Embedded anti-virus scanner for a network adapter
First Claim
Patent Images
1. A non-transitory, computer-readable medium encoded with instructions to scan network traffic, the instructions comprising:
- instructions to receive packets at a network adapter including a processor positioned thereon;
instructions to assemble the received packets;
instructions to determine, with the processor, whether a file is an executable file, in response to a determination that the received packets complete the file;
instructions to perform a scan of the received packets utilizing the processor to identify a virus, a worm, or a Trojan horse, in response to a determination that the received packets use a hypertext transfer protocol or a file transfer protocol, wherein the processor bypasses the scan of the received packets, in response to a determination that the file is not the executable file; and
instructions to bypass the scan, in response to a determination that the received packets do not use the hypertext transfer protocol or the file transfer protocol.
9 Assignments
0 Petitions
Accused Products
Abstract
A network adapter system and associated method are provided. The network adapter system includes a processor positioned on a network adapter coupled between a computer and a network. Such processor is configured for scanning network traffic transmitted between the computer and the network.
87 Citations
20 Claims
-
1. A non-transitory, computer-readable medium encoded with instructions to scan network traffic, the instructions comprising:
-
instructions to receive packets at a network adapter including a processor positioned thereon; instructions to assemble the received packets; instructions to determine, with the processor, whether a file is an executable file, in response to a determination that the received packets complete the file; instructions to perform a scan of the received packets utilizing the processor to identify a virus, a worm, or a Trojan horse, in response to a determination that the received packets use a hypertext transfer protocol or a file transfer protocol, wherein the processor bypasses the scan of the received packets, in response to a determination that the file is not the executable file; and instructions to bypass the scan, in response to a determination that the received packets do not use the hypertext transfer protocol or the file transfer protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer, comprising:
-
a network driver to communicate with a network adapter including a processor positioned thereon, wherein the processor receives packets, assembles the received packets, performs a scan of the received packets to identify a virus, a worm, or a Trojan horse, in response to a determination that the received packets use a hypertext transfer protocol or a file transfer protocol, and bypasses the scan, in response to a determination that the received packets do not use the hypertext transfer protocol or the file transfer protocol, wherein the processor is configured to determine whether a file is an executable file, in response to a determination that the received packets complete the file, and the processor bypasses the scan of the received packets, in response to a determination that the file is not the executable file; and a processing unit to receive data from the network driver. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
communicating, with a network driver of a computer, with a network adapter including a processor positioned thereon, wherein the processor receives packets, assembles the received packets, performs a scan of the received packets to identify a virus, a worm, or a Trojan horse, in response to a determination that the received packets use a hypertext transfer protocol or a file transfer protocol, and bypasses the scan, in response to a determination that the received packets do not use the hypertext transfer protocol or the file transfer protocol; determining, with the processor, whether a file is an executable file, in response to a determination that the received packets complete the file, wherein the processor bypasses the scan of the received packets, in response to a determination that the file is not the executable file; and receiving, by a processing unit of the computer, data from the network driver. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification