MALWARE SCANNING FOR NETWORK-ATTACHED STORAGE SYSTEMS
First Claim
1. A data storage system, comprising:
- a memory that stores computer executable components; and
a processor that executes computer executable components stored in the memory, wherein the computer executable components comprise;
a file identification component that obtains an identifier for a target file stored by the data storage system;
a lookup component that searches a scan status data structure for a malware scan result corresponding to the identifier for the target file; and
a file access component that grants access to the target file in response to the lookup component obtaining the malware scan result from the scan status data structure and the malware scan result indicating that the target file contains no malware.
7 Assignments
0 Petitions
Accused Products
Abstract
Malware scanning for network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a file identification component that obtains an identifier for a target file stored by the data storage system; a lookup component that searches a scan status data structure for a malware scan result corresponding to the identifier for the target file; and a file access component that grants access to the target file in response to the lookup component obtaining the malware scan result from the scan status data structure and the malware scan result indicating that the target file contains no malware.
7 Citations
20 Claims
-
1. A data storage system, comprising:
-
a memory that stores computer executable components; and a processor that executes computer executable components stored in the memory, wherein the computer executable components comprise; a file identification component that obtains an identifier for a target file stored by the data storage system; a lookup component that searches a scan status data structure for a malware scan result corresponding to the identifier for the target file; and a file access component that grants access to the target file in response to the lookup component obtaining the malware scan result from the scan status data structure and the malware scan result indicating that the target file contains no malware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
obtaining, by a device operatively coupled to a processor, an identifier for a target file; searching, by the device, a scan status table for a malware scan result corresponding to the identifier for the target file; and granting, by the device, access to the target file in response to the malware scan result being present in the scan status table and the malware scan result indicating that the target file comprises no malware. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A machine-readable storage medium comprising computer executable instructions that, when executed by a processor, facilitate performance of operations, the operations comprising:
-
obtaining an identifier for a target file; searching a scan status data structure for a malware scan result corresponding to the identifier for the target file; and granting access to the target file in response to the malware scan result being determined to be present in the scan status data structure and the malware scan result indicating that the target file contains no malware. - View Dependent Claims (17, 18, 19, 20)
-
Specification