Patents Assigned to Symantec
-
Patent number: 8291403Abstract: A system and method for efficient upgrading of computing system software. A computing system includes clients and one or more servers coupled to a network. Cluster server software allows the clients and server(s) to work together as a cluster. This software is platform- and version-specific depending on the customer. Each customer has a customized configuration with customer-dependent edits performed on the original configuration. When a new-release configuration is made available, the three configurations are translated to abstract object trees. A series of predetermined abstract operations are preformed on the abstract object trees in order to generate a target abstract object tree. The target abstract object tree is translated to a target file, wherein the target file includes the common portions between the original and new-release configurations and the merged upgrades of the customized and new-release configurations.Type: GrantFiled: June 30, 2008Date of Patent: October 16, 2012Assignee: Symantec Operating CorporationInventors: Wei Liang Li, Nidhi Yajnik, Shu Guang Yan, Prasanna Kulkarni
-
Patent number: 8290912Abstract: A system and method for efficiently utilizing endpoint virtualization information during backup operations. A computer system includes a backup server that permits the identification, browsing and selecting of files within virtual layers. Examples of virtual layers comprise at least a user data layer, an applications layer, and an operating system layer. Backup messages are sent to a corresponding client computer to backup the selected files or layers. The client computer includes a virtualization agent configured to manage one or more virtual layers in the client. In response to determining the selected data corresponds to a virtual layer of the one or more virtual layers, a backup agent in the client is configured to communicate with the virtualization agent in order to identify one or more files that correspond to the virtual layer, retrieve the one or more files, and send the one or more files to the backup server.Type: GrantFiled: January 29, 2010Date of Patent: October 16, 2012Assignee: Symantec CorporationInventors: Kirk L. Searls, Gregory R. Dowers, II
-
Patent number: 8291055Abstract: A method and apparatus for monitoring message activity comprising processing message activity from a message generator, recording the message activity and coupling the message activity with message information stored within a message distributor and store is described.Type: GrantFiled: September 28, 2007Date of Patent: October 16, 2012Assignee: Symantec CorporationInventors: Peter Barber, Richard Glanville
-
Patent number: 8291170Abstract: A system and method for writing data segments to a backup storage medium. Data segments are sent from multiple clients to a shared backup server. The backup server writes the data segments for each client into separate container files and then flushes the data from the container files into the backup storage medium. After backing up all of the data segments from a single client, the server commits the transaction which includes flushing newly written data from any open files, closing the open files, and updating metadata for the newly written data. To reduce the amount of time needed to commit the transaction, the backup server flushes and closes container files prior to transaction commit time.Type: GrantFiled: August 19, 2010Date of Patent: October 16, 2012Assignee: Symantec CorporationInventors: Xianbo Zhang, Weibao Wu, Haibin She
-
Patent number: 8290911Abstract: A system and method for implementing data deduplication-aware copying of data are provided. In response to a request to copy a source file between a source filesystem and a destination filesystem, file mapping information corresponding to the source file is retrieved. The file mapping information is stored in a source filesystem map. The source filesystem accesses a source logical volume. The source logical volume maps to a deduplication storage area. The destination filesystem accesses a destination logical volume. The destination logical volume maps to the deduplication storage area. The source file comprises data stored in the deduplication storage area. A destination file is allocated, based on the file mapping information, in the destination filesystem. The destination file is mapped to the data stored in the data deduplication storage area.Type: GrantFiled: June 30, 2009Date of Patent: October 16, 2012Assignee: Symantec CorporationInventors: Viswesvaran Janakiraman, Bruce Robert Montague
-
Patent number: 8291497Abstract: A computer-implemented method for facilitating automatic malware signature generation may comprise providing a byte sequence marked for possible inclusion within one or more malware signatures, determining a context diversity of the byte sequence within malware files each containing the byte sequence in accordance with a diversity-based heuristic, and preventing the byte sequence from being included within the one or more malware signatures in accordance with the determined context diversity. Corresponding systems and computer-readable storage media are also disclosed.Type: GrantFiled: March 20, 2009Date of Patent: October 16, 2012Assignee: Symantec CorporationInventors: Kent Griffin, Tzi-cker Chiueh, Scott Schneider
-
Patent number: 8290995Abstract: A method for increasing the QoS in a data center. The method can be employed in first and second components of the data center. In one embodiment, the method includes a first component of the data center receiving first and second requests. The first component generates first and second priority values corresponding to the first and second requests, respectively. The first component processes the first and second requests to generate third and fourth requests, respectively, wherein the first request is processed before the second request if the first priority value is numerically greater than the second priority value, or the first request is processed after the second request if the first priority value is numerically less than the second priority value. A second component of the data center receives the third and fourth requests. The second component generates third and fourth priority values corresponding to the third and fourth requests, respectively.Type: GrantFiled: June 8, 2009Date of Patent: October 16, 2012Assignee: Symantec Operating CorporationInventors: Ron-Chung Hu, Barry Holroyd
