Systems and methods of computer security
First Claim
Patent Images
1. A method for combating malicious programs, the method comprising:
- monitoring network traffic from one or more devices;
analyzing said network traffic to determine the presence of a malicious program in said one or more devices; and
disabling transmission of said network traffic for those of said one or more devices determined to have said malicious program present.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for combating malicious programs including monitoring network traffic from one or more devices, analyzing the network traffic to determine the presence of a malicious program in the one or more devices and disabling transmission of the network traffic for those of the one or more devices determined to have the malicious program present.
-
Citations
51 Claims
-
1. A method for combating malicious programs, the method comprising:
-
monitoring network traffic from one or more devices;
analyzing said network traffic to determine the presence of a malicious program in said one or more devices; and
disabling transmission of said network traffic for those of said one or more devices determined to have said malicious program present. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for combating malicious programs comprising:
-
a monitoring unit for monitoring network traffic from one or more devices;
an analyzing unit for analyzing said network traffic to determine the presence of a malicious program in said one or more devices; and
a disabling unit for disabling transmission of said network traffic for those of said one or more devices determined to have said malicious program present. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer system comprising:
-
a processor; and
a program storage device readable by the computer system, embodying a program of instructions executable by the processor to perform method steps for combating malicious programs, the method comprising;
monitoring network traffic from one or more devices;
analyzing said network traffic to determine the presence of a malicious program in said one or more devices; and
disabling transmission of said network traffic for those of said one or more devices determined to have said malicious program present. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
- 39. The computer system of claim 27, wherein disabling transmission of said network traffic for those of said one or more devices determined to have said malicious program present comprises removing from said network said those of said one or more devices determined to have said malicious program present.
-
39-1. A computer recording medium including computer executable code for combating malicious programs, the computer executable code comprising:
-
code for monitoring network traffic from one or more devices;
code for analyzing said network traffic to determine the presence of a malicious program in said one or more devices; and
code for disabling transmission of said network traffic for those of said one or more devices determined to have said malicious program present.
-
Specification