Patents Assigned to Symantec
  • Patent number: 9218256
    Abstract: A computer-implemented method for shipping I/O operations to prevent replication failure may include 1) attempting to perform an I/O operation in a system configured to replicate data from a data cluster to another data cluster, 2) detecting a failure in at least part of the attempt to perform the I/O operation that threatens to fail the system's replication of data from the data cluster to the other data cluster, and, in response to detecting the failure, 3) shipping the I/O operation from a node originally responsible for servicing the I/O operation to another node to complete the I/O operation without failing the system's replication of data from the data cluster to the other data cluster. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: December 22, 2015
    Assignee: Symantec Corporation
    Inventors: Prasanta Dash, Yatin Nayak, Kirubakaran Kaliannan, Satyendra Thakur
  • Patent number: 9218495
    Abstract: A computer-implemented method for sharing logs of a child's computer activities with a guardian of the child is disclosed. The method may include determining that a child may be involved in a computer activity on a computing device that is not controlled by a guardian of the child, monitoring the computer activity, creating a log of the computer activity, determining that the guardian of the child is authorized to view the log of the computer activity, and providing the log of the computer activity to the guardian of the child. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 25, 2009
    Date of Patent: December 22, 2015
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Shaun Cooley
  • Patent number: 9218345
    Abstract: A backup computer storage system that protects and/or recovers data on a primary computer storage system is disclosed. The backup computer system may be used to backup databases, files, and/or applications. In some embodiments, the backup system may be used to backup an image of the primary computer storage system. In other embodiments, the backup system may be used to backup one or more databases, replicate an image of data that is on the primary computer storage system, restore data from the backup system to the primary computer storage system, restore data to a database while non-affected portions of the database are available and can be used, record all transactions in real time without overwriting any previously stored backup data, and maintain historical and/or chronological information related to backed up data.
    Type: Grant
    Filed: August 19, 2009
    Date of Patent: December 22, 2015
    Assignee: Symantec Corporation
    Inventors: Gregory A. Becker, Robert Condon, David A. Knight, David E. Medders, Michael Rowan
  • Patent number: 9219655
    Abstract: A computer-implemented method for discovering network topologies. The method may include (1) receiving, on a host system within a network, a switch-protocol message that includes a switch identifier, a port identifier, and/or a root path cost, (2) identifying a set of switches within the network based on the switch-protocol message, (3) determining how the set of switches are connected based on the switch-protocol message, and (4) mapping a topology of the network based on determining how the set of switches are connected. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 25, 2012
    Date of Patent: December 22, 2015
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, Nathan Evans, Matthew Elder
  • Patent number: 9219707
    Abstract: A computer-implemented method for sharing the results of malware scans within networks may include (1) identifying a set of files stored on a set of client devices within a network, (2) obtaining a set of copies of the files stored on the client devices within the network, (3) performing a malware scan on the copies of the files, (4) generating a result of the malware scan performed on the copies of the files, and then (5) sharing the result of the malware scan with at least a subset of the client devices within the network to enable the subset of client devices to use the result of the malware scan instead of each performing an additional malware scan that is at least partially redundant to the malware scan performed on the copies of the files. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 25, 2013
    Date of Patent: December 22, 2015
    Assignee: Symantec Corporation
    Inventors: Haik Mesropian, Wesley Jordan
  • Patent number: 9219728
    Abstract: A computer-implemented method for protecting services may include (1) identifying a service control manager, the service control manager having access to modify a configuration of at least one service, (2) identifying a request from a process for permission to access the configuration of the service, and, in response to the request, (3) authenticating the process based on at least one attribute of the process, (4) providing an authentication token to the process, (5) intercepting an attempt by the process to access the configuration of the service via the service control manager, the attempt including the authentication token, and, in response to the attempt, (6) validating the authentication token, and, in response to validating the authentication token, (7) allowing the process to access the configuration of the service. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: December 22, 2015
    Assignee: Symantec Corporation
    Inventor: Sarin Sumit Manmohan
  • Patent number: 9213618
    Abstract: The present disclosure provides storage management systems and methods. A hierarchical configuration information process includes accessing information regarding hierarchical relationships of components associated with a storage environment. A storage resource consumption detection process includes detecting consumption of storage resources included in the storage environment. A coordinated consumption analysis process is coordinated across multiple levels of an active spindle hierarchy. A reaction process includes performing an automated consumption notification process and an automated reclamation process based upon results of the storage resource consumption detection process.
    Type: Grant
    Filed: March 14, 2012
    Date of Patent: December 15, 2015
    Assignee: Symantec Corporation
    Inventors: Vidyut Kaul, Subhadeep De, Venkeepuram Satish
  • Patent number: 9213578
    Abstract: Information cluster systems and methods are presented. In one embodiment, a cluster method comprises: performing an engine process including issuing requests to bring a resource online, offline, and monitor the resources, wherein the engine process is performed by an engine; performing a resource interaction process including interacting with a resource and directing a resource to comply with the request from the engine process, wherein the resource interaction process is performed by a resource interaction agent; performing a predicate logic process including performing predicate logic operations to determine if a predicate logic condition associated with the resource is satisfied and forwarding an indication of the results of the predicate logic operations to the engine process, wherein the predicate logic process is performed by a predicate logic agent that is separate from the engine performing the engine process.
    Type: Grant
    Filed: November 11, 2011
    Date of Patent: December 15, 2015
    Assignee: Symantec Corporation
    Inventors: Udipta Das, Amol Katkar, Viraj Kamat, Praween Kumar
  • Patent number: 9213731
    Abstract: In general, a block of data in a data file is stored in a multi-tier storage system. The block of data includes multiple rows and multiple entry values per row, including values for a particular entry. The values of the particular entry in the data block can be used to determine whether to move the data block to a different tier of a multi-tier storage system. The block of data can then either be relocated in a different tier or kept in the current tier.
    Type: Grant
    Filed: May 13, 2010
    Date of Patent: December 15, 2015
    Assignee: Symantec Corporation
    Inventors: Raghupathi Malige, Meher Shah, Tillmann Reusse, Gautham Ravi
  • Patent number: 9215264
    Abstract: Techniques for monitoring secure cloud based content are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for monitoring secure cloud based content comprising monitoring, using a browser component, a secure session accessing cloud based content, the monitoring capable of accessing content other than content requested by a user of the browser, identifying content meeting a specified criteria, and performing a specified action based at least in part on the identified content.
    Type: Grant
    Filed: August 20, 2010
    Date of Patent: December 15, 2015
    Assignee: Symantec Corporation
    Inventors: Ilya Sokolov, Keith Newstadt
  • Patent number: 9208153
    Abstract: Profile information is maintained concerning users and files in the context of a file sharing and collaboration environment. Profile information quantifies each user's interest level in specific files, and levels of similarity between users and between files. Machine learning techniques are applied to monitored actions taken by users directed towards files, and profile information is dynamically updated in response. Natural language processing such as n-gram analysis is applied to files, and file similarity levels are increased in response to requisite amounts of common content. The event notification stream is filtered. For each specific event notification, a relevance value is quantified for each specific user, based on profile information concerning the specific user, the file to which the event is directed, and the user who undertook the event. The corresponding notification is only transmitted to specific users for whom the relevance value exceeds a predetermined threshold.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: December 8, 2015
    Assignee: Symantec Corporation
    Inventors: Ameet Zaveri, Walter Bogorad
  • Patent number: 9208235
    Abstract: A computer-implemented method for profiling a web application. A web page containing JavaScript (JS) is crawled. At least a portion of the JS is extracted from the crawled web page. An automated simulation of the extracted JS is executed.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: December 8, 2015
    Assignee: Symantec Corporation
    Inventor: Yin Liu
  • Patent number: 9210176
    Abstract: Attempts by computing devices to access centralized data are managed according to device classification level rules. A request to access centralized data is received from an unclassified computing device. The unclassified computing device is classified into a specific one of the defined classes, based at least partially on information concerning the computing device read from the received request. Where a definition of the unclassified computing device has already been assigned to a specific class, the unclassified computing device is classified accordingly. Otherwise, the unclassified computing device is compared to multiple classified computing devices, and the unclassified computing device is classified according to the one that is most similar. Responsive to the classification of the computing device, the received request to access centralized data is governed according to a device classification level rule which specifies access policy for computing devices of the defined class.
    Type: Grant
    Filed: July 31, 2013
    Date of Patent: December 8, 2015
    Assignee: Symantec Corporation
    Inventor: William E Sobel
  • Patent number: 9208348
    Abstract: A computer-implemented method for managing encrypted files within application packages may include (1) identifying an individual component within an application package that requires encryption, (2) creating an encrypted file by encrypting the individual component, (3) decomposing the encrypted file into (a) a primary encrypted file that contains an initial portion of the encrypted file that matches a critical attribute of the individual component and (b) an auxiliary encrypted file that contains the remaining portion of the encrypted file, and (4) replacing, within the application package, the individual component with the primary encrypted file and the auxiliary encrypted file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 15, 2014
    Date of Patent: December 8, 2015
    Assignee: Symantec Corporation
    Inventors: James E. Brennan, Nalini Ganapati
  • Patent number: 9208252
    Abstract: The number of redundant content items provided to a user by a multi-source feed reader is automatically reduced. Each content item obtained by the multi-source feed reader from each feed to which the users subscribes is analyzed prior to being made available to the user. More specifically, the content items are analyzed to determine whether they are based on source content from different feeds. Each content item is searched for attributes indicating a source on which it is based. Where it is determined that a content item from a first feed is based on source content from a second feed, it is further determined whether the user subscribes to the second feed which the source content is from. If so, the specific received content item from the first feed is not provided to the user.
    Type: Grant
    Filed: January 31, 2011
    Date of Patent: December 8, 2015
    Assignee: Symantec Corporation
    Inventor: Shaun Cooley
  • Patent number: 9208314
    Abstract: A computer-implemented method for distinguishing code of a program obfuscated within a packed program may include (1) retrieving memory of the packed program that includes the code of the obfuscated program in an unobfuscated state and unpacking code that unpacks the code of the obfuscated program when the packed program is executed, (2) identifying an import address table within the memory of the packed program, (3) determining that the import address table is an import address table of the code of the obfuscated program, (4) determining that a region of code within the memory of the packed program may be the code of the obfuscated program by determining that the region of code uses the import address table, and (5) performing a security operation on the region of code. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 19, 2013
    Date of Patent: December 8, 2015
    Assignee: Symantec Corporation
    Inventor: Sandeep Bhatkar
  • Patent number: 9208450
    Abstract: Techniques for processing electronic documents are disclosed. In one particular embodiment, the techniques may be realized as a method for processing electronic documents comprising obtaining an electronic document being sent over a network toward a destination, analyzing text content of the electronic documents to identify whether the electronic document matches any of a plurality of predefined document templates, wherein the electronic document conforms to a structure of at least one of the plurality of predefined document templates, and wherein the analyzing comprises executing at least one machine learning algorithm, the at least one machine learning algorithm trained using at least one sample electronic document having a predefined template, obtaining a document loss prevention (DLP) policy based on the at least one document template associated with the electronic document, and selectively allowing the electronic document to continue toward the destination based on the DLP policy.
    Type: Grant
    Filed: August 26, 2013
    Date of Patent: December 8, 2015
    Assignee: Symantec Corporation
    Inventors: Bijayalaxmi Nanda, Navin Kabra, Basant Rajan
  • Publication number: 20150350195
    Abstract: Techniques are presented herein for authenticating local process to a web service, both executing on a common host computer server. The local process may present a self-signed certificate to the web service. In response, the web service may identify a file system directory on the first computer server containing a file storing the self-signed certificate. If the subject information identifying the owner of the process matches file system metadata indicating an owner of the file, then the web service may consider the process as being authenticated to the web service.
    Type: Application
    Filed: June 2, 2014
    Publication date: December 3, 2015
    Applicant: Symantec Corporation
    Inventors: Pandu VANGARA, Priyanka LUTHRA, Prada VENKATACHALAM
  • Patent number: 9203815
    Abstract: A computer-implemented method for secure third-party data storage may include (1) identifying, at a server-side computing system, a data access request from a client system to access an encrypted file stored under a user account, (2) receiving a long poll request from the client system, (3) identifying an asymmetric key pair designated for the user account, the asymmetric key pair including an encryption key and a decryption key that has been encrypted with a client-side key, (4) responding to the long poll request with a message notifying the client system to transmit the client-side key, (5) receiving, from the client system, the client-side key, (6) decrypting the decryption key with the client-side key, and (7) using the decryption key to access an unencrypted version of the encrypted file. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 27, 2013
    Date of Patent: December 1, 2015
    Assignee: Symantec Corporation
    Inventors: Walter Bogorad, Eric Douglas
  • Patent number: 9202057
    Abstract: A computer-implemented method for identifying private keys that have been compromised may include (1) identifying a private key that enables a signatory to digitally sign applications, (2) collecting information about the private key from at least one public source, (3) determining, based on the information collected from the public source, that the private key has been compromised and is accessible to unauthorized signatories, and (4) performing a security action in response to determining that the private key has been compromised and is accessible to the unauthorized signatories. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: December 1, 2015
    Assignee: Symantec Corporation
    Inventors: Jun Mao, Matthew Yeo, Abubakar Wawda