发明名称 |
SYSTEM AND METHODS FOR PROTECTING AND USING DIGITAL DATA |
摘要 |
Embodiments of the invention include a computer-implemented method of securing data transfer to a computing device by accessing a secure data transfer module and performing a security threat assessment of the hardware and software of the device by scanning for a security threat. The security threat can include absence of antivirus software, presence of unapproved antivirus software, out-of-date virus definitions, presence of a malicious software code, and an operating system of the computing device that has been modified, or has not received recent operating system updates, or threats related to digital content. Moreover, the computer-implemented method includes using a processor of the computing device to access a secure data transfer module to process a secure data transfer to the computing device in the absence of any security threats. Embodiments also include a removeable non-transitory computer-readable storage device for storing and executing files for the computer-implemented method within a computing device. |
申请公布号 |
US2015047044(A1) |
申请公布日期 |
2015.02.12 |
申请号 |
US201414453588 |
申请日期 |
2014.08.06 |
申请人 |
MEDKNEX SOFTWARE, LLC |
发明人 |
Townsend William B.;Somes James D.;VanZandt John |
分类号 |
G06F21/57;G06F21/60;G06F21/56 |
主分类号 |
G06F21/57 |
代理机构 |
|
代理人 |
|
主权项 |
1. A computer-implemented method of securing data transfer to a computing device, the method comprising:
using at least one processor of a computing device, accessing a secure data transfer module and performing a security threat assessment of the hardware and software of the computing device by performing steps comprising: scanning for the presence of a security threat comprising the absence of antivirus software or the presence of unapproved antivirus software stored in a non-transitory computer-readable medium; scanning for the presence of a security threat comprising out-of-date virus definitions within any one file associated with any approved antivirus software residing on the non-transitory computer-readable medium; scanning for the presence of a security threat comprising a malicious software code residing on non-transitory computer-readable media coupled to the computing device; scanning for the presence of security threat comprising an operating system of the computing device that has been modified or has not received recent operating system updates; scanning for the presence of a security threat related to digital content; and using at least one processor of the computing device, accessing a secure data transfer module to process a secure data transfer to the computing device in the absence of any identified security threats determined by the computer-implemented method. |
地址 |
Los Angeles CA US |