Patents by Inventor Bruce McCorkendale

Bruce McCorkendale has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8578006
    Abstract: Configuration elements are selectively propagated between a host and multiple guests, based on a policy. Configuration elements of the host and guests are monitored. Changes made to monitored configuration elements are detected. It is determined whether to propagate changed configuration elements between operating system environments based on the policy. It can be determined to propagate changed configuration element(s) from a source to one or more destinations in response to factors such as the identity and/or classification of the source, or the type, attribute(s), content and/or identity of the changed configuration element(s). The creation of new guests is detected. In response, at least one configuration element from at least one source is automatically propagated to a newly created guest.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: November 5, 2013
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 8566899
    Abstract: Techniques for securing checked-out virtual machines in a virtual desktop infrastructure (VDI) are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for securing a checked-out guest virtual machine including receiving a request for checking-out a guest virtual machine hosted by a server network element, wherein checking-out the guest virtual machine comprises transferring hosting of the guest virtual machine from the server network element to a client network element. The method for securing a checked-out guest virtual machines may also include configuring a security module for the guest virtual machine in order to secure the guest virtual machine and providing the security module to the guest virtual machine when the guest virtual machine is checked-out.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: October 22, 2013
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, William E. Sobel, Matthew R. Barnes
  • Patent number: 8528080
    Abstract: Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: September 3, 2013
    Assignee: Reefedge Networks, LLC
    Inventors: Bruce McCorkendale, John P. Kelly, Brian Hernacki
  • Patent number: 8504215
    Abstract: A computer-implemented method for using alternate power sources to manage the power draw on a power grid may comprise: 1) identifying a need to reduce power draw on the power grid, 2) identifying an electrical device that draws power from the power grid, 3) determining that the electrical device is capable of drawing power from an alternate power source, and 4) transmitting a command that, when executed, causes the electrical device to draw power from the alternate power source. A corresponding device-side method for reducing power draw on a power grid may comprise: 1) drawing power from a power grid, 2) receiving a command to draw power from an alternate power source, and then 3) drawing power from the alternate power source. Corresponding systems and methods are also disclosed.
    Type: Grant
    Filed: November 4, 2008
    Date of Patent: August 6, 2013
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, Shaun Cooley
  • Patent number: 8503636
    Abstract: A computer-implemented method to block an outgoing request associated with an outgoing telephone number is described. A device is monitored for an outgoing request associated with an outgoing telephone number. The outgoing request is intercepted. The outgoing telephone number associated with the outgoing request is extracted. Upon determining that the extracted outgoing telephone number matches a telephone number stored in a database, the outgoing request is blocked.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: August 6, 2013
    Assignee: Symantec Corporation
    Inventor: Bruce McCorkendale
  • Patent number: 8479010
    Abstract: Successful logins are distinguished from unsuccessful logins, and only when a login is successful are the user's login credentials stored and associated with the appropriate login page. Attempts by a user to login to a login page with a set of login credentials are identified. It is determined whether an attempt to login to a given login page with a set of login credentials is successful. If the attempt by the user to login to the login page with the set of login credentials is successful, the set of login credentials can be stored and associated with the login page. If the attempt fails, the credentials are not saved.
    Type: Grant
    Filed: March 7, 2008
    Date of Patent: July 2, 2013
    Assignee: Symantec Corporation
    Inventors: Shaun Cooley, Brian Hernacki, Bruce McCorkendale
  • Patent number: 8434073
    Abstract: An exemplary method for preventing exploitation of byte sequences that violate compiler-generated instruction alignment may comprise: 1) identifying instantiation of a process, 2) identifying an address space associated with the process, 3) identifying, within the address space associated with the process, at least one control-transfer instruction, 4) determining that at least one byte preceding the control-transfer instruction is capable of resulting in an out-of-alignment instruction, and then 5) preventing the control-transfer instruction from being executed. In one example, the system may prevent the control-transfer instruction from being executed by inserting a hook in place of the intended instruction that executes the intended instruction and then returns control flow back to the instantiated process. Corresponding systems and computer-readable media are also disclosed.
    Type: Grant
    Filed: November 3, 2008
    Date of Patent: April 30, 2013
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Bruce McCorkendale, William E. Sobel
  • Patent number: 8429180
    Abstract: A computer, computer program product, and method identify potentially malicious remote objects using client cooperation. A remote object access module detects client device access of a remote object instance, and an object analysis system identifies an associated location, creates a content identification value for the instance, compares it to stored content identification values for previous instances, and if anomalous, analyzes the stored content identification values to determine whether malicious. The remote object access module monitors actual traffic received by the client, and stores the information across multiple clients for comparison, allowing more accurate detection of malicious remote objects than traditional web crawling.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: April 23, 2013
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 8429734
    Abstract: Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources, such as a single remote trusted source and/or a trusted peer network. When a site certificate is received on a host computer system, certificate information associated with the received site certificate is obtained and compared with the stored certificate information to determine whether or not the site certificate indicates malicious activity, such as a malicious DNS redirection or a fraudulent local certificate. When a site certificate is not found indicative of malicious activity, the site certificate is released. Alternatively, when a site certificates is found indicative of malicious activity protective action is taken. In some embodiments, a user's log-in credentials are automatically obtained from a trusted local cache and automatically submitted to a web site.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: April 23, 2013
    Assignee: Symantec Corporation
    Inventors: Paul Agbabian, William E. Sobel, Bruce McCorkendale
  • Publication number: 20130091570
    Abstract: Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server.
    Type: Application
    Filed: September 15, 2009
    Publication date: April 11, 2013
    Applicant: Symantec Corporation
    Inventors: Bruce McCorkendale, John P. Kelly, Brian Hernacki
  • Patent number: 8413146
    Abstract: A data instance to be shared by multiple virtual machines is stored at a hypervisor level. A file system driver is provided to each virtual machine. Each virtual machine mounts a file system backed by the data instance, and thus has read access to the data through its mounted file system. A virtual machine is suspended. A copy of the data instance is saved as part of the stored image of the suspended virtual machine. The suspended virtual machine is subsequently restored from the stored image, and the copy of the data instance is present in the restored virtual machine. The copy of the data instance is detected at a hypervisor level, and the restored virtual machine is provided with read access to the data instance through its mounted filed system.
    Type: Grant
    Filed: November 5, 2010
    Date of Patent: April 2, 2013
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, David Buches, William E. Sobel
  • Patent number: 8402458
    Abstract: A method may include receiving a request to convert a non-layered installation of a software application into a layered installation of the software application. The method may also include determining a base location of at least one file associated with the non-layered installation of the software application. The method may further include creating the layered installation of the software application by transitioning the at least one file from the base location to a virtualization layer. Various other methods, systems, and computer-readable-media are also disclosed.
    Type: Grant
    Filed: March 18, 2009
    Date of Patent: March 19, 2013
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, William E. Sobel
  • Patent number: 8402528
    Abstract: A computer is especially vulnerable when connected to a network while software on the computer is in an unpatched state. A portable firewall adapter is installed inline between the computer having the unpatched software and a network. A firewall within the adapter enforces a security policy that protects the computer from attack via the network. The adapter allows the computer to be connected to the network in order to download patches and/or other software that cure the vulnerabilities on the computer.
    Type: Grant
    Filed: August 9, 2004
    Date of Patent: March 19, 2013
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, William E. Sobel
  • Patent number: 8353058
    Abstract: A computer-implemented method for detecting rootkits is disclosed. The computer-implemented method may include sending periodic security communications from a privileged-processor-mode region of a computing device. The computer-implemented method may also include identifying at least one of the periodic security communications. The computer-implemented method may further include determining, based on the periodic security communications, whether the privileged-processor-mode region of the computing device has been compromised. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 24, 2009
    Date of Patent: January 8, 2013
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, Sourabh Satish, William E. Sobel
  • Patent number: 8353039
    Abstract: A method of automating an authentication sequence for accessing a computer resource comprising processing form information associated with the authentication sequence, wherein the authentication sequence comprises a plurality of queries associated with a plurality of web pages; and communicating a response to a portion of the authentication sequence using form information that corresponds to a query upon recognition of indicia of the portion of the plurality of web pages where the portion comprises the query.
    Type: Grant
    Filed: December 18, 2007
    Date of Patent: January 8, 2013
    Assignee: Symantec Corporation
    Inventors: Shaun Cooley, Bruce McCorkendale
  • Patent number: 8312547
    Abstract: A computer includes a portable environment including a portable file system located on a removable storage device, the portable environment using virtualization in a host operating system. A path translation module translates a virtualized path of a file in the portable file system to an actual path of the file. The virtualized path is the path in the context of a portable user application running in the portable environment, and the actual path is the path in the context of the host operating system. A malware detection module executing directly under the host operating system determines whether the file contains malware using the actual path of the file and takes remedial actions if malware is detected.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: November 13, 2012
    Assignee: Symantec Corporation
    Inventors: William E. Sobel, Bruce McCorkendale
  • Publication number: 20120254380
    Abstract: Configuration elements are selectively propagated between a host and multiple guests, based on a policy. Configuration elements of the host and guests are monitored. Changes made to monitored configuration elements are detected. It is determined whether to propagate changed configuration elements between operating system environments based on the policy. It can be determined to propagate changed configuration element(s) from a source to one or more destinations in response to factors such as the identity and/or classification of the source, or the type, attribute(s), content and/or identity of the changed configuration element(s). The creation of new guests is detected. In response, at least one configuration element from at least one source is automatically propagated to a newly created guest.
    Type: Application
    Filed: March 29, 2011
    Publication date: October 4, 2012
    Inventors: William E. Sobel, Bruce McCorkendale
  • Patent number: 8281363
    Abstract: A computer-implemented method may include receiving a request to access a network. The request may be sent from a virtual machine. The method may also include proxying the request to a network-access-control module, receiving a response from the network-access-control module, and transmitting the response to the virtual machine. Proxying the request to the network-access-control module may include assigning the virtual machine a virtual identifier. Proxying the request may also include creating a temporary interface. The temporary interface may be programmed to receive the response from the network-access-control module and transmit the response to the virtual machine. Various other methods, systems, and computer-readable media are also disclosed herein.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Brian Hernacki, Bruce McCorkendale, William E. Sobel
  • Patent number: 8281366
    Abstract: A computer-implemented method for using guardian proximity to control computing activities of children. The method may include determining that a child is attempting to access a computing system and determining whether a guardian of the child is in proximity of the computing system. The method may also include limiting the child's access to one or more resources of the computing system if the guardian of the child is not in proximity of the computing system and permitting the child to access the one or more resources of the computing system if the guardian of the child is in proximity of the computing system.
    Type: Grant
    Filed: October 14, 2009
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, Shaun Cooley
  • Patent number: 8281058
    Abstract: An exemplary method for using USB device descriptors to uniquely identify computing environments may include: 1) detecting a set of USB devices connected to a computing device within a computing environment, 2) obtaining a USB device descriptor for each USB device within the set of USB devices, and then 3) creating an environmental signature for the computing environment that identifies the computing environment based at least in part on the USB device descriptors. Exemplary methods for using such environmental signatures to uniquely identify computing environments are also disclosed.
    Type: Grant
    Filed: October 19, 2009
    Date of Patent: October 2, 2012
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, Shaun Cooley