Known files database for malware elimination
First Claim
Patent Images
1. A method for handling potential malware files, comprising the steps of:
- scanning a plurality of files to identify at least one file as potential malware;
querying a database to determine whether the at least one file is known; and
handling the at least one file based on whether the at least one file is known.
10 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer program product for identifying files that are found during a malware scan, thus enabling them to be excluded from further analysis. A method for handling a potential malware file comprises the steps of scanning a plurality of files to identify at least one file as potential malware, querying a database to determine whether the at least one file is known, and handling the at least one file based on whether the at least one file is known.
41 Citations
24 Claims
-
1. A method for handling potential malware files, comprising the steps of:
-
scanning a plurality of files to identify at least one file as potential malware; querying a database to determine whether the at least one file is known; and handling the at least one file based on whether the at least one file is known. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for handling potential malware files comprising:
-
a processor operable to execute computer program instructions; a memory operable to store computer program instructions executable by the processor; and computer program instructions stored in the memory and executable to perform the steps of; scanning a plurality of files to identify at least one file as potential malware; querying a database to determine whether the at least one file is known; and handling the at least one file based on whether the at least one file is known. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 18, 19, 20, 21, 22, 23, 24)
-
-
17. A computer program product for handling potential malware files comprising:
-
a computer readable storage medium; computer program instructions, recorded on the computer readable storage medium, executable by a processor, for performing the steps of scanning a plurality of files to identify at least one file as potential malware; querying a database to determine whether the at least one file is known; and handling the at least one file based on whether the at least one file is known.
-
Specification