Providing a Malware Analysis Using a Secure Malware Detection Process
First Claim
1. A computer-implemented system, comprising:
- a boundary controller operable to;
implement a security boundary between a first computer network environment and a second computer network environment, the second computer network environment having a security classification level that is more restrictive than a security classification level of the first computer network environment; and
receive via the first computer network environment a file; and
a malware analysis system positioned in the second computer network environment and operable to;
receive via the boundary controller the file; and
apply a first malware detection process on the file, the first malware detection process subject to the security classification level of the second computer network environment.
11 Assignments
0 Petitions
Accused Products
Abstract
In certain embodiments, a computer-implemented system comprises a boundary controller and a first malware detection agent. The boundary controller is operable to implement a security boundary between a first computer network environment and a second computer network environment. The second computer network environment has a security classification level that is more restrictive than a security classification level of the first computer network environment. The boundary controller is operable to receive from the first computer network environment a file. The first malware detection agent is positioned in the second computer network environment and is operable to receive via the boundary controller the file and apply a first malware detection process on the file. The first malware detection process is subject to the security classification level of the second computer network environment.
-
Citations
28 Claims
-
1. A computer-implemented system, comprising:
-
a boundary controller operable to; implement a security boundary between a first computer network environment and a second computer network environment, the second computer network environment having a security classification level that is more restrictive than a security classification level of the first computer network environment; and receive via the first computer network environment a file; and a malware analysis system positioned in the second computer network environment and operable to; receive via the boundary controller the file; and apply a first malware detection process on the file, the first malware detection process subject to the security classification level of the second computer network environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 27)
-
-
9. A computer-implemented system, comprising:
-
a boundary controller operable to; implement a security boundary between a first computer network environment and a second computer network environment, the second computer network environment having a security classification level that is more restrictive than a security classification level of the first computer network environment; receive from the first computer network environment a file; and a first malware detection agent positioned in the second computer network environment and operable to; receive via the boundary controller the file; and apply a first malware detection process on the file, the first malware detection process subject to the security classification level of the second computer network environment. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented system, comprising:
-
a boundary controller operable to; implement a security boundary between a first computer network environment and a second computer network environment, the second computer network environment having a security classification level that is more restrictive than a security classification level of the first computer network environment; receive from a malware analysis system, at least a portion of which is positioned in the first computer network environment, a file; a first malware detection agent positioned in the second computer network environment and operable to; receive via the boundary controller the file; and apply a first malware detection process on the file, the first malware detection process subject to the security classification level of the second computer network environment. - View Dependent Claims (22, 23, 24, 25, 26, 28)
-
Specification