Symantec Patent Grants

Display screen with graphical user interface

Granted: February 14, 2017
Patent Number: D778927

Display screen with graphical user interface

Granted: February 14, 2017
Patent Number: D778928

Systems and methods for remotely configuring applications

Granted: February 14, 2017
Patent Number: 9569205
A computer-implemented method for remotely configuring applications may include (1) identifying a centrally administered application that includes a configuration specification that defines at least one setting available for the centrally administered application and that is prepared to provide the configuration specification, (2) identifying, by extracting the configuration specification for the centrally administered application, a settings field of the configuration specification, (3)…

Method and apparatus for providing access to data in unsupported file systems and storage containers

Granted: February 14, 2017
Patent Number: 9569443
A method, apparatus and system for providing access to data comprising launching an image of a virtual machine, determining a file system or a storage container being unsupported by an operating system coupled to the virtual machine, mapping the file system or the storage container onto the operating system and accessing data within the file system or the storage container through the operating system.

Systems and methods for enabling biometric authentication options

Granted: February 14, 2017
Patent Number: 9569605
A computer-implemented method for enabling biometric authentication options may include (1) identifying a device that includes a biometric authentication option that provides access to a protected feature of the device and that is based on a biometric trait and an initial authentication option that provides access to the protected feature and that is not based on the biometric trait, (2) detecting an authentication action that is performed by a user on the device that provides access to…

Systems and methods for preventing false positive malware identification

Granted: February 14, 2017
Patent Number: 9569617
A computer-implemented method for preventing false positive malware identification may include (1) identifying a set of variants of a trusted software program, (2) characterizing, for each variant in the set of variants of the trusted software program, at least one common property of the variants, (3) clustering the set of variants of the trusted software program based on the common property of the variants, and (4) creating a signature capable of recognizing variants of the trusted…

Systems and methods for assessing internet addresses

Granted: February 14, 2017
Patent Number: 9569619
A computer-implemented method for assessing Internet addresses may include (1) identifying an Internet Protocol address, (2) identifying a plurality of files downloaded from the Internet Protocol address, (3) generating an aggregation of security assessments that relates to the Internet Protocol address and that may be based at least in part on a security assessment of each of the plurality of files, (4) determining a trustworthiness of the Internet Protocol address based at least in…

Systems and methods for estimating ages of network devices

Granted: February 14, 2017
Patent Number: 9571372
A computer-implemented method for estimating ages of network devices may include (1) identifying at least one networked device that may be attached to a network, (2) identifying a media access control address of the networked device, the media access control address comprising an organizational unique identifier, (3) querying an organizational-unique-identifier database with the organizational unique identifier and receiving, in response, device-age information relating to an estimated…

Role-based access control using dynamically shared cloud accounts

Granted: February 14, 2017
Patent Number: 9571479
A server computer system within a network of an organization receives a request from a user to access a cloud account. The request includes a user identifier. The server computer system authenticates the user for access to the cloud account based on the user identifier, identifies one or more predetermined roles associated with the cloud account for the user, and identifies one or more pseudo accounts associated with the cloud account. The server computer system further maps the user to…

Systems and methods for blocking push authentication spam

Granted: February 14, 2017
Patent Number: 9571497
The disclosed computer-implemented method for blocking push authentication spam may include (1) detecting an attempt by an unauthenticated source to gain access to a web resource protected by an MFA service, (2) issuing, to a mobile device of an authenticated user of the MFA service, a push authentication request to query the authenticated user about whether to allow the unauthenticated source's attempt, (3) determining, based at least in part on the push authentication request issued to…

Systems and methods for protecting purpose-built appliances on local networks

Granted: February 14, 2017
Patent Number: 9571498
The disclosed computer-implemented method for protecting purpose-built appliances on local networks may include (1) identifying a purpose-built appliance that is installed at a physical site to enhance the physical site with a pre-programmed functionality and that is connected to a local network that operates at the physical site, (2) intercepting, by a router of the local network, a request from a requesting device to access the pre-programmed functionality of the purpose-built…

Systems and methods for identifying variants of samples based on similarity analysis

Granted: February 14, 2017
Patent Number: 9571509
A computer-implemented method for identifying variants of samples based on similarity analysis may include (1) collecting, from security agents on endpoint computing systems, metadata attributes that describe samples identified by the security agents over an initial period of time, (2) collecting metadata attributes that describe a current sample identified after the initial period of time, (3) comparing at least two of the metadata attributes that describe the current sample with…

Systems and methods for identifying security threat sources responsible for security events

Granted: February 14, 2017
Patent Number: 9571510
The disclosed computer-implemented method for identifying security threat sources responsible for security events may include (1) identifying security-event data collected from a plurality of security events detected over a network, (2) partitioning the security-event data into a set of single-dimensional security clusters, each grouped by a common feature, (3) determining that a subset of the single-dimensional security clusters exceed a threshold level of similarity relative to one…

Systems and methods for detecting calls from illegitimate calling parties

Granted: February 14, 2017
Patent Number: 9571640
A computer-implemented method for detecting calls from illegitimate calling parties may include (1) collecting information about a plurality of calls received at a plurality of telephonic devices, (2) analyzing the information about the plurality of calls to identify at least one call pattern of illegitimate calling parties, (3) detecting, at a telephonic device, an incoming call, (4) determining whether one or more calls from the calling party of the incoming call fit the call pattern…

Systems and methods for securing wireless networks

Granted: February 14, 2017
Patent Number: 9572034
The disclosed computer-implemented method for securing wireless networks may include (1) receiving, at a physical access point, a request to improve the security of a wireless network that includes a client device and is serviced by an active virtual access point of the physical access point, (2) configuring a substitute virtual access point to service the wireless network by (a) configuring the substitute virtual access point to identify the wireless network using a substitute SSID…

Systems and methods for locating unrecognized computing devices

Granted: February 14, 2017
Patent Number: 9572125
The disclosed computer-implemented method for locating unrecognized computing devices may include (1) identifying a plurality of cooperating computing devices on a wireless network that are each configured with a device location application, (2) determining a physical location for each cooperating computing device within the plurality of cooperating computing devices, (3) receiving, from the device location application on the plurality of cooperating computing devices, data about packets…

Systems and methods for automatically configuring virtual private networks

Granted: February 7, 2017
Patent Number: 9565158
A computer-implemented method for automatically configuring virtual private networks may include 1) broadcasting by a client on a network to discover a virtual private network server configured to manage virtual private networks, 2) discovering, by the client in response to the broadcast, the virtual private network server, 3) establishing a secure connection between the client and the virtual private network server in response to the discovery, and 4) receiving, by the client from the…

Exchange of digital certificates in a client-proxy-server network configuration

Granted: February 7, 2017
Patent Number: 9565180
Various techniques are described to authenticate the identity of a proxy in a client-proxy-server configuration. The configuration may have a client-side and a server-side SSL session. In the server-side session, if the proxy has access to the private keys of the client, the proxy may select a client certificate from a collection of client certificates and send the selected certificate to the server to satisfy a client authentication request of the server. If the proxy does not have…

Router based securing of internet of things devices on local area networks

Granted: February 7, 2017
Patent Number: 9565192
IoT devices are secured on multiple local area networks. Each local network contains a router which monitors activities of IoT devices, and transmits corresponding information to a backend server. The backend amalgamates this information, calculates dynamic reputation scores, and determines expected authorized activities for specific IoT devices. Based thereon, the backend creates a constraint profile for each IoT device, and transits the constraint profiles to the routers for…

Detecting electronic messaging threats by using metric trees and similarity hashes

Granted: February 7, 2017
Patent Number: 9565209
Each node of a metric tree comprises a similarity hash of a member of a dataset of known message threats, calculated using a given similarity hashing algorithm. The nodes are organized into the tree, positioned such that the differences between the similarity hashes are represented as distances between the nodes. Messages are received and tested to determine whether they are malicious. When a message is received, a similarity hash of the message is calculated using the same similarity…