Systems and methods for updating content detection devices and systems
First Claim
Patent Images
1. A network gateway device comprising:
- at least one processor;
at least one memory device;
at least one network interface device;
content detection and configuration data stored on the at least one memory device; and
an instruction set, stored in the at least one memory device and executable by the at least one processor to;
receive network traffic via the at least one network interface device;
process the received network traffic in view of the content detection and configuration data stored in the at least one memory device to enforce policies defined at least in part by the content detection and configuration data and including at least one policy that defines a suspicious category of network traffic, the policy enforcement performed to determine whether to allow the received network traffic to pass, the policy enforcement including user identification, content identification, and at least one of source verification and destination verification, wherein when network traffic is determined to violate the at least one policy defining suspicious network traffic, forwarding the network traffic to an analysis process that will perform analysis on network traffic to determine whether the network traffic contains a threat desired to be detected and, when the network traffic is determined to contain a threat desired to be detected, the analysis process generates additional content detection data to detect the threat in subsequently received network traffic;
receive, via the network interface device, the additional content detection data indirectly from the analysis process via an update station;
store the additional content detection data on the at least one memory device;
process subsequently received network traffic in view of the additional content detection data;
block network traffic determined to violate at least one policy; and
allow network traffic to pass that does not violate a policy.
0 Assignments
1 Petition
Accused Products
Abstract
Systems, methods, and software for processing received network traffic content in view of content detection data and configuration data to either block, permit, or to further evaluate network traffic content when entering a network.
-
Citations
9 Claims
-
1. A network gateway device comprising:
-
at least one processor; at least one memory device; at least one network interface device; content detection and configuration data stored on the at least one memory device; and an instruction set, stored in the at least one memory device and executable by the at least one processor to; receive network traffic via the at least one network interface device; process the received network traffic in view of the content detection and configuration data stored in the at least one memory device to enforce policies defined at least in part by the content detection and configuration data and including at least one policy that defines a suspicious category of network traffic, the policy enforcement performed to determine whether to allow the received network traffic to pass, the policy enforcement including user identification, content identification, and at least one of source verification and destination verification, wherein when network traffic is determined to violate the at least one policy defining suspicious network traffic, forwarding the network traffic to an analysis process that will perform analysis on network traffic to determine whether the network traffic contains a threat desired to be detected and, when the network traffic is determined to contain a threat desired to be detected, the analysis process generates additional content detection data to detect the threat in subsequently received network traffic; receive, via the network interface device, the additional content detection data indirectly from the analysis process via an update station; store the additional content detection data on the at least one memory device; process subsequently received network traffic in view of the additional content detection data; block network traffic determined to violate at least one policy; and allow network traffic to pass that does not violate a policy. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
receiving network traffic via at least one network interface device; processing the received network traffic, by executing instructions on at least one processor of a data network device, in view of content detection and configuration data stored on at least one memory device to enforce policies defined at least in part by the content detection and configuration data and including at least one policy that defines a suspicious category of network traffic, the policy enforcement performed to determine whether to allow the received network traffic to pass on a data network, the policy enforcement including user identification, content identification, and at least one of source verification and destination verification; when network traffic is determined to violate the at least one policy defining suspicious network traffic, forwarding the network traffic to an analysis process that will perform analysis on network traffic to determine whether the network traffic contains a threat desired to be detected and, when the network traffic is determined to contain a threat desired to be detected, the analysis process generates additional content detection data to detect the threat in subsequently received network traffic; receiving, via the at least one network interface device, the additional content detection data indirectly from the analysis process via an update station; storing the additional content detection data on the at least one memory device; processing subsequently received network traffic in view of the additional content detection data; blocking network traffic determined to violate at least one policy; and allowing network traffic to pass on the data network that does not violate a policy. - View Dependent Claims (5, 6)
-
-
7. A non-transitory computer-readable medium with instructions stored thereon which when executed by at least one processor of a data network device, causes the data network device to:
-
receive network traffic via at least one network interface device; process the received network traffic in view of content detection and configuration data stored on at least one memory device to enforce policies defined at least in part by the content detection and configuration data and including at least one policy that defines a suspicious category of network traffic, the policy enforcement performed to determine whether to allow the received network traffic to pass on a data network, the policy enforcement including user identification, content identification, and at least one of source verification and destination verification; when network traffic is determined to violate the at least one policy defining suspicious network traffic, forward the network traffic to an analysis process that will perform analysis on network traffic to determine whether the network traffic contains a threat desired to be detected and, when the network traffic is determined to contain a threat desired to be detected, the analysis process generates additional content detection data to detect the threat in subsequently received network traffic; receive, via the at least one network interface device, the additional content detection data indirectly from the analysis process via an update station; store the additional content detection data on the at least one memory device; process subsequently received network traffic in view of the additional content detection data; block network traffic determined to violate at least one policy; and allowing network traffic to pass on the data network that does not violate a policy. - View Dependent Claims (8, 9)
-
Specification