Fuzzy whitelisting anti-malware system and method
An anti-malware, malicious software technology, applied in the direction of transmission systems, electrical components, instruments, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027]In the following description, it should be understood that all recited connections between structures may be direct operative connections or indirect operative connections through intermediate structures. A set of elements contains one or more elements. Any recitation of an element should be understood to mean at least one element. Multiple elements contain at least two elements. Unless otherwise required, any described method steps do not have to be performed in the specific illustrated order. A first element (eg, data) derived from a second element encompasses the first element equal to the second element as well as the first element and optionally other data resulting from processing the second element. Making a determination or decision based on a parameter encompasses making said determination or decision based on said parameter and optionally other data. Unless otherwise specified, an indicator of a quantity / data may be the quantity / data itself or an indicator d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