-
Patent number: 8291407Abstract: The disclosure is directed to systems and methods for patching computer programs. In one example, a patch is virtually installed to a computing device having a base file system and configuration, a computer program, and a patch layering subsystem. The virtual installation may include storing content of the patch to a patch layer, and generating and storing mapping data defining at least one relationship between the content in the patch layer and content in the base file system and configuration. The virtually installed patch may be enabled, including applying the mapping data to the patch layering subsystem such that the patch layering subsystem is configured for selectively redirecting access requests from the base file system and configuration to the patch layer. In certain embodiments, the enabled patch may be disabled by reversing the application of the mapping data to the patch layering subsystem.Type: GrantFiled: September 17, 2007Date of Patent: October 16, 2012Assignee: Symantec CorporationInventors: Mark A. Greenwood, Randall R. Cook, Scott G. Hopwood, Robert P. Palethorpe
-
Publication number: 20120259819Abstract: A method for file lock recovery in a distributed computer system. The method includes executing a distributed computer system having a plurality of nodes comprising a cluster, and initiating a network file system server migration from one node of the cluster to a different node of the cluster. A migration count is incremented, wherein the migration count is stored at each of the nodes comprising the cluster. File lock services are paused at each of the nodes comprising the cluster. The network file system server migration is completed at the different node of the cluster. The migration count is then decremented in response to the completion. File lock services are then resumed at each of the nodes comprising cluster.Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventors: Kedar Patwardhan, Rachit Chadha, Sushil Patil
-
Publication number: 20120260050Abstract: Storage systems and methods are presented. In one embodiment, a data storage resource management method comprises: performing a data update process, including communicating a data update input output packet between a primary storage resource and a secondary storage resource, wherein corresponding data updates in the secondary storage resource are a mirror of data updates in the primary storage resource; and performing a reclamation process, including: communicating reclamation information in a reclamation input output packet through the same interface as the data update input output packet, wherein the reclamation input output packet is communicated between the primary storage resource and the secondary storage resource; and reclaiming storage locations on the secondary storage resource in accordance with reclamation information in the reclamation input output packet communicated between the primary storage resource and secondary storage resource.Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventor: Kirubakaran Kaliannan
-
Publication number: 20120259823Abstract: A process for reading entries in a directory is initiated. A first index is maintained to indicate how far the read has progressed in the directory. If, during execution of the process, the directory is partitioned into subdirectories, then a second index is maintained for each of the subdirectories to indicate how far the read has progressed in each of the subdirectories. A third index that indicates how far the read has progressed in the partitioned directory is also maintained.Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventors: Anindya Banerjee, Maneesh Pusalkar
-
Publication number: 20120260121Abstract: A first path for forwarding an I/O request from a host device to a disk in a disk array is identified. The first path includes two endpoints (a first initiator endpoint on the host device and a first target endpoint on the disk array) separated by a storage area network. In response to an indication that the first path is non-functional, a second path to the disk for the I/O request is identified as an alternative to the first path. The second path includes a second initiator endpoint and a second target endpoint and is identified by selecting a path from among those paths that have at least one endpoint that is different from the two endpoints of the first path.Type: ApplicationFiled: April 7, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventor: Praveen Kumar Yadav
-
Publication number: 20120260125Abstract: A multi-disk fault-tolerant system, a method for generating a check block, and a method for recovering a data block are provided. The multi-disk fault-tolerant system includes a disk array and a calculation module connected through a system bus, the disk array is formed by p disks, and a fault-tolerant disk amount of the disk array is q; data in the disk array is arranged according to a form of a matrix M of (m+q)×p, where m is a prime number smaller than or equal to p?q; in the matrix M, a 0th row is virtual data blocks being virtual and having values being 0, a 1st row to an (m?1)th row are data blocks, an mth row to an (m+q?1)th row are check blocks. Therefore, during a procedure of generating the check block and recovering the data block in the multi-disk fault-tolerant system, calculation complexity is lowered.Type: ApplicationFiled: February 3, 2012Publication date: October 11, 2012Applicants: University of Electronic Science and Technology of China, CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.Inventors: Yulin WANG, Jianye YAO
-
