SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR POPULATING A LIST OF KNOWN WANTED DATA
First Claim
Patent Images
1. A computer program product embodied on a non-transitory tangible computer readable medium for performing operations, comprising:
- using a profiling agent to monitor a plurality of update services that are associated with multiple update providers;
identifying an update for a computer;
populating a list of known wanted data with at least a portion of update data provided in the update, wherein the list reflects an aggregation of multiple update data sets from the multiple update providers and the list is based, at least in part, on the operating system and applications of the computer, and wherein the portion of the update data are reflective of data predetermined to exclude malware, and wherein the known wanted data includes a whitelist; and
populating the list of known wanted data with metadata that indicates a version of the update data, a digital signature used to sign a portion of the update data, and a location from which the portion of the update data was received.
11 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for populating a list of known wanted data. In use, an update to data is identified. In addition, a list of known wanted data is populated with the data, in response to the update.
4 Citations
20 Claims
-
1. A computer program product embodied on a non-transitory tangible computer readable medium for performing operations, comprising:
-
using a profiling agent to monitor a plurality of update services that are associated with multiple update providers; identifying an update for a computer; populating a list of known wanted data with at least a portion of update data provided in the update, wherein the list reflects an aggregation of multiple update data sets from the multiple update providers and the list is based, at least in part, on the operating system and applications of the computer, and wherein the portion of the update data are reflective of data predetermined to exclude malware, and wherein the known wanted data includes a whitelist; and populating the list of known wanted data with metadata that indicates a version of the update data, a digital signature used to sign a portion of the update data, and a location from which the portion of the update data was received. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 17)
-
-
13. (canceled)
-
14. (canceled)
-
15. (canceled)
-
16. (canceled)
-
18. A method, comprising:
-
using a profiling agent to monitor a plurality of update services that are associated with multiple update providers; identifying an update for a computer; populating a list of known wanted data with at least a portion of update data provided in the update, wherein the list reflects an aggregation of multiple update data sets from the multiple update providers and the list is based, at least in part, on the operating system and applications of the computer, and wherein the portion of the update data are reflective of data predetermined to exclude malware, and wherein the known wanted data includes a whitelist; and populating the list of known wanted data with metadata that indicates a version of the update data, a digital signature used to sign a portion of the update data, and a location from which the portion of the update data was received.
-
-
19. A system, comprising:
-
a processor; a memory; and a profiling agent, wherein the system is configured for; monitoring a plurality of update services that are associated with multiple update providers; identifying an update for a computer; populating a list of known wanted data with at least a portion of update data provided in the update, wherein the list reflects an aggregation of multiple update data sets from the multiple update providers and the list is based, at least in part, on the operating system and applications of the computer, and wherein the portion of the update data are reflective of data predetermined to exclude malware, and wherein the known wanted data includes a whitelist; and populating the list of known wanted data with metadata that indicates a version of the update data, a digital signature used to sign a portion of the update data, and a location from which the portion of the update data was received. - View Dependent Claims (20)
-
Specification