×

Real-time network updates for malicious content

  • US 9,672,359 B2
  • Filed: 07/07/2015
  • Issued: 06/06/2017
  • Est. Priority Date: 06/16/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for establishing the reputation of message components, the method comprising:

  • transmitting over a network communication interface a request for data from a first electronic computing device;

    receiving the requested data over the network communication interface;

    executing instructions out of a memory, wherein execution of the instructions by a processor breaks the received data into a plurality of component parts, wherein the plurality of component parts are stored in a database;

    receiving a first set of information from a second electronic computing device, wherein the received first set of information is associated with a bad reputation and includes a plurality of constituent components, and a processor at the second electronic computing device generates the plurality of constituent components from data contained in a message by breaking the data contained in the message into the plurality of constituent components;

    comparing the received plurality of constituent components with the plurality of component parts;

    identifying that at least one of the constituent components of the plurality of constituent components matches at least one of the component parts;

    associating each of the plurality of component parts with a threat, wherein the database is updated with information indicating that the plurality of component parts are associated with the threat;

    transmitting over a network communication interface a second request for additional data from the first electronic computing device;

    receiving the additional requested data over the network communication interface;

    breaking the additional received data into a plurality of additional component parts;

    storing the plurality of additional component parts in the database;

    receiving a second set of information from a second electronic computing device, wherein the received information is associated with the bad reputation and includes a plurality of additional constituent components, and the processor at the second electronic computing device generates the plurality of additional constituent components from data contained in a second message by breaking the data from the second message into the plurality of additional constituent components;

    comparing the received plurality of additional constituent components with the plurality of additional component parts and with the plurality of constituent components;

    identifying that at least one of the additional constituent components of the plurality of additional constituent components matches at least one of the plurality of additional component parts or at least one of the plurality of constituent components; and

    associating each of the plurality of additional component parts with the threat, wherein the database is updated with information indicating that the plurality of additional component parts are associated with the threat.

View all claims
  • 24 Assignments
Timeline View
Assignment View
    ×
    ×