Patents Assigned to Symantec
-
Patent number: 9147066Abstract: A computer-implemented method for providing controls for application behavior may include (1) identifying an application that is distributed via an application repository and that is configured to use a permission on a computing platform that enables the application to access a feature of the computing platform, (2) receiving a request to reconfigure the application to intercept and interfere with attempts by the application to use the permission, (3) reconfiguring the application, in response to the request, to intercept and interfere with attempts by the application to use the permission, (4) determining that an updated version of the application is available via the application repository, and (5) reconfiguring the updated version of the application to intercept and interfere with attempts by the application to use the permission in response to an instruction to update the application. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 26, 2013Date of Patent: September 29, 2015Assignee: Symantec CorporationInventors: Xue Feng Tian, Barry Laffoon, Bruce McCorkendale
-
Patent number: 9146935Abstract: A computer-implemented method may include identifying at least one file and detecting an event that is suggestive of at least a portion of the file being duplicated in at least one additional file. The computer-implemented method may also include classifying the file as a candidate for deduplication in response to detecting the event. The computer-implemented method may further include maintaining the file's candidate-for-deduplication classification for use in prompting a determination on whether the portion of the file is already stored within a storage device.Type: GrantFiled: August 14, 2014Date of Patent: September 29, 2015Assignee: Symantec CorporationInventor: Namita Agrawal
-
Patent number: 9148353Abstract: A computer-implemented method for correlating computing problems referenced in social-network communications with events potentially responsible for the same may include: 1) providing a social-network feedback mechanism that enables users to express frustration with computing problems in real time via a social-network service, 2) detecting at least one user communication generated via the social-network feedback mechanism that references at least one computing problem experienced by a user, and then 3) correlating the computing problem referenced in the user communication with at least one event potentially responsible for the computing problem. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 29, 2010Date of Patent: September 29, 2015Assignee: Symantec CorporationInventors: Joseph Pasqua, Mark Bregman
-
Patent number: 9146822Abstract: Systems and methods for cluster maintenance are presented. In one embodiment a cluster configuration method includes: maintaining configuration information associated with a first node and a second node, including cluster configuration version information; evaluating the first node as a potential configuration update node for the second node, including evaluating an indication of potential partial snapshot update availability based upon the configuration information associated with the first node and configuration information associated with the second node; performing an update type selection, including continued analysis of partial snapshot update availability; and performing an update for the second node in accordance with results of the update type selection.Type: GrantFiled: June 30, 2010Date of Patent: September 29, 2015Assignee: Symantec CorporationInventors: Swapnil Dilip Patankar, Prabhat Alok Tyagi, Hetal Dhiren Rach, Rodney Peter Martis
-
Patent number: 9146953Abstract: A document handling device receives a request to perform a task on document data, the document data comprising at least one of an electronic document to be converted by the document handling device into a non-digital form or a physical document received by the document handling device in the non-digital form. Responsive to receiving the request, the document handling device makes a determination as to whether the requested task violates a data loss prevention policy, and performs an action based on the determination.Type: GrantFiled: December 17, 2012Date of Patent: September 29, 2015Assignee: SYMANTEC CORPORATIONInventors: Brian Hernacki, William E. Sobel
-
Patent number: 9146790Abstract: Various systems and methods for managing node connectivity in distributed storage systems are disclosed. For example, one method involves detecting a communication fault between two nodes. A first node is configured to communicate input/output (I/O) requests to the second node as in-flight I/O requests. The second node is configured to communicate locally generated I/O requests and the received I/O requests to storage devices. Once the communication fault is detected, a fencing operation is performed. The fencing operation can include processing some of the received I/O requests by the second node, and rejecting any additional in-flight I/O requests received from the first node.Type: GrantFiled: November 2, 2012Date of Patent: September 29, 2015Assignee: Symantec CorporationInventors: Prasanta R. Dash, Amarinder Singh Randhawa, Asmita Jagtap, Chaitanya Yalamanchili, Madhav Buddhi
-
Publication number: 20150269067Abstract: A computer-implemented method for identifying access rate boundaries of workloads may include (1) tracking the number of times each region of data within a plurality of regions of data is accessed during a period of time, (2) creating an ordered list of each region of data from the plurality of regions of data, (3) calculating one or more drops in access rates between two or more regions of data in the ordered list, (4) determining that a calculated access-rate drop from a first region of data to a second region of data exceeds a predefined threshold, and (5) calculating a boundary access rate for a workload of data. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: May 4, 2014Publication date: September 24, 2015Applicant: Symantec CorporationInventors: Niranjan Pendharkar, Shailesh Marathe, Sumit Dighe, Ronald Karr, Bhooshan Thakar
