Symantec Patent Grants

System and method for identifying an invalid packet on a controller area network (CAN) bus

Granted: November 27, 2018
Patent Number: 10142358
A system and method for detecting an invalid packet on a Controller Area Network (CAN) bus having a plurality of CAN nodes coupled thereto is provided. The method may include monitoring a CAN identifier (CAN ID) of each packet sent by each CAN node. The method may also include determining whether to detect the validity using a time threshold, historical data, or an acknowledgement (ACK) bit. For example, when the CAN ID is unknown, the method may include the use of validity detection…

Systems and methods for preventing malicious network connections using correlation-based anomaly detection

Granted: November 27, 2018
Patent Number: 10142357
The disclosed computer-implemented method may include (i) monitoring computing activity, (ii) detecting, during a specific time period, at least one malicious network connection that involves a computing device within a network, (iii) determining that no malicious network connections involving the computing device were detected during another time period, (iv) identifying a feature of the computing activity that (a) occurred during the specific time period and (b) did not occur during…

Techniques for providing event driven notifications

Granted: November 27, 2018
Patent Number: 10142213
Techniques for providing event driven notifications are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for providing event driven notifications comprising monitoring an electronic media feed for an event associated with a specified criteria, identifying, using at least one computer processor, a plurality of events in the electronic media feed, filtering the plurality of events, identifying an event of the plurality of events matching a…

Systems and methods for restarting computing devices into security-application-configured safe modes

Granted: November 27, 2018
Patent Number: 10140454
The disclosed computer-implemented method for restarting computing devices into security-application-configured safe modes may include (1) configuring a security application to recognize a predetermined signal received via a predetermined hardware device that indicates that a user wants to restart the computing device into a security-application-configured safe mode that prevents suspicious applications from loading, (2) detecting the predetermined signal via an instance of the…

Systems and methods for securing computing devices that are not in users' physical possessions

Granted: November 27, 2018
Patent Number: 10140440
The disclosed computer-implemented method for securing computing devices that are not in users' physical possessions may include (i) taking, at a computing device of a user while the user is in physical possession of the computing device, a first measurement of a biological attribute of the user's body, (ii) taking, at the computing device, a second measurement of the same biological attribute, (iii) analyzing, at the computing device, the second measurement relative to the first…

Techniques for system backup

Granted: November 27, 2018
Patent Number: 10140187
Techniques for system backup are disclosed. In one embodiment, the techniques may be realized as a method including identifying a particular characteristic of a particular modification of a default automated procedure for selecting files to include in an off-site backup, wherein the identifying is based at least in part on an aggregation of data from many client devices as to how each of many users deviated from the default automated selection procedure; receiving a first system profile…

Defeating wireless signal interference hacks by manipulating signal strength

Granted: November 20, 2018
Patent Number: 10135868
A method for defeating wireless signal interference hacks is described. The method may include monitoring operations associated with user input of a user into an application on a mobile computing device. The user input may include physical interaction by the user's fingers with the mobile computing device causing signal interference by the fingers with a wireless signal transmitted by the mobile computing device such that a position of the fingers is detectable by a third party receiving…

Systems and methods for detecting malware

Granted: November 20, 2018
Patent Number: 10133865
The disclosed computer-implemented method for detecting malware may include (1) identifying a plurality of programs represented in machine code, (2) deriving a plurality of opcode n-grams from opcode sequences within the plurality of programs, (3) training an autoencoder by using the plurality of opcode n-grams as input, (4) discovering a set of features within the autoencoder after training the autoencoder, each feature within the set of features comprising a linear combination of…

Composite execution of rename operations in wide area file systems

Granted: November 20, 2018
Patent Number: 10133744
Methods, apparatuses, and systems directed to improving shared file access in wide area network file systems. In a particular implementation, one or more elements of a wide area file system cooperate to keep an original file intact on a remote file server until a new copy of the same file is completely flushed to the remote file server. In a particular implementation, rename operations identifying a source and a target in connection with application-level save operations are executed as…

Local area network ecosystem of verified computer security resources

Granted: November 6, 2018
Patent Number: 10122737
A router-level computer security component validates multiple endpoint computer security components on multiple endpoint devices in a local area network, based on whether given endpoints each have a specific anti-malware scanning engine and set of signatures used by the router-level component. To validate a given endpoint, the router-level component transmits a code sample which will trigger scanning by the specific anti-malware scanning engine in conjunction with a specific signature of…

Systems and methods for verifying that operators are human based on operator gaze

Granted: October 30, 2018
Patent Number: 10116695
The disclosed computer-implemented method for verifying that operators are human based on operator gaze may include (1) presenting an image to a user of the computing device via a display element of the computing device, (2) tracking the user's gaze as the image is presented to the user, (3) determining, based on an analysis of the user's gaze, that one or more patterns of the user's gaze are consistent with one or more human gaze patterns, and (4) classifying the user as a human in…

Systems and methods for detecting potentially malicious files

Granted: October 30, 2018
Patent Number: 10116688
The disclosed computer-implemented method for detecting potentially malicious files may include (1) detecting an attempt by the computing device to execute a file, (2) prior to execution of the file, determining that a filename of the file contains a combination of characters indicative of a false filename extension included within a middle section of the filename, (3) determining, based at least in part on the false filename extension being included within the middle section of the…

Systems and methods for evaluating infection risks based on profiled user behaviors

Granted: October 30, 2018
Patent Number: 10116680
The disclosed computer-implemented method for evaluating infection risks based on profiled user behaviors may include (1) collecting user-behavior profiles that may include labeled profiles (e.g., infected profiles and/or clean profiles) and/or unlabeled profiles, (2) training a classification model to distinguish infected profiles from clean profiles using features and labels of the user-behavior profiles, and (3) using the classification model to predict (a) a likelihood that a…

Systems and methods for enabling calls to bypass call-blocking functions

Granted: October 30, 2018
Patent Number: 10116656
The disclosed computer-implemented method for enabling calls to bypass call-blocking functions may include (1) transmitting, from the computing device that is configured with a call-blocking function, a token to an additional device owned by an individual who is to be allowed to bypass the call-blocking function of the computing device, (2) receiving, by the computing device, a request from an unknown device to initiate a call to the computing device that would be blocked by the…

Systems and methods for managing smart building systems

Granted: October 30, 2018
Patent Number: 10116513
A computer-implemented method for managing smart building systems may include (1) detecting a set of smart devices comprising first and second smart devices in a smart building network, (2) maintaining a smart device management repository by, for each smart device, maintaining information indicating capabilities of the smart device and tracking a location of the smart device, (3) detecting a change in a state of the first smart device, (4) using the smart device management repository to…

Systems and methods for providing assistance to users in emergency situations

Granted: October 30, 2018
Patent Number: 10115283
The disclosed computer-implemented method for providing assistance to users in emergency situations may include (i) detecting that a user of an endpoint device is involved in an emergency situation, (ii) identifying an individual capable of assisting the user in the emergency situation by (a) locating an additional endpoint device that is nearby the endpoint device of the user and (b) determining that the additional endpoint device asserts an attribute of the individual that indicates…

Systems and methods for logging processes within containers

Granted: October 30, 2018
Patent Number: 10114947
The disclosed computer-implemented method for logging processes within containers may include (i) detecting creation of a new container that comprises a lightweight platform-independent filesystem capable of executing at least one process that is isolated from a host computing device that hosts the container, (ii) launching, within the new container, a monitoring process that maintains a log of events associated with a process that will be executing within the new container, (iii)…

Systems and methods for classifying permissions on mobile devices

Granted: October 30, 2018
Patent Number: 10114944
The disclosed computer-implemented method for classifying permissions on mobile devices may include (1) detecting that an application executing on a mobile device is issuing a request for one or more requested permissions to access one or more components of the mobile device, (2) determining an intended use of the application, (3) performing, through a security system distinct from the application and the operating system, an analysis of the request issued by the application at least in…

Systems and methods for secure communications between devices

Granted: October 30, 2018
Patent Number: 10114939
The disclosed computer-implemented method for secure communications between devices may include (1) receiving, from a control device that is capable of providing instructions to one or more smart devices, a security certificate that identifies the control device and also contains privilege information that indicates how the control device is allowed to interact with the smart devices, (2) receiving, from the control device, a request to interact with a smart device, (3) analyzing the…

System and methods to detect mobile credential leaks during dynamic analysis

Granted: October 23, 2018
Patent Number: 10110618
The present disclosure relates to systems and methods for detecting malware. In some embodiments, a method may include detecting, via a processor, a user login event at an application; dynamically comparing, via the processor, the user login event with one or more expected behaviors associated with the application; and determining, via the processor, whether the application is potential malware based at least in part on a result of the comparing.