Symantec Patent Applications

SYSTEM AND METHOD FOR AUTOMATED CUSTOMER VERIFICATION

Granted: May 28, 2015
Application Number: 20150149768
Techniques are disclosed for identifying and authenticating prospective certificate authority customers of a secure socket layer (SSL) certificate prior to receiving an order from the customer. The CA generates a list of prospective customers of digital certificates (e.g., by scanning networked servers via the Internet for the presence of an installed digital certificate). The CA retrieves data for each customer on the list and determines, based on a set of approval criteria, which…

REDUCING LATENCY FOR CERTIFICATE VALIDITY MESSAGES USING PRIVATE CONTENT DELIVERY NETWORKS

Granted: April 9, 2015
Application Number: 20150100779
Techniques are disclosed for accelerating online certificate status protocol (OCSP) response distribution to relying parties using a content delivery network (CDN). A certificate authority generates updated OCSP responses for OCSP responses cached in the CDN that are about to expire. In addition, the certificate authority pre-generates cache keys in place of CDNs generating the keys. The certificate authority sends the OCSP responses and the cache keys in one transaction, and the CDN, in…

ACCELERATING OCSP RESPONSES VIA CONTENT DELIVERY NETWORK COLLABORATION

Granted: April 9, 2015
Application Number: 20150100778
Techniques are disclosed for accelerating online certificate status protocol (OCSP) response distribution to relying parties using a content delivery network (CDN). A certificate authority generates updated OCSP responses for OCSP responses cached in the CDN that are about to expire. In addition, the certificate authority pre-generates cache keys in place of CDNs generating the keys. The certificate authority sends the OCSP responses and the cache keys in one transaction, and the CDN, in…

METHOD AND SYSTEM FOR METADATA DRIVEN TESTING OF MALWARE SIGNATURES

Granted: April 2, 2015
Application Number: 20150096021
Techniques are disclosed for evaluating the effectiveness of a malware signature. A query tool translates a markup language malware signature definition into a database query. The query is then executed against a database of application features to identify software packages that the signature would identify as malware. The results of the query are compared with threat information stored in the database and classified as being true/false positives and true/false negatives.

DYNAMIC CERTIFICATE GENERATION ON A CERTIFICATE AUTHORITY CLOUD

Granted: April 2, 2015
Application Number: 20150095995
Techniques are disclosed for dynamically generating a digital certificate for a customer server. A customer server creates a certificate profile and receives an associated profile identifier from a certificate authority (CA). The customer server installs an agent application received from the CA. The agent application generates a public/private key pair and an identifier associated with the customer server. The agent application sends a signed request to the CA that includes the profile…

Techniques for Improving Performance of a Backup System

Granted: April 2, 2015
Application Number: 20150095596
Techniques for improving performance of a backup system are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for improving performance of a backup system. The method may comprise performing a backup of a client device, tracking, using at least one computer processor, references to data segments that are located outside of a unit of storage associated with the backup, calculating utilization of the unit of storage associated with the backup…

SYSTEMS AND METHODS FOR USING EVENT-CORRELATION GRAPHS TO DETECT ATTACKS ON COMPUTING SYSTEMS

Granted: March 12, 2015
Application Number: 20150074806
A computer-implemented method for using event-correlation graphs to detect attacks on computing systems may include (1) detecting a suspicious event involving a first actor within a computing system, (2) constructing an event-correlation graph that includes a first node that represents the first actor, a second node that represents a second actor, and an edge that interconnects the first node and the second node and represents a suspicious event involving the first actor and the second…

SYSTEMS AND METHODS FOR PROTECTING VIRTUAL MACHINE DATA

Granted: March 12, 2015
Application Number: 20150074362
A computer-implemented method for protecting virtual machine data may include (1) receiving a request to perform a granular backup operation on data stored by a guest system within a virtual machine, (2) identifying a storage container that comprises an agent that performs backup operations, (3) attaching the storage container to the virtual machine in response to the request, and (4) performing the granular backup operation by sending an instruction to the guest system within the…

SYSTEMS AND METHODS FOR IDENTIFYING PRIVATE KEYS THAT HAVE BEEN COMPROMISED

Granted: March 5, 2015
Application Number: 20150067831
A computer-implemented method for identifying private keys that have been compromised may include (1) identifying a private key that enables a signatory to digitally sign applications, (2) collecting information about the private key from at least one public source, (3) determining, based on the information collected from the public source, that the private key has been compromised and is accessible to unauthorized signatories, and (4) performing a security action in response to…

Techniques for Detecting a Security Vulnerability

Granted: January 1, 2015
Application Number: 20150007315
Techniques for detecting security vulnerabilities are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting security vulnerabilities including assigning a reputation to an application, distributing the reputation to a client, receiving monitored system behavior from the client related to the client executing the application, determining whether to change the reputation of the application based on the monitored system behavior, distributing the…

