Methods and systems for providing security from malicious software
First Claim
1. A method for providing security from malicious software, the method comprising:
- maintaining a malicious host database, the malicious host database containing a malicious host name corresponding to a malicious host;
receiving, from a client, a service request including a first host name;
querying the malicious host database to determine if the first host name corresponds to the malicious host name; and
returning, to the client, a first address if it was determined that the first host name corresponds to the malicious host name.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for providing security from malicious software. The disclosed systems and methods may include maintaining a malicious host database, the malicious host database containing a malicious host name corresponding to a malicious host. Furthermore, the disclosed systems and methods may include receiving, from a client, a service request including a first host name and querying the malicious host database to determine if the first host name corresponds to the malicious host name. Moreover, the disclosed systems and methods may include returning, to the client, a first address if it was determined that the first host name corresponds to the malicious host name.
50 Citations
20 Claims
-
1. A method for providing security from malicious software, the method comprising:
-
maintaining a malicious host database, the malicious host database containing a malicious host name corresponding to a malicious host;
receiving, from a client, a service request including a first host name;
querying the malicious host database to determine if the first host name corresponds to the malicious host name; and
returning, to the client, a first address if it was determined that the first host name corresponds to the malicious host name. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for providing security from malicious software, the system comprising:
-
a memory storage for maintaining a database; and
a processing unit coupled to the memory storage, wherein the processing unit is operative to maintain a malicious host database, the malicious host database containing a malicious host name corresponding to a malicious host;
receive, from a client, a service request including a first host name;
query the malicious host database to determine if the first host name corresponds to the malicious host name; and
return, to the client, a first address if it was determined that the first host name corresponds to the malicious host name. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium which stores a set of instructions which when executed performs a method for providing security from malicious software, the method executed by the set of instructions comprising:
-
maintaining a malicious host database, the malicious host database containing a malicious host name corresponding to a malicious host;
receiving, from a client, a service request including a first host name;
querying the malicious host database to determine if the first host name corresponds to the malicious host name; and
returning, to the client, a first address if it was determined that the first host name corresponds to the malicious host name. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification