×

System and method for attack and malware prevention

  • US 8,108,933 B2
  • Filed: 10/21/2008
  • Issued: 01/31/2012
  • Est. Priority Date: 10/21/2008
  • Status: Active Grant
First Claim
Patent Images

1. In a mobile communications device having a network interface for receiving and sending data, a memory and a microprocessor, and further having software components for processing, analyzing and storing data, including at least a known good component for identifying data that is recognizably safe, a known bad component for identifying data that is recognizably malicious, and a decision component for analyzing whether data is safe or malicious and for determining a disposition of the data as a result of the analysis, a method comprising:

  • providing data on the mobile communications device;

    applying a hash function to the data to create a hash identifier for the data;

    comparing by the known good component, the data hash identifier against a database of hash identifiers of known good data stored in the mobile communications device memory;

    if the comparison by the known good component results in a positive match, then allowing the data to be processed by the mobile communications device;

    if the comparison by the known good component does not result in a positive match, then comparing by the known bad component, the data hash identifier against a database stored in the mobile communications device memory containing hash identifiers of known bad data;

    if the comparison by the known bad component results in a positive match, then rejecting the data from being processed by the mobile communications device;

    if the comparison by the known bad component does not result in a positive match, then using the decision component, performing an analysis on the data by the decision component to determine if the data is safe or malicious;

    if the analysis determines that the data is safe, then allowing the data to be processed by the mobile communications device; and

    if the analysis determines that the data is malicious, then rejecting the data from being processed by the mobile communications device.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×