Embedded anti-virus scanner for a network adapter
First Claim
Patent Images
1. A network adapter system, comprising:
- a processor positioned on a network adapter and configured to assemble received packets, to perform a scan on the received packets to identify a virus, a worm, or a Trojan horse, in response to a determination that the received packets use a hypertext transfer protocol or a file transfer protocol, and to bypass the scan on the received packets, in response to a determination that the received packets do not use the hypertext transfer protocol or the file transfer protocol.
10 Assignments
0 Petitions
Accused Products
Abstract
A network adapter system and associated method are provided. The network adapter system includes a processor positioned on a network adapter coupled between a computer and a network. Such processor is configured for scanning network traffic transmitted between the computer and the network.
75 Citations
20 Claims
-
1. A network adapter system, comprising:
a processor positioned on a network adapter and configured to assemble received packets, to perform a scan on the received packets to identify a virus, a worm, or a Trojan horse, in response to a determination that the received packets use a hypertext transfer protocol or a file transfer protocol, and to bypass the scan on the received packets, in response to a determination that the received packets do not use the hypertext transfer protocol or the file transfer protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A method for scanning network traffic, the method comprising:
-
receiving packets at a network adapter including a processor positioned thereon; assembling the received packets; scanning the received packets utilizing the processor to identify a virus, a worm, or a Trojan horse, in response to determining that the received packets use a hypertext transfer protocol or a file transfer protocol; and bypassing the scanning, in response to determining the received packets do not use the hypertext transfer protocol or the file transfer protocol. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A network adapter system, comprising:
-
means for assembling at least some received packets; and means for performing a scan on the received packets to identify a virus, a worm, or a Trojan horse, in response to a determination that the received packets use a hypertext transfer protocol or a file transfer protocol, and for bypassing the scan, in response to a determination that the received packets do not use the hypertext transfer protocol or the file transfer protocol. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification