Patents Assigned to Symantec
-
Patent number: 9104519Abstract: A mobile app is provisioned with an identifier of a specific partner of an app provider, on a sandboxed OS on a mobile device. A link to the app provider's website containing the partner ID is received from the partner's website. The user navigates to the provider's website, which writes a cookie containing the partner ID and redirects to an app store. The app is downloaded to the mobile device, and registers itself with the OS as a protocol handler for a provider specific protocol. The app launches the provider's website, which retrieves the partner ID from the cookie, and returns a redirect to the provider specific protocol. The redirect contains the partner ID, and causes the app to execute as the registered protocol handler for the provider specific protocol. The app reads the partner ID from the redirect, and uses it to provide partner specific features.Type: GrantFiled: June 17, 2013Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Keith Newstadt, Petrus Johannes Viljoen, Anubhav Savant
-
Patent number: 9104339Abstract: In response to a request received from a guest alignment module, host alignment module determines a target starting location in a virtual hard disk to which the beginning of a guest partition of a virtual machine is written. Host alignment module translates a guest partition's virtual hard disk address into a physical hard disk address and determines whether the physical hard disk address is track aligned with disk tracks of the physical hard disk. If the physical hard disk address is not track aligned, host alignment module determines a new track aligned physical hard disk address as the target starting location. If the physical hard disk address is track aligned, the same physical hard disk address is used as the target starting location. The target starting location is returned to the guest alignment module as a new virtual hard disk address.Type: GrantFiled: April 27, 2012Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Santosh Pravin Kalekar, Vipul Jain
-
Patent number: 9107147Abstract: A computer-implemented method for dynamically modifying rules for selecting suitable mobile networks. The method may include (1) identifying a set of predefined rules for selecting suitable mobile networks with which to connect, (2) obtaining a training data set that includes data about at least one candidate mobile network, (3) using machine learning to dynamically adjust, based at least in part on the training data set, the set of predefined rules, and (4) connecting to a suitable mobile network identified by the dynamically adjusted set of predefined rules. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 11, 2012Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Qingchun Meng, Guilin Hu, Yanjiao Zuo, Xue Feng Tian
-
Patent number: 9104859Abstract: A computer-implemented method for scanning data stored on cloud computing platforms may include (1) identifying a cloud computing service that hosts a plurality of cloud computing instances and a plurality of data volumes that store data for the plurality of cloud computing instances, (2) determining that a data volume within the plurality of data volumes that stores data for a cloud computing instance within the plurality of cloud computing instances is subject to a security scan, (3) detecting a computing system that is external to the cloud computing instance, and (4) performing the security scan on the data volume from the computing system that is external to the cloud computing instance instead of performing the security scan from within the cloud computing instance. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: June 24, 2013Date of Patent: August 11, 2015Assignee: Symantec CorporationInventor: Deb Banerjee
-
Patent number: 9106423Abstract: A login credentials identification component uses analysis of the relative positions of text entry fields to identify login credentials on a web page. The login credentials identification component identifies both a password entry field on a web page, and the text entry field immediately preceding the identified password entry field. The login credentials identification component uses the positional relationship between the identified password entry field and the immediately preceding text entry field, as well as other supplemental factors, to determine that the identified text entry field immediately preceding the password entry field comprises a user name entry field.Type: GrantFiled: March 16, 2009Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Govinda S. Salinas, Abhay Sudhakar Kulkarni, Anne Kang-Ping Yeh
-
Patent number: 9106645Abstract: Embodiments of the present disclosure may provide methods and devices capable of synchronizing time between a credential device and an authentication service. In an embodiment, a change in a time value on a device may be detected. A time value may be retrieved from an authentication service, and a new time value generated based upon at least the time value retrieved from the authentication service. The new time value may be used to set a time value at the device, and/or to generate a time-based credential.Type: GrantFiled: January 26, 2012Date of Patent: August 11, 2015Assignee: Symantec CorporationInventor: Ananta Krishna Vadlamani
-
Patent number: 9104861Abstract: Security from malicious attack is provided for a user environment running in a virtualized environment by a virtual security appliance (VSA) running outside of the user environment, but on the same computer system as the user environment. For example, a VSA running in a virtual machine can provide security for a user environment running in a second virtual machine. The separation of the VSA from the user environment enhances the robustness of the VSA against malicious attacks seeking to disable/bypass the protections of the VSA, while avoiding the costs and complexities of a physical security appliance.Type: GrantFiled: December 19, 2012Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Archana S. Rajan, Leo Cohen, Charlotte W. Chang, Christopher Alexander, Gary Sabala, Alfred C. Hartmann, Wei Lin, Brendon Woirhaye
-
Patent number: 9104858Abstract: A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the anonymous cloud account. The cloud generates cloud access pattern data for the anonymous cloud account without determining the identity of the user.Type: GrantFiled: May 3, 2012Date of Patent: August 11, 2015Assignee: Symantec CorporationInventors: Sharada Sundaram, Robert Koeten
-
Patent number: 9100191Abstract: A method for forming a digital certificate includes receiving contact information associated with the digital certificate. The contact information includes at least a name, a mailing address, and an email address. The method also includes receiving billing information associated with the digital certificate and receiving a Certificate Signing Request (CSR) for the digital certificate. The method further includes receiving a first name for use in forming the digital certificate and receiving a second name for use in forming the digital certificate. Moreover, the method includes receiving an indication of a vendor of web server software, receiving an indication of a service period for the digital certificate, and forming the digital certificate. The first name is stored in a Subject field of the digital certificate and the second name is stored in the SubjectAltName extension of the digital certificate.Type: GrantFiled: January 25, 2013Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Quentin Liu, Marc Loren Williams, Richard F. Andrews
-
Patent number: 9100246Abstract: Distributed application virtualization provides for the distribution, configuration and control of multiple application components, layered file systems, and configuration settings that may be applied on top of an operating system of each system configured to work in conjunction with other systems within a single distributed virtualization layer. A distributed software virtualization manager or service handles communication between systems within each distributed virtual layer. One distributed virtualization operation activates components, selected based on user-defined parameters, on systems across the network belonging to a selected distributed virtual application layer. Other virtualization operations, whether local and/or distributed, include capturing file system and configuration activity associated with the detected event and storing data representative of the captured file system and configuration activity to a virtual layer, such as a local or distributed application layer.Type: GrantFiled: June 19, 2008Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Lance TeNgaio, Randall R. Cook
-
Patent number: 9098706Abstract: A determination is made as to whether a creator of a created executable file is a trusted installer, e.g., a digitally signed installer. Upon a determination that the creator is a trusted installer, the created executable file is defined as a trusted file. By bestowing the trust of a trusted installer to the executable files that the installer creates, suspicious behavior by the created executable files and associated processes, which otherwise would be blocked, is allowed. In this manner, false positives, e.g., blocking of legitimate behavior by the created executable file and associated process(es), are avoided.Type: GrantFiled: July 31, 2006Date of Patent: August 4, 2015Assignee: Symantec CorporationInventor: Mark Kennedy
-
Patent number: 9098392Abstract: A computer-implemented method for changing fencing modes in clusters may include (1) identifying a cluster of nodes configured with a fencing mode for resolving split-brain scenarios within the cluster, (2) identifying a request to reconfigure the cluster of nodes with a new fencing mode, (3) transmitting the request to each node in the cluster of nodes, (4) in response to the request, for each node in the cluster of nodes, testing the operability of the new fencing mode from the node, (5) receiving a message from the node indicating the success of the test; and, after receiving the message indicating the success of the test from every node within the cluster of nodes, and (6) reconfiguring each node within the cluster of nodes to use the new fencing mode. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 29, 2011Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Venu Gopal Gadiraju, Viraj Kamat, Amol Katkar
-
Patent number: 9100426Abstract: A computer-implemented method for warning mobile device users about potentially malicious NFC tags may include (1) obtaining, by a mobile device, NFC-tag information that identifies (i) a geo-location of at least one NFC tag and (ii) a result of at least one malware analysis performed on the NFC tag, (2) determining that the NFC tag includes potentially malicious content based at least in part on the result of the malware analysis performed on the NFC tag, (3) determining that the mobile device is located in proximity of the NFC tag based at least in part on the geo-location of the NFC tag, and then (4) providing an alert that warns a user of the mobile device against scanning the NFC tag due at least in part to the potentially malicious content included in the NFC tag. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: September 5, 2013Date of Patent: August 4, 2015Assignee: Symantec CorporationInventor: Ke Fang
-
Patent number: 9100440Abstract: A computer-implemented method for applying data loss prevention policies to closed-storage portable devices may include (1) injecting a data loss prevention component into at least one application process that is running on a computing device, (2) intercepting, via the data loss prevention component, an attempt by the application process to transfer a file to a closed-storage portable device that is connected to the computing device, (3) identifying a data loss prevention policy that applies to the attempt by the application process to transfer the file, (4) determining that the attempt by the application process to transfer the file violates the data loss prevention policy, and (5) performing a security action in response to determining that the attempt by the application process to transfer the file violates the data loss prevention policy. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 4, 2014Date of Patent: August 4, 2015Assignee: Symantec CorporationInventor: Sarin Sumit Manmohan
-
Patent number: 9100190Abstract: A graphical user interface can be provided for creating a digital certificate profile for a digital certificate. In one embodiment, the graphical user interface presents a plurality of certificate profile attributes that are selectable by a user. In one embodiment, a certificate profile preview representing an example certificate to be generated from the digital certificate profile using a subset of the selected certificate profile attributes is generated and a graphical representation of the generated certificate profile preview is provided in the graphical user interface.Type: GrantFiled: February 7, 2012Date of Patent: August 4, 2015Assignee: SYMANTEC CORPORATIONInventors: Stefan Schwengler, Len Toyoshiba
-
Publication number: 20150215319Abstract: An authentication sequencing and normalization module may receive a first authentication associated with a user and assign a level of assurance value to the user based on the first authentication from a first identity service of a specific type. If the user is associated with a second authentication, based on a second identity service of an alternate type, then the level of assurance value assigned to the user may be incremented. Furthermore, access to an application by the user may be allowed if the incremented level of assurance value assigned to the user meets or exceeds a second level of assurance value of a policy assigned to the application. Different users may be authenticated in the authentication sequencing and normalization module by disparate identity services.Type: ApplicationFiled: January 30, 2014Publication date: July 30, 2015Applicant: Symantec CorporationInventors: Robert Koeten, Jeff L. Lowe
-
Publication number: 20150215348Abstract: A virtual identity and context module may generate a virtual identity for a user. Virtual identities for different categories of users may be sourced from disparate identity services. For example, a first authentication of the user provided by a first identity service may be identified. A first virtual attribute field of the virtual identity may be populated or filled based on a first attribute field associated with the first identity service. A second identity service associated with the user may also be identified. A second virtual attribute field of the virtual identity may be populated or filled based on a second attribute field associated with the second identity service. Access to an application may be provided to a user based on the virtual attribute fields of the virtual identity that has been generated for the user.Type: ApplicationFiled: January 30, 2014Publication date: July 30, 2015Applicant: Symantec CorporationInventors: Robert Koeten, Jeff L. Lowe
-
Patent number: 9092615Abstract: A method and apparatus for identifying an application source from which an application is installed on a non-rooted computing device. An application source identifier of a security application that does not have root access to an operating system monitors for an application installation. The application source identifier extracts a process identifier (PID) of the application being installed from a log message associated with the application installation and determines a package name from the PID. The PID identifies an application source from which the application is installed. The application source identifier receives, based on the package name, a confidence level for the application source from a security service over a network.Type: GrantFiled: January 28, 2013Date of Patent: July 28, 2015Assignee: SYMANTEC CORPORATIONInventors: Jun Mao, Abubakar Wawda
-
Patent number: D735729Type: GrantFiled: December 13, 2012Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Gregory R. Dowers, II, Thomas E. Weaver
-
Patent number: D735730Type: GrantFiled: December 13, 2012Date of Patent: August 4, 2015Assignee: Symantec CorporationInventors: Gregory R. Dowers, II, Thomas E. Weaver, Jessica Rich, Robert Santiago