Real-time network updates for malicious content
First Claim
Patent Images
1. A method for establishing the reputation of message components, the method comprising:
- disassembling an electronic mail message into constituent components at a security appliance coupled to an end-user computing device that processes electronic mail;
identifying a reputation for each of the constituent components, the identified reputation based on aggregated data specific to the constituent component and received from a data center;
processing one or more of the constituent components at the security appliance using a hash process to create a thumbprint of the one or more constituent components; and
transmitting the thumbprints from the security appliance to the data center for subsequent processing and distribution to other security appliances, wherein each of the transmitted thumbprints has a corresponding reputation.
23 Assignments
0 Petitions
Accused Products
Abstract
A global response network collects, analyzes, and distributes “cross-vector” threat-related information between security systems to allow for an intelligent, collaborative, and comprehensive real-time response.
-
Citations
18 Claims
-
1. A method for establishing the reputation of message components, the method comprising:
-
disassembling an electronic mail message into constituent components at a security appliance coupled to an end-user computing device that processes electronic mail; identifying a reputation for each of the constituent components, the identified reputation based on aggregated data specific to the constituent component and received from a data center; processing one or more of the constituent components at the security appliance using a hash process to create a thumbprint of the one or more constituent components; and transmitting the thumbprints from the security appliance to the data center for subsequent processing and distribution to other security appliances, wherein each of the transmitted thumbprints has a corresponding reputation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for establishing the reputation of message components, the system comprising:
a security appliance coupled to an end-user computing device that processes electronic mail, the security appliance comprising; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor; disassembles an electronic mail message into constituent components, identifies a reputation for each of the constituent components, the identified reputation based on aggregated data specific to the constituent component and received from a data center, processes one or more of the constituent components using a hash process to create a thumbprint of the one or more constituent components; and a communications interface for transmitting the thumbprints to a data center for subsequent processing and distribution to other security appliances, wherein each of the transmitted thumbprints has a corresponding reputation. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
18. A non-transitory computer-readable storage medium having embodied thereon a program executable by a processor to perform a method for establishing the reputation of message components, the method comprising:
-
disassembling an electronic mail message into constituent components at a security appliance coupled to an end-user computing device that processes electronic mail; identifying a reputation for each of the constituent components, the identified reputation based on aggregated data specific to the constituent component and received from a data center; processing one or more of the constituent components at the security appliance using a hash process to create a thumbprint of the one or more constituent components; and transmitting the thumbprints from the security appliance to the data center for subsequent processing and distribution to other security appliances, wherein each of the transmitted thumbprints has a corresponding reputation.
-
Specification