Patents Assigned to Symantec
-
Patent number: 8595849Abstract: A method and apparatus for reporting policy violations in messages is described. A violation is identified by detecting fragments in a message that match information from any one or more rows within a tabular structure of source data. The fragments that match this information are then specified as part of reporting the violation.Type: GrantFiled: December 30, 2010Date of Patent: November 26, 2013Assignee: Symantec CorporationInventors: Chris Jones, Hai Chen, Joseph Ansanelli, Michael R. Wolfe, Kevin T. Rowney
-
Patent number: 8595243Abstract: A computer-implemented method for deduplicating archived data may include (1) identifying a volume of data subject to deduplication, with the volume of data comprising at least one archived file that is represented on the volume of data with a placeholder file and is stored on an alternate volume of data, and (2) determining a disposition of the archived file for deduplication by (i) determining that the archived file is represented by the placeholder file, and, in response to determining that the archived file is represented by the placeholder file, (ii) identifying a deduplication fingerprint of the archived file instead of a deduplication fingerprint of the placeholder file. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: October 31, 2011Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: Laxmikant Gunda
-
Patent number: 8595349Abstract: Method or apparatus for passive process monitoring is described. One aspect of the invention relates to monitoring a process executing on a computer system. An operating system is instructed to report at least one event related to process termination. Termination of the process is detected in response to a reported instance of the at least one event by the operating system. A notification is provided to an agent in the computer system that the process has terminated.Type: GrantFiled: February 7, 2007Date of Patent: November 26, 2013Assignee: Symantec CorporationInventors: Carlos Wong, Yuh-Yen Yen, Bhavin Thaker
-
Patent number: 8595456Abstract: Techniques for integrating backup applications and/or modules with virtualized storage are disclosed. In one particular exemplary embodiment, the techniques may be realized as a computer implemented method for integrating a backup module with a storage appliance comprising sending a storage device command to a source storage appliance from a source backup module, executing at the source storage appliance the storage device command, and updating one or more source storage indicators associated with the source storage appliance, wherein the one or more source storage indicators include replication status information for one or more portions of electronic storage associated with the source storage appliance.Type: GrantFiled: July 23, 2012Date of Patent: November 26, 2013Assignee: Symantec CorporationInventors: Thomas L Krinke, II, Raymond W. Gilson
-
Patent number: 8595271Abstract: A computer-implemented method for performing file system checks may include identifying a file system to check. The computer-implemented method may also include identifying a base log including file system metadata within the file system at a previous time. The computer-implemented method may further include identifying a set of changed inodes within the file system since the previous time. The computer-implemented method may additionally include creating an updated log based on the base log and the set of changed inodes. The computer-implemented method may also include checking the updated log for consistency. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 15, 2010Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: Kedar Patwardhan
-
Patent number: 8595282Abstract: A reputation server is coupled to multiple clients via a network. A security module in each client monitors client encounters with entities such as files, programs, and websites, and then computes a hygiene score based on the monitoring. The hygiene scores are then provided to the reputation server, which computes reputation scores for the entities based on the clients' hygiene scores and the interactions between the clients and the entity. When a particular client encounters an entity, the security module obtains a reputation score for the entity from the reputation server. The reputation score may comprises a statistical measure based on a number of other trustworthy or “good hygiene” clients that have a hygiene score above a threshold. The client communicates this reputation score to a user with a message indicating that the reputation score is based on other clients deemed trustworthy.Type: GrantFiled: June 30, 2008Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: Carey S. Nachenberg
-
Patent number: 8595830Abstract: A method and apparatus for detecting malware containing e-mails based on inconsistencies between a governmental agency “From” address and a sending IP address whereby an incoming e-mail is analyzed to determine if the incoming e-mail includes a “From” address having a domain suffix that is normally associated with a governmental agency, such as a .gov, .gov.uk, .go.jp, or any similar governmental domain suffix. The connecting IP address or IP addresses within the received headers associated with the incoming e-mail are then analyzed to determine the geographical locations through which the incoming e-mail passed. If the geographical locations associated with these sending IP addresses of the incoming e-mail are not consistent with the country indicated by the domain suffix in the governmental “From” address of the incoming e-mail then the protective action is taken.Type: GrantFiled: July 27, 2010Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: Martin Lee
-
Patent number: 8595829Abstract: A computer-implemented method for automatically adding an Internet domain to a blacklist based on monitored activities of an application is described. An application running on a client computing device is analyzed to determine whether the application is a malware application. The execution of the application is terminated when the application connects to an Internet domain. The Internet domain is added to a blacklist. A notification is transmitted that indicates the Internet domain is blacklisted.Type: GrantFiled: April 30, 2009Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: David Kane
-
Patent number: 8595192Abstract: A computer-implemented method for providing high availability to instance-bound databases may include (1) identifying a first instance of a database server, the first instance hosting a plurality of databases, (2) identifying a second instance of the database server, (3) identifying at least one user database within the plurality of databases to fail over, and (4) migrating the user database to the second instance without migrating every database in the plurality of databases to the second instance. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 1, 2010Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: Sarin Sumit Manmohan
-
Patent number: 8595211Abstract: Techniques for managing search engine results may include, for example, a method for managing search engine results comprising receiving a search engine result and associated summary content, receiving requested content associated with the search engine result, comparing, using a computer processor, the summary content and the received requested content, and performing one or more actions in the event the summary content does not match the received requested content.Type: GrantFiled: February 25, 2011Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: Sourabh Satish
-
Patent number: 8595454Abstract: Various systems and methods cache extent information for use in off-host backups. One method involves detecting that a first set of one or more blocks of client data has not been relocated subsequent to a prior off-host backup operation while also detecting that a second set of one or more blocks of the client data has been relocated subsequent to the prior off-host backup operation. In response to detecting that the first set has not been relocated, the method provides a media server with a previously calculated set of mapping information for the first set instead of recalculating that mapping information. In contrast, in response to detecting that the second set has been relocated subsequent to the prior off-host backup, the method recalculates mapping information for the second set. The media server is provided with the recalculated mapping information instead of previously calculated mapping information for the second set.Type: GrantFiled: August 31, 2010Date of Patent: November 26, 2013Assignee: Symantec CorporationInventors: Kuldeep S. Nagarkar, Ahish Govind Khurange
-
Patent number: 8595189Abstract: A method for fast incremental replication of a file system. The method includes, at a data storage level, tracking file system status for a plurality of files by using a data structure inside respective inodes for the plurality of files, and at a file system level, tracking file system status for a plurality of files by using a file system mask structure. For all files present in a backup, a catalogue of the file path name and inode number is maintained on a source file system. During incremental backup, a source file system data structure enumerating a plurality of modified inodes is consulted. For inodes that have not been marked as removed or created, the file system mask structure that tracks modified portions is consulted to obtain a file incremental change and inodes. The method further includes performing incremental backup using the inodes that have been modified and appended.Type: GrantFiled: March 14, 2012Date of Patent: November 26, 2013Assignee: Symantec CorporationInventor: Kedar Patwardhan
-
Patent number: 8589328Abstract: A method and apparatus for examining computer user activity to assess user psychology is provided. In one embodiment, a method for examining computer user activity to assess user psychology comprises monitoring the computer user activity in memory to generate, using at least one processor, pattern data associated with internet activity and comparing the pattern data in the memory with human behavior information using the at least one processor to identify personality indicia in the memory that reflects at least one psychological trait.Type: GrantFiled: March 31, 2009Date of Patent: November 19, 2013Assignee: Symantec CorporationInventor: Piyush Sharma
-
Patent number: 8590030Abstract: A system for efficiently storing and activating credential seeds that are embedded in authentication devices. Device manufacturers provide copies of credential seeds embedded in the devices to an authentication service. The authentication service stores the credential seeds for authentication devices in a pre-active credential seed data store. When a credential seed is needed to perform a real-time or near real-time authentication of a One Time Password, the credential is fetched from the pre-active credential seed data store, used to authenticate the OTP and injected into the active credential seed data store, which can be a database. Thereafter, the credential seed is fetched from the active credential seed data store for real-time and near real-time authentication of OTPs.Type: GrantFiled: April 14, 2011Date of Patent: November 19, 2013Assignee: Symantec CorporationInventor: Mingliang Pei
-
Patent number: 8589904Abstract: A method may include receiving a request to install a second version of a software product over a first version of the software product, installing the second version of the software product in a dormant state while the first version of the software product is running, and swapping the first and second versions of the software product by activating the second version of the software product and deactivating the first version of the software product. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 10, 2009Date of Patent: November 19, 2013Assignee: Symantec CorporationInventors: Brian Powell, Pieter Viljoen
-
Patent number: 8584234Abstract: A security module on a computing device applies security rules to examine content in a network cache and identify suspicious cache content. Cache content is identified as suspicious according to security rules, such as a rule determining whether the cache content is associated with modified-time set into the future, and a rule determining whether the cache content was created in a low-security environment. The security module may establish an out-of-band connection with the websites from which the cache content originated through a high security access network to receive responses from the websites, and use the responses to determine whether the cache content is suspicious cache content. Suspicious cache content is removed from the network cache to prevent the suspicious cache content from carrying out malicious activities.Type: GrantFiled: July 7, 2010Date of Patent: November 12, 2013Assignee: Symantec CorporationInventors: William E. Sobel, Sourabh Satish
-
Patent number: 8584216Abstract: A computer-implemented method for efficiently deploying cryptographic key updates may include (1) receiving a request for subscribed cryptographic key material from a client device that includes information that identifies both the client device and cryptographic key material currently possessed by the client device, (2) automatically identifying the client device's subscribed cryptographic key material, (3) determining, by comparing the information received from the client device with the client device's subscribed cryptographic key material, that the cryptographic key material currently possessed by the client device does not match the client device's subscribed cryptographic key material, and (4) deploying at least one update to the client device that causes the client device to update the cryptographic key material currently possessed by the client device to match the client device's subscribed cryptographic key material. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 15, 2012Date of Patent: November 12, 2013Assignee: Symantec CorporationInventor: Michael Allen
-
Patent number: 8583852Abstract: A method, system, and computer-readable storage medium for providing an adaptive tap for a virtual machine protection are disclosed. In one embodiment, an Input/Output (I/O) write is received from one of virtual machines. The virtual machines are executed on a server, and each virtual machine is configured to generate I/O writes to a VMFS file system on a primary storage. The I/O write includes data and an offset at which the data is to be stored in the VMFS file system. The server, and primary and secondary storage are coupled to a network. A virtual machine indicator is determined using the offset. A secondary write to a secondary storage is generated based on the I/O write. The secondary write includes the data and the VM indicator associated with the I/O write. The secondary storage is then accessed to write/store the secondary write.Type: GrantFiled: September 1, 2011Date of Patent: November 12, 2013Assignee: Symantec OperationInventors: Sameer S. Mahajan, Pradip M. Kulkarni
-
Patent number: 8584224Abstract: A system for authenticating a user to a relying party. A user sends an access request to a relying party web application. In response, the application sends a page with JavaScript that detects a plug-in at the user and detects the relying party domain. The plug-in uses its device certificate or other pre-established credentials to sign a challenge along with other site and user information including the site domain, the authentication service URL and user identifier, and send it, along with the data including the domain and the user identifier, to an authentication service. The service authenticates the information and sends back to the plug-in a short ticket that can be passed on to the relying party, which can validate it using the Radius protocol and an authentication service call, thereby authenticating the user.Type: GrantFiled: April 13, 2011Date of Patent: November 12, 2013Assignee: Symantec CorporationInventors: Mingliang Pei, Jeff Burstein, Liyu Yi, Rosarin Jolly Antonyraj, Rong Cao
-
Patent number: 8584247Abstract: A computer-implemented method for evaluating compliance checks may include (1) maintaining a group of compliance standards for at least one computing network, with each compliance standard comprising at least one compliance check for evaluating at least one aspect of a network device, (2) calculating a reputation score for at least one compliance check within the group of compliance standards, (3) assigning the reputation score to the compliance check, and then (4) providing a recommendation for whether to implement the compliance check based at least in part on the reputation score assigned to the compliance check.Type: GrantFiled: June 9, 2010Date of Patent: November 12, 2013Assignee: Symantec CorporationInventor: Dipak Patil