Patents by Inventor William Gauvin
William Gauvin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9979725Abstract: A system for two-way authentication using two-dimensional codes is provided. The system includes a memory and a processor coupled to the memory. The processor is to generate a two-dimensional code to be used by a user of a mobile device for accessing a remote resource. The processor is to generate the code in response to a request from the remote resource for the code. The processor is further to receive an authentication request from the mobile device to authenticate the remote resource. The authentication request includes information obtained from the two-dimensional code, the information including an authentication request identifier. The processor is also to compare the authentication request identifier to an expected value to create an authentication indication and to transmit the authentication indication and an authentication credential to the mobile device to authenticate the user to the remote resource.Type: GrantFiled: April 14, 2014Date of Patent: May 22, 2018Assignee: Symantec CorporationInventors: Quentin Liu, William Gauvin, Robert Walters
-
Patent number: 9893970Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.Type: GrantFiled: September 19, 2016Date of Patent: February 13, 2018Assignee: SYMANTEC CORPORATIONInventor: William Gauvin
-
Patent number: 9886726Abstract: Social networking spam is detected using usage profiles for social networking groups. A mapping module maps a social networking group with a number of members. A pattern module determines a pattern of publishing activity of the members in posting information on blogs of other of the members. A profiling module defines a group usage profile for the social networking group based on the pattern. Global usage profiles can also be created for the social networking environment. An identification module identifies when a new entry has been posted on a blog of a members of a social networking group. An analysis module analyzes the new entry in comparison to a group usage profile (or other profiles). A determination module determines whether the new entry deviates from the pattern of activity of the members based on the analysis. If the new entry deviates, a spam detection module detects that the new entry is spam.Type: GrantFiled: March 31, 2009Date of Patent: February 6, 2018Assignee: SYMANTEC CORPORATIONInventor: William Gauvin
-
Patent number: 9811676Abstract: A computer-implemented method for securely providing information external to documents may include identifying a document that may include at least one link to content external to the document, retrieving the content external to the document from the link, converting the content external to the document to embeddable content in a secure format that can be embedded within the document and creating a secure version of the document at least in part by embedding the embeddable content that has been converted to the secure format into the document. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: January 26, 2016Date of Patent: November 7, 2017Assignee: Symantec CorporationInventor: William Gauvin
-
Publication number: 20170005893Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.Type: ApplicationFiled: September 19, 2016Publication date: January 5, 2017Applicant: Symantec CorporationInventor: William GAUVIN
-
Patent number: 9455892Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.Type: GrantFiled: October 29, 2010Date of Patent: September 27, 2016Assignee: Symantec CorporationInventor: William Gauvin
-
Patent number: 9338164Abstract: A system for two-way authentication using two-dimensional codes is provided herein. The system includes a memory and a processor coupled to the memory. The processor is to receive a request from a remote device to access a web resource and to generate a two-dimensional code to be sent from the remote device to an authentication service to authenticate the web resource. The two-dimensional code includes an authentication request identifier. The processor is further to receive an authentication credential from the remote device, the authentication credential being obtained from the authentication service, and to authenticate the user of the remote device to the web resource using the authentication credential.Type: GrantFiled: April 14, 2014Date of Patent: May 10, 2016Assignee: Symantec CorporationInventors: Quentin Liu, William Gauvin, Robert Walters
-
Patent number: 9305170Abstract: A computer-implemented method for securely providing information external to documents may include identifying a document that may include at least one link to content external to the document, retrieving the content external to the document from the link, converting the content external to the document to embeddable content in a secure format that can be embedded within the document and creating a secure version of the document at least in part by embedding the embeddable content that has been converted to the secure format into the document. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 13, 2013Date of Patent: April 5, 2016Assignee: Symantec CorporationInventor: William Gauvin
-
Patent number: 9081938Abstract: A computer-implemented method for determining whether profiles associated with social-networking websites have been compromised may include (1) creating a database of validated-content identifiers that identify valid content published on a social-networking profile, (2) determining, by monitoring the social-networking profile, that at least one item of content has been illegitimately published on the social-networking profile, and then (3) performing at least one security action on the social-networking profile. Various other systems, methods, and computer-readable media are also disclosed.Type: GrantFiled: February 7, 2011Date of Patent: July 14, 2015Assignee: Symantec COrporationInventor: William Gauvin
-
Patent number: 9026601Abstract: A computer-implemented method for validating members of social networking groups may include identifying a named social networking group with a plurality of members on a social networking platform, creating a social graph of the named social networking group based at least in part on a plurality of connections on the social networking platform between a plurality of members of the named social networking group, determining a connecting member of the named social networking group that exceeds a predetermined threshold of connections within the social network group, removing the connecting member of the named social networking group from the social graph, and determining that a disconnected member of the social graph may not be a valid member of the named social networking group, based on the disconnected member not meeting a second predetermined threshold of connections within the social graph. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 12, 2013Date of Patent: May 5, 2015Assignee: Symantec CorporationInventor: William Gauvin
-
Patent number: 8844041Abstract: Detection of network devices (e.g., stealth devices) and mapping network topology are performed via network introspection by collaborating endpoints/nodes. The method includes receiving (e.g., by a node on a network) an assignment to be a supernode that will manage multiple agents of a subnetwork within an overall network. This assigned supernode instructs two or more of the agents to perform a set of network traffic fingerprinting tests of the subnetwork by passing information across the subnetwork to each other. The supernode receives results of the tests from the clients and detects one or more intermediate devices located between the clients based on an effect of the intermediate devices on the information passed between the clients. The supernode can further map the topology of the subnetwork (including the detected devices) which can be used in mapping the overall network topology.Type: GrantFiled: February 26, 2010Date of Patent: September 23, 2014Assignee: Symantec CorporationInventors: Darrell Kienzle, William Gauvin, Matthew Elder, Robert Walters, Adam Schepis, Brian Hernacki
-
Patent number: 8805996Abstract: A communication in a social network involving a social networking profile is detected. One or more catalogs are applied to the communication. Each catalog is associated with an attribute and applying a catalog to the communication produces a catalog score measuring an appropriateness of the associated attribute in the communication. The one or more catalog scores of the one or more catalogs applied to the communication are combined to produce a communication score measuring an appropriateness of the communication. Based on the communication score, a determination is made on whether to issue an alert.Type: GrantFiled: February 12, 2010Date of Patent: August 12, 2014Assignee: Symantec CorporationInventor: William Gauvin
-
Patent number: 8655792Abstract: Content of a private profile/site of a user is derived based on analysis of the user's friend's profiles/sites. A mapping module maps a social networking group with a number of members. A pattern module determines a pattern of publishing activity of each of the members in posting content on sites of other of the members. A profiling module defines a member usage profile for each member based on the pattern. An identification module identifies a private site of a private member of the social networking group to be analyzed. An analysis module analyzes content posted by the private member on public sites of public members of the social networking group. A prediction module predicts responses of the public members to the content posted by the private member based on the member usage profiles of the public members. An estimation module estimates the type and amount of content posted on the private site based on the analysis of the public sites and the prediction based on the member usage profiles.Type: GrantFiled: March 27, 2009Date of Patent: February 18, 2014Assignee: Symantec CorporationInventor: William Gauvin
-
Patent number: 8555357Abstract: Techniques for mitigating forgotten password attacks are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for mitigating forgotten password attacks comprising receiving an indication of a forgotten password communication for a user, identifying verification information associated with the forgotten password communication, determining a level of difficulty of inferring the verification information based on public information associated with the user, and calculating a level of risk associated with the verification information.Type: GrantFiled: September 30, 2011Date of Patent: October 8, 2013Assignee: Symantec CorporationInventor: William Gauvin
-
Patent number: 8347381Abstract: Access of a social networking profile on a social networking website is detected. Characteristics of the social networking profile are analyzed to determine whether the social networking profile is malicious. Responsive to determining that the social networking profile is malicious, the social networking profile is reported as being malicious.Type: GrantFiled: March 30, 2009Date of Patent: January 1, 2013Assignee: Symantec CorporationInventor: William Gauvin
-
Patent number: 8225396Abstract: Computer-implemented methods, systems, and computer-readable media for detecting and warning users about hidden sensitive information contained in webpages are disclosed. In one example, an exemplary method for performing such a task may comprise: 1) identifying a webpage accessed by a web browser on a computing device, 2) detecting, within the webpage, hidden sensitive information that is not visually displayed by the web browser, and then 3) warning a user of the computing device that the webpage contains the hidden sensitive information.Type: GrantFiled: March 27, 2009Date of Patent: July 17, 2012Assignee: Symantec CorporationInventor: William Gauvin
-
Publication number: 20120106366Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Inventor: William Gauvin
-
Patent number: 8104077Abstract: A security gateway is provided to facilitate end-point compliance of connected clients to insure appropriate security levels are maintained. The gateway operates as a policy enforcement point, and, when necessary, is used to apply and/or provide the required level of compliance for a connection on behalf of a requesting client. In one aspect, a specified level of compliance for a given security feature is facilitated, even if the requesting client is not able to meet that level of compliance at the time of the request. An adaptive end-point compliance model measures the requesting client's current level of compliance for one or more software programs on the client and may either require remediation, for example, when knowing that the remediation server is available and responding, or may provide, via a surrogate connection, the necessary level of compliance when remediation is not possible.Type: GrantFiled: January 3, 2006Date of Patent: January 24, 2012Assignee: Symantec CorporationInventors: William Gauvin, Ed Taranto, Steve Zhou
-
Patent number: 7735116Abstract: A unified threat management system is provided with a uniform relational rules model. The unified relational rules model provides for the sub-setting of rules and the ability to derive a result based partially from previous security measurements. The sharing of a security check from one security implementation to another using an object-oriented methodology is facilitated. Security policy is divided into specific security features that result in a security hierarchy. The security features may be considered to be listed sequentially, from bottom to top, and form a relationship with one another. These relationships are used to build a current security measure upon a previous security measure and may be used as a pre-cursor when marshalling data content to be validated.Type: GrantFiled: March 24, 2006Date of Patent: June 8, 2010Assignee: Symantec CorporationInventor: William Gauvin
-
Publication number: 20060156401Abstract: Methods and systems for providing data security scanning in a network. A network device ascertains, based on a network's security policy, security technologies that are should or must be applied to the network traffic. The network device applies the not yet applied security technologies, based on a determination that the not yet applied security technologies are available to the network device. Next, the network device tags the network traffic with a security marker indicating the not yet applied security technologies as applied to reflect the security technologies applied to the network traffic.Type: ApplicationFiled: January 12, 2005Publication date: July 13, 2006Inventors: Keith Newstadt, David Lin, William Gauvin