Patents Assigned to Symantec
-
Patent number: 8776196Abstract: A computer-implemented method for automatically detecting and preventing phishing attacks may include (1) maintaining a credentials store for a user of the computing device that identifies both at least one known-legitimate website and credentials associated with the known-legitimate website, (2) detecting an attempt by the user to enter the same credentials that are associated with the known-legitimate website into a new website that is not associated with the credentials in the credentials store, and then, prior to allowing the credentials to pass to the new website, (3) automatically warning the user that the new website potentially represents an attempt to phish the credentials associated with the known-legitimate website from the user. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 24, 2012Date of Patent: July 8, 2014Assignee: Symantec CorporationInventors: Ian Oliver, Adam Glick, Nicholas Graf, Spencer Smith
-
Patent number: 8775716Abstract: A computer-implemented method for defragmenting virtual machine prefetch data. The method may include obtaining prefetch information associated with prefetch data of a virtual machine. The method may also include defragmenting, based on the prefetch information, the prefetch data on physical storage. The prefetch information may include a starting location and length of the prefetch data on a virtual disk. The prefetch information may include a geometry specification of the virtual disk. Defragmenting on physical storage may include placing the prefetch data contiguously on physical storage, placing the prefetch data in a fast-access segment of physical storage, and/or ordering the prefetch data according to the order in which it is accessed at system or application startup.Type: GrantFiled: November 8, 2012Date of Patent: July 8, 2014Assignee: Symantec CorporationInventors: Randall R. Cook, Brian Hernacki, Sourabh Satish, William E. Sobel
-
Patent number: 8775333Abstract: A computer-implemented method for generating a threat classifier is described. A parameter collection module is distributed to a plurality of client processing systems. The module comprises a set of rules to detect a behavior in the client processing systems. If one or more of the set of rules are satisfied, input data indicative of a plurality of client processing parameters is received. The input data is scaled to provide a plurality of parameter vectors. Each of the parameter vectors are classified as a threat or a non-threat. A machine learning process is performed on at least one of the classified parameter vectors. The threat classifier is generated from the machine learning process. The threat classifier is transferred to at least one client processing system. The threat classifier is configured to automatically determine if a process to be performed in a client processing system is malicious.Type: GrantFiled: August 18, 2009Date of Patent: July 8, 2014Assignee: Symantec CorporationInventor: Derek Zahn
-
Patent number: 8776044Abstract: A computer-implemented method for providing computer cluster policies for implementation in computer cluster environments may include (1) identifying a computer cluster environment capable of executing a plurality of applications, (2) creating a computer cluster policy that (a) identifies, within the plurality of applications, at least one dependent application that is dependent upon at least one other application and (b) identifying at least one platform-agnostic action to be performed on the dependent application in response to detection of at least one event associated with the other application, and then (3) providing the computer cluster policy to high-availability software installed in the computer cluster environment to enable the high-availability software to implement the computer cluster policy in the computer cluster environment. Various other systems, methods, and computer-readable media are also disclosed.Type: GrantFiled: October 26, 2011Date of Patent: July 8, 2014Assignee: Symantec CorporationInventor: Anish Vaidya
-
Patent number: 8775486Abstract: A file system is disclosed that includes an application wide name space instantiated in a global index (Gindex) that is used for accessing objects related to an application. Using the Gindex, a method for cache coherency includes establishing one or more appliances, each defining a storage cluster; establishing one or more tenants spanning across appliances, wherein an application stores objects in file systems associated with the appliances and tenants; establishing a Gindex including metadata relating to objects stored in association with the application; replicating the Gindex to plurality of data centers supporting the tenants; storing an original object at a first data center; storing a cached copy of the object at a second data center; aligning the cached copy using metadata for the object from a local copy of the Gindex.Type: GrantFiled: May 5, 2011Date of Patent: July 8, 2014Assignee: Symantec CorporationInventor: John Albert Carmichael
-
Publication number: 20140189873Abstract: Embodiments of the present invention are directed to a method and system for automated risk analysis. The method includes accessing host configuration information of a host and querying a vulnerability database based on the host configuration information. The method further includes receiving a list of vulnerabilities and accessing a plurality of vulnerability scores. The list of vulnerabilities corresponds to vulnerabilities of the host. Vulnerabilities can be removed from the list based on checking for installed fixes corresponding to vulnerability. A composite risk score can then be determined for the host and each software product of the host based on the plurality of vulnerability scores. An aggregate risk score can then be determined for the host and each software product of the host based on the plurality of vulnerability scores.Type: ApplicationFiled: May 21, 2010Publication date: July 3, 2014Applicant: SYMANTEC CORPORATIONInventors: Matthew Cruz Elder, Darrell Martin Kienzle, Pratyusa K. Manadhata, Ryan Kumar Persaud
-
Publication number: 20140189784Abstract: A computer-implemented method for enforcing data-loss-prevention policies using mobile sensors may include (1) detecting an attempt by a user to access sensitive data on a mobile computing device, (2) collecting, via at least one sensor of the mobile computing device, sensor data that indicates an environment in which the user is attempting to access the sensitive data, (3) determining, based at least in part on the sensor data, a privacy level of the environment, and (4) restricting, based at least in part on the privacy level of the environment, the attempt by the user to access the sensitive data according to a DLP policy. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: January 2, 2013Publication date: July 3, 2014Applicant: Symantec CorporationInventor: Symantec Corporation
-
Patent number: 8769220Abstract: A method and apparatus for mitigating the performance impact of background or idle time processing during interactive computing sessions. One embodiment of the present invention is a method for mitigating performance impact of background or idle time processing on interactive applications comprising identifying executable and data pages in physical memory that are associated with an interactive application that is temporarily unused and preventing any of the identified executable and data pages from paging out.Type: GrantFiled: July 17, 2012Date of Patent: July 1, 2014Assignee: Symantec CorporationInventors: Bruce E. McCorkendale, Mark W. Spiegel, Paul Agbabian, Shaun Cooley
-
Patent number: 8769676Abstract: Techniques for identifying suspicious applications are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for identifying suspicious applications comprising determining one or more clusters of applications in an identified category of applications based on requested permissions of each of two or more applications in each of the one or more clusters of applications, determining a center application of each of the one or more clusters, and determining, using at least one computer processor, a similarity score for an application being evaluated based at least in part on a distance between the application being evaluated and the center application of a closest cluster of the one or more clusters.Type: GrantFiled: December 22, 2011Date of Patent: July 1, 2014Assignee: Symantec CorporationInventor: Anand Kashyap
-
Patent number: 8769226Abstract: A system and method for identifying properties of virtual resources to efficiently perform backups and restores of cluster data. A cluster of nodes is coupled to a data storage medium. A node receives a request for a backup or a restore of cluster data. In response to this request, the node queries a cluster subsystem and a virtual subsystem of all other cluster nodes for identification of VMs, a subset of corresponding stored data, and an identification of VMs which are highly available (HA). In response to receiving query responses, the node aggregates the results and sends them to a backup server. These to aggregated results may then be used to schedule subsequent backup and restore operations. In addition, the node may use the results to complete the current backup or restore operation.Type: GrantFiled: July 9, 2012Date of Patent: July 1, 2014Assignee: Symantec CorporationInventor: Tomasz F. Wilk
-
Patent number: 8769674Abstract: A method, system, computer program product, and/or a computer readable medium of instructions for detecting a malicious message for an instant messaging service. In one form, the method comprises: receiving a message in a first processing system; analyzing the message to determine if the message is malicious; and in response to detecting that the message is malicious, restricting the message from threatening: the first processing system; and a second processing system in data communication with the first processing system. In another form, the method comprises receiving, in a first processing system, input data indicative of an instruction to transfer a message to a second processing system; analyzing the message to be transferred to determine if the message is malicious; and in response to detecting that the message is malicious, restricting the message from being transferred to the second processing system.Type: GrantFiled: September 5, 2007Date of Patent: July 1, 2014Assignee: Symantec CorporationInventors: Rolf Repasi, Simon Clausen
-
Patent number: 8769627Abstract: A computer-implemented method for validating ownership of deduplicated data may include (1) identifying a request from a remote client to store a data object in a data store that already includes an instance of the data object, (2) in response to the request, verifying that the remote client possesses the data object by (i) issuing a randomized challenge to the remote client, the randomized challenge including a random value which, when combined with at least a portion of the data object, produces an authentication token demonstrating possession of the data object and, in response to the randomized challenge, (ii) receiving the authentication token from the remote client; and, in response to receiving the authentication token from the remote client, (3) storing the data object in the data store on behalf of the remote client. Various other methods and systems are also disclosed.Type: GrantFiled: December 8, 2011Date of Patent: July 1, 2014Assignee: Symantec CorporationInventors: Fanglu Guo, Petros Efstathopoulos
-
Patent number: 8769182Abstract: A virtual tape library management system provides multiple, simultaneous accesses to the content stored on a single virtual tape. The virtual tape library management system receives a first request to access the content of a virtual tape. Responsive to the first request, the virtual tape library management system provides access to the virtual tape. While the virtual tape is being accessed, the virtual tape library management system receives a second request to read the same virtual tape. In response, the virtual tape library management system creates a shadow virtual tape corresponding to the virtual tape, maps the shadow virtual tape to the content of the virtual tape, and provides access to the shadow virtual tape.Type: GrantFiled: April 1, 2010Date of Patent: July 1, 2014Assignee: Symantec CorporationInventors: Sean Tu, Wendy A. Shavor, James H. Harris, Jr.
-
Patent number: 8769287Abstract: A communication system that obtains a key includes: a server that confirms support of Identity Based Encryption (IBE) authentication; the server obtains public parameters and a private key for IBE; and the server receives a PreMasterSecret key encrypted through the IBE, and obtains a plain text of the PreMasterSecret key according to the public parameters and the private key. The system includes a client and a server. The client includes an IBE negotiating module, a public parameter obtaining module, a server identifier obtaining module, and a processing module. The server includes an IBE negotiating module, a public parameter obtaining module, a private key obtaining module, and a processing module. Through combination of the IBE technology and the SSL/TLS technology, the modes of encrypting a PreMasterSecret key in the existing SSL/TLS protocol are diversified, and the use scope of the existing SSL/TLS protocol is extended substantially.Type: GrantFiled: August 30, 2010Date of Patent: July 1, 2014Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.Inventors: Min Huang, Lifeng Liu, Shi Wan
-
Patent number: 8769661Abstract: A Virtual Private Network (VPN) node information processing method and a VPN node information processing device are provided, in which the method comprises: receiving an access request message sent by a node, in which the access request message at least carries authentication information, a current real Internet Protocol (IP) address, a node name and information indicating whether to accept extranet connection of the node; allocating a virtual IP address for the node when the authentication information of the node is correct; and registering the current real IP address, the node name, the information indicating whether to accept the extranet connection, and the virtual IP address of the node as registration information. Through the method and the device, when a node is added into a VPN, configuration of other nodes does not need to be adjusted.Type: GrantFiled: November 4, 2011Date of Patent: July 1, 2014Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.Inventor: Yuchen Wang
-
Patent number: 8769334Abstract: Techniques for providing instant disaster recovery are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for providing instant disaster recovery comprising, maintaining, in a data store, data associated with a first host system, wherein the data comprises a first data portion and a second data portion, storing, in the first data portion, a disaster recovery agent, and exposing, to a second host system, the first data portion and the second data portion, wherein the disaster recovery agent is configured to initiate, on the second host system, a disaster recovery process, boot the second host system using the first data portion, and copy, from the data store, the second data portion in accordance with a first copy procedure and a second copy procedure.Type: GrantFiled: February 25, 2013Date of Patent: July 1, 2014Assignee: Symantec CorporationInventors: Geeta Gharpure, Taher M. Vohra
-
Patent number: 8769685Abstract: A computer-implemented method for using file paths to identify potentially malicious computer files may include: 1) identifying a file, 2) identifying a file path associated with the file, 3) determining, by applying a heuristic to the file, that at least a portion of the file path is likely to have been randomly generated, 4) determining, based at least in part on the determination that at least portion of the file path has likely been randomly generated, that the file is potentially malicious, and 5) performing a security operation on the file. Corresponding systems and computer-readable instructions embodied on computer-readable media are also disclosed.Type: GrantFiled: February 3, 2010Date of Patent: July 1, 2014Assignee: Symantec CorporationInventors: Robert Conrad, David Kane
-
Patent number: 8768901Abstract: A method and apparatus for selectively storing data on a server. The method operates by accessing a computer file and defining a data block as a current block of data. The current block is subsequently checksummed using a rolling error identification code. The method then determines if the calculated checksum for the current block has been previously stored in a database. If a matching checksum for the data is found in the database, then a duplicate of the current block already exists and the process repeats by selecting a new block of data. Alternatively, if the calculated checksum is absent from the checksum and the process has advanced one block length, the process moves back one block length and stores the current block in an archive. Otherwise, the checksum advances one byte forward to form a new current block of data and the process repeats.Type: GrantFiled: May 1, 2012Date of Patent: July 1, 2014Assignee: Symantec Operating CorporationInventor: Robert Somerville
-
Patent number: 8769672Abstract: A method, computer program product and system for preventing code injection in an operating system. The method 300 includes a checking module 340 hooking a kernel mode OS system call 330 and a request 315 sent to the kernel mode OS system call 330 being directed to the checking module 340. The checking module 340 queries 345 a process database 350 and the checking module 340 then allows or denies the request 315 based on a response from the process database 350.Type: GrantFiled: August 4, 2006Date of Patent: July 1, 2014Assignee: Symantec CorporationInventor: Seung Bae Park
-
Patent number: 8769223Abstract: Various embodiments of a system and method for performing a backup operation are disclosed. Backup operation information may be stored, where the backup operation information specifies a backup operation to be performed using at least a first device. Subsequent to storing the backup operation information, state information for the first device may be stored, where the state information indicates whether the first device is eligible for use in backup operations. Before the backup operation is performed, the state information for the first device may be accessed. If the state information for the first device indicates that the first device is eligible for use in backup operations then the backup operation may be performed using the first device (as well as possibly other devices). If the state information for the first device indicates that the first device is ineligible for use in backup operations then the backup operation may be prevented from using the first device.Type: GrantFiled: March 31, 2008Date of Patent: July 1, 2014Assignee: Symantec CorporationInventors: Michael W. Boldt, Samuel J. Pierson, Erica B. Antony, Aaron C. Christensen