Patents Assigned to Symantec
  • Patent number: 9020992
    Abstract: A computer-implemented method may include establishing a proxy file system that facilitates file archiving for a primary file system that does not support file archiving. The computer-implemented method may also include identifying a request to archive a file stored in a primary file system and copying the file to an archive file system such that a reference to the file is created in the proxy file system. The computer-implemented method may further include replacing the file in the primary file system with a symbolic link that identifies the reference in the proxy file system. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventors: Laxmikant Gunda, Praveen Rakshe
  • Patent number: 9020957
    Abstract: A computer-implemented method for enhancing social networking content may include 1) identifying social networking content accessed from a social networking site, 2) parsing the social networking content to identify at least one content item that is potentially referenced in at least one of a plurality of social networking sites, 3) searching the plurality of social networking sites for an additional content item that relates to the content item, and 4) enhancing the social networking content with the additional content item. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventors: Scott D. Schneider, Hemant Puri
  • Patent number: 9021578
    Abstract: A computer-implemented method for securing Internet access on restricted mobile platforms may include identifying an attempt by a mobile computing system to establish a virtual private network connection with a security server and, in response to identifying the attempt, (1) assigning an Internet Protocol address to the mobile computing system and (2) identifying a security filter customized to filter communications for an account associated with the mobile computing system. The method may also include (1) receiving, via the virtual private network connection, a request for an Internet resource and (2) providing, via the virtual private network connection, a response to the request to the mobile computing system based at least in part on the security filter. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 13, 2011
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventors: Jim Casaburi, Alan Gilbert, Ryan McGann
  • Patent number: 9021389
    Abstract: A computer-implemented method for end-user initiated data-loss-prevention content analysis may include identifying an end-user application that handles content subject to data-loss-prevention policies. The computer-implemented method may also include receiving a request through a user interface associated with the end-user application to analyze selected content for data-loss-prevention policy compliance. The computer-implemented method may further include performing an analysis of the selected content for data-loss-prevention policy compliance. The computer-implemented method may additionally include providing a result of the analysis through the user interface associated with the end-user application. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventor: Milind Torney
  • Patent number: 9021546
    Abstract: A computer-implemented method for workload security in virtual data centers may include (1) identifying a virtual data center that hosts a plurality of workloads sharing a common computing infrastructure, (2) identifying a workload within the plurality of workloads that is subject to a sensitivity assessment that pertains to an application of at least one security policy to at least one computing resource used by the workload, (3) performing the sensitivity assessment for the workload based at least in part on an attribute of an allocated resource within the common computing infrastructure provisioned to the workload, and (4) applying the security policy to the computing resource based at least in part on the sensitivity assessment for the workload. Various other methods, systems, and encoded computer-readable media are also disclosed.
    Type: Grant
    Filed: November 8, 2011
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventor: Deb Banerjee
  • Patent number: 9021204
    Abstract: Techniques for managing data storage within storage tiers are disclosed. In one particular embodiment, the techniques may be realized as a method for managing data storage having the steps of assigning a storage class for each of a plurality of storage tiers, defining at least one rule for storing data in the plurality of storage tiers, determining whether performance assisted tier migration is requested, monitoring the plurality of storage tiers when it is determined that the performance assisted tier migration is requested, determining whether to redefine the storage class of one of the plurality of storage tiers based on the monitoring, and determining whether to migrate the data based on the monitoring.
    Type: Grant
    Filed: February 27, 2013
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventors: Nirendra Awasthi, Sudhir Kumar
  • Patent number: 9020896
    Abstract: A computer-implemented method for simplifying data restoration using resource types. The method may include (1) receiving a request from a user to perform a data restoration operation, (2) providing a graphical user interface that presents to the user a plurality of resource types that can be restored by the user, (3) receiving, from the user via the graphical user interface, a selection that identifies a resource type that the user desires to restore, (4) presenting, to the user via the graphical user interface, at least one backup set associated with the identified resource type from which the user may restore data, (5) receiving, from the user via the graphical user interface, a selection that identifies a backup set that the user desires to restore, and (6) restoring data from the identified backup set. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 11, 2012
    Date of Patent: April 28, 2015
    Assignee: Symantec Corporation
    Inventors: Ynn-Pyng Tsaur, Baishen Zhu, Lijo Abraham, Gregory Robert Dowers, II, Kirk Freiheit
  • Patent number: 9015706
    Abstract: Techniques for inter-virtual machine communication are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for interaction with a guest virtual machine comprising monitoring image loads into electronic memory of a guest virtual machine using a secure virtual machine, identifying a memory structure having a specified format, and performing, using the secure virtual machine, at least one of reading one or more portions of the identified memory structure and setting a value in the identified memory structure.
    Type: Grant
    Filed: July 8, 2010
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Matthew Conover, Bruce McCorkendale, William E. Sobel
  • Patent number: 9015082
    Abstract: A computing device receives a training data set that comprises a plurality of sensitive documents and a plurality of non-sensitive documents. The computing device determines a quality of the training data set. The quality may be determined using k-fold cross validation and/or latent semantic indexing. In response to determining that the training data set has a satisfactory quality, the computing device then analyzes the training data set using machine learning to train a machine learning-based detection (MLD) profile, the MLD profile to be used by a data loss prevention (DLP) system to classify new documents as sensitive documents or as non-sensitive documents.
    Type: Grant
    Filed: December 14, 2011
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Sumesh Jaiswal, Ashish Aggarwal, Phillip DiCorpo, Shitalkumar S. Sawant, Sally Kauffman, Alan Dale Galindez
  • Patent number: 9015849
    Abstract: A method and apparatus for preventing data leakage of e-discovery data items is provided. In one embodiment, the method for automatically configuring e-discovery data for data leakage prevention includes processing filtering information regarding at least one e-discovery data item that is selected for data leakage prevention and generating data leakage prevention information for the selected at least one e-discovery data item, wherein the data leakage prevention information is used to filter the at least one data item.
    Type: Grant
    Filed: September 16, 2008
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Angshuman Bezbaruah, Prabhat Singh, Ankur Panchbudhe
  • Patent number: 9015519
    Abstract: A method and system for load balancing. The method includes determining that connectivity between a first host and a primary array controller of a storage system has failed. The first host is configured to send input/output messages (I/Os) to a storage system through a storage network fabric. An available host is discovered at a multi-pathing driver of the first host. The available host is capable of delivering I/Os to the primary array controller. An I/O is redirected from said first host to the available host over a secondary communication network for delivery to the storage system.
    Type: Grant
    Filed: January 31, 2012
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Frederick Bosco Anthonisamy, Suhas Ashok Dantkale
  • Patent number: 9015417
    Abstract: An access request that includes a combination of a file identifier and an offset value is received. If the page cache does not contain the page indexed by the combination, then the file system is accessed and the offset value is mapped to a disk location. The file system can access a block map to identify the location. A table (e.g., a shared location table) that includes entries (e.g., locations) for pages that are shared by multiple files is accessed. If the aforementioned disk location is in the table, then the requested page is in the page cache and it is not necessary to add the page to the page cache. Otherwise, the page is added to the page cache.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Mukund Agrawal, Shriram Wankhade
  • Patent number: 9015371
    Abstract: A system and method for discovering multiple paths to a disk device are disclosed. For example, the method can include discovering a plurality of paths that exist from a first host computer to a storage device. The plurality of paths includes at least one local path and at least one network path from the first host computer to the storage device. In addition, the first host computer is one of several host computers in a cluster. Once the paths have been discovered, a representation of the paths from the first host computer to the storage device is generated. Such a method can be performed, for example, without user intervention.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Amarinder Singh Randhawa, Sathish Nayak, Prasanta Ranjan Dash
  • Patent number: 9015430
    Abstract: Systems and methods for copy on write storage conservation are presented. In one embodiment a copy on write storage conservation method includes creating and mounting a snapshot; mounting a snapshot; monitoring interest in the snapshot; initiating a copy on write discard process before a backup or replication is complete; and deleting the snapshot when the backup or replication is complete. In one embodiment the method also includes marking a file as do not copy on write. In one embodiment, the copy on write discard process includes discarding copy on write data when a corresponding read on the file in the snapshot is successful. Initiating a copy on write discard process can be done at a variety of levels (e.g., a file level, an extent level, a block-level, etc.).
    Type: Grant
    Filed: March 2, 2010
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventor: Dilip Madhusudan Ranade
  • Patent number: 9015844
    Abstract: Techniques for web application vulnerability scanning are disclosed. In one particular embodiment, the techniques may be realized as a method for web application vulnerability scanning comprising crawling a web application for content associated with the web application, generating a client security policy based on the content associated with the web application, and scanning the web application for vulnerabilities based on the client security policy.
    Type: Grant
    Filed: June 25, 2012
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Jason Franklin, Yin Liu
  • Patent number: 9015817
    Abstract: A computer system receives a request to access a server. The request includes a first device tag set. When the first device tag set matches a previously assigned device tag set, the computer system allows access to the server without requesting full access credentials of a user. The computer system invalidates the first device tag set, and sends a second device tag set. When the first device tag set does not match the previously assigned device tag set, the computer system requests full access credentials from the user.
    Type: Grant
    Filed: April 3, 2013
    Date of Patent: April 21, 2015
    Assignee: Symantec Corporation
    Inventors: Mingliang Pei, Liyu Yi, Ajay Ramamurthy, Mark Chan, Salil Sane
  • Patent number: 9009706
    Abstract: A computer-implemented method for sending information to guest systems within virtual machines may include receiving, from a guest system within a virtual machine hosted on a host system, a request for virtual device information about a virtual device which may inaccurately represent to the guest system a state of a physical storage device connected to the host system, gathering physical device information via the host system about the physical storage device connected to the host system, determining a mapping of the virtual device within the guest system to the physical storage device connected to the host system, correlating the physical device information with the mapping to determine accurate information about the virtual device and sending the accurate information about the virtual device from the host system to the guest system within the virtual machine. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 23, 2013
    Date of Patent: April 14, 2015
    Assignee: Symantec Corporation
    Inventors: Shweta Goyal, Niranjan Pendharkar
  • Patent number: 9009814
    Abstract: A computer-implemented method for generating secure passwords may include 1) displaying a user interface for entering a textual password, 2) receiving user input via the user interface to select a color for at least one character of the textual password, 3) displaying the entered textual password via the user interface by displaying the character in the selected color and by displaying at least one additional character in at least one additional color, and 4) generating a modified textual password by encoding the textual password with information relating the selected color to the character. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 20, 2012
    Date of Patent: April 14, 2015
    Assignee: Symantec Corporation
    Inventors: Henry Wertz, Charles Andrew Payne, Eric Wagner
  • Patent number: 9009114
    Abstract: A method to create a version map to represent the data state of a file at a particular point in time when an incremental backup is performed. In one embodiment, a logical memory backup file is created that is known as a cumulative data file. Changes to the cumulative data file according to one embodiment of the present invention include periodically appending copies of data modified since the prior backup. A new version map may be created each time an incremental backup occurs. Locations of both modified and unmodified data in the backup data file are mapped for future reference to the data.
    Type: Grant
    Filed: October 31, 2005
    Date of Patent: April 14, 2015
    Assignee: Symantec Operating Corporation
    Inventor: Srineet Sridharan
  • Patent number: 9007955
    Abstract: A computer-implemented method for mapping network topologies may include (1) identifying a network including a plurality of network switches and a plurality of host systems, (2) identifying a host system within the plurality of host systems connected to the network via a network switch within the plurality of network switches, (3) refreshing an address of the host system within the network switch, (4) allowing the address of the host system to expire from each network switch within the plurality of network switches except the network switch, (5) transmitting a probing frame from a probing host system within the plurality of host systems to the address of the host system, (6) identifying a subset of host systems within the plurality of host systems that received the probing frame, and then (7) mapping a topology of the network based on the identified subset. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: April 14, 2015
    Assignee: Symantec Corporation
    Inventors: Darrell Kienzle, Matthew Cruz Elder, Ryan Persaud