METHOD AND APPARATUS FOR AUTOMATICALLY PROTECTING A COMPUTER AGAINST A HARMFUL PROGRAM
First Claim
Patent Images
1. A method for automatically protecting a computer, comprising:
- restricting an object program from accessing some resources in a computer system based on predetermined resource access rules;
scanning computer resources accessed by the object program to determine whether the accessed computer resources are infected by the object program; and
analyzing malicious behaviors based on behavior characteristics of the object program to determine whether the object program is a harmful program.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention discloses a method and apparatus for automatically protecting computers against harmful programs. The method comprises: restricting an object program from accessing some resources in a computer system based on predetermined resource access rules; scanning computer resources accessed by the object program to determine whether the accessed computer resources are infected by the object program; and analyzing malicious behaviors based on behavior characteristics of the object program to determine whether the object program is a harmful program.
37 Citations
15 Claims
-
1. A method for automatically protecting a computer, comprising:
-
restricting an object program from accessing some resources in a computer system based on predetermined resource access rules; scanning computer resources accessed by the object program to determine whether the accessed computer resources are infected by the object program; and analyzing malicious behaviors based on behavior characteristics of the object program to determine whether the object program is a harmful program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus for automatically protecting a computer from a harmful program comprising:
-
a resource access rule control module for restricting an object program from accessing some resources in a computer system based on predetermined resource access rules; a resource access scanning module for scanning computer resources accessed by the object program to determine whether the accessed computer resources are infected by the object program; and a malicious behavior analyzing module for analyzing malicious behaviors based on behavior characteristics of the object program to determine whether the object program is a harmful program. - View Dependent Claims (13, 14, 15)
-
Specification