Method and apparatus for identifying and characterizing errant electronic files
First Claim
1. A method for identifying and characterizing stored electronic files, said method comprising:
- selecting a file stored in a memory, said selecting step comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying step further comprises identifying sequential files from a directory of said memory;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums.
4 Assignments
0 Petitions
Accused Products
Abstract
A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored file; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums.
71 Citations
68 Claims
-
1. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory, said selecting step comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying step further comprises identifying sequential files from a directory of said memory;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (2, 3, 4)
-
-
5. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory, said selecting step comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying step further comprises identifying identically sized files from a directory of said memory;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory, said selecting step comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying step further comprises identifying files having content that fail to match their associated file type;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (11, 12, 13)
-
-
14. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory, said selecting step comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying step further comprises identifying files containing data that extends beyond an end of data marker;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory;
generating a unique checksum corresponding to said stored file, comprising generating a first checksum corresponding to a first one-thousand bytes of said stored file and a second checksum corresponding to a second portion of said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (20, 21, 22)
-
-
23. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory;
generating a unique checksum corresponding to said stored file, comprising generating a first checksum corresponding to a first portion of said stored file and a second checksum corresponding to a first ten-thousand bytes of said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (24, 25, 26)
-
-
27. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory;
generating a unique checksum corresponding to said stored file, comprising generating a unique checksum for graphics files based on vector graphics analysis;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (28, 29, 30)
-
-
31. A method for identifying and characterizing stored electronic files, said method comprising:
-
selecting a file stored in a memory;
generating a unique checksum corresponding to said stored file, comprising dividing a graphical image file into blocks and comparing relationships between said blocks;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (32, 33, 34)
-
-
35. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in said memory, said selecting function comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying function further comprises identifying sequential files from a directory of said memory;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (36, 37, 38)
-
-
39. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in said memory, said selecting function comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying function further comprises identifying identically sized files from a directory of said memory;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (40, 41, 42, 43)
-
-
44. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in said memory, said selecting function comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying function further comprises identifying files having content that fails to match their associated file type;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (45, 46, 47)
-
-
48. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in said memory, said selecting function comprising identifying suspect files from a plurality of files stored in said memory, wherein said identifying function further comprises identifying files containing data that extends beyond an end of data marker;
generating a unique checksum corresponding to said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (49, 50, 51, 52)
-
-
53. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in said memory;
generating a unique checksum corresponding to said stored file, comprising generating a first checksum corresponding to a first one-thousand bytes of said stored file and a second checksum corresponding to a second portion of said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (54, 55, 56)
-
-
57. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in said memory;
generating a unique checksum corresponding to said stored file, comprising generating a first checksum corresponding to a first portion of said stored file and a second checksum corresponding to a first ten-thousand bytes of said stored file;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (58, 59, 60)
-
-
61. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in-said memory;
generating a unique checksum corresponding to said stored file, wherein said generating function further comprises generating a unique checksum for graphics files based on vector graphics analysis;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (62, 63, 64)
-
-
65. A computer system, comprising:
-
a server having a memory connected thereto, said server being adapted to be connected to a network to permit remote storage and retrieval of data files from said memory; and
a file identification application operative with said server to identify errant files stored in said memory, said file identification application providing the functions of;
selecting a file stored in said memory;
generating a unique checksum corresponding to said stored file, wherein said generating function further comprises dividing a graphical image file into blocks and comparing relationships between said blocks;
comparing said unique checksum to each of a plurality of previously generated checksums, said plurality of previously generated checksums corresponding to known errant files; and
marking said file for deletion from said memory if said unique checksum matches one of said plurality of previously generated checksums. - View Dependent Claims (66, 67, 68)
-
Specification