Patents Assigned to Symantec
  • Patent number: 8015221
    Abstract: A method for maintaining file-type information for a file is described. Data in a first position of a file is analyzed. A file-type for the file is determined based on the analyzed data in the first position. The file is monitored for input/output operations. The file-type of the file is updated if input/output operations occur within the first position of the file.
    Type: Grant
    Filed: November 10, 2008
    Date of Patent: September 6, 2011
    Assignee: Symantec Corporation
    Inventor: Spencer Smith
  • Patent number: 8015284
    Abstract: Bait files and signatures allow security software vendors to track both authorized and unauthorized usage of the security vendor's signatures/products by third party security vendors. A bait file providing module anonymously provides a bait file to a third party security vendor for security detection, where the bait file is a non-malware file. A signature providing module provides a bait signature corresponding to the bait file that is included in a signature database which is made publicly available. A scanner monitoring module monitors security detections made over a period of time by a security scanner operated by the third party vendor. A determination module determines whether the scanner positively detected the bait file following the release of the bait signature for the bait file. A use detection module detects, in response to a positive determination, that the third party vendor used the bait signature provided to detect the bait file.
    Type: Grant
    Filed: July 28, 2009
    Date of Patent: September 6, 2011
    Assignee: Symantec Corporation
    Inventors: Henri Isenberg, Mark Kennedy
  • Patent number: 8015599
    Abstract: A method for provisioning a device such as a token. The device issues a certificate request to a Certification Authority. The request includes a public cryptographic key uniquely associated with the device. The Certification Authority generates a symmetric cryptographic key for the device, encrypts it using the public key, and creates a digital certificate that contains the encrypted symmetric key as an attribute. The Certification Authority sends the digital certificate to the device, which decrypts the symmetric key using the device's private key, and stores the decrypted symmetric key.
    Type: Grant
    Filed: May 19, 2009
    Date of Patent: September 6, 2011
    Assignee: Symantec Corporation
    Inventor: Nicolas Popp
  • Patent number: 8015450
    Abstract: Computer-implemented methods and systems for detecting and automatically installing missing software components are disclosed. In one example, an exemplary method for performing such a task may comprise: 1) detecting a failed attempt by a process to load a shared object, 2) identifying the shared object requested in the failed attempt, 3) automatically obtaining the shared object from a network-accessible storage device, 4) installing the shared object on the computing device, and then 5) successfully loading the shared object.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: September 6, 2011
    Assignee: Symantec Corporation
    Inventors: Shaun Cooley, Keith Newstadt
  • Patent number: 8015430
    Abstract: In one embodiment, a computer accessible medium stores a plurality of instructions including instructions which, when executed: track dependencies among a plurality of assets; and responsive to an identification of an asset for potential recovery (the “selected asset”), identify an asset dependency set corresponding to the selected asset. The asset dependency set comprises at least a subset of the plurality of assets, wherein each asset in the subset has a dependency with the selected asset. In some embodiments, one or more of the following may be provided: tracking asset dependencies and presenting the asset dependency set to the user; pruning the asset dependency set to a recovery set identifying the asset dependency set; generating the recovery order (optionally optimized); initiating the recovery according to the recovery order; performing recovery steps; generating the recovery plan and/or executing recovery plans.
    Type: Grant
    Filed: May 1, 2008
    Date of Patent: September 6, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Branka Rakic, Steven Kappel, Guido Westenberg, Shelley A. Schmokel, Peter A. Barber, Richard L. Harrison
  • Patent number: 8015114
    Abstract: A computer-implemented method for encouraging the renewal of security-software subscriptions may comprise: 1) determining that a security-software subscription for a computing system has expired, 2) after determining that the security-software subscription has expired, continuing to at least periodically retrieve vendor-supplied security updates and to monitor the computing system for potential security threats, 3) detecting at least one security threat to the computing system, 4) notifying a user of the computing system of the security threat, and then 5) prompting the user to renew the security-software subscription. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: September 6, 2011
    Assignee: Symantec Corporation
    Inventor: Carey S. Nachenberg
  • Patent number: 8015432
    Abstract: A method and apparatus for providing failover to a virtualized environment. The method and apparatus comprise a standby node having a virtualized environment that supports a plurality of resource partitions that operate within the standby node upon a failover of a server within a computer system.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: September 6, 2011
    Assignee: Symantec Corporation
    Inventor: Anish Vaidya
  • Publication number: 20110213753
    Abstract: A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster node in accordance with the configuration data. Various other methods, systems, and computer-readable media are also disclosed herein.
    Type: Application
    Filed: February 26, 2010
    Publication date: September 1, 2011
    Applicant: Symantec Corporation
    Inventor: Sarin Sumit Manmohan
  • Publication number: 20110211685
    Abstract: A method for filtering out a spam call includes: transmitting test information to a calling terminal when receiving a call request from the calling terminal; determining whether feedback information corresponding to the test information and generated by the calling terminal in a one-key reply manner is correct; if the feedback information is incorrect, determining the call request as a spam call request, and filtering out the call request. An apparatus, a proxy server and a terminal are further provided, so as to effectively determine whether a call request from a calling terminal is a spam call request initiated by a machine or software, therefore improving the security and accuracy of a test, and reducing the cost as there is no need to install a speech recognition system.
    Type: Application
    Filed: April 27, 2011
    Publication date: September 1, 2011
    Applicant: Chengdu Huawei Symantec Technologies Co., Ltd.
    Inventors: Lifeng LIU, Jian MENG
  • Patent number: 8010961
    Abstract: The inventions relate generally to layered computing systems that provide public access to the content of the layers. Also disclosed herein are prioritization schemes usable in a layered computing system, including prioritization by layer type, by assigned priority weights, by access type, by sub-layers and by read-write indicators. Processes may further be associated to layers from which they originate, and priority given to associated layers thereby. Association may also be provided for installer services, thereby depositing an applications updates into its layer. Layers may also contain file reference information including exclusion or inclusion entries indicating what files may be written thereto. Paths recorded in layers may also embed variables to true paths on a layered system. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.
    Type: Grant
    Filed: January 3, 2006
    Date of Patent: August 30, 2011
    Assignee: Symantec Corporation
    Inventors: Randall Cook, Jared Blaser
  • Patent number: 8011003
    Abstract: A method and apparatus for blocking messages containing pre-selected data is described. In one embodiment, the method includes determining that a message transmitted to a recipient via a network includes pre-selected data. The pre-selected data contains information from at least one random row within the tabular structure of source data. The method further includes preventing an unauthorized transmission of the pre-selected data to the recipient.
    Type: Grant
    Filed: February 14, 2005
    Date of Patent: August 30, 2011
    Assignee: Symantec Corporation
    Inventors: Kevin T. Rowney, Vitali Fridman, Eric Bothwell
  • Patent number: 8010759
    Abstract: Redirecting a data object such as a file block extent. The data object can be redirected from a first memory block to a second memory block, wherein the second memory block includes a copy of modified data of the first memory block. The redirection may occur in response to a request to modify data of the data object. Redirection preserves the prior version of the data object stored in the first memory block to enable restoration of the data object if needed. In one embodiment, a first data object is mapped to a first memory block. A copy of data contents of the first memory block is created. Thereafter, data contained within the copy is modified in accordance, for example, with a request to write data to the first data object. The modified copy is stored in a second memory block, and the first data object is mapped to the second memory block.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: August 30, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Timothy R. Coulter, Raghu Krishnamurthy, Par A. Botes
  • Patent number: 8010609
    Abstract: A method and system to maintain lists of IP addresses for detection of email spam are described. In one embodiment, the method includes receiving email messages from senders associated with Internet Protocol (IP) addresses, filtering the email messages to identify spam, and sending statistics pertaining to the email messages and the identified spam to a server. The method further includes receiving, from the server, IP address lists generated based on the statistics, and filtering new email messages using the IP address lists. The IP address lists received from the server may include a list of safe IP addresses, a list of suspect IP addresses and a list of open proxy IP addresses.
    Type: Grant
    Filed: June 20, 2005
    Date of Patent: August 30, 2011
    Assignee: Symantec Corporation
    Inventors: David Cowings, Sanford Jensen, Carlin Wiegner
  • Patent number: 8010758
    Abstract: Various methods and systems for synchronizing replicas using a single change map are disclosed. One method involves detecting a write to a first region of a volume, while synchronization of the volume with a replica volume is ongoing. If the first region is unsynchronized with respect to a corresponding region of the replica volume, replication of the write is inhibited. Otherwise, the write is replicated. Writes for which replication is inhibited will be applied to the replica volume at a later time as part of the ongoing synchronization.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: August 30, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Angshuman Bezbaruah, Anand Kekre, Ankur Panchbudhe
  • Publication number: 20110208931
    Abstract: A computer-implemented method for enabling replication targets to reclaim unused storage space on thin-provisioned storage systems may include: 1) replicating data from a replication source to a replication target, 2) identifying unused storage space within the replicated data, 3) generating a reclamation request for reclaiming the unused storage space from a thin-provisioned storage system that provides thin-provisioned storage for the replication target, and then 4) issuing the reclamation request to the thin-provisioned storage system in order to reclaim the unused storage space from the thin-provisioned storage system. Various other related systems, methods, and configured computer-readable media are also disclosed.
    Type: Application
    Filed: February 24, 2010
    Publication date: August 25, 2011
    Applicant: Symantec Corporation
    Inventors: Niranjan Pendharkar, Shailesh Vaman Marathe, Venkata Tatavarty
  • Publication number: 20110208923
    Abstract: A storage method and system, a terminal service board, a control board, and a storage channel board are provided. The system includes a terminal service board, a control board, and a storage channel board, where the terminal service board is configured to be connected with a terminal and the control board, process a request from the terminal, and send a processing result to the control board; the control board is configured to encapsulate data required to be stored onto a storage apparatus into a command according to the processing result, and submit the command to the storage channel board; the storage channel board is configured to be connected with the storage apparatus and the control board, and according to the command, store onto the storage apparatus the data required to be stored onto the storage apparatus. The control board becomes more focused on the storage processing, so that the efficiency of use for the control board is improved.
    Type: Application
    Filed: April 22, 2011
    Publication date: August 25, 2011
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Wei ZHANG, Xianhong LV
  • Patent number: 8006116
    Abstract: A computer-implemented method for storing information that identifies the state of health of a computing system at the time a backup of the computing system is created may comprise: 1) identifying a backup of the computing system, 2) performing an evaluation of the computing system's health, and then 3) storing health information that identifies the state of health of the computing system when the backup was created as metadata to the backup. Similarly, a method for determining whether to restore a backup of a computing system based on health information may comprise: 1) identifying a backup of the computing system, 2) identifying health information stored as metadata to the backup that identifies the state of health of the computing system when the backup was created, and 3) determining, based on the health information, whether to restore the backup. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: August 23, 2011
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Sourabh Satish
  • Patent number: 8005929
    Abstract: A computer system and method for updating a software product. A computer system includes at least one client coupled to a server. The server obtains updates of a software product and associates the updates with ports. The server receives a query from a client including a request for a software product update via a first port. In response to receiving the update query, the server opens a connection to the client via the first port and determines if an update is associated with the first port. If an update is associated with the first port, the server conveys a response to the client including an update that is associated with the first port. If an update is not associated with the first port, the server closes the connection. Ports are sequentially numbered. The server maps updates to ports based on timestamps associated with the updates.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: August 23, 2011
    Assignee: Symantec Operating Corporation
    Inventor: Dmitri Okhotski
  • Publication number: 20110202795
    Abstract: Embodiments of the present invention are directed to a method and system for draining or aborting IO requests of a failed system prior to restarting or recovering an application in virtual environments. The method includes detecting, within an electronic system, an application error condition of an application executing on a virtual machine and determining an application restart target. The method further includes sending an input/output (IO) request drain command to a virtual IO server operable to provide storage to the virtual machine and receiving a signal that the IO requests have been drained. The drain command is operable to drain IO requests issued from the application. The application can then be restarted or recovered.
    Type: Application
    Filed: February 12, 2010
    Publication date: August 18, 2011
    Applicant: SYMANTEC CORPORATION
    Inventors: Shailesh Vaman Marathe, Amol Shivram Katkar, Viraj Rajan Kamat
  • Publication number: 20110202734
    Abstract: Systems and methods for backup test restore are presented. In one embodiment a backup restore test method includes performing a backup process; performing a test restore virtual environment creation process, the test restore virtual environment including a plurality of virtual machines; and performing a test of the backup on the test restore virtual environment. The backup process can include backing up information associated with an application; identifying prerequisites associated with running the application; and backing up information associated with the prerequisites. The test restore virtual environment creation process can include gathering information identifying the prerequisites associated with the application; creating the plurality of virtual machines, wherein the plurality of virtual machines includes virtual machines corresponding to physical machines the application and perquisites run on; and bringing up the plurality of virtual machines utilizing the information from the backup process.
    Type: Application
    Filed: February 12, 2010
    Publication date: August 18, 2011
    Applicant: SYMANTEC CORPORATION
    Inventors: Nilesh Dhakras, Aditya Gokhale