Apparatus and method for efficient data pre-filtering in a data stream
First Claim
1. A method for a computing device to identify undesirable data in a data stream, wherein the data stream is received from a network and may contain undesirable data, the computing device having a plurality of undesirable data, comprising the steps of:
- creating a database of undesirable data;
populating a plurality of query modules with the undesirable data from the database;
receiving a data stream;
loading a search window with data from the data stream;
comparing the search window with the plurality of query modules; and
if a first comparison result indicates no shifting, identifying the data stream as undesirable data.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method for enabling rapid transfer of safe data in a data communication network. The apparatus includes a plurality of query modules, a search window, a shift detector, and a database of unsafe data. A predetermined portion of the unsafe data'"'"'s signature is populated into the query modules, and the signature of a received data in the search window is compared against a plurality of query modules. The search window is shifted according to the result of comparison with the plurality of query modules detected by the shift detector.
-
Citations
31 Claims
-
1. A method for a computing device to identify undesirable data in a data stream, wherein the data stream is received from a network and may contain undesirable data, the computing device having a plurality of undesirable data, comprising the steps of:
-
creating a database of undesirable data;
populating a plurality of query modules with the undesirable data from the database;
receiving a data stream;
loading a search window with data from the data stream;
comparing the search window with the plurality of query modules; and
if a first comparison result indicates no shifting, identifying the data stream as undesirable data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for identifying unsafe data in a data stream, wherein the data stream is received from a network, each unsafe datum being identified by a unique data signature, comprising:
-
a data receiver for receiving a data stream from a data source;
a search window for loading data from the data stream;
a plurality of query modules, each query module being populated with unsafe data and capable of comparing the data with the data in the search window; and
a shift detector for receiving results from the plurality of query modules, wherein if the shift detector indicates no shifting, the data stream is classified as unsafe data. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable medium on which is stored a computer program for a computing device to identify undesirable data in a data stream, wherein the data stream is received from a network and may contain undesirable data, each undesirable datum being identified by a unique data signature and the computing device having a plurality of undesirable data signatures identifying undesirable data, the computer program comprising computer instructions that when executed by a computing device performs the steps for:
-
creating a database of undesirable data;
populating a plurality of query modules with the undesirable data from the database;
receiving the data stream;
loading a search window with data from the data stream;
comparing the search window with the plurality of query modules; and
if a first comparison result indicates no shifting, identifying the data stream as undesirable data. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for a computing device to identify undesirable data in a data stream, wherein the data stream is received from a network and may contain undesirable data, the computing device having a plurality of undesirable data, comprising the steps of:
-
creating a database of undesirable data;
populating a plurality of query modules with the undesirable data from the database;
receiving the data stream;
loading a search window with data from the data stream;
comparing the search window with the plurality of query modules;
ANDing a first comparison result with a master bitmap; and
if an ANDing result indicates no shifting, identifying the data stream as undesirable data. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
Specification