Symantec Patent Applications

MULTI-DISK FAULT-TOLERANT SYSTEM, METHOD FOR GENERATING A CHECK BLOCK, AND METHOD FOR RECOVERING A DATA BLOCK

Granted: October 11, 2012
Application Number: 20120260125
A multi-disk fault-tolerant system, a method for generating a check block, and a method for recovering a data block are provided. The multi-disk fault-tolerant system includes a disk array and a calculation module connected through a system bus, the disk array is formed by p disks, and a fault-tolerant disk amount of the disk array is q; data in the disk array is arranged according to a form of a matrix M of (m+q)×p, where m is a prime number smaller than or equal to p?q; in the matrix…

SELECTING AN ALTERNATIVE PATH FOR AN INPUT/OUTPUT REQUEST

Granted: October 11, 2012
Application Number: 20120260121
A first path for forwarding an I/O request from a host device to a disk in a disk array is identified. The first path includes two endpoints (a first initiator endpoint on the host device and a first target endpoint on the disk array) separated by a storage area network. In response to an indication that the first path is non-functional, a second path to the disk for the I/O request is identified as an alternative to the first path. The second path includes a second initiator endpoint…

GLOBAL INDEXING WITHIN AN ENTERPRISE OBJECT STORE FILE SYSTEM

Granted: October 4, 2012
Application Number: 20120254111
A file system is disclosed that includes an application wide name space instantiated in a global index (Gindex) that is used for accessing objects related to an application. Using the Gindex, a method for cache coherency includes establishing one or more appliances, each defining a storage cluster; establishing one or more tenants spanning across appliances, wherein an application stores objects in file systems associated with the appliances and tenants; establishing a Gindex including…

APPLICATION WIDE NAME SPACE FOR ENTERPRISE OBJECT STORE FILE SYSTEM

Granted: October 4, 2012
Application Number: 20120254268
A file system is disclosed that includes an application wide name space used for accessing objects related to an application. The file system includes one or more appliances. Each of the appliances logically define a storage cluster, for instance, a cluster file system. The file system also includes a tenant that logically spans across the one or more appliances. The file system also includes one or more physical file systems arranged within each of the one or more appliances. Further,…

MANAGING PERFORMANCE WITHIN AN ENTERPRISE OBJECT STORE FILE SYSTEM

Granted: October 4, 2012
Application Number: 20120254269
A file system is disclosed that includes an application wide name space instantiated in a global index (Gindex) that is used for accessing objects related to an application. Summary workload statistics are monitored and calculated via a calibrated hierarchical service level agreement (SLA) in a method of operation that includes: establishing a tenant wide name space used for accessing objects of an application stored in physical file systems across one or more appliances, each defining a…

METHOD, DEVICE, AND SYSTEM FOR NETWORK ATTACK PROTECTION

Granted: October 4, 2012
Application Number: 20120254977
The present invention discloses a method for network attack protection, a device, and a system thereof. The method includes: receiving information about attack source, in which the information about the attack source carries address information about an attacker; obtaining address information about a gateway corresponding to the attacker according to the address information about the attacker and a preset mapping relationship between the attacker and the gateway corresponding to the…

SYSTEMS AND METHODS FOR DISPLAYING TRUSTWORTHINESS CLASSIFICATIONS FOR FILES AS VISUALLY OVERLAID ICONS

Granted: September 27, 2012
Application Number: 20120246598
A computer-implemented method for displaying trustworthiness classifications for files as visually overlaid icons may include (1) identifying a file, (2) identifying a file icon that graphically represents the file within a file manager interface on a computing device, (3) obtaining a trustworthiness classification assigned to the file that identifies the trustworthiness of the file, and then (4) visually overlaying the file icon with a trustworthiness icon that graphically represents…

METHOD AND APPARATUS FOR DETERMINING SOFTWARE TRUSTWORTHINESS

Granted: September 27, 2012
Application Number: 20120246721
Aspects of the invention relate to a method, apparatus, and computer readable medium for determining software trustworthiness. In some examples, a software package identified as including at least one file of unknown trustworthiness is installed on a clean machine. A report package including a catalog of files that have been installed or modified on the clean machine by the software package is generated. Identification attributes for each of the files in the catalog is determined. Each…

TECHNIQUES FOR SECURING A CHECKED-OUT VIRTUAL MACHINE IN A VIRTUAL DESKTOP INFRASTRUCTURE

Granted: September 20, 2012
Application Number: 20120240181
Techniques for securing checked-out virtual machines in a virtual desktop infrastructure (VDI) are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for securing a checked-out guest virtual machine including receiving a request for checking-out a guest virtual machine hosted by a server network element, wherein checking-out the guest virtual machine comprises transferring hosting of the guest virtual machine from the server network element to a…

SYSTEMS AND METHODS FOR LOOKING UP ANTI-MALWARE METADATA

Granted: September 20, 2012
Application Number: 20120240229
A computer-implemented method for looking up anti-malware metadata may include identifying a plurality of executable objects to be scanned for malware before execution. The computer-implemented method may also include, for each executable object within the plurality of executable objects, assessing an imminence of execution of the executable object. The computer-implemented method may further include prioritizing, based on the assessments, a retrieval order for anti-malware metadata…

METHOD AND SYSTEM FOR NOTIFICATION MANAGEMENT

Granted: September 20, 2012
Application Number: 20120240076
A system and method for notification management includes collecting information for a number of objects within a management tool for security assets. The display of the information is displayed on a window of a graphical user interface of the management tool. In response to user interaction with the graphical user interface, a notification tool window of a notification tool is displayed. The notification tool window is layered over at least a portion of the window of the graphical user…

METHOD, DEVICE AND SYSTEM FOR BACKUP

Granted: September 20, 2012
Application Number: 20120239804
A method, a device, and a system for backup are disclosed. The method includes: receiving a backup packet; analyzing the backup packet to obtain a serial number of an active data packet, where the serial number is carried in the backup packet; calculating a sum of the serial number of the active data packet and a specific increment value to obtain a serial number of a standby data packet; and backing up the serial number of the standby data packet. Therefore, after the service is…

METHOD, DEVICE AND SYSTEM FOR ALERTING AGAINST UNKNOWN MALICIOUS CODES

Granted: September 13, 2012
Application Number: 20120233691
A method, a device, and a system for alerting against unknown malicious codes are disclosed. The method includes: detecting characteristics of a packet; judging whether any suspicious code exists in the packet according to a result of the detection; recording a source address of the suspicious code if the suspicious code exists in the packet; and sending alert information that carries the source address to a monitoring device. The embodiments of the present invention can report source…

TECHNIQUES FOR VIRTUAL ARCHIVING

Granted: August 23, 2012
Application Number: 20120215744
Techniques for virtual archiving are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing virtual archiving comprising applying archiving rules to a backup catalog, generating a virtual archive catalog based at least in part on a result of applying archiving rules to the backup catalog, determining a backup image associated with the virtual archive catalog becoming expired and converting the backup image into an archive image.

METHOD AND APPARATUS FOR BUFFERING AND OBTAINING RESOURCES, RESOURCE BUFFERING SYSTEM

Granted: August 9, 2012
Application Number: 20120203910
A method and an apparatus for buffering and obtaining resources as well as a resource buffering system are disclosed. The method includes: obtaining an access popularity value of a resource from a database at intervals of a first preset time, and obtaining load values of cache servers from the database if determining that the access popularity value reaches a preset first threshold; and determining a duplication cache server for duplicating the resource according to the access popularity…

METHOD, APPARATUS AND SYSTEM FOR DETECTING BOTNET

Granted: August 9, 2012
Application Number: 20120204264
A method, an apparatus, and a system for detecting Botnet are disclosed. The method for detecting Botnet includes: obtaining an address information about a control host in a Bot sample by using an auto breakout environment; sending a query request message to a traffic analysis device to obtain an address information of a Bot host connected with the control host, in which the query request message carries the address information about the control host; and receiving a query response…

STORAGE RECLAMATION SYSTEMS AND METHODS

Granted: August 2, 2012
Application Number: 20120198443
Efficient and effective storage reclamation systems and methods are presented. In one embodiment, a storage reclamation method comprises: receiving an indication from a virtual machine that a reclamation opportunity for reclamation of a physical storage resource is available; and performing a reclamation process of the physical storage resource in accordance with the indication from the virtual machine that the reclamation opportunity is available, wherein the reclamation process is…

METHOD, COMPUTER SOFTWARE, AND SYSTEM FOR PROVIDING END TO END SECURITY PROTECTION OF AN ONLINE TRANSACTION

Granted: August 2, 2012
Application Number: 20120198552
Techniques for categorizing programs running on an information handling system. One method includes, while a program is running on an information handling system in a manner that permits the program to infect the information handling system, calculating a first score and a second score. The first score is indicative of the likelihood that the program is malicious; the second score is indicative of the likelihood that the program is valid. This method further includes categorizing the…

TECHNIQUES FOR DIRECTORY SERVER INTEGRATION

Granted: July 26, 2012
Application Number: 20120191918
Techniques for directory server integration are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for directory server integration comprising setting one or more parameters determining a range of permissible expiration times for a plurality of cached directory entries, creating, in electronic storage, a cached directory entry from a directory server, assigning a creation time to the cached directory entry, and assigning at least one random…

Systems and Methods for Providing Increased Scalability in Deduplication Storage Systems

Granted: July 19, 2012
Application Number: 20120185447
A computer-implemented method for providing increased scalability in deduplication storage systems may include (1) identifying a database that stores a plurality of reference objects, (2) determining that at least one size-related characteristic of the database has reached a predetermined threshold, (3) partitioning the database into a plurality of sub-databases capable of being updated independent of one another, (4) identifying a request to perform an update operation that updates one…