Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Symantec Corporation patents


Recent patent applications related to Symantec Corporation. Symantec Corporation is listed as an Agent/Assignee. Note: Symantec Corporation may have other listings under different names/spellings. We're not affiliated with Symantec Corporation, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "S" | Symantec Corporation-related inventors


Antenna system for wireless communication devices and other wireless applications

An antenna system for wireless communications and other wireless applications is disclosed. In one particular embodiment, the antenna system may comprise a frame with at least three facets and an antenna element mounted on each of the at least three facets, wherein each of the antenna elements are electromagnetically isolated from each other.. ... Symantec Corporation

Systems and methods for detecting malicious processes on computing devices

The disclosed computer-implemented method for detecting malicious processes on computing devices may include (i) identifying a portion of data on a computing device that is stored in an unrestricted section of memory and accessed by processes while running on the computing device, (ii) allocating a restricted section of memory within the computing device and indicating that the portion of data is located in the restricted section of memory, (iii) detecting an attempt by a process running on the computing device to access the portion of data within the restricted section of memory using an unexpected access method, (iv) determining, based at least in part on the process attempting to access the portion of data within the restricted section of memory using the unexpected access method, that the process is malicious, and (v) performing a security action on the computing device to prevent the malicious process from harming the computing device.. . ... Symantec Corporation

Technique for data loss prevention through clipboard operations

Techniques describe preventing sensitive data from being misappropriated during a clipboard operation. A copy operation for data being copied to a clipboard is intercepted. ... Symantec Corporation

Network device clusters

In certain embodiments, a method comprises forming a cluster of peered network devices comprising a plurality of three or more peered network devices and a plurality of control information connections between pairs of the peered network devices. The method further comprises classifying a connection by associating the connection with an application, wherein a first peered network device associated with the cluster classifies the connection based at least in part on sequential payload packets associated with the connection, at least some of which the first device receives from other peered network devices associated with the cluster. ... Symantec Corporation

Automated propagation of server configuration on a server cluster

Techniques are disclosed to automate secure propagation of a configuration to a plurality of servers in a server cluster. For example, the techniques may include a method. ... Symantec Corporation

Systems and methods to enable automatic password management in a proximity based authentication

The present disclosure relates to changing a password in a proximity-based authentication system. After a successful proximity-based authentication, a password agent may determine that a password does not comply with an administrative password policy. ... Symantec Corporation

Systems and methods for determining security reputations of wireless network access points

A computer-implemented method for determining security reputations of wireless network access points may include (1) receiving a unique identifier for a wireless network access point to which a mobile device has connected and security information that identifies the security posture of the mobile device after connecting to the wireless network access point, (2) adding the unique identifier and the security information to a security database, (3) correlating the security information with an additional set of security information that identifies the security posture of an additional mobile device after connecting to the wireless network access point, (4) assigning a security reputation to the wireless network access point, and (5) enabling a requesting mobile device to determine whether to connect to the wireless network access point by providing the security reputation of the wireless network access point to the requesting mobile device. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

Systems and methods for data visualization

The disclosed computer-implemented method for data visualization may include (i) identifying a data set that includes data entities and relationships between the data entities, (ii) dividing the data entities into groups, (iii) responding to a request to display the data set within a graphical user interface by portraying the data set as concentric rings, each given ring portraying a corresponding group and portraying data entities within the corresponding group as arcs of the given ring, (iv) receiving an input within the graphical user interface to select a data entity within a group by selecting an arc corresponding to the selected data entity of a ring corresponding to the group, and (v) determining that a subset of data entities within an additional group are related to the selected data entity and highlighting the subset of data entities within an additional ring. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

Systems and methods for applying security updates to endpoint devices

The disclosed computer-implemented method for applying security updates to endpoint devices may include (1) calculating a reputation score for an endpoint device that indicates a security state of the endpoint device, (2) transmitting, from the endpoint device to a security server that provides security updates, a request to receive a security update with a degree of urgency based on the reputation score of the endpoint device, (3) receiving the security update from the security server in accordance with the degree of urgency, and then (4) applying the security update within the endpoint device. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

System and method for assessing characteristics of web sites

According to one embodiment, a method for assessing whether a first site possesses a selected characteristic, the method comprising training, using a machine-learning process, a classifier to determine, based on web site data corresponding to one or more known web sites, whether the first web site possesses the selected characteristic, wherein the one or more known web pages comprise web pages known to possess the selected characteristic and web pages known not to possess the selected characteristic.. . ... Symantec Corporation

Systems and methods for determining security risk profiles

A computer-implemented method for determining security risk profiles may include (1) detecting a security breach of an entity within a set of entities, (2) constructing a peer-similarity graph that identifies an incentive to attack the entity in comparison to other entities within the set of entities, (3) creating, using the peer-similarity graph, a security risk profile for each entity in the set of entities, (4) automatically adjusting at least one security risk profile based on the detected security breach, and (5) updating a security database with the adjusted security risk profile. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

Systems and methods for location-restricting one-time passcodes

The disclosed computer-implemented method for location-restricting one-time passcodes may include (1) receiving, from a client, an authentication request for a user account, (2) receiving, in association with the authentication request, a one-time passcode that incorporates an originating location for the authentication request, (3) obtaining a location identifier indicating the location of the client, (4) determining that the location identifier indicates a location equivalent to the originating location, and (5) determining, at least in part in response to determining that the location identifier indicates a location equivalent to the originating location, to authenticate the client to the user account. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

Systems and methods for updating network devices

The disclosed computer-implemented method for updating network devices may include (1) determining, by monitoring at least one endpoint device connected to a network device that provides a network connection for the endpoint device, periodic time intervals in which a user of the endpoint device is unlikely to access the network connection via the network device, (2) detecting that a system update is available for the network device that will impair the ability of the network device to provide the network connection for the endpoint device while being applied to the network device, (3) identifying, based on the periodic time intervals in which the user is unlikely to access the network connection, an optimal time at which to apply the available system update to the network device, then (4) applying the available system update to the network device at the optimal time.. . ... Symantec Corporation

Systems and methods for detecting security threats

The disclosed computer-implemented method for detecting security threats may include (1) detecting, by a software security program, a security incident at a client device such that the software security program generates a signature report to identify the security incident, (2) querying an association database with the signature report to deduce another signature report that a different software security program would have predictably generated at the client device, the different software security program having been unavailable at the client device at a time of detecting the security incident, and (3) performing at least one protective action to protect the client device from a security threat associated with the security incident based on the other signature report deduced by querying the association database. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

09/28/17 / #20170279826

Protecting dynamic and short-lived virtual machine instances in cloud environments

The present disclosure relates to protecting temporary virtual machine instances in a cloud computing platform from security risks. An example method generally includes monitoring a cloud platform for the assignment of a temporary virtual machine instance to a workload. ... Symantec Corporation

09/28/17 / #20170279819

Systems and methods for obtaining information about security threats on endpoint devices

The disclosed computer-implemented method for obtaining information about security threats on endpoint devices may include (1) detecting, by a security program on a computing device, an attempt to access at least one suspicious file, (2) before permitting the computing device to access the suspicious file, identifying, by the security program, at least one third-party resource not associated with the security program that contains information potentially indicative of the trustworthiness of the suspicious file, (3) obtaining, by the security program from the third-party resource, the information potentially indicative of the trustworthiness of the suspicious file, and then (4) determining, by the security program based at least in part on the information potentially indicative of the trustworthiness of the suspicious file, whether the suspicious file represents a security threat to the computing device. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

09/28/17 / #20170279615

Cloud-based code signing service - hybrid model to avoid large file uploads

Techniques are disclosed for reducing the amount of data associated with code signing files in a cloud-based computing environment. In one embodiment, a cloud-based code signing component receives a request to sign a current version of a file. ... Symantec Corporation

09/28/17 / #20170279613

Systems and methods for managing encryption keys for single-sign-on applications

The disclosed computer-implemented method for managing encryption keys for single-sign-on applications may include (1) receiving, from an identity service, notification of a request to access encrypted data on a cloud service, the notification including a session key for encrypting and decrypting a master key for decrypting cloud service keys, (2) deriving the master key, (3) decrypting, using the master key, a cloud service key for decrypting data on the cloud service, (4) storing the master key, encrypted using the session key, (5) receiving an additional notification of an additional request to access encrypted data on an additional cloud service, the notification including the session key, (6) without again obtaining the authentication element from the user, decrypting the master key, and (7) decrypting, using the master key, an additional cloud service key for decrypting data on the additional cloud service. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

09/28/17 / #20170277618

Systems and methods for collecting error data to troubleshoot product errors

The disclosed computer-implemented method for collecting error data to troubleshoot product errors may include (1) monitoring internet searches submitted by a user of a computing device to a search engine executing within a browser installed on the computing device, (2) identifying, while monitoring the internet searches, a search including a description of an error in a product installed on the computing device, (3) in response to identifying the search, automatically enabling debug logging for the product on the computing device, and (4) maintaining an event log including information collected from the debug logging that may be used to diagnose the error. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

09/21/17 / #20170270293

Systems and methods for generating tripwire files

A computer-implemented method for generating tripwire files may include (1) generating an initial tripwire file according to an initial tripwire generation calculation, the initial tripwire file configured such that modification of the initial tripwire file triggers investigation of a security breach, (2) generating a subsequent tripwire file according to a subsequent tripwire generation calculation, the subsequent tripwire generation calculation differing from the initial tripwire generation calculation along at least one dimension, (3) receiving automated feedback that indicates whether at least one of the initial tripwire file and the subsequent tripwire file failed to enable detection of a security threat, and (4) adjusting automatic generation of a third tripwire file based on the automated feedback indicating whether at least one of the initial tripwire file and the subsequent tripwire file failed to detect the security threat. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

09/14/17 / #20170262522

Systems and methods for automated classification of application network activity

The disclosed computer-implemented method for automated classification of application network activity may include (1) building a lexicon dictionary that comprises lexical keywords, wherein network streams whose headers contain a given lexical keyword represent communications of an activity type that is associated with the given lexical keyword in the lexicon dictionary, (2) identifying, at a network vantage point, a network stream that represents a communication between an application and a server, (3) extracting, through a lexical analysis that utilizes the lexicon dictionary, a set of keywords from one or more header fields of the network stream, and (4) classifying the network stream based on activity types associated with each keyword in the set of keywords that were extracted from the header fields of the network stream. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

09/14/17 / #20170262236

Print interface technology agnostic data loss prevention through print operations

Print operations are monitored and a dlp policy is applied, independently of the print interface technology used by applications that initiate print operations. A dlp component monitors for and detects print drivers being loaded into the print spooler. ... Symantec Corporation

08/31/17 / #20170251072

System and method for annotating client-server transactions

According to one embodiment, a method for annotating client-server transactions with a computer executing software comprises receiving a stream of transactional data associated with a plurality of events on the computer, wherein the plurality of events correspond to one or more actions taken by a user of a computer, and partitioning the stream of transactional data into a plurality of portions. The method further comprises sorting the plurality of portions into one or more groups based on the similarity of one portion of the plurality of portions to another portion of the plurality of portions, and receiving non-transactional data, comprising information about the plurality of events, from the computer. ... Symantec Corporation

08/31/17 / #20170250974

System and method for service assisted mobile pairing of password-less computer login

A system and method for pairing a mobile device with a computer for password-less login using a network service is provided. The method may include sending a pairing request to a network server from a computing device, wherein the pairing request includes computer authentication data and a computer public key. ... Symantec Corporation

08/03/17 / #20170223142

Securing internal services in a distributed environment

Disclosed herein are methods, systems, and processes to secure internal services in a distributed environment. A service call initiated by a client process of a client is intercepted. ... Symantec Corporation

08/03/17 / #20170223056

Securing internal services in an appliance

Disclosed herein are methods, systems, and processes to secure internal services in an appliance. A service call initiated by a client process of a client is intercepted. ... Symantec Corporation

08/03/17 / #20170223031

Systems and methods for modifying file backups in response to detecting potential ransomware

