Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer peripheral apparatus and method of controlling the same

a peripheral device and computer technology, applied in the field of anti-virus technique, can solve the problems of destroying data such as fonts and programs stored in specific areas, causing damage to the apparatus, and causing damage to the apparatus, and achieve the effect of minimizing damag

Inactive Publication Date: 2009-12-10
CANON KK
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a computer peripheral apparatus that can minimize damage caused by computer viruses. The apparatus includes a check unit that checks whether received data is infected with a computer virus. If the received data satisfies a predetermined condition, the check unit is activated after the predetermined data processing. On the other hand, if the received data does not satisfy the predetermined condition, the check unit is activated before the predetermined data processing. This helps to prevent computer viruses from causing damage to the computer system.

Problems solved by technology

If, however, an apparatus having the high-speed processing mode as described above intermittently receives in this high-speed processing mode a job contaminated by a computer virus which poses a problem in the apparatus itself, damage to the apparatus may become enormous.
Therefore, damage can be given to the apparatus by hiding harmful data in a job and causing the control program to process the job.
That is, as shown in FIG. 12, the first attack example hides harmful data which looks like font data in a print job, and causes the printer to write this data in a specific area of the internal hard disk of the printer, thereby destroying data such as fonts and programs stored in the specific area.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer peripheral apparatus and method of controlling the same
  • Computer peripheral apparatus and method of controlling the same
  • Computer peripheral apparatus and method of controlling the same

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0035]FIG. 1 is a block diagram showing the arrangement of a printer as a computer peripheral apparatus of this embodiment.

[0036]A printer 100 is connected to a client PC 120 as an external apparatus so as to be able to communicate with the client PC 120. Note that although only one client PC connected to the printer 100 is illustrated in FIG. 1, a plurality of client PCs can exist in practice. Since these client PCs are sources of supplying data to the printer 100, they will be also called “supply source computers” hereinafter. Note also that the form of connection between the client PC and printer can be either wired or wireless.

[0037]Basically, the printer 100 prints on the basis of data supplied from the client PC 120. In the printer 100, a main CPU 101 is a central control unit for controlling the whole apparatus. A network controller 102 controls transmission and reception. That is, the network controller 102 receives a print request, print data, storage request, storage data,...

second embodiment

[0062]The second embodiment controls the execution timing of virus check on the basis of attribute information of supplied data.

[0063]FIG. 9 is a block diagram showing the arrangement of a printer of this embodiment. The same reference numerals as the components shown in FIG. 1 of the first embodiment denote the same components in FIG. 9. As shown in FIG. 9, the arrangement of this printer is almost the same as the printer of the first embodiment, so a description of each part will be omitted. The difference from the printer of the first embodiment is that a hard disk unit 106 further stores a safety check table 60.

[0064]More specifically, a client PC 120 of this embodiment is arranged as shown in FIG. 10.

[0065]Referring to FIG. 10, a CPU 1 controls the whole computer, a ROM 2 stores a boot program and the like, a RAM 3 functions as a main memory, and a hard disk driver (HDD) 4 stores various programs and data. A memory (VRAM) 5 is used to rasterize image data to be displayed. Image...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer peripheral apparatus of this invention has a check step of checking whether received data is infected with a computer virus. If the received data satisfies a predetermined condition, the apparatus executes the check step before predetermined data processing. If the received data does not satisfy the predetermined condition, the apparatus executes the check step before the predetermined data processing.

Description

RELATED APPLICATIONS[0001]The present application is a continuation of application Ser. No. 10 / 704,676, filed Nov. 12, 2003, claims benefit of that application under 35 U.S.C. § 120, claims priority benefit under 35 U.S.C. § 119 of Japanese patent applications nos. 2002 / 327144 and 2003 / 352545, filed Nov. 11, 2002, and Oct. 10, 2003, respectively, and incorporates the entire content of each of the three mentioned applications by reference.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to an anti-computer virus technique in a computer peripheral apparatus for performing specific processing for data supplied from an external apparatus.[0004]2. Background of the Invention[0005]A computer virus is a typical example of an unauthorized job or data. For example, as an apparatus for suppressing computer virus infection, Japanese Patent Laid-Open No. 6-350784 discloses a facsimile apparatus which, when detecting that a received file is contaminat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F11/00G06F15/00G06F21/55G05B15/00G06F21/14G06F21/56
CPCG06F21/56G06F21/84G06F21/608
Inventor SHIMIZU, YUKIHIKO
Owner CANON KK