Patents Assigned to Symantec
  • Patent number: 8578373
    Abstract: Techniques for improving performance of a shared storage environment are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for improving performance of a shared storage environment comprising determining a unit of shared storage utilized by an environment to be migrated, retrieving a storage management memory structure of a source computing platform for the unit of the shared storage, transferring the storage management memory structure to a target computing platform, and building a portion of storage management memory for the target computing platform utilizing the transferred storage management memory structure.
    Type: Grant
    Filed: June 6, 2008
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Sasidharan Krishnan, Suhas Girish Urkude
  • Patent number: 8578056
    Abstract: A request to send a JIT component to a streaming client is received. A network capability rating of the network over which the JIT component is to be sent to the streaming client is determined, and a client capability rating of the streaming client is determined. A transmission language format in which to send the JIT component to the streaming client is determined based on at least the network capability rating and the client capability rating. The JIT component is obtained in the transmission language format and sent to the streaming client over the network. In some embodiments, a transmission language format is determined for each sub-component of the component based on the network capability rating, the streaming client rating, and a sub-component characteristic rating.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, William E. Sobel
  • Patent number: 8578009
    Abstract: A computer-implemented method for correlating online aliases with real-world identities may comprise accessing a first user account associated with a first online communication mechanism, obtaining contact data associated with a first online alias from the first user account, identifying contact data associated with a second online alias, identifying, by comparing the contact data associated with the first online alias with the contact data associated with the second online alias, at least one common characteristic between the first online alias and the second online alias, and associating both the first online alias and the second online alias with a common contact. A graphical user interface may display a contact's name, online aliases for by the contact, and the online communication mechanisms that may be used to communicate with the contact. The method may also facilitate communication with a contact using online communication mechanisms.
    Type: Grant
    Filed: December 19, 2007
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Keith Newstadt, Shaun Cooley
  • Patent number: 8577850
    Abstract: Techniques for data deduplication are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for data deduplication comprising receiving a write request for a unit of data, generating a fingerprint for the unit of data, transmitting at least a portion of the fingerprint to a plurality of deduplication monitors, performing the write request using an indicator indicating a location of a previously stored unit of data having a fingerprint matching the transmitted at least a portion of the fingerprint if a response indicating the previously stored unit of data having the fingerprint matching the transmitted at least a portion of the fingerprint is received from at least one of the plurality of deduplication monitors, and performing the write request using the unit of data if no response is received.
    Type: Grant
    Filed: November 15, 2010
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Jon Genda, Graham Bromley, Walter Angerer
  • Patent number: 8577845
    Abstract: In one embodiment, a backup application transmits a remote request to a virtual machine that includes an application to be backed up. The request solicits metadata from the application that describes a structure of the data stored by the application on the virtual storage devices of the virtual machine. Using the metadata, the backup application may identify objects within the virtual machine. Accordingly, a granular restore of data to the virtual machine may be possible without installing backup software within the virtual machine.
    Type: Grant
    Filed: June 13, 2008
    Date of Patent: November 5, 2013
    Assignee: Symantec Operating Corporation
    Inventors: Sinh D. Nguyen, Timothy M. Naftel
  • Patent number: 8577855
    Abstract: A lock is acquired on a data structure. Content in the data structure is read and verified while the lock is held. The lock is then released, and then the file system components that are referred to by the data structure are verified. In essence, a file system consistency check of the file system components is performed offline in the background while the data structure remains accessible.
    Type: Grant
    Filed: October 19, 2010
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Nagaraj Shyam, Craig Keatley Harmer, George Mathew
  • Patent number: 8578442
    Abstract: Consistent enterprise and cloud security profiles are enforced. A domain model describing cloud resource objects associated with an enterprise is defined. Further, a relationship map describing relationships between the objects of the domain model and roles of enterprise users described by local security profiles maintained by the enterprise is specified. The domain model and relationship map collectively form an access policy for the cloud resource objects. Network traffic is monitored to detect network traffic attempting to configure a cloud security profile describing permissions of an enterprise user with respect to cloud resource objects in a manner inconsistent with the access policy. Detected network traffic attempting to configure the cloud security profile in the manner inconsistent with access policy is remediated.
    Type: Grant
    Filed: March 11, 2011
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventor: Deb Banerjee
  • Patent number: 8578124
    Abstract: Systems and methods for information storage replication are presented. In one embodiment a storage flow control method includes receiving a memory operation indication; performing a pre-reserve allocation process before proceeding with the memory operation, wherein the pre-reserve allocation process includes converting available unallocated memory space to allocated memory space if there is sufficient available unallocated memory space to perform the memory operation; executing the memory operation if the pre-reserve allocation process returns an indication there is sufficient memory space allocated to perform the memory operation; and aborting the memory operation if the pre-reserve allocation process returns an indication there is sufficient memory space allocated to perform the memory operation. In one embodiment, the memory operation is a write operation. The memory operation can be a write operation.
    Type: Grant
    Filed: December 18, 2009
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Michael E. Root, Charles Silvers
  • Patent number: 8578006
    Abstract: Configuration elements are selectively propagated between a host and multiple guests, based on a policy. Configuration elements of the host and guests are monitored. Changes made to monitored configuration elements are detected. It is determined whether to propagate changed configuration elements between operating system environments based on the policy. It can be determined to propagate changed configuration element(s) from a source to one or more destinations in response to factors such as the identity and/or classification of the source, or the type, attribute(s), content and/or identity of the changed configuration element(s). The creation of new guests is detected. In response, at least one configuration element from at least one source is automatically propagated to a newly created guest.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 8578096
    Abstract: A sliding window policy is implemented to manage database objects. At a first time, a first portion of a database object is allocated to a first tier of a multi-tier storage system. The first portion corresponds to a first specified percentage of the size of the database object at the first time and is selected according to information associated with the database object. The remaining portion of the database object at the first time is allocated to one or more other tiers. At a second (later) time, a second portion of the database object is allocated to the first tier. The second portion corresponds to a second specified percentage of the size of the database object at the second time and is also selected according to information associated with the database object. The remaining portion of the database object at the second time is allocated to the other tier(s).
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Raghupathi Malige, Meher Shah, Gautham Ravi
  • Patent number: 8578496
    Abstract: A method for detecting legitimate computer operation misrepresentation is provided. In some embodiments, the method comprises monitoring internet activity associated with a user computer, comparing the internet activity with suspicious feature information to produce a comparison result, wherein the suspicious feature information comprises at least one image that misrepresents at least one legitimate computer operation, identifying fraudulent software based on the comparison result, wherein the comparison result indicates a portion of the internet activity that misrepresents the at least one legitimate computer operation and mitigating activities associated with the identified fraudulent software.
    Type: Grant
    Filed: December 29, 2009
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventor: Bhaskar Krishnappa
  • Patent number: 8578119
    Abstract: A method, in one embodiment, can include allowing storage allocation of data of a file system within an object based storage system. Furthermore, the method can include determining if storage allocation usage for the file system is below a threshold. If the storage allocation usage for the file system is not below the threshold, a client is requested to flush its dirty data associated with the file system. After requesting a client flush, the method can include determining the storage allocation usage for the file system. In addition, the method can include determining periodically if the storage allocation usage has reached a quota. If the quota is reached, the quota is enforced for the data of the file system.
    Type: Grant
    Filed: November 16, 2009
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Samir Desai, Shriram Wankhade
  • Patent number: 8578490
    Abstract: A system and method are disclosed for detecting intrusions in a host system on a network. The intrusion detection system comprises an analysis engine configured to use continuations and apply forward- and backward-chaining using rules. Also provided are sensors, which communicate with the analysis engine using a meta-protocol in which the data packet comprises a 4-tuple. A configuration discovery mechanism locates host system files and communicates the locations to the analysis engine. A file processing mechanism matches contents of a deleted file to a directory or filename, and a directory processing mechanism extracts deallocated directory entries from a directory, creating a partial ordering of the entries. A signature checking mechanism computes the signature of a file and compares it to previously computed signatures. A buffer overflow attack detector compares access times of commands and their associated files.
    Type: Grant
    Filed: February 27, 2007
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventor: Douglas B. Moran
  • Patent number: 8578345
    Abstract: The launch of an installer or uninstaller is detected. A process lineage tree is created representing the detected launched installer/uninstaller process, and all processes launched directly and indirectly thereby. The detected installer/uninstaller process is represented by the root node in the process lineage tree. Launches of child processes by the installer/uninstaller process and by any subsequently launched child processes are detected. The launched child processes are represented by child nodes in the tree. As long as the installer/uninstaller process represented by the root node in the tree is running, the processes represented by nodes in tree are exempted from anti-malware analysis. The termination of the installer/uninstaller process is detected, after which the processes represented by nodes in the process lineage tree are no longer exempted from anti-malware analysis.
    Type: Grant
    Filed: April 15, 2010
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Mark Kennedy, Sourabh Satish, Alexander Danileiko, Ming-Jen Wang
  • Patent number: 8578339
    Abstract: A system and method for automatically analyzing virtual machine bytecode of a software application and adding additional bytecode operable to determine information regarding database access performed by the software application are described. According to one embodiment of the method, program code of a software application may be received, wherein the program code includes bytecode for a virtual machine. The bytecode may be automatically analyzed to detect access to a database. The method may operate to automatically add additional bytecode to the bytecode of the software application, where the added bytecode is operable to determine information regarding the access to the database.
    Type: Grant
    Filed: September 26, 2007
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: Brian Day, Daryl Hoyt
  • Patent number: 8572338
    Abstract: A computer-implemented method for creating space-saving snapshots may include: 1) identifying a parent volume on which to perform a snapshot, 2) allocating at least one thin-provisioned volume for the snapshot, 3) identifying an attempt to write to a region of the parent volume, and then 4) copying the region to the thin-provisioned volume. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 22, 2010
    Date of Patent: October 29, 2013
    Assignee: Symantec Corporation
    Inventors: Shailesh Vaman Marathe, Niranjan Pendharkar
  • Patent number: 8572742
    Abstract: Security is provided for a client by replacing a volume boot module adapted to execute during a boot process of the client with a repair module. The client is booted to start the boot process and to execute a master boot module. The repair module is executed in place of the volume boot module. The repair module determines whether the master boot module is infected with malware. If the master boot module is infected, the repair module repairs the malware infection by disabling and/or removing the malware.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: October 29, 2013
    Assignee: Symantec Corporation
    Inventor: Peter Linhardt
  • Patent number: 8572401
    Abstract: Various computer-implemented methods for securing data of replicated volumes are disclosed. In one example, an exemplary method for performing such a task may include: 1) identifying a set of plexes of a replicated volume, 2) identifying, within the set of plexes, at least one non-trusted plex, 3) intercepting data to be replicated to the non-trusted plex, 4) encrypting the data to be replicated to the non-trusted plex, and then 5) writing the encrypted data to the non-trusted plex. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 31, 2009
    Date of Patent: October 29, 2013
    Assignee: Symantec Corporation
    Inventor: Roshni Jaywantsingh Patil
  • Patent number: 8572046
    Abstract: A backup computer storage system that protects and/or recovers data on a primary computer storage system is disclosed. The backup computer system may be used to backup databases, files, and/or applications. The backup system may be used to backup an image of the primary computer system. The backup system may also be used to backup one or more databases. The backup system may replicate an image of data that is on a primary computer system. The backup system may also be used to restore data from the backup system to the primary computer system. The backup system may restore data to a database while non-affected portions of the database are available and can be used. The backup system may record all transactions in real time without overwriting any previously stored backup data. The backup system may maintain historical and/or chronological information related to the backed up data.
    Type: Grant
    Filed: September 17, 2010
    Date of Patent: October 29, 2013
    Assignee: Symantec Corporation
    Inventors: Gregory A. Becker, Robert Condon, David A. Knight, David E. Medders, Michael Rowan
  • Patent number: 8572337
    Abstract: A computer-implemented method for performing live backups may include identifying a request to perform a live backup on a volume of data. The computer-implemented method may also include creating a snapshot of the volume. The computer-implemented method may further include identifying each attempt to write to the volume during the live backup. The computer-implemented method may additionally include, for each write attempt, identifying a block of data that the write attempt will overwrite and copying the block of data to a backup queue before allowing the write attempt. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 14, 2009
    Date of Patent: October 29, 2013
    Assignee: Symantec Corporation
    Inventors: Aditya Gokhale, Trimbak Bardale