Patents Assigned to Symantec
-
Patent number: 8578373Abstract: Techniques for improving performance of a shared storage environment are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for improving performance of a shared storage environment comprising determining a unit of shared storage utilized by an environment to be migrated, retrieving a storage management memory structure of a source computing platform for the unit of the shared storage, transferring the storage management memory structure to a target computing platform, and building a portion of storage management memory for the target computing platform utilizing the transferred storage management memory structure.Type: GrantFiled: June 6, 2008Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Sasidharan Krishnan, Suhas Girish Urkude
-
Patent number: 8578056Abstract: A request to send a JIT component to a streaming client is received. A network capability rating of the network over which the JIT component is to be sent to the streaming client is determined, and a client capability rating of the streaming client is determined. A transmission language format in which to send the JIT component to the streaming client is determined based on at least the network capability rating and the client capability rating. The JIT component is obtained in the transmission language format and sent to the streaming client over the network. In some embodiments, a transmission language format is determined for each sub-component of the component based on the network capability rating, the streaming client rating, and a sub-component characteristic rating.Type: GrantFiled: March 31, 2008Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Sourabh Satish, William E. Sobel
-
Patent number: 8578009Abstract: A computer-implemented method for correlating online aliases with real-world identities may comprise accessing a first user account associated with a first online communication mechanism, obtaining contact data associated with a first online alias from the first user account, identifying contact data associated with a second online alias, identifying, by comparing the contact data associated with the first online alias with the contact data associated with the second online alias, at least one common characteristic between the first online alias and the second online alias, and associating both the first online alias and the second online alias with a common contact. A graphical user interface may display a contact's name, online aliases for by the contact, and the online communication mechanisms that may be used to communicate with the contact. The method may also facilitate communication with a contact using online communication mechanisms.Type: GrantFiled: December 19, 2007Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Keith Newstadt, Shaun Cooley
-
Patent number: 8577850Abstract: Techniques for data deduplication are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for data deduplication comprising receiving a write request for a unit of data, generating a fingerprint for the unit of data, transmitting at least a portion of the fingerprint to a plurality of deduplication monitors, performing the write request using an indicator indicating a location of a previously stored unit of data having a fingerprint matching the transmitted at least a portion of the fingerprint if a response indicating the previously stored unit of data having the fingerprint matching the transmitted at least a portion of the fingerprint is received from at least one of the plurality of deduplication monitors, and performing the write request using the unit of data if no response is received.Type: GrantFiled: November 15, 2010Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Jon Genda, Graham Bromley, Walter Angerer
-
Patent number: 8577845Abstract: In one embodiment, a backup application transmits a remote request to a virtual machine that includes an application to be backed up. The request solicits metadata from the application that describes a structure of the data stored by the application on the virtual storage devices of the virtual machine. Using the metadata, the backup application may identify objects within the virtual machine. Accordingly, a granular restore of data to the virtual machine may be possible without installing backup software within the virtual machine.Type: GrantFiled: June 13, 2008Date of Patent: November 5, 2013Assignee: Symantec Operating CorporationInventors: Sinh D. Nguyen, Timothy M. Naftel
-
Patent number: 8577855Abstract: A lock is acquired on a data structure. Content in the data structure is read and verified while the lock is held. The lock is then released, and then the file system components that are referred to by the data structure are verified. In essence, a file system consistency check of the file system components is performed offline in the background while the data structure remains accessible.Type: GrantFiled: October 19, 2010Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Nagaraj Shyam, Craig Keatley Harmer, George Mathew
-
Patent number: 8578442Abstract: Consistent enterprise and cloud security profiles are enforced. A domain model describing cloud resource objects associated with an enterprise is defined. Further, a relationship map describing relationships between the objects of the domain model and roles of enterprise users described by local security profiles maintained by the enterprise is specified. The domain model and relationship map collectively form an access policy for the cloud resource objects. Network traffic is monitored to detect network traffic attempting to configure a cloud security profile describing permissions of an enterprise user with respect to cloud resource objects in a manner inconsistent with the access policy. Detected network traffic attempting to configure the cloud security profile in the manner inconsistent with access policy is remediated.Type: GrantFiled: March 11, 2011Date of Patent: November 5, 2013Assignee: Symantec CorporationInventor: Deb Banerjee
-
Patent number: 8578124Abstract: Systems and methods for information storage replication are presented. In one embodiment a storage flow control method includes receiving a memory operation indication; performing a pre-reserve allocation process before proceeding with the memory operation, wherein the pre-reserve allocation process includes converting available unallocated memory space to allocated memory space if there is sufficient available unallocated memory space to perform the memory operation; executing the memory operation if the pre-reserve allocation process returns an indication there is sufficient memory space allocated to perform the memory operation; and aborting the memory operation if the pre-reserve allocation process returns an indication there is sufficient memory space allocated to perform the memory operation. In one embodiment, the memory operation is a write operation. The memory operation can be a write operation.Type: GrantFiled: December 18, 2009Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Michael E. Root, Charles Silvers
-
Patent number: 8578006Abstract: Configuration elements are selectively propagated between a host and multiple guests, based on a policy. Configuration elements of the host and guests are monitored. Changes made to monitored configuration elements are detected. It is determined whether to propagate changed configuration elements between operating system environments based on the policy. It can be determined to propagate changed configuration element(s) from a source to one or more destinations in response to factors such as the identity and/or classification of the source, or the type, attribute(s), content and/or identity of the changed configuration element(s). The creation of new guests is detected. In response, at least one configuration element from at least one source is automatically propagated to a newly created guest.Type: GrantFiled: March 29, 2011Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: William E. Sobel, Bruce McCorkendale
-
Patent number: 8578096Abstract: A sliding window policy is implemented to manage database objects. At a first time, a first portion of a database object is allocated to a first tier of a multi-tier storage system. The first portion corresponds to a first specified percentage of the size of the database object at the first time and is selected according to information associated with the database object. The remaining portion of the database object at the first time is allocated to one or more other tiers. At a second (later) time, a second portion of the database object is allocated to the first tier. The second portion corresponds to a second specified percentage of the size of the database object at the second time and is also selected according to information associated with the database object. The remaining portion of the database object at the second time is allocated to the other tier(s).Type: GrantFiled: April 8, 2011Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Raghupathi Malige, Meher Shah, Gautham Ravi
-
Patent number: 8578496Abstract: A method for detecting legitimate computer operation misrepresentation is provided. In some embodiments, the method comprises monitoring internet activity associated with a user computer, comparing the internet activity with suspicious feature information to produce a comparison result, wherein the suspicious feature information comprises at least one image that misrepresents at least one legitimate computer operation, identifying fraudulent software based on the comparison result, wherein the comparison result indicates a portion of the internet activity that misrepresents the at least one legitimate computer operation and mitigating activities associated with the identified fraudulent software.Type: GrantFiled: December 29, 2009Date of Patent: November 5, 2013Assignee: Symantec CorporationInventor: Bhaskar Krishnappa
-
Patent number: 8578119Abstract: A method, in one embodiment, can include allowing storage allocation of data of a file system within an object based storage system. Furthermore, the method can include determining if storage allocation usage for the file system is below a threshold. If the storage allocation usage for the file system is not below the threshold, a client is requested to flush its dirty data associated with the file system. After requesting a client flush, the method can include determining the storage allocation usage for the file system. In addition, the method can include determining periodically if the storage allocation usage has reached a quota. If the quota is reached, the quota is enforced for the data of the file system.Type: GrantFiled: November 16, 2009Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Samir Desai, Shriram Wankhade
-
Patent number: 8578490Abstract: A system and method are disclosed for detecting intrusions in a host system on a network. The intrusion detection system comprises an analysis engine configured to use continuations and apply forward- and backward-chaining using rules. Also provided are sensors, which communicate with the analysis engine using a meta-protocol in which the data packet comprises a 4-tuple. A configuration discovery mechanism locates host system files and communicates the locations to the analysis engine. A file processing mechanism matches contents of a deleted file to a directory or filename, and a directory processing mechanism extracts deallocated directory entries from a directory, creating a partial ordering of the entries. A signature checking mechanism computes the signature of a file and compares it to previously computed signatures. A buffer overflow attack detector compares access times of commands and their associated files.Type: GrantFiled: February 27, 2007Date of Patent: November 5, 2013Assignee: Symantec CorporationInventor: Douglas B. Moran
