Detecting Malicious Network Content
First Claim
1. A method for detecting malicious content within portable data storage devices, the method comprising:
- detecting insertion of one or more portable data storage devices into a security appliance, the security appliance being configured to receive the one or more portable data storage devices;
receiving from the security appliance, via a communication network, data associated with the one or more portable data storage devices;
analyzing the data to determine whether the one or more portable data storage devices store malware; and
based on the determination, selectively identifying the one or more portable data storage devices storing the malware.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for detecting malicious content on portable data storage devices or remote network servers are provided. In an exemplary embodiment, a system comprises a quarantine module configured to detect one or more portable data storage devices upon insertion of the devices into a security appliance, wherein the security appliance is configured to receive the portable data storage devices, a controller configured to receive from the security appliance, via a communication network, data associated with the portable data storage devices, an analysis module configured to analyze the data to determine whether the data includes malware, and a security module to selectively identify, based on the determination, the one or more portable data storage devices storing the malware.
-
Citations
20 Claims
-
1. A method for detecting malicious content within portable data storage devices, the method comprising:
-
detecting insertion of one or more portable data storage devices into a security appliance, the security appliance being configured to receive the one or more portable data storage devices; receiving from the security appliance, via a communication network, data associated with the one or more portable data storage devices; analyzing the data to determine whether the one or more portable data storage devices store malware; and based on the determination, selectively identifying the one or more portable data storage devices storing the malware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for detecting malicious content within portable data storage devices, the method comprising:
-
detecting connection of a portable storage device to a host device; accessing device data stored on the portable storage device; analyzing the device data to determine whether the device data includes malware; and based on the determination, selectively identifying the portable storage device as storing the malware. - View Dependent Claims (12, 13)
-
-
14. A method for detecting malicious network content within a remote network server, the method comprising:
-
detecting connection of a client device to the remote network server; receiving data stored on the remote network server; analyzing the data to determine whether the data includes malware; and based on the determination, selectively identifying the remote network server as storing the malware. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system for detecting malicious content within portable data storage devices, the system comprising:
-
a quarantine module configured to detect one or more portable data storage devices upon insertion of the devices into a security appliance, the security appliance being configured to receive the one or more portable data storage devices; a controller configured to receive from the security appliance, via a communication network, data associated with the one or more portable data storage devices; an analysis module configured to analyze the data to determine whether the network data includes malware; and a security module to selectively identify, based on the determination, the one or more portable data storage devices storing the malware.
-
-
20. A non-transitory machine readable medium having embodied thereon executable code, the executable code being executed by a processor for performing a method for detecting malicious content within portable data storage devices, the method comprising:
-
detecting insertion of one or more portable data storage devices into a security appliance, the security appliance being configured to receive the one or more portable data storage devices; receiving from the security appliance, via a communication network, data associated with the one or more portable data storage devices; analyzing the data to determine whether the data includes malware; and based on the determination, selectively identifying the one or more portable data storage devices storing the malware.
-
Specification