Patents Assigned to Symantec
  • Publication number: 20110202972
    Abstract: A network authentication method, a method for a client to request authentication, a client, and a device are provided.
    Type: Application
    Filed: April 27, 2011
    Publication date: August 18, 2011
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventor: Wu JIANG
  • Patent number: 8001598
    Abstract: Computer implemented methods, apparatus, and computer-readable media for detecting suspected spam in e-mail (24) originating from a sending computer (21). A method embodiment comprises the steps of determining (11) the actual IP address (23) of the sending computer (21); converting (12) the actual IP address (23) into geo-location data; and, using the geo-location data, ascertaining (13) whether the e-mail (24) contains suspected spam.
    Type: Grant
    Filed: February 4, 2008
    Date of Patent: August 16, 2011
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 8001603
    Abstract: The file context of a target file to be scanned is determined and the scan level for the file context is determined. Generally, the security risk for each file context is assessed, and the scan level appropriate for the security risk is associated with the file context. The target file is scanned at the scan level. Accordingly, a target file having a file context indicating that the file is a high security risk is scanned at a high scan level, i.e., is subject to a maximum-security scan. In this manner, high-level security is maintained. Conversely, a target file having a file context indicating that the file is a low security risk is scanned at a low scan level, i.e., is subject to a minimum-security scan or no scan at all. In this manner, high security is maintained while at the same time maximum performance is achieved.
    Type: Grant
    Filed: July 24, 2006
    Date of Patent: August 16, 2011
    Assignee: Symantec Corporation
    Inventor: Mark Kennedy
  • Patent number: 8001346
    Abstract: A method, system, computer system, and computer-readable medium for maintaining up-to-date, consistent copies of primary data without the need to replicate modified data when the data were modified as a result of an operation that is not an application-driven write operation captured during replication. Selected storage management operations are performed on the primary and secondary data stores at points in time when the data are the same to ensure that the data stored within the data stores remain consistent. These selected storage management operations include operations that produce modified data stored in the primary data store, where a portion of the modified data are not replicated to a secondary node. Other types of storage management operations are selected to be performed on both the primary and secondary data stores, where the operations do not directly change data in the primary data store, but may affect data stored in the primary data store.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: August 16, 2011
    Assignee: Symantec Operating Corporation
    Inventors: John A. Colgrove, Ronald S. Karr, Oleg Kiselev
  • Patent number: 8001087
    Abstract: A method involves generating a business rule; the business rule indicates whether a file should be included in a backup operation. Data is accumulated in a file history database, and the data represents one or more associations of the file. A result is determined, indicating whether the business rule indicates the file should be included in the backup operation. The result is based, at least in part, on the data in the file history database. The result is reported.
    Type: Grant
    Filed: December 27, 2007
    Date of Patent: August 16, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Keith Newstadt, Adam P. Schepis
  • Patent number: 8001347
    Abstract: A computer system that implements a method for creating a virtual snapshot of a first storage object. A first storage object such as a data volume is created, wherein creating the first storage object includes creating a first storage object description. This first storage object description relates the first storage object to underlying first storage objects or first physical memory regions. After creating the first storage object, a virtual copy of the first storage object is created as a second storage object. Creating the second storage object includes creating a second storage object description, wherein the second storage object description relates the second storage object to the first storage object. The first storage object is transmitted to a first computer system, and the second storage object description is transmitted to a second computer system.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: August 16, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Ronald S. Karr, Anand A. Kekre
  • Patent number: 8001606
    Abstract: A reputation server is coupled to multiple clients via a network. A security module at a client identifies an application and determines whether it is on a white list. If the application is not on the white list, the security module monitors the application using a strict set of signatures. If the application is on the white list, the security module monitors the application using a relaxed set of signatures. The relaxed set of signatures can exclude legitimate characteristics possessed by the application as specified by the white list. The security module evaluates whether the application is malicious based at least in part on whether it possesses suspicious characteristics described by the signatures. The reputation server receives reports from clients identifying applications and describing characteristics possessed by the applications and uses the reports to generate the white list.
    Type: Grant
    Filed: June 30, 2009
    Date of Patent: August 16, 2011
    Assignee: Symantec Corporation
    Inventor: Michael Spertus
  • Patent number: 8001049
    Abstract: Contextual data is gathered about a user's known location and/or about a user's expected location and generates contextual indicators based on at least a portion of the gathered contextual data. The contextual indicators are provided to one or more relying parties, such as an anti-fraud system to allow the anti-fraud system to more effectively determine the validity of transactions associated with the user, such as credit card transactions associated with the user's credit card.
    Type: Grant
    Filed: September 25, 2007
    Date of Patent: August 16, 2011
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 8001367
    Abstract: A method of configuring a processing system to perform application setting activity using a removable storage device in data communication with the processing system includes a) selecting an application, where setting activity associated with the selected application is to be performed using the removable storage device, b) installing, in the processing system, an interception module to intercept application setting activity associated with the selected application; and c) in response to the interception module intercepting application setting activity associated with the selected application, performing the application setting activity using the removable storage device, thereby storing application setting data associated with the selected application in the removable storage device.
    Type: Grant
    Filed: October 9, 2007
    Date of Patent: August 16, 2011
    Assignee: Symantec Corporation
    Inventors: Rolf Repasi, Simon Clausen
  • Patent number: 8001085
    Abstract: A method, system, and computer-readable medium to maintain consistent, up-to-date copies of primary data. Primary data is maintained on a primary node, and point-in-time snapshots of the primary data are maintained on a secondary or remote node. Read operations can be directed to read some or all data from the remote node. When part of the data on the primary node becomes unavailable due to corruption, device failure, or communication failure, unavailable data can be read from the secondary node. When the determination is made that an unavailable portion of the data exists, a third data storage accessible by the first host can be created. Each subsequent change to the data in the first data storage can be written only to the third data storage. If an updated portion of the data is to be read, the updated portion can be read from the third data storage.
