Protecting a computer coupled to a network from malicious code infections
First Claim
1. A computer implemented method by which a first computer determines that it is safe to communicate with a second computer coupled to the first computer over a network, said method comprising the steps of the first computer:
- detecting that the second computer has initiated a test open of a first file stored in association with the first computer;
sending to the second computer a message conveying information pertaining to malicious code scanning capabilities of the first computer;
detecting an actual open command for the first file from the second computer responsive to second computer determining that the first computer has acceptable malicious code scanning capabilities;
detecting a malicious code scan of the first file conducted over the network by the second computer responsive to the second computer determining that first computer does not contain malicious code scanning capabilities;
detecting an actual open command for the first file from the second computer when the malicious code scan of the first file over the network indicates that the first file does not contain malicious code; and
when the test open is followed by an actual open command from the second computer seeking to actually open the first file, determining that it is safe to communicate with the second computer.
2 Assignments
0 Petitions
Accused Products
Abstract
Computer implement methods, apparati, and computer-readable media for enabling a first computer (12) to determine that it is safe to communicate with a second computer (10) coupled to the first computer (12) over a network (15). In a method embodiment of the present invention, the first computer (12) detects (21) that the second computer (10) has initiated a test open of a file (14) associated with the first computer (12). When the test open is followed by an actual open command by which the second computer (10) seeks to actually open the same file (14), the first computer (12) determines (23) that it is safe to communicate with the second computer (10).
-
Citations
25 Claims
-
1. A computer implemented method by which a first computer determines that it is safe to communicate with a second computer coupled to the first computer over a network, said method comprising the steps of the first computer:
-
detecting that the second computer has initiated a test open of a first file stored in association with the first computer; sending to the second computer a message conveying information pertaining to malicious code scanning capabilities of the first computer; detecting an actual open command for the first file from the second computer responsive to second computer determining that the first computer has acceptable malicious code scanning capabilities; detecting a malicious code scan of the first file conducted over the network by the second computer responsive to the second computer determining that first computer does not contain malicious code scanning capabilities; detecting an actual open command for the first file from the second computer when the malicious code scan of the first file over the network indicates that the first file does not contain malicious code; and when the test open is followed by an actual open command from the second computer seeking to actually open the first file, determining that it is safe to communicate with the second computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. Apparatus associated with a first computer desiring to communicate safely with a second computer coupled to the first computer over a network, said apparatus comprising:
-
test open detecting means for detecting that the second computer has initiated a test open of a file stored in association with the first computer; coupled to the test open detecting means, sending means for sending to the second computer a message conveying information pertaining to malicious code scanning capabilities of the first computer; coupled to the sending means, observing means for observing an actual open command for the first file from the second computer to actually open the same file responsive to second computer determining that the first computer has acceptable malicious code scanning capabilities; coupled to the sending means, code scan detecting means for detecting a malicious code scan of the first file conducted over the network by the second computer responsive to the second computer determining that first computer does not contain malicious code scanning capabilities; coupled to the code scan detecting means second observing means for observing an actual open command for the first file from the second computer to actually open the same file when the malicious code scan of the first file over the network indicates that the first file does not contain malicious code; and coupled to the second observing means, safety means for determining that it is safe to communicate with the second computer.
-
-
25. A computer-readable medium containing computer program instructions for enabling a first computer to determine that it is safe to communicate with a second computer coupled to the first computer over a network, said computer program instructions performing the steps of:
-
detecting that the second computer has initiated a test open of a first file stored in association with the first computer; sending to the second computer a message conveying information pertaining to malicious code scanning capabilities of the first computer; detecting an actual open command for the first file from the second computer responsive to second computer determining that the first computer has acceptable malicious code scanning capabilities; detecting a malicious code scan of the first file conducted over the network by the second computer responsive to the second computer determining that first computer does not contain malicious code scanning capabilities; detecting an actual open command for the first file from the second computer when the malicious code scan of the first file over the network indicates that the first file does not contain malicious code; and when the test open is followed by an actual open command from the second computer seeking to actually open the first file, determining that it is safe to communicate with the second computer.
-
Specification