Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods and apparatus for dealing with malware

A technology of malware, events, applied in the direction of electrical digital data processing, computer security devices, instruments

Active Publication Date: 2008-07-02
威布鲁特公司
View PDF12 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Therefore, prior art systems either rely on in-depth analysis of new objects to determine whether an object is malicious, which introduces delays and thus user risks during file analysis and new anti-malware distribution, or perform specific object actions A method of limited analysis or transmission to a computer to determine the likelihood that an object is malicious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and apparatus for dealing with malware
  • Methods and apparatus for dealing with malware
  • Methods and apparatus for dealing with malware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] Referring to FIG. 1 , a computer network is generally shown based on a distributed network such as the Internet 1 . However, the invention can be implemented over or using other types of networks such as LANs. A number of local or "remote" computers 2 are connected to a "central" or "base" computer 3 via the Internet 1 . Each computer 2 may be a personal computer, any type of server, PDA, mobile phone, interactive television or any other device capable of hosting and manipulating computer objects. An object in this context may be a computer file, part of a file or subroutine, a macro, a web page or any other piece of code operated by or on a computer, or any event whether executed, simulated, imitated or interpreted. The object 4 is shown schematically in the figure and can eg be downloaded to a remote computer 2 via the Internet 1 as indicated by line 5 or directly applied as indicated by line 6 .

[0080] In a preferred embodiment, the base computer 3 has a database...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of : executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.

Description

technical field [0001] The present invention generally relates to methods and apparatus for handling malware. In one aspect, the invention relates to a method and apparatus for classifying a computer object as malware. In another aspect, the invention relates to a method and apparatus for determining that a remote computer is protected from malware. In another aspect, the invention relates to a method and apparatus for classifying a computer object as malware or safe. In another aspect, the invention relates to a method of installing software on a computer. Background technique [0002] The term "malware" as used herein generally refers to any executable computer file or more generally "object" that is or contains malicious code (and thus includes viruses, Trojans, worms, spyware, adware, etc.). [0003] A typical anti-malware product, such as anti-virus scanning software, scans an object or the result of an algorithm applied to an object, or a portion thereof, looking fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/56G06F21/57
CPCG06F21/56G06F21/577
Inventor M·莫里斯P·斯塔布斯M·哈特维希D·哈特
Owner 威布鲁特公司