A computer-implemented method for modifying file backups in response to detecting potential ransomware may include (1) detecting, during a file backup process, an anomaly that is potentially indicative of ransomware on a computing device, (2) in response to detecting the anomaly that is potentially indicative of ransomware, storing a backup copy in a separate location from other backup copies, (3) confirming that the anomaly is indicative of ransomware on the computing device, (4) adjusting a backup policy in response to confirming that the anomaly is indicative of ransomware on the computing device, and (5) managing the backup copy based on the adjusted backup policy. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

08/03/17 / #20170220424

Recovery point objectives in replication envrionments

Disclosed herein are methods, systems, and processes to adjust replication operations in a distributed environment. A set of replicated data is received from a first appliance as a result of a replication operation. ... Symantec Corporation

07/06/17 / #20170195429

Systems and methods for facilitating single sign-on for multiple devices

The disclosed computer-implemented method for facilitating single sign-on for multiple devices may include (1) establishing a login session for a user account, (2) in response to establishing the login session, providing, to a device associated with the user account, a session token for the user account, (3) receiving, from at least one client, a request to access resources associated with the user account, (4) determining that the associated device possesses the session token for the user account, and (5) in response to determining that the associated device possesses the session token, providing, to the client, access to the resources associated with the user account. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

07/06/17 / #20170193389

Systems and methods for efficiently classifying data objects

The disclosed computer-implemented method for efficiently classifying data objects may include (1) receiving a data object to be classified according to a group of rules, where each rule includes one or more clauses, (2) creating, for each rule, a rule evaluation job that directs a rule evaluation processor to evaluate the data object according to the clauses within the rule, where the rule evaluation processor evaluates the clauses in increasing order of estimated processing time, (3) submitting the rule evaluation jobs created for the rules to rule evaluation queues for processing by the rule evaluation processor, where the rule evaluation jobs are submitted in decreasing order of estimated processing time, (4) receiving an evaluation result for each rule evaluation job, and (5) in response to receiving the evaluation results, classifying the data object according to the evaluation results. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

07/06/17 / #20170193229

Systems and methods for automated generation of generic signatures used to detect polymorphic malware

The disclosed computer-implemented method for automated generation of generic signatures used to detect polymorphic malware may include (1) clustering a set of polymorphic file samples that share a set of static attributes in common with one another, (2) computing a distance of the polymorphic file samples from a centroid that represents a reference data point with respect to the set of polymorphic file samples, (3) determining that the distance of the polymorphic file samples from the centroid is below a certain threshold, and then upon determining that the distance is below the certain threshold, (4) identifying, within the set of static attributes shared in common by the polymorphic file samples, a subset of static attributes whose values are identical across all of the polymorphic file samples and (5) generating a generic file-classification signature from the subset of static attributes. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

06/29/17 / #20170185490

Systems and methods for backing up large distributed scale-out data systems

A computer-implemented method for backing up large distributed scale-out data systems may include (1) identifying a backup job to be performed on a distributed scale-out storage system that presents a unified storage view, (2) determining, in response to the backup job applying to distributed scale-out storage and based on a scope of the backup job, a number of backup systems to deploy for performing the backup job, (3) deploying a plurality of backup systems creating a plurality of backups covering the plurality of data objects by (i) assigning, to each backup system, a subset of data objects within the backup job and (ii) backing up, by the backup system, the subset of data objects assigned to the backup system, and (4) combining the plurality of backups into a unified backup that represents the unified storage view. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

06/22/17 / #20170180418

Accurate real-time identification of malicious bgp hijacks

A system and method for detecting malicious hijack events in real-time is provided. The method may include receiving routing data associated with a border gateway protocol (bgp) event from at least one bgp router. ... Symantec Corporation

06/01/17 / #20170155667

Systems and methods for detecting malware infections via domain name service traffic analysis

The disclosed computer-implemented method for detecting malware infections via domain name service traffic analysis may include (1) detecting, on the computing device, a failed domain name service request originating from the computing device, (2) creating a record including information about the failed domain name request and a static unique identifier for the computing device, (3) correlating the record with a set of previous records about failed domain name service requests originating from the computing device with the static unique identifier, and (4) determining, based on correlating the record with the set of previous records, that the computing device is infected with malware that generated the failed domain name service request. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

05/18/17 / #20170140156

Systems and methods for protecting backed-up data from ransomware attacks

The disclosed computer-implemented method for protecting backed-up data from ransomware attacks may include (1) determining that a backup system periodically backs up at least one file stored at a computing device to a remote storage system by storing a copy of the file at the remote storage system, (2) identifying one or more characteristics of the file backed up by the backup system, (3) storing a tripwire file with the one or more characteristics at the computing device, (4) determining that the file stored at the computing device has likely been encrypted by ransomware executing on the computing device by detecting that the tripwire file has been modified, (5) performing an action that prevents the backup system from replacing the copy of the file at the remote storage system with a copy of the encrypted file. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

05/11/17 / #20170132027

Systems and methods for coordinating data caching on virtual storage appliances

A computer-implemented method for coordinating data caching on virtual storage appliances may include (1) receiving, at a first virtual storage appliance, a request for data from a virtual machine in a first set of virtual machines served by the first virtual storage appliance, (2) determining that the requested data is not cached at the first virtual storage appliance, (3) determining that a second virtual storage appliance is responsible for caching the requested data from a remote data source, (4) transferring the requested data from the second virtual storage appliance to the first virtual storage appliance, and (5) providing the requested data from the first virtual storage appliance to the virtual machine. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

04/27/17 / #20170116409

Techniques for automated application analysis

Techniques for automated application analysis are disclosed. In one embodiment, the techniques may be realized as a method comprising detecting a code creation activity; detecting the presence of a previously-unknown application; associating the detected application with the code creation activity; and permitting the application to run based on associating the detected application with the code creation activity.. ... Symantec Corporation

04/06/17 / #20170098092

Techniques for generating a virtual private container

Techniques for generating a virtual private container (vpc) are disclosed. In one embodiment, the techniques may be realized as a virtual container defining a self-contained software environment, comprising one or more analytic components configured to carry out specified analytic functions on data within the container, wherein the one or more analytic components are isolated to run within the self-contained software environment of the container; an interface configured to identify and authenticate a particular user and provide analysis results generated by the one or more analytic components; and a gateway configured to receive data from one or more secure data sources external to the virtual container and associated with the particular user for use by the one or more analytic components.. ... Symantec Corporation

03/30/17 / #20170094003

Preventing data corruption due to pre-existing split brain

Various methods, systems, and processes to prevent data corruption caused by a pre-existing split brain condition in a cluster are presented. In response to determining that a node is no longer part of a sub-cluster, another node in the sub-cluster is designated as a racer node. ... Symantec Corporation

03/30/17 / #20170093972

Systems and methods for restoring data from opaque data backup streams

The disclosed computer-implemented method for restoring data from opaque data backup streams may include (1) initiating a virtual restore of an opaque data backup stream that is designed to be parsed exclusively by a data backup application that created the stream, (2) determining, for each block of data, an original header and tail of the block based on a restored version of the block on the client, (3) sending the original header and tail of the block to a server, (4) creating, at the server, a mapping between a location of the block of data in the stream on the server and the original header and tail of the block, and (5) restoring, without using the data backup application, data in the stream by using the mapping to restore the original headers and tails of the blocks. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

03/30/17 / #20170093918

Automated construction of network whitelists using host-based security controls

Techniques are disclosed for constructing network whitelists in server endpoints using host-based security controls. Once constructed, the network whitelists are used to detect unauthorized communications at the server endpoints. ... Symantec Corporation

03/30/17 / #20170093902

Detection of security incidents with low confidence security events

Techniques are disclosed for detecting security incidents based on low confidence security events. A security management server aggregates a collection of security events received from logs from one or more devices. ... Symantec Corporation

03/30/17 / #20170093746

Input/output fencing optimization

Various systems, methods, and processes to optimize input/output (i/o) fencing operations in systems that implement coordination points are presented. A matrix is generated. ... Symantec Corporation

03/30/17 / #20170093647

Partition arbitration optimization

Various systems, methods, and processes to optimize partition arbitration are disclosed. In response to a cluster being partitioned into multiple network partitions, a determination is made, using a first node in a first network partition, whether the first node wins one or more coordination points. ... Symantec Corporation

03/30/17 / #20170091482

Methods for data loss prevention from malicious applications and targeted persistent threats

The present disclosure relates to using reputation information (e.g., of applications, libraries, network destinations, etc.) in a data loss prevention system. According to one embodiment, a computer system (e.g., an endpoint or server system) identifies a first application requesting to access a file accessible through the computer system. ... Symantec Corporation

03/30/17 / #20170091257

Systems and methods for improving the efficiency of point-in-time representations of databases

The disclosed computer-implemented method for improving the efficiency of point-in- time representations of databases may include (1) identifying a database that includes (a) one or more utilized storage locations that store substantive data and (b) one or more empty storage locations that are not currently storing any substantive data, (2) creating a point-in-time representation of the database by (a) identifying the empty storage locations and (b) flagging the empty storage locations in connection with the point-in-time representation of the database, (3) detecting a request to write certain substantive data to at least one of the empty storage locations, and then in response to detecting the request, (4) satisfying the request while refraining from performing a copy-on-write operation on the empty storage location due at least in part to the empty storage location not currently storing any substantive data. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

03/23/17 / #20170083486

Regulating undesirable webpage code

In one embodiment, a device in a network intercepts webpage data sent by one or more servers for presentation in a browser application. The device identifies undesirable code in the intercepted webpage data based on one or more rules. ... Symantec Corporation

03/23/17 / #20170083446

Systems and methods for provisioning frequently used image segments from caches

The disclosed computer-implemented method for provisioning frequently used image segments from caches may include (1) storing a representation and a use counter for an image segment that is hosted on a storage system in a list of representations and use counters for image segments hosted on the storage system, (2) incrementing a current value of the use counter for the image segment in the list of representations and use counters each time the image segment is provisioned from the storage system, (3) determining that the current value of the use counter for the image segment has met a predetermined threshold for frequent image-segment provisioning, (4) hosting the image segment in a cache that enables quicker provisioning than the storage system enables, and (5) provisioning the image segment from the cache in response to a request to provision the image segment. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

03/16/17 / #20170078314

Method and apparatus for detecting security anomalies in a public cloud environment using network activity monitoring, application profiling and self-building host mapping

The disclosed computer-implemented method for detecting security anomalies in a public cloud environment using network activity monitoring, application profiling, and self-building host mapping may include (1) collecting host information that identifies (a) at least one communication channel that has previously facilitated communication between at least one host computing platform within a cloud computing environment and at least one additional computing platform and/or (b) at least one application that has previously run on the host computing platform, (2) monitoring network traffic involving the host computing platform, (3) detecting, while monitoring the network traffic, network activity that is inconsistent with the collected host information, and then (4) determining that the detected network activity represents a potential security threat within the cloud computing environment due at least in part to the detected network activity being inconsistent with the collected host information. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

03/16/17 / #20170078249

System and method for building intelligent and distributed l2-l7 unified threat management infrastructure for ipv4 and ipv6 environments

A security gateway appliance is configured to evaluate network traffic according to security rules that classify traffic flows according to specifically identified application programs responsible for producing and/or consuming the network traffic and to enforce policies in accordance with network traffic classifications. The appliance includes an on-box anti-virus/anti-malware engine, on-box data loss prevention engine and on-box authentication engine. ... Symantec Corporation

03/16/17 / #20170078166

Apparatus and method for utilizing fourier transforms to characterize network traffic

A non-transitory computer readable storage medium, comprising executable instructions to collect network traffic data, produce a fourier signature from the network traffic data, associate the fourier signature with a known pattern, collect new network traffic data, produce a new fourier signature from the new network traffic data, compare the new fourier signature with the fourier signature to selectively identify a match and associate the new network traffic data with the known pattern upon a match.. . ... Symantec Corporation

03/16/17 / #20170075708

Optimizing access to production data

Various systems, methods, and processes for optimizing access to production data in application development and testing environments are disclosed. If an input/output (i/o) operation is a read operation, a storage location on a virtual storage unit at which the read operation is to be performed is determined. ... Symantec Corporation

03/02/17 / #20170061123

Detecting suspicious file prospecting activity from patterns of user activity

Suspicious file prospecting activity is detected based on patterns of file system access. A user's file system access is monitored over a specific time period. ... Symantec Corporation

02/16/17 / #20170046518

Systems and methods for detecting unknown vulnerabilities in computing processes

The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that facilitates execution of a computing process by logging telemetry data related to the computing process while the computing process is running within the computing environment, (2) determining that the computing process crashed while running within the computing environment, (3) searching the telemetry data for evidence of any vulnerabilities that potentially led the computing process to crash while running within the computing environment, (4) identifying, while searching the telemetry data, evidence of at least one vulnerability of the computing process that is not yet known to exist within the computing process and then in response to identifying the evidence of the computing process's vulnerability, (5) performing at least one security action to hinder any potentially malicious exploitation of the computing process's vulnerability. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

01/05/17 / #20170006060

Systems and methods for detecting man-in-the-middle attacks

A computer-implemented method for detecting man-in-the-middle attacks may include (1) registering a mobile device of a user within a computing environment as an authenticated mobile device that corresponds to the user, (2) receiving an authentication request to log into a secure computing resource as the user, (3) transmitting, in response to receiving the authentication request, an out-of-band push authentication prompt to the registered mobile device of the user through a different channel than a channel through which the authentication request was received, (4) comparing a geolocation indicated by the authentication request with a geolocation indicated by the registered mobile device, and (5) performing remedial action in response to detecting a man-in-the-middle attack based on a determination that the geolocation indicated by the authentication request and the geolocation indicated by the registered mobile device do not match. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

01/05/17 / #20170005944

Systems and methods for scalable network buffer management

The disclosed computer-implemented method for scalable network buffer management may include (1) receiving, via a connection to a client, data to be transmitted to a cloud service, (2) buffering the data in at least one data buffer, (3) determining that the data will not be transmitted to the cloud service within a timeout period for the client connection, (4) delaying reception of additional data from the client connection for a portion of the timeout period, and (5) before the timeout period has elapsed, buffering data from the client connection in at least one secondary data buffer, wherein the secondary data buffer is smaller in size than the data buffer. Various other methods, systems, and computer-readable media are also disclosed.. ... Symantec Corporation

01/05/17 / #20170005893

Data loss monitoring of partial data streams

A method for detecting loss of sensitive information in partial data streams may include identifying partial data streams containing segments lost while capturing network traffic at a network computing device, determining characteristics of content of the partial data streams, padding content portions of the lost segments in the partial data streams, and scanning the partial data streams for sensitive information according to at least one data loss prevention (dlp) policy.. . ... Symantec Corporation

01/05/17 / #20170004203

Method and system for configuration management of hierarchically-organized unstructured data using associative templates

Methods, computer program products, and computer systems for configuration management are disclosed. Such methods, computer program products, and computer systems include identifying an associative template node and setting a configuration parameter to a parameter value, based on a template association. ... Symantec Corporation

01/05/17 / #20170004083

System, method and mechanism to efficiently coordinate cache sharing between cluster nodes operating on the same regions of a file or the file system blocks shared among multiple files

Various systems, methods and apparatuses for coordinating the sharing of cache data between cluster nodes operating on the same data objects. One embodiment involves a first node in a cluster receiving a request for a data object, querying a global lock manager to determine if a second node in the cluster is the lock owner of the data object, receiving an indication identifying the second node as the lock owner and indicating that the data object is available in the second node's local cache, requesting the data object from the second node, and then receiving the data object from the second node's local cache. ... Symantec Corporation

01/05/17 / #20170004047

Consolidated full backup of a restored virtual machine

Various systems, methods, and processes for optimizing the performance of a consolidated full backup of a restored virtual machine are disclosed. Changed data and metadata associated with the changed data is received from a hypervisor at a backup module. ... Symantec Corporation

01/05/17 / #20170003999

Data access accelerator

Various systems, methods, and processes for accelerating data access in application and testing environments are disclosed. A production dataset is received from a storage system, and cached in a consolidated cache. ... Symantec Corporation








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Symantec Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Symantec Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###