SYSTEM AND METHODS FOR PROTECTING COMPUTING DEVICES FROM MALWARE ATTACKS
First Claim
1. A protection system for protecting at least one computing device from malicious software attacking, said at least one computing device in communication via a computer network with at least one web server hosting at least one website and operable to generate at least one web page in response to receiving a data request, the protection system comprising:
- at least one data scanner operable to scan a file system associated with said at least one website, to identify at least one web-based malware vulnerability, and further operable to generate an automated web-based malware vulnerability report comprising data pertaining to said at least one web-based malware vulnerability; and
at least one report processer operable to analyze said automated web-based malware vulnerability report and further operable to generate at least one software based protective element;
wherein said at least one software based protective element is associated with at least one protective agent.
1 Assignment
0 Petitions
Accused Products
Abstract
An online protection system and method for actively filtering webpages using a rule-based protective agent such that internet connectable communication devices receive a clean copy of the webpage. The protective agent may be operable to perform rule based filtering of static and web-generated pages. The system includes a data scanner, a report processor and a rule-based logic generator. The protection system may include malware server site scanner to prevent any potential backdoors and possibly introducing remedy to the infected files or quarantining in a non-standard directory locations.
-
Citations
20 Claims
-
1. A protection system for protecting at least one computing device from malicious software attacking, said at least one computing device in communication via a computer network with at least one web server hosting at least one website and operable to generate at least one web page in response to receiving a data request, the protection system comprising:
-
at least one data scanner operable to scan a file system associated with said at least one website, to identify at least one web-based malware vulnerability, and further operable to generate an automated web-based malware vulnerability report comprising data pertaining to said at least one web-based malware vulnerability; and at least one report processer operable to analyze said automated web-based malware vulnerability report and further operable to generate at least one software based protective element; wherein said at least one software based protective element is associated with at least one protective agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for protecting, in an improved manner, at least one computing device from a malicious software attack, said computing device in communication with at least one web server via a computer network and operable to access at least one website installed on said at least one web server, said method comprising:
-
said web server, scanning a file system structure associated with said website to identify at least one web-based malware vulnerability; said web server, creating an automated web-based malware vulnerability report comprising data pertaining to said at least one web-based malware vulnerability; said web server, generating at least one software based protective element; said web server, executing at least one protective agent; said web server, associating said at least one software based protective element with said at least one protective agent. - View Dependent Claims (18, 19, 20)
-
Specification