System, method and computer program product for updating a security system definition database based on prioritized instances of known unwanted data
First Claim
Patent Images
1. A method to be performed in an electronic processing environment, comprising:
- assigning a priority to a plurality of instances of known unwanted data, wherein the priority includes a distribution level characteristic associated with proliferation of each of the plurality of instances;
generating signatures for the plurality of instances of known unwanted data based on the assigned priority;
downloading a plurality of new signatures in response to identifying new signatures'"'"' associated priorities; and
communicating information associated with at least one of the plurality of instances of known unwanted data over a network as part of an update for a system, wherein the information includes a detection technique for detecting an occurrence of the at least one instance of known unwanted data, the information being associated with a highest priority instance of the known unwanted data, and being communicated ahead of other instances of the plurality of instances having a lesser priority.
10 Assignments
0 Petitions
Accused Products
Abstract
A prioritized update system, method, and computer program product are provided. In use, a priority is assigned to a plurality of instances of known unwanted data. In addition, information associated with at least one of the instances of known unwanted data is communicated over a network for updating a system, based on the priority. In one embodiment, the prioritized update system may be provided for updating a security system definition database, based on prioritized instances of known unwanted data.
-
Citations
23 Claims
-
1. A method to be performed in an electronic processing environment, comprising:
-
assigning a priority to a plurality of instances of known unwanted data, wherein the priority includes a distribution level characteristic associated with proliferation of each of the plurality of instances; generating signatures for the plurality of instances of known unwanted data based on the assigned priority; downloading a plurality of new signatures in response to identifying new signatures'"'"' associated priorities; and communicating information associated with at least one of the plurality of instances of known unwanted data over a network as part of an update for a system, wherein the information includes a detection technique for detecting an occurrence of the at least one instance of known unwanted data, the information being associated with a highest priority instance of the known unwanted data, and being communicated ahead of other instances of the plurality of instances having a lesser priority. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 20, 21, 22, 23)
-
-
17. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
-
assigning a priority to a plurality of instances of known unwanted data, wherein the priority includes a distribution level characteristic associated with proliferation of each of the plurality of instances; generating signatures for the plurality instances of known unwanted data based on the assigned priority; downloading a plurality of new signatures in resonance to identifying new signatures'"'"' associated priorities; and communicating information associated with at least one of the plurality of instances of known unwanted data over a network as part of an update for a system, wherein the information includes a detection technique for detecting an occurrence of the at least one instance of known unwanted data, the information being associated with a highest priority instance of the known unwanted data, and being communicated ahead of other instances of the plurality of instances having a lesser priority.
-
-
18. A system, comprising:
-
a processor, wherein the system is configured for; assigning a priority to a plurality of instances of known unwanted data, wherein the priority includes a distribution level characteristic associated with proliferation of each of the plurality of instances; generating signatures for the plurality of instances of known unwanted data based on the assigned priority; downloading a plurality of new signatures in response to identifying new signatures'"'"' associated priorities; and communicating information associated with at least one of the plurality of instances of known unwanted data over a network as part of an update for a system, wherein the information includes a detection technique for detecting an occurrence of the at least one instance of known unwanted data, the information being associated with a highest priority instance of the known unwanted data, and being communicated ahead of other instances of the plurality of instances having a lesser priority. - View Dependent Claims (19)
-
Specification