-
Patent number: 8578345Abstract: The launch of an installer or uninstaller is detected. A process lineage tree is created representing the detected launched installer/uninstaller process, and all processes launched directly and indirectly thereby. The detected installer/uninstaller process is represented by the root node in the process lineage tree. Launches of child processes by the installer/uninstaller process and by any subsequently launched child processes are detected. The launched child processes are represented by child nodes in the tree. As long as the installer/uninstaller process represented by the root node in the tree is running, the processes represented by nodes in tree are exempted from anti-malware analysis. The termination of the installer/uninstaller process is detected, after which the processes represented by nodes in the process lineage tree are no longer exempted from anti-malware analysis.Type: GrantFiled: April 15, 2010Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Mark Kennedy, Sourabh Satish, Alexander Danileiko, Ming-Jen Wang
-
Patent number: 8578339Abstract: A system and method for automatically analyzing virtual machine bytecode of a software application and adding additional bytecode operable to determine information regarding database access performed by the software application are described. According to one embodiment of the method, program code of a software application may be received, wherein the program code includes bytecode for a virtual machine. The bytecode may be automatically analyzed to detect access to a database. The method may operate to automatically add additional bytecode to the bytecode of the software application, where the added bytecode is operable to determine information regarding the access to the database.Type: GrantFiled: September 26, 2007Date of Patent: November 5, 2013Assignee: Symantec CorporationInventors: Brian Day, Daryl Hoyt
-
Patent number: 8572338Abstract: A computer-implemented method for creating space-saving snapshots may include: 1) identifying a parent volume on which to perform a snapshot, 2) allocating at least one thin-provisioned volume for the snapshot, 3) identifying an attempt to write to a region of the parent volume, and then 4) copying the region to the thin-provisioned volume. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: February 22, 2010Date of Patent: October 29, 2013Assignee: Symantec CorporationInventors: Shailesh Vaman Marathe, Niranjan Pendharkar
-
Patent number: 8572742Abstract: Security is provided for a client by replacing a volume boot module adapted to execute during a boot process of the client with a repair module. The client is booted to start the boot process and to execute a master boot module. The repair module is executed in place of the volume boot module. The repair module determines whether the master boot module is infected with malware. If the master boot module is infected, the repair module repairs the malware infection by disabling and/or removing the malware.Type: GrantFiled: March 16, 2011Date of Patent: October 29, 2013Assignee: Symantec CorporationInventor: Peter Linhardt
-
Patent number: 8572401Abstract: Various computer-implemented methods for securing data of replicated volumes are disclosed. In one example, an exemplary method for performing such a task may include: 1) identifying a set of plexes of a replicated volume, 2) identifying, within the set of plexes, at least one non-trusted plex, 3) intercepting data to be replicated to the non-trusted plex, 4) encrypting the data to be replicated to the non-trusted plex, and then 5) writing the encrypted data to the non-trusted plex. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 31, 2009Date of Patent: October 29, 2013Assignee: Symantec CorporationInventor: Roshni Jaywantsingh Patil
-
Patent number: 8572046Abstract: A backup computer storage system that protects and/or recovers data on a primary computer storage system is disclosed. The backup computer system may be used to backup databases, files, and/or applications. The backup system may be used to backup an image of the primary computer system. The backup system may also be used to backup one or more databases. The backup system may replicate an image of data that is on a primary computer system. The backup system may also be used to restore data from the backup system to the primary computer system. The backup system may restore data to a database while non-affected portions of the database are available and can be used. The backup system may record all transactions in real time without overwriting any previously stored backup data. The backup system may maintain historical and/or chronological information related to the backed up data.Type: GrantFiled: September 17, 2010Date of Patent: October 29, 2013Assignee: Symantec CorporationInventors: Gregory A. Becker, Robert Condon, David A. Knight, David E. Medders, Michael Rowan
-
Patent number: 8572337Abstract: A computer-implemented method for performing live backups may include identifying a request to perform a live backup on a volume of data. The computer-implemented method may also include creating a snapshot of the volume. The computer-implemented method may further include identifying each attempt to write to the volume during the live backup. The computer-implemented method may additionally include, for each write attempt, identifying a block of data that the write attempt will overwrite and copying the block of data to a backup queue before allowing the write attempt. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 14, 2009Date of Patent: October 29, 2013Assignee: Symantec CorporationInventors: Aditya Gokhale, Trimbak Bardale