Protecting embedded devices with integrated reset detection
First Claim
1. A method for protecting a data processing system against malicious code, comprising the steps of:
- A. scanning an active memory for evidence of a hard reset code;
B. scanning a filesystem for evidence of a hard rest code;
C. scanning said active memory for evidence of a soft reset code;
D. scanning said filesystem for evidence of a soft reset code;
wherein, if any evidence of reset code is discovered during the scanning operations of steps a through d;
E. blocking and cleaning the reset code.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for optimizing the security of embedded, mobile devices such as personal data assistants and Smartphones by protecting against soft and hard reset code attacks. In a preferred embodiment, this is achieved by 1. Scanning the active memory for evidence of “hard reset attack” code. 2. Scanning the filesystem for evidence of “hard reset attack” code. 3. Scanning the active memory for evidence of “soft reset attack” code. 4. Scanning the filesystem for evidence of “soft reset attack” code. 5. Automatically blocking and cleaning the reset code, based on user preference. 6. Providing optional user control over which programs are allowed to write to the startup folder.
-
Citations
20 Claims
-
1. A method for protecting a data processing system against malicious code, comprising the steps of:
-
A. scanning an active memory for evidence of a hard reset code;
B. scanning a filesystem for evidence of a hard rest code;
C. scanning said active memory for evidence of a soft reset code;
D. scanning said filesystem for evidence of a soft reset code;
wherein, if any evidence of reset code is discovered during the scanning operations of steps a through d;
E. blocking and cleaning the reset code. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for protecting against malicious code, comprising the steps of:
-
A. scanning an active memory for evidence of a hard reset code;
B. scanning a filesystem for evidence of a hard rest code;
wherein, if any evidence of reset code is discovered during the scanning operations of steps A and B;
C. blocking and cleaning the reset code. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for protecting against malicious code, comprising the steps of:
-
A. scanning an active memory for evidence of a soft reset code;
B. scanning an filesystem for evidence of a soft reset code;
wherein, if any evidence of reset code is discovered during the scanning operations of steps A and B;
C. blocking and cleaning the reset code. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. An apparatus for protecting a data processing system against malicious code, comprising:
-
a. means for scanning an active memory for evidence of a hard reset code;
b. means for scanning a filesystem for evidence of a hard rest code;
c. means for scanning said active memory for evidence of a soft reset code;
d. means for scanning said filesystem for evidence of a soft reset code;
e. means for blocking and cleaning any reset code. - View Dependent Claims (20)
-
Specification