Browsing support infrastructure with tiered malware support
First Claim
1. A computing device comprising:
- network interface circuitry communicatively coupling the computing device to an Internet;
computer memory; and
processing circuitry coupled to the network interface circuitry and the computer memory, wherein the network interface circuitry, the computer memory, and the processing circuitry are configured to run a network browser that is configured to;
allocate a safe portion of the computer memory to the network browser for quarantining malware infected data storage;
receive data from the Internet;
configure the safe portion of the computer memory to implement a level of isolation that varies dynamically over time as the data within the safe portion of the computer memory changes;
scan the data for malware;
determine that a first portion of the data is malware free;
write the first portion of the data to an unprotected portion of the computer memory;
determine that a second portion of the data contains malware;
quarantine the second portion of the data by writing it to the safe portion of the computer memory;
remove the malware from the second portion of the data;
release the second portion of the data from the safe portion of the computer memory; and
combine the first portion of the data with the second portion of the data.
8 Assignments
0 Petitions
Accused Products
Abstract
A network browser has a Malware detection manager for direct or indirect scanning of files during an upload or download processes for viruses, adware, spyware, etc. The malware detection manager defines and employs a quarantine bin, which is an isolated and secure memory space or directory for temporary placement of file packets during the file transmission while malware detection can commence. The malware detection manager scans for malware code associated with the packet sequence encountered during a file transmission to and from the Internet, during which it quarantines all the scanned packets in the quarantine bin. Quarantined files can be released if there is a human challenge authorizing the release of the file. Exchanging a Malware free signature between server and client via a trusted download center may be done so the client device need not scan the files for malware if content is certified and guaranteed as malware-free.
7 Citations
20 Claims
-
1. A computing device comprising:
-
network interface circuitry communicatively coupling the computing device to an Internet; computer memory; and processing circuitry coupled to the network interface circuitry and the computer memory, wherein the network interface circuitry, the computer memory, and the processing circuitry are configured to run a network browser that is configured to; allocate a safe portion of the computer memory to the network browser for quarantining malware infected data storage; receive data from the Internet; configure the safe portion of the computer memory to implement a level of isolation that varies dynamically over time as the data within the safe portion of the computer memory changes; scan the data for malware; determine that a first portion of the data is malware free; write the first portion of the data to an unprotected portion of the computer memory; determine that a second portion of the data contains malware; quarantine the second portion of the data by writing it to the safe portion of the computer memory; remove the malware from the second portion of the data; release the second portion of the data from the safe portion of the computer memory; and combine the first portion of the data with the second portion of the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for processing data to detect and handle the presence of malware, the method comprising:
-
allocating quarantine memory space of computer memory of a computer device to a web browser for malware infected data storage; configuring the quarantine memory space to implement a level of isolation that varies dynamically over time as the data within the quarantine memory space changes; initiating a data transfer from the computer device through a network interface circuitry during an upload or download operation requested by the web browser resident in memory; receiving data by the web browser; scanning the data for malware by the web browser; determining that a first portion of the data is without malware by the web browser; writing the first portion of the data to unprotected memory by the web browser; determining that a second portion of the data includes malware by the web browser; based on the determining, quarantining the second portion of the data into the quarantine memory space within the computer device by the web browser; removing the malware from the second portion of the data; releasing the second portion of the data from the quarantine memory space; and combining the first portion of the data with the second portion of the data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification