Symantec Patent Applications

Methods and Media for a Protocol Abstraction Layer for Information Handling Systems

Granted: December 3, 2009
Application Number: 20090300199
A method for communicating with remote devices wherein the method includes sending a request through an application programming interface (API), formatting the request and routing the request to a first connection associated with a first protocol. The method further includes mapping the request into a first command, wherein the first command conforms to the first protocol and sending the first command to a remote device.

SYSTEMS AND METHODS FOR TRACKING CHANGES TO A VOLUME

Granted: December 3, 2009
Application Number: 20090300080
A computer-implemented method for tracking changes to a volume is disclosed. The method may comprise: 1) identifying a first snapshot of a volume, 2) identifying a window within which the first snapshot was created, the window beginning with a first point known to have occurred before the first snapshot and ending with a second point known to have occurred after the first snapshot, 3) identifying at least one change to the volume that occurred within the window, and 4) associating the at…

Centralized Scanner Database With Qptimal Definition Distribution Using Network Queries

Granted: November 26, 2009
Application Number: 20090293125
A system and method detects malware on client devices based on partially distributed malware definitions from a central server. A server stores malware definitions for known malware. The server generates one or more filters based on the malware definitions and distributes the filter(s) to client devices. The server also distributes full definitions to the clients for a subset of the most commonly detected malware. The client device scans files for malware by first applying the filter to…

SECURE APPLICATION STREAMING

Granted: November 19, 2009
Application Number: 20090288166
A server includes a scanning module for determining whether an application is free of malware, a module for packaging the application into blocks for delivery via application streaming, a module for providing the blocks to a client on request, and a module for adding to each block an indication of whether the associated application has already been determined to be free of malware. A client includes a module for requesting blocks of a streamed application from the server. When the client…

Hygiene-Based Computer Security

Granted: November 12, 2009
Application Number: 20090282476
A reputation server is coupled to multiple clients via a network. Each client has a security module that detect malware at the client. The security module computes a hygiene score based on detected malware and provides it to the reputation server. The security module monitors client encounters with entities such as files, programs, and websites. When a client encounters an entity, the security module obtains a reputation score for the entity from the reputation server. The security…

TECHNIQUES FOR OPTIMIZING CONFIGURATION PARTITIONING

Granted: October 1, 2009
Application Number: 20090249020
Techniques for optimizing configuration partitioning are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for configuration partitioning comprising a module for providing one or more policy managers, a module for providing one or more applications, the one or more applications assigned to one or more application groups, a module for associating related application groups with one or more blocks, and a module for assigning each of the one or…

SYSTEMS AND METHODS FOR DELEGATING ACCESS TO ONLINE ACCOUNTS

Granted: July 2, 2009
Application Number: 20090172793
Computer-implemented methods for delegating access to online accounts and for facilitating delegates' access to these online accounts are disclosed. In one embodiment, a method for delegating access to an online account comprises receiving a request to delegate access to a first online account to a first delegate, identifying the first online account, identifying a contact record for the first delegate, and delegating access to the first online account to the first delegate by…

Method and apparatus for processing a multi-step authentication sequence

Granted: June 18, 2009
Application Number: 20090158399
A method of automating an authentication sequence for accessing a computer resource comprising processing form information associated with the authentication sequence, wherein the authentication sequence comprises a plurality of queries associated with a plurality of web pages; and communicating a response to a portion of the authentication sequence using form information that corresponds to a query upon recognition of indicia of the portion of the plurality of web pages where the…

TECHNIQUES FOR FILE SYSTEM RECOVERY

Granted: April 2, 2009
Application Number: 20090089338
Techniques for file system recovery are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for file system recovery comprising starting a recovery process for a failed node, utilizing the recovery process to read one or more committed but un-applied transactions from storage associated with the failed node, and recreating the one or more committed but un-applied transactions in memory associated with the recovery process.

TECHNIQUES FOR VIRTUAL ARCHIVING

Granted: April 2, 2009
Application Number: 20090089523
Techniques for virtual archiving are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing virtual archiving comprising applying archiving rules to a backup catalog, generating a virtual archive catalog based at least in part on a result of applying archiving rules to the backup catalog, determining a backup image associated with the virtual archive catalog becoming expired and converting the backup image into an archive image.

SYSTEMS AND METHODS FOR PROVIDING A MODIFICATION HISTORY FOR A LOCATION WITHIN A DATA STORE

Granted: January 15, 2009
Application Number: 20090019459
A storage management device can receive a request for a modification history for a location within a data store, determine one or more times at which at least a portion of data stored at the location was modified, and transmit the one or more determined times.

Techniques For Performing Intelligent Content Indexing

Granted: January 1, 2009
Application Number: 20090006535
Techniques for intelligent content indexing are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing intelligent content indexing comprising indexing by one or more processes associated with a client an initial full set of data of the client to create an index of the client data, detecting a change in the client data, and modifying the index to reflect the change in the client data.

Method and apparatus for creating predictive filters for messages

Granted: January 1, 2009
Application Number: 20090006569
A method and apparatus for creating predictive filters for messages. In one embodiment, filter information is coupled to a reputation database. One or more filters for a message feature are generated if a reputation of the message feature is associated with one or more portions of the filter information. In one embodiment, SPAM filters are generated. In yet another embodiment, one or more message features are tested using heuristics. One or more message features are blacklisted based on…

TECHNIQUES FOR PARSING ELECTRONIC FILES

Granted: January 1, 2009
Application Number: 20090007083
Techniques for parsing electronic files are disclosed. In one particular exemplary embodiment, the techniques may be realized as an apparatus for parsing electronic files comprising an input module operable to read one or more electronic files, a syntax element store, associated with one or more syntax elements, a mutation module operable to mutate one or more of the one or more syntax elements and parse the one or more electronic files read from the input module, and an output module…

Method and apparatus for generating configuration rules for computing entities within a computing environment using association rule mining

Granted: December 4, 2008
Application Number: 20080301081
A method and apparatus for generating computer configuration rules comprising receiving configuration data regarding a plurality of computers, analyzing the configuration data to determine associations within the configuration data, and generating configuration rules from a result of the analysis.

Systems and methods for patching computer programs

Granted: November 27, 2008
Application Number: 20080295086
The disclosure is directed to systems and methods for patching computer programs. In one example, a patch is virtually installed to a computing device having a base file system and configuration, a computer program, and a patch layering subsystem. The virtual installation may include storing content of the patch to a patch layer, and generating and storing mapping data defining at least one relationship between the content in the patch layer and content in the base file system and…

Method and apparatus for managing digital identities through a single interface

Granted: October 16, 2008
Application Number: 20080256594
Method and apparatus for managing digital identities through a single interface is described. One aspect of the invention relates to managing digital identities related to a user. An identity policy of an entity is obtained. At least one relevant digital identity is selected from the digital identities. Each relevant digital identity includes information required by the identity policy. A selected digital identity is obtained from the relevant digital identity or identities. A…

TECHNIQUES FOR HOST TO HOST TRANSFER OF SEQUENTIAL MEDIA AND USE OF PERSISTENT RESERVATION TO PROTECT MEDIA DURING HOST TO HOST TRANSFER

Granted: October 2, 2008
Application Number: 20080244032
Techniques for host to host transfer of media and the use of persistent reservation to protect media during host to host transfer is disclosed. Exemplary embodiments may be realized as methods and systems for transferring a sequential media loaded in a drive from a first host to a second host without physically unloading the media. The first host may have a persistent reservation or non-persistent reservation of the drive. Likewise, the second host may have a persistent reservation or…

Method and apparatus for allocating resources among backup tasks in a data backup system

Granted: October 2, 2008
Application Number: 20080244601
Method and apparatus for allocating resources among backup tasks in a data backup system is described. One aspect of the invention relates to managing backup tasks in a computer network. An estimated resource utilization is established for each of the backup tasks based on a set of backup statistics. A resource reservation is allocated for each of the backup tasks based on the estimated resource utilization thereof. The resource reservation of each of the backup tasks is dynamically…

Method and apparatus for accepting a digital identity of a user based on transitive trust among parties

Granted: October 2, 2008
Application Number: 20080244722
Method and apparatus for accepting a digital identity of a user based on transitive trust among parties are described. One aspect of the invention relates to managing a digital identity of a user. The digital identity is provided to a first party, where the digital identity includes a self-asserted claim. An acceptance token is obtained from the first party. The acceptance token purports authenticity of the self-asserted claim according to the first party. The digital identity and the…