Symantec Patent Applications

DIGITAL WHITEBOARD IMPLEMENTATION

Granted: October 6, 2011
Application Number: 20110246875
A computing system includes a touch screen display that can display a graphical user interface (GUI). The GUI includes a display region and a first plurality of GUI elements including a first GUI element associated with a tool. The tool is invoked when selection of the first GUI element is sensed by the touch screen display. The GUI also includes a second plurality of GUI elements including a second GUI element associated with a graphical object. The graphical object is displayed in the…

METHOD AND DEVICE FOR PREVENTING DOMAIN NAME SYSTEM SPOOFING

Granted: September 22, 2011
Application Number: 20110231931
A method for preventing Domain Name System (DNS) spoofing includes: performing uppercase/lowercase conversion for letters of a DNS question field in a DNS request packet according to a preset rule; sending the DNS request packet; receiving a DNS response packet; obtaining uppercase/lowercase distribution of the letters of the DNS question field in the DNS response packet; and forwarding the DNS response packet to a target DNS client if the uppercase/lowercase distribution of the letters…

SYSTEM AND METHOD TO DEFINE, VISUALIZE AND MANAGE A COMPOSITE SERVICE GROUP IN A HIGH-AVAILABILITY DISASTER RECOVERY ENVIRONMENT

Granted: September 15, 2011
Application Number: 20110225095
A method for defining and managing a composite service group for a cluster based computer system is disclosed. The method includes instantiating a plurality of application units on a cluster based computer system, wherein the application units implement a business service. The method further includes receiving a composite service group definition, wherein a composite service group enumerates application units, out of the plurality of application units, that implement the business…

METHOD AND SYSTEM TO SCAN DATA FROM A SYSTEM THAT SUPPORTS DEDUPLICATION

Granted: September 15, 2011
Application Number: 20110225129
An interface is disclosed that makes information obtained from a file deduplication process available to an application for the efficient operation thereof. A data deduplication repository is scanned to determine a plurality of file segments and respective checksum values associated with the segments. A data structure is generated that allows shared segments to be identified by indexing using a common checksum value. The segments also indicate the file to which they belong and may also…

METHOD AND SYSTEM FOR IDENTIFICATION OF DATA OWNER IN AN UNSTRUCTURED DATA ENVIRONMENT

Granted: September 15, 2011
Application Number: 20110225199
A system and method of identifying a data owner examining a plurality of criterion including access type, number of accesses at a given time and over the period of time selected, recentness of access, and permission levels of users. The method of file owner identification comprises collecting a plurality of samples including usage of a file by a plurality of users. A plurality of factors is calculated based on said plurality of users, wherein a respective factor is calculated for each of…

METHOD AND SYSTEM FOR PROVIDING DEDUPLICATION INFORMATION TO APPLICATIONS

Granted: September 15, 2011
Application Number: 20110225211
A method of maintaining and providing information relating to file deduplication. A first portion of a first file and a second portion of a second file that contain a first content are identified. A first header associated with the first portion is created. The first header identifies the first portion and the second portion containing the first content. The first header is appended to a storage location of the first content of the first portion to form a first data structure for the…

Systems and Methods for Garbage Collection in Deduplicated Data Systems

Granted: September 15, 2011
Application Number: 20110225214
A computer-implemented method for garbage collection in deduplicated data systems may include: 1) identifying a deduplicated data system, 2) identifying at least one segment object added to the deduplicated data system during a garbage-collection process of the deduplicated data system, 3) locking the segment object to prevent removal of the segment object by the garbage-collection process, and 4) unlocking the segment object after the garbage-collection process. The method may allow a…

STORAGE SYSTEMS AND METHODS

Granted: September 15, 2011
Application Number: 20110225266
Systems and methods for extent reference count updates are presented. In one embodiment; a reference count update method includes: receiving a plurality of data files associated with various modalities; performing an analysis on the data files including examining an impact of the plurality of data files on storage based upon a type of the modality; and forwarding resulting analysis information for presentation in a convenient user interface, including an indication of the impact of the…

Systems and Methods for Providing Network Access Control in Virtual Environments

Granted: September 15, 2011
Application Number: 20110225624
A computer-implemented method for providing network access control in virtual environments. The method may include: 1) injecting a transient security agent into a virtual machine that is running on a host machine; 2) receiving, from the transient security agent, an indication of whether the virtual machine complies with one or more network access control policies; and 3) controlling network access of the virtual machine based on the indication of whether the virtual machine complies with…

COPY ON WRITE STORAGE CONSERVATION SYSTEMS AND METHODS

Granted: September 8, 2011
Application Number: 20110219201
Systems and methods for copy on write storage conservation are presented. In one embodiment a copy on write storage conservation method includes creating and mounting a snapshot; mounting a snapshot; monitoring interest in the snapshot; initiating a copy on write discard process before a backup or replication is complete; and deleting the snapshot when the backup or replication is complete. In one embodiment the method also includes marking a file as do not copy on write. In one…

FAST CLUSTER FAILURE DETECTION

Granted: September 8, 2011
Application Number: 20110219263
A method and system for fast failure detection in a distributed computer system. The method includes executing a distributed computer system having a plurality of clusters comprising at least a first cluster, a second cluster and the third cluster, and initializing failure detection by creating a connected cluster list in each of the plurality of clusters, wherein for each one of the plurality of clusters, a respective connected cluster list describes others of the plurality of clusters…

Multiple File System and/or Multi-Host Single Instance Store Techniques

Granted: September 8, 2011
Application Number: 20110219048
A multiple file system and/or multi-host single instance store technique includes receiving one or more commands and one or more parameters to create a single instance store, a plurality of volumes and one or more file systems. Information creating the plurality of volumes, including creating a plurality of thin volumes on top of a single instance store solution, are stored in a volume manager configuration file. Information creating the one or more file systems, wherein each file system…

METHOD, APPARATUS, PROXY SERVER AND TERMINAL FOR FILTERING OUT SPAM CALL

Granted: September 1, 2011
Application Number: 20110211685
A method for filtering out a spam call includes: transmitting test information to a calling terminal when receiving a call request from the calling terminal; determining whether feedback information corresponding to the test information and generated by the calling terminal in a one-key reply manner is correct; if the feedback information is incorrect, determining the call request as a spam call request, and filtering out the call request. An apparatus, a proxy server and a terminal are…

Systems and Methods for Managing Application Availability

Granted: September 1, 2011
Application Number: 20110213753
A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster…

STORAGE METHOD AND SYSTEM, TERMINAL SERVICE BOARD, CONTROL BOARD AND STORAGE CHANNEL BOARD

Granted: August 25, 2011
Application Number: 20110208923
A storage method and system, a terminal service board, a control board, and a storage channel board are provided. The system includes a terminal service board, a control board, and a storage channel board, where the terminal service board is configured to be connected with a terminal and the control board, process a request from the terminal, and send a processing result to the control board; the control board is configured to encapsulate data required to be stored onto a storage…

Systems and Methods for Enabling Replication Targets to Reclaim Unused Storage Space on Thin-Provisioned Storage Systems

Granted: August 25, 2011
Application Number: 20110208931
A computer-implemented method for enabling replication targets to reclaim unused storage space on thin-provisioned storage systems may include: 1) replicating data from a replication source to a replication target, 2) identifying unused storage space within the replicated data, 3) generating a reclamation request for reclaiming the unused storage space from a thin-provisioned storage system that provides thin-provisioned storage for the replication target, and then 4) issuing the…

STORAGE SYSTEMS AND METHODS

Granted: August 18, 2011
Application Number: 20110202734
Systems and methods for backup test restore are presented. In one embodiment a backup restore test method includes performing a backup process; performing a test restore virtual environment creation process, the test restore virtual environment including a plurality of virtual machines; and performing a test of the backup on the test restore virtual environment. The backup process can include backing up information associated with an application; identifying prerequisites associated with…

DATA CORRUPTION PREVENTION DURING APPLICATION RESTART AND RECOVERY

Granted: August 18, 2011
Application Number: 20110202795
Embodiments of the present invention are directed to a method and system for draining or aborting IO requests of a failed system prior to restarting or recovering an application in virtual environments. The method includes detecting, within an electronic system, an application error condition of an application executing on a virtual machine and determining an application restart target. The method further includes sending an input/output (IO) request drain command to a virtual IO server…

NETWORK AUTHENTICATION METHOD, METHOD FOR CLIENT TO REQUEST AUTHENTICATION, CLIENT, AND DEVICE

Granted: August 18, 2011
Application Number: 20110202972
A network authentication method, a method for a client to request authentication, a client, and a device are provided. The method includes: receiving synchronize (SYN) data sent by a client, where the SYN data includes a sequence number SEQ1 and a network parameter; sending synchronize acknowledge (SYN_ACK) data to the client in response to the SYN data, where the SYN_ACK data includes an acknowledgment number ACK2, and the value of ACK2 is a value obtained by carrying out a function…

MOUNTING APPLICATIONS ON A PARTIALLY REPLICATED SNAPSHOT VOLUME

Granted: August 4, 2011
Application Number: 20110191295
A partial replication step shot method. The method includes receiving a first snapshot at a first time from a replication source and receiving a set of data objects from the replication source that have been modified during a time period between the first time and a subsequent second time. A second snapshot is generated at the second time on the replication source by using the set of data objects. An application is mounted onto the second snapshot prior to the set of data objects being…