×

Using reputation to avoid false malware detections

  • US 10,616,269 B2
  • Filed: 09/20/2018
  • Issued: 04/07/2020
  • Est. Priority Date: 04/28/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • an endpoint associated with an enterprise, the endpoint including a computing device comprising a memory and a processor, the endpoint executing a process from a file, and the endpoint configured to evaluate a local reputation of the file based at least in part on a certificate associated with a source of the file;

    a gateway associated with the enterprise and coupled in a communicating relationship with the endpoint, the gateway configured to detect the process executing from the file on the endpoint and to request a global reputation of the file from a remote resource, the gateway further configured to enforce a network policy of the enterprise by detecting network traffic from the endpoint in violation of the network policy and providing a violation notification to the remote resource in response to the network traffic; and

    a threat management facility associated with the enterprise and coupled in a communicating relationship with the gateway and the endpoint, the threat management facility configured to receive the request from the gateway and to determine a global reputation of the file, the threat management facility further configured to receive the local reputation from the endpoint and, in response to receipt of the violation notification, to respond by determining a remedial action for the file on the endpoint based upon the local reputation evaluated by the endpoint based at least in part on the certificate associated with the source of the file, the global reputation of the file determined by the threat management facility, and the violation notification from the gateway in response to the network traffic from the endpoint in violation of the network policy.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×