Protection against malware on web resources
First Claim
Patent Images
1. A system for scheduled malware scanning of web resources, the system comprising:
- at least one web resource having downloadable web content;
a client computer in communication with the web resource over data transfer protocols;
a client authentication application running on the web resource, wherein the client authentication application authenticates the client computer to the web resource;
a check list module on the client;
an identifier interception module on the client computer;
a scan parameters database accessible by the check list module and by the identifier interception module;
a scan module on the client for scanning the web resource; and
a web pages database connected to the scan module,wherein;
the check list module generates a check list of parameters for scanning the web resource and stores them in the scan parameters database;
the identifier interception module keeps track of user identifications on the web resource and provides identifiers to the scan parameters database;
the scan module reads scan parameters from the scan parameters database, authenticates itself to the web resource using the user identifications, and scans the web resource based on the scan parameters; and
the scan module stores results of a scan into the web page database.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system for identification of malware threats on web resources. The system employs a scheduled antivirus (AV) scanning of web resources. The scheduled scanning of web resources allows to create malware check lists and to configure access to web resources. Frequency and depth of inspection (i.e., scan) are determined for each web resource. The user identifiers are used for scheduled AV scanning of web resources. The system allows for scanning a web resource based on selected configurations without using additional client applications.
-
Citations
20 Claims
-
1. A system for scheduled malware scanning of web resources, the system comprising:
-
at least one web resource having downloadable web content; a client computer in communication with the web resource over data transfer protocols; a client authentication application running on the web resource, wherein the client authentication application authenticates the client computer to the web resource; a check list module on the client; an identifier interception module on the client computer; a scan parameters database accessible by the check list module and by the identifier interception module; a scan module on the client for scanning the web resource; and a web pages database connected to the scan module, wherein; the check list module generates a check list of parameters for scanning the web resource and stores them in the scan parameters database; the identifier interception module keeps track of user identifications on the web resource and provides identifiers to the scan parameters database; the scan module reads scan parameters from the scan parameters database, authenticates itself to the web resource using the user identifications, and scans the web resource based on the scan parameters; and the scan module stores results of a scan into the web page database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for scheduled malware scanning of web resources, the method comprising:
-
establishing connection to a web resource having downloadable web content; launching a client authentication application on the web resource; generating a check list of web addresses visited by a user; intercepting and recording user identifiers; storing a list of web addresses and the identifiers into a scan parameters database; reading scan parameters from the scan parameters database and authenticating the client to the web resource; scanning the web resource, using scan parameters; and storing results of a scan, wherein the scanning employs a combination of a file anti-virus and a web ant-virus. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification