×

Executable download tracking system

  • US 8,959,624 B2
  • Filed: 10/31/2007
  • Issued: 02/17/2015
  • Est. Priority Date: 10/31/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method of monitoring computer-readable instructions, comprising:

  • identifying an executable portion of the computer-readable instructions received on a computer network from a source;

    determining, by a central system configured to perform an analysis to identify a risk, that the executable portion of the computer-readable instructions is a risk;

    responsive to determining by the central system that the executable portion of the computer-readable instructions is a risk, transmitting the executable portion to an internal antivirus software on a computing device for analysis and transmitting the results of the central system analysis to the computing device;

    analyzing, by the computing device, the executable portion by the internal antivirus software;

    comparing the transmitted results of the central system analysis with results of the internal antivirus software analysis to determine whether the central system and internal antivirus software obtained the same results, the comparing being performed by the computing device to which the executable portion was transmitted from the central system;

    responsive to determining, based on the comparison between the results of the central system analysis and the results of the internal antivirus software analysis, that the central system and internal antivirus software obtained the same results, marking the executable portion for continuous monitoring until the identified risk is neutralized;

    responsive to determining, based on the comparison between the results of the central system analysis and the results of the internal antivirus software analysis, that the central system and internal antivirus software obtained different results, flagging the results as conflicting and further analyzing the different results, including;

    identifying a level of importance of the conflicting results;

    neutralizing the risk on the computer network; and

    identifying a source of the risk; and

    generating a report that includes the risk, wherein the report includes a name of the risk, information about the risk'"'"'s signature, a version of the risk, a type of solution that was used to neutralize the risk, a file size of the risk, and a latest update to anti-virus software,wherein the report is used to create a risk signature dictionary that includes information about signatures of a plurality of riskswherein the report is updated at least once a week; and

    using the report to update a data file that identifies future risks,wherein user identification and a password are required for access to the data file,wherein the data file includes characteristics of known risks, a date and time at which the risk was identified, an action required to neutralize the risk, a source of the risk, and related risks.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×