Executable Download Tracking System
First Claim
1. A method of monitoring computer-readable instructions, comprising:
- identifying an executable portion of the computer-readable instructions received on a computer network from a source;
classifying the executable portion of the computer-readable instructions as a risk;
neutralizing the risk on the computer network; and
identifying the source of the risk.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for monitoring executable software applications on a computer network. Executable software applications and data files may be monitored by a risk monitoring system. The executable software application and data files may attempt to access a computer network and/or a computing device and a monitoring process may identify risks associated with the executable software application and/or data file. A suspicious characteristic of the executable software application may be identified during the monitoring process. The suspicious characteristic may be malware and may be neutralized before it causes damage to the computer network and/or computing device.
112 Citations
23 Claims
-
1. A method of monitoring computer-readable instructions, comprising:
-
identifying an executable portion of the computer-readable instructions received on a computer network from a source; classifying the executable portion of the computer-readable instructions as a risk; neutralizing the risk on the computer network; and identifying the source of the risk. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method of monitoring data files on a computer network, comprising:
-
receiving an executable software application on a first computer network from a second computer network; identifying at least one suspicious characteristic of the executable software application; determining whether the at least one suspicious characteristic of the executable software application is malware; and preventing the malware from contaminating the first computer network by at least one deleting, quarantining, repairing, cleaning, blocking, rejecting, and neutralizing. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A risk monitoring system, comprising:
-
a computing device that contains computer readable instructions for authenticating an executable software application received on a computer network; a receiver for receiving data associated with the executable software application; a server comprising memory for storing the data in a data file; and a processor for executing the computer-executable instructions to perform a method, comprising; receiving an executable software application on a first computer network from a second computer network; identifying at least one suspicious characteristic of the executable software application; determining whether the at least one suspicious characteristic of the executable software application is malware; and preventing the malware from contaminating the first computer network by at least one of filtering, blocking, rejecting, and neutralizing.
-
Specification