Patents Assigned to Symantec
  • Patent number: 8281363
    Abstract: A computer-implemented method may include receiving a request to access a network. The request may be sent from a virtual machine. The method may also include proxying the request to a network-access-control module, receiving a response from the network-access-control module, and transmitting the response to the virtual machine. Proxying the request to the network-access-control module may include assigning the virtual machine a virtual identifier. Proxying the request may also include creating a temporary interface. The temporary interface may be programmed to receive the response from the network-access-control module and transmit the response to the virtual machine. Various other methods, systems, and computer-readable media are also disclosed herein.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Brian Hernacki, Bruce McCorkendale, William E. Sobel
  • Patent number: 8281143
    Abstract: Various methods and systems for protecting against chosen plaintext attacks when encrypting data for storage on an untrusted storage system are disclosed. One method involves generating an encryption key for use in encrypting data and generating an identifier for the data. Generation of the encryption key is based upon a hash of the data to be encrypted. The method also involves detecting whether an encrypted copy of the data is already stored by a storage system, based upon the identifier. The method also modifies the data to be encrypted or the encryption key, based upon a client-specific value, prior to generating the identifier.
    Type: Grant
    Filed: September 29, 2008
    Date of Patent: October 2, 2012
    Assignee: Symantec Operating Corporation
    Inventors: Thomas G. Clifford, Weibao Wu
  • Patent number: 8281159
    Abstract: A computer-implemented method for managing power usage of a computing device based on power-management information from a power grid may comprise: 1) receiving power-management information from a power grid, 2) identifying power-usage requirements of the computing device, and then 3) determining, by analyzing the power-management information and the power-usage requirements of the computing device, whether to adjust power usage of the computing device. The method may also comprise adjusting the power usage of the computing device in accordance with the power-management information. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 11, 2008
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Shaun Cooley, Keith Newstadt
  • Patent number: 8281096
    Abstract: A computer-implemented method for creating snapshots may include identifying a request to take a snapshot of a primary volume of data. The computer-implemented method may also include identifying a write-once block device configured to receive data for the snapshot. The computer-implemented method may further include identifying an attempt to write to a block of the primary device. The computer-implemented method may additionally include copying the block to the write-once block device before allowing the write attempt to write to the block of the primary volume. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 2, 2010
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventor: Dilip Ranade
  • Patent number: 8281093
    Abstract: A computer-implemented method for creating consolidated backups of snapshot hierarchies may include identifying a hierarchy of snapshots. The computer-implemented method may also include copying data in a root snapshot of the hierarchy to a backup. The computer-implemented method may further include, for each child snapshot in the hierarchy, copying valid data in the child snapshot to the backup. The computer-implemented method may additionally include copying information that identifies a parent of the child snapshot to the backup. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Sasidharan Krishnan, Suhas Urkude
  • Patent number: 8279869
    Abstract: Various systems and methods for exchanging communications between devices coupled by an address translation device are disclosed. These techniques can be used to facilitate automatic relationship discovery. One method involves extracting a sequence number from a TCP acknowledgment message being conveyed from a network interface to a TCP stack, and then sending a new TCP message, which includes the sequence number.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: October 2, 2012
    Assignee: Symantec Operating Corporation
    Inventors: Cuong Huu Tran, Veeral P Shah, Jeffrey J Anuszczyk, Hans F. van Rietschote
  • Patent number: 8280853
    Abstract: System and method for tracking statistics at the subfile level and transparently placing or migrating inactive or less active blocks of data to other storage devices. Embodiments may provide mechanisms to track statistics at the subfile level of files including, but not limited to, database files, and to transparently place or migrate inactive or less active blocks of data of the files from higher-performing, typically more expensive, storage to lower-performing, typically less expensive, storage, while placing or migrating active blocks of data of the files to higher-performing storage, based on the subfile-level statistics rather than on file-level timestamps. In some embodiments, knowledge of file structure (e.g., database file structure), for example knowledge of database partitions with header blocks and data blocks in databases using data partitioning, may be used to separate more active and less active blocks of data of files onto storage with different performance and/or other characteristics.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: October 2, 2012
    Assignee: Symantec Operating Corporation
    Inventors: Xinyi David Lai, Par Botes, HanCheng Hsiung
  • Patent number: 8281071
    Abstract: A computer-implemented method for managing cluster node connectivity information. The method may include maintaining a set of cluster nodes of a clustered application. The method may also include, for each node in a set of cluster nodes, determining a connectivity state of the cluster node and transmitting, from the cluster node to non-volatile Random Access Memory (“RAM”) of a cluster disk, connectivity information that indicates the connectivity state of the cluster node. The method may further include accessing, from a remote system, the non-volatile RAM of the cluster disk to retrieve connectivity information of one or more cluster nodes from the set of cluster nodes. The method may include using the connectivity information to inform the remote system of the connectivity state of the one or more cluster nodes. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 26, 2010
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Taher Vohra, Abhay Singh
  • Patent number: 8281403
    Abstract: A computer-implemented method for evaluating the health of computing systems based on when operating-system changes occur is disclosed. In one example, this method may include: 1) identifying an operating-system change made to a computing system, 2) determining when the operating-system change occurred, and then 3) assessing the health of the computing system based at least in part on when the operating-system change occurred. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 2, 2009
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Daniel Asheghian, Robert Conrad, Christopher Peterson, Chris Sakuma
  • Patent number: 8280830
    Abstract: An exemplary method for using multiple in-line heuristics to reduce false positives may include: 1) training a first heuristic using a set of training data, 2) deploying the first heuristic, 3) identifying false positives produced by the first heuristic during deployment, 4) modifying the training data to include the false positives produced by the first heuristic, 5) creating a second heuristic using the modified training data, 6) deploying both the first heuristic and the second heuristic, and then 7) applying both the first heuristic and the second heuristic, in sequence, to a set of field data.
    Type: Grant
    Filed: August 31, 2009
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventor: Mark Kennedy
  • Patent number: 8281410
    Abstract: A computer-implemented method may provide resource-access information. The computer-implemented method may include determining a resource-access scope of a software application and determining whether a resource is within the resource-access scope. The computer-implemented method may also include retrieving resource information associated with the resource from a resource-information database and providing a notification that indicates whether the resource is within the resource-access scope. The notification may comprise the resource information. Additional computer-implemented methods and systems are also disclosed.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Brian Hernacki
  • Patent number: 8281388
    Abstract: A portable storage device contains a real time clock, an onboard power source and secure storage. These components enable the device to securely store data and control access thereto. A secret key can be maintained in secure storage, such that access to the device can be denied to external systems that do not have a matching key. A log detailing connections can also be maintained in secure storage, such that device activity can be accurately documented, and made available in a trusted manner to a management system. Furthermore, the onboard real time clock allows stored data to be encrypted and decrypted in conjunction with specified time periods, such that a session key is destroyed after a time out, or is not made available until a given period of time has transpired.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Brian Hernacki
  • Patent number: 8280854
    Abstract: A computer-implemented method for relocating deduplicated data within a multi-device storage system. The method may include identifying a set of deduplicated data units stored on a first device of the multi-device storage system. Each data unit in the set of data units is referred to by one or more deduplication references. The method may also include procuring reference data that indicates, for each data unit in the set of deduplicated data units, the number of deduplication references that point to the data unit. The method may further include using the reference data to select one or more data units from the set of deduplicated data units for relocation to a second device in the multi-device storage system and relocating the one or more data units to the second device in the multi-device storage system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 1, 2009
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventor: Travis Emmert
  • Publication number: 20120246721
    Abstract: Aspects of the invention relate to a method, apparatus, and computer readable medium for determining software trustworthiness. In some examples, a software package identified as including at least one file of unknown trustworthiness is installed on a clean machine. A report package including a catalog of files that have been installed or modified on the clean machine by the software package is generated. Identification attributes for each of the files in the catalog is determined. Each of the files in the catalog is processed to assign a level of trustworthiness thereto. The report package is provided as output.
