Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
First Claim
Patent Images
1. A method, comprising:
- sending a request from a server for a subset of data, the request defining identification information that identifies a hash of the subset of data, wherein the subset of data is stored on a client device;
receiving, at the server, a representation of the subset of data from the client device, the representation including the hash, the receiving performed after the sending the request, the client device being a wireless device, wherein the representation of the subset of data is received from a Java virtual machine of a Java-based browser of the client device;
scanning the representation of the subset of data utilizing a plurality of signatures; and
sending a response to the client device upon a match of the representation of the subset of data against one of the plurality of signatures, wherein the response includes an uninfected file associated with the data, and an instruction to restart an application that involves the subset of data, wherein the uninfected file is automatically installed on the client device, and the instruction instructs the client device to restart the application.
10 Assignments
0 Petitions
Accused Products
Abstract
A server-based system, method, and computer program product are provided for scanning data on a client using only a subset of the data. In operation, a request is received for a subset of data stored on a client that is required for determining whether the data is unwanted. Additionally, a representation of only the subset of data is sent from the client to a server over a network. Furthermore, a response is received from the server over the network. Still yet, there is a reaction based on the response.
14 Citations
18 Claims
-
1. A method, comprising:
-
sending a request from a server for a subset of data, the request defining identification information that identifies a hash of the subset of data, wherein the subset of data is stored on a client device; receiving, at the server, a representation of the subset of data from the client device, the representation including the hash, the receiving performed after the sending the request, the client device being a wireless device, wherein the representation of the subset of data is received from a Java virtual machine of a Java-based browser of the client device; scanning the representation of the subset of data utilizing a plurality of signatures; and sending a response to the client device upon a match of the representation of the subset of data against one of the plurality of signatures, wherein the response includes an uninfected file associated with the data, and an instruction to restart an application that involves the subset of data, wherein the uninfected file is automatically installed on the client device, and the instruction instructs the client device to restart the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
a server configured to send a request for a subset of data, the request defining identification information that identifies a hash of the subset of data, to receive a representation of the subset of data from a client device, the representation including the hash, the representation received after the request is sent, to scan the representation of the subset of data utilizing a plurality of signatures, and to send a response to the client device upon a match of the representation of the subset of data against one of the plurality of signatures, wherein the response includes an uninfected file associated with the data, and an instruction to restart an application that involves the subset of data; and the client device, the client device being a wireless device, wherein the client device includes a memory that stores the subset of data; and a Java-based browser including a Java virtual machine, wherein the client device automatically installs the uninfected file, and the client device restarts the application based on the instruction. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product embodied on a non-transitory, computer readable storage medium, that, when executed by a processing unit, causes the processing unit to perform a method comprising:
-
sending a request from a server for a subset of data, the request defining identification information that identifies a hash of the subset of data; receiving, at the server, a representation of the subset of data from a client device, the representation including the hash, the receiving performed after the sending the request, wherein the client device is a mobile device; scanning the representation of the subset of data utilizing a plurality of signatures; and sending a response including an uninfected file and an instruction to restart an application that involves the subset of data. - View Dependent Claims (16, 17, 18)
-
Specification