Patents Assigned to Symantec
  • Patent number: 7805469
    Abstract: Methods and computer program products that provide for extracting a portion of a file system for use as an independent file system and merging a file system into another file system are presented. One or more storage objects containing data from a multi-volume file system can be extracted from the multi-volume file system. One or more storage objects containing a first file system can be merged with one or more other storage objects containing a second file system, thus forming a merged file system.
    Type: Grant
    Filed: December 28, 2004
    Date of Patent: September 28, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Sree Hari Nagaralu, Sunder Phani Kumar, Naga Kishore Kommuri
  • Patent number: 7805640
    Abstract: Hardware independent performance metrics for application tasks are assembled and submitted to a central repository from multiple installations in the field. These metrics are requested by and provided to specific computing devices, and used to calculate expected performance times for given application tasks on specific hardware configurations. Computing devices can automatically identify performance problems by comparing actual performance times of application tasks to calculated expected performance times. Events that take longer than expected to execute indicate a computing device performance issue.
    Type: Grant
    Filed: March 10, 2008
    Date of Patent: September 28, 2010
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Shaun Cooley
  • Patent number: 7805752
    Abstract: Techniques are disclosed for implementing dynamic endpoint compliance policy configuration. In one embodiment, a security service is provided that automates endpoint compliance policy configuration. A customer identifies its deployed client security products, and specifies the desired level of security. This security product and level information is used by the security service to generate endpoint compliance policies tailored to that customer's current network and/or security scheme. The security service can incorporate data obtained from early warning services that deliver timely and actionable security alerts into its policy generation process. In this way, the security service can provide endpoint compliance policies that protect its customers' machines from the very latest threats at any moment in time.
    Type: Grant
    Filed: November 9, 2005
    Date of Patent: September 28, 2010
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Tim Brown
  • Patent number: 7805717
    Abstract: A system and method for instrumenting program instructions. A processing system includes a compiler and a profiler. The compiler is configured to notify the profiler of a compilation event corresponding to first program instructions. In response to detecting the event, the profiler is configured to intercept compilation of the first program instructions, determine whether an instrumented version of the first program instructions is currently available, instruct the compiler to compile the instrumented version of the first program instructions if available, and retrieve and instrument the first program instructions if not available. The profiler may maintain an instrumentation cache for storing instrumented versions of program instructions. The instrumentation cache may further include metadata which identifies portions of program code which have been instrumented and their location. The profiler may generally instrument program instructions once during the resident life of a corresponding application.
    Type: Grant
    Filed: October 17, 2005
    Date of Patent: September 28, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Michael P. Spertus, Christopher D. Metcalf, Gadi Wolfman
  • Patent number: 7802134
    Abstract: Restoring of content of data blocks to non-volatile storage as the content existed at a particular instant in time. After accessing the last backup representing the most recent backup of the plurality of data blocks prior to the particular instant in time, the content of each data block represented in the last backup is written to a corresponding position in the non-volatile storage. This last backup may be an incremental backup in which only those data blocks that had changed since the immediate prior backup were actually backed up. Then, restoration occurs through each prior backup in reverse chronologic order until the full backup is encountered and restored. When restoring a backup, a data block is not restored if the data block had already been restored proceeding in reverse chronological order.
    Type: Grant
    Filed: August 18, 2005
    Date of Patent: September 21, 2010
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 7802302
    Abstract: A scanning manager scans the file systems of virtual machines running on a base computer. In order to scan a virtual machine, the scanning manager identifies the file on the base machine that represents the virtual machine, freezes the virtual machine, and creates a snapshot thereof. The scanning manager restarts the frozen machine, and starts the snapshot. The files of the snapshot are mapped at a virtual machine level, and the resulting file mapping information is used to scan the files of the virtual machine at a base machine level. The scanning can comprise scanning for malicious code, such as virus signatures. The scanning manager can scan one, multiple or all virtual machine(s) running on the base computer, in conjunction with a full or partial scan of the base computer, or independently.
    Type: Grant
    Filed: March 10, 2006
    Date of Patent: September 21, 2010
    Assignee: Symantec Corporation
    Inventors: Kuldeep Sureshrao Nagarkar, Sinh Dang Nguyen, Ajay Sadashiv Wani
  • Patent number: 7801840
    Abstract: A method, system, computer program product, and/or computer readable medium of instructions for identifying a malicious entity in a processing system, comprising determining an entity threat value for an entity, the entity threat value being indicative of a level of threat that the entity represents to the processing system, wherein the entity threat value is determined based on one or more characteristics of the entity; and compare the entity threat value to an entity threat threshold to identify if the entity is malicious. In another form, there is provided a method, system, computer program product, and/or computer readable medium of instructions for identifying a malicious entity in a processing system, comprising determining one or more input values indicative of an entity; and performing a fuzzy logic analysis in relation to the one or more input values to identify if the entity is malicious.
    Type: Grant
    Filed: July 27, 2007
    Date of Patent: September 21, 2010
    Assignee: Symantec Corporation
    Inventors: Rolf Repasi, Simon Clausen, Ian Oliver, Ryan Pereira
  • Publication number: 20100235923
    Abstract: A computer-implemented method may intercept a file-system call associated with a media file. The computer-implemented method may determine an attribute of the media file. The computer-implemented method may also identify a parental-control policy associated with the attribute of the media file. The computer-implemented method may further apply the parental-control policy to the media file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: March 13, 2009
    Publication date: September 16, 2010
    Applicant: Symantec Corporation
    Inventors: Adam Schepis, Keith Newstadt
  • Patent number: 7797357
    Abstract: A client computer system of a cluster may send a request to create a file in a cluster file system. A server may create a file in response to the information and allocate space in a storage to the file. If a request to write to the file is received within a predetermined amount of time, the write may complete without requiring that additional operations be performed to allocate space to the file. If a write to the file is not received within the predetermined amount of time, the space allocated to the file when it was created may be de-allocated. The file system may additionally or alternatively perform a method for opening a file while delaying an associated truncation of space allocated to the file. If a request to write to the file is received within a predetermined amount of time, the write may be performed in the space already allocated to the file.
    Type: Grant
    Filed: February 28, 2007
    Date of Patent: September 14, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Murali Nagaraj, Ravideep Singhvi, Shriram Wankhade, Aalop S. Shah, Milind Borate, Samir Desai
  • Patent number: 7797285
    Abstract: Method and apparatus for restoring backup data to a computer is described. In one example, selected resources of within the backup data to be restored are specified. An installation package is generated that provides a hierarchical archive of the selected resources and is configured for execution by an operating system of the computer. The installation package is provided to the computer for execution thereon to effect a restoration of the selected resources onto the computer.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: September 14, 2010
    Assignee: Symantec Corporation
    Inventors: Felix Rivera, Alejandro Arellano, Jose Rafael Fernandez
  • Patent number: 7797733
    Abstract: A service manager (101) monitors and controls services (111), thereby providing protection against associated security vulnerabilities. The service manager (101) intercepts calls (105) to service related operations made by acting applications (103) and determines which acting application (103) made a specific intercepted call (105) to which target service (111). The service manager (101) then determines and executes an appropriate action based on a system policy (113). The appropriate action can comprise blocking the call (105), thereby preventing execution of service (111) based operations that conflict with the system policy (113).
    Type: Grant
    Filed: January 8, 2004
    Date of Patent: September 14, 2010
    Assignee: Symantec Corporation
    Inventor: Ahmed Sallam
  • Patent number: 7797747
    Abstract: Subsets of non-paged pool unused pages entries are flushed from a translation lookaside buffer (TLB). An attempt to access malicious code within a not present page within the non-paged pool unused pages is made, e.g., by malicious code. The attempt to access the page generates a page fault, which is detected. The page is scanned for malicious code and a determination is made that the page contains malicious code. Protective action is taken to protect a host computer system from the malicious code. Accordingly, malicious code in a page marked not present, i.e., in a page that ordinarily would not be scanned for malicious code, is detected and defeated.
    Type: Grant
    Filed: February 21, 2006
    Date of Patent: September 14, 2010
    Assignee: Symantec Corporation
    Inventor: Peter Ferrie
  • Patent number: 7797313
    Abstract: A method and system for generating ranking criteria used to rank items in a computer system. The ranking criteria is based, at least in part, on storage information related to each of the items to be ranked. The storage information includes a storage parameter and/or a backup parameter. In one embodiment, a list of items is received in which storage information associated with each of the items is gathered. The items are ranked according to a relationship between the determined ranking criteria and at least the storage information associated with each of the items.
    Type: Grant
    Filed: March 28, 2006
    Date of Patent: September 14, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Pawan Goyal, Srineet Sridharan, Basant Rajan
  • Patent number: 7797449
    Abstract: A system or network may provide for communication between two or more applications. The communication is achieved by initiating communication between a first and second application. The communication is directed from the first application to a second virtual address of the second application. An actual address associated with the second application is determined. A first data channel is established between a first computer associated with the first application and a second computer associated with the second application over a control channel, to coordinate the communication over the first data channel. The communication is then directed to the actual address associated with the second application over the data channel. Further, the first data channel is taken down and a second data channel is established to maintain communication without the knowledge of the first and second applications.
