×

Method and computer program product for identifying or managing vulnerabilities within a data processing network

  • US 7,752,669 B2
  • Filed: 07/31/2008
  • Issued: 07/06/2010
  • Est. Priority Date: 12/12/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • computing a set of first hash values derived from and representing a plurality of replicas of a resource, wherein the replicas of the resource are stored on respective data processing systems within a network and the computing of the first hash values is at a first timestoring the computed set of first hash values;

    after computing and storing the set of first hash values, computing second hash values for the replicas of the resource, wherein the computing of the second hash values is at a second time;

    at a central server within the network, automatically comparing the first and second hash values to find new hash values changed between computing the first hash values and computing the second hash values;

    statistically observing a creation pattern of the new hash values to evaluate likelihood of a virus infection; and

    selecting replicas of the resource for virus scanning responsive to the statistically observed creation pattern;

    wherein the statistically observed creation pattern includes a pattern wherein more than a certain predetermined number of the first hash values of the replicas of the resource have remained unchanged as compared to the second hash values and wherein a period defined by the difference between the first and second times is a period of more than a certain predetermined interval.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×