Computer virus screening
First Claim
1. A method of screening a software file for viral infection, the method comprising:
- defining a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures;
scanning said file to determine whether or not the file contains a macro; and
, if the file contains a macro determining a signature for the macro and screening that signature against the signatures contained in said databases; and
alerting a user in the event that the macro has a signature corresponding to a signature contained in said first database and/or in the event that the macro has a signature which does not correspond to a signature contained in either of the second and third databases.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of screening a software file for viral infection comprising defining a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures. The file is scanned to determine whether or not the file contains a macro. If the file contains a macro, a signature for the macro is determined and screened against the signatures contained in said databases. A user is alerted in the event that the macro has a signature corresponding to a signature contained in said first database and/or in the event that the macro has a signature which does not correspond to a signature contained in either of the second and third databases.
-
Citations
14 Claims
-
1. A method of screening a software file for viral infection, the method comprising:
-
defining a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures;
scanning said file to determine whether or not the file contains a macro; and
, if the file contains a macrodetermining a signature for the macro and screening that signature against the signatures contained in said databases; and
alerting a user in the event that the macro has a signature corresponding to a signature contained in said first database and/or in the event that the macro has a signature which does not correspond to a signature contained in either of the second and third databases. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of screening a software file to determine whether any macro contained therein does or does not contain a virus, the method comprising:
-
defining a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures;
scanning said file to determine whether or not the file contains a macro; and
if the file contains a macro, determining whether or not the macro has a signature corresponding to one of the signatures contained in said databases.
-
-
8. Apparatus for screening a software file for viral infection, the apparatus comprising:
-
a memory storing a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures; and
a data processor arranged to scan said file to determine whether or not the file contains a macro and, if the file does contain a macro, to determine whether or not the macro has a signature corresponding to one of the signatures contained in said databases. - View Dependent Claims (9)
-
-
10. A computer memory encoded with executable instructions representing a computer program for causing computer system to:
-
maintain a first database of known macro virus signatures, a second database of known and certified commercial macro signatures, and a third database of known and certified local macro signatures;
scan data files to determine whether or not the files contains a macro; and
if a file contains a macro, determine whether or not the macro has a signature corresponding to one of the signatures contained in said second database. - View Dependent Claims (11, 12, 13, 14)
-
Specification