System and method for protecting a limited resource computer from malware
First Claim
1. In a computing environment that includes a general purpose computer and a limited resource computer, a method of preventing malware from infecting the limited resource computer, the method comprising:
- (a) filtering the application that is scheduled to be installed on the limited resource computer through the general purpose computer;
(b) causing antivirus software on the general purpose computer to scan the application for malware; and
(c) reporting the security status of the application to the limited resource computer.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a system and methods for protecting a limited resource computer from malware. Aspects of the present invention use antivirus software on a general purpose computer to prevent malware from infecting a limited resource computer. Typically, antivirus software on the general purpose computer is kept “up-to-date” with the most recent software updates. When a connection is established between the limited resource computer and the general purpose computer, a signature of each application installed on the limited resource computer is transmitted to the general purpose computer. Then antivirus software on the general purpose computer compares the received signatures to known malware. Finally, the results of the scan are reported to the limited resource computer.
325 Citations
20 Claims
-
1. In a computing environment that includes a general purpose computer and a limited resource computer, a method of preventing malware from infecting the limited resource computer, the method comprising:
-
(a) filtering the application that is scheduled to be installed on the limited resource computer through the general purpose computer;
(b) causing antivirus software on the general purpose computer to scan the application for malware; and
(c) reporting the security status of the application to the limited resource computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. In a computer environment that includes a general purpose computer and a limited resource computer, a method of identifying malware in an application on the limited resource, the method comprising:
-
(a) generating a signature of the application;
(b) transmitting the signature to the general purpose computer; and
(c) determining whether the signature transmitted to the general purpose computer matches a signature that was generated from malware. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A computer system that prevents malware from being executed on a limited resource computer, the computer system comprising:
-
(a) a general purpose computer operative to identify malware on behalf of a limited resource computer, wherein the general purpose computer includes;
(i) antivirus software designed to determine if an application is infected with malware; and
(ii) a signature database for tracking the status of the application;
(b) a limited resource computer that includes;
(i) a signature database for tracking the status of the application stored on the limited resource computer; and
(ii) an operating system operative to query the signature database for the security status of the application before executing the application; and
(c) a communication means for transmitting data between the general purpose computer and the limited resource computer. - View Dependent Claims (20)
-
Specification