    Type: Application
    Filed: June 4, 2012
    Publication date: September 27, 2012
    Applicant: SYMANTEC CORPORATION
    Inventor: Pieter VILJOEN
  • Publication number: 20120246598
    Abstract: A computer-implemented method for displaying trustworthiness classifications for files as visually overlaid icons may include (1) identifying a file, (2) identifying a file icon that graphically represents the file within a file manager interface on a computing device, (3) obtaining a trustworthiness classification assigned to the file that identifies the trustworthiness of the file, and then (4) visually overlaying the file icon with a trustworthiness icon that graphically represents the trustworthiness classification assigned to the file. Various other systems, methods, and computer-readable media are also disclosed.
    Type: Application
    Filed: May 6, 2011
    Publication date: September 27, 2012
    Applicant: Symantec Corporation
    Inventor: Aravinthan Narayanan
  • Patent number: 8275864
    Abstract: A first node in the network may broadcast a recovery request via one or more links to one or more other nodes. The recovery request may specify a first address, where the first address is associated with one or more nodes in the network. Nodes may receive and forward the recovery request until every node with which the first address is associated receives the recovery request and returns a recovery response. The recovery responses may be used to create route information for routing a message to each node with which the first address is associated.
    Type: Grant
    Filed: December 20, 2002
    Date of Patent: September 25, 2012
    Assignee: Symantec Operating Corporation
    Inventors: Gregory L. Slaughter, Thomas Saulpaugh
  • Patent number: 8275842
    Abstract: Systems and methods for detecting content similarity in email documents are disclosed. In one embodiment, a method comprises generating a first token value for each of a plurality of character sequences of a first email document, selecting a first subset of the plurality of character sequences based on the first token values, and generating one or more hash values corresponding to the selected first subset of character sequences. The method further comprises generating a second token value for each of a plurality of character sequences of a second email document, selecting a second subset of the plurality of character sequences based on the second token values, and generating one or more hash values corresponding to the selected second subset of character sequences. The method additionally comprises comparing the one or more hash values corresponding to the selected first subset with the one or more hash values corresponding to the selected second subset.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: September 25, 2012
    Assignee: Symantec Operating Corporation
    Inventor: Tsuen Wan Ngan
  • Patent number: 8275743
    Abstract: A method and apparatus for securing data volumes to a remote computer using journal volumes is provided. In one embodiment, a method for securing data volumes in memory to a remote computer using at least one processor includes accessing at least one data volume and at least one journal volume, replicating the at least one journal volume after each operation of a plurality of file system operations associated with the at least one data volume and creating at least one data volume copy at a remote computer using the at least one replicated journal volume.
    Type: Grant
    Filed: August 10, 2009
    Date of Patent: September 25, 2012
    Assignee: Symantec Corporation
    Inventor: Suhas Ashok Dantkale
  • Publication number: 20120239804
    Abstract: A method, a device, and a system for backup are disclosed. The method includes: receiving a backup packet; analyzing the backup packet to obtain a serial number of an active data packet, where the serial number is carried in the backup packet; calculating a sum of the serial number of the active data packet and a specific increment value to obtain a serial number of a standby data packet; and backing up the serial number of the standby data packet. Therefore, after the service is switched over from the active device to the standby device, the active device still regards the data packet sent by the former standby device as a new data packet and receives the data packet, which prevents service interruption caused by the switchover and improves continuity of service processing in the process of two-node cluster hot backup.
    Type: Application
    Filed: May 25, 2012
    Publication date: September 20, 2012
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD
    Inventors: Jun LIU, Wenhui XIE
  • Publication number: 20120240076
    Abstract: A system and method for notification management includes collecting information for a number of objects within a management tool for security assets. The display of the information is displayed on a window of a graphical user interface of the management tool. In response to user interaction with the graphical user interface, a notification tool window of a notification tool is displayed. The notification tool window is layered over at least a portion of the window of the graphical user interface. In response to user interaction with the notification tool window, notification instructions are created for at least one of the number of objects based on a portion of the information of the window of the graphical user interface. The notification instructions are operable to cause the notification tool to communicate at least one notification communication to at least one recipient concerning at least one object.
    Type: Application
    Filed: March 15, 2011
    Publication date: September 20, 2012
    Applicant: SYMANTEC CORPORATION
    Inventors: Fei Xing Tuang, Maryam Najafi, Christopher David Lawson, Alexander Antido Cayetano