Proxy-based malware scan
First Claim
Patent Images
1. A system comprising at least one processor coupled to at least one machine-readable storage medium storing instructions executable by the at least one processor to implement:
- a proxy server configured to facilitate access to a scanning engine associated with a network live meeting conference service, wherein the scanning engine is configured to check traffic corresponding to a plurality of members of said conference service for harmful data; and
a management component configured to regulate operation of the scanning engine as a function of availability of the scanning engine, at least in part by suspending scanning operations and enabling a subset of the plurality of members to continue the network live meeting conference service while the scanning operations are suspended in response to exceeding a load threshold of the scanning engine.
2 Assignments
0 Petitions
Accused Products
Abstract
A system that employs out-of-process (‘out-of-proc’) architectures with respect to malware scanning related to network services applications is provided. The ‘out-of-proc’ malware (e.g., virus) scanning is employed in connection with a web conferencing server. This architecture enables more versatile options related to scanning, for example, selective bypass in a crisis situation.
-
Citations
20 Claims
-
1. A system comprising at least one processor coupled to at least one machine-readable storage medium storing instructions executable by the at least one processor to implement:
-
a proxy server configured to facilitate access to a scanning engine associated with a network live meeting conference service, wherein the scanning engine is configured to check traffic corresponding to a plurality of members of said conference service for harmful data; and a management component configured to regulate operation of the scanning engine as a function of availability of the scanning engine, at least in part by suspending scanning operations and enabling a subset of the plurality of members to continue the network live meeting conference service while the scanning operations are suspended in response to exceeding a load threshold of the scanning engine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method, comprising:
-
monitoring availability of a malware scanning application for a conference application supporting a live meeting conference conducted over a communications network; determining an issue with the malware scanning application in responcse to exceeding a load threshold of the canning application; sending a notification of the load issue of the scanning application to a plurality of entities participating in the conference, wherein the plurality of entities are connected via the conference application; suspending operation of the malware scanning application based on the load issue of the scanning application; and enabling a subset of the plurality of entities to continue participation in the conference while bypassing operation of the suspended malware scanning application. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable storage device storing instructions, the instructions if executed by a processor causing the processor to perform operations comprising:
-
identifying a problem with a remote malware scanning application for scanning traffic corresponding to a plurality of members of receiving a network live meeting conference service for harmful data; suspending operation of the remote malware scanning application as a function of the problem in response to exceeding a load threshold of the scanning application, while enabling a subset of the plurality of members to continue to receive the service; and restarting the remote malware scanning application based upon correction of the problem. - View Dependent Claims (18, 19, 20)
-
Specification