Patents Assigned to Symantec
-
Patent number: 8015221Abstract: A method for maintaining file-type information for a file is described. Data in a first position of a file is analyzed. A file-type for the file is determined based on the analyzed data in the first position. The file is monitored for input/output operations. The file-type of the file is updated if input/output operations occur within the first position of the file.Type: GrantFiled: November 10, 2008Date of Patent: September 6, 2011Assignee: Symantec CorporationInventor: Spencer Smith
-
Patent number: 8015284Abstract: Bait files and signatures allow security software vendors to track both authorized and unauthorized usage of the security vendor's signatures/products by third party security vendors. A bait file providing module anonymously provides a bait file to a third party security vendor for security detection, where the bait file is a non-malware file. A signature providing module provides a bait signature corresponding to the bait file that is included in a signature database which is made publicly available. A scanner monitoring module monitors security detections made over a period of time by a security scanner operated by the third party vendor. A determination module determines whether the scanner positively detected the bait file following the release of the bait signature for the bait file. A use detection module detects, in response to a positive determination, that the third party vendor used the bait signature provided to detect the bait file.Type: GrantFiled: July 28, 2009Date of Patent: September 6, 2011Assignee: Symantec CorporationInventors: Henri Isenberg, Mark Kennedy
-
Patent number: 8015599Abstract: A method for provisioning a device such as a token. The device issues a certificate request to a Certification Authority. The request includes a public cryptographic key uniquely associated with the device. The Certification Authority generates a symmetric cryptographic key for the device, encrypts it using the public key, and creates a digital certificate that contains the encrypted symmetric key as an attribute. The Certification Authority sends the digital certificate to the device, which decrypts the symmetric key using the device's private key, and stores the decrypted symmetric key.Type: GrantFiled: May 19, 2009Date of Patent: September 6, 2011Assignee: Symantec CorporationInventor: Nicolas Popp
-
Patent number: 8015450Abstract: Computer-implemented methods and systems for detecting and automatically installing missing software components are disclosed. In one example, an exemplary method for performing such a task may comprise: 1) detecting a failed attempt by a process to load a shared object, 2) identifying the shared object requested in the failed attempt, 3) automatically obtaining the shared object from a network-accessible storage device, 4) installing the shared object on the computing device, and then 5) successfully loading the shared object.Type: GrantFiled: March 26, 2009Date of Patent: September 6, 2011Assignee: Symantec CorporationInventors: Shaun Cooley, Keith Newstadt
-
Patent number: 8015430Abstract: In one embodiment, a computer accessible medium stores a plurality of instructions including instructions which, when executed: track dependencies among a plurality of assets; and responsive to an identification of an asset for potential recovery (the “selected asset”), identify an asset dependency set corresponding to the selected asset. The asset dependency set comprises at least a subset of the plurality of assets, wherein each asset in the subset has a dependency with the selected asset. In some embodiments, one or more of the following may be provided: tracking asset dependencies and presenting the asset dependency set to the user; pruning the asset dependency set to a recovery set identifying the asset dependency set; generating the recovery order (optionally optimized); initiating the recovery according to the recovery order; performing recovery steps; generating the recovery plan and/or executing recovery plans.Type: GrantFiled: May 1, 2008Date of Patent: September 6, 2011Assignee: Symantec Operating CorporationInventors: Branka Rakic, Steven Kappel, Guido Westenberg, Shelley A. Schmokel, Peter A. Barber, Richard L. Harrison
-
Patent number: 8015114Abstract: A computer-implemented method for encouraging the renewal of security-software subscriptions may comprise: 1) determining that a security-software subscription for a computing system has expired, 2) after determining that the security-software subscription has expired, continuing to at least periodically retrieve vendor-supplied security updates and to monitor the computing system for potential security threats, 3) detecting at least one security threat to the computing system, 4) notifying a user of the computing system of the security threat, and then 5) prompting the user to renew the security-software subscription. Corresponding systems and computer-readable media are also disclosed.Type: GrantFiled: December 30, 2008Date of Patent: September 6, 2011Assignee: Symantec CorporationInventor: Carey S. Nachenberg
-
Patent number: 8015432Abstract: A method and apparatus for providing failover to a virtualized environment. The method and apparatus comprise a standby node having a virtualized environment that supports a plurality of resource partitions that operate within the standby node upon a failover of a server within a computer system.Type: GrantFiled: September 28, 2007Date of Patent: September 6, 2011Assignee: Symantec CorporationInventor: Anish Vaidya
-
Publication number: 20110213753Abstract: A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster node in accordance with the configuration data. Various other methods, systems, and computer-readable media are also disclosed herein.Type: ApplicationFiled: February 26, 2010Publication date: September 1, 2011Applicant: Symantec CorporationInventor: Sarin Sumit Manmohan
-
Publication number: 20110211685Abstract: A method for filtering out a spam call includes: transmitting test information to a calling terminal when receiving a call request from the calling terminal; determining whether feedback information corresponding to the test information and generated by the calling terminal in a one-key reply manner is correct; if the feedback information is incorrect, determining the call request as a spam call request, and filtering out the call request. An apparatus, a proxy server and a terminal are further provided, so as to effectively determine whether a call request from a calling terminal is a spam call request initiated by a machine or software, therefore improving the security and accuracy of a test, and reducing the cost as there is no need to install a speech recognition system.Type: ApplicationFiled: April 27, 2011Publication date: September 1, 2011Applicant: Chengdu Huawei Symantec Technologies Co., Ltd.Inventors: Lifeng LIU, Jian MENG
-
Patent number: 8010961Abstract: The inventions relate generally to layered computing systems that provide public access to the content of the layers. Also disclosed herein are prioritization schemes usable in a layered computing system, including prioritization by layer type, by assigned priority weights, by access type, by sub-layers and by read-write indicators. Processes may further be associated to layers from which they originate, and priority given to associated layers thereby. Association may also be provided for installer services, thereby depositing an applications updates into its layer. Layers may also contain file reference information including exclusion or inclusion entries indicating what files may be written thereto. Paths recorded in layers may also embed variables to true paths on a layered system. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.Type: GrantFiled: January 3, 2006Date of Patent: August 30, 2011Assignee: Symantec CorporationInventors: Randall Cook, Jared Blaser
-
Patent number: 8011003Abstract: A method and apparatus for blocking messages containing pre-selected data is described. In one embodiment, the method includes determining that a message transmitted to a recipient via a network includes pre-selected data. The pre-selected data contains information from at least one random row within the tabular structure of source data. The method further includes preventing an unauthorized transmission of the pre-selected data to the recipient.Type: GrantFiled: February 14, 2005Date of Patent: August 30, 2011Assignee: Symantec CorporationInventors: Kevin T. Rowney, Vitali Fridman, Eric Bothwell
-
Patent number: 8010759Abstract: Redirecting a data object such as a file block extent. The data object can be redirected from a first memory block to a second memory block, wherein the second memory block includes a copy of modified data of the first memory block. The redirection may occur in response to a request to modify data of the data object. Redirection preserves the prior version of the data object stored in the first memory block to enable restoration of the data object if needed. In one embodiment, a first data object is mapped to a first memory block. A copy of data contents of the first memory block is created. Thereafter, data contained within the copy is modified in accordance, for example, with a request to write data to the first data object. The modified copy is stored in a second memory block, and the first data object is mapped to the second memory block.Type: GrantFiled: September 29, 2006Date of Patent: August 30, 2011Assignee: Symantec Operating CorporationInventors: Timothy R. Coulter, Raghu Krishnamurthy, Par A. Botes
-
Patent number: 8010609Abstract: A method and system to maintain lists of IP addresses for detection of email spam are described. In one embodiment, the method includes receiving email messages from senders associated with Internet Protocol (IP) addresses, filtering the email messages to identify spam, and sending statistics pertaining to the email messages and the identified spam to a server. The method further includes receiving, from the server, IP address lists generated based on the statistics, and filtering new email messages using the IP address lists. The IP address lists received from the server may include a list of safe IP addresses, a list of suspect IP addresses and a list of open proxy IP addresses.Type: GrantFiled: June 20, 2005Date of Patent: August 30, 2011Assignee: Symantec CorporationInventors: David Cowings, Sanford Jensen, Carlin Wiegner
-
Patent number: 8010758Abstract: Various methods and systems for synchronizing replicas using a single change map are disclosed. One method involves detecting a write to a first region of a volume, while synchronization of the volume with a replica volume is ongoing. If the first region is unsynchronized with respect to a corresponding region of the replica volume, replication of the write is inhibited. Otherwise, the write is replicated. Writes for which replication is inhibited will be applied to the replica volume at a later time as part of the ongoing synchronization.Type: GrantFiled: May 20, 2005Date of Patent: August 30, 2011Assignee: Symantec Operating CorporationInventors: Angshuman Bezbaruah, Anand Kekre, Ankur Panchbudhe
-
Publication number: 20110208931Abstract: A computer-implemented method for enabling replication targets to reclaim unused storage space on thin-provisioned storage systems may include: 1) replicating data from a replication source to a replication target, 2) identifying unused storage space within the replicated data, 3) generating a reclamation request for reclaiming the unused storage space from a thin-provisioned storage system that provides thin-provisioned storage for the replication target, and then 4) issuing the reclamation request to the thin-provisioned storage system in order to reclaim the unused storage space from the thin-provisioned storage system. Various other related systems, methods, and configured computer-readable media are also disclosed.Type: ApplicationFiled: February 24, 2010Publication date: August 25, 2011Applicant: Symantec CorporationInventors: Niranjan Pendharkar, Shailesh Vaman Marathe, Venkata Tatavarty