-
Publication number: 20150271171Abstract: The disclosed computer-implemented method for discovering website certificate information may include (1) receiving, from a plurality of computing devices within a community of users, information that identifies the certificate statuses of websites visited by the computing devices, (2) identifying, by analyzing the information, at least one issue with the certificate status of at least one website visited by at least one of the computing devices, and (3) performing at least one remedial action in an attempt to correct the issue with the certificate status of the website. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: May 3, 2014Publication date: September 24, 2015Applicant: Symantec CorporationInventors: Samir Kumar Rakshit, Vasantha Kumar Parameshwarappa
-
Publication number: 20150271145Abstract: A computer-implemented method for smart cipher selection may include (1) receiving, at a server and from a client, a request to communicate according to a cipher for encryption, the request containing a client list of ciphers available at the client, (2) identifying a server list of ciphers available at the server, (3) measuring, in response to receiving the request, a resource load at the server and a risk factor indicating a degree of risk posed by the client, and (4) selecting a common cipher, from the client list and the server list, for encrypted communication based on the measured resource load at the server and the measured risk factor indicating the degree of risk posed by the client. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: May 2, 2014Publication date: September 24, 2015Applicant: Symantec CorporationInventors: Pradeep Jalisatgi, Alok Naik
-
Publication number: 20150269386Abstract: A computer-implemented method for increasing compliance with data loss prevention policies may include (1) identifying a file that is subject to a data loss prevention policy, (2) determining a classification of the file according to the data loss prevention policy, (3) identifying a graphical user interface that is configured to display a representation of the file, and (4) enhancing the representation of the file within the graphical user interface with a visual indication of the classification of the file according to the data loss prevention policy. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: May 2, 2014Publication date: September 24, 2015Applicant: Symantec CorporationInventors: Rupesh Hanumant Khetawat, Amol Sharadchandra Ghatge, Sagar Shashikant Sonawane
-
Publication number: 20150271207Abstract: A computer-implemented method for providing targeted data loss prevention on unmanaged computing devices may include (1) identifying a data loss prevention policy that defines permissible data handling within set bounds to prevent unauthorized data exfiltration from the set bounds, (2) identifying an application to install on at least one unmanaged endpoint device, where (i) the unmanaged endpoint device lacks a data loss prevention agent configured to apply the data loss prevention policy to the entire unmanaged endpoint device and (ii) the application is to be provided to the unmanaged endpoint device to operate on sensitive data from within the set bounds, and (3) wrapping the application in an application wrapper that intercepts system calls from the application and applies the data loss prevention policy to sensitive data implicated in the system calls. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: May 2, 2014Publication date: September 24, 2015Applicant: Symantec CorporationInventors: Sumesh Jaiswal, Prahalad Deshpande
-
Publication number: 20150271122Abstract: The disclosed computer-implemented method for managing security certificates through email may include (1) receiving an encrypted email that contains both identifying information that identifies a security certificate for authenticating a website and a management command relating to the security certificate, (2) determining whether authentication of the encrypted email succeeded such that the management command is authorized, and (3) when a determination is made that authentication of the encrypted email succeeded, identifying the security certificate using the identifying information and executing the management command with respect to the identified security certificate. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: May 2, 2014Publication date: September 24, 2015Applicant: Symantec CorporationInventors: Pradeep Jalisatgi, Alok Naik
-
Patent number: 9141449Abstract: A server node can monitor the status of servers in a server cluster. The node may receive an alert indicating that a server in the server cluster is unavailable. In response to the alert, the node can send instructions that cause pending remote procedure call requests to be canceled and then reissued to another server in the server cluster instead of to the first server.Type: GrantFiled: October 30, 2009Date of Patent: September 22, 2015Assignee: Symantec CorporationInventors: Nagaraj Shyam, Craig Harmer, Ken Beck
-
