System and method of monitoring and controlling application files
First Claim
1. A method for updating a system which controls spyware programs on a computer, the method comprising:
- receiving an identifier from a first computer, the identifier being associated with a spyware program on the first computer;
prioritizing the identifier based on a frequency of requested execution of the spyware program;
associating a category of types of applications with the identifier based, at least in part, on the frequency if the category was not previously associated with the identifier; and
sending at least the category associated with the identifier to a second computer for scanning the second computer for the spyware program associated with the identifier.
13 Assignments
0 Petitions
Accused Products
Abstract
A system and method for updating a system that controls files executed on a workstation. The workstation includes a workstation management module configured to detect the launch of an application. A workstation application server receives data associated with the application from the workstation. This data can include a hash value. The application server module can determine one or more categories to associate with the application by referencing an application inventory database or requesting the category from an application database factory. The application database factory can receive applications from multiple application server modules. The application database factory determines whether the application was previously categorized by the application database factory and provides the category to the application server module. Once the application server module has the category, it forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy that is associated with the launched application to control access to the application on the workstation.
-
Citations
20 Claims
-
1. A method for updating a system which controls spyware programs on a computer, the method comprising:
-
receiving an identifier from a first computer, the identifier being associated with a spyware program on the first computer; prioritizing the identifier based on a frequency of requested execution of the spyware program; associating a category of types of applications with the identifier based, at least in part, on the frequency if the category was not previously associated with the identifier; and sending at least the category associated with the identifier to a second computer for scanning the second computer for the spyware program associated with the identifier. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for updating a system which controls spyware programs on a computer, the method comprising:
-
receiving a database of identifiers at a database factory, the database being determined at least in part by a comparison between an identifier associated with a software program and a database at a first computer; prioritizing the database of identifiers based on a frequency of requested execution of the software program; collecting information relating to the software program associated with the identifier, the collected information including the frequency categorizing the software program associated with the identifier with a type of application based at least in part on the collected information; and providing the identifier to a second computer for scanning the second computer for the categorized software program associated with the identifier. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for sharing a software database between a plurality of computers across a network, the system comprising:
-
a first computer having a first database and a software program, the first database including identifiers associated with software programs and associated with categories of types of applications, the first database not including an identifier associated with the software program; prioritizing the identifiers based on a frequency of requested execution of the software program; a second computer having a second database, the second database including a first identifier associated with the software program on the first computer, the second computer being configured to collect information relating to the first identifier and determine a category to associate with the first identifier based at least in part on the collected information, the collected information including the frequency; and a third computer receiving at least the first identifier and the category determined by the second computer and scanning for the software program associated with the received first identifier. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification