Symantec Patent Grants

Hash-based inventory identification

Granted: April 25, 2017
Patent Number: 9629928
A mechanism for providing inventory information from distributed computing resources in an enterprise network in a manner that minimizes network traffic being sent from those computing resources to a centralized inventory server is provided. Bandwidth minimization is performed by generating a value corresponding to identifying information for each item inventoried on a computing resource and transmitting only those values to the inventory server. The generated value is shorter than a…

Agentless enforcement of application management through virtualized block I/O redirection

Granted: April 18, 2017
Patent Number: 9626511
Application authorization management is provided without installation of an agent at an operating system level. A component runs outside of the operating system, in an AMT environment. AMT is utilized to examine the operating system for applications. Identified applications are checked against a whitelist or a blacklist. Responsive to determining that an identified application is not authorized, AMT is used to redirect input/output requests targeting the application to an alternative…

Protecting user identity at a cloud using a distributed user identity system

Granted: April 18, 2017
Patent Number: 9628471
A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the…

Systems and methods for detecting security events

Granted: April 18, 2017
Patent Number: 9628506
A computer-implemented method for detecting security events may include (1) identifying facets of candidate security events detected by a network security system, (2) assigning each of the facets of the candidate security events to one of multiple groups of facets to create permutations of the facets, (3) comparing, for each group of facets, the candidate security events according to a similarity algorithm that indicates similarity between the candidate security events, (4) generating,…

Systems and methods for detecting potentially malicious applications

Granted: April 11, 2017
Patent Number: 9619649
The disclosed computer-implemented method for detecting potentially malicious applications may include (1) detecting a request issued by an application running on a client device to download a file from a remote device, (2) determining that the request calls an application programming interface that enables the client device to download the file from the remote device, (3) determining that a parameter passed to the application programming interface in the request has been implicated in a…

Automated configuration collection and management using source control

Granted: April 11, 2017
Patent Number: 9621415
A computer-implemented method for managing enterprise application configurations is described. Configuration information of an enterprise application deployed across multiple servers at a single point in time is collected. An application footprint of the configuration information is generated. The application footprint is stored in a source control format.

Systems and methods for protecting against unauthorized network intrusions

Granted: April 11, 2017
Patent Number: 9621579
The disclosed computer-implemented method for protecting against unauthorized network intrusions may include (1) identifying a signal received by one or more antennas of a network from a transceiver of a device attempting to access the network, (2) detecting one or more signal strengths of the signal received by the antennas of the network in connection with the attempt to access the network, (3) determining, based at least in part on the signal strengths of the signal, that the attempt…

Applying functional classification to tune security policies and posture according to role and likely activity

Granted: April 11, 2017
Patent Number: 9621585
Computer security threats are increasing in customization and complexity of attacks, expanding the burden on security companies in addressing the wide-array of threats. Functional classification is used here to determine the likely role a client and its user play to personalize computer security according to client/user role. A security module analyzes the client to identify data or applications present on the client or activities performed using the client. Based on this analysis, the…

Systems and methods for applying data-loss-prevention policies

Granted: April 11, 2017
Patent Number: 9621590
A computer-implemented method for applying data-loss-prevention policies. The method may include (1) maintaining a list of applications whose access to sensitive data is controlled by data-loss-prevention (DLP) policies, (2) detecting an attempt by a process to access sensitive data, (3) determining that the process has a parent-child relationship with an application within the list of applications, and (4) applying, based at least in part on the determination that the process has the…

Systems and methods for evaluating reputations of wireless networks

Granted: April 11, 2017
Patent Number: 9622081
A computer-implemented method for evaluating reputations of wireless networks may include (1) identifying an endpoint computing system that is connected to a wireless network, (2) receiving, by a backend security server from the endpoint computing system, information that identifies the wireless network and that indicates in part a security state of the wireless network, (3) calculating, by the backend security server, a reputation of the wireless network based at least in part on the…

Systems and methods for identifying suspicious text-messaging applications on mobile devices

Granted: April 4, 2017
Patent Number: 9613211
A computer-implemented method for identifying suspicious text-messaging applications on mobile devices may include (1) identifying at least one outgoing text message on a mobile device, (2) analyzing at least one attribute of the outgoing text message identified on the mobile device, (3) determining that the outgoing text message is illegitimate based at least in part on analyzing the attribute of the outgoing text message, (4) identifying, in response to the determination, a suspicious…

Using telemetry to reduce malware definition package size

Granted: April 4, 2017
Patent Number: 9613213
Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware detected at the clients. The cloud server analyzes the telemetry data to identify malware that is currently spreading among the clients. Based on the analysis of the telemetry data, the cloud server segments malware definitions in a cloud definition database into a set of local malware definitions and a set of cloud malware…

Systems and methods for automatically synchronizing online communities

Granted: April 4, 2017
Patent Number: 9613382
A computer-implemented method for automatically synchronizing online communities may comprise identifying login information for a first user account associated with the first online community, accessing the first user account using the login information for the first user account, obtaining information from the first user account, and modifying, based on the information obtained from the first user account, a second user account associated with a second online community. Corresponding…

Sensitive data protection

Granted: April 4, 2017
Patent Number: 9614826
A computer-implemented method for protecting sensitive data is described. In one embodiment, the method includes identifying data stored at a first storage system. The identified data is classified as sensitive data. The method includes copying at least a portion of the identified sensitive data from the first storage system, transferring the copied portion of the identified sensitive data from the first storage system to a file stored at a second storage system, and storing a virtual…

Automated certificate management for a website associated with multiple certificates

Granted: April 4, 2017
Patent Number: 9614833
Techniques are disclosed to automate the discovery, installation, and renewal of multiple digital certificates deployed on a server application, such as a web server. For example, a management tool may discover and manage multiple digital certificates associated with a server application hosted at an internet protocol (IP) address and port on a server computing system. A certificate management tool examines server configuration data to identify a set of certificates associated with the…

Systems and methods for managing launch activities on a mobile device

Granted: April 4, 2017
Patent Number: 9615193
A computer-implemented method for managing launch activities on a mobile device may include maintaining a plurality of launch activities associated with an application. Each launch activity in the plurality of launch activities may be associated with a different launch icon. The method may further include identifying a mobile device environment within which the application is being used. The method may also include selecting, from the plurality of launch activities, a launch activity…

Systems and methods for virtualizing internet of things (IoT) devices

Granted: March 28, 2017
Patent Number: 9606817
A virtual element includes a communication component that controls, from a remote location, communication with an Internet of Things (IoT) device of a plurality of IoT devices. The virtual element also includes a capabilities augmenting component that facilitates access to resources that augment the capabilities of the IoT device of the plurality of IoT devices. The tasks of the IoT device are allocable to one or more different devices and are performed by the one or more different…

Resizing content in a current view of a web browser based on a minimum font size inputted by a user

Granted: March 28, 2017
Patent Number: 9606969
A minimum font size to display for a specific user is received, for example as entered through a user interface. The retrieval of webpages by a web browser on a computer system is monitored. For each specific view of a retrieved webpage to be displayed, the text in the specific view is resized based on the minimum font size for the user. Text in the smallest font in the view is resized to the minimum font size for the specific user. Larger text is resized so that the proportionality…

Method and apparatus for detecting malware on a computer system

Granted: March 28, 2017
Patent Number: 9607148
Method, apparatus, and computer readable medium for detecting malware on a target computer system is described. A threat profile is obtained at the target computer, the threat profile having manifestation information for known malware, the manifestation information including effects of the known malware on computer systems infected by the known malware. Using the threat profile, at least a portion of the manifestation information is detected on the target computer. A confidence level for…

Detect encrypted program based on CPU statistics

Granted: March 28, 2017
Patent Number: 9607152
Techniques are presented for detecting malware in an executable. The method includes receiving an executable to evaluate for malware, emulating an execution of the executable up to a first count of instructions, determining a number of cache misses that occur while emulating the executable up to the first count of instructions, comparing the number of cache misses to a threshold, and upon determining the number of cache misses exceeds the threshold, identifying the executable as…