-
Publication number: 20110208923Abstract: A storage method and system, a terminal service board, a control board, and a storage channel board are provided. The system includes a terminal service board, a control board, and a storage channel board, where the terminal service board is configured to be connected with a terminal and the control board, process a request from the terminal, and send a processing result to the control board; the control board is configured to encapsulate data required to be stored onto a storage apparatus into a command according to the processing result, and submit the command to the storage channel board; the storage channel board is configured to be connected with the storage apparatus and the control board, and according to the command, store onto the storage apparatus the data required to be stored onto the storage apparatus. The control board becomes more focused on the storage processing, so that the efficiency of use for the control board is improved.Type: ApplicationFiled: April 22, 2011Publication date: August 25, 2011Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.Inventors: Wei ZHANG, Xianhong LV
-
Patent number: 8006116Abstract: A computer-implemented method for storing information that identifies the state of health of a computing system at the time a backup of the computing system is created may comprise: 1) identifying a backup of the computing system, 2) performing an evaluation of the computing system's health, and then 3) storing health information that identifies the state of health of the computing system when the backup was created as metadata to the backup. Similarly, a method for determining whether to restore a backup of a computing system based on health information may comprise: 1) identifying a backup of the computing system, 2) identifying health information stored as metadata to the backup that identifies the state of health of the computing system when the backup was created, and 3) determining, based on the health information, whether to restore the backup. Corresponding systems and computer-readable media are also disclosed.Type: GrantFiled: March 31, 2008Date of Patent: August 23, 2011Assignee: Symantec CorporationInventors: William E. Sobel, Sourabh Satish
-
Patent number: 8005929Abstract: A computer system and method for updating a software product. A computer system includes at least one client coupled to a server. The server obtains updates of a software product and associates the updates with ports. The server receives a query from a client including a request for a software product update via a first port. In response to receiving the update query, the server opens a connection to the client via the first port and determines if an update is associated with the first port. If an update is associated with the first port, the server conveys a response to the client including an update that is associated with the first port. If an update is not associated with the first port, the server closes the connection. Ports are sequentially numbered. The server maps updates to ports based on timestamps associated with the updates.Type: GrantFiled: February 27, 2009Date of Patent: August 23, 2011Assignee: Symantec Operating CorporationInventor: Dmitri Okhotski
-
Publication number: 20110202795Abstract: Embodiments of the present invention are directed to a method and system for draining or aborting IO requests of a failed system prior to restarting or recovering an application in virtual environments. The method includes detecting, within an electronic system, an application error condition of an application executing on a virtual machine and determining an application restart target. The method further includes sending an input/output (IO) request drain command to a virtual IO server operable to provide storage to the virtual machine and receiving a signal that the IO requests have been drained. The drain command is operable to drain IO requests issued from the application. The application can then be restarted or recovered.Type: ApplicationFiled: February 12, 2010Publication date: August 18, 2011Applicant: SYMANTEC CORPORATIONInventors: Shailesh Vaman Marathe, Amol Shivram Katkar, Viraj Rajan Kamat
-
Publication number: 20110202734Abstract: Systems and methods for backup test restore are presented. In one embodiment a backup restore test method includes performing a backup process; performing a test restore virtual environment creation process, the test restore virtual environment including a plurality of virtual machines; and performing a test of the backup on the test restore virtual environment. The backup process can include backing up information associated with an application; identifying prerequisites associated with running the application; and backing up information associated with the prerequisites. The test restore virtual environment creation process can include gathering information identifying the prerequisites associated with the application; creating the plurality of virtual machines, wherein the plurality of virtual machines includes virtual machines corresponding to physical machines the application and perquisites run on; and bringing up the plurality of virtual machines utilizing the information from the backup process.Type: ApplicationFiled: February 12, 2010Publication date: August 18, 2011Applicant: SYMANTEC CORPORATIONInventors: Nilesh Dhakras, Aditya Gokhale