Adjunct Computing Machine for Remediating Malware on Compromised Computing Machine
First Claim
1. In a computing environment, a method performed at least in part on at least one processor comprising, obtaining antimalware-related data at a functional adjunct machine, and transferring the antimalware-related data to a malware-compromised machine for use in remediating malware on the compromised machine.
2 Assignments
0 Petitions
Accused Products
Abstract
Described is a technology by which a malware-compromised machine, such as a personal computer is cleaned through the use of a functional adjunct machine, such as a mobile device (or vice-versa). The functional adjunct machine performs actions on behalf of the malware-compromised machine and/or to assist the remediation. This may include downloading antimalware-related data (e.g., an application, antimalware code, signature updates and/or the like) via a marketplace/application store, and transferring at least some of the data and/or programs to the compromised machine. Other actions may include using the functional adjunct machine to boot the malware-compromised machine into a non-compromised state and providing the data or programs to allow remediation of the malware while in this state.
-
Citations
20 Claims
- 1. In a computing environment, a method performed at least in part on at least one processor comprising, obtaining antimalware-related data at a functional adjunct machine, and transferring the antimalware-related data to a malware-compromised machine for use in remediating malware on the compromised machine.
- 10. In a computing environment, a system comprising, a compromised machine containing malware that prevents the compromised machine from cleaning the malware by disabling one or more resources of the compromised machine, a functional adjunct machine coupled to the compromised machine, the functional adjunct machine configured to obtain antimalware-related data on behalf of the malware-compromised machine and to perform one or more actions that use the antimalware-related data as part of a remediation operation that remediates the malware to transform the compromised machine into a clean machine.
-
17. One or more computer-readable media having computer-executable instructions, which when executed perform steps, comprising:
-
booting a machine having storage compromised with malware into an offline state with respect to running malware, in which the booting is performed off of a functional adjunct machine that has downloaded boot code and antimalware data; receiving at least part of the antimalware data while in the offline state from the functional adjunct machine, including antimalware code; and executing the antimalware code while in the offline state to remediate the malware in the storage. - View Dependent Claims (18, 19, 20)
-
Specification