Efficient management and blocking of malicious code and hacking attempts in a network environment
First Claim
Patent Images
1. A method for preventing an outbreak of malicious code, comprising:
- a) identifying malicious code at a local location on a network;
b) encrypting information relating to the malicious code at the local location;
c) sending the encrypted information relating to the malicious code to a plurality of remote locations utilizing the network; and
d) blocking instances of the malicious code at the remote locations for a predetermined amount of time based on the information;
e) registering at least one of a name and checksum of a file containing the malicious code as a known threat;
f) wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the malicious code;
g) wherein the information relating to the malicious code includes an identification of the source of the malicious code, wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time.
11 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for preventing an outbreak of malicious code. First, malicious code is identified at a local location on a network. Information relating to the malicious code such as type, context, protocol, severity, reporting server, and IP address, is encrypted at the local location. The encrypted information relating to the malicious code is sent to a plurality of remote locations utilizing the network. Instances of the malicious code are blocked at the remote locations for a predetermined amount of time based on the information.
137 Citations
21 Claims
-
1. A method for preventing an outbreak of malicious code, comprising:
-
a) identifying malicious code at a local location on a network; b) encrypting information relating to the malicious code at the local location; c) sending the encrypted information relating to the malicious code to a plurality of remote locations utilizing the network; and d) blocking instances of the malicious code at the remote locations for a predetermined amount of time based on the information; e) registering at least one of a name and checksum of a file containing the malicious code as a known threat; f) wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the malicious code; g) wherein the information relating to the malicious code includes an identification of the source of the malicious code, wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time. - View Dependent Claims (2, 3, 4, 16, 17, 18, 19, 20, 21)
-
-
5. A computer program product for managing an outbreak of malicious code, comprising:
-
a) computer code for identifying malicious code at a local location on a network; b) computer code for encrypting information relating to the malicious code at the local location; c) computer code for sending the encrypted information relating to the malicious code to a plurality of remote locations utilizing the network; and d) computer code for blocking instances of the malicious code at the remote locations for a predetermined amount of time based on the information; e) computer code for registering at least one of a name and checksum of a file containing the malicious code as a known threat; f) wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the malicious code; g) wherein the information relating to the malicious code includes an identification of the source of the malicious code, wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time.
-
-
6. A system for preventing an outbreak of malicious code, comprising:
-
a) logic for identifying malicious code at a local location on a network; b) logic for encrypting information relating to the malicious code at the local location; c) logic for sending the encrypted information relating to the malicious code to a plurality of remote locations utilizing the network; and d) logic for blocking instances of the malicious code at the remote locations for a predetermined amount of time based on the information; e) logic for registering at least one of a name and checksum of a file containing the malicious code as a known threat; f) wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the malicious code; g) wherein the information relating to the malicious code includes an identification of the source of the malicious code, wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time.
-
-
7. A method for denying access to a hacker, comprising:
-
a) identifying an attack by a hacker at a local location on a network; b) encrypting information relating to the attack at the local location; c) sending the encrypted information relating to the attack to a plurality of remote locations utilizing the network; and d) restricting access to the remote locations for a predetermined amount of time based on the information; e) registering at least one of a name and checksum of a file associated with the attack as a known threat; f) wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the attack; g) wherein the information relating to the attack includes an identification of the source of the attack, wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for denying access to a hacker, comprising:
-
a) computer code for identifying an attack by a hacker at a local location on a network; b) computer code for encrypting information relating to the attack at the local location; c) computer code for sending the encrypted information relating to the attack to a plurality of remote locations utilizing the network; and d) computer code for restricting access to the remote locations for a predetermined amount of time based on the information; e) computer code for registering at least one of a name and checksum of a file associated with the attack as a known threat; f) wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the attack; g) wherein the information relating to the attack includes an identification of the source of the attack, wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time.
-
-
14. A system for denying access to a hacker, comprising:
-
a) logic for identifying an attack by a hacker at a local location on a network; b) logic for encrypting information relating to the attack at the local location; c) logic for sending the encrypted information relating to the attack to a plurality of remote locations utilizing the network; and d) logic for restricting access to the remote locations for a predetermined amount of time based on the information; e) logic for registering at least one of a name and checksum of a file associated with the attack as a known threat; f) wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the attack; g) wherein the information relating to the attack includes an identification of the source of the attack wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time.
-
-
15. A method for preventing an outbreak of malicious code, comprising:
-
a) identifying malicious code at a local location on a network; b) wherein the malicious code is at least one of a virus, worm and, Trojan; c) wherein the malicious code is recognized based at least in part on recognizing that at least one of a checksum and a file name of the malicious code is registered as a known threat; d) encrypting information relating to the malicious code at the local location, wherein the information is selected from the group consisting of a type, context, protocol, severity, reporting server, and IP address associated with the malicious code, and wherein the information relating to the attack includes an identification of the source of the attack, wherein communications originating at the identified source are denied access to the remote locations for the predetermined amount of time; e) sending the encrypted information relating to the malicious code to a plurality of remote locations utilizing the network; f) restricting access to the remote locations by communications originating at the source of the malicious code for a predetermined amount of time based on the information; g) executing countermeasures for limiting the effect of the malicious code at the local location; and h) retrieving additional information about the malicious code if an aspect of the attack is not recognized.
-
Specification