Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Symantec Corporation
Symantec Corporation_20100121
Symantec Corporation_20131212

Symantec Corporation patents


Recent patent applications related to Symantec Corporation. Symantec Corporation is listed as an Agent/Assignee. Note: Symantec Corporation may have other listings under different names/spellings. We're not affiliated with Symantec Corporation, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "S" | Symantec Corporation-related inventors


Systems and methods to enable automatic password management in a proximity based authentication

The present disclosure relates to changing a password in a proximity-based authentication system. After a successful proximity-based authentication, a password agent may determine that a password does not comply with an administrative password policy. The password agent may then generate a new password that does comply with the administrative password... Symantec Corporation

Automated propagation of server configuration on a server cluster

Techniques are disclosed to automate secure propagation of a configuration to a plurality of servers in a server cluster. For example, the techniques may include a method. The method may include receiving, at a first computing device, a first public key associated with a target computing device, the first computing... Symantec Corporation

Systems and methods for applying security updates to endpoint devices

The disclosed computer-implemented method for applying security updates to endpoint devices may include (1) calculating a reputation score for an endpoint device that indicates a security state of the endpoint device, (2) transmitting, from the endpoint device to a security server that provides security updates, a request to receive a... Symantec Corporation

Systems and methods for data visualization

The disclosed computer-implemented method for data visualization may include (i) identifying a data set that includes data entities and relationships between the data entities, (ii) dividing the data entities into groups, (iii) responding to a request to display the data set within a graphical user interface by portraying the data... Symantec Corporation

Systems and methods for determining security reputations of wireless network access points

A computer-implemented method for determining security reputations of wireless network access points may include (1) receiving a unique identifier for a wireless network access point to which a mobile device has connected and security information that identifies the security posture of the mobile device after connecting to the wireless network... Symantec Corporation

System and assessing characteristics of web sites

According to one embodiment, a method for assessing whether a first site possesses a selected characteristic, the method comprising training, using a machine-learning process, a classifier to determine, based on web site data corresponding to one or more known web sites, whether the first web site possesses the selected characteristic,... Symantec Corporation

Systems and methods for updating network devices

The disclosed computer-implemented method for updating network devices may include (1) determining, by monitoring at least one endpoint device connected to a network device that provides a network connection for the endpoint device, periodic time intervals in which a user of the endpoint device is unlikely to access the network... Symantec Corporation

Systems and methods for location-restricting one-time passcodes

The disclosed computer-implemented method for location-restricting one-time passcodes may include (1) receiving, from a client, an authentication request for a user account, (2) receiving, in association with the authentication request, a one-time passcode that incorporates an originating location for the authentication request, (3) obtaining a location identifier indicating the location... Symantec Corporation

Systems and methods for determining security risk profiles

A computer-implemented method for determining security risk profiles may include (1) detecting a security breach of an entity within a set of entities, (2) constructing a peer-similarity graph that identifies an incentive to attack the entity in comparison to other entities within the set of entities, (3) creating, using the... Symantec Corporation

Systems and methods for detecting security threats

The disclosed computer-implemented method for detecting security threats may include (1) detecting, by a software security program, a security incident at a client device such that the software security program generates a signature report to identify the security incident, (2) querying an association database with the signature report to deduce... Symantec Corporation

Systems and methods for collecting error data to troubleshoot product errors

The disclosed computer-implemented method for collecting error data to troubleshoot product errors may include (1) monitoring Internet searches submitted by a user of a computing device to a search engine executing within a browser installed on the computing device, (2) identifying, while monitoring the Internet searches, a search including a... Symantec Corporation

Systems and methods for managing encryption keys for single-sign-on applications

The disclosed computer-implemented method for managing encryption keys for single-sign-on applications may include (1) receiving, from an identity service, notification of a request to access encrypted data on a cloud service, the notification including a session key for encrypting and decrypting a master key for decrypting cloud service keys, (2)... Symantec Corporation

Cloud-based code signing service - hybrid model to avoid large file uploads

Techniques are disclosed for reducing the amount of data associated with code signing files in a cloud-based computing environment. In one embodiment, a cloud-based code signing component receives a request to sign a current version of a file. The request includes differences between the current version of the file and... Symantec Corporation

Systems and methods for obtaining information about security threats on endpoint devices

The disclosed computer-implemented method for obtaining information about security threats on endpoint devices may include (1) detecting, by a security program on a computing device, an attempt to access at least one suspicious file, (2) before permitting the computing device to access the suspicious file, identifying, by the security program,... Symantec Corporation

Protecting dynamic and short-lived virtual machine instances in cloud environments

The present disclosure relates to protecting temporary virtual machine instances in a cloud computing platform from security risks. An example method generally includes monitoring a cloud platform for the assignment of a temporary virtual machine instance to a workload. A security system obtains information about a configuration of the temporary... Symantec Corporation

Systems and methods for generating tripwire files

A computer-implemented method for generating tripwire files may include (1) generating an initial tripwire file according to an initial tripwire generation calculation, the initial tripwire file configured such that modification of the initial tripwire file triggers investigation of a security breach, (2) generating a subsequent tripwire file according to a... Symantec Corporation

Print interface technology agnostic data loss prevention through print operations

Print operations are monitored and a DLP policy is applied, independently of the print interface technology used by applications that initiate print operations. A DLP component monitors for and detects print drivers being loaded into the print spooler. When a print driver is loaded, the print spooler creates a corresponding... Symantec Corporation

Systems and methods for automated classification of application network activity

The disclosed computer-implemented method for automated classification of application network activity may include (1) building a lexicon dictionary that comprises lexical keywords, wherein network streams whose headers contain a given lexical keyword represent communications of an activity type that is associated with the given lexical keyword in the lexicon dictionary,... Symantec Corporation

System and service assisted mobile pairing of password-less computer login

A system and method for pairing a mobile device with a computer for password-less login using a network service is provided. The method may include sending a pairing request to a network server from a computing device, wherein the pairing request includes computer authentication data and a computer public key.... Symantec Corporation

System and annotating client-server transactions

According to one embodiment, a method for annotating client-server transactions with a computer executing software comprises receiving a stream of transactional data associated with a plurality of events on the computer, wherein the plurality of events correspond to one or more actions taken by a user of a computer, and... Symantec Corporation

Recovery point objectives in replication envrionments

Disclosed herein are methods, systems, and processes to adjust replication operations in a distributed environment. A set of replicated data is received from a first appliance as a result of a replication operation. The replication operation is initiated by the first appliance and the set of replicated data includes a... Symantec Corporation

Systems and methods for modifying file backups in response to detecting potential ransomware

A computer-implemented method for modifying file backups in response to detecting potential ransomware may include (1) detecting, during a file backup process, an anomaly that is potentially indicative of ransomware on a computing device, (2) in response to detecting the anomaly that is potentially indicative of ransomware, storing a backup... Symantec Corporation

Securing internal services in an appliance

Disclosed herein are methods, systems, and processes to secure internal services in an appliance. A service call initiated by a client process of a client is intercepted. The service call is a request for an internal service provided by a server. The client and the server are deployed in an... Symantec Corporation

Securing internal services in a distributed environment

Disclosed herein are methods, systems, and processes to secure internal services in a distributed environment. A service call initiated by a client process of a client is intercepted. In this example, the service call is a request for an internal service provided by a server deployed in a target appliance.... Symantec Corporation

Systems and methods for automated generation of generic signatures used to detect polymorphic malware

The disclosed computer-implemented method for automated generation of generic signatures used to detect polymorphic malware may include (1) clustering a set of polymorphic file samples that share a set of static attributes in common with one another, (2) computing a distance of the polymorphic file samples from a centroid that... Symantec Corporation

Systems and methods for efficiently classifying data objects

The disclosed computer-implemented method for efficiently classifying data objects may include (1) receiving a data object to be classified according to a group of rules, where each rule includes one or more clauses, (2) creating, for each rule, a rule evaluation job that directs a rule evaluation processor to evaluate... Symantec Corporation

Systems and methods for facilitating single sign-on for multiple devices

The disclosed computer-implemented method for facilitating single sign-on for multiple devices may include (1) establishing a login session for a user account, (2) in response to establishing the login session, providing, to a device associated with the user account, a session token for the user account, (3) receiving, from at... Symantec Corporation

Systems and methods for backing up large distributed scale-out data systems

A computer-implemented method for backing up large distributed scale-out data systems may include (1) identifying a backup job to be performed on a distributed scale-out storage system that presents a unified storage view, (2) determining, in response to the backup job applying to distributed scale-out storage and based on a... Symantec Corporation

Accurate real-time identification of malicious bgp hijacks

A system and method for detecting malicious hijack events in real-time is provided. The method may include receiving routing data associated with a Border Gateway Protocol (BGP) event from at least one BGP router. The method may further include processing the routing data to generate a list of features representing... Symantec Corporation

Systems and methods for detecting malware infections via domain name service traffic analysis

The disclosed computer-implemented method for detecting malware infections via domain name service traffic analysis may include (1) detecting, on the computing device, a failed domain name service request originating from the computing device, (2) creating a record including information about the failed domain name request and a static unique identifier... Symantec Corporation

Systems and methods for taking snapshots in a deduplicated virtual file system

A computer-implemented method for taking snapshots in a deduplicated virtual file system may include (1) maintaining a deduplicated virtual file system that stores, at an original location within a non-virtual file system, at least one configuration file storing metadata for a target file and an extent map for the target... Symantec Corporation

Systems and methods for anonymizing log entries

The disclosed computer-implemented method for anonymizing log entries may include (1) detecting a data pattern in a group of log entries documenting events performed by at least one process executing on at least one device, (2) identifying, in the data pattern, at least one data field in the log entries... Symantec Corporation

Systems and methods for identifying compromised devices within industrial control systems

The disclosed computer-implemented method for identifying compromised devices within industrial control systems may include (1) monitoring network traffic within a network that facilitates communication for an industrial control system that includes an industrial device, (2) creating, based at least in part on the network traffic, a message protocol profile for... Symantec Corporation

Systems and methods for protecting backed-up data from ransomware attacks

The disclosed computer-implemented method for protecting backed-up data from ransomware attacks may include (1) determining that a backup system periodically backs up at least one file stored at a computing device to a remote storage system by storing a copy of the file at the remote storage system, (2) identifying... Symantec Corporation

Systems and methods for coordinating data caching on virtual storage appliances

A computer-implemented method for coordinating data caching on virtual storage appliances may include (1) receiving, at a first virtual storage appliance, a request for data from a virtual machine in a first set of virtual machines served by the first virtual storage appliance, (2) determining that the requested data is... Symantec Corporation

04/27/17 / #20170116409

Techniques for automated application analysis

Techniques for automated application analysis are disclosed. In one embodiment, the techniques may be realized as a method comprising detecting a code creation activity; detecting the presence of a previously-unknown application; associating the detected application with the code creation activity; and permitting the application to run based on associating the... Symantec Corporation

04/06/17 / #20170098092

Techniques for generating a virtual private container

Techniques for generating a virtual private container (VPC) are disclosed. In one embodiment, the techniques may be realized as a virtual container defining a self-contained software environment, comprising one or more analytic components configured to carry out specified analytic functions on data within the container, wherein the one or more... Symantec Corporation

03/30/17 / #20170091257

Systems and methods for improving the efficiency of point-in-time representations of databases

The disclosed computer-implemented method for improving the efficiency of point-in- time representations of databases may include (1) identifying a database that includes (A) one or more utilized storage locations that store substantive data and (B) one or more empty storage locations that are not currently storing any substantive data, (2)... Symantec Corporation

03/30/17 / #20170091482

Methods for data loss prevention from malicious applications and targeted persistent threats

The present disclosure relates to using reputation information (e.g., of applications, libraries, network destinations, etc.) in a data loss prevention system. According to one embodiment, a computer system (e.g., an endpoint or server system) identifies a first application requesting to access a file accessible through the computer system. The DLP... Symantec Corporation

03/30/17 / #20170093647

Partition arbitration optimization

Various systems, methods, and processes to optimize partition arbitration are disclosed. In response to a cluster being partitioned into multiple network partitions, a determination is made, using a first node in a first network partition, whether the first node wins one or more coordination points. The determination of the first... Symantec Corporation

03/30/17 / #20170093746

Input/output fencing optimization

Various systems, methods, and processes to optimize input/output (I/O) fencing operations in systems that implement coordination points are presented. A matrix is generated. The matrix includes information indicating the accessibility of one or more coordination points by a node. The method then transmits the matrix to one or more other... Symantec Corporation

03/30/17 / #20170093902

Detection of security incidents with low confidence security events

Techniques are disclosed for detecting security incidents based on low confidence security events. A security management server aggregates a collection of security events received from logs from one or more devices. The security management server evaluates the collection of security events based on a confidence score assigned to each distinct... Symantec Corporation

03/30/17 / #20170093918

Automated construction of network whitelists using host-based security controls

Techniques are disclosed for constructing network whitelists in server endpoints using host-based security controls. Once constructed, the network whitelists are used to detect unauthorized communications at the server endpoints. In one embodiment, a method is disclosed for constructing a network whitelist. The method includes identifying at least a first application... Symantec Corporation

03/30/17 / #20170093972

Systems and methods for restoring data from opaque data backup streams

The disclosed computer-implemented method for restoring data from opaque data backup streams may include (1) initiating a virtual restore of an opaque data backup stream that is designed to be parsed exclusively by a data backup application that created the stream, (2) determining, for each block of data, an original... Symantec Corporation

03/30/17 / #20170094003

Preventing data corruption due to pre-existing split brain

Various methods, systems, and processes to prevent data corruption caused by a pre-existing split brain condition in a cluster are presented. In response to determining that a node is no longer part of a sub-cluster, another node in the sub-cluster is designated as a racer node. The racer node accesses... Symantec Corporation

03/23/17 / #20170083446

Systems and methods for provisioning frequently used image segments from caches

The disclosed computer-implemented method for provisioning frequently used image segments from caches may include (1) storing a representation and a use counter for an image segment that is hosted on a storage system in a list of representations and use counters for image segments hosted on the storage system, (2)... Symantec Corporation

03/23/17 / #20170083486

Regulating undesirable webpage code

In one embodiment, a device in a network intercepts webpage data sent by one or more servers for presentation in a browser application. The device identifies undesirable code in the intercepted webpage data based on one or more rules. The device modifies the webpage data to alter functionality of the... Symantec Corporation

03/16/17 / #20170075708

Optimizing access to production data

Various systems, methods, and processes for optimizing access to production data in application development and testing environments are disclosed. If an input/output (I/O) operation is a read operation, a storage location on a virtual storage unit at which the read operation is to be performed is determined. Also determined is... Symantec Corporation

03/16/17 / #20170078166

Apparatus and utilizing fourier transforms to characterize network traffic

A non-transitory computer readable storage medium, comprising executable instructions to collect network traffic data, produce a Fourier signature from the network traffic data, associate the Fourier signature with a known pattern, collect new network traffic data, produce a new Fourier signature from the new network traffic data, compare the new... Symantec Corporation

03/16/17 / #20170078249

System and building intelligent and distributed l2-l7 unified threat management infrastructure for ipv4 and ipv6 environments

A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box... Symantec Corporation

03/16/17 / #20170078314

Method and detecting security anomalies in a public cloud environment using network activity monitoring, application profiling and self-building host mapping

The disclosed computer-implemented method for detecting security anomalies in a public cloud environment using network activity monitoring, application profiling, and self-building host mapping may include (1) collecting host information that identifies (A) at least one communication channel that has previously facilitated communication between at least one host computing platform within... Symantec Corporation

03/02/17 / #20170061123

Detecting suspicious file prospecting activity from patterns of user activity

Suspicious file prospecting activity is detected based on patterns of file system access. A user's file system access is monitored over a specific time period. A sequence of the file accesses (e.g., represented as path names) made by the user during the time period is recorded. Distances between the recorded... Symantec Corporation

02/16/17 / #20170046518

Systems and methods for detecting unknown vulnerabilities in computing processes

The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that facilitates execution of a computing process by logging telemetry data related to the computing process while the computing process is running within the computing environment, (2) determining that the computing process... Symantec Corporation

01/05/17 / #20170003999

Data access accelerator

Various systems, methods, and processes for accelerating data access in application and testing environments are disclosed. A production dataset is received from a storage system, and cached in a consolidated cache. The consolidated cache is implemented by an accelerator virtual machine. A file system client intercepts a request for the... Symantec Corporation

01/05/17 / #20170004047

Consolidated full backup of a restored virtual machine

Various systems, methods, and processes for optimizing the performance of a consolidated full backup of a restored virtual machine are disclosed. Changed data and metadata associated with the changed data is received from a hypervisor at a backup module. The hypervisor supports a virtual machine, and the virtual machine employs... Symantec Corporation

01/05/17 / #20170004083

System, method and mechanism to efficiently coordinate cache sharing between cluster nodes operating on the same regions of a file or the file system blocks shared among multiple files

Various systems, methods and apparatuses for coordinating the sharing of cache data between cluster nodes operating on the same data objects. One embodiment involves a first node in a cluster receiving a request for a data object, querying a global lock manager to determine if a second node in the... Symantec Corporation

01/05/17 / #20170004203

Method and system for configuration management of hierarchically-organized unstructured data using associative templates

Methods, computer program products, and computer systems for configuration management are disclosed. Such methods, computer program products, and computer systems include identifying an associative template node and setting a configuration parameter to a parameter value, based on a template association. The associative template node is a node in a hierarchy... Symantec Corporation

01/05/17 / #20170005893

Data loss monitoring of partial data streams

A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data... Symantec Corporation

01/05/17 / #20170005944

Systems and methods for scalable network buffer management

The disclosed computer-implemented method for scalable network buffer management may include (1) receiving, via a connection to a client, data to be transmitted to a cloud service, (2) buffering the data in at least one data buffer, (3) determining that the data will not be transmitted to the cloud service... Symantec Corporation

01/05/17 / #20170006060

Systems and methods for detecting man-in-the-middle attacks

A computer-implemented method for detecting man-in-the-middle attacks may include (1) registering a mobile device of a user within a computing environment as an authenticated mobile device that corresponds to the user, (2) receiving an authentication request to log into a secure computing resource as the user, (3) transmitting, in response... Symantec Corporation








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Symantec Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Symantec Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###