Publication number: 20120259849Abstract: File management systems and methods are presented. In one embodiment, implementation of a method for determining the accurate ownership of a file within a data system includes: identifying a first plurality of access events for a file, wherein the file is associated with a directory of related files; identifying a second plurality of access events for the related files within the directory, wherein access events in the first and second plurality of access events occur within a period; determining a pool of users accessing files within the directory within the period; and selecting a user from the pool of users as an inferred owner of the file based on access metrics related to the plurality of access events.Type: ApplicationFiled: April 7, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventors: Neha Shirish Deodhar, Jitendra Pore, Ketan Shah
-
Publication number: 20120260036Abstract: Storage management systems and methods are presented. In one embodiment, a storage management method comprises: establishing a cluster including one or more logical unit number storage components (LUNs) communicatively coupled to one or more host nodes, wherein one of the one or more nodes is a master host node; performing a LUN naming process wherein a master host node assigns a name to each of the one or more LUNs respectively, even if the one or more LUNS are communicatively coupled to a slave host node; and operating the cluster, wherein the one or more host nodes refer to the one or more LUNs by the name. In one embodiment, the master host node stores information associated with the name in a computer readable medium. The cluster can include one or more slave host nodes.Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventor: Venkata Sreenivasarao Nagineni
-
Publication number: 20120260040Abstract: A sliding window policy is implemented to manage database objects. At a first time, a first portion of a database object is allocated to a first tier of a multi-tier storage system. The first portion corresponds to a first specified percentage of the size of the database object at the first time and is selected according to information associated with the database object. The remaining portion of the database object at the first time is allocated to one or more other tiers. At a second (later) time, a second portion of the database object is allocated to the first tier. The second portion corresponds to a second specified percentage of the size of the database object at the second time and is also selected according to information associated with the database object. The remaining portion of the database object at the second time is allocated to the other tier(s).Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventors: Raghupathl Mallge, Meher Shah, Gautham Ravi
-
Publication number: 20120259972Abstract: Network resource monitoring systems and methods are presented. In one embodiment, a network resource monitoring method comprises: gathering network resource pre-monitoring information, including information indicating whether a network resource is associated with a zone, and if associated with a zone also gathering information indicating zone type; performing a network resource monitoring process on the network resource based on results of the gathered network resource pre-monitoring information; including performing a network resource monitoring process when the network resource is in a local zone that does not otherwise make available or share information with a global zone; and analyzing the results of the network resource monitoring process. In one embodiment, if the network resource is included in an exclusive IP zone.Type: ApplicationFiled: April 7, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventors: Paresh Bafna, Prasanna Kulkarni
-
Publication number: 20120259820Abstract: A method for file lock recovery in a distributed computer system. The method includes executing a distributed computer system having a plurality of nodes comprising a cluster, and initiating a network file system server fail over from one node of the cluster to an adoptive node of the cluster. File lock services are then stopped at the adoptive node. File lock services are subsequently restarted at the adoptive node, wherein the restart causes the adoptive node to commence a grace period for other network file system clients to connect to the adoptive node and reclaim file locks. After restarting file lock services, a cluster file system is updated on the adoptive node with process identifiers, and file lock services are resumed at the adoptive node. The cluster file system can be simultaneously exposing the file lock services to other clients as well, like CIFS, etc.Type: ApplicationFiled: April 8, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventor: KEDAR PATWARDHAN
-
Publication number: 20120259941Abstract: Embodiments of the present technical solution relate to the technique field of storage, and disclose a server and a method for the server to access a volume. The method comprises: determining, from a first list, a block that needs to be accessed according to an access offset of a volume that needs to be accessed; determining, from a second list, a storage controller corresponding to the block that needs to be accessed according to the determined block; and sending a data reading request or a data writing request to the storage controller corresponding to the block that needs to be accessed to process. Embodiments of the present invention can reduce time delay when the data reading request or the data writing request of the server reaches the block that needs to be accessed.Type: ApplicationFiled: June 18, 2012Publication date: October 11, 2012Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.Inventors: Jiaolin LUO, Guobin ZHANG, Maoyin LIU
-
Publication number: 20120260112Abstract: Power management systems and methods are presented. In one embodiment, implementation of a method for context specific power management of a resource, comprises: defining a context within which a resource operates, wherein the context is defined by one or more parameters; tracking a usage history of the resource operating within the context to determine passive user feedback related to a plurality of timeout values; and determining a timeout value for a current operation of the resource within the context based on the usage history.Type: ApplicationFiled: April 7, 2011Publication date: October 11, 2012Applicant: SYMANTEC CORPORATIONInventor: Anand Kashyap