Patents Assigned to Symantec
  • Patent number: 9544287
    Abstract: The disclosed computer-implemented method for performing authentication at a network device may include (1) storing, at a network device that handles traffic for at least one endpoint device within a network, an authentication credential associated with a user of the endpoint device, (2) detecting, at the network device, a communication between the endpoint device within the network and a cloud-based application outside the network, (3) determining, at the network device, that access to the cloud-based application is protected by an authentication process, and (4) causing the network device to complete at least a portion of the authentication process for the user by providing the authentication credential associated with the user from the network device to an identity provider of the cloud-based application. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 18, 2014
    Date of Patent: January 10, 2017
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Keith Newstadt
  • Publication number: 20170005893
    Abstract: A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (DLP) policy.
    Type: Application
    Filed: September 19, 2016
    Publication date: January 5, 2017
    Applicant: Symantec Corporation
    Inventor: William GAUVIN
  • Patent number: 9537854
    Abstract: Techniques are disclosed for managing a digital certificate enrollment process. A certificate assistant on a server is configured to encode certificate enrollment data in a barcode graphic, such as a quick response (QR) code. A mobile phone application can then scan the barcode graphic using a camera to recover and transmit the enrollment data to a certificate authority. Doing so allows a system administrator (or other user) to complete the certificate enrollment process in cases where the server is blocked from connecting to a certificate authority (CA) directly, e.g., because the server is behind a firewall blocking any outbound network connections from being initiated.
    Type: Grant
    Filed: April 18, 2014
    Date of Patent: January 3, 2017
    Assignee: Symantec Corporation
    Inventor: Ishita Verma
  • Patent number: 9535868
    Abstract: A machine has a bus, an input port connected to the bus to receive inbound network traffic, an output port connected to the bus to convey outbound network traffic and a processor complex connected to the bus. The processor complex is configured as a pipeline with individual processor cores assigned individual network traffic processing tasks. The pipeline includes a first set of processor cores to construct network traffic trees characterizing the inbound network traffic and the outbound network traffic. Each network traffic tree characterizes traffic type and traffic rate. A second set of processor cores enforces network traffic policies utilizing the network traffic trees. The network traffic policies apply traffic rate control by traffic type for the inbound network traffic and the outbound network traffic.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: January 3, 2017
    Assignee: Symantec Corporation
    Inventors: Qing Li, Min Hao Chen, Haibaio Fan, Wenjing Wang
  • Patent number: 9529733
    Abstract: The disclosed computer-implemented method for securely accessing encrypted data stores may include (1) receiving, from a data storage service, a request to permit authenticated access to an encrypted data store administered by the data storage service, the request including a cryptographic element associated with the encrypted data store that has been encrypted using a public key associated with the authentication device, (2) decrypting the cryptographic element associated with the encrypted data store using a private key associated with the authentication device, (3) encrypting the cryptographic element associated with the encrypted data store using a public key associated with a cryptographic client, and (4) transmitting the encrypted cryptographic element to the cryptographic client to enable the cryptographic client to perform cryptographic operations on the encrypted data store. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 18, 2014
    Date of Patent: December 27, 2016
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Brian Powell
  • Patent number: 9529990
    Abstract: A computer-implemented method for validating login attempts based on user location may include (1) detecting a login attempt by a user to log into a user account, where the login attempt originates from an atypical location, (2) determining that the atypical location is inconsistent with a pattern of past login locations for the user, (3) retrieving location information that indicates a current location of the user from at least one third-party Internet resource, (4) determining, based on the location information, that the atypical location of the login attempt matches the current location of the user, and (5) trusting that the login attempt legitimately originates from the user based at least in part on the atypical location matching the current location of the user. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: December 27, 2016
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Ilya Sokolov
  • Patent number: 9529977
    Abstract: A computer-implemented method for performing data-loss-prevention scans may include identifying a subset of data-storage locations on a first computing system that are likely to contain sensitive information. The method may also include performing a quick scan on the first computing system by scanning the subset of data-storage locations that are likely to contain sensitive data and excluding other locations from the quick scan. The method may further include identifying sensitive data during the quick scan and applying a data-loss-prevention policy to the sensitive data. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 31, 2009
    Date of Patent: December 27, 2016
    Assignee: Symantec Corporation
    Inventor: Manjinder Nijjar
  • Publication number: 20160371508
    Abstract: Techniques for managing privacy of a network communication may be realized as a computer-implemented system, including one or more processors that store instructions, and one or more computer processors that execute the instructions to receive a first network communication, extract information from the first network communication, identify a privacy rule based on the information, generate a second network communication based on the first network communication and the privacy rule, and cause the second network communication to be sent.
    Type: Application
    Filed: June 22, 2015
    Publication date: December 22, 2016
    Applicant: SYMANTEC CORPORATION
    Inventors: Bruce E. MCCORKENDALE, William E. SOBEL
  • Patent number: 9525664
    Abstract: A computer-implemented method for providing secure access to local network devices may include (1) identifying a local area network that provides Internet connectivity to at least one device within the local area network, (2) obtaining, from an identity assertion provider, (i) a shared secret for authenticating the identity of a guest user of the device and (ii) a permission for the guest user to access the device from outside the local area network, (3) storing the shared secret and the permission within the local area network, (4) receiving, via the Internet connectivity, a request by the guest user from outside the local area network to access the device, and (5) providing access to the device in response to validating the request based on the shared secret and the permission. Various other methods and systems are also disclosed.
    Type: Grant
    Filed: February 28, 2014
    Date of Patent: December 20, 2016
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 9525665
    Abstract: A computer-implemented method for obscuring network services may include (1) identifying a local network comprising at least one client and at least one host, where the host provides a service that is not bound to any routable address on the local network and the client is expected to send messages to the service, (2) provisioning the client with a proxy that intercepts the messages directed to the service by the client, identifies the host that provides the service, and adds at least one layer of encryption to the messages, (3) configuring the proxy to route the messages through an onion routing network within the local network that comprises at least one onion routing node, and (4) configuring the onion routing network to remove the at least one layer of encryption from the messages before forwarding the messages. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: December 20, 2016
    Assignee: Symantec Corporation
    Inventors: Nathan Evans, Azzedine Benameur, Matthew Elder
  • Patent number: 9519780
    Abstract: A computer-implemented method for identifying malware may include (1) determining, for multiple commands within bytecode associated with a malware program, whether each command constitutes an invocation command, (2) filtering, based on the determination, invocation commands from the bytecode, (3) adding, for each invocation command filtered from the bytecode, an opcode, a format code, and a function prototype to a collection of opcodes, format codes, and function prototypes, (4) generating a digital fingerprint of the collection including the opcode, the format code, and the function prototype for each invocation command filtered from the bytecode, and (5) performing, by a computer security system, a remedial action to protect a user in response to detecting the presence of a variant of the malware program by determining that the digital fingerprint matches a candidate instance of bytecode under evaluation. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 15, 2014
    Date of Patent: December 13, 2016
    Assignee: Symantec Corporation
    Inventor: Jiang Dong
  • Patent number: 9514312
    Abstract: A method and system for low-memory footprint fingerprinting and indexing for efficiently measuring document similarity and containment are described. A method may include extracting, by a processor, content from a set of one or more data files. The method may also determine a size of the content and apply a hash function to the content to generate multiple hashes. The method selects a constrained set of the hashes to generate a fixed-size fingerprint representative of the content when the size of the content is greater than a threshold size. The method stores the fixed-size fingerprint representative of the content in an endpoint index for at least partial file content matching by an endpoint device. The method may employ a statistical-based optimization to speed-up query time.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: December 6, 2016
    Assignee: Symantec Corporation
    Inventors: Ramzi Abi Antoun, Stefano Emiliozzi, Yuval Tarsi, Craig Olinsky
  • Patent number: 9514309
    Abstract: A computer-implemented method for protecting files from malicious encryption attempts may include (1) detecting an attempt to alter a file, (2) identifying at least one characteristic of the attempt to alter the file, (3) determining, based on the characteristic of the attempt to alter the file, that the attempt to alter the file represents a malicious attempt by a third party to encrypt the file, and (4) performing a security action in response to determining that the attempt to alter the file represents a malicious attempt by the third party to encrypt the file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: December 6, 2016
    Assignee: Symantec Corporation
    Inventor: Uri Mann
  • Patent number: 9515998
    Abstract: A method and apparatus for detecting preselected data embedded in electronically transmitted messages is described. In one embodiment, the method comprises monitoring messages electronically transmitted over a network for embedded preselected data and performing content searches on the messages to detect the presence of the embedded preselected data using an abstract data structure derived from the preselected data.
