Patents Assigned to Symantec
-
Patent number: 8176079Abstract: In one example, a server-based system may provide a recursive classification of the contents of a URL by: 1) receiving a request for a URL-classification list associated with a base URL, 2) constructing the URL-classification list, and 3) providing, in response to the request, the URL-classification list. The resulting URL-classification list may comprise: 1) content categories occurring in the base URL and 2) content categories occurring in any URLs embedded in the base URL. In another example, a client-based system may restrict access to network resources, based on the contents of a base URL, by: 1) identifying a request from a user to access a base URL, 2) requesting a URL-classification list associated with the base URL, 3) receiving the URL-classification list, and 4) determining, based on the URL-classification list, that access to the base URL is authorized. Corresponding computer-readable media are also disclosed.Type: GrantFiled: September 23, 2008Date of Patent: May 8, 2012Assignee: Symantec CorporationInventor: Michael Spertus
-
Publication number: 20120109921Abstract: Systems and methods for inode use are presented. In one embodiment; an inode reuse method includes: receiving an indication of an operation that involves access to file related information; assigning an inode to the access; identifying one of a plurality of inode reuse scenarios for the inode; and making the inode available for reuse in accordance with the one of the plurality of inode reuse scenarios. In one embodiment, the one of the plurality of inode reuse scenarios is a relatively expedited reuse scenario. In one exemplary implementation, the relatively expedited inode reuse scenario is utilized if the inode is not required for further processing associated with the operation. The inode can be reused for another immediately subsequent operation.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: SYMANTEC CORPORATIONInventors: Freddy James, Kedar Patwardhan, Sudheer Keshav Chepa
-
Publication number: 20120109897Abstract: Embodiments of the present invention are directed to a method and system for optimizing mirror creation. The method includes receiving, within an electronic system, a request for creating a mirror of a portion of a volume and accessing a data structure comprising information about a plurality of regions of the volume. The method further includes determining a plurality of regions comprising non-zeros of the volume based on the data structure and copying only the plurality of regions comprising non-zeros to create the mirror.Type: ApplicationFiled: October 27, 2010Publication date: May 3, 2012Applicant: SYMANTEC CORPORATIONInventors: Viswesvaran Janakiraman, Chris Chih-Chen Lin, Mohankumar R. Tiruvayapadi
-
Patent number: 8170978Abstract: A computer-implemented method may include identifying a first communication between a child and a contact and categorizing content of the first communication to create a first categorization. The method may also include identifying a second communication between the child and the contact and categorizing content of the second communication to create a second categorization. The method may further include rating, based at least in part on the first and second categorizations, an online relationship of the child and the contact and providing the rating of the online relationship to a guardian of the contact. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 23, 2009Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Keith Newstadt, Adam Schepis
-
Patent number: 8171256Abstract: A method for preventing subversion of address space layout randomization (ASLR) in a computing device is described. An unverified module attempting to load into an address space of memory of the computing device is intercepted. Attributes associated with the unverified module are analyzed. A determination is made, based on the analyzed attributes, whether a probability exists that the unverified module will be loaded into a number of address spaces that exceeds a threshold. The unverified module is prevented from loading into the address space if the probability exists that the unverified module will be loaded into a number of address spaces that exceeds the threshold.Type: GrantFiled: December 22, 2008Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Sourabh Satish, William E. Sobel, Bruce McCorkendale
-
Patent number: 8171272Abstract: Before booting from a main OS into a pre-OS, a pre-OS management component verifies that all critical drivers are present in the pre-OS. The pre-OS management component identifies the hardware devices present on the computer on which the pre-OS is to be booted, and determines which drivers are installed in the pre-OS. If any drivers for critical devices are missing, the pre-OS management component provides a detailed report so that that the user can locate the missing drivers and add them to the pre-OS. In another embodiment, the pre-OS management component automatically obtains and installs the missing drivers.Type: GrantFiled: April 9, 2009Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Robert Craig Chester, Eugene Manko
-
Patent number: 8170991Abstract: Method, apparatus, and computer readable medium for managing an image of a storage volume are described. File extents for each of a plurality of files as defined in an original block layout of the image are obtained. A re-ordered block layout is generated by re-ordering, for each file of the plurality of files, blocks as defined by the original block layout based on the file extents of the respective file such that the blocks are contiguous. Layout metadata indicative of a mapping between the original block layout and the re-ordered block layout is generated. An archive image having the re-ordered block layout and the layout metadata is stored to a sequential storage device.Type: GrantFiled: September 15, 2008Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Nilesh Dhakras, Priyesh Narayanan
-
Patent number: 8170994Abstract: Techniques for virtual archiving are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing virtual archiving comprising applying archiving rules to a backup catalog, generating a virtual archive catalog based at least in part on a result of applying archiving rules to the backup catalog, determining a backup image associated with the virtual archive catalog becoming expired and converting the backup image into an archive image.Type: GrantFiled: October 31, 2007Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Ynn-Pyng Tsaur, William Cochran
-
Patent number: 8171063Abstract: A system and method for efficiently locating and processing data on a deduplication storage system are provided. A logical volume is mapped to a deduplication storage area. The logical volume includes a collection of logical block locations and the deduplication storage area includes a collection of physical block locations. The collection of logical block locations is mapped to the collection of physical block locations. A filesystem organizes the logical volume by organizing the logical block locations into a collection of files. Reverse-mapping information is generated for a logical block location that associates the logical block location with at least one file. In response to receiving a logical block address of a logical block location, at least one file is returned.Type: GrantFiled: June 30, 2009Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Viswesvaran Janakiraman, Bruce Robert Montague
-
Patent number: 8171545Abstract: An anomalous process behavior manager uses statistical information concerning running processes to detect and manage process behavioral anomalies. The anomalous process behavior manager collects per process statistical data over time, such as resource allocation statistics and user interaction statistics. Current collected statistical data is analyzed against corresponding historical statistical data to determine whether processes are behaving in expected ways relative to past performance. Appropriate corrective steps are taken when it is determined that a process is behaving anomalously. For example, the process's blocking exclusions can be revoked, the process can be uninstalled, the process and/or the computer can be scanned for malicious code, the user can be alerted and/or relevant information can be shared with other parties.Type: GrantFiled: February 14, 2007Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Shaun Cooley, Bruce McCorkendale
-
Patent number: 8171289Abstract: A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security.Type: GrantFiled: June 11, 2007Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Joseph A. Adler, David M'Raihi
-
Patent number: 8171406Abstract: A system processes a set of instructions, each of which indicates an action to perform on a user interface. The system does not have prior information concerning the layout of the user interface, nor does the system interact with the user interface through an automation API. For each instruction in the set, the system automatically performs the indicated action on the user interface. To do so, the system identifies the selected control on an active window, and determines whether it is the control to activate in order to perform the indicated action. If so, the system generates an input signal configured to activate the selected control, and sends the input signal to the user interface. If not, the system selects a new control and determines whether it is the desired one. The system cycles through the controls to find the desired one to activate.Type: GrantFiled: August 19, 2009Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Keith Newstadt, Maxim Gubin
-
Patent number: 8170549Abstract: Electronic communication messages are routed according to a user's current physical location and the physical locations of communication devices. A plurality of communication devices such as telephones and computers are associated with the user. The physical locations of the plurality of communication devices are tracked. The current physical location of the user is also tracked in real-time. Incoming communication messages to the user and outgoing communication messages from the user are routed according to routing preferences based on at least the current physical location of the user and physical locations of at least one of the communication devices.Type: GrantFiled: March 15, 2010Date of Patent: May 1, 2012Assignee: Symantec CorporationInventors: Bruce McCorkendale, Shaun Cooley
-
Patent number: 8166261Abstract: A computer-implemented method for seeding a fingerprint cache for data deduplication associated with a single-instance-storage computing subsystem may comprise: 1) maintaining server-side fingerprint usage data for a plurality of fingerprints associated with data stored in the single-instance-storage computing subsystem and 2) building, based at least in part on the fingerprint usage data, a server-side fingerprint cache for use in client-side data deduplication, the server-side fingerprint cache comprising at least a subset of the plurality of fingerprints. The method may further comprise: 1) receiving a request for the server-side fingerprint cache from a client-side data deduplication computing subsystem and 2) transmitting data representative of the server-side fingerprint cache to the client-side data deduplication computing subsystem for use in client-side data deduplication associated with the single-instance-storage computing subsystem.Type: GrantFiled: March 31, 2009Date of Patent: April 24, 2012Assignee: Symantec CorporationInventors: Nick Cremelie, Bastiaan Stougie
-
Patent number: 8165140Abstract: A network address translation gateway provides normal network translation for IP datagrams traveling from a local area network using local IP addresses to an external network, but suspends source service address (port) translation when the port is reserved for a specific protocol, such as the ISAKMP “handshaking” protocol that is part of the IPSec protocol model. ISAKMP exchanges require both source and target computers to use the same service address (port). By providing a network interface that does not translate the source service address (port), this gateway enables the initiation and maintenance of secure, encrypted transmissions using IPSec protocol between a local area network using local IP addresses and servers on the internet.Type: GrantFiled: November 12, 2008Date of Patent: April 24, 2012Assignee: Symantec CorporationInventor: Israel Daniel Sultan
-
Patent number: 8166001Abstract: A method, system and apparatus for mapping of internal corporate policies to operational guidelines, such as regulations, best practice frameworks, and standards, through the use of control statements are provided. In one embodiment, a set of normalized control statements are linked to best practice framework control objectives and regulations pertinent to an organization. The control statements are also linked to an organization's policies; thereby providing a mapping via the control statements between the regulations and best practices those policies are intended to satisfy. Other embodiments provide for a mechanism for organizing, maintaining, tracking, and displaying control statements and the associated operational guidelines.Type: GrantFiled: June 29, 2007Date of Patent: April 24, 2012Assignee: Symantec CorporationInventors: Jay J. Grieves, Brandon S. Dunlap
-
Patent number: 8166476Abstract: Various embodiments of a system and method for accessing a virtual representation of a first physical computer system are disclosed. A first backup image of the first physical computer system may be stored on a server computer system, where the first backup image specifies a first state of the first physical computer system. In response to a request to access a virtual representation of the first physical computer system, a virtual computer may be instantiated from the first backup image on the server computer system. A state of the virtual computer may be modified in response to user input to the virtual computer. A second backup image of the virtual computer may be created, where the second backup image specifies the modified state of the virtual computer. The second backup image may be transferring and applied to the first physical computer system.Type: GrantFiled: August 24, 2007Date of Patent: April 24, 2012Assignee: Symantec CorporationInventors: Steven J. Tolman, Shawn M. Holmstead, H. Gregory Hubert
-
Publication number: 20120095970Abstract: A list of data structures (e.g., inodes) can be accessed, and the data structures in the list can be examined. If a data structure is examined, a counter value associated with the data structure is changed to a generation number that is associated with the examination. Subsequently, the counter values can be used to identify unreferenced data structures. More specifically, the counter value for an unreferenced data structure will be different from the generation number for the most recently performed examination.Type: ApplicationFiled: October 19, 2010Publication date: April 19, 2012Applicant: SYMANTEC CORPORATIONInventors: Nagaraj Shyam, Craig Keatley Harmer, George Mathew
-
Publication number: 20120096535Abstract: A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10?Digit, where Digit is the number of digits in the one time password. The one time password can be validated by a validation server that calculates its own version of the password using K and its own counter value C?. If there is an initial mismatch, the validation server compensate for a lack of synchronization between counters C and C? within a look-ahead window, whose size can be set by a parameter s.Type: ApplicationFiled: December 6, 2011Publication date: April 19, 2012Applicant: Symantec CorporationInventors: Nicolas POPP, David M'RAIHI, Loren HART
-
Publication number: 20120096516Abstract: A request from a software developer is received to digitally sign software included in the request. A security policy associated with the software developer is accessed where the security policy describes criteria for valid request by the software developer. A determination is made whether the request is valid based at least in part on the security policy. The software is digitally signed responsive to the determination indicating that the request is valid. The digitally signed software is provided to the software developer.Type: ApplicationFiled: October 19, 2010Publication date: April 19, 2012Applicant: SYMANTEC CORPORATIONInventors: William E. Sobel, Bruce E. McCorkendale