System, method and computer program product for accelerating malware/spyware scanning
First Claim
Patent Images
1. A method for scanning files, comprising:
- determining whether a scan is scheduled;
if it is determined that the scan is scheduled;
identifying a plurality of file names in a registry of a computer, utilizing a processor; and
scanning files associated with the file names, where the files with associated file names in the registry are scanned; and
identifying a change in the registry of the computer;
wherein duplicate file names are removed;
wherein the determining whether the scan is scheduled is performed in parallel with the identifying the change in the registry of the computer.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for scanning files. A plurality of file names in a registry of a computer is identified. By this identification, files associated with the file names are scanned. Another system, method and computer program product are further provided. In particular, a change in a registry of a computer is first identified. Then, a scan is conditionally performed based on whether the change in the registry is identified.
43 Citations
31 Claims
-
1. A method for scanning files, comprising:
-
determining whether a scan is scheduled; if it is determined that the scan is scheduled; identifying a plurality of file names in a registry of a computer, utilizing a processor; and scanning files associated with the file names, where the files with associated file names in the registry are scanned; and identifying a change in the registry of the computer; wherein duplicate file names are removed; wherein the determining whether the scan is scheduled is performed in parallel with the identifying the change in the registry of the computer.
-
-
2. A method for scanning files, comprising:
-
determining whether a scan is scheduled; if it is determined that the scan is scheduled; identifying a plurality of file names in a registry of a computer, utilizing a processor; and scanning files associated with the file names, where the files with associated file names in the registry are scanned; and identifying a change in the registry of the computer; wherein the files are scanned for spyware; wherein the determining whether the scan is scheduled is performed in parallel with the identifying the change in the registry of the computer. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
identifying a change in a registry of a computer, utilizing a processor; conditionally performing a scan based on whether the change in the registry is identified, where the conditional scan is performed in order to identify malware or spyware that caused the change; and determining whether a scan is scheduled; wherein the conditional scan includes scanning at least one file and scanning each of a plurality of files identified in the registry; wherein the identifying the change in the registry of the computer is performed in parallel with the determining whether the scan is scheduled. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method, comprising:
-
identifying a change in a registry of a computer, the change including a change to any file in the registry, utilizing a processor; conditionally performing a scan based on whether the change in the registry is identified, where the conditional scan is performed in order to identify malware or spyware that caused the change; and determining whether a scan is scheduled; wherein the conditional scan includes scanning at least one file; wherein the at least one file includes only files associated with a changed file name; wherein the identifying the change in the registry of the computer is performed in parallel with the determining whether the scan is scheduled.
-
-
31. A method, comprising:
-
determining whether a scan is scheduled, utilizing a processor; if it is determined that the scan is scheduled; identifying a plurality of file names in a registry of a computer, removing duplicate file names in the registry of the computer, and scanning files associated with the file names for spyware and malware; identifying a change in the registry of the computer; and if the change in the registry is identified; identifying the file names in the registry of the computer, removing the duplicate file names in the registry of the computer, scanning the files associated with the file names for the spyware and the malware, scanning the registry for predetermined keys, and removing the predetermined keys; wherein the determining whether the scan is scheduled and the identifying the change in the registry of the computer are performed in parallel.
-
Specification