×

Techniques for performing malware scanning of files stored within a file storage device of a computer network

  • US 7,150,042 B2
  • Filed: 12/06/2001
  • Issued: 12/12/2006
  • Est. Priority Date: 12/06/2001
  • Status: Active Grant
First Claim
Patent Images

1. A proxy device for performing malware scanning of files stored within a file storage device of a computer network, the computer network having a plurality of client devices ranged to issue access requests using a dedicated file access protocol to the file storage device in order to access files stored on the file storage device, the proxy device being arranged so as to intercept access requests issued to the file storage device, and comprising:

  • a first interface for receiving an access request issued by one of said client devices to said file storage device using the dedicated file access protocol;

    a second interface for communicating with the file storage device to cause the file storage device to process the access request;

    processing logic for causing malware scanning algorithms to be executed to determine whether the file identified by the access request is to be considered as malware;

    wherein the processing logic is responsive to configuration data to determine which of the malware scanning algorithms should be selected for a particular file, the proxy device further comprising a scanning engine to execute the malware scanning algorithms selected by the processing logic;

    wherein each of the devices in the computer network is assigned an identifier, and the proxy device is assigned the same identifier as is assigned to the file storage device, the first interface being connectable to a communication infrastructure of the computer network to enable communication between the proxy device and said client devices, and the file storage device being connectable to the second interface such that the file storage device is only accessible by said client devices via said proxy device;

    wherein the second interface is configured to enable a plurality of the file storage devices to be connected to the proxy device, each of the file storage devices having a different identifier, and the proxy device being assigned multiple identifiers corresponding to the identifiers of the connected file storage devices, the first interface being configured to receive any access requests issued to one of said connected file storage devices;

    wherein, upon receipt of the access request from a client device, the processing logic is arranged to determine from the access request predetermined attributes, and to send those predetermined attributes to the file storage device to enable the file storage device to perform a validation check, the processing logic only allowing the access request to proceed if the file storage device confirms that the client device is allowed to access the file identified by the file access request;

    wherein the plurality of client devices are allowed direct access to the file storage device if the proxy device fails.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×