    Type: Grant
    Filed: November 25, 2003
    Date of Patent: August 16, 2011
    Assignee: Symantec Operating Corporation
    Inventor: Oleg Kiselev
  • Patent number: 8001223
    Abstract: A method and apparatus to reconfigure parameters for establishing a link with a new host after a computer is moved to a new location or a new network.
    Type: Grant
    Filed: August 14, 2009
    Date of Patent: August 16, 2011
    Assignee: Symantec Corporation
    Inventors: Yuen-Pin Yeap, Yadong Zhang
  • Patent number: 7996708
    Abstract: Techniques for file system resource restoration are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for file system resource restoration comprising modeling source configuration information of one or more file system resources associated with a first storage management system, modeling target configuration information of one or more file system resources associated with a second storage management system, mapping one or more portions of the source configuration information to the target configuration information, generating computer executable restoration instructions based at least in part on the mapping; and executing the computer executable restoration instructions to restore one or more file system resources of the source configuration information to a target computing platform identified by the target configuration information.
    Type: Grant
    Filed: March 16, 2009
    Date of Patent: August 9, 2011
    Assignee: Symantec Corporation
    Inventor: Steven E. Mohl
  • Patent number: 7996406
    Abstract: Method and apparatus for detecting web-based electronic mail in network traffic is described. In some examples, web pages are extracted from the network traffic. Fields in each page of a group of the web pages that share a documents structure are identified. A statistical analysis of the fields of each page in the group of web pages is performed to identify any electronic mail (e-mail) fields. The group of web pages is indicated to include web-based e-mail messages if the fields of each page in the group of web pages include at least one e-mail field.
    Type: Grant
    Filed: September 30, 2008
    Date of Patent: August 9, 2011
    Assignee: Symantec Corporation
    Inventors: Basant Rajan, Chirag Deepak Dalal, Navin Kabra
  • Patent number: 7996836
    Abstract: A computer includes a virtual machine controlled by a hypervisor. The virtual machine runs a virtualized operating system with running processes. A security initialization module sets the state in the virtual machine to pass execution from the virtual machine to the hypervisor responsive to a process making a system call in the virtualized operating system. Responsive to execution being passed from the virtual machine to the hypervisor, a security module analyzes the process making the system call to determine whether it poses a security threat. If a security threat is found, the security module takes remedial action to address the threat.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: August 9, 2011
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, Peter Ferrie
  • Patent number: 7996385
    Abstract: A method and apparatus for defining the scope of a search is described. In one embodiment, user input is received, and the scope is defined, based on the user input, for a search of free-form text for information from any random rows within a tabular structure of source data. In one embodiment, the search is intended for finding, in the free-form text, a sub-set of data fragments that matches information from any single row within the tabular structure of the source data.
    Type: Grant
    Filed: November 6, 2008
    Date of Patent: August 9, 2011
    Assignee: Symantec Corporation
    Inventors: Kevin T. Rowney, Michael R. Wolfe, Chris Jones, Dirk Kessler, Hai Chen, Eric Bothwell
  • Patent number: 7996373
    Abstract: A method and apparatus for scanning structured data from a data repository having an arbitrary data schema and for applying a policy to the data of the data repository are described. In one embodiment, the structured data is converted to unstructured text data to allow a schema-independent policy to be applied to the text data in order to detect a policy violation in the data repository regardless of the data schema used by the data repository.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: August 9, 2011
    Assignee: Symantec Corporation
    Inventors: Michel Zoppas, Jeremy Hermann, Conal O'Raghallaigh, Eric Bothwell, Alexander Fontana
  • Patent number: 7996374
    Abstract: A method and apparatus for automatically correlating policy violation incidents. In one embodiment, the method includes receiving user input identifying one of policy violation incidents stored in a data repository, where each policy violation incident is associated with one or more attributes. The method further includes automatically correlating the identified policy violation incident with other policy violation incidents that have in common at least one attribute with the identified policy violation incident, and presenting the resulting correlation information to a user.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: August 9, 2011
    Assignee: Symantec Corporation
    Inventors: Christopher Jones, Daren Desjardins, Eric Bothwell, Alexander Fontana
  • Patent number: 7996717
    Abstract: A method, apparatus, and computer program product for setting and implementing a policy to compress the history of data on a temporal volume is described.
    Type: Grant
    Filed: March 17, 2009
    Date of Patent: August 9, 2011
    Assignee: Symantec Operating Corporation
    Inventors: John A. Colgrove, Anand A. Kekre, Ankur P. Panchbudhe
  • Patent number: 7996718
    Abstract: Techniques for continuous data protection are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for reducing data protection system outages comprising polling a data protection client device, receiving a response from the data protection client device, parsing the response to determine whether restarting a data protection process is required, and restarting a data protection process on the data protection client device, if restarting the data protection process is required.
    Type: Grant
    Filed: February 12, 2009
    Date of Patent: August 9, 2011
    Assignee: Symantec Corporation
    Inventors: Pu Ou, Matthew W. Brocco
  • Patent number: 7996361
    Abstract: A method and system of providing replica files within a fileset is disclosed. According to one embodiment, a method is provided which comprises associating a source file and a replica file of the source file within a fileset, wherein the replica file of the source file comprises a virtual copy of the source file. In another embodiment wherein the source file comprises a metadata file system object and the replica file of the source file comprises a replica metadata file system object, the associating comprises generating a reference within the replica metadata file system object to the metadata file system object.
    Type: Grant
    Filed: June 30, 2003
    Date of Patent: August 9, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Aalop S. Shah, Milind Borate, Basant Rajan