Patents by Inventor Brendon Woirhaye

Brendon Woirhaye has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10778840
    Abstract: The disclosed computer-implemented method for identifying unsolicited communications on a computing device may include a computing device receiving a communication from an unrecognized phone number; obtaining the unrecognized phone number from the communication; obtaining classification data associated with the unrecognized phone number based on categories of other computing devices contacted by the unrecognized phone number; obtaining a category associated with a phone number of the computing device; determining that the communication is an unsolicited communication based on the classification data and the category associated with the phone number of the computing device; and in response to determining that the communication is unsolicited, performing a security action to manage interactions with the communication from the unrecognized phone number. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: September 15, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Brendon Woirhaye, Radoslav Stanev, Anuj Sahai
  • Patent number: 9104861
    Abstract: Security from malicious attack is provided for a user environment running in a virtualized environment by a virtual security appliance (VSA) running outside of the user environment, but on the same computer system as the user environment. For example, a VSA running in a virtual machine can provide security for a user environment running in a second virtual machine. The separation of the VSA from the user environment enhances the robustness of the VSA against malicious attacks seeking to disable/bypass the protections of the VSA, while avoiding the costs and complexities of a physical security appliance.
    Type: Grant
    Filed: December 19, 2012
    Date of Patent: August 11, 2015
    Assignee: Symantec Corporation
    Inventors: Archana S. Rajan, Leo Cohen, Charlotte W. Chang, Christopher Alexander, Gary Sabala, Alfred C. Hartmann, Wei Lin, Brendon Woirhaye
  • Patent number: 9104873
    Abstract: A computer-implemented method for determining whether GPUs are executing potentially malicious processes may include (1) identifying at least one GPU associated with a computing device, (2) analyzing the behavior of the GPU associated with the computing device, (3) determining that the analyzed behavior of the GPU indicates that the GPU is executing at least one potentially malicious process, and then (4) performing at least one security action on the GPU in response to determining that the analyzed behavior indicates that the GPU is executing the potentially malicious process. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 21, 2012
    Date of Patent: August 11, 2015
    Assignee: Symantec Corporation
    Inventors: Joseph Chen, Brendon Woirhaye
  • Patent number: 8353033
    Abstract: A hook is set for one or more downloading functions. Subsequently, code is executed within an application process. Responsive to the executed code calling one of the hooked functions to download code, a return address of the called function is examined. If the return address is within a memory area not marked executable, the code is permitted to be downloaded and the downloaded code is submitted to a security server for analysis.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: January 8, 2013
    Assignee: Symantec Corporation
    Inventors: Joseph Chen, Brendon Woirhaye
  • Patent number: 8353031
    Abstract: Security from malicious attack is provided for a user environment running in a virtualized environment by a virtual security appliance (VSA) running outside of the user environment, but on the same computer system as the user environment. For example, a VSA running in a virtual machine can provide security for a user environment running in a second virtual machine. The separation of the VSA from the user environment enhances the robustness of the VSA against malicious attacks seeking to disable/bypass the protections of the VSA, while avoiding the costs and complexities of a physical security appliance.
    Type: Grant
    Filed: May 17, 2007
    Date of Patent: January 8, 2013
    Assignee: Symantec Corporation
    Inventors: Archana S. Rajan, Leo Cohen, Charlotte W. Chang, Christopher Alexander, Gary Sabala, Alfred C. Hartmann, Wei Lin, Brendon Woirhaye
  • Patent number: 7730540
    Abstract: An security module includes a detection module for determining that an electronic message received for scanning includes a protected component. The security module also includes a parsing module for parsing the electronic message to identify potential passwords for the protected component. The security module further includes an analysis module for attempting to access the protected component of the electronic message using the identified potential passwords. A submission module submits potential passwords to a decomposition module for accessing the protected component. If the correct password is found, the decomposition module opens the protected component and/or extracts the contents of the archive. An analyzer module analyzes or scans the contents of the protected component.
    Type: Grant
    Filed: December 8, 2004
    Date of Patent: June 1, 2010
    Assignee: Symantec Corporation
    Inventors: Brendon Woirhaye, Elias Levy