Patents Assigned to Symantec
-
Patent number: 7680830Abstract: System and method for policy-based lifecycle management of data in file systems. In embodiments, an expiration policy for the files may be stored as part of the file system metadata. The expiration policy may be as simple as an expiration date for the file, or a more complex policy that specifies one or more metrics to be evaluated to determine if a file is expired. The expiration policy may also specify one or more actions to be taken if the file has expired. The expiration policy may be evaluated on attempts to access the files in the file system, on other file systems, and on backup/archive images to determine if the files are expired and thus whether access to the files is to be allowed. In one embodiment, a scan mechanism may periodically or aperiodically delete files in the file system for which the expiration date has passed.Type: GrantFiled: May 31, 2005Date of Patent: March 16, 2010Assignee: Symantec Operating CorporationInventors: James Philip Ohr, Christopher James Elphinstone Chandler, Guy Barry Owen Bunker
-
Patent number: 7680957Abstract: System and method for generating modifiable representations of system hardware and software configurations and for transferring a system to another system using the configuration representations. A configuration representation may include a backup of a system's files. A configuration representation may be modified, and may be used to restore the system to hardware that may be different than the original system's hardware. In one embodiment, a configuration transfer mechanism is provided to perform the transfer of a configuration representation from a source system to a target system. One embodiment of a configuration transfer mechanism may use one or more servers coupled to the source and target systems via a network. Another embodiment of a configuration transfer mechanism may be used to restore a source system's configuration and files from a source system directly to a target system coupled to the source system without using servers.Type: GrantFiled: May 9, 2003Date of Patent: March 16, 2010Assignee: Symantec Operating CorporationInventors: Thomas Ketterhagen, Bruce Bramhall, Nicholas Graf, Okan Okcu
-
Patent number: 7680950Abstract: A system and method related to efficiently searching for an object in a network including a plurality of realms, e.g., a plurality of local area networks (LANs). The method may ensure that nodes within a LAN are able to locate objects within that LAN using only computing resources on the local LAN. Thus, expensive WAN transfers may be avoided where possible. The system may also scale to many nodes. Nodes may not be required to know about every other node in the system. Mechanisms for re-distributing object location information among nodes as nodes are added to and removed from the system are also described.Type: GrantFiled: November 7, 2003Date of Patent: March 16, 2010Assignee: Symantec Operating CorporationInventors: Gregory L. Slaughter, Xiaohui Dawn Chen, Ruchir Tewari
-
Patent number: 7681237Abstract: In the method of the present invention, an anti-virus scan of a file is performed in real time. A thread manager (101) detects (202) that an activity concerning a file has been initiated by a first thread. Responsive to the detection, the thread manager (101) determines (204) that a scan of the file should be conducted. The thread manager (101) initiates (206) the scan of the file by a second thread, thereby enabling the first thread to complete the activity concerning the file and to perform other tasks while the scan occurs. The thread manager (101) blocks (212) access to the file while the scan occurs.Type: GrantFiled: May 13, 2004Date of Patent: March 16, 2010Assignee: Symantec CorporationInventors: Mark Spiegel, Melissa Mendonca, Haik Mesropian, Edmund White
-
Patent number: 7680843Abstract: Procedures and systems may be used for archiving data from a secondary data set that is a stable copy of a primary data set. In one implementation, the secondary data set is a continuous data protection (CDP) copy of the primary data set. One implementation of a method includes receiving an application programming interface (API) request for archive-eligible data, gathering application data from a secondary data set, obtaining archive-eligible data from the gathered application data, and responding to the request instruction with the archive-eligible data. The gathering is performed by a gathering circuit configured to obtain information from a plurality of types of secondary data sets. The method also includes receiving API modification instructions related to the archive-eligible data, and causing the modification instruction to be performed on the primary data set.Type: GrantFiled: September 26, 2006Date of Patent: March 16, 2010Assignee: Symantec Operating CorporationInventors: Ankur P. Panchbudhe, Aditya A. Gokhale, Angshuman Bezbaruah
-
Patent number: 7680886Abstract: Computer implemented methods, apparati, and computer readable media for suppressing spam entering a computing device. A method embodiment comprises the steps of routing an electronic message leaving the computing device to a machine learning based spam filter defining the message to be clean; and training the filter, with the message being an input to the filter.Type: GrantFiled: April 9, 2003Date of Patent: March 16, 2010Assignee: Symantec CorporationInventor: Shaun P. Cooley
-
Publication number: 20100064340Abstract: A computer-implemented method for controlling access to data is. A request to access data is received. A determination is made that an access-control policy of the data is satisfied. A virtualization layer is activated to allow access to the data after determining that the access-control policy is satisfied. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: June 27, 2008Publication date: March 11, 2010Applicant: Symantec CorporationInventors: Bruce McCorkendale, William E. Sobel
-
Patent number: 7676688Abstract: Mechanisms for data source computing system(s) to provide data to data targets. The data source(s) access an identification of common groups of blocks, each group being common amongst all or a subset of the data target(s). The common groups of blocks may have different scope such that one common group of blocks is to be provided to a different set of the data targets than another common group of blocks. Optionally, a selection mechanism may be used to assign priority in initiating multicasting of the identified common groups of blocks. The data source(s) then initiate multicasting of the common groups of blocks in the appropriate order to the appropriate data targets. Since the common groups of blocks are provided in a single multicast, rather than separately, the data is provided in a more efficient manner to the data targets.Type: GrantFiled: March 16, 2005Date of Patent: March 9, 2010Assignee: Symantec CorporationInventor: Daniel H. Hardman
-
Patent number: 7676704Abstract: A system and method for storing data. In one embodiment, a file system stores data including associated metadata. In response to detecting that a file system error has occurred, the file system identifies a container including data in which the error occurred and performs a consistency check of the data included in the container. If a bidirectional link exists between the container and another container and if an error is found in the bidirectional link, the file system performs a consistency check of data included in the other container and determines if another bidirectional link exists between the other container and a third container. If another bidirectional link exists between the other container and a third container and if an error is found in the other bidirectional link, the file system performs a consistency check of data included in the third container.Type: GrantFiled: June 29, 2007Date of Patent: March 9, 2010Assignee: Symantec CorporationInventors: Bo Hong, John Colgrove, Ramon Pantin, Feng Wang, Oleg Kiselev
-
Patent number: 7673346Abstract: Mechanisms for enforcing permissions on stored data. Prior to storing the data, a data structure containing the data is accessed, and then modified to include a license that represents permission(s) for how the data should be used when the data structure is later accessed. The modified data structure is then stored, after perhaps some optional transformation. When the data structure is later accessed, the license is acquired from the data structure. The license is then used to determine whether or not to honor specific requests to use the data. This determination may be made based on license validation instructions executed from a removable media. Furthermore, the license may be the exclusive determining factor for the license validation instructions in determining whether or not to honor specific requests.Type: GrantFiled: June 22, 2005Date of Patent: March 2, 2010Assignee: Symantec CorporationInventors: Roland D. Whatcott, Russell Marsh
-
Patent number: 7672753Abstract: Various embodiments of a system and method for optimizing storage library operations. In one embodiment a method may comprise storing a plurality of efficiency values indicative of relative efficiencies of storage targets in a storage library, and executing a storage library operation based on the plurality of efficiency values. Efficiency values may include, for example, information on a physical layout of the storage library. In one embodiment storage targets may include at least the following classes: a slot class, a portal class, a drive class, a picker class, and a media class. In one embodiment, executing a storage library operation based on the plurality of efficiency values may comprise selecting one or more storage targets to implement the storage library operation based on the plurality of efficiency values. For example, a drive closest to a given media unit may be selected to read the media unit.Type: GrantFiled: July 30, 2004Date of Patent: March 2, 2010Assignee: Symantec Operating CorporationInventor: Robert P. Rossi
-
Patent number: 7673130Abstract: A system uses a protocol stack on a card external to a motherboard in a target computer system. A processor on the motherboard is able to make use of the external protocol stack during boot-up of the computer, or at any other time, so that it is not necessary to load the protocol stack into the motherboard's memory. This saves time, memory, and disk space and permits an external, managing, computer system to communicate with a computer just after power-up without loading and configuring a protocol stack so that the managing computer system can control the boot-up of the target computer system. The extra memory saved, especially, is important in running many MS-DOS applications, such as firmware flash utilities. A preferred embodiment of the invention uses a UDP/Internet Protocol (UDP/IP) stack resident in a Preboot Execution Environment (PXE) on, e.g, a network card. The approach described herein can be applied to other utilities, protocol stacks or resources (hardware and software) on other cards.Type: GrantFiled: September 30, 2005Date of Patent: March 2, 2010Assignee: Symantec Operating CorporationInventors: Carleton Miyamoto, Jagadish Bandhole, Sekaran Nanja
-
Patent number: 7673344Abstract: A method and apparatus for detecting preselected data embedded in information content is described. In one embodiment, the method comprises receiving information content and detecting in the information content a sequence of content fragments that may contain a portion of preselected data. The method further comprises determining whether a sub-set of these content fragments matches any sub-set of the preselected data using an abstract data structure that defines a tabular structure of the preselected data.Type: GrantFiled: May 6, 2003Date of Patent: March 2, 2010Assignee: Symantec CorporationInventors: Kevin T. Rowney, Michael R. Wolfe, Mythili Gopalakrishnan, Vitali Fridman
-
Patent number: 7672979Abstract: A method for backup and restore using inconsistent state indicators comprises identifying, from among a plurality of data objects to be backed up, one or more data objects that are in an inconsistent state, and storing inconsistent state indicators (such as modified object attributes) associated with the data objects. The method may further include generating a backup aggregate such as a snapshot of the plurality of data objects, where the backup aggregate includes backup versions of the inconsistent data objects. Prior to restoring one or more data objects from the backup aggregation, the method may include using the inconsistent state indicators to identify the backup versions that correspond to the inconsistent data objects, e.g., to exclude backup versions corresponding to inconsistent data objects from a list of full restoration candidates.Type: GrantFiled: July 8, 2005Date of Patent: March 2, 2010Assignee: Symantec Operating CorporationInventors: Carl J. Appellof, Dale Cardin, Terrence Asgar-Deen
-
Patent number: 7672934Abstract: Various embodiments of a method and system for accessing an instance of a database file previously created by a secured RDBMS are disclosed. The secured RDBMS is not used to reconstruct tables and records from an unmounted backed up copy of a database file. During backup, a schema file including table and index information is stored along with the database file. During a subsequent restore operation, the schema file may be read for efficiently reconstructing objects from the database file, without having to reload or reinstall the secured RDBMS. For restoring or comparing objects from the backed up database file, a stored procedure in the secured RDBMS may be called.Type: GrantFiled: October 19, 2006Date of Patent: March 2, 2010Assignee: Symantec Operting CorporationInventors: Louis Beatty, Steven R. DeVos
-
Patent number: 7673169Abstract: Techniques for implementing an adaptive data access error handling policy are disclosed. In one particular exemplary embodiment, the technique may be realized as a system comprising a shared storage device communicatively coupled to a network, and a computer cluster communicatively coupled to the network, the computer cluster comprising a plurality of nodes each mounting a shared file system thereon, a first node of the plurality of nodes to send a data access request to the shared storage device, to identify a data access error associated with the data access request, and to determine whether to permit access to the shared file system based on the data access error being a local data access error or a global data access error.Type: GrantFiled: May 9, 2007Date of Patent: March 2, 2010Assignee: Symantec CorporationInventors: Bala Kumaresan, Craig Harmer, Ajay Salpekar, Jonathan Purcell, Ashish Yajnik, Joseph Maionchi
-
Patent number: 7673329Abstract: Encrypted communications to a secure server. A user at a terminal, communicatively coupled to the secure server by a secure link, can obtain web pages from web sites in a network, in encrypted form, via the secure link. Addresses associated with the web pages are altered to make it appear as if the web pages come from the secure server rather than from the web sites. Spoofing units may be used as alternative access points to the secure server, with the secure server sending the requested web pages directly to the terminal.Type: GrantFiled: February 22, 2001Date of Patent: March 2, 2010Assignee: Symantec CorporationInventors: Stephen Dao Hui Hsu, James Noshir Hormuzdiar
-
Patent number: 7673139Abstract: A technique is disclosed for protecting a computer system. In one embodiment, the technique comprises configuring a first account with a first privilege and configuring a second account with a second privilege, wherein the first account is restricted at a configured time.Type: GrantFiled: May 6, 2004Date of Patent: March 2, 2010Assignee: Symantec CorporationInventors: Sourabh Satish, Harlan Seymour
-
Patent number: 7673308Abstract: Multiple, semi-independent virtual operating system (OS) environments coexist within a single (OS) such that a change made in one environment does not affect the main OS or any other environment. In this way each virtual OS environment appears to be an independent OS for the applications running within it. The file system and registry information for each environment is independent of the base OS and other environments. Each of the environments can contain a group of installed applications that will run independently of each other. Although the invention is described in terms of a Windows® environment, the approach is applicable to other operating systems through appropriate modification.Type: GrantFiled: November 18, 2003Date of Patent: March 2, 2010Assignee: Symantec CorporationInventors: John McMillan, Gary Chirhart
-
Publication number: 20100049932Abstract: A method for automatic snapshot includes obtaining the amount of data written into a source Logical Unit Number (LUN) and performing increment accumulation; and taking a snapshot when a value of the increment accumulation exceeds the upper limit value. An apparatus for automatic snapshot is disclosed. In one embodiment of the invention, snapshots are taken according to the size of a data variable, only two characterizing parameters, an upper limit value and an increment value need to be added, and the determination logic is clear and concise. Thus, system efficiency or resource overload is not affected, the pertinence is strengthened, the resource usage is increased, and the adaptability is strengthened. Furthermore, stored data may be automatically protected with snapshot, and data safety and reliability are greatly improved.Type: ApplicationFiled: August 13, 2009Publication date: February 25, 2010Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.Inventors: Zujing Tan, Peng Zhang, Weihua Geng, Guobin Zhang