Safe file transmission and reputation lookup
First Claim
Patent Images
1. A system comprising:
- one or more processing units; and
memory comprising instructions that when executed by at least one of the one or more processing units perform a method comprising;
overriding protection that prevents access to a data file received via a network after reputation information indicating a level of suspiciousness associated with the data file is accessed, the data file received wrapped in a protective file to create a package file that inhibits at least one of access to or execution of the data file until data file reputation information is accessed, the level of suspiciousness based at least in part upon at least one of;
a number of users that executed the data file;
a number of times the data file has travelled through a network;
a first time and date the data file was observed;
whether the data file was reviewed by an analyst;
a certificate used to sign the data file;
a link to a company that controls the certificate;
a link to a search page comprising information about the data file;
ora link to a discussion group comprising information about the data file.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.
24 Citations
20 Claims
-
1. A system comprising:
-
one or more processing units; and memory comprising instructions that when executed by at least one of the one or more processing units perform a method comprising; overriding protection that prevents access to a data file received via a network after reputation information indicating a level of suspiciousness associated with the data file is accessed, the data file received wrapped in a protective file to create a package file that inhibits at least one of access to or execution of the data file until data file reputation information is accessed, the level of suspiciousness based at least in part upon at least one of; a number of users that executed the data file; a number of times the data file has travelled through a network; a first time and date the data file was observed; whether the data file was reviewed by an analyst; a certificate used to sign the data file; a link to a company that controls the certificate; a link to a search page comprising information about the data file;
ora link to a discussion group comprising information about the data file. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer readable medium comprising instructions that when executed perform a method comprising:
-
receiving via a network a data file wrapped in a protective file to create a package file that inhibits at least one of access to or execution of the data file until data file reputation information is accessed; determining a level of suspiciousness associated with the data file based at least in part upon at least one of; a number of users that executed the data file; a number of times the data file has travelled through a network; a first time and date the data file was observed; whether the data file was reviewed by an analyst; a certificate used to sign the data file; a link to a company that controls the certificate; a link to a search page comprising information about the data file;
ora link to a discussion group comprising information about the data file; and providing reputation information indicating the level of suspiciousness associated with the data file. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
receiving via a network a data file wrapped in a protective file to create a package file that inhibits at least one of access to or execution of the data file until data file reputation information is accessed; and overriding protection that prevents access to the data file after reputation information indicating a level of suspiciousness associated with the data file is accessed, the level of suspiciousness based at least in part upon at least one of; a number of users that executed the data file; a number of times the data file has travelled through a network; a first time and date the data file was observed; whether the data file was reviewed by an analyst; a certificate used to sign the data file; a link to a company that controls the certificate; a link to a search page comprising information about the data file;
ora link to a discussion group comprising information about the data file. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification