1
Petros Efstathopoulos, Fanglu Guo: System and method for high performance deduplication indexing. Symantec Corporation, Rory D Rankin, Meyertons Hood Kivlin Kowert & Kowert & Goetzel P C, February 5, 2013: US08370315 (42 worldwide citation)

A system and method for efficiently reducing latency of accessing an index for a data segment stored on a server. A server both removes duplicate data and prevents duplicate data from being stored in a shared data storage. The file server is coupled to an index storage subsystem holding fingerprint ...


2
Petros Efstathopoulos, Fanglu Guo, Dharmesh Shah: Progressive sampling for deduplication indexing. Symantec Corporation, Rory D Rankin, Meyertons Hood Kivlin Kowert & Goetzel P C, November 13, 2012: US08311964 (18 worldwide citation)

A system and method for efficiently reducing a number of duplicate blocks of stored data. A file server both removes duplicate data and prevents duplicate data from being stored in the shared storage. A sampling rate may be used to determine which fingerprints, or hash values, are stored in an index ...


3
Tudor Dumitras, Petros Efstathopoulos: Systems and methods for determining malicious-attack exposure levels based on field-data analysis. Symantec Corporation, ALG Intellectual Property, May 26, 2015: US09043922 (9 worldwide citation)

A computer-implemented method for determining malicious-attack exposure levels based on field-data analysis may include (1) receiving a plurality of attack reports from a plurality of computing systems, wherein at least one attack report includes an identifier of a software component of a computing ...


4
Petros Efstathopoulos: Systems and methods for distributed data deduplication. Symantec Corporation, ALG Intellectual Property, November 25, 2014: US08898120 (9 worldwide citation)

A computer-implemented method for distributed data deduplication may include (1) identifying a deduplicated data system, the deduplicated data system include a plurality of nodes, wherein each node within the plurality of nodes is configured to deduplicate data stored on the node, (2) identifying a ...


5
Sanjay Sawhney, Petros Efstathopoulos, Daniel Marino: Systems and methods for deploying applications included in application containers. Symantec Corporation, ALG Intellectual Property, August 25, 2015: US09116768 (6 worldwide citation)

The disclosed computer-implemented method for deploying applications included in application containers may include (1) identifying an application container that includes an application and facilitates transferring the application to a deployment environment, (2) performing a reconnaissance analysis ...


6
Petros Efstathopoulos: Systems and methods for virtualizing internet of things (IoT) devices. Symantec Corporation, Womble Carlyle Sandridge & Rice, March 28, 2017: US09606817 (5 worldwide citation)

A virtual element includes a communication component that controls, from a remote location, communication with an Internet of Things (IoT) device of a plurality of IoT devices. The virtual element also includes a capabilities augmenting component that facilitates access to resources that augment the ...


7
Petros Efstathopoulos, Bruce Montague, Dharmesh Shah, Kevin Butler: Host validation mechanism for preserving integrity of portable storage data. Symantec Corporation, Brill Law Office, Jeffrey Brill, October 7, 2014: US08856918 (4 worldwide citation)

A host validation system runs on a portable storage device, and protects data stored thereon from unauthorized access by host computers. The system identifies a host to which the portable device is coupled, for example by using the host's TPM. This can further comprise identifying the host's current ...


8
Daniel Marino, Petros Efstathopoulos, Mingwei Zhang: Systems and methods for increasing security on computing systems that launch application containers. Symantec Corporation, FisherBroyles, August 8, 2017: US09729579 (1 worldwide citation)

A computer-implemented method for increasing security on computing systems that launch application containers may include (1) authenticating an application container that facilitates launching at least one application on a host computing system by verifying that the application container meets a cer ...


9
Ashwin Kumar Kayyoor, Susanta K Nanda, Petros Efstathopoulos: Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection. Symantec Corporation, Patent Law Works, June 27, 2017: US09692768 (1 worldwide citation)

A first graph comprises multiple nodes and edges. At least one successive summary graph is created, using the original graph as a predecessor. To create a second graph from a first, nodes of the first graph are grouped into a plurality of subsets, and each subset becomes a super-node. For each super ...


10
Petros Efstathopoulos, Sharada Sundaram: Discovering relationships using deduplication metadata to provide a value-added service. Symantec Corporation, William Cutler Pickering Hale and Dorr, April 5, 2016: US09305007 (1 worldwide citation)

A first computer system identifies deduplication metadata for files. The deduplication metadata includes block level information for the files. The first computer system determines relationships that are associated with the files based on the block level information and sends relationship data that ...