×

System and method for protecting a limited resource computer from malware

  • US 7,650,639 B2
  • Filed: 03/31/2005
  • Issued: 01/19/2010
  • Est. Priority Date: 03/31/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computer system that prevents malware from being executed on a limited resource computer, the computer system comprising:

  • a general purpose computer operative to identify malware on behalf of a limited resource computer, the general purpose computer comprising;

    antivirus software designed to determine if an application is infected with malware; and

    a signature database resident on the general purpose computer for tracking security classification of the application, the antivirus software comparing signatures in the signature database with known malware signatures to associate a security classification with the application signature and record the security classification in the signature database, the security classification comprising at least known malware signatures, unknown signatures, and signatures known to be from a trusted source;

    the limited resource computer comprising;

    a signature database resident on the limited resource computer for tracking the security classification of the application stored on the limited resource computer, the limited resource computer generating a signature of the application when the application is installed on the limited resource computer and storing the signature in the signature database, the signature of the application being generated by applying a hash function to a subset of program code which implements the application;

    an operating system operative to query the signature database of the limited resource computer for a security status of the application before executing the application, the security status comprising at least known good, known malware, and unknown application; and

    the operating system operative to determine whether to execute the application on the limited resource computer based upon the security status; and

    the general purpose computer being operatively coupled to the limited resource computer via a communication connection to transmit data between the general purpose computer and the limited resource computer, the data transmitted including the application signature and associated security classification from the respective signature databases;

    wherein the limited resource computer is a small mobile device selected from personal desktop assistant, hand-held and palm-type computers, and pen tablets; and

    wherein the general purpose computer is desktop or laptop computer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×