Protection against malware on web resources utilizing scripts for content scanning
First Claim
Patent Images
1. A system for malware scanning of web resources, the system comprising:
- a client computer in communication with a web resource having downloadable web content;
a client authentication application running on the web resource for authenticating the client computer to the web resource;
an identifier interception module on the client computer;
a scan parameters database; and
a scan module on the client for scanning the web resource,wherein;
the scan parameters database stores a list of parameters for scanning the web resource;
the identifier interception module keeps track of a user identification for the web resource and stores them in the scan parameters database; and
the scan module reads the parameters and the user identification from the scan parameters database, authenticates itself to the web resource, and scans the web resource based on the scan parameters.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for identification of malware threats on web resources. The system employs a scheduled antivirus (AV) scanning of web resources. The scheduled scanning of web resources allows to create malware check lists and to configure access to web resources. Frequency and depth of inspection (i.e., scan) are determined for each web resource. The user identifiers are used for scheduled AV scanning of web resources. The system allows for scanning a web resource based on selected configurations without using additional client applications.
7 Citations
27 Claims
-
1. A system for malware scanning of web resources, the system comprising:
-
a client computer in communication with a web resource having downloadable web content; a client authentication application running on the web resource for authenticating the client computer to the web resource; an identifier interception module on the client computer; a scan parameters database; and a scan module on the client for scanning the web resource, wherein; the scan parameters database stores a list of parameters for scanning the web resource; the identifier interception module keeps track of a user identification for the web resource and stores them in the scan parameters database; and the scan module reads the parameters and the user identification from the scan parameters database, authenticates itself to the web resource, and scans the web resource based on the scan parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method for malware scanning of web resources, the method comprising:
-
connecting a client computer to a web resource having downloadable web content; authenticating the client computer to the web resource; and a scan module on the client for scanning the web resource, storing a list of parameters for scanning the web resource in a scan parameters database; keeping track of a user identification for the web resource and storing them in a scan parameters database; and the parameters and the user identification from the scan parameters database, authenticating to the web resource, and scanning the web resource based on the scan parameters. - View Dependent Claims (26, 27)
-
Specification