Techniques for performing malware scanning of files stored...

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S012000, C713S182000, C713S193000

Reexamination Certificate

active

07150042

ABSTRACT:
The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware. This approach removes the dependency of the malware scanning process on the operating system and/or vendor of the file storage device.

REFERENCES:
patent: 5583995 (1996-12-01), Gardner et al.
patent: 5623600 (1997-04-01), Ji et al.
patent: 5889943 (1999-03-01), Ji et al.
patent: 6026414 (2000-02-01), Anglin
patent: 6078929 (2000-06-01), Rao
patent: 6088803 (2000-07-01), Tso et al.
patent: 6167438 (2000-12-01), Yates et al.
patent: 6182142 (2001-01-01), Win et al.
patent: 6230190 (2001-05-01), Edmonds et al.
patent: 6275937 (2001-08-01), Hailpern et al.
patent: 6304904 (2001-10-01), Sathyanarayan et al.
patent: 6438576 (2002-08-01), Huang et al.
patent: 6446109 (2002-09-01), Gupta
patent: 6510464 (2003-01-01), Grantges et al.
patent: 6687732 (2004-02-01), Bector et al.
patent: 6715082 (2004-03-01), Chang et al.
patent: 6742015 (2004-05-01), Bowman-Amuah
patent: 6760765 (2004-07-01), Asai et al.
patent: 6826698 (2004-11-01), Minkin et al.
patent: 2002/0038339 (2002-03-01), Xu
patent: 2002/0083342 (2002-06-01), Webb et al.
patent: 2002/0091757 (2002-07-01), Cuomo et al.
patent: 2002/0129277 (2002-09-01), Caccavale
patent: 2002/0186698 (2002-12-01), Ceniza
patent: 2003/0065791 (2003-04-01), Garg et al.
Wu et al., “Load Balancing and Hot Spot Relief for Hash Routing Among a Collection of Proxy Caches,” Proceedings on Distributed Computing Systems IEEE, Jun. 4, 1999, pp. 536-543.
Spare, Ian, “Deploying the Squid Proxy Server on Linux,” Liniux Journal, Mar. 2001, article No. 5.
Copy of Advisory Action from U.S. Appl. No. 10/004,120 mailed Nov. 16, 2005.
Copy of Office Action Summary from Application No. 10/004,120 which was mailed on Jan. 20, 2006.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Techniques for performing malware scanning of files stored... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Techniques for performing malware scanning of files stored..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for performing malware scanning of files stored... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3720273

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.