DIGITAL PROTECTION THAT TRAVELS WITH DATA
9 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to a system and method for performing antimalware scanning of data files that is data-centric rather than device-centric, In the example, a plurality of computing devices are connected via a network. An originating device creates or first receives data, and scans the data for malware, After scanning the data, the originating device creates and attaches to the data a metadata record including the results of the malware scan, The originating device may also scan the data for malware contextually-relevant to a second device.
35 Citations
49 Claims
-
1-25. -25. (canceled)
-
26. At least one machine readable non-transitory storage medium having instructions stored thereon for providing data-centric computer security between a first device and a second device remote from the first device, wherein the instructions when executed by at least one processor cause the at least one processor to perform the following operations:
-
scanning a data file using a security scanner at the first device; creating a record associated with the data file based in part on results from the security scanner, the record comprising;
an identifier of the data file, a cryptographic hash of the data file, device information associated with the first device, scan information associated with the security scanner, user information associated with a user of the first device, and a time stamp of the record; andmaking the record accessible by the second device. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
-
-
34. At least one machine readable non-transitory storage medium having instructions stored thereon for providing data-centric computer security between a first device and a second device remote from the first device, wherein the instructions when executed by at least one processor cause the at least one processor to perform the following operations:
-
receiving a record at a sharing service system from the first device, wherein the record is associated with a data file and comprises an identifier of the data file, a cryptographic hash of the data file, device information associated with the first device, scan information associated with the security scanner, user information associated with a user of the first device, and a time stamp of the record; querying the second device to retrieve information associated with the second device and/or user information associated with a user of the second device; and providing at least a part of the record or a derivation thereof to the second device based on the information associated with the second device and/or the user information associated with the user of the second device. - View Dependent Claims (35)
-
-
36. At least one machine readable non-transitory storage medium having instructions stored thereon for providing data-centric computer security between a first device and a second device remote from the first device, wherein the instructions when executed by at least one processor cause the at least one processor to perform the following operations:
-
receiving a data file at the second device; retrieving a record associated with the data file, wherein the record comprises;
an identifier of the data file, a cryptographic hash of the data file, device information associated with the first device, scan information associated with the security scanner, user information associated with a user of the first device, and a time stamp of the record; andrendering at least a part of the record or a derivation thereof for display to a user at the second device. - View Dependent Claims (37, 38, 39, 40, 41)
-
-
42. An apparatus for providing data-centric computer security between a first device and a second device remote from the first device, the apparatus comprising:
-
at least one memory element; at least one processors coupled to the at least one memory element; a file sharing client of the first device that when executed by the at least one processors is configured to; create a record associated with a data file based in part on scan results from a security scanner of the first device, the record comprising;
an identifier of the data file, a cryptographic hash of the data file, device information associated with the first device, scan information associated with the security scanner, user information associated with a user of the first device, and a time stamp of the record; andmake the record accessible by the second device. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49)
-
Specification