    Type: Grant
    Filed: January 8, 2014
    Date of Patent: December 6, 2016
    Assignee: Symantec Corporation
    Inventor: Kevin T. Rowney
  • Patent number: 9509697
    Abstract: The disclosed computer-implemented method for authorizing attempts to access shared libraries may include (1) detecting an attempt by a process to access a shared library, (2) identifying a call stack of the process, (3) inspecting the call stack to determine whether a method that initiated the attempt is authorized to access the shared library, and (4) causing the attempt to be allowed if the method is authorized to access the shared library or blocked if the method is not authorized to access the shared library. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: November 29, 2016
    Assignee: Symantec Corporation
    Inventor: Jonathon Salehpour
  • Patent number: 9501649
    Abstract: A computer-implemented method for determining potential impacts of applications on the security of computing systems may include (1) identifying an application subject to a security vulnerability assessment, (2) requesting information that identifies a potential impact of the application on a vulnerability of at least one computing system to at least one exploit associated with the application, (3) receiving the information that identifies the potential impact of the application on the vulnerability of the computing system, wherein the information may be derived at least in part from data from at least one additional computing system on which the application has previously been installed and (4) directing a determination about an installation of the application on the computing system based at least in part on the information that identifies the potential impact of the application on the vulnerability of the computing system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: November 22, 2016
    Assignee: Symantec Corporation
    Inventors: Piyush Sharma, Peter Ashley
  • Patent number: 9501251
    Abstract: Techniques for print monitoring are disclosed. In one embodiment, the techniques may be realized as a method including monitoring a spool directory associated with a printing system; identifying, for a print job file, a file management call that is made before the print job file is submitted to a printer driver to carry out a print job; blocking the file management call; analyzing the print job file for sensitive data; in response to determining that the print job file does not include sensitive data, re-initiating the file management call for the print job file; and submitting the print job file to a printer driver to carry out a print job.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: November 22, 2016
    Assignee: Symantec Corporation
    Inventors: Rupesh Hanumant Khetawat, Manish Vinaykumar Pai
  • Patent number: 9495538
    Abstract: Security software on a client observes a request for a resource from an application on the client and then determines the application's reputation. The application's reputation may be measured by a reputation score obtained from a remote reputation server. The security software determines an access policy from a graduated set of possible access policies for the application based on the application's reputation. The security software applies the access policy to the application's request for the resource. In this way, the reputation-based system uses a graduated trust scale and a policy enforcement mechanism that restricts or grants application functionality for resource interactivity along a graduated scale.
    Type: Grant
    Filed: September 25, 2008
    Date of Patent: November 15, 2016
    Assignee: Symantec Corporation
    Inventors: Kenneth Schneider, Bruce McCorkendale
  • Patent number: 9497585
    Abstract: A computer-implemented method for managing emergency information may include intercepting, on a mobile-computing device, an emergency communication being transmitted from the mobile-computing device. Intercepting the emergency communication may include monitoring outgoing communications on the mobile-computing device and determining that an outgoing communication being monitored is a communication about an emergency. This method may also include sending, from the mobile-computing device to a remote server that collects emergency data from a plurality of mobile-computing devices, information about the emergency communication and location information that identifies a location of the emergency. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: November 15, 2016
    Assignee: Symantec Corporation
    Inventors: Shaun Cooley, Charles Payne, Henry Schaup, Vijay Perumal
  • Patent number: D772241
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: November 22, 2016
    Assignee: Symantec Corporation
    Inventor: Gregory S. Capano