MALWARE DETECTION DEVICE
First Claim
1. A device, comprising:
- a data pathway provided between a first data transfer device and a second data transfer device;
a processor attached to the data pathway; and
a memory accessible by the processor containing at least one malware signature and instructions for controlling the processor to;
passively oversee an interconnection of the first and second data transfer devices;
direct at least a portion of a data transfer across the data pathway to the processor for analysis;
analyze the at least a portion of the data transfer using the malware signature;
identify malware contained in the at least a portion of the data transfer; and
interrupt the data transfer based on the identification of malware.
6 Assignments
0 Petitions
Accused Products
Abstract
An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware.
-
Citations
20 Claims
-
1. A device, comprising:
-
a data pathway provided between a first data transfer device and a second data transfer device; a processor attached to the data pathway; and a memory accessible by the processor containing at least one malware signature and instructions for controlling the processor to; passively oversee an interconnection of the first and second data transfer devices; direct at least a portion of a data transfer across the data pathway to the processor for analysis; analyze the at least a portion of the data transfer using the malware signature; identify malware contained in the at least a portion of the data transfer; and interrupt the data transfer based on the identification of malware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11, 12, 13, 14, 15)
-
-
10. A method, comprising:
-
monitoring an interconnection of a first data transfer device and a second data transfer device; directing at least a portion of a data transfer across an isolated data pathway between the first and second data transfer devices to a processor for analysis; independently analyzing the at least a portion of the data transfer using at least one malware signature; identifying malware contained in the at least a portion of the data transfer based on the malware signature; and interrupting the data transfer based on the identifying.
-
-
16. A device, comprising:
-
a first connection point and a second connection point for physically coupling a first data transfer device to a second data transfer device; a discrete data pathway between the first and second connection points providing an isolated area to analyze a data transfer for malware; an independent processor attached to the data pathway; and a computer readable medium accessible to the processor containing at least one malware signature and instructions for controlling the processor to; direct at least a portion of the data transfer across the data pathway to the processor for analysis; independently analyze the at least a portion of the data transfer using the malware signature; identify malware contained in the at least a portion of the data transfer; and interrupt the data transfer based on the identification of malware. - View Dependent Claims (17, 18, 19, 20)
-
Specification