Virus scanning on thin client devices using programmable assembly language
First Claim
1. A method for programmable scanning for malicious content, comprising:
- (a) assembling an anti-virus program having an instruction set;
(b) implementing the anti-virus program in a wireless client device; and
(c) scanning for malicious code on the wireless client device utilizing the anti-virus program;
(d) wherein the anti-virus program is assembled in a programmable computing language.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, method and article of manufacture are provided for programmable scanning for malicious content on a wireless client device. Initially, an anti-virus program having an instruction set is assembled in a programmable computing language. The anti-virus program is implemented in a wireless client device. A scan for malicious code is performed on the wireless client device utilizing the anti-virus program. A method for programmable scanning for malicious content on a thin client device is also provided. An anti-virus engine is assembled in a programmable computing language. The anti-virus engine is installed on a thin client device. A signature file is also assembled in a programmable computing language, the signature file containing an identifier uniquely identifying a computer virus and a virus detection section comprising object code providing operations to detect the identified computer virus on the thin client device. The signature file is also installed on the thin client device. The anti-virus engine is initiated for scanning for malicious code on the thin client device utilizing the signature file.
-
Citations
24 Claims
-
1. A method for programmable scanning for malicious content, comprising:
-
(a) assembling an anti-virus program having an instruction set;
(b) implementing the anti-virus program in a wireless client device; and
(c) scanning for malicious code on the wireless client device utilizing the anti-virus program;
(d) wherein the anti-virus program is assembled in a programmable computing language. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
(i) deleting an item;
(ii) truncating a file;
(iii) copying bytes from one location to another; and
(iv) overwriting bytes in a stream.
-
-
8. The method as recited in claim 1, wherein the anti-virus program includes a signature file used to identify malicious code, wherein the signature file is compiled utilizing the programmable computing language.
-
9. The method as recited in claim 8, wherein the signature file includes:
-
(i) an identifier uniquely identifying an instance of malicious code;
(ii) a malicious code detection section comprising object code providing operations to detect the identified instance of malicious code in the wireless client device; and
(iii) an extension sentence comprising object code providing reusable operations implemented in the programmable computing language.
-
-
10. A system for programmable scanning for malicious content, comprising:
-
(a) a signature file compiled from computing language source code, the signature file being used to identify malicious code; and
(b) an anti-virus engine assembled in a programmable computing language and implemented in a wireless environment, the anti-virus engine being for scanning for malicious code on a client device utilizing the signature file.
-
-
11. A computer program product for programmable scanning for malicious content, comprising:
-
(a) computer code for assembling an anti-virus program having an instruction set, wherein the anti-virus program is assembled utilizing a programmable computing language;
(b) computer code for implementing the anti-virus program in a wireless environment; and
(c) computer code for scanning for malicious code on a client device utilizing the anti-virus program.
-
-
12. A method for programmable scanning for malicious content, comprising:
-
(a) assembling an anti-virus engine written in a programmable computing language;
(b) installing the anti-virus engine on a thin client device;
(c) assembling a signature file in a programmable computing language, the signature file containing an identifier uniquely identifying a computer virus and a virus detection section comprising object code providing operations to detect the identified computer virus on the thin client device;
(d) installing the signature file on the thin client device;
(e) initiating the anti-virus engine for scanning for malicious code on the thin client device utilizing the signature file. - View Dependent Claims (13, 14, 15, 16, 17)
(i) deleting an item;
(ii) truncating a file;
(iii) copying bytes from one location to another; and
(iv) overwriting bytes in a stream.
-
-
18. A method for programmable scanning for malicious content, comprising:
-
(a) assembling an anti-virus engine in a programmable computing language;
(b) installing the anti-virus engine on a wireless device;
(c) assembling a signature file using a programmable computing language, the signature file containing an identifier uniquely identifying a computer virus and a virus detection section comprising object code providing operations to detect the identified computer virus on the wireless device;
(d) installing the signature file on the wireless device; and
(e) initiating the anti-virus engine for scanning for malicious code on the wireless device utilizing the signature file. - View Dependent Claims (19, 20, 21, 22, 23)
(i) deleting an item;
(ii) truncating a file;
(iii) copying bytes from one location to another; and
(iv) overwriting bytes in a stream.
-
-
24. A method for programmable scanning for malicious content, comprising:
-
(a) assembling an anti-virus engine using a programmable computing language;
(b) installing the anti-virus engine on a thin client device;
(c) said thin client device being selected from a group consisting of;
a wireless telephone, a personal digital assistant, a handheld computer, and a pager;
(d) assembling a signature file using a programmable computing language, the signature file containing an identifier uniquely identifying a computer virus and a virus detection section comprising object code providing operations to detect the identified computer virus on the thin client device;
(e) adding to the signature file;
an extension sentence comprising object code providing reusable operations implemented in the programmable computing language;
(f) combining discrete function automations for several types of malicious code in a single discrete function automation for scanning for the types of malicious code simultaneously;
(g) installing the signature file on the thin client device;
(h) initiating the anti-virus engine for scanning for malicious code on a client device utilizing the signature file;
(i) said anti-virus engine utilizing discrete function automation for pattern matching during scanning; and
(j) disabling malicious code detected during the scanning, wherein the malicious code is disabled by performing at least one of;
(i) deleting an item;
(ii) truncating a file;
(iii) copying bytes from one location to another; and
(iv) overwriting bytes in a stream.
-
Specification