System and method of monitoring and controlling application files
First Claim
1. A method for updating a system which controls spyware programs on a computer, the method comprising:
- receiving an identifier from a first computer, the identifier being associated with a spyware program on the first computer;
associating a category with the identifier if the category was not previously associated with the identifier;
sending at least the category associated with the identifier to a second computer for scanning the second computer for the spyware program associated with the identifier; and
providing instructions to the second computer to scan for the spyware program based at least in part on the associated category, the scan occurring independent of whether the spyware program is executed.
14 Assignments
0 Petitions
Accused Products
Abstract
A system and method for updating a system that controls files executed on a workstation. The workstation includes a workstation management module configured to detect the launch of an application. A workstation application server receives data associated with the application from the workstation. This data can include a hash value. The application server module can determine one or more categories to associate with the application by referencing an application inventory database or requesting the category from an application database factory. The application database factory can receive applications from multiple application server modules. The application database factory determines whether the application was previously categorized by the application database factory and provides the category to the application server module. Once the application server module has the category, it forwards a hash/policy table to the workstation management module. Upon receipt of the hash/policy table, the workstation management module applies the policy that is associated with the launched application to control access to the application on the workstation.
177 Citations
20 Claims
-
1. A method for updating a system which controls spyware programs on a computer, the method comprising:
-
receiving an identifier from a first computer, the identifier being associated with a spyware program on the first computer; associating a category with the identifier if the category was not previously associated with the identifier; sending at least the category associated with the identifier to a second computer for scanning the second computer for the spyware program associated with the identifier; and providing instructions to the second computer to scan for the spyware program based at least in part on the associated category, the scan occurring independent of whether the spyware program is executed. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for updating a system which controls spyware programs on a computer, the method comprising:
-
receiving a database of identifiers at a database factory, the database being determined at least in part by a comparison between an identifier associated with a software program and a database at a first computer; collecting information relating to the software program associated with the identifier; categorizing the software program associated with the identifier based at least in part on the collected information; and providing the identifier to a second computer for scanning the second computer for the categorized software program associated with the identifier, the scanning occurring independent of whether the categorized software program is executed. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for sharing a software database between a plurality of computers across a network, the system comprising:
-
a first computer having a first database and a software program, the first database including identifiers associated with software programs and associated with categories, the first database not including an identifier associated with the software program; a second computer having a second database, the second database including a first identifier associated with the software program on the first computer, the second computer being configured to collect information relating to the first identifier and determine a category to associate with the first identifier based at least in part on the collected information; and a third computer receiving at least the first identifier and the category determined by the second computer and scanning for the software program associated with the received first identifier, the scanning occurring independent of whether the software program is executed. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification