System, method, and computer program product for preventing communication of unwanted network traffic by holding only a last portion of the network traffic
First Claim
Patent Images
1. A method, comprising:
- receiving, through an input port, network traffic associated with a file being transferred from a source device to a destination device, wherein the network traffic is segmented into predetermined portion types;
determining, by a processor, identifying information regarding the file;
employing the identifying information to consult a file reputation database over a network;
receiving, through a second input port, a message based upon the consultation with the file reputation database;
until the message is received, preventing passage to the destination device of a last portion of network traffic associated with the file transfer; and
forwarding, through an output port, the last portion of the network traffic when the message does not indicate that the file is unwanted;
wherein the last portion of network traffic comprise a positive integer quantity of the predetermined portion types.
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for preventing communication of unwanted network traffic by holding only a last portion of the network traffic. In use, network traffic associated with a file transfer is received. Additionally, only a last portion of the network traffic associated with the file transfer is held for determining whether the file is unwanted. Further, the last portion of the network traffic associated with the file transfer is conditionally forwarded to a destination device, based on the determination.
-
Citations
15 Claims
-
1. A method, comprising:
-
receiving, through an input port, network traffic associated with a file being transferred from a source device to a destination device, wherein the network traffic is segmented into predetermined portion types; determining, by a processor, identifying information regarding the file; employing the identifying information to consult a file reputation database over a network; receiving, through a second input port, a message based upon the consultation with the file reputation database; until the message is received, preventing passage to the destination device of a last portion of network traffic associated with the file transfer; and forwarding, through an output port, the last portion of the network traffic when the message does not indicate that the file is unwanted; wherein the last portion of network traffic comprise a positive integer quantity of the predetermined portion types. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising:
-
receiving, through an input port, network traffic associated with a file being transferred from a source device to a destination device, wherein the network traffic is segmented into predetermined portion types; determining, by a processor, information regarding the file; employing the information regarding the file to consult a computing resource, the consultation regarding whether the file is unwanted; receiving, from the computing resource as a response to the consultation, a message based upon information received over a network and through a second input port, the message indicating whether or not the file is unwanted; until the message is received, preventing passage to the destination device of a last portion of network traffic associated with the file transfer; and forwarding, through an output port, the last portion of the network traffic when the message does not indicate that the file is unwanted; wherein the last portion of network traffic comprise a positive integer quantity of the predetermined portion types. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving, through an input port, network traffic associated with a file being transferred to a destination device, wherein the network traffic is segmented into predetermined portion types; determining, by a processor, identifying information regarding the file; creating a query based upon the identifying information; employing the query to consult a database, the consultation regarding whether the file is unwanted; receiving a query result as a response to the consultation, the query result based upon information received over a network and through a second input port, the query result also indicating whether or not the file is unwanted; until the query result is received, preventing passage to the destination device of a last portion of network traffic associated with the file transfer; and forwarding, through an output port, the last portion of the network traffic when the query result does not indicate that the file is unwanted; wherein the last portion of network traffic comprise a positive integer quantity of the predetermined portion types. - View Dependent Claims (12, 13, 14, 15)
-
Specification