Digital protection that travels with data
First Claim
1. At least one machine readable, non-transitory storage medium having instructions stored thereon for providing data-centric computer security between a first device and a second device remote from the first device, wherein the instructions, when executed by at least one processor, cause the at least one processor to perform operations comprising:
- scanning a data file using a security scanner at the first device to produce results;
receiving, from the second device, an indication of an operating system platform version at the second device, a version of software at the second device for accessing the data file, or a date for accessing the data file at the second device;
scanning the data file for malware contextually relevant to the second device based on the operating system platform version, the version of the software, or the date;
creating a record based in part on the results from the security scanner, the record comprising a cryptographic hash of the data file, the record further comprising device information associated with the first device, scan information associated with the security scanner, or user information associated with a user of the first device, wherein the device information comprises at least one of a reputation of the first device, a version of the security scanner, and the operating system platform version, the user information comprises at least one of a reputation of the user of the first device and a manner in which the user of the first device is linked to a user of the second device, and the record is generated or augmented according to the indication; and
transmitting the record along with the data file from the first device to the second device.
9 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to a system and method for performing antimalware scanning of data files that is data-centric rather than device-centric, In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware, After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan, The originating device may also scan the data for malware contextually-relevant to a second device.
15 Citations
11 Claims
-
1. At least one machine readable, non-transitory storage medium having instructions stored thereon for providing data-centric computer security between a first device and a second device remote from the first device, wherein the instructions, when executed by at least one processor, cause the at least one processor to perform operations comprising:
-
scanning a data file using a security scanner at the first device to produce results; receiving, from the second device, an indication of an operating system platform version at the second device, a version of software at the second device for accessing the data file, or a date for accessing the data file at the second device; scanning the data file for malware contextually relevant to the second device based on the operating system platform version, the version of the software, or the date; creating a record based in part on the results from the security scanner, the record comprising a cryptographic hash of the data file, the record further comprising device information associated with the first device, scan information associated with the security scanner, or user information associated with a user of the first device, wherein the device information comprises at least one of a reputation of the first device, a version of the security scanner, and the operating system platform version, the user information comprises at least one of a reputation of the user of the first device and a manner in which the user of the first device is linked to a user of the second device, and the record is generated or augmented according to the indication; and transmitting the record along with the data file from the first device to the second device. - View Dependent Claims (2, 3, 10, 11)
-
-
4. A first device for providing data-centric computer security between the first device and a second device remote from the first device, the first device comprising:
-
at least one memory element; at least one processor coupled to the at least one memory element; and a file sharing client that, when executed by the at least one processor, is configured to receive, from the second device, an indication of an operating system platform version at the second device, a version of software at the second device for accessing the data file, or a date for accessing the data file at the second device, create a record associated with a data file based in part on scan results from a security scanner of the first device, the record comprising a cryptographic hash of the data file, the record further comprising device information associated with the first device, scan information associated with the security scanner, or user information associated with a user of the first device, wherein the security scanner of the first device is configured to scan the data file for malware contextually relevant to the second device based on the operating system platform version, the version of the software, or the date, the record is generated or augmented according to the indication, the device information comprises at least one of a reputation of the first device, a version of the security scanner, and the operating system platform version, and the user information comprises at least one of a reputation of the user of the first device and a manner in which the user of the first device is linked to a user of the second device, and transmit the record along with the data file from the first device to the second device. - View Dependent Claims (5, 6)
-
-
7. A method for providing data-centric computer security between a first device and a second device remote from the first device, comprising:
-
receiving, at a file sharing client of the first device, from the second device, an indication of an operating system platform version at the second device, a version of software at the second device for accessing a data file, or a date for accessing the data file at the second device; scanning, using a security scanner of the first device, the data file for malware contextually relevant to the second device based on the operating system platform version, the version of the software, or the date; retrieving scan results associated with the data file from the security scanner of the first device; creating, using the file sharing client, a record based in part on the scan results, the record comprising a cryptographic hash of the data file, the record further comprising device information associated with the first device, scan information associated with the security scanner, or user information associated with a user of the first device, wherein the record is generated or augmented according to the indication, the device information comprises at least one of a reputation of the first device, a version of the security scanner, and the operating system platform version, and the user information comprises at least one of a reputation of the user of the first device and a manner in which the user of the first device is linked to a user of the second device; and transmitting the record along with the data file from the first device to the second device. - View Dependent Claims (8, 9)
-
Specification