Scanning data in an access restricted file for malware
First Claim
1. A method of scanning a file stored on a computer that maintains a restrictive access attribute that limits access to the file, the method comprising:
- (a) identifying the restrictive access attribute that limits access to the file;
(b) bypassing the restrictive access attribute to access data in the file; and
(c) analyzing the data in the file for malware.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed toward a system, method, and computer-readable medium that scan a file for malware that maintains a restrictive access attribute that limits access to the file. In accordance with one aspect of the present invention, a method for performing a scan for malware is provided when antivirus software on a computer encounters a file with a restrictive access attribute that prevents the file from being scanned. More specifically, the method includes identifying the restrictive access attribute that limits access to the file; bypassing the restrictive access attribute to access data in the file; and using a scan engine to scan the data in the file for malware.
-
Citations
20 Claims
-
1. A method of scanning a file stored on a computer that maintains a restrictive access attribute that limits access to the file, the method comprising:
-
(a) identifying the restrictive access attribute that limits access to the file;
(b) bypassing the restrictive access attribute to access data in the file; and
(c) analyzing the data in the file for malware. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium bearing computer-executable instructions that, when executed on a computer that includes a file that maintains a restrictive access attribute that limits access to the file, carries out a method for scanning the file for malware, the method comprising:
-
(a) identifying the restrictive access attribute that limits access to the file;
(b) bypassing the restrictive access attribute to access data in the file; and
(c) analyzing the data in the file for malware. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A software system for scanning a file for malware that maintains a restrictive access attribute that limits access to the file, the software system comprising:
-
(a) a scan engine for identifying data characteristic of malware; and
(b) an access module for bypassing the restrictive access attribute that limits access to the file. - View Dependent Claims (18, 19, 20)
-
Specification