Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for detecting malicicous code

A malicious code, code technology, applied in the field of detecting malicious code, can solve heavy and other problems

Inactive Publication Date: 2005-07-27
COMP ASSOC THINK INC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the number of computer viruses increases, so does the time required to adequately scan a computer system, making it a onerous job

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting malicicous code
  • System and method for detecting malicicous code
  • System and method for detecting malicicous code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In describing the preferred embodiments of the invention illustrated in the drawings, specific terminology will be employed for the sake of clarity. However, the invention is not to be limited only by the specific terms so chosen, and each specific element should be considered to include all technical equivalents that work in a similar manner.

[0015] figure 1 An example of a computer system capable of implementing the methods and systems of the present invention is described. The systems and methods of the present invention can be implemented in the form of software running on a computer system such as a mainframe, personal computer (PC), laptop, server, and the like. Application software can be stored in a recording medium locally accessible to the computer system, such as a floppy disk, CD, hard disk, etc., or it can be accessed remotely from the computer system through a hardwired or wireless connection to a network, such as a local area network or the Internet. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of detecting malicious code in computer readable code includes performing an initial determination to determine whether a first portion of the computer readable code may potentially havemalicious code and if it is determined that the computer readable code potentially has malicious code, performing another determination to determine whether a second portion not including the first portion of the computer readable code has malicious code.

Description

[0001] References to related applications [0002] This application claims the benefit of Provisional Application No. 60 / 372,283, filed April 13, 2002, and Provisional Application No. 60 / 372,473, filed April 15, 2002, the contents of which are hereby incorporated as refer to. technical field [0003] The present invention relates to a system and method for detecting malicious code. Background technique [0004] Every year, more and more computer viruses and their variants are encountered. The amount of work required to maintain computer systems against these viruses has also increased dramatically. One way to try to keep your computer system virus-free is to periodically scan your system for viruses. To optimize security, such scans are usually performed at least once a day. However, as the number of computer viruses increases, so does the time required to adequately scan a computer system, making it a onerous task. [0005] Therefore, what is needed is a system and met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/00
CPCG06F21/565G06F21/564
Inventor 伊特沙克·卡莫纳塔拉斯·玛利万楚科
Owner COMP ASSOC THINK INC