System and method for blocking harmful information online, and computer readable medium therefor
DC CAFCFirst Claim
1. A method for blocking in real time harmful information in a file to be executed, the method comprising the steps of:
- (a) on a computer network through which a web server and a client system are linked to each other, the web server receiving a connection request from the client system over the computer network;
(b) the web server transmitting a harmful information blocking code module to the client system; and
(c) once the transmission of the harmful information blocking code module is completed, the harmful information blocking code module automatically running on the client system to block in real time harmful information including computer viruses, wherein the step (c) comprises steps of;
(c1) inspecting file input/output (I/O) on the client system by hooking up file I/O routines, (c2) determining whether the file to be executed corresponding to the inspected file input/output in the step (c1) is harmful or not; and
(c3) treating a file determined to be harmful in the step (c2) and executing the file, if it can be treated, and aborting the execution of the file determined to be harmful in the step (c2), if it cannot be treated.
1 Assignment
Litigations
5 Petitions
Accused Products
Abstract
A system and method are provided for diagnosing, remedying and blocking harmful information including computer viruses online over a computer network via which a web server and a client are linked to each other. The method includes, on a computer network through which a web server and a client system are linked to each other, the web server receiving a connection request from the client system over the computer network. Then, the web server transmits a harmful information blocking code module to the client system. Once the transmission of the harmful information blocking code module is completed the harmful information blocking code module automatically runs on the client system to block in real time harmful information including computer viruses. The harmful information blocking code module is automatically transmitted to and installed in the client system only by online connecting to the harmful information management server, so that the harmful information detected on the client system can be actively blocked in real time without requiring a manual installation process.
18 Citations
35 Claims
-
1. A method for blocking in real time harmful information in a file to be executed, the method comprising the steps of:
-
(a) on a computer network through which a web server and a client system are linked to each other, the web server receiving a connection request from the client system over the computer network;
(b) the web server transmitting a harmful information blocking code module to the client system; and
(c) once the transmission of the harmful information blocking code module is completed, the harmful information blocking code module automatically running on the client system to block in real time harmful information including computer viruses, wherein the step (c) comprises steps of;
(c1) inspecting file input/output (I/O) on the client system by hooking up file I/O routines, (c2) determining whether the file to be executed corresponding to the inspected file input/output in the step (c1) is harmful or not; and
(c3) treating a file determined to be harmful in the step (c2) and executing the file, if it can be treated, and aborting the execution of the file determined to be harmful in the step (c2), if it cannot be treated. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for blocking in real time harmful information in a file to be executed, the method comprising the steps of:
-
(a) on a computer network through which a first web server, a second web server and a client system are linked to each other, the client system connecting to the second web server over the computer network;
(b) the client system connecting to the first web server over the computer network, according to information provided from the second web server to the client system;
(c) the first web server transmitting a harmful information blocking code module to the client system; and
(d) once the transmission of the harmful information blocking code module is completed, the harmful information blocking code module automatically running on the client system to block in real time harmful information including computer viruses, wherein the step (d) comprises steps of;
(d1) inspecting file input/output (I/O) on the client system by hooking up file I/O routines;
(d2) determining whether the file to be executed corresponding to the inspected file input/output in the step (d1) is harmful or not; and
(d3) treating a file determined to be harmful in the step (d2) and executing the file, if it can be treated, and aborting execution of the file determined to be harmful in the step (d2), if it cannot be treated. - View Dependent Claims (9)
-
-
10. A method for blocking in a real time harmful information in a file to be executed in real time, the method comprising steps of:
-
(a) on a computer network through which a first web server and a client system are linked to each other, the first web server receiving a connection request from the client system over the computer network;
(b) the connection request is issued by the client system according to information provided from a second web server after the client system is connected to the second web server separated from the first web server;
(c) once the first web server transmits a harmful information blocking code module to the client system, the harmful information blocking code module automatically running on the client system to block in real time harmful information including computer viruses, wherein the step (d) comprises steps of;
(c1) inspecting file input/output (I/O) on the client system by hooking up file I/O routines;
(c2) determining whether the file to be executed corresponding to the inspected file input/output in the step (c1) is harmful or not; and
(c3) treating a file determined to be harmful in the step (c2) and executing the file, if it can be treated, and aborting execution of the file determined to be harmful in the step (c2), if it cannot be treated. - View Dependent Claims (11)
-
-
12. A system for blocking in real time harmful information in a file to be executed, comprising:
-
a first web server for providing online services through a computer network; and
a client computer linked with the first web server via the computer network, wherein when the first web server receives a connection request from the client system, the first web server transmits a harmful information blocking code module to the client computer, and the harmful information blocking code module is automatically executed on the client computer to block in real time harmful information including computer viruses, and wherein the harmful information blocking code module inspect file input/output (I/O) on the client system by hooking up file I/O routines, and determines whether the file to be executed corresponding to the inspected file input/output is harmful or not; and
treats a file determined to be harmful and executes the file, if it can be treated, and aborts the execution of the file determined to be harmful, if it cannot be treated. - View Dependent Claims (13, 14, 15)
-
-
16. A method for blocking harmful information, the method comprising:
-
receiving a request from a client system;
transmitting a harmful information blocking code module to the client system;
wherein the harmful information blocking code module runs on the client system to block in real time harmful information when the transmission of the harmful information blocking code module is completed, the harmful information blocking code module configured to;
inspect network packet input/output (I/O) on the client system, determine whether at least one of packets transmitted to the inspected network packet I/O is harmful or not, and block an internal process for supporting the network packet I/O, if any packet is determined to be harmful. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A method for blocking harmful information, the method comprising:
-
sending a request to download a harmful information blocking code module;
downloading the harmful information blocking code module;
wherein the harmful information blocking code module automatically runs on a client system to block in real time harmful information when the downloading of the harmful information blocking code module is completed, the harmful information blocking code module configured to;
inspect network packet input/output (I/O) on the client system, determine whether at least one of the packets transmitted to the inspected network packet I/O is harmful or not, and block an internal process for supporting the network packet I/O, if any packet is determined to be harmful. - View Dependent Claims (24)
-
-
25. A method for blocking harmful information, the method comprising:
-
receiving a request from a web server connected to a client system;
transmitting a harmful information blocking code module to the client system;
wherein the harmful information blocking code module runs on the client system to block in real time harmful information when the transmission of the harmful information blocking code module is completed, the harmful information blocking code module configured to;
inspect network packet input/output (I/O) on the client system, determine whether at least one of the packets transmitted to the inspected network packet I/O is harmful or not, and block an internal process for supporting the network packet I/O, if any packet is determined to be harmful. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A method for blocking harmful information, the method comprising:
-
sending a request to a web server connected to a client system;
downloading a harmful information blocking code module;
wherein the harmful information blocking code module automatically runs on the client system to block in real time harmful information when the downloading of the harmful information blocking code module is completed, the harmful information blocking code module configured to;
inspect file input/output (I/O) on the client system by intercepting at least one of file I/O routines, determine whether a file to be executed corresponding to the inspected file input/output is harmful or not, and abort the execution of the file determined to be harmful. - View Dependent Claims (33, 34, 35)
-
Specification