Symantec Patent Applications

Systems and Methods for Creating Customized Confidence Bands for Use in Malware Detection

Granted: January 5, 2012
Application Number: 20120005751
A computer-implemented method for creating customized confidence bands for use in malware detection may include 1) identifying a portal for receiving executable content, 2) identifying metadata relating to the portal, 3) analyzing the metadata to determine what risk executable content received via the portal poses, and then 4) creating, based on the analysis, a confidence band to apply during at least one disposition of executable content received via the portal. Various other methods,…

Data operating method, system, client, and data server

Granted: December 29, 2011
Application Number: 20110320532
A data operating method, system, client, and data server are provided. The method includes: sending a write request of a file to a data server, where the write request includes identifiers of sub-data blocks constituting the file; receiving mappings between the identifiers of the sub-data blocks and storage servers returned by the data server according to the write request; and writing the sub-data blocks to the corresponding storage servers according to the mappings. With the present…

METHOD AND APPARATUS FOR CONTROLLING STATE OF STORAGE DEVICE AND STORAGE DEVICE

Granted: December 29, 2011
Application Number: 20110320712
The embodiments of the present invention provide a method and an apparatus for controlling a state of a storage device, and a storage device, and relate to the field of electronic technologies. State control information of logic disks in the storage device is obtained; it is judged whether the state control information of all the logic disks in the storage device includes sleep instructions; and the storage device is controlled to switch into a sleep state when the state control…

Systems and Methods for Sharing the Results of Analyses Among Virtual Machines

Granted: December 29, 2011
Application Number: 20110321040
A computer-implemented method may include performing a first analysis on at least one file of a master virtual machine and inserting, into the master virtual machine, information that indicates at least one result of the first analysis. The computer-implemented method may also include maintaining at least one additional virtual machine that is based on the master virtual machine. The computer-implemented method may further include directing the additional virtual machine to reference the…

AUTOMATICALLY RECLAIMING MEMORY SPACE

Granted: December 15, 2011
Application Number: 20110307529
A method, in one embodiment, can include determining whether an administrative task for a file system is to be performed within a thin storage memory array. Furthermore, if the administrative task for the file system is to be performed, a determination is made as to whether memory space is freed up while performing the administrative task. If memory space is freed up while performing the administrative task, a determination is made as to whether the freed up memory space satisfies a…

DETERMINING WHETHER TO RELOCATE DATA TO A DIFFERENT TIER IN A MULTI-TIER STORAGE SYSTEM

Granted: November 17, 2011
Application Number: 20110282830
In general, a block of data in a data file is stored in a multi-tier storage system. The block of data includes multiple rows and multiple entry values per row, including values for a particular entry. The values of the particular entry in the data block can be used to determine whether to move the data block to a different tier of a multi-tier storage system. The block of data can then either be relocated in a different tier or kept in the current tier.

CONTINUOUS REPLICATION IN A DISTRIBUTED COMPUTER SYSTEM ENVIRONMENT

Granted: November 17, 2011
Application Number: 20110282834
A method for implementing continuous data replication in a distributed computer system. The method includes receiving a forwarded data object write I/O from a data server. The method further includes examining attribute information of the data object to determine a consistency group for the data object. A replication policy is examined in view of the consistency group of the data object to determine a destination redundancy server. The data object write I/O is forwarded to the…

SYSTEM AND METHOD FOR EFFICIENT RESOURCE MANAGEMENT

Granted: November 17, 2011
Application Number: 20110282917
Embodiments of the present invention are directed to a method and system for managing resources. The method includes receiving a request, within an electronic system, which corresponds to an object of a file system and accessing a local data structure. The data structure comprises information corresponding to a plurality of inode numbers. The method further includes performing the request and updating the local data structure based on the request. The updating of the local data structure…

DISMOUNTING A STORAGE VOLUME

Granted: November 3, 2011
Application Number: 20110271069
In response to an instruction to dismount a storage volume, for example, an object in the storage volume is identified and a handle that references the object is closed. Once an exclusive lock on the storage volume is acquired, the storage volume can be dismounted. The storage volume can then remounted.

BEHAVIORAL SIGNATURE GENERATION USING CLUSTERING

Granted: November 3, 2011
Application Number: 20110271341
A behavioral signature for detecting malware is generated. A computer is used to collect behavior traces of malware in a malware dataset. The behavior traces describe sequential behaviors performed by the malware. The behavior traces are normalized to produce malware behavior sequences. Similar malware behavior sequences are clustered together. The malware behavior sequences in a cluster describe behaviors of a malware family. The cluster is analyzed to identify a behavior subsequence…

TECHNIQUES FOR DIRECTORY DATA RESOLUTION

Granted: October 27, 2011
Application Number: 20110264781
Techniques for directory data resolution are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for directory data resolution comprising receiving data identifying one or more groups of interest of a directory server, traversing, using a processor, one or more directory entries contained in hierarchical directory data, the traversal starting at a directory entry corresponding to a current group of interest, reading a first directory entry to…

METHOD, SYSTEM AND GATEWAY FOR PROTECTION AGAINST NETWORK ATTACKS

Granted: October 27, 2011
Application Number: 20110265181
A method, a system and a gateway for protection against network attacks are provided. The method includes: receiving source request information and destination request information that are sent by a client, where the destination request information is notified by a Domain Name System (DNS) to the client sending the source request information; checking the source request information and the destination request information; and discarding the source request information and the destination…

Method and device for preventing network attacks

Granted: October 27, 2011
Application Number: 20110264908
A method for preventing network attacks is provided, which includes: obtaining a data packet, where a source address of the data packet is a cryptographically generated address (CGA); determining that the obtained data packet includes a CGA parameter and signature information; authenticating the CGA parameter; authenticating the signature information according to the authenticated CGA parameter; and sending the data packet to a destination address when the signature information is…

TECHNIQUES FOR DIRECTORY SERVER INTEGRATION

Granted: October 27, 2011
Application Number: 20110264865
Techniques for directory server integration are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for directory server integration comprising setting one or more parameters determining a range of permissible expiration times for a plurality of cached directory entries, creating, in electronic storage, a cached directory entry from a directory server, assigning a creation time to the cached directory entry, and assigning at least one random…

STORAGE METHOD, STORAGE SYSTEM, AND CONTROLLER

Granted: October 27, 2011
Application Number: 20110264833
A storage method, a storage system, and a controller are disclosed. The method is applicable to a system that includes at least one controller, at least two Peripheral Component Interconnection Express (PCIE) Input/Output (IO) modules, and at least two storage devices. The at least two storage devices are connected through a PCIE switch chip of the at least one controller, and the at least two PCIE IO modules are connected through a PCIE switch chip of the at least one controller. The…

Method and Apparatus for Accessing Network File System

Granted: October 20, 2011
Application Number: 20110258255
A method and an apparatus for accessing a network file system (NFS) are disclosed. The method includes: receiving a first request message, which is sent by a user equipment (UE) to the NFS according to an available first file type; converting, according to a preset mapping relation, the first request message into a second request message capable of driving a second file type in the NFS, and sending the second request message to the NFS; receiving a first response message, which is based…

VIRTUAL STORAGE METHOD AND DEVICE

Granted: October 20, 2011
Application Number: 20110258389
A virtual storage method and a device are disclosed. The virtual storage method includes: obtaining a volume management mode of a Logical Unit Number (LUN) from a storage array and recording the volume management mode into stitch data; and constructing a virtual LUN according to the LUN and the stitch data, and mapping the virtual LUN to a host to enable read/write access; and modifying a destination address of an Input/Output (I/O) data packet delivered by the host according to the…

INSERT OPTIMIZATION FOR B+ TREE DATA STRUCTURE SCALABILITY

Granted: October 13, 2011
Application Number: 20110252067
A method, in one embodiment, can include receiving a key and associated data via a computing device. Furthermore, the method can include searching a B+ tree data structure using the key to find a leaf node. The B+ tree data structure is stored by a persistent storage coupled to the computing device. The B+ tree data structure can include a first plurality of nodes that each contains a key-value entry that is not maintained in a sorted order based on its key. In addition, the key and…

UPDATING A LIST OF QUORUM DISKS

Granted: October 13, 2011
Application Number: 20110252270
A node in a server cluster is designated as a quorum disk. The node stores a list of other nodes in the server cluster also designated as quorum disks. The node can replace the first list with a second and more recent list of quorum disks only if the second list is updated on at least a simple majority of quorum disks on the first list.

METHOD, APPARATUS AND SYSTEM FOR IMPROVING RUNNING STABILITY OF SAS DOMAIN

Granted: October 6, 2011
Application Number: 20110246685
A method, an apparatus and a system for improving running stability of a Serial Attached Small Computer System Interface (SAS) domain are disclosed. The method includes: monitoring and recording the number of state changes of each SAS physical channel in the SAS domain within a preset time; and isolating an SAS physical channel that fulfills a preset isolation condition according to the number of state changes. The method improves the running stability of the SAS domain.