Systems and Methods for Malware Detection and Scanning
First Claim
1. A computer-implemented method operating in a hub computing device for malware scanning and detection, the method comprising:
- receiving, from a controller computing device, a scan request;
identifying, by the hub computing device, one or more spoke computing devices for performing the scan request;
sending, by the hub computing device to the identified spoke computing devices, the scan request;
receiving, from the spoke computing devices, results associated with the scan request; and
sending, to the controller computing device, the results associated with the scan request.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for malware scanning and detection. In one exemplary embodiment, the method includes a hub computing device that receives, from a controller computing device, a scan request, and identifies spoke computing devices for performing the scan request. The method performed by the hub computing device also includes sending to the identified spoke computing devices, the scan request, receiving, from the spoke computing devices, results associated with the scan request, and sending, to the controller computing device, the results associated with the scan request.
-
Citations
24 Claims
-
1. A computer-implemented method operating in a hub computing device for malware scanning and detection, the method comprising:
-
receiving, from a controller computing device, a scan request; identifying, by the hub computing device, one or more spoke computing devices for performing the scan request; sending, by the hub computing device to the identified spoke computing devices, the scan request; receiving, from the spoke computing devices, results associated with the scan request; and sending, to the controller computing device, the results associated with the scan request. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A hub computing apparatus for malware scanning and detection, the apparatus comprising:
-
at least one memory to store data and instructions; and at least one processor configured to access memory and to execute instructions to; receive, from a controller computing device, a scan request; identify spoke computing devices for performing the scan request; send, to the identified spoke computing devices, the scan request; receive, from the spoke computing devices, results associated with the scan request; and send, to the controller computing device, the results associated with the scan request. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-implemented method operating in a spoke computing device for malware scanning and detection, the method comprising:
-
receiving, from a hub computing device, a scan request; performing, by the spoke computing device, analysis according to the received scan request; storing, in a database of the spoke computing device, results of the analysis; and sending, to the hub computing device, the results of the analysis. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A spoke computing apparatus for malware scanning and detection, the apparatus comprising:
-
at least one memory to store data and instructions; and at least one processor configured to access memory and, when executing the instructions, to; receive, from a hub computing device, a scan request; perform analysis according to the received scan request; store, in a database of the spoke computing apparatus, results of the analysis; and send, to the hub computing device, the results of the analysis. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification