Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2005-05-27
2010-02-09
Alam, Hosain T (Department: 2166)
Data processing: database and file management or data structures
Database design
Data structure types
C726S024000
Reexamination Certificate
active
07660797
ABSTRACT:
The present invention is directed toward a system, method, and computer-readable medium that scan a file for malware that maintains a restrictive access attribute that limits access to the file. In accordance with one aspect of the present invention, a method for performing a scan for malware is provided when antivirus software on a computer encounters a file with a restrictive access attribute that prevents the file from being scanned. More specifically, the method includes identifying the restrictive access attribute that limits access to the file; bypassing the restrictive access attribute to access data in the file; and using a scan engine to scan the data in the file for malware.
REFERENCES:
patent: 5584023 (1996-12-01), Hsu
patent: 5740370 (1998-04-01), Battersby et al.
patent: 6766458 (2004-07-01), Harris et al.
patent: 6779117 (2004-08-01), Wells
patent: 6856993 (2005-02-01), Verma et al.
patent: 7409389 (2008-08-01), Ananthanarayanan et al.
patent: 2002/0111133 (2002-08-01), Wittkotter
patent: 2003/0110392 (2003-06-01), Aucsmith et al.
patent: 2005/0099395 (2005-05-01), Marsden et al.
patent: 2005/0149525 (2005-07-01), Verma et al.
patent: 2005/0183143 (2005-08-01), Anderholm et al.
patent: 2006/0021032 (2006-01-01), Challener et al.
patent: 2006/0095965 (2006-05-01), Phillips et al.
patent: 2006/0218635 (2006-09-01), Kramer et al.
patent: 2006/0259487 (2006-11-01), Havens et al.
patent: 2006/0294391 (2006-12-01), Wu
patent: 2007/0174916 (2007-07-01), Ching
patent: 2007/0294744 (2007-12-01), Alessio et al.
patent: 606771 (1994-07-01), None
patent: 1655682 (2006-05-01), None
Norton, “Norton System Works 2002”, Aug. 13, 2001, Symantec, Professional Ed., p. 23, 31, 52, 59, 65, 81, 113, 126, 129, 140,151, 221, 222-226.
Kim et al., “The design and implementation of tripwire, a file system integrity checker”, Nov. 1994, Proceedings of the 2nd ACM Conference on Computer and Communications Security CCS'94, ACM Press, p. 18-29.
support.microsoft.com, “Windows Explorer does not support file management using Principle of Least Privilege”, Apr. 21, 2004, Microsoft Help and Support Site, p. 1-2.
Mirapaul, “Newswatch: Culture; Crashing PC's in Frankfurt, The Art World's New Bad Boys”, May 30, 2002, NYTimes.com, Retrieved Feb. 6, 2008, p. 1.
Docherty et al, “Macro Attacks: What Next After Melissa?”, 1999, Computers & Security, vol. 18, No. 5, p. 391-395, <Retrieved from Science Direct Apr. 6, 2009>.
Stoneburner, “COTS Security Protection Profile—Operating Systems (CSPP-OS)”, Apr. 2003, US Department of Commerce, Version 1.0, 171 pages, <Retrieved from internet Apr. 6, 2009>.
Chicioreanu George C
Field Scott A
Gheorghescu Marius Gheorghe
Marinescu Adrian M
Alam Hosain T
Lin Shew-Fen
Microsoft Corporation
Workman Nydegger
LandOfFree
Scanning data in an access restricted file for malware does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Scanning data in an access restricted file for malware, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Scanning data in an access restricted file for malware will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4207109