Scanning data in an access restricted file for malware

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S024000

Reexamination Certificate

active

07660797

ABSTRACT:
The present invention is directed toward a system, method, and computer-readable medium that scan a file for malware that maintains a restrictive access attribute that limits access to the file. In accordance with one aspect of the present invention, a method for performing a scan for malware is provided when antivirus software on a computer encounters a file with a restrictive access attribute that prevents the file from being scanned. More specifically, the method includes identifying the restrictive access attribute that limits access to the file; bypassing the restrictive access attribute to access data in the file; and using a scan engine to scan the data in the file for malware.

REFERENCES:
patent: 5584023 (1996-12-01), Hsu
patent: 5740370 (1998-04-01), Battersby et al.
patent: 6766458 (2004-07-01), Harris et al.
patent: 6779117 (2004-08-01), Wells
patent: 6856993 (2005-02-01), Verma et al.
patent: 7409389 (2008-08-01), Ananthanarayanan et al.
patent: 2002/0111133 (2002-08-01), Wittkotter
patent: 2003/0110392 (2003-06-01), Aucsmith et al.
patent: 2005/0099395 (2005-05-01), Marsden et al.
patent: 2005/0149525 (2005-07-01), Verma et al.
patent: 2005/0183143 (2005-08-01), Anderholm et al.
patent: 2006/0021032 (2006-01-01), Challener et al.
patent: 2006/0095965 (2006-05-01), Phillips et al.
patent: 2006/0218635 (2006-09-01), Kramer et al.
patent: 2006/0259487 (2006-11-01), Havens et al.
patent: 2006/0294391 (2006-12-01), Wu
patent: 2007/0174916 (2007-07-01), Ching
patent: 2007/0294744 (2007-12-01), Alessio et al.
patent: 606771 (1994-07-01), None
patent: 1655682 (2006-05-01), None
Norton, “Norton System Works 2002”, Aug. 13, 2001, Symantec, Professional Ed., p. 23, 31, 52, 59, 65, 81, 113, 126, 129, 140,151, 221, 222-226.
Kim et al., “The design and implementation of tripwire, a file system integrity checker”, Nov. 1994, Proceedings of the 2nd ACM Conference on Computer and Communications Security CCS'94, ACM Press, p. 18-29.
support.microsoft.com, “Windows Explorer does not support file management using Principle of Least Privilege”, Apr. 21, 2004, Microsoft Help and Support Site, p. 1-2.
Mirapaul, “Newswatch: Culture; Crashing PC's in Frankfurt, The Art World's New Bad Boys”, May 30, 2002, NYTimes.com, Retrieved Feb. 6, 2008, p. 1.
Docherty et al, “Macro Attacks: What Next After Melissa?”, 1999, Computers & Security, vol. 18, No. 5, p. 391-395, <Retrieved from Science Direct Apr. 6, 2009>.
Stoneburner, “COTS Security Protection Profile—Operating Systems (CSPP-OS)”, Apr. 2003, US Department of Commerce, Version 1.0, 171 pages, <Retrieved from internet Apr. 6, 2009>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Scanning data in an access restricted file for malware does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Scanning data in an access restricted file for malware, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Scanning data in an access restricted file for malware will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4207109

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.