Systems and methods for providing security for synchronized files
First Claim
1. A computer-implemented method for providing security for synchronized files, at least a portion of the method being performed by a computing device comprising at least one physical processor coupled to a memory, the method comprising:
- synchronizing, using a cloud folder synchronization service, a backend server with both a client folder on a client machine and an additional client folder on an additional client machine, the cloud folder synchronization service configured to synchronize copies of data between different locations;
propagating a file from the client folder to the backend server through the cloud folder synchronization service;
identifying, using the cloud folder synchronization service, a result of a security scan of the propagated file performed by the backend server, the result of the security scan of the propagated file indicating that the propagated file is safe such that a measured degree of maliciousness does not meet a corresponding threshold;
adjusting, using the cloud folder synchronization service, the synchronization of the propagated file with the additional client folder based on the result of the security scan at least in part by passing a skip hint, from the backend server to the additional client machine, indicating to the additional client machine to skip another security scan of the same propagated file on which the earlier security scan was performed.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for providing security for synchronized files may include (1) synchronizing, using a cloud folder synchronization service, a backend server with both a client folder on a client machine and an additional client folder on an additional client machine, (2) propagating a file from the client folder to the backend server through the cloud folder synchronization service, (3) identifying, using the cloud folder synchronization service, a result of a security scan of the propagated file, and (4) adjusting, using the cloud folder synchronization service, the synchronization of the file with the additional client folder based on the result of the security scan. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for providing security for synchronized files, at least a portion of the method being performed by a computing device comprising at least one physical processor coupled to a memory, the method comprising:
-
synchronizing, using a cloud folder synchronization service, a backend server with both a client folder on a client machine and an additional client folder on an additional client machine, the cloud folder synchronization service configured to synchronize copies of data between different locations; propagating a file from the client folder to the backend server through the cloud folder synchronization service; identifying, using the cloud folder synchronization service, a result of a security scan of the propagated file performed by the backend server, the result of the security scan of the propagated file indicating that the propagated file is safe such that a measured degree of maliciousness does not meet a corresponding threshold; adjusting, using the cloud folder synchronization service, the synchronization of the propagated file with the additional client folder based on the result of the security scan at least in part by passing a skip hint, from the backend server to the additional client machine, indicating to the additional client machine to skip another security scan of the same propagated file on which the earlier security scan was performed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing security for synchronized files, the system comprising:
-
a synchronization module, stored in a memory, that synchronizes, using a cloud folder synchronization service, a backend server with both a client folder on a client machine and an additional client folder on an additional client machine, the cloud folder synchronization service configured to synchronize copies of data between different locations; a propagation module, stored in the memory, that propagates a file from the client folder to the backend server through the cloud folder synchronization service; an identification module, stored in the memory, that identifies, using the cloud folder synchronization service, a result of a security scan of the propagated file performed by the backend server, the result of the security scan of the propagated file indicating that the propagated file is safe such that a measured degree of maliciousness does not meet a corresponding threshold; an adjustment module, stored in the memory, that adjusts, using the cloud folder synchronization service, the synchronization of the propagated file with the additional client folder based on the result of the security scan at least in part by passing a skip hint, from the backend server to the additional client machine, indicating to the additional client machine to skip another security scan of the same propagated file on which the earlier security scan was performed; at least one physical processor that is coupled to the memory and that executes the synchronization module, the propagation module, the identification module, and the adjustment module. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one physical processor of a computing device, cause the computing device to:
-
synchronize, using a cloud folder synchronization service, a backend server with both a client folder on a client machine and an additional client folder on an additional client machine, the cloud folder synchronization service configured to synchronize copies of data between different locations; propagate a file from the client folder to the backend server through the cloud folder synchronization service; identify, using the cloud folder synchronization service, a result of a security scan of the propagated file performed by the backend server, the result of the security scan of the propagated file indicating that the propagated file is safe such that a measured degree of maliciousness does not meet a corresponding threshold; adjust, using the cloud folder synchronization service, the synchronization of the propagated file with the additional client folder based on the result of the security scan at least in part by passing a skip hint, from the backend server to the additional client machine, indicating to the additional client machine to skip another security scan of the same propagated file on which the earlier security scan was performed.
-
Specification