Unlock instant, AI-driven research and patent intelligence for your innovation.

Systems and methods for optimizing scanning of preinstalled applications

An application, pre-installed technology, applied in the field of scanning systems, can solve the problems of consumption, computing burden, large computing resources, etc.

Active Publication Date: 2019-01-29
CA TECH INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, performing signature-based security assessments can be computationally resource-intensive, especially in the case of mobile computing devices, where network resources and other computing resources may be in limited supply
Additionally, many computing systems, including mobile computing devices, may come with several pre-installed applications, placing a computational burden on both the mobile computing device and the security server that provides security assessments for the applications installed on the mobile computing device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for optimizing scanning of preinstalled applications
  • Systems and methods for optimizing scanning of preinstalled applications
  • Systems and methods for optimizing scanning of preinstalled applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present disclosure generally relates to systems and methods for optimizing scanning of pre-installed applications. As will be explained in more detail below, by performing a single lookup of a system image to retrieve an assessment of said system image, rather than performing a separate lookup for each pre-installed application included in said system image, the The systems and methods described can reduce the computational burden on both a computing device having pre-installed applications and a security server providing security assessment of applications installed on the computing device.

[0023] The following will refer to figure 1 , figure 2 and Figure 4 A detailed description of an exemplary system for optimizing scanning of pre-installed applications is provided. will also combine image 3 A detailed description of the corresponding computer-implemented method is provided. In addition, will combine the Figure 5 and Figure 6 A detailed description ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a computer-implemented method for optimizing a scan of a pre-installed application that may include: (1) identifying a plurality of applications on a client device that are subject to a scan-based assessment; (2) ) determining that the plurality of applications have been pre-installed on the client device by a system image of the client device; (3) generating a fingerprint representing the system image; and (4) representing the The fingerprint of the system image is sent to an assessment server, and in response, an assessment of the system image is received to complete the scan-based assessment of the plurality of applications. Various other methods, systems, and computer-readable media are also disclosed.

Description

technical field [0001] The present disclosure generally relates to systems and methods for optimizing scanning of pre-installed applications. Background technique [0002] Consumers and businesses face an increasing amount of malware that threatens the stability and performance of their computing devices, as well as the security of their data. Computer programmers with malicious motives have created and continue to create viruses, Trojan horses, worms and other programs (collectively referred to as "malware") in an attempt to harm computing devices. To evade detection, malicious programmers may inject malware into or between legitimate programs. [0003] Many security software companies attempt to combat malware by routinely creating and deploying malware signatures (eg, hash functions that uniquely identify malware) to customers. However, performing signature-based security assessments may consume significant computing resources, especially in the case of mobile computing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F11/36
CPCG06F11/3668G06F21/562G06F21/565G06F21/577G06F21/64H04L63/0876H04L63/1433H04L63/145
Inventor 毛军
Owner CA TECH INC