Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer system and method with anti-malware

A technology of malicious software, operating system, applied in the field of computer systems, which can solve problems such as vulnerability to software attacks and defects

Active Publication Date: 2014-08-27
INTEL CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods are inherently vulnerable to software attacks and thus become flawed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system and method with anti-malware
  • Computer system and method with anti-malware
  • Computer system and method with anti-malware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] It has been observed that conventional anti-malware solutions generally do not have a secure execution environment. They may also not have trusted visibility into the operating system they are trying to defend. For example, traditional anti-malware applications may rely on the operating system (OS) itself to make system calls to obtain files and file parts from memory. Unfortunately, since malware can operate within the OS, they can compromise these channels. Therefore, new methods are expected.

[0018] In some embodiments, a method may provide an out-of-band (OOB) agent to secure the platform. OOB agents can utilize non-TRS methods to measure and secure in-band security agents. In some embodiments, the manageability engine can provide out-of-band connectivity to in-band and out-of-band security agents, and provide access to system memory resources without having to rely on OS services. This can be used for trusted antimalware and remediation services.

[0019] Va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In some embodiments, the method may provide an out-of-band (OOB) proxy for securing the platform. OOB proxies can utilize non-TRS methods to measure and protect in-band security proxies. In some embodiments, the manageability engine may provide out-of-band connectivity to in-band and out-of-band security agents and provide access to system memory resources without having to rely on OS services. This can be used for trusted anti-malware and remediation services.

Description

technical field [0001] The present invention relates to computer systems and methods with anti-malware software. Background technique [0002] Malware (or malicious code) is an umbrella term used to refer to various types of software that can cause problems or damage to a computer. It contains viruses, worms, Trojan horses, macro viruses and backdoors. Malware has evolved to become increasingly stealthy and targeted. Anti-malware technology has also evolved to understand and eradicate the stealthy behavior of malware. Current anti-malware approaches utilize Tamper Resistant Software (TRS) mechanisms to protect their in-band security agents in system memory (within the confines of the operating platform operating system). However, these methods are inherently vulnerable to software attacks and thus become flawed. Therefore, expect new ways to protect platforms from malware attacks. Contents of the invention [0003] The invention relates to a computing platform compris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCG06F21/55G06F21/53
Inventor R·L·萨希塔D·M·德拉姆S·奥林Y·拉希德P·G·穆尔高恩卡P·S·施密茨H·M·科斯拉维
Owner INTEL CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More