×

System and method of monitoring and controlling application files

  • US 8,689,325 B2
  • Filed: 06/01/2005
  • Issued: 04/01/2014
  • Est. Priority Date: 03/14/2003
  • Status: Active Grant
First Claim
Patent Images

1. A system configured to protect a second computer from malicious software programs based at least partially on information collected from a first computer over an Internet, the system comprising:

  • a first computer;

    a database stored in the first computer including identification information for malicious and non-malicious software programs;

    a first execution launch detection module configured to detect a launch of a software program and to generate a hash associated with the software program;

    a first client inventory module configured to access the database and determine whether the software program on the first computer is identified in the database;

    a workstation management module configured to apply a policy to the software program if the software program is identified in the database as non-malicious, the policy including one or more of limiting a user'"'"'s access to the software program based on a quota or a network load;

    a first upload-download module associated with the first computer and configured to transmit information relating to the software program on the first computer if the software program is not identified in the database to a database factory, the information comprising at least the hash associated with the software program, wherein the information is at least partially created at the first computer, the first upload-download module being configured to receive software program information relating to the software program and a classification of the software program from the database factory, the classification being determined by an analysis of the information received from the first upload-download module;

    a second computer;

    a second upload-download module configured to receive the software program information relating to the software program and the classification of the software program from the database factory; and

    a second client inventory module configured to receive and store the classification of the software program received from the database factory to the second computer.

View all claims
  • 23 Assignments
Timeline View
Assignment View
    ×
    ×