Malicious mobile code runtime monitoring system and methods

  • US 8,079,086 B1
  • Filed: 05/26/2009
  • Issued: 12/13/2011
  • Est. Priority Date: 11/06/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-based method, comprising the steps of:

  • receiving an incoming Downloadable;

    deriving security profile data for the Downloadable, including a list of suspicious computer operations that may be attempted by the Downloadable;

    appending a representation of the Downloadable security profile data to the Downloadable, to generate an appended Downloadable; and

    transmitting the appended Downloadable to a destination computer.

View all claims

    Thank you for your feedback