MALWARE DETECTION AND CONTENT ITEM RECOVERY

    公开(公告)号:US20230139473A1

    公开(公告)日:2023-05-04

    申请号:US18147468

    申请日:2022-12-28

    Applicant: Dropbox, Inc.

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for malware detection and content item recovery. For example, a content management system can receive information describing changes made to content items stored on a user device. The content management system can analyze the information to determine if the described changes are related to malicious software on the user device. When the changes are related to malicious software, the content management system can determine which content items are effected by the malicious software and/or determine when the malicious software first started making changes to the user device. The content management system can recover effected content items associated with the user device by replacing the effected versions of the content items with versions of the content items that existed immediately before the malicious software started making changes to the user device.

    Malware detection and content item recovery

    公开(公告)号:US11580221B2

    公开(公告)日:2023-02-14

    申请号:US15394385

    申请日:2016-12-29

    Applicant: DROPBOX, INC.

    Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for malware detection and content item recovery. For example, a content management system can receive information describing changes made to content items stored on a user device. The content management system can analyze the information to determine if the described changes are related to malicious software on the user device. When the changes are related to malicious software, the content management system can determine which content items are effected by the malicious software and/or determine when the malicious software first started making changes to the user device. The content management system can recover effected content items associated with the user device by replacing the effected versions of the content items with versions of the content items that existed immediately before the malicious software started making changes to the user device.

Patent Agency Ranking