System, method and computer program product for utilizing a threat scanner for performing non-threat-related processing
First Claim
Patent Images
1. A method, comprising:
- receiving first data for use in performing a first threat-related function;
receiving second data separate from the first data for use in performing a second non-threat-related function;
performing the first threat-related function and the second non-threat-related function during scanning activities involving computer code provided in a computer configured for network communications, wherein the first threat-related function includes comparing threat signatures to determine whether at least one of the threat signatures matches the computer code, and wherein the second non-threat-related function includes evaluating a plurality of non-threat signatures to identify flawed code and one or more software errors; and
reacting to a threat if it is determined that at least one of the threat signatures matches the computer code, wherein the reacting includes quarantining the computer code, wherein processing of the second non-threat-related function is suspended until processing of a plurality of threat-related functions are exhausted by a threat scanner of the computer, and wherein the processing of the second non-threat-related function is disabled if a related set of non-threat-related processing was previously performed within a predetermined amount of time, and wherein an option is provided via a graphical user interface to manually disable the second non-threat-related function, wherein the second data includes a first type of file including detection data used in detecting non-threat-related computer code, a second type of file including reaction data used in reacting to a detected non-threat-related situation, and a third type of file including naming data used in naming the non-threat-related computer code in need of a non-threat-related reaction.
10 Assignments
0 Petitions
Accused Products
Abstract
A threat scanning system, method and computer program product are provided. Initially, data is received or identified (e.g. by way of an update, initial installation, etc.). Such data may include first data for use in performing a first threat-related function, and second data for use in performing a second non-threat-related function. In use, the first threat-related function and the second non-threat-related function are both performed with a threat scanner, utilizing the first data and the second data.
35 Citations
13 Claims
-
1. A method, comprising:
-
receiving first data for use in performing a first threat-related function; receiving second data separate from the first data for use in performing a second non-threat-related function; performing the first threat-related function and the second non-threat-related function during scanning activities involving computer code provided in a computer configured for network communications, wherein the first threat-related function includes comparing threat signatures to determine whether at least one of the threat signatures matches the computer code, and wherein the second non-threat-related function includes evaluating a plurality of non-threat signatures to identify flawed code and one or more software errors; and reacting to a threat if it is determined that at least one of the threat signatures matches the computer code, wherein the reacting includes quarantining the computer code, wherein processing of the second non-threat-related function is suspended until processing of a plurality of threat-related functions are exhausted by a threat scanner of the computer, and wherein the processing of the second non-threat-related function is disabled if a related set of non-threat-related processing was previously performed within a predetermined amount of time, and wherein an option is provided via a graphical user interface to manually disable the second non-threat-related function, wherein the second data includes a first type of file including detection data used in detecting non-threat-related computer code, a second type of file including reaction data used in reacting to a detected non-threat-related situation, and a third type of file including naming data used in naming the non-threat-related computer code in need of a non-threat-related reaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 12, 13)
-
-
10. A computer program product embodied on a tangible non-transitory computer readable medium for performing operations, comprising:
-
identifying first data for use in performing a first threat-related function, and second data separate from the first data for use in performing a second non-threat-related function; performing the first threat-related function and the second non-threat-related function during scanning activities involving computer code provided in a computer configured for network communications, wherein the first threat-related function includes comparing threat signatures to determine whether at least one of the threat signatures matches the computer code, and wherein the second non-threat-related function includes evaluating a plurality of non-threat signatures to identify flawed code and one or more software errors; and reacting to a threat if it is determined that at least one of the threat signatures matches the computer code, wherein the reacting includes quarantining the computer code, wherein processing of the second non-threat-related function is suspended until processing of a plurality of threat-related functions are exhausted by a threat scanner of the computer, and wherein the processing of the second non-threat-related function is disabled if a related set of non-threat-related processing was previously performed within a predetermined amount of time, and wherein an option is provided via a graphical user interface to manually disable the second non-threat-related function, wherein the second data includes a first type of file including detection data used in detecting non-threat-related computer code, a second type of file including reaction data used in reacting to a detected non-threat-related situation, and a third type of file including naming data used in naming the non-threat-related computer code in need of a non-threat-related reaction.
-
-
11. A computer, comprising:
-
a processor; and a threat scanner, wherein the computer is configured for; utilizing first data in performing a first threat-related function, and second data separate from the first data in performing a second non-threat-related function, wherein the first threat-related function and the second non-threat-related function are performed during scanning activities involving computer code provided in the computer configured for network communications, wherein the first threat-related function includes comparing threat signatures to determine whether at least one of the threat signatures matches the computer code, and wherein the second non-threat-related function includes evaluating a plurality of non-threat signatures to identify flawed code and one or more software errors; and reacting to a threat if it is determined that at least one of the threat signatures matches the computer code, wherein the reacting includes quarantining the computer code, wherein processing of the second non-threat-related function is suspended until processing of a plurality of threat-related functions are exhausted by a threat scanner of the computer, and wherein the processing of the second non-threat-related function is disabled if a related set of non-threat-related processing was previously performed within a predetermined amount of time, and wherein an option is provided via a graphical user interface to manually disable the second non-threat-related function, wherein the second data includes a first type of file including detection data used in detecting non-threat-related computer code, a second type of file including reaction data used in reacting to a detected non-threat-related situation, and a third type of file including naming data used in naming the non-threat-related computer code in need of a non-threat-related reaction.
-
Specification