Patent number: 9141790Abstract: A computer-implemented method for using event-correlation graphs to detect attacks on computing systems may include (1) detecting a suspicious event involving a first actor within a computing system, (2) constructing an event-correlation graph that includes a first node that represents the first actor, a second node that represents a second actor, and an edge that interconnects the first node and the second node and represents a suspicious event involving the first actor and the second actor, (3) calculating, based at least in part on the additional suspicious event, an attack score for the event-correlation graph, (4) determining that the attack score is greater than a predetermined threshold, and (5) determining, based at least in part on the attack score being greater than the predetermined threshold, that the suspicious event may be part of an attack on the computing system. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 30, 2013Date of Patent: September 22, 2015Assignee: Symantec CorporationInventors: Kevin Roundy, Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu, Zhi Kai Li, Darren Shou, Sanjay Sawhney, Acar Tamersoy, Elias Khalil
-
Patent number: 9143497Abstract: A computer-implemented method for providing secure mobile email communications is described. At least one application programming interface (API) of a native email client is hooked in order to transmit data securely via email. The native email client is native to an operating system of the mobile device. An email originating from a registered application is detected, via the hooked API. The email includes the data to transmit securely. The registered application is registered in a registry according to a mobile application authentication procedure. The registry includes a plurality of registered applications authenticated according to the mobile application authentication procedure.Type: GrantFiled: July 19, 2013Date of Patent: September 22, 2015Assignee: Symantec CorporationInventors: Thomas Jeffrey Enderwick, Bruce McCorkendale
-
Patent number: 9141795Abstract: Techniques for detecting malicious activity are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting malicious activity including receiving information indicating a first process being executed, the first process including a plurality of first process components, receiving information specific to at least one of the plurality of first process components, determining whether the first process exhibits malicious behavior; and identifying which of the plurality of first process components is responsible for the malicious behavior based on the received information.Type: GrantFiled: May 3, 2013Date of Patent: September 22, 2015Assignee: Symantec CorporationInventor: Sourabh Satish
-
Patent number: 9141808Abstract: Data loss prevention systems and methods begin protecting data upon the creation of the data. One such method involves detecting a file system operation targeting data on a storage device. The file system operation creates or modifies the data or a set of permissions associated with the data. In response to detecting the file system operation, the method prevents unauthorized access to the data. The method begins preventing unauthorized access after the detection of the file system operation and before any subsequent read access to the data via the file system.Type: GrantFiled: October 29, 2010Date of Patent: September 22, 2015Assignee: Symantec CorporationInventors: Mukund Agrawal, Sumit Kumar, Anindya Banerjee, Anirban Mukherjee, Niranjan Pendharkar
-
Patent number: 9143410Abstract: Techniques for monitoring guest domains configured with alternate I/O domains are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for monitoring guest domains configured with alternate Input/Output (I/O) domains comprising, installing cluster services in a control domain, installing cluster services in one or more alternate I/O domains, configuring, using at least one computer processor, an alternate service group to monitor services from multiple I/O domains, and configuring a logical domain service group, wherein the logical domain service group manages a guest domain which receives I/O services from either the control domain or the at least one alternate I/O domain which are monitored via the alternate I/O service group.Type: GrantFiled: December 21, 2011Date of Patent: September 22, 2015Assignee: Symantec CorporationInventors: Sajith C. Radhakrishnan, Venkatareddy Chappavarapu
-
Patent number: 9143435Abstract: Various systems and methods for determining and/or using paths through switches of distributed computing system. For example, one method involves accessing switch information by accessing switches using a first network protocol, where the switch information includes parameters of the switches. One or more nodes are configured to access storage devices using the switches, and the node is configured to perform the access using a second network protocol. The method also involves determining one or more paths through the switches, where path is configured to couple the node to the storage devices. The method also involves calculating a path score for at least one path, where the path score can indicate health of the path.Type: GrantFiled: October 19, 2012Date of Patent: September 22, 2015Assignee: Symantec CorporationInventors: Sundar Ramamoorthy, Charles Paul Jerian
-
Publication number: 20150264084Abstract: A computer-implemented method for protecting organizations against spear phishing attacks may include (1) searching a plurality of websites for user profiles belonging users who are affiliated with an organization and who have access to at least one privileged computing resource controlled by the organization, (2) retrieving, from the user profiles, personal information describing the users, (3) determining, based on the personal information, that a portion of the user profiles belongs to an individual user with access to the privileged computing resource, (4) identifying at least one phishing attack risk factor in the user profiles that belong to the individual user, and (5) assessing, based at least in part on the phishing attack risk factor, a risk of a phishing attack targeting the individual user to illegitimately gain access to the privileged computing resource. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: April 25, 2014Publication date: September 17, 2015Applicant: Symantec CorporationInventors: Anand Kashyap, Sudhanshu Shekhar