Apparatus and method for acceleration of malware security applications through pre-filtering
First Claim
Patent Images
1. A data classification system configured to identify and process malicious data in electronic data, the system comprising:
- a data flow module configured to generate a first processed data stream from an input data stream, the data flow module being further configured to receive a third meta data from a reporting module and to generate a third processed data stream from the received input data stream and the third meta data;
a first processing stage configured to receive the first processed data stream and to generate a second processed data stream and a first meta data from the first processed data stream;
a second processing stage configured to receive the second processed data stream and generate a second meta data therefrom; and
a reporting module configured to receive the first meta data and the second meta data and to generate the third meta data.
2 Assignments
0 Petitions
Accused Products
Abstract
A data classification system identifies and processes malicious data that may be present in a received data stream. The system includes at least two stages, and a data flow module. The data flow module derives, from an input data stream, a first processed data stream that is transmitted to the first processing stage. The first processing stage derives, from the first processed data stream, a second processed data stream that is transmitted to the second processing stage. The first and second processing stages optionally derive meta data from the data they receive.
86 Citations
46 Claims
-
1. A data classification system configured to identify and process malicious data in electronic data, the system comprising:
-
a data flow module configured to generate a first processed data stream from an input data stream, the data flow module being further configured to receive a third meta data from a reporting module and to generate a third processed data stream from the received input data stream and the third meta data;
a first processing stage configured to receive the first processed data stream and to generate a second processed data stream and a first meta data from the first processed data stream;
a second processing stage configured to receive the second processed data stream and generate a second meta data therefrom; and
a reporting module configured to receive the first meta data and the second meta data and to generate the third meta data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method for identifying and processing malicious data in electronic data, the method comprising:
-
receiving an input data stream, processing the input data stream to generate a first processed data stream, processing the first processed data stream to generate a second processed data stream and a first meta data, processing the second processed data stream to generate a second meta data, processing the first meta data and the second meta data to generate a third meta data, and processing the third meta data and the input data stream to generate a fourth meta data and a third processed data stream. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
Specification