Patents Assigned to Symantec
  • Patent number: 8868870
    Abstract: A method for managing migration may include detecting an attempt to perform migration from an existing off-host storage array to a new off-host storage array by 1) identifying a new communication path that appears to a host system as a path from the host system to the existing off-host storage array, 2) determining whether the new communication path comprises a standby path that is not actively being used for communication between the host system and the existing off-host storage array, 3) determining whether the new communication path actually comprises a path to the new storage array configured to appear to the host system as though it were the existing storage array, and 4) concluding that non-disruptive data migration is being attempted. The method may also include performing a management operation with respect to the new off-host storage array. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 11, 2012
    Date of Patent: October 21, 2014
    Assignee: Symantec Corporation
    Inventor: Hari Krishna Vemuri
  • Patent number: 8868719
    Abstract: Monitoring for potential misuses of identity information is disclosed. A profile comprising a user's identity information is received. An indication from a third party website that at least a portion of the identity information in the user's profile is being or has been provided to register at the third party website, alter user information stored by the third party website, or both is received. Whether the indicated use of the identity information is a potential misuse is evaluated.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: October 21, 2014
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Brian Hernacki
  • Patent number: 8869267
    Abstract: A technique for intrusion detection analysis is disclosed. The technique comprises performing a first analysis, wherein the analysis results in a first event; performing a second analysis, wherein the second analysis analyzes the first event; and performing an action associated with the second analysis.
    Type: Grant
    Filed: September 23, 2003
    Date of Patent: October 21, 2014
    Assignee: Symantec Corporation
    Inventors: Michael R. Smith, Mark S. Janczura
  • Patent number: 8868839
    Abstract: A computer-implemented method may include identifying a file that includes one or more data blocks stored within a storage device. The computer-implemented method may also include determining that the file has been accessed more frequently than one or more other files stored within the storage device and then tracking the number of times that at least one data block associated with the file is accessed in the storage device. The computer-implemented method may further include determining that the number of times that the data block associated with the file has been accessed in the storage device is above a predetermined threshold. In addition, the computer-implemented method may include caching the data block associated with the file in a caching mechanism to decrease the amount of time required to access the data block. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 7, 2011
    Date of Patent: October 21, 2014
    Assignee: Symantec Corporation
    Inventors: Anindya Banerjee, Amit Jambure, Kedar Patwardhan, Niranjan Pendharkar
  • Patent number: 8863116
    Abstract: A streamed application includes a plurality of application blocks. A first subset of the plurality of application blocks is pre-stored in a cache on a host computer system prior to initiating execution of the streamed application. The streamed application may then be executed. One or more application blocks of the first subset of the plurality of application blocks may be retrieved from the cache during execution of the streamed application in response to one or more requests to access the one or more application blocks of the first subset. A second subset of the plurality of application blocks may be received from a server computer system during the execution of the streamed application and may be stored in the cache. The second subset may include one or more application blocks that were not stored in the cache when the streamed application was installed.
    Type: Grant
    Filed: November 20, 2008
    Date of Patent: October 14, 2014
    Assignee: Symantec Corporation
    Inventors: Ryan M. McCarten, Taiwei Yin, Yury Mazin
  • Patent number: 8862730
    Abstract: Providing security for a network is disclosed. Network traffic associated with a host is monitored. If an activity pattern associated with a configuration change of the host is observed, access by the host to the network is restricted based at least in part on the observed activity pattern.
    Type: Grant
    Filed: March 28, 2006
    Date of Patent: October 14, 2014
    Assignee: Symantec Corporation
    Inventors: Brian Hernacki, Sourabh Satish
  • Patent number: 8863304
    Abstract: A method and apparatus for remediating backup data to control access to sensitive data is described. In one embodiment, the method for facilitating sensitive data remediation from backup images without a separate data store includes examining the backup images to identify sensitive data and modifying remediation information associated with the sensitive data, wherein the remediation information restricts access to the sensitive data to at least one corresponding access group.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: October 14, 2014
    Assignee: Symantec Corporation
    Inventors: Kuldeep Sureshrao Nagarkar, Gaurav Malhotra, Thomas G. Clifford, Bruce Wootton, Aleksey Tsibulya
  • Patent number: 8862522
    Abstract: A computing device receives a document that was incorrectly classified as sensitive data based on a machine learning-based detection (MLD) profile. The computing device modifies a training data set that was used to generate the MLD profile by adding the document to the training data set as a negative example of sensitive data to generate a modified training data set. The computing device then analyzes the modified training data set using machine learning to generate an updated MLD profile.
    Type: Grant
    Filed: December 14, 2011
    Date of Patent: October 14, 2014
    Assignee: Symantec Corporation
    Inventors: Sumesh Jaiswal, Ashish Aggarwal, Phillip DiCorpo, Shitalkumar S. Sawant, Sally Kauffman, Alan Dale Galindez
  • Patent number: 8862927
    Abstract: A computer-implemented method for fault recovery in multi-tier applications may include: 1) identifying a plurality of clusters, 2) identifying a multi-tier application that includes a plurality of components, each cluster within the plurality of clusters hosting a component, 3) identifying a fault of a first component within the plurality of components on a first cluster within the plurality of clusters, the fault requiring a first recovery action, 4) identifying at least one dependency relationship involving the first component and a second component within the plurality of components on a second cluster within the plurality of clusters, 5) determining, based on the fault and the dependency relationship, that the second component requires a second recovery action to ensure that the multi-tier application operates correctly, and 6) performing the second recovery action on the second component. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 21, 2011
    Date of Patent: October 14, 2014
    Assignee: Symantec Corporation
    Inventors: Anand Bhalerao, Venkeepuram Satish
  • Patent number: 8862675
    Abstract: A method and apparatus for asynchronous analysis of URLs in messages in a live message processing environment whereby an identified URL included in a message identified for further analysis is extracted and prioritized based on one or more prioritization parameters. The URL is then sent from a live message processing stream to a URL analysis process and the live message processing stream is stalled, with respect to that message, until the results of the URL analysis process are received, or until a defined “timeout” period passes. The results, or “verdict”, of the URL analysis process are then sent back to the live message processing stream in an asynchronous manner based on the prioritization of the URL. If the results of the URL analysis process are not received by the live message processing stream before the defined “timeout” period passes, then the “best” action is taken based on the best available data/verdict.
    Type: Grant
    Filed: March 10, 2011
    Date of Patent: October 14, 2014
    Assignee: Symantec Corporation
    Inventors: Graham Coomer, Nicholas Johnston
  • Publication number: 20140304764
    Abstract: An apparatus identifies a request from a user device to access data on a storage server. The apparatus determines a sensitivity level of response data for a response to the request, security context of the response, and a routing action to perform for the response by applying a policy to the sensitivity level of the response data and the security context of the response. The apparatus executes the routing action for the response.
    Type: Application
    Filed: April 3, 2013
    Publication date: October 9, 2014
    Applicant: Symantec Corporation
    Inventor: Symantec Corporation
  • Publication number: 20140301551
    Abstract: A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security.
    Type: Application
    Filed: April 13, 2012
    Publication date: October 9, 2014
    Applicant: Symantec Corporation
    Inventors: Joseph A. Adler, David M'Raihi
  • Publication number: 20140304786
    Abstract: A computer system receives a request to access a server. The request includes a first device tag set. When the first device tag set matches a previously assigned device tag set, the computer system allows access to the server without requesting full access credentials of a user. The computer system invalidates the first device tag set, and sends a second device tag set. When the first device tag set does not match the previously assigned device tag set, the computer system requests full access credentials from the user.
    Type: Application
    Filed: April 3, 2013
    Publication date: October 9, 2014
    Applicant: Symantec Corporation
    Inventor: Symantec Corporation
  • Patent number: 8856921
    Abstract: Threat emergence dates as well as file modification and scanning history are tracked to determine which files need to be scanned for possible infection by various attacking agents. Information concerning which scan engines are used to scan for the presence of different attacking agents is also tracked. Where given files only need to be scanned for a subset of all possible threats and the relevant scanning code resides in only a subset of all the scan engines, only the required scan engines are initialized, loaded or called in order to scan those files.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: October 7, 2014
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, William E. Sobel, Mark Spiegel, Shaun Cooley
  • Patent number: 8856916
    Abstract: In response to a trigger indicating to prevent access to confidential information on a specific user's mobile device, access is prevented to all parties, until a successful reauthorization occurs. Preventing access can comprise storing encrypted confidential information and removing the decryption key. In order to subsequently access the confidential information, a reauthorization attempt is made. The current geo-location of the mobile device at the time of the attempt is compared to at least one authorized geo-location associated with the specific user. In response to a) the password and user identifier being correct and to b) the current geo-location of the mobile computing device being an authorized geo-location associated with the specific user, the attempt to reauthorize is successful, whereas otherwise the attempt is unsuccessful. Only in response to a successful attempt is access to the confidential information re-allowed.
    Type: Grant
    Filed: October 5, 2012
    Date of Patent: October 7, 2014
    Assignee: Symantec Corporation
    Inventor: William E. Sobel
  • Patent number: 8856029
    Abstract: A computer-implemented method for regulating the receipt of data transmitted from a messaging device is described. A security application that includes a blocking application is initialized. At least one setting for the blocking application is initialized. Incoming data transmitted from the messaging device are detected. At least a portion of the incoming data is blocked based on the initialized at least one setting for the blocking application.
    Type: Grant
    Filed: August 23, 2010
    Date of Patent: October 7, 2014
    Assignee: Symantec Corporation
    Inventor: Kaiser W. Khan
  • Patent number: 8856902
    Abstract: A graphical authentication identifier is used to facilitate automatic authentication of a user. A graphical identifier authentication system receives a request from an authenticating entity for a onetime use graphical authentication identifier. In response to the received request, a onetime use graphical authentication identifier to be displayed by the authenticating entity is generated. A request for user authentication information by the authenticating entity is encoded in the graphical authentication identifier, which is transmitted to the authenticating entity for display (e.g., on a login screen). The onetime use graphical authentication identifier being displayed by the authenticating entity is captured by a registered user operated computing device.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: October 7, 2014
    Assignee: Symantec Corporation
    Inventors: Charles Andrew Payne, Shaun Cooley
  • Patent number: 8856918
    Abstract: A host validation system runs on a portable storage device, and protects data stored thereon from unauthorized access by host computers. The system identifies a host to which the portable device is coupled, for example by using the host's TPM. This can further comprise identifying the host's current configuration. The system uses the identification and configuration information to verify whether the host is approved to access data stored on the portable device. The system provides the host a level of data access responsive to this verification. This can involve denying all data access to the host, or providing at least some access to data stored on the portable device, for example based on a stored access policy specifying levels of access to provide to specific hosts with specific configurations.
    Type: Grant
    Filed: January 7, 2010
    Date of Patent: October 7, 2014
    Assignee: Symantec Corporation
    Inventors: Petros Efstathopoulos, Bruce Montague, Dharmesh Shah, Kevin Butler
  • Patent number: 8856527
    Abstract: A graphical user interface can be provided for creating a digital certificate profile for a digital certificate. In one embodiment, a security metric is determined using a first subset certificate profile attributes selected by a user, and a usability metric is determined using a second subset of certificate profile attributes. Graphical representations of the security metric and a graphical representation of the usability metric can then be provided the graphical user interface. In one embodiment, the first subset of certificate profile attributes is the same as the second subset.
    Type: Grant
    Filed: February 7, 2012
    Date of Patent: October 7, 2014
    Assignee: Symantec Corporation
    Inventors: Stefan Schwengler, Len Toyoshiba
  • Patent number: 8856937
    Abstract: A computer-implemented method for identifying fraudulent websites. The method may include identifying a fraudulent-website toolkit. The fraudulent-website toolkit may be programmed for use in creating a fraudulent website. The method may also include determining a characteristic of the fraudulent-website toolkit and using the characteristic of the fraudulent-website toolkit to identify a website created using the fraudulent-website toolkit. The website created using the fraudulent-website toolkit may be identified by searching for websites that comprise the characteristic of the fraudulent-website toolkit. The website created using the fraudulent-website toolkit may also be identified by determining that a web browser is attempting to access the website. Various other methods and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: October 7, 2014
    Assignee: Symantec Corporation
    Inventors: Candid Wüest, Zulfikar Ramzan