    Type: Grant
    Filed: February 4, 2005
    Date of Patent: September 14, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Emily L. Hipp, Burton A. Hipp
  • Patent number: 7797702
    Abstract: A legitimate process utilizes thread local storage (TLS) functionality to prevent a malicious thread from executing in its address space. The legitimate process includes a thread white list that identifies the entry point addresses of threads executed by the process. When executed on a computer, the process interacts with the TLS functionality provided by the computer's operating system. The operating system sends the process a message each time a new thread is executed in the process's address space. Upon receiving the message, the process determines the entry point address of the new thread and checks to see if the address is in the white list. If the thread entry point address is not in the white list, the thread is probably malicious and the process therefore terminates the thread's execution.
    Type: Grant
    Filed: February 22, 2005
    Date of Patent: September 14, 2010
    Assignee: Symantec Corporation
    Inventor: Peter Ferrie
  • Patent number: 7797281
    Abstract: A system and method for performing a granular restore of data objects from a directory service is disclosed. In one embodiment, at the time a backup of the directory services database is performed, a metadata file with index values for some data objects is created. The metadata file may include an index of the name and an object identifier for each included data object. During granular restore of one or more data objects selected for restoration, the corresponding object identifier is retrieved from the metadata file using the name of the data object. The object identifier is then used to restore the data object in the directory service.
    Type: Grant
    Filed: January 12, 2007
    Date of Patent: September 14, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Christopher Greene, Andrew B. Montcrieff, Matthew W. Brocco, Steven R. DeVos
  • Patent number: 7796614
    Abstract: Systems and methods consistent with embodiments of the present invention provide a method for forwarding packets between VLAN groups served by segmented ports on a network switching device. A request from a source in a VLAN group to a destination in another VLAN group is identified. Information needed to route packets to the destination is obtained by re-broadcasting the request for destination information to all VLAN groups, which do not include the source, that are served by the network switching device. Information needed to route packets to the source is also obtained. In some embodiments, source and destination routing information obtained, is stored in tables in a memory cache on the network switching device. Information stored in the tables is used to relay additional packets between the segmented ports on the device serving the source and destination.
    Type: Grant
    Filed: November 30, 2004
    Date of Patent: September 14, 2010
    Assignee: Symantec Corporation
    Inventor: David Weymans
  • Patent number: 7797404
    Abstract: A method for configuring a new server with a server configuration, such as a storage configuration, backup configuration, etc. The method may automatically detect presence of a new server coupled to a network and then automatically determine one or more attributes, such as available storage, of the new server. The method may then automatically determine one or more server configurations for the new server. For example, software may examine existing server configurations stored in a repository or database to determine if one or more of the existing server configurations are usable for configuring the server, e.g., based at least in part on the determined attributes of the new server. If the user accepts a server configuration, software may then operate to automatically configure the new server accordingly. Embodiments are included for adding server configurations to the repository. A global server configuration repository is also contemplated.
    Type: Grant
    Filed: November 27, 2002
    Date of Patent: September 14, 2010
    Assignee: Symantec Operting Corporation
    Inventor: Margaret E. Knight
  • Patent number: 7797565
    Abstract: Various methods and systems for maintaining a communication protocol connection during a failover are disclosed. One method involves obtaining a first value of a parameter associated with a communication protocol connection between a primary node and a client and sending a flow control message to the client, in response to detecting that the primary node is failed. The flow control message includes the parameter.
    Type: Grant
    Filed: April 4, 2006
    Date of Patent: September 14, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Cuong Huu Tran, Bhavin K. Thaker, Veeral P. Shah
  • Patent number: 7797355
    Abstract: A system and method of characterizing a logical storage object. Information associated with the logical storage object is stored. The information includes information characterizing quiesce capabilities and split characteristics for the logical storage object. That information is transmitted to a processor and is used to characterize the logical storage object.
    Type: Grant
    Filed: June 9, 2005
    Date of Patent: September 14, 2010
    Assignee: Symantec Operating Corporation
    Inventors: Thomas W. Lanzatella, Graham Bromley, John A. Colgrove, Ron Karr, Blaine T. Cuykendall, Oleg Kiselev, Craig Harmer