×

Systems and methods for discouraging polymorphic malware

  • US 9,189,629 B1
  • Filed: 08/28/2008
  • Issued: 11/17/2015
  • Est. Priority Date: 08/28/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for discouraging polymorphic malware, the method comprising:

  • receiving a request to register a file in a registration database, the request comprising the file;

    prompting a user to select between solving a human-verification test and payment of a specified fee in order to register the file by;

    simultaneously displaying both a graphical option for the user to solve the human-verification test and a graphical option for the user to pay the specified fee;

    prompting the user to select one of the two simultaneously displayed graphical options in order to register the file;

    receiving a selection from the user between solving the human-verification test and payment of the specified fee;

    applying a registration tax to the file in accordance with the user'"'"'s selection;

    determining based on whether the registration tax for the file has been satisfied in accordance with the user'"'"'s selection, whether to register the file in the registration database;

    verifying legitimacy of the file by at least one of;

    determining whether a digital signature of the file matches a digital signature of a known malicious file;

    determining whether the file contains a malicious payload by executing the file within a virtual computing environment;

    determining, based at least in part on whether the file has been registered in the registration database and the verifying legitimacy of the file, whether to add the file to an approved-file database;

    adding the file to the approved-file database in accordance with the determining; and

    transmitting information to a client device to enable the client device to check whether a digital signature of a candidate file at the client device matches the digital signature of the file added to the approved-file database, the transmitted information comprising at least one of;

    an approved-file list based at least in part on the approved-file database;

    an indication of whether the digital signature of the candidate file at the client device matches the digital signature of the file added to the approved-file database based on a comparison performed at a server device;

    wherein the server device performs the method.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×