Patents Assigned to Symantec Corporation
-
Patent number: 9107147Abstract: A computer-implemented method for dynamically modifying rules for selecting suitable mobile networks. The method may include (1) identifying a set of predefined rules for selecting suitable mobile networks with which to connect, (2) obtaining a training data set that includes data about at least one candidate mobile network, (3) using machine learning to dynamically adjust, based at least in part on the training data set, the set of predefined rules, and (4) connecting to a suitable mobile network identified by the dynamically adjusted set of predefined rules. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 11, 2012Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Qingchun Meng, Guilin Hu, Yanjiao Zuo, Xue Feng Tian
-
Patent number: 9104519Abstract: A mobile app is provisioned with an identifier of a specific partner of an app provider, on a sandboxed OS on a mobile device. A link to the app provider's website containing the partner ID is received from the partner's website. The user navigates to the provider's website, which writes a cookie containing the partner ID and redirects to an app store. The app is downloaded to the mobile device, and registers itself with the OS as a protocol handler for a provider specific protocol. The app launches the provider's website, which retrieves the partner ID from the cookie, and returns a redirect to the provider specific protocol. The redirect contains the partner ID, and causes the app to execute as the registered protocol handler for the provider specific protocol. The app reads the partner ID from the redirect, and uses it to provide partner specific features.Type: GrantFiled: June 17, 2013Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Keith Newstadt, Petrus Johannes Viljoen, Anubhav Savant
-
Patent number: 9098706Abstract: A determination is made as to whether a creator of a created executable file is a trusted installer, e.g., a digitally signed installer. Upon a determination that the creator is a trusted installer, the created executable file is defined as a trusted file. By bestowing the trust of a trusted installer to the executable files that the installer creates, suspicious behavior by the created executable files and associated processes, which otherwise would be blocked, is allowed. In this manner, false positives, e.g., blocking of legitimate behavior by the created executable file and associated process(es), are avoided.Type: GrantFiled: July 31, 2006Date of Patent: August 4, 2015Assignee: Symantec CorporationInventor: Mark Kennedy
-
Patent number: 9100191Abstract: A method for forming a digital certificate includes receiving contact information associated with the digital certificate. The contact information includes at least a name, a mailing address, and an email address. The method also includes receiving billing information associated with the digital certificate and receiving a Certificate Signing Request (CSR) for the digital certificate. The method further includes receiving a first name for use in forming the digital certificate and receiving a second name for use in forming the digital certificate. Moreover, the method includes receiving an indication of a vendor of web server software, receiving an indication of a service period for the digital certificate, and forming the digital certificate. The first name is stored in a Subject field of the digital certificate and the second name is stored in the SubjectAltName extension of the digital certificate.Type: GrantFiled: January 25, 2013Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Quentin Liu, Marc Loren Williams, Richard F. Andrews
-
Patent number: 9100426Abstract: A computer-implemented method for warning mobile device users about potentially malicious NFC tags may include (1) obtaining, by a mobile device, NFC-tag information that identifies (i) a geo-location of at least one NFC tag and (ii) a result of at least one malware analysis performed on the NFC tag, (2) determining that the NFC tag includes potentially malicious content based at least in part on the result of the malware analysis performed on the NFC tag, (3) determining that the mobile device is located in proximity of the NFC tag based at least in part on the geo-location of the NFC tag, and then (4) providing an alert that warns a user of the mobile device against scanning the NFC tag due at least in part to the potentially malicious content included in the NFC tag. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 5, 2013Date of Patent: August 4, 2015Assignee: Symantec CorporationInventor: Ke Fang
-
Patent number: 9098392Abstract: A computer-implemented method for changing fencing modes in clusters may include (1) identifying a cluster of nodes configured with a fencing mode for resolving split-brain scenarios within the cluster, (2) identifying a request to reconfigure the cluster of nodes with a new fencing mode, (3) transmitting the request to each node in the cluster of nodes, (4) in response to the request, for each node in the cluster of nodes, testing the operability of the new fencing mode from the node, (5) receiving a message from the node indicating the success of the test; and, after receiving the message indicating the success of the test from every node within the cluster of nodes, and (6) reconfiguring each node within the cluster of nodes to use the new fencing mode. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 29, 2011Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Venu Gopal Gadiraju, Viraj Kamat, Amol Katkar
-
Patent number: 9100246Abstract: Distributed application virtualization provides for the distribution, configuration and control of multiple application components, layered file systems, and configuration settings that may be applied on top of an operating system of each system configured to work in conjunction with other systems within a single distributed virtualization layer. A distributed software virtualization manager or service handles communication between systems within each distributed virtual layer. One distributed virtualization operation activates components, selected based on user-defined parameters, on systems across the network belonging to a selected distributed virtual application layer. Other virtualization operations, whether local and/or distributed, include capturing file system and configuration activity associated with the detected event and storing data representative of the captured file system and configuration activity to a virtual layer, such as a local or distributed application layer.Type: GrantFiled: June 19, 2008Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Lance TeNgaio, Randall R. Cook
-
Patent number: 9100440Abstract: A computer-implemented method for applying data loss prevention policies to closed-storage portable devices may include (1) injecting a data loss prevention component into at least one application process that is running on a computing device, (2) intercepting, via the data loss prevention component, an attempt by the application process to transfer a file to a closed-storage portable device that is connected to the computing device, (3) identifying a data loss prevention policy that applies to the attempt by the application process to transfer the file, (4) determining that the attempt by the application process to transfer the file violates the data loss prevention policy, and (5) performing a security action in response to determining that the attempt by the application process to transfer the file violates the data loss prevention policy. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 4, 2014Date of Patent: August 4, 2015Assignee: Symantec CorporationInventor: Sarin Sumit Manmohan
-
Patent number: 9100190Abstract: A graphical user interface can be provided for creating a digital certificate profile for a digital certificate. In one embodiment, the graphical user interface presents a plurality of certificate profile attributes that are selectable by a user. In one embodiment, a certificate profile preview representing an example certificate to be generated from the digital certificate profile using a subset of the selected certificate profile attributes is generated and a graphical representation of the generated certificate profile preview is provided in the graphical user interface.Type: GrantFiled: February 7, 2012Date of Patent: August 4, 2015Assignee: SYMANTEC CORPORATIONInventors: Stefan Schwengler, Len Toyoshiba
-
Publication number: 20150215319Abstract: An authentication sequencing and normalization module may receive a first authentication associated with a user and assign a level of assurance value to the user based on the first authentication from a first identity service of a specific type. If the user is associated with a second authentication, based on a second identity service of an alternate type, then the level of assurance value assigned to the user may be incremented. Furthermore, access to an application by the user may be allowed if the incremented level of assurance value assigned to the user meets or exceeds a second level of assurance value of a policy assigned to the application. Different users may be authenticated in the authentication sequencing and normalization module by disparate identity services.Type: ApplicationFiled: January 30, 2014Publication date: July 30, 2015Applicant: Symantec CorporationInventors: Robert Koeten, Jeff L. Lowe
-
Publication number: 20150215348Abstract: A virtual identity and context module may generate a virtual identity for a user. Virtual identities for different categories of users may be sourced from disparate identity services. For example, a first authentication of the user provided by a first identity service may be identified. A first virtual attribute field of the virtual identity may be populated or filled based on a first attribute field associated with the first identity service. A second identity service associated with the user may also be identified. A second virtual attribute field of the virtual identity may be populated or filled based on a second attribute field associated with the second identity service. Access to an application may be provided to a user based on the virtual attribute fields of the virtual identity that has been generated for the user.Type: ApplicationFiled: January 30, 2014Publication date: July 30, 2015Applicant: Symantec CorporationInventors: Robert Koeten, Jeff L. Lowe
-
Patent number: 9094291Abstract: A method for calculating a partial risk score for a data object may include identifying a request to calculate a partial risk score for a data object, the request including a partial risk score filter, and the data object being associated with one or more policies. The method may further include for each policy associated with the data object, determining whether characteristics associated with the policy match a parameter in the partial risk score filter, and when the characteristics associated with the policy match information in the partial risk score filter, including a data object risk score associated with the policy in the partial risk score for the data object.Type: GrantFiled: February 28, 2011Date of Patent: July 28, 2015Assignee: Symantec CorporationInventors: Adam Jackson, Peter Lin, Jeremy Mallen
-
Patent number: 9092375Abstract: Various embodiments of a system and method for restoring a data volume to a client computer system from a backup image are disclosed. A backup image at a remote backup server computer system may first be selected as a data source for the volume. The volume may be “instantly restored” on the client computer system without first requiring all of the data in the remote backup image to be transmitted from the backup server computer system. Instead, a lazy restore technique may be used where volume data is retrieved from the backup image on the backup server computer system as needed. Further embodiments of the system and method may enable the data source for the volume to be switched from the remote backup server computer system to a local data source at a later time.Type: GrantFiled: October 24, 2011Date of Patent: July 28, 2015Assignee: Symantec CorporationInventors: Chirag Dalal, Mehtab Ali Syed, Makarand Gawade
-
Patent number: 9092434Abstract: Systems and Methods are disclosed that provide for organizing a first plurality of email documents into a plurality of document groups, reviewing a document group from the plurality of document groups, and associating review content with the document group. Review content may then be propagated to one or more email documents associated with the document group to produce a second plurality of email documents. One or more email documents may be annotated in accordance with the review content. Depending on the embodiment, review content may include text, graphics, audio, tag, and multimedia information. Produced documents can be searched and browsed in accordance with information in the review content. Email documents can be grouped by information in meta information and/or header information associated with the email documents into various groups, including threads or conversations.Type: GrantFiled: July 29, 2008Date of Patent: July 28, 2015Assignee: Symantec CorporationInventors: Mohan Kumar, Gary Lehrman, Hari Krishna Dara
-
Patent number: 9092615Abstract: A method and apparatus for identifying an application source from which an application is installed on a non-rooted computing device. An application source identifier of a security application that does not have root access to an operating system monitors for an application installation. The application source identifier extracts a process identifier (PID) of the application being installed from a log message associated with the application installation and determines a package name from the PID. The PID identifies an application source from which the application is installed. The application source identifier receives, based on the package name, a confidence level for the application source from a security service over a network.Type: GrantFiled: January 28, 2013Date of Patent: July 28, 2015Assignee: SYMANTEC CORPORATIONInventors: Jun Mao, Abubakar Wawda
-
Patent number: 9092248Abstract: A computer-implemented method for restoring distributed applications within virtual data centers may include (1) receiving a request to restore a distributed application that includes at least one virtual machine to a virtual data center, (2) identifying a backup of the virtual machine stored within backup storage, (3) exposing the backup of the virtual machine stored within the backup storage to a hypervisor, (4) regenerating the virtual machine by accessing the backup of the virtual machine at the backup storage, (5) adding the virtual machine to the distributed application, and (6) restoring, before completely recovering the virtual machine from the backup storage to the datastore of the virtual data center, the distributed application by starting the virtual machine as part of the distributed application. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 21, 2013Date of Patent: July 28, 2015Assignee: Symantec CorporationInventors: Gaurav Makin, James Olson, Sinh Nguyen, John Kjell
-
Patent number: 9087189Abstract: A cloud service access and information gateway receives, from a user device, a request to access a cloud service. The cloud service access and information gateway compares a security status of the user device to a network access control policy for the cloud service. If the security status satisfies a condition of the network access control policy, the cloud service access and information gateway grants the user device access to the cloud service. If the security status does not satisfy the condition of the network access control policy, the cloud service access and information gateway requests an update to the security status of the user device to satisfy the condition.Type: GrantFiled: December 30, 2011Date of Patent: July 21, 2015Assignee: Symantec CorporationInventors: Robert Koeten, Nicolas Popp
-
Patent number: 9087069Abstract: A computer-implemented method for duplicating backup images may include (1) identifying at least one storage device, (2) identifying a plurality of backup images to be duplicated to the storage device, (3) creating a composite image of the plurality of backup images, and then (4) storing the composite image on the storage device instead of duplicating the plurality of backup images to the storage device. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: October 25, 2010Date of Patent: July 21, 2015Assignee: Symantec CorporationInventors: Alioune Thiam, Raman Sckhon
-
Patent number: D735729Type: GrantFiled: December 13, 2012Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Gregory R. Dowers, II, Thomas E. Weaver
-
Patent number: D735730Type: GrantFiled: December 13, 2012Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Gregory R. Dowers, II, Thomas E. Weaver, Jessica Rich, Robert Santiago