Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods and systems for creating and updating approved-file and trusted-domain databases

A database, trusted technology, used in transmission systems, electrical digital data processing, electrical components, etc., to solve problems such as limiting whitelist viability

Active Publication Date: 2013-08-28
CA TECH INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional web scraping techniques also tend to falsely identify illegal files as legitimate and vice versa, further limiting the viability of whitelists

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and systems for creating and updating approved-file and trusted-domain databases
  • Methods and systems for creating and updating approved-file and trusted-domain databases
  • Methods and systems for creating and updating approved-file and trusted-domain databases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Figure 1A is a block diagram of an exemplary system 100 for creating or updating approval documents and trusted domain databases and / or verifying document legitimacy in accordance with at least one embodiment. As shown in this figure, in at least one embodiment, exemplary system 100 may include a trusted domain database 102 , an approved file database 104 , and a file approval module 106 . As the following will combine figure 2 -9 explained in more detail, the system 100 can be used alone or in combination with other elements to implement one or more exemplary embodiments described herein and / or as an apparatus for implementing one or more exemplary embodiments described herein .

[0026] Trusted domain database 102 generally represents any type or form of computing device or database capable of storing one or more database records. As will be explained in more detail below, in at least one embodiment, the trusted domain database 102 may include database records for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Computer-implemented methods and systems for creating or updating approved-file and trusted-domain databases and verifying the legitimacy of files are disclosed. A method for creating or updating an approved-file database may comprise intercepting a first file, identifying a source domain associated with the first file, identifying a trusted-domain database, determining whether a database record for the source domain associated with the first file exists within the trusted-domain database, creating a hash value for the first file if a database record for the source domain associated with the first file exists within the trusted-domain database, and storing the hash value for the first file in an approved-file database. Methods and systems for verifying the legitimacy of a file and for creating or updating a trusted-domain database are also disclosed.

Description

Background technique [0001] Existing antivirus techniques are increasingly becoming incapable of protecting computing resources from malicious files and programs, such as viruses or other types of malware, prompting research into alternative techniques. One promising area of ​​research and development is file "whitelisting," a process in which only applications, files or programs contained within a defined list of items can be accessed or executed by a computing system, while preventing all other The system on which the files or programs run on said computing system. [0002] Traditional whitelisting systems rely on manually created whitelists or web-spidering (often referred to as web-scraping) techniques to identify legitimate (or potentially legitimate) files. However, given the rate at which new applications are created and released (typically via the Internet) on a daily basis, it is practically impossible to manually create a comprehensive whitelist of legitimate files....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51G06F21/56H04L29/06
CPCG06F21/51G06F21/56H04L63/1416
Inventor 凯里·纳晨伯格迈克尔·斯泊图斯苏拉伯·萨蒂什格里·伊根
Owner CA TECH INC