Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2007-09-04
2007-09-04
Zia, Syed A. (Department: 2131)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000, C726S027000, C713S188000, C713S189000, C713S193000, C713S194000, C705S051000, C705S052000, C714S038110
Reexamination Certificate
active
10025572
ABSTRACT:
Pre-emptive malware scanning of user specified operating system10, 12defined storage locations is performed to establish whether those storage locations contain any malware containing computer files. If the storage locations are malware-free, then they are classified as clean storage locations and subsequent read accesses to those storage locations will be permitted without requiring further malware scanning. Writes to clean storage locations will continue to be malware scanned.
REFERENCES:
patent: 5502815 (1996-03-01), Cozza
patent: 5613002 (1997-03-01), Kephart et al.
patent: 5684875 (1997-11-01), Ellenberger
patent: 6021510 (2000-02-01), Nachenberg
patent: 6073239 (2000-06-01), Dotan
patent: 6266774 (2001-07-01), Sampath et al.
patent: 6735700 (2004-05-01), Flint et al.
patent: 6763466 (2004-07-01), Glover
patent: 6772346 (2004-08-01), Chess et al.
patent: 6892303 (2005-05-01), Le Pennec et al.
patent: 6938161 (2005-08-01), Vignoles et al.
patent: 7155461 (2006-12-01), Miyata et al.
patent: 2002/0016925 (2002-02-01), Pennec et al.
patent: 2002/0103783 (2002-08-01), Muhlestein
W.T. Polk, L.E. Bassham. “A Guide to the Selection of Anti-Virus Tools and Techniques” Dec. 2, 1992. NIST Computer Security Division.
Bontchev, Vesselin. Possible Virus Attacks Against Integrity Programs and How to Prevent Them, Proc. 2nd Int. Virus Bull. Conf., 1992, pp. 131-141.
G.H. Kim, E.H. Spafford. “The Design and Implementation of Tripwire: A File System Integrity Checker”. 1994, ACM.
Jones, Dave. “Building an E-mail Virus Detection System for Your Network”. Dec. 2001, Linux Journal.
Cohen, Fred. “Current Best Pratice Against Computer Viruses” Oct. 1991. Security Technology. Proceedings. 25th Annual 1991 IEEE International Carnahan Conference.
Symantec.com. “Norton AntiVirus 2001 for Windows 2000/NT/Me/98/95.” Oct. 27, 2000. Archived page provided by archive.org : http://web.archive.org/web/20001109035700/www.symantec.com
av
av—9xnt/.
Green et al. “Vesseling Bontchev's Paper ‘Vircing The invircible’ [long] (pc)” Sep. 5, 1996. usenet:comp.virus. Post of interest dated Sep. 6, 1996 by Bill Lambdin.
Probert, Matthew. “Timid” Mar. 28, 1998. usenet:alt.comp.virus.source.code.
Hruska, Jan “Virus Detection” European Conference on Security and Detection, Apr. 28-30, 1997, Conference Publication No. 437 p. 128-131. IEE.
Colorade, Dave et al. “How to Exclude Folders from NAV Virus Scanning?” (Apr. 4, 2001 3:23pm) usenet:alt.sci.seti.
P. Faltstrom, D. Crocker, E.E. Flair “RFC 1740: MIME Encapsulation of Macintosh file—MacMIME” (Dec. 1994).
C. Davidson et al. “UNIX Anti-Virus Software” (Jul. 21, 1997). usenet:comp.security.unix Post 4 dated Jul. 23, 1997.
A. Hideharu et al, “Method for Preventing Intrusion of Computer Virus”Patent Abstracts of JapanNo. 09231067A, 1997.
Trend Micro, Inc., “Eliminating Viruses in the Microsoft Exchange Environment with Trend ScanMail for Exchange” 1999.
Barton Christopher Andrew
Lawson Tarbotton Lee Codel
Vignoles James Malcolm
Hamaty Christopher J.
McAfee, Inc.
Zia Syed A.
Zilka-Kotab, PC
LandOfFree
Malware scanning to create clean storage locations does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Malware scanning to create clean storage locations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Malware scanning to create clean storage locations will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3737372