Methods and apparatus for dealing with malware
A technology of malware, events, applied in the direction of electrical digital data processing, computer security devices, instruments
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] Referring to FIG. 1 , a computer network is generally shown based on a distributed network such as the Internet 1 . However, the invention can be implemented over or using other types of networks such as LANs. A number of local or "remote" computers 2 are connected to a "central" or "base" computer 3 via the Internet 1 . Each computer 2 may be a personal computer, any type of server, PDA, mobile phone, interactive television or any other device capable of hosting and manipulating computer objects. An object in this context may be a computer file, part of a file or subroutine, a macro, a web page or any other piece of code operated by or on a computer, or any event whether executed, simulated, imitated or interpreted. The object 4 is shown schematically in the figure and can eg be downloaded to a remote computer 2 via the Internet 1 as indicated by line 5 or directly applied as indicated by line 6 .
[0080] In a preferred embodiment, the base computer 3 has a database...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 