Abstract: A lock is acquired on a data structure. Content in the data structure is read and verified while the lock is held. The lock is then released, and then the file system components that are referred to by the data structure are verified. In essence, a file system consistency check of the file system components is performed offline in the background while the data structure remains accessible.
Type:
Application
Filed:
October 19, 2010
Publication date:
April 19, 2012
Applicant:
SYMANTEC CORPORATION
Inventors:
Nagaraj Shyam, Craig Keatley Harmer, George Mathew
Abstract: Methods, apparatuses, and computer-readable media for protecting confidential data on a network. An embodiment of the inventive method comprises the steps of: monitoring 110 data directed to a website; identifying 120 a data string having at least one confidential characteristic; categorizing the data string with a categorization level; examining 140 the website for at least one characteristic consistent with confidential data; creating 155 a website characteristic profile; comparing 170 the website characteristic profile with the data string's categorization level for compatibility; and determining 180 whether the data string can be communicated to the website.
Type:
Grant
Filed:
September 17, 2010
Date of Patent:
April 17, 2012
Assignee:
Symantec Corporation
Inventors:
William E. Sobel, Bruce McCorkendale, Richard Willey
Abstract: A method and apparatus for using expiration information to improve confidential data leakage prevention is described. In one embodiment, a method for protecting confidential data from disclosure using expiration information, comprises processing the expiration information that is associated with a data specification for the confidential data, wherein the expiration information defines a time period in which the confidential data ceases to be confidential and examining the time period to determine an expiration of the data specification.
Abstract: A method and apparatus for efficient token matching using complex rules. In one embodiment, the method and apparatus comprises searching a token stream to determine an earliest, narrowest token match range within a token stream.
Abstract: A method and apparatus for routing a data stream through a plurality of data movers independent of a network interface type is provided. In one embodiment, the method for routing the data stream to a destination with indifference to network interface type includes segregating the data stream into a plurality of data blocks at an application layer, wherein the plurality of data blocks are to be routed to a destination through the plurality of data movers and coordinating data path selection for communicating the plurality of data blocks to the plurality of data movers over a plurality of data paths.
Type:
Grant
Filed:
December 18, 2008
Date of Patent:
April 17, 2012
Assignee:
Symantec Corporation
Inventors:
Jeremy Dean Swift, Stephan Kurt Gipp, Adonijah Park
Abstract: A computer-implemented method for determining, in response to an event of interest, whether to perform a real-time file scan by examining the full context of the event of interest may comprise: 1) detecting an event of interest, 2) identifying at least one file associated with the event of interest, 3) accessing contextual metadata associated with the event of interest, 4) accessing at least one rule that comprises criteria for determining, based on the event of interest and the contextual metadata, whether to perform a security scan on the file, and then 5) determining, by applying the rule, whether to perform the security scan on the file. Corresponding systems and computer-readable media are also disclosed.
Abstract: A method for managing coordinate geometry information for a user interface template to be applied to multiple languages is described. Strings of text in a file are translated from a first language to a pseudo language. Data field sizes associated with a first user interface are analyzed. The first user interface is in the first language. The data fields are resized to match strings of text sizes if the data field sizes of the data fields do not match strings of text sizes. A user interface template is stored with data field geometry information that indicates the data field sizes. Language specific data field geometry information is also stored that indicated the data field sizes.
Abstract: A data backup processing method is provided, which includes: numbering at least one data storage node in a data storage device, in which the data storage node includes a primary storage area and a backup storage area, and the primary storage area of the data storage node and a backup storage area of a next adjacently numbered data storage node are logically connected, so that a number of data storage nodes form a ring structure with sequential logical connection; and respectively backing up the data stored in a primary storage area of a random data storage node into a backup storage area of at least one next adjacently numbered data storage node of the data storage node in the ring structure. Therefore, data redundancy may be provided for users among a random number of disks, thereby effectively guaranteeing the security of user data and achieving high flexibility and practicability.
Abstract: A method for synchronizing, using at least one processor, a physical machine with a virtual machine while the virtual machine is operational in memory is disclosed. In one embodiment, the method includes monitoring a physical machine that utilizes a physical disk for storing computer data, consolidating a virtual disk with modifications to the physical disk, wherein the modifications to the physical disk are replicated on the virtual disk in response to unavailability of the physical machine, operating a virtual machine that utilizes the virtual disk for storing the computer data and migrating the virtual machine, using the virtual disk, to a computer.
Abstract: A method for implementing an online transaction security product includes downloading an online transaction security product program from a web site to an information handling system. The security product program includes an anti-malicious code program configured to detect malicious code on the information handling system. Lastly, the security product program is executed, wherein the anti-malicious code program of the security product program operates to detect malicious code on the information handling system.
Type:
Grant
Filed:
February 11, 2008
Date of Patent:
April 10, 2012
Assignee:
Symantec Corporation
Inventors:
Michael Tony Alagna, Mark Obrecht, Andy Payne, Peter Norwood
Abstract: Techniques for efficient restoration of granular application data are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for restoring one or more portions of application data comprising virtualizing one or more backup files of the application data into a specified staging area, running a recovery process for the one or more backup files, virtualizing the one or more backup files and the one or more recovery files, instantiating an instance of an application utilizing the virtualized one or more backup files and the virtualized one or more recovery files, and recovering one or more portions of the application data.
Abstract: A method of facilitating a blind referral comprising producing a referral communication for referring a client computer from a connection with a first server to a second server, wherein the referral communication comprises first server information defining a location of the first server, generating a placeholder for the first server information in the referral communication, and replacing the first server information with the placeholder in communications with the second server during the referral communication.
Abstract: A method, device and system for storing data in a cache in case of power failure are disclosed. The method includes: in case of power failure of a storage system, receiving configuration information from a central processing unit (CPU); establishing a mapping relationship between an address of data in the cache and an address in a storage device according to the configuration information; sending a signaling message that carries the mapping relationship to the cache, so that the cache migrates the data to the storage device according to the signaling message.
Abstract: A validation system validates the detection of spam based entities in social networking contexts. Suspected spam based social networking entities are detected in a social networking site. A virtual social networking group is created that emulates a plurality of user profiles on the social networking site, including a user profile comprising a suspected spam based entity. A link in an emulated suspected spam based entity in the created virtual social networking group is invoked, resulting traffic is emulated, and the results are monitored. Responsive to the monitored results, it is determined whether to validate the suspected spam based entity. A validation indication specifying at least whether the suspected spam based entity has been validated can be stored for future reference, and/or transmitted to, e.g., the social networking site or a centralized security service.
Abstract: Various methods and systems are presented to restore a logical data object from a backup to a working copy, in a manner that allows for the return of the working copy to a prior state of the working copy. One such method and system copies data to a restore backup of a working copy, by copying (sequentially, or in parallel) portions of a version of the logical data object from the working copy to the restore backup.
Abstract: In-band commands may be associated with a particular consistency interval and may indicate requested actions to be performed for that consistency interval. An application may desire to perform actions, such as additional backup, snapshots, etc. on stored data, when that data is in a consistent state from the application's point of view. In order to ensure that the data is in a consistent state, a consistency interval may be created on demand. A node may request a consistency interval by sending a consistency request message to a consistency interval coordinator, which in turn, establishes the consistency interval with all nodes in the distributed environment. After sending all write requests for the consistency interval, the node may then send the command message. Command messages may be stored in consistency logs along with write requests and a replication target, or other device, may read both the write requests and the command message.
Abstract: Visual images of computer components are provided to remotely guide users through the process of setting up physical connections. Component identifying information is automatically gleaned and provided from a user's computer to a remote administrator. The administrator provides visual images of the components to the user, and remotely annotates them to guide the user through the configuration process. Image annotation can include pointing to a specific section of the image (e.g., the plug into which a cable is to be inserted) and/or drawing or writing on or otherwise marking-up the image to direct the user's attention. The visual image-based guidance can be supplemented by voice communication with the user.
Type:
Grant
Filed:
December 21, 2007
Date of Patent:
April 3, 2012
Assignee:
Symantec Corporation
Inventors:
Brian Hernacki, Sourabh Satish, Timothy G. Brown
Abstract: The disclosure is directed to systems, apparatus, and methods for geolocation-based application streaming. In one example, a system may include a geolocation service that determines the location of a client, and an application server that streams one or more applications to the client on request. The application server may use the location provided by the geolocation service to select an application streaming profile indicating application modules to be initially streamed to clients for that geolocation. After the initial program modules have been streamed to the client, the application server services requests from the client for additional application modules. The application server may log application module requests to create or modify application streaming profiles that specify the application modules to be initially streamed to clients at a particular geolocation. The client or a web server may also specify the application streaming profile to be used by the application server.
Abstract: Method and apparatus for file sharing between continuous and scheduled backups is described. One example relates to backing up source data stored by a computer system. A first portion of the source data is backed up at points in time in response to a backup schedule to produce a plurality of partial backups. A second portion of the source data is backed up continuously in response to changes of the second portion to maintain a replica of the second portion. The replica of the second portion is linked to the plurality of partial backups to produce a respective plurality of full backups of the source data.
Abstract: The disclosure is directed to systems and methods for customizing boot disk images using prioritization. In one example, a series of source files are copied to a staging area. Earlier received files are overridden by later received files of the same name. Pre-boot operating system files are copied first, followed by a software manufacturer's supplied files, then an original equipment manufacturer's supplied files, and finally user supplied files. Since each file is overridden by a later one, the prioritizing of copies to the staging area presents a prioritized file structure to create a boot disk image. Commands are run to further modify the files. The files are compiled into a boot disk image.