Patents by Inventor Gerry A. Egan

Gerry A. Egan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9959404
    Abstract: Computer-implemented methods and systems for creating or updating approved-file and trusted-domain databases and verifying the legitimacy of files are disclosed. A method for creating or updating an approved-file database may include intercepting a first file, identifying a source domain associated with the first file, identifying a trusted-domain database, determining whether a database record for the source domain associated with the first file exists within the trusted-domain database, creating a hash value for the first file if a database record for the source domain associated with the first file exists within the trusted-domain database, and storing the hash value for the first file in an approved-file database. Methods and systems for verifying the legitimacy of a file and for creating or updating a trusted-domain database are also disclosed.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: May 1, 2018
    Assignee: Symantec Corporation
    Inventors: Carey Nachenberg, Michael Spertus, Sourabh Satish, Gerry Egan
  • Patent number: 9064120
    Abstract: A computer-implemented method for directing application updates may include (1) identifying information that indicates a rate at which an earlier version of an application is exploited in attacks on computing system security, (2) identifying additional information that indicates a rate at which a later version of the application is exploited in attacks on computing system security, (3) determining how updating the application from the earlier version to the later version will impact computing system security by comparing the rate the earlier version of the application is exploited with the rate at which the later version of the application is exploited, and (4) directing a computing system with a determination about updating an installation of the earlier version of the application to the later version of the application based on determining how updating the application will impact computing system security. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: June 23, 2015
    Assignee: Symantec Corporation
    Inventors: Sourabh Satish, Abubakar A. Wawda, Petrus Johannes Viljoen, Gerry A. Egan
  • Patent number: 8978116
    Abstract: Method for monitoring an online identity of a user on a network is described. In one example, data exchanged between a browser client on a device associated with the user and the network is monitored. Creation or use of an online identity by the user is detected within the data. The online identity is associated with a host site. The host site may be any of a plurality of point of presence sites. A notification of the online identity is generated for presentation to a custodian of the user. The notification may then be sent to the custodian.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: March 10, 2015
    Assignee: Symantec Corporation
    Inventors: Michael Spertus, Robert Walters, Gerry Egan
  • Publication number: 20150007332
    Abstract: A computer-implemented method for directing application updates may include (1) identifying information that indicates a rate at which an earlier version of an application is exploited in attacks on computing system security, (2) identifying additional information that indicates a rate at which a later version of the application is exploited in attacks on computing system security, (3) determining how updating the application from the earlier version to the later version will impact computing system security by comparing the rate the earlier version of the application is exploited with the rate at which the later version of the application is exploited, and (4) directing a computing system with a determination about updating an installation of the earlier version of the application to the later version of the application based on determining how updating the application will impact computing system security. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: June 26, 2013
    Publication date: January 1, 2015
    Inventors: Sourabh Satish, Abubakar A. Wawda, Petrus Johannes Viljoen, Gerry A. Egan
  • Patent number: 8356352
    Abstract: User-generated web content is received prior to posting by a client system, such as a web content hosting system. The user-generated web content is executed in a virtual environment and monitored for malicious behavior. Execution of the web content in the virtual environment forces code in the web content to run such that the actions the code takes, especially malicious behavior, are not obfuscated. If malicious behavior is detected, the user-generated web content is blocked from posting to the web content hosting system. Alternatively, when malicious behavior is not detected, the user-generated web content is permitted to be posted to the web content hosting system.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: January 15, 2013
    Assignee: Symantec Corporation
    Inventors: Abubakar Wawda, Gerry A. Egan, Adam Bromwich
  • Publication number: 20090089290
    Abstract: Computer-implemented methods and systems for creating or updating approved-file and trusted-domain databases and verifying the legitimacy of files are disclosed. A method for creating or updating an approved-file database may comprise intercepting a first file, identifying a source domain associated with the first file, identifying a trusted-domain database, determining whether a database record for the source domain associated with the first file exists within the trusted-domain database, creating a hash value for the first file if a database record for the source domain associated with the first file exists within the trusted-domain database, and storing the hash value for the first file in an approved-file database. Methods and systems for verifying the legitimacy of a file and for creating or updating a trusted-domain database are also disclosed.
    Type: Application
    Filed: October 1, 2007
    Publication date: April 2, 2009
    Inventors: Carey Nachenberg, Michael Spertus, Sourabh Satish, Gerry Egan
  • Patent number: 6052382
    Abstract: A device for mediating information management in a communications network for communications with a given network element having a given management-information protocol includes a NEDL file defining a structured network-element-description-language (NEDL) format referencing information-management roles pertaining to the given network element in accordance with the network-element management-information protocol; and a processor coupled to the NEDL file for recomposing messages received from of for communication to the network element. The mediation device may be configured for a given network element by adapting the NEDL file to define the management roles, parameters and resources of the given network element.
    Type: Grant
    Filed: January 31, 1997
    Date of Patent: April 18, 2000
    Assignee: Telops Management, Inc.
    Inventors: Sean Patrick Burke, Michael V. Harding, Santosh Alexander, Conor P. Dowling, Gerry A. Egan, David S. Spencer, Bernd Grohmann, Guenter H. Krauss, Stephen B. Flynn, Steven J. Urow