PERFORMING CLIENT AUTHENTICATION USING ONETIME VALUES RECOVERED FROM BARCODE GRAPHICS

Granted: November 27, 2014
Application Number: 20140351589
Techniques are disclosed for authenticating users accessing computing applications, e.g., applications hosted in a cloud environment accessed using a variety of computing systems. As disclosed, an authentication process is performed using a certificate and private key installed on a mobile device and a nonce generated on the server. To authenticate a user, a server generates a nonce, encrypts the nonce with a public key associated with the user, and encodes the encrypted nonce in a…

SUPPORTING PROXIMITY BASED SECURITY CODE TRANSFER FROM MOBILE/TABLET APPLICATION TO ACCESS DEVICE

Granted: November 20, 2014
Application Number: 20140344904
Techniques are disclosed for authenticating users to a computing application. A mobile or tablet device is used to generate a security code. Near field communication (NFC) hardware on the mobile device is used to transfer the security code from the mobile device to a computer. To transfer the one-time value, a user simply taps an NFC enabled mobile device on an NFC enabled computing device (e.g. a laptop running a web browser used to access a web service). In one embodiment, doing so…

SYSTEMS AND METHODS FOR INCREASING RESTORE SPEEDS OF BACKUPS STORED IN DEDUPLICATED STORAGE SYSTEMS

Granted: November 13, 2014
Application Number: 20140337591
A computer-implemented method for increasing restore speeds of backups stored in deduplicated storage systems may include (1) identifying a backup that includes data stored in at least one data container within a deduplicated storage system, (2) detecting a subsequent backup that includes additional data, (3) calculating an amount of duplication between the additional data included in the subsequent backup and the data stored in the data container, (4) determining that the amount of…

TECHNIQUES FOR DETECTING MALICIOUS ACTIVITY

Granted: November 6, 2014
Application Number: 20140331320
Techniques for detecting malicious activity are disclosed. In one particular embodiment, the techniques may be realized as a method for detecting malicious activity including receiving information indicating a first process being executed, the first process including a plurality of first process components, receiving information specific to at least one of the plurality of first process components, determining whether the first process exhibits malicious behavior; and identifying which…

RESILIENT AND RESTORABLE DYNAMIC DEVICE IDENTIFICATION

Granted: October 9, 2014
Application Number: 20140304786
A computer system receives a request to access a server. The request includes a first device tag set. When the first device tag set matches a previously assigned device tag set, the computer system allows access to the server without requesting full access credentials of a user. The computer system invalidates the first device tag set, and sends a second device tag set. When the first device tag set does not match the previously assigned device tag set, the computer system requests full…

METHOD AND APPARATUS FOR INTEGRATING SECURITY CONTEXT IN NETWORK ROUTING DECISIONS

Granted: October 9, 2014
Application Number: 20140304764
An apparatus identifies a request from a user device to access data on a storage server. The apparatus determines a sensitivity level of response data for a response to the request, security context of the response, and a routing action to perform for the response by applying a policy to the sensitivity level of the response data and the security context of the response. The apparatus executes the routing action for the response.

Method and apparatus to provide authentication and privacy with low complexity devices

Granted: October 9, 2014
Application Number: 20140301551
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of logic gates, executed quickly on simple devices, and provide military grade security.

SYSTEMS AND METHODS FOR DISTRIBUTING REPLICATION TASKS WITHIN COMPUTING CLUSTERS

Granted: September 18, 2014
Application Number: 20140279884
A computer-implemented method for distributing replication tasks within computing clusters may include (1) identifying a primary volume that is replicated to a secondary volume, (2) identifying a computing cluster with access to the primary volume that includes at least a first node and a second node, (3) receiving a request to write data to the primary volume, (4) logging, via the first node, the request to write the data to the primary volume to a replication log, and (5) using the…

ENFORCING POLICY-BASED COMPLIANCE OF VIRTUAL MACHINE IMAGE CONFIGURATIONS

Granted: September 18, 2014
Application Number: 20140282518
Techniques are disclosed for data risk management in accessing an Infrastructure as a Service (IaaS) cloud network. More specifically, embodiments of the invention evaluate virtual machine images launched in cloud-based environments for compliance with a policy. After intercepting a virtual machine image launch request, an intermediary policy management engine determines whether the request conforms to a policy defined by a policy manager, e.g., an enterprise's information security…

Providing Local Cache Coherency in a Shared Storage Environment

Granted: September 18, 2014
Application Number: 20140281273
Multiple nodes of a cluster have associated non-shared, local caches, used to cache shared storage content. Each local cache is accessible only to the node with which it is associated, whereas the cluster-level shared storage is accessible by any of the nodes. Attempts to access the shared storage by the nodes of the cluster are monitored. Information is tracked concerning the current statuses of the local caches of the nodes of the cluster. Current tracked local cache status information…