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9208252Abstract: The number of redundant content items provided to a user by a multi-source feed reader is automatically reduced. Each content item obtained by the multi-source feed reader from each feed to which the users subscribes is analyzed prior to being made available to the user. More specifically, the content items are analyzed to determine whether they are based on source content from different feeds. Each content item is searched for attributes indicating a source on which it is based. Where it is determined that a content item from a first feed is based on source content from a second feed, it is further determined whether the user subscribes to the second feed which the source content is from. If so, the specific received content item from the first feed is not provided to the user.Type: GrantFiled: January 31, 2011Date of Patent: December 8, 2015Assignee: Symantec CorporationInventor: Shaun Cooley
-
Patent number: 9154520Abstract: A computer-implemented method for notifying users of endpoint devices about blocked downloads may include (1) detecting, at a networking device, at least one attempt by an endpoint device to download a file from an external network, (2) determining that the networking device has already blocked at least one previous attempt to download the file from the external network based at least in part on at least one potential policy violation associated with the file, (3) directing the networking device to block the attempt by the endpoint device to download the file from the external network, and then (4) providing the endpoint device with at least one notification indicating that the attempt by the endpoint device to download the file has been blocked based at least in part on the potential policy violation associated with the file. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 27, 2012Date of Patent: October 6, 2015Assignee: Symantec CorporationInventor: Shaun Cooley
-
Publication number: 20150281184Abstract: An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes on-premise indexing and search handling, while relying on the cloud for persistent storage and search of the index. The on-premise indexer receives a copy of an encrypted message from the cloud-hosted collaboration service. The encrypted message has been encrypted with a conversation key. The indexer receives the conversation key from an on-premise key management service, and decrypts the encrypted message with the conversation key. A set of tokens are extracted from the decrypted message, and subsequently encrypted with a secret key, different than the conversation key, to generate a first set of encrypted tokens. The first set of encrypted tokens is transmitted for storage in a search index on the cloud-hosted collaboration service.Type: ApplicationFiled: March 26, 2014Publication date: October 1, 2015Applicant: Cisco Technology, Inc.Inventor: Shaun Cooley
-
Publication number: 20150281185Abstract: The embodiments presented herein provide for a method for a key management service (KMS) to provide a conversation key over individually established secure channels. The KMS establishes, with a first device, a first ephemerally secure communication channel over an unsecure network. The KMS receives, over the first ephemerally secure communication channel, a first request for a conversation key. After obtaining the conversation key, the KMS transmits the conversation key to the first device over the first ephemerally secure communication channel. The KMS establishes, with a second device, a second ephemerally secure communication channel over the unsecure network. The KMS receives, over the second ephemerally secure communication channel, a second request for the conversation key. The conversation key is transmitted to the second device over the second ephemerally secure communication channel.Type: ApplicationFiled: March 26, 2014Publication date: October 1, 2015Applicant: Cisco Technology, Inc.Inventor: Shaun Cooley
-
Patent number: 9146950Abstract: A computer-implemented method for determining file identities may include identifying a file stream that is subject to an assessment, generating a hash based at least in part on a portion of the file stream between a start and an offset of the file stream, querying the database to determine whether the hash matches at least one file in the database, receiving a response that indicates that the file stream matches a plurality of files in the database and that requests an additional hash of the file stream that is based at least in part on an additional portion of the file stream ending between the offset and a subsequent offset of the file stream, generating the additional hash of the file stream, querying the database with the additional hash, and receiving an additional response including a characterization of the file. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 14, 2012Date of Patent: September 29, 2015Assignee: Symantec CorporationInventor: Shaun Cooley
-
Patent number: 9076171Abstract: A graphical payment identifier is used to facilitate the automatic processing of an electronic payment. A graphical identifier payment system receives a request from a payment processing entity for a onetime use graphical payment identifier. In response, a onetime use graphical payment identifier to be displayed by the payment processing entity is generated. A request for user payment information by the payment processing entity is encoded in the graphical payment identifier, which is transmitted to the payment processing entity for display. The graphical payment identifier being displayed by the payment processing entity is captured by a registered user operated computing device. In response, the requested user payment information is transmitted to the payment processing entity, such that the electronic payment is executed automatically, without the user manually entering the requested payment information or providing a credit card.Type: GrantFiled: December 15, 2010Date of Patent: July 7, 2015Assignee: Symantec CorporationInventors: Shaun Cooley, Charles Andrew Payne
-
Patent number: 9077538Abstract: A computer-implemented method for verifying user identities may include (1) identifying a request to ascertain whether a user account corresponds to a physical person, and, in response to the request, (2) identifying a password vault configured to store login information for at least one third-party Internet site for the user account, the third-party Internet site requiring a physical validation factor to log in to the third-party Internet site, (3) determining, based at least in part on the login information for the third-party Internet site, that the user account corresponds to the physical person, and (4) responding to the request with an indicator that the user account corresponds to the physical person. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 15, 2011Date of Patent: July 7, 2015Assignee: Symantec CorporationInventors: Shaun Cooley, Paul Agbabian
-
Publication number: 20150188846Abstract: Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic account and device management. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a user device to be managed. The one or more processors may be configured to transmit a request for delegate authority to manage the user device. The one or more processors may be configured to receive delegate authority to manage the user device. The one or more processors may be configured to provide network access to the user device. The one or more processors may also be configured to manage the user device and monitor data communicated to and from the user device.Type: ApplicationFiled: March 16, 2015Publication date: July 2, 2015Applicant: Symantec CorporationInventors: Paul AGBABIAN, Shaun COOLEY
-
Publication number: 20150178515Abstract: Techniques are disclosed for providing a device-based PIN authentication process used to protect encrypted data stored on a computing system, such as a tablet or mobile device. A client component and a server component each store distinct cryptographic keys needed to access encrypted data on the client. The mobile device stores a vault encryption key used to decrypt encrypted sensitive data stored on the mobile device. The vault key is encrypted using a first encryption key and stored on the mobile device. The first encryption key is itself encrypted using a second encryption key. The second encryption key is derived from the PIN value.Type: ApplicationFiled: December 23, 2013Publication date: June 25, 2015Applicant: SYMANTEC CORPORATIONInventors: Shaun COOLEY, Brian POWELL, Srinivas CHILLAPPA, Michael W. LO, Mahesh KAMSALA
-
Patent number: 9052904Abstract: A computer-implemented method for determining whether to reschedule tasks on computing devices based on power-availability information for a power grid may comprise: 1) identifying at least one task scheduled to execute on a computing device, 2) receiving power-availability information for the power grid, and then 3) determining, based on the power-availability information, whether to reschedule the task. Corresponding systems and computer-readable media are also disclosed.Type: GrantFiled: September 5, 2008Date of Patent: June 9, 2015Assignee: Symantec CorporationInventors: Shaun Cooley, Keith Newstadt
-
Patent number: 9047368Abstract: Multiple documents associated with a user are retrieved from one or more sources. Textual elements in the documents are identified, and the documents are classified according to document type. Cluster keys are identified in the documents, based on document content and document classification. A cluster key comprises an association between a document and a specific entity associated with the individual user, around which to cluster associated documents. Identifying cluster keys for a document can take the form of performing feature reduction, and identifying any features remaining thereafter as cluster keys. Names and addresses other than those of the document recipient can be identified as cluster keys. Retrieved documents, identified cluster keys and associations between them are stored, thereby organizing documents into clusters based on entities associated with the individual user. The user is provided with access to the documents according to the clusters into which they are organized.Type: GrantFiled: February 19, 2013Date of Patent: June 2, 2015Assignee: Symantec CorporationInventor: Shaun Cooley
-
Patent number: 8984111Abstract: Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic account and device management. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a user device to be managed. The one or more processors may be configured to transmit a request for delegate authority to manage the user device. The one or more processors may be configured to receive delegate authority to manage the user device. The one or more processors may be configured to provide network access to the user device. The one or more processors may also be configured to manage the user device and monitor data communicated to and from the user device.Type: GrantFiled: June 15, 2012Date of Patent: March 17, 2015Assignee: Symantec CorporationInventors: Paul M. Agbabian, Shaun Cooley
-
Patent number: 8977604Abstract: A unique (or nearly unique) set of search terms (called a “Search Resource Locator,” or SRL) is used to locate information on a web page. An SRL can be used like a Uniform Resource Locator (URL) as a navigational element that finds and brings up a corresponding web site. Unlike a URL, however, an SRL is not a static address for the web site, but is instead a representation of a collection of search terms that can be used to find the site or a substantially similar site. A provided tool generates SRLs for web pages.Type: GrantFiled: March 26, 2007Date of Patent: March 10, 2015Assignee: Symantec CorporationInventors: Bruce McCorkendale, Shaun Cooley
-
Patent number: 8973678Abstract: Misspelled words are identified in incoming email messages. The presence of misspelled words in emails is used to help determine which the emails are spam. Various statistical information concerning the number, prevalence, distribution, etc. of misspelled words in email messages is analyzed to detect spam or other forms of undesirable email, such as phishing emails. In some embodiments, the language in which an email is written is identified in order to aid in the identification of misspelled words. In some embodiments, the analysis of the misspelling information is combined with other techniques used to identify undesirable email.Type: GrantFiled: November 22, 2006Date of Patent: March 10, 2015Assignee: Symantec CorporationInventors: Shaun Cooley, Bruce McCorkendale
-
Patent number: 8973133Abstract: A computer-implemented method for detecting abnormal behavior of networked devices may include identifying a purpose-built device expected to have a predictable pattern of behavior on a network, determining a baseline pattern of behavior of the purpose-built device, monitoring the network to detect a behavior of the purpose-built device and comparing the behavior to the baseline pattern of behavior of the purpose-built device in order to determine that the behavior may be an abnormal behavior. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 19, 2012Date of Patent: March 3, 2015Assignee: Symantec CorporationInventor: Shaun Cooley
-
Patent number: 8955092Abstract: A computer-implemented method for eliminating redundant security analyses on network data packets may include (1) intercepting, at a networking device, at least one network data packet destined for a target computing device, (2) identifying a security system installed on the target computing device, (3) determining that the security system installed on the target computing device does not satisfy a predefined security standard, and then (4) performing a security analysis that satisfies the predefined security standard on the network data packet at the networking device based at least in part on determining that the security system installed on the target computing device does not satisfy the predefined security standard. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 27, 2012Date of Patent: February 10, 2015Assignee: Symantec CorporationInventor: Shaun Cooley
-
Patent number: 8955096Abstract: A computer-implemented method for filtering Internet access may include: 1) identifying a domain-name-system request from a client system, 2) identifying a filtering policy for the client system, 3) bundling the filtering policy with the domain-name-system request, and then 4) forwarding the bundled domain-name-system request to a domain-name-system server. Various other methods and systems are also disclosed.Type: GrantFiled: April 6, 2010Date of Patent: February 10, 2015Assignee: Symantec CorporationInventors: George Stahl, Shaun Cooley
-
Patent number: 8943587Abstract: A computer-implemented method for performing selective deep packet inspection may include 1) identify a traffic flow that includes a stream of data packets, 2) sample at least one packet from the stream of data packets, 3) analyze the sampled packet using a computing resource to determine whether the traffic flow is trustworthy, 4) determine that the traffic flow is trustworthy based on analyzing the sampled packet, and 5) divert the traffic flow to a hardware accelerator in response to determining that the traffic flow is trustworthy. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 13, 2012Date of Patent: January 27, 2015Assignee: Symantec CorporationInventor: Shaun Cooley
-
Patent number: 8938508Abstract: A computer correlates web and email attributes to detect spam. A security module on a client collects attributes of a web site to which an email address was submitted and attributes of an email message sent to the email address that was previously submitted. The security module analyzes the attributes of the web site and the email message to determine whether the email message was sent to the email address responsive to the submission of the email address to the web site. Based on the analysis, the security module determines whether the email message is spam. A machine learning module on a security server establishes training data describing the attributes of the web site to which email addresses were submitted and attributes of legitimate emails received in response to the address submissions. The machine learning module generates an attributes classifier for the security module for spam detection.Type: GrantFiled: July 22, 2010Date of Patent: January 20, 2015Assignee: Symantec CorporationInventors: Bruce McCorkendale, Shaun Cooley
-
Patent number: 8935284Abstract: A computer-implemented method for associating website browsing behavior with a spam mailing list is described. A history of website browsing behavior is collected for a plurality of users. At least one spam mailing list is identified that includes an e-mail address for at least two users of the plurality of users. A determination is made as to whether a common website exists between the histories of website browsing behavior for the at least two users. Reputation information for the common website is updated.Type: GrantFiled: July 15, 2010Date of Patent: January 13, 2015Assignee: Symantec CorporationInventor: Shaun Cooley