System and method of opportunistically protecting a computer from malware
First Claim
1. In a computer that includes antivirus software, a method of closing a vulnerability on the computer in response to identifying malware on the computer, the method comprising:
- (a) identifying a vulnerability exploited by the malware;
(b) obtaining a software update from a trusted entity that is designed to close the vulnerability; and
(c) causing the software update to be installed on the computer.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a system, method, and computer-readable medium that opportunistically install a software update on a computer that closes a vulnerability that existed on the computer. In accordance with one aspect of the present invention, when antivirus software on a computer identifies malware, a method causes a software update that closes the vulnerability exploited by the malware to be installed on the computer. The method includes identifying the vulnerability exploited by the malware, using a software update system to obtain a software update that is configured to close the vulnerability; and causing the software update to be installed on the computer where the vulnerability exists.
-
Citations
20 Claims
-
1. In a computer that includes antivirus software, a method of closing a vulnerability on the computer in response to identifying malware on the computer, the method comprising:
-
(a) identifying a vulnerability exploited by the malware;
(b) obtaining a software update from a trusted entity that is designed to close the vulnerability; and
(c) causing the software update to be installed on the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium bearing computer-executable instructions that, when executed on a computer that includes antivirus software, carry out a method for closing a vulnerability on the computer in response to identifying malware on the computer, the method comprising:
-
(a) identifying a vulnerability exploited by the malware;
(b) obtaining a software update from a trusted entity that is designed to close the vulnerability; and
(c) causing the software update to be installed on the computer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A software system for closing a vulnerability on a first computer using a software update available from a second computer, the software system comprising:
-
(a) antivirus software for identifying data on the first computer that is characteristic of malware;
(b) a data store that maps a vulnerability to malware the exploits the vulnerability; and
(c) a coordination module operative to cause a software update to be installed on the first computer which closes the vulnerability exploited by the malware when notice is received from the antivirus software that malware was identified on the first computer. - View Dependent Claims (18, 19, 20)
-
Specification