Patents Assigned to Symantec
  • Patent number: 9779234
    Abstract: Knowledge of a module's behavior when the module's reputation is formed is obtained. If the module's behavior changes, this change is detected. In one embodiment, upon a determination that the module's behavior has changed, the module's original reputation is lost. In this manner, malicious trusted modules are detected and defeated.
    Type: Grant
    Filed: June 18, 2008
    Date of Patent: October 3, 2017
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Brian Hernacki
  • Patent number: 9781601
    Abstract: The disclosed computer-implemented method for detecting potentially illegitimate wireless access points may include (1) determining that a computing device has established a connection with a wireless access point that resembles a known wireless access point, (2) collecting a set of network details related to a route from the computing device to a network resource via the wireless access point, (3) identifying a previously collected set of network details related to a route from the computing device to the network resource via the known wireless access point, (4) determining that a portion of the set of network details related to the route via the wireless access point does not match the set of network details related to the route via the known wireless access point, and then (5) determining that the wireless access point is potentially illegitimate.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: October 3, 2017
    Assignee: Symantec Corporation
    Inventor: Ankit Kurani
  • Patent number: 9774615
    Abstract: Techniques for detecting anomalous network traffic are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting anomalous network traffic comprising the steps of receiving a list including a plurality of processes and, for each process, a list of approved types of network traffic; monitoring network traffic of each process on the list of processes; upon detecting network traffic for a process on the list of processes, determining that the type of network traffic detected is not on the list of approved types for that process; and identifying the process as infected based on determining that the type of network traffic detected is not on the list of approved types for that process.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: September 26, 2017
    Assignee: Symantec Corporation
    Inventors: Kevin Alejandro Roundy, Jie Fu, Tao Cheng, Zhi Kai Li, Fanglu Guo, Sandeep Bhatkar
  • Patent number: 9773108
    Abstract: The disclosed computer-implemented method for performing operations on restricted mobile computing platforms may include (1) receiving a request to perform an operation on a mobile device, (2) requesting access to a synchronization profile of the mobile device that represents the current state of the mobile device, (3) receiving access to the synchronization profile, and (4) performing the operation on the mobile device by performing an analogous operation on the synchronization profile. In some examples, the operation may require access to a current state of the mobile device, and a mobile computing platform of the mobile device may place a limitation on the ability of third-party software to (a) inspect the current state of the mobile device, (b) modify the current state of the mobile device, and/or (c) execute resource-intensive operations via the mobile device. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: September 26, 2017
    Assignee: Symantec Corporation
    Inventors: Matthew Yeo, Radoslav Stanev
  • Patent number: 9769151
    Abstract: Techniques are disclosed for generating multiple key pairs using different algorithms and similarly installing certificates signed using the different algorithms. A customer server receives a selection of algorithms for generating a public/private key pair (e.g., RSA, ECC, DSA, etc.). The customer server generates key pairs for each selection and also generates corresponding certificate signing requests (CSR). The customer server sends the CSRs to a certificate authority (CA). The CA generates certificates associated with algorithm and sends the certificates to the customer server. The customer server may prompt a user to select one or more of the certificates to install, and upon receiving the selection, the customer installs the certificates.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: September 19, 2017
    Assignee: Symantec Corporation
    Inventors: Michael Klieman, Perry Tancredi
  • Patent number: 9769086
    Abstract: Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic account and device management. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a user device to be managed. The one or more processors may be configured to transmit a request for delegate authority to manage the user device. The one or more processors may be configured to receive delegate authority to manage the user device. The one or more processors may be configured to provide network access to the user device. The one or more processors may also be configured to manage the user device and monitor data communicated to and from the user device.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: September 19, 2017
    Assignee: Symantec Corporation
    Inventors: Paul Agbabian, Shaun Cooley
  • Patent number: 9767004
    Abstract: Embodiments presented herein describe techniques to track and correct indirect function calls in disassembled object code. Assembly language source code is generated from a binary executable object. The assembly language source code may include indirect function calls. Memory addresses associated with the function calls are identified. A central processing unit (CPU) interrupt instruction is inserted in the disassembled source code at each indirect function call. The disassembled source code is executed. When the interrupt at each indirect function call is triggered, the function name of a function referenced by a register may be determined.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: September 19, 2017
    Assignee: Symantec Corporation
    Inventors: Hong Yi Yang, Rui Guo
  • Patent number: 9769195
    Abstract: A computer-implemented method for efficiently allocating resources for behavioral analysis may include (1) determining a file type of a first file subject to behavioral analysis, (2) loading the first file within an environment for behavioral analysis to observe at least one behavior within the environment attributable to the first file, (3) observing a malicious behavior within the environment and attributing the malicious behavior to the first file, (4) determining a timing of the malicious behavior after loading the first file within the environment, and (5) limiting an amount of time dedicated to analyzing a second file within the environment based at least in part on the timing of the malicious behavior after loading the first file within the environment and due to the second file being of the same file type as the first file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 16, 2015
    Date of Patent: September 19, 2017
    Assignee: Symantec Corporation
    Inventor: Andrew Watson
  • Patent number: 9762593
    Abstract: Systems and methods to automatically generate signatures used to detect malware are provided. The systems and methods use machine learning techniques, to build an over-trained heuristic model to analyze software, cluster identified patterns, validate the clusters against known reputational metrics, automatically create signatures and, in some examples, deploy such signatures to remote computing devices.
    Type: Grant
    Filed: September 9, 2014
    Date of Patent: September 12, 2017
    Assignee: Symantec Corporation
    Inventors: Mark Kennedy, Kenneth Coleman
  • Patent number: 9763096
    Abstract: A network access point secures a WiFi network, and acts as a picocell, by identifying applications running on computer-based devices, such as mobile phones, tablet computers, and the like, that seek to access the Internet (or another network) via the access point and applying network access policies to data communications by those applications according to application, location, context, device and/or user characteristics.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: September 12, 2017
    Assignee: Symantec Corporation
    Inventors: Qing Li, Gregory S. Clark
  • Patent number: 9756007
    Abstract: A computer-implemented method for detecting compromised messaging accounts may include maintaining a behavior database that associates a plurality of messaging accounts with messaging behaviors that typify each of the messaging accounts. The method may also include detecting an attempt by a user to send a message from a messaging account. In addition, the method may include determining that the messaging account has potentially been compromised by comparing features of the message with messaging behaviors associated with the messaging account in the behavior database. Finally, the method may include verifying that the user is an owner of the messaging account in response to the determination that the messaging account has potentially been compromised. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 18, 2013
    Date of Patent: September 5, 2017
    Assignee: Symantec Corporation
    Inventors: Gianluca Stringhini, Olivier Thonnard
  • Patent number: 9754109
    Abstract: A computer-implemented method for managing access may include (1) identifying an attempt to perform, within a computing environment, an action that involves a specific entity, (2) determining that the attempted action is anomalous for the specific entity, (3) identifying a quota of allowed anomalous actions for the specific entity, (4) determining that the attempted action causes a count of anomalous actions to exceed the quota of allowed anomalous actions, and (5) performing a security action based on the determination that the attempted action causes the count of anomalous actions to exceed the quota of allowed anomalous actions. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 5, 2015
    Date of Patent: September 5, 2017
    Assignee: Symantec Corporation
    Inventors: Aleatha Parker-Wood, Michael Hart, Darren Shou, Chetan Verma
  • Patent number: 9756505
    Abstract: The disclosed computer-implemented method for on-demand provisioning of access-point accounts may include receiving, at an access point, a first request from an unknown guest to access a secured network. The guest may not yet have an account with the access point that allows the guest to access the secured network, and the first request may include authentication information that was generated from a credential of the unknown guest that is required by the access point to provision the account for the guest. The computer-implemented method may further include (1) receiving a second request that includes the credential from an administrator of the secured network to provision the account for the guest using the credential, (2) provisioning the account for the guest using the credential, and (3) enabling the guest to access the secured network using the account for the guest. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 8, 2015
    Date of Patent: September 5, 2017
    Assignee: Symantec Corporation
    Inventors: Kevin Jiang, Michael Shavell
  • Patent number: 9755984
    Abstract: Methods, apparatuses and systems directed to an aggregate bandwidth utilization control scheme including fair share bandwidth allocation and dynamic allocation of bandwidth in response to detected traffic utilization. In one implementation, the present invention includes a weighted, fair share aggregate bandwidth allocation mechanism that dynamically responds to observed bandwidth utilization to provide unutilized or excess bandwidth to flows and partitions that require it. In another implementation, the present invention features a weighted fair share allocation scheme for hierarchical partition configurations. In other implementations, the present invention provides a per-flow target rate assignment mechanism that prevents spiraling decline of data flow rates.
    Type: Grant
    Filed: October 14, 2008
    Date of Patent: September 5, 2017
    Assignee: SYMANTEC CORPORATION
    Inventors: Azeem Feroz, Wei-Lung Lai, Roopesh R. Varier, James J. Stabile, Jon Eric Okholm
  • Patent number: 9754106
    Abstract: The disclosed computer-implemented method for classifying security events as targeted attacks may include (1) detecting a security event in connection with at least one organization, (2) comparing the security event against a targeted-attack taxonomy that identifies a plurality of characteristics of targeted attacks, (3) determining that the security event is likely targeting the organization based at least in part on comparing the security event against the targeted-attack taxonomy, and then in response to determining that the security event is likely targeting the organization, (4) classifying the security event as a targeted attack. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 14, 2014
    Date of Patent: September 5, 2017
    Assignee: Symantec Corporation
    Inventors: Kevin Alejandro Roundy, Sandeep Bhatkar
  • Patent number: 9754086
    Abstract: The disclosed computer-implemented method for customizing privacy control systems may include (1) identifying a data entry, from within a set of data entries stored on a computing device, that has been selected to be inaccessible by an application installed on the computing device, (2) marking the data with an indication that the data entry has been selected to be inaccessible by the application, (3) intercepting an attempt made by the application to access the data entry, (4) determining that the application is not permitted to access the data entry by identifying the indication that the data entry was selected to be inaccessible by the application, and (5) blocking the application from accessing the data entry in response to determining that the data entry has been marked as inaccessible while allowing at least one additional application to access the data entry. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: September 5, 2017
    Assignee: Symantec Corporation
    Inventor: Zhao Han
  • Patent number: 9749331
    Abstract: A cloud service access and information gateway receives a first authentication factor for a user in a single sign-on system. The single sign-on system provides access to a plurality of cloud services. The gateway receives, from a user device, a request to access a cloud service of the plurality of cloud services. The gateway compares a context of the request to an access policy for the single sign-on system and grants conditional access to the cloud service based on the access policy.
    Type: Grant
    Filed: May 3, 2012
    Date of Patent: August 29, 2017
    Assignee: Symantec Corporation
    Inventors: Robert Koeten, Nicolas Popp
  • Patent number: 9749446
    Abstract: A method of dynamically servicing a client request is provided. A consolidated computing environment receives a client request at a single front end service. Desired environment parameters, including usage parameter information are parsed from the request. Resources are allocated in accordance with this usage parameter information, and the allocated computing resources cooperate to create a virtual environment. The client request is executed in this virtual environment.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: August 29, 2017
    Assignee: Symantec Corporation
    Inventors: Michael Shavell, Andrew Chang, Ashok Vengala
  • Patent number: 9749299
    Abstract: The disclosed computer-implemented method for image-based encryption of cloud data may include (1) identifying a user account for a cloud data store, wherein the cloud data store stores at least one secret to be secured by encryption on behalf of the user account, (2) receiving an image file to be used at least in part to generate a cryptographic element to be used for encrypting the secret, the cryptographic element capable of being re-created when the image file is provided again at a later time, (3) using at least one cryptographic function, generating the cryptographic element based at least in part on the image file, and (4) securing the secret by encrypting the secret using the cryptographic element. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: August 29, 2017
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Lei Gu, Matt Boucher
  • Patent number: 9743040
    Abstract: The disclosed computer-implemented method for facilitating eye contact during video conferences may include (1) detecting a video conference between a user of a computing device and a remote user of a remote computing device, (2) identifying a location on the computing device's screen where the eyes of the remote user are displayed as part of the video conference, (3) creating a video stream of the user that appears to be taken from the perspective of an imaginary camera located at the eyes of the remote user, and (4) transmitting the video stream of the user to the remote computing device of the remote user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 3, 2015
    Date of Patent: August 22, 2017
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Ilya Sokolov