Invention Grant
US08776242B2 Providing a malware analysis using a secure malware detection process 有权
使用安全恶意软件检测过程提供恶意软件分析

Providing a malware analysis using a secure malware detection process
Abstract:
In certain embodiments, a computer-implemented system comprises a boundary controller and a first malware detection agent. The boundary controller is operable to implement a security boundary between a first computer network environment and a second computer network environment. The second computer network environment has a security classification level that is more restrictive than a security classification level of the first computer network environment. The boundary controller is operable to receive from the first computer network environment a file. The first malware detection agent is positioned in the second computer network environment and is operable to receive via the boundary controller the file and apply a first malware detection process on the file. The first malware detection process is subject to the security classification level of the second computer network environment.
Information query
Patent Agency Ranking
0/0