Patents by Inventor Pieter Viljoen
Pieter Viljoen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10735468Abstract: The disclosed computer-implemented method for evaluating security services may include (i) receiving, at a backend security server from an enterprise, multiple suspicious computing events detected within the enterprise, (ii) recording, within the backend security server, historical security information for each computing event that includes (a) a classification of the computing event as malicious or non-malicious based on a security analysis performed by the backend security server and (b) a point in time at which the classification was determined, (iii) evaluating an ability of the backend security server to detect security threats by (a) detecting an additional computing event within the enterprise and (b) determining, based on the historical security information, a point in time at which the backend security server became capable of classifying the additional computing event, and (iv) adjusting a security policy within the enterprise based on the evaluated ability of the backend security server.Type: GrantFiled: February 14, 2017Date of Patent: August 4, 2020Assignee: CA, Inc.Inventor: Pieter Viljoen
-
Patent number: 10320818Abstract: The disclosed computer-implemented method for detecting malicious computing events may include (i) determining, for multiple computing events detected within an enterprise, an initial disposition score for each computing event based on currently-available security information, (ii) determining an initial classification of each computing event as malicious or non-malicious by comparing the initial disposition score of each computing event with a threshold disposition score, (iii) for each computing event, determining (a) an updated disposition score based on new security information (b) an updated classification, (iv) calculating a degree to which the threshold disposition score correctly identifies malicious computing events by determining a frequency with which the initial classification of each computing event matches the updated classification of the computing event, and (v) adjusting the threshold disposition score based on the degree to which the threshold disposition score correctly identifies maliciousType: GrantFiled: February 14, 2017Date of Patent: June 11, 2019Assignee: Symantec CorporationInventor: Pieter Viljoen
-
Publication number: 20180234434Abstract: The disclosed computer-implemented method for detecting malicious computing events may include (i) determining, for multiple computing events detected within an enterprise, an initial disposition score for each computing event based on currently-available security information, (ii) determining an initial classification of each computing event as malicious or non-malicious by comparing the initial disposition score of each computing event with a threshold disposition score, (iii) for each computing event, determining (a) an updated disposition score based on new security information (b) an updated classification, (iv) calculating a degree to which the threshold disposition score correctly identifies malicious computing events by determining a frequency with which the initial classification of each computing event matches the updated classification of the computing event, and (v) adjusting the threshold disposition score based on the degree to which the threshold disposition score correctly identifies maliciousType: ApplicationFiled: February 14, 2017Publication date: August 16, 2018Inventor: Pieter Viljoen
-
Patent number: 9942264Abstract: The disclosed computer-implemented method for improving forest-based malware detection within an organization may include (i) receiving, at a backend computing system, organization data from at least one organization computing device within an organization computer network, (ii) adjusting, at the backend computing system, a general use forest model based on the organization data to generate an organization-specific forest model for detecting malicious computer files within the organization computer network, and (iii) sending, from the backend computing system, the organization-specific forest model to the at least one organization computing device. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 16, 2016Date of Patent: April 10, 2018Assignee: Symantec CorporationInventors: Mark Kennedy, Pieter Viljoen
-
Patent number: 8931086Abstract: Method and apparatus for detecting malware are described. In some examples, files of unknown trustworthiness are identified as potential threats on the computer. A trustworthiness level for each of the files is received from a backend. The trustworthiness level of each of the files is compared to a threshold level. Each of the files where the trustworthiness level thereof satisfies the threshold level is designated as a false positive threat. Each of the files where the trustworthiness level thereof does not satisfy the threshold level is designated as a true positive threat.Type: GrantFiled: September 26, 2008Date of Patent: January 6, 2015Assignee: Symantec CorporationInventors: Shane Pereira, Mark Kennedy, Pieter Viljoen
-
Patent number: 8595833Abstract: Aspects of the invention relate to a method, apparatus, and computer readable medium for determining software trustworthiness. In some examples, a software package identified as including at least one file of unknown trustworthiness is installed on a clean machine. A report package including a catalog of files that have been installed or modified on the clean machine by the software package is generated. Identification attributes for each of the files in the catalog is determined. Each of the files in the catalog is processed to assign a level of trustworthiness thereto. The report package is provided as output.Type: GrantFiled: June 4, 2012Date of Patent: November 26, 2013Assignee: Symantex CorporationInventor: Pieter Viljoen
-
Patent number: 8589904Abstract: A method may include receiving a request to install a second version of a software product over a first version of the software product, installing the second version of the software product in a dormant state while the first version of the software product is running, and swapping the first and second versions of the software product by activating the second version of the software product and deactivating the first version of the software product. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 10, 2009Date of Patent: November 19, 2013Assignee: Symantec CorporationInventors: Brian Powell, Pieter Viljoen
-
Patent number: 8549018Abstract: A computer-implemented method for predictive responses to internet object queries may include receiving a query from a client to evaluate a first internet object. The computer-implemented method may also include analyzing the query to predict a set of additional internet objects for which the client may subsequently request an evaluation. The computer-implemented method may further include transmitting an evaluation of the first internet object and of each additional internet object in the set of additional internet objects to the client. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: January 21, 2010Date of Patent: October 1, 2013Assignee: Symantec CorporationInventors: Shaun Cooley, Pieter Viljoen
-
Patent number: 8453222Abstract: A user's possession of synchronized data is used as an authentication factor. When the user requests an authentication configuration change, an authentication server requests the user to prove possession of synchronized data for that user. The user launches an authentication module on a client device hosting a local copy of the synchronized data. The authentication module creates a hash of the local copy and transmits the hash to the authorization server. Upon successfully verifying the received hash using a server copy of the synchronized data, the authentication server considers the user authorized and thus allows the user to make the authorization configuration change.Type: GrantFiled: August 20, 2010Date of Patent: May 28, 2013Assignee: Symantec CorporationInventors: Keith Newstadt, Pieter Viljoen
-
Patent number: 8412952Abstract: A computer-implemented method for authenticating requests from a client running trialware through a proof of work protocol is described. A request received from a client running trialware is analyzed. A cryptographic puzzle is generated if an authentication token is not included with the request. The cryptographic puzzle is transmitted to the client. A solution to the cryptographic puzzle received from the client is analyzed. A response to the request is generated if the received solution to the puzzle is validated.Type: GrantFiled: May 6, 2009Date of Patent: April 2, 2013Assignee: Symantec CorporationInventors: Zulfikar Ramzan, Walter Bogorad, Vijay Seshadri, Vadim Antonov, Pieter Viljoen
-
Publication number: 20120246721Abstract: Aspects of the invention relate to a method, apparatus, and computer readable medium for determining software trustworthiness. In some examples, a software package identified as including at least one file of unknown trustworthiness is installed on a clean machine. A report package including a catalog of files that have been installed or modified on the clean machine by the software package is generated. Identification attributes for each of the files in the catalog is determined. Each of the files in the catalog is processed to assign a level of trustworthiness thereto. The report package is provided as output.Type: ApplicationFiled: June 4, 2012Publication date: September 27, 2012Applicant: SYMANTEC CORPORATIONInventor: Pieter VILJOEN
-
Patent number: 8239947Abstract: A user mode application component invokes the assistance of a kernel mode driver component to detect and/or remediate malicious code on a computer system. The user mode application may include code that detects, for example, spyware and computer viruses, from user mode and when appropriate takes protective action when malicious code is detected. In one aspect, when the user mode application is unable to perform a selected operation in attempting to detect and/or take protective action, the user mode application invokes a kernel mode driver for assistance. The kernel mode driver assists user mode application in detecting malicious code and/or taking protective action by enabling or otherwise performing a selected operation for the user mode application.Type: GrantFiled: February 6, 2006Date of Patent: August 7, 2012Assignee: Symantec CorporationInventors: Adam Glick, Patrick Gardner, Pieter Viljoen
-
Patent number: 8196203Abstract: Aspects of the invention relate to a method, apparatus, and computer readable medium for determining software trustworthiness. In some examples, a software package identified as including at least one file of unknown trustworthiness is installed on a clean machine. A report package including a catalog of files that have been installed or modified on the clean machine by the software package is generated. Identification attributes for each of the files in the catalog is determined. Each of the files in the catalog is processed to assign a level of trustworthiness thereto. The report package is provided as output.Type: GrantFiled: September 25, 2008Date of Patent: June 5, 2012Assignee: Symantec CorporationInventor: Pieter Viljoen
-
Patent number: 7917902Abstract: Files to be installed on a computer system are streamed from an archive as the archive is being extracted directly to one or more final destination locations on the computer system.Type: GrantFiled: March 21, 2008Date of Patent: March 29, 2011Assignee: Symantec CorporationInventors: George Stahl, Collin Davis, Pieter Viljoen, Brian Powell
-
Publication number: 20110035740Abstract: A method may include receiving a request to install a second version of a software product over a first version of the software product, installing the second version of the software product in a dormant state while the first version of the software product is running, and swapping the first and second versions of the software product by activating the second version of the software product and deactivating the first version of the software product. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: August 10, 2009Publication date: February 10, 2011Applicant: Symantec CorporationInventors: Brian Powell, Pieter Viljoen
-
Patent number: 7877809Abstract: A computer system uses a clean boot technique to protect against malware attacks. Upon certain detection of a malware infection, the computer system is configured to clean boot off of a fixed secure volume containing its own operating system and security software. The security software in the fixed secure volume is usable to remediate the malware attack by itself or by relying at least in part on security software installed in the infected volume.Type: GrantFiled: April 20, 2006Date of Patent: January 25, 2011Assignee: Symantec CorporationInventors: Richard B. Sutton, Pieter Viljoen
-
Patent number: 7831919Abstract: A publisher uses a toolbox to graphically define web forms, by selecting and configuring components such as buttons, text boxes, menus, etc. Underlying code for the web forms (such as Extensible Markup Language, or XML) is automatically generated. The publisher defines transforms (such as Extensible Stylesheet Markup Language Transforms, or XSLTs) that process the exchange of data between the front end and the backend web service. The transforms and the code underlying the web forms is automatically combined into a frontend to the web service. The web based frontend is published on a user site, such that users can access the backend web service through the frontend.Type: GrantFiled: December 18, 2006Date of Patent: November 9, 2010Assignee: Symantec CorporationInventors: Pieter Viljoen, Shaun Cooley
-
Patent number: 7757284Abstract: An install control module allows installation of a software application onto a computer in presence of malicious code that is attempting to prevent installation. A metamorphic installation program is generated randomly to be substantially unique using metamorphic stealthing techniques. The program can be installed and is executed on the computer. Identifying information in the metamorphic installation program is substantially disguised from the malicious code so the program is substantially unrecognizable. The software application is installed onto the computer, and the metamorphic program protects the installation to allow the software application to be installed without substantial interference from the malicious code. In another embodiment, installation occurs by booting a preinstall environment on the computer without running a primary operating system. The software application is installed offline without the primary operating system running and before malicious code present on the computer is executed.Type: GrantFiled: December 22, 2005Date of Patent: July 13, 2010Assignee: Symantex CorporationInventor: Pieter Viljoen
-
Publication number: 20100083376Abstract: Method and apparatus for detecting malware are described. In some examples, files of unknown trustworthiness are identified as potential threats on the computer. A trustworthiness level for each of the files is received from a backend. The trustworthiness level of each of the files is compared to a threshold level. Each of the files where the trustworthiness level thereof satisfies the threshold level is designated as a false positive threat. Each of the files where the trustworthiness level thereof does not satisfy the threshold level is designated as a true positive threat.Type: ApplicationFiled: September 26, 2008Publication date: April 1, 2010Applicant: SYMANTEC CORPORATIONInventors: Shane Pereira, Mark Kennedy, Pieter Viljoen
-
Publication number: 20100077479Abstract: Aspects of the invention relate to a method, apparatus, and computer readable medium for determining software trustworthiness. In some examples, a software package identified as including at least one file of unknown trustworthiness is installed on a clean machine. A report package including a catalog of files that have been installed or modified on the clean machine by the software package is generated. Identification attributes for each of the files in the catalog is determined. Each of the files in the catalog is processed to assign a level of trustworthiness thereto. The report package is provided as output.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Applicant: SYMANTEC CORPORATIONInventor: Pieter Viljoen