Techniques for performing malware scanning of files stored within a file storage device of a computer network
First Claim
1. A proxy device for performing malware scanning of files stored within a file storage device of a computer network, the computer network having a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, the proxy device being arranged so as to intercept access requests issued to the file storage device, and comprising:
- a first interface for receiving an access request issued by one of said client devices to said file storage device using the dedicated file access protocol;
a second interface for communicating with the file storage device to cause the file storage device to process the access request;
processing logic for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware.
11 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a proxy device, computer program product and method for performing malware scanning of files stored within a file storage device of a computer network. The computer network has a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, with the proxy device being arranged so as to intercept access requests issued to the file storage device. The proxy device comprises a first interface for receiving an access request issued by one of the client devices to the file storage device using the dedicated file access protocol, and a second interface for communicating with the file storage device to cause the file storage device to process the access request. Further, processing logic is provided for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware. This approach removes the dependency of the malware scanning process on the operating system and/or vendor of the file storage device.
134 Citations
36 Claims
-
1. A proxy device for performing malware scanning of files stored within a file storage device of a computer network, the computer network having a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, the proxy device being arranged so as to intercept access requests issued to the file storage device, and comprising:
-
a first interface for receiving an access request issued by one of said client devices to said file storage device using the dedicated file access protocol;
a second interface for communicating with the file storage device to cause the file storage device to process the access request;
processing logic for causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of operating a proxy device to perform malware scanning of files stored within a file storage device of a computer network, the computer network having a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, the proxy device being arranged so as to intercept access requests issued to the file storage device, and the method comprising the steps of:
-
(a) receiving an access request issued by one of said client devices to said file storage device using the dedicated file access protocol;
(b) communicating with the file storage device to cause the file storage device to process the access request; and
(c) causing selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer program product operable to configure a proxy device to perform a method of malware scanning of files stored within a file storage device of a computer network, the computer network having a plurality of client devices arranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, the proxy device being arranged so as to intercept access requests issued to the file storage device, and the computer program product comprising:
-
(a) reception code operable to receive an access request issued by one of said client devices to said file storage device using the dedicated file access protocol;
(b) communication code operable to communicate with the file storage device to cause the file storage device to process the access request; and
(c) algorithm invoking code operable to cause selected malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification