Method and apparatus for identifying and characterizing errant electronic files
First Claim
1. A computer-implemented method, comprising:
- under control of one or more configured computer systems;
selecting an image file from a computer-readable storage medium;
generating a checksum for the selected image file according to at least one of;
vector graphics analysis;
ordividing an image corresponding to the selected image file into a plurality of zones and comparing relationships between respective ones of the plurality of zones;
comparing the checksum of the selected image file to one or more unauthorized checksums associated with one or more respective unauthorized files;
determining that the checksum of the selected image file matches one of the one or more unauthorized checksums; and
storing information indicating the selected image file is an unauthorized file.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored fire; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums.
39 Citations
19 Claims
-
1. A computer-implemented method, comprising:
under control of one or more configured computer systems; selecting an image file from a computer-readable storage medium; generating a checksum for the selected image file according to at least one of; vector graphics analysis;
ordividing an image corresponding to the selected image file into a plurality of zones and comparing relationships between respective ones of the plurality of zones; comparing the checksum of the selected image file to one or more unauthorized checksums associated with one or more respective unauthorized files; determining that the checksum of the selected image file matches one of the one or more unauthorized checksums; and storing information indicating the selected image file is an unauthorized file. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. A system, comprising:
-
a processor; and a computer-readable storage medium having instructions stored thereon that are executable by the processor to cause to the system to perform operations comprising; selecting an image file from the computer storage medium; generating a checksum for the selected image file according to at least one of; vector graphics analysis;
ordividing an image corresponding to the selected image file into a plurality of zones and comparing relationships between respective ones of the plurality of zones; comparing the checksum of the selected image file to one or more unauthorized checksums associated with one or more respective unauthorized files; determining that the checksum of the selected image file matches one of the one or more unauthorized checksums; and storing information indicating the selected image file is an unauthorized file. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium having instructions stored thereon that are executable by a computing system having one or more hardware processors to cause the computing system to perform operations comprising:
-
selecting an image file from a computer-readable storage medium; generating a checksum for the selected image file according to at least one of; vector graphics analysis;
ordividing an image corresponding to the selected image file into a plurality of zones and comparing relationships between respective ones of the plurality of zones; comparing the checksum of the selected image file to one or more unauthorized checksums associated with respective unauthorized files; determining that the checksum of the selected image file matches one of the one or more unauthorized checksums; and storing information indicating instructions to characterize the selected image file is an unauthorized file. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification