SAFE FILE TRANSMISSION AND REPUTATION LOOKUP
First Claim
Patent Images
1. A computer readable medium comprising instructions that when executed perform a method comprising:
- wrapping a data file in a protective file based at least in part upon at least one of;
whether the data file was sent by an unknown sender with an internet protocol address;
whether malware has previously been received from the internet protocol address;
a likelihood that the data file comprises malware; and
whether malware has previously been received from a user associated with the data file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.
-
Citations
20 Claims
-
1. A computer readable medium comprising instructions that when executed perform a method comprising:
wrapping a data file in a protective file based at least in part upon at least one of; whether the data file was sent by an unknown sender with an internet protocol address; whether malware has previously been received from the internet protocol address; a likelihood that the data file comprises malware; and whether malware has previously been received from a user associated with the data file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method, comprising:
overriding a block on access to a data file after a warning indicating a level of suspiciousness associated with the data file is accessed, the level of suspiciousness based at least in part upon at least one of; a number of users that executed the data file; a number of times the data file has travelled through a network; a first time and date the data file was observed; whether the data file was reviewed by an analyst; a certificate used to sign the data file; a link to a company that controls the certificate; and a link to at least one of a search page and a discussion group comprising information about the data file. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
17. A system comprising:
-
one or more processors; and memory comprising instructions that when executed by at least one of the one or more processors, perform a method comprising; overriding a block on access to a data file after a warning indicating a level of suspiciousness associated with the data file is accessed, the level of suspiciousness based at least in part upon at least one of; a number of users that executed the data file; a number of times the data file has travelled through a network; a first time and date the data file was observed; whether the data file was reviewed by an analyst; a certificate used to sign the data file; a link to a company that controls the certificate; and a link to at least one of a search page and a discussion group comprising information about the data file. - View Dependent Claims (18, 19, 20)
-
Specification