Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2006-12-12
2006-12-12
Louis-Jacques, Jacques (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
C726S012000, C713S182000, C713S193000
Reexamination Certificate
active
07150042
ABSTRACT:
The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware. This approach removes the dependency of the malware scanning process on the operating system and/or vendor of the file storage device.
REFERENCES:
patent: 5583995 (1996-12-01), Gardner et al.
patent: 5623600 (1997-04-01), Ji et al.
patent: 5889943 (1999-03-01), Ji et al.
patent: 6026414 (2000-02-01), Anglin
patent: 6078929 (2000-06-01), Rao
patent: 6088803 (2000-07-01), Tso et al.
patent: 6167438 (2000-12-01), Yates et al.
patent: 6182142 (2001-01-01), Win et al.
patent: 6230190 (2001-05-01), Edmonds et al.
patent: 6275937 (2001-08-01), Hailpern et al.
patent: 6304904 (2001-10-01), Sathyanarayan et al.
patent: 6438576 (2002-08-01), Huang et al.
patent: 6446109 (2002-09-01), Gupta
patent: 6510464 (2003-01-01), Grantges et al.
patent: 6687732 (2004-02-01), Bector et al.
patent: 6715082 (2004-03-01), Chang et al.
patent: 6742015 (2004-05-01), Bowman-Amuah
patent: 6760765 (2004-07-01), Asai et al.
patent: 6826698 (2004-11-01), Minkin et al.
patent: 2002/0038339 (2002-03-01), Xu
patent: 2002/0083342 (2002-06-01), Webb et al.
patent: 2002/0091757 (2002-07-01), Cuomo et al.
patent: 2002/0129277 (2002-09-01), Caccavale
patent: 2002/0186698 (2002-12-01), Ceniza
patent: 2003/0065791 (2003-04-01), Garg et al.
Wu et al., “Load Balancing and Hot Spot Relief for Hash Routing Among a Collection of Proxy Caches,” Proceedings on Distributed Computing Systems IEEE, Jun. 4, 1999, pp. 536-543.
Spare, Ian, “Deploying the Squid Proxy Server on Linux,” Liniux Journal, Mar. 2001, article No. 5.
Copy of Advisory Action from U.S. Appl. No. 10/004,120 mailed Nov. 16, 2005.
Copy of Office Action Summary from Application No. 10/004,120 which was mailed on Jan. 20, 2006.
Edwards Jonathan Lewis
Spurlock Joel Robert
Wolff Daniel Joseph
Brown Christopher J.
Hamaty Christopher J.
Louis-Jacques Jacques
McAfee, Inc.
Zilka-Kotab, PC
LandOfFree
Techniques for performing malware scanning of files stored... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Techniques for performing malware scanning of files stored..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for performing malware scanning of files stored... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3720273