System, method and computer program product for removing null values during scanning
First Claim
Patent Images
1. A method, comprising:
- receiving a set of data values at a computer, which includes a processor;
determining if a threshold is met before removing null values;
removing the null values between the data values such that the data values are made contiguous and shorter;
evaluating a size of the data values after the null values have been removed;
scanning the set of data values with the null values removed to identify unwanted data in the computer, wherein an offset is utilized for determining a location in the set of data values where the scanning is to start, and wherein the offset matches the location in the set of data values with a first portion of a virus signature; and
collapsing at least a portion of whitespace within text-based files corresponding to the set of data values such that certain sequences of whitespace characters are replaced by a single whitespace character.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for scanning data values. Initially, a set of data values are received. Null values between the data values are then removed such that the data values are contiguous. Further, the data values with the null values removed are scanned for the purpose of identifying unwanted data.
-
Citations
19 Claims
-
1. A method, comprising:
-
receiving a set of data values at a computer, which includes a processor; determining if a threshold is met before removing null values; removing the null values between the data values such that the data values are made contiguous and shorter; evaluating a size of the data values after the null values have been removed; scanning the set of data values with the null values removed to identify unwanted data in the computer, wherein an offset is utilized for determining a location in the set of data values where the scanning is to start, and wherein the offset matches the location in the set of data values with a first portion of a virus signature; and collapsing at least a portion of whitespace within text-based files corresponding to the set of data values such that certain sequences of whitespace characters are replaced by a single whitespace character. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product embodied on a non-transitory computer readable medium, comprising:
-
receiving a set of data values at a computer, which includes a processor; determining if a threshold is met before removing null values; removing the null values between the data values such that the data values are made contiguous and shorter; evaluating a size of the data values after the null values have been removed; scanning the set of data values with the null values removed to identify unwanted data in the computer, wherein an offset is utilized for determining a location in the set of data values where the scanning is to start, and wherein the offset matches the location in the set of data values with a first portion of a virus signature; and collapsing at least a portion of whitespace within text-based files corresponding to the set of data values such that certain sequences of whitespace characters are replaced by a single whitespace character.
-
-
19. A system, comprising:
-
memory coupled to a processor via a bus; and a processor, wherein the system is configured to; receive a set of data values at a computer, which includes a processor; determine if a threshold is met before removing null values; remove the null values between the data values such that the data values are made contiguous and shorter; evaluate a size of the data values after the null values have been removed; scan the set of data values with the null values removed to identify unwanted data in the computer, wherein an offset is utilized for determining a location in the set of data values where the scanning is to start, and wherein the offset matches the location in the set of data values with a first portion of a virus signature; and collapse at least a portion of whitespace within text-based files corresponding to the set of data values such that certain sequences of whitespace characters are replaced by a single whitespace character.
-
Specification