Patents by Inventor William Gauvin

William Gauvin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9979725
    Abstract: A system for two-way authentication using two-dimensional codes is provided. The system includes a memory and a processor coupled to the memory. The processor is to generate a two-dimensional code to be used by a user of a mobile device for accessing a remote resource. The processor is to generate the code in response to a request from the remote resource for the code. The processor is further to receive an authentication request from the mobile device to authenticate the remote resource. The authentication request includes information obtained from the two-dimensional code, the information including an authentication request identifier. The processor is also to compare the authentication request identifier to an expected value to create an authentication indication and to transmit the authentication indication and an authentication credential to the mobile device to authenticate the user to the remote resource.
    Type: Grant
    Filed: April 14, 2014
    Date of Patent: May 22, 2018
    Assignee: Symantec Corporation
    Inventors: Quentin Liu, William Gauvin, Robert Walters
  • Patent number: 9893970
    Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.
    Type: Grant
    Filed: September 19, 2016
    Date of Patent: February 13, 2018
    Assignee: SYMANTEC CORPORATION
    Inventor: William Gauvin
  • Patent number: 9886726
    Abstract: Social networking spam is detected using usage profiles for social networking groups. A mapping module maps a social networking group with a number of members. A pattern module determines a pattern of publishing activity of the members in posting information on blogs of other of the members. A profiling module defines a group usage profile for the social networking group based on the pattern. Global usage profiles can also be created for the social networking environment. An identification module identifies when a new entry has been posted on a blog of a members of a social networking group. An analysis module analyzes the new entry in comparison to a group usage profile (or other profiles). A determination module determines whether the new entry deviates from the pattern of activity of the members based on the analysis. If the new entry deviates, a spam detection module detects that the new entry is spam.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: February 6, 2018
    Assignee: SYMANTEC CORPORATION
    Inventor: William Gauvin
  • Patent number: 9811676
    Abstract: A computer-implemented method for securely providing information external to documents may include identifying a document that may include at least one link to content external to the document, retrieving the content external to the document from the link, converting the content external to the document to embeddable content in a secure format that can be embedded within the document and creating a secure version of the document at least in part by embedding the embeddable content that has been converted to the secure format into the document. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 26, 2016
    Date of Patent: November 7, 2017
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Publication number: 20170005893
    Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.
    Type: Application
    Filed: September 19, 2016
    Publication date: January 5, 2017
    Applicant: Symantec Corporation
    Inventor: William GAUVIN
  • Patent number: 9455892
    Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: September 27, 2016
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Patent number: 9338164
    Abstract: A system for two-way authentication using two-dimensional codes is provided herein. The system includes a memory and a processor coupled to the memory. The processor is to receive a request from a remote device to access a web resource and to generate a two-dimensional code to be sent from the remote device to an authentication service to authenticate the web resource. The two-dimensional code includes an authentication request identifier. The processor is further to receive an authentication credential from the remote device, the authentication credential being obtained from the authentication service, and to authenticate the user of the remote device to the web resource using the authentication credential.
    Type: Grant
    Filed: April 14, 2014
    Date of Patent: May 10, 2016
    Assignee: Symantec Corporation
    Inventors: Quentin Liu, William Gauvin, Robert Walters
  • Patent number: 9305170
    Abstract: A computer-implemented method for securely providing information external to documents may include identifying a document that may include at least one link to content external to the document, retrieving the content external to the document from the link, converting the content external to the document to embeddable content in a secure format that can be embedded within the document and creating a secure version of the document at least in part by embedding the embeddable content that has been converted to the secure format into the document. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: April 5, 2016
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Patent number: 9081938
    Abstract: A computer-implemented method for determining whether profiles associated with social-networking websites have been compromised may include (1) creating a database of validated-content identifiers that identify valid content published on a social-networking profile, (2) determining, by monitoring the social-networking profile, that at least one item of content has been illegitimately published on the social-networking profile, and then (3) performing at least one security action on the social-networking profile. Various other systems, methods, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 7, 2011
    Date of Patent: July 14, 2015
    Assignee: Symantec COrporation
    Inventor: William Gauvin
  • Patent number: 9026601
    Abstract: A computer-implemented method for validating members of social networking groups may include identifying a named social networking group with a plurality of members on a social networking platform, creating a social graph of the named social networking group based at least in part on a plurality of connections on the social networking platform between a plurality of members of the named social networking group, determining a connecting member of the named social networking group that exceeds a predetermined threshold of connections within the social network group, removing the connecting member of the named social networking group from the social graph, and determining that a disconnected member of the social graph may not be a valid member of the named social networking group, based on the disconnected member not meeting a second predetermined threshold of connections within the social graph. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: May 5, 2015
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Patent number: 8844041
    Abstract: Detection of network devices (e.g., stealth devices) and mapping network topology are performed via network introspection by collaborating endpoints/nodes. The method includes receiving (e.g., by a node on a network) an assignment to be a supernode that will manage multiple agents of a subnetwork within an overall network. This assigned supernode instructs two or more of the agents to perform a set of network traffic fingerprinting tests of the subnetwork by passing information across the subnetwork to each other. The supernode receives results of the tests from the clients and detects one or more intermediate devices located between the clients based on an effect of the intermediate devices on the information passed between the clients. The supernode can further map the topology of the subnetwork (including the detected devices) which can be used in mapping the overall network topology.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: September 23, 2014
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, William Gauvin, Matthew Elder, Robert Walters, Adam Schepis, Brian Hernacki
  • Patent number: 8805996
    Abstract: A communication in a social network involving a social networking profile is detected. One or more catalogs are applied to the communication. Each catalog is associated with an attribute and applying a catalog to the communication produces a catalog score measuring an appropriateness of the associated attribute in the communication. The one or more catalog scores of the one or more catalogs applied to the communication are combined to produce a communication score measuring an appropriateness of the communication. Based on the communication score, a determination is made on whether to issue an alert.
    Type: Grant
    Filed: February 12, 2010
    Date of Patent: August 12, 2014
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Patent number: 8655792
    Abstract: Content of a private profile/site of a user is derived based on analysis of the user's friend's profiles/sites. A mapping module maps a social networking group with a number of members. A pattern module determines a pattern of publishing activity of each of the members in posting content on sites of other of the members. A profiling module defines a member usage profile for each member based on the pattern. An identification module identifies a private site of a private member of the social networking group to be analyzed. An analysis module analyzes content posted by the private member on public sites of public members of the social networking group. A prediction module predicts responses of the public members to the content posted by the private member based on the member usage profiles of the public members. An estimation module estimates the type and amount of content posted on the private site based on the analysis of the public sites and the prediction based on the member usage profiles.
    Type: Grant
    Filed: March 27, 2009
    Date of Patent: February 18, 2014
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Patent number: 8555357
    Abstract: Techniques for mitigating forgotten password attacks are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for mitigating forgotten password attacks comprising receiving an indication of a forgotten password communication for a user, identifying verification information associated with the forgotten password communication, determining a level of difficulty of inferring the verification information based on public information associated with the user, and calculating a level of risk associated with the verification information.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: October 8, 2013
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Patent number: 8347381
    Abstract: Access of a social networking profile on a social networking website is detected. Characteristics of the social networking profile are analyzed to determine whether the social networking profile is malicious. Responsive to determining that the social networking profile is malicious, the social networking profile is reported as being malicious.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: January 1, 2013
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Patent number: 8225396
    Abstract: Computer-implemented methods, systems, and computer-readable media for detecting and warning users about hidden sensitive information contained in webpages are disclosed. In one example, an exemplary method for performing such a task may comprise: 1) identifying a webpage accessed by a web browser on a computing device, 2) detecting, within the webpage, hidden sensitive information that is not visually displayed by the web browser, and then 3) warning a user of the computing device that the webpage contains the hidden sensitive information.
    Type: Grant
    Filed: March 27, 2009
    Date of Patent: July 17, 2012
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Publication number: 20120106366
    Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.
    Type: Application
    Filed: October 29, 2010
    Publication date: May 3, 2012
    Inventor: William Gauvin
  • Patent number: 8104077
    Abstract: A security gateway is provided to facilitate end-point compliance of connected clients to insure appropriate security levels are maintained. The gateway operates as a policy enforcement point, and, when necessary, is used to apply and/or provide the required level of compliance for a connection on behalf of a requesting client. In one aspect, a specified level of compliance for a given security feature is facilitated, even if the requesting client is not able to meet that level of compliance at the time of the request. An adaptive end-point compliance model measures the requesting client's current level of compliance for one or more software programs on the client and may either require remediation, for example, when knowing that the remediation server is available and responding, or may provide, via a surrogate connection, the necessary level of compliance when remediation is not possible.
    Type: Grant
    Filed: January 3, 2006
    Date of Patent: January 24, 2012
    Assignee: Symantec Corporation
    Inventors: William Gauvin, Ed Taranto, Steve Zhou
  • Patent number: 7735116
    Abstract: A unified threat management system is provided with a uniform relational rules model. The unified relational rules model provides for the sub-setting of rules and the ability to derive a result based partially from previous security measurements. The sharing of a security check from one security implementation to another using an object-oriented methodology is facilitated. Security policy is divided into specific security features that result in a security hierarchy. The security features may be considered to be listed sequentially, from bottom to top, and form a relationship with one another. These relationships are used to build a current security measure upon a previous security measure and may be used as a pre-cursor when marshalling data content to be validated.
    Type: Grant
    Filed: March 24, 2006
    Date of Patent: June 8, 2010
    Assignee: Symantec Corporation
    Inventor: William Gauvin
  • Publication number: 20060156401
    Abstract: Methods and systems for providing data security scanning in a network. A network device ascertains, based on a network's security policy, security technologies that are should or must be applied to the network traffic. The network device applies the not yet applied security technologies, based on a determination that the not yet applied security technologies are available to the network device. Next, the network device tags the network traffic with a security marker indicating the not yet applied security technologies as applied to reflect the security technologies applied to the network traffic.
    Type: Application
    Filed: January 12, 2005
    Publication date: July 13, 2006
    Inventors: Keith Newstadt, David Lin, William Gauvin