Efficient file scanning using input-output hints
First Claim
Patent Images
1. A computer implemented method for efficiently scanning files for malicious code, the method comprising:
- using a computer to perform steps comprising;
scanning a file stored on a medium for malicious code identified by a malicious code signature;
creating a listing of portions of the file accessed during the scanning for the malicious code signature; and
utilizing the listing of accessed portions of the file to optimize a subsequent scan of the file by the computer for malicious code, wherein the utilizing comprises, prior to the subsequent scan of the file, relocating the accessed portions of the file to be contiguous on the medium.
5 Assignments
0 Petitions
Accused Products
Abstract
A scanning optimization manager scans files for malicious code. The scanning optimization manager creates listings of the portions of scanned files accessed during the scanning. The scanning optimization manager proceeds to utilize these listings of accessed portions of files as I/O hints to optimize subsequent scans of the files for malicious code.
-
Citations
21 Claims
-
1. A computer implemented method for efficiently scanning files for malicious code, the method comprising:
using a computer to perform steps comprising; scanning a file stored on a medium for malicious code identified by a malicious code signature; creating a listing of portions of the file accessed during the scanning for the malicious code signature; and utilizing the listing of accessed portions of the file to optimize a subsequent scan of the file by the computer for malicious code, wherein the utilizing comprises, prior to the subsequent scan of the file, relocating the accessed portions of the file to be contiguous on the medium. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A non-transitory computer readable medium containing computer program code for efficiently scanning files for malicious code, the computer program code comprising:
-
program code for scanning a file on a medium for malicious code identified by a malicious code signature, the scanning comprising accessing portions of the file to examine the portions for the malicious code signature, the accessed portions of the file constituting less than all of the file; program code for creating a listing of portions of the file accessed during the scanning for the malicious code signature; and program code for utilizing the listing of accessed portions of the file to optimize a subsequent scan of the file by the computer for malicious code, wherein the utilizing comprises, prior to the subsequent scan of the file, relocating the accessed portions of the file to be contiguous on the medium. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system for efficiently scanning files for malicious code, the computer system comprising:
-
a computer processor; and a computer-readable storage medium storing software portions configured to execute on the computer processor, the software portions comprising; a software portion configured to scan a file on a medium for malicious code identified by a malicious code signature, the scanning comprising accessing portions of the file to examine the portions for the malicious code signature, the accessed portions of the file constituting less than all of the file; a software portion configured to create a listing of the portions of the file accessed during the scanning for the malicious code signature; and a software portion configured to utilize the listing of accessed portions of the file to optimize a subsequent scan of the file by the computer for malicious code, wherein the utilizing comprises, prior to the subsequent scan of the file, relocating the accessed portions of the file to be contiguous on the medium. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification