×

System, method and computer program product for utilizing a threat scanner for performing non-threat-related processing

  • US 8,484,725 B1
  • Filed: 10/26/2005
  • Issued: 07/09/2013
  • Est. Priority Date: 10/26/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving first data for use in performing a first threat-related function;

    receiving second data separate from the first data for use in performing a second non-threat-related function;

    performing the first threat-related function and the second non-threat-related function during scanning activities involving computer code provided in a computer configured for network communications, wherein the first threat-related function includes comparing threat signatures to determine whether at least one of the threat signatures matches the computer code, and wherein the second non-threat-related function includes evaluating a plurality of non-threat signatures to identify flawed code and one or more software errors; and

    reacting to a threat if it is determined that at least one of the threat signatures matches the computer code, wherein the reacting includes quarantining the computer code, wherein processing of the second non-threat-related function is suspended until processing of a plurality of threat-related functions are exhausted by a threat scanner of the computer, and wherein the processing of the second non-threat-related function is disabled if a related set of non-threat-related processing was previously performed within a predetermined amount of time, and wherein an option is provided via a graphical user interface to manually disable the second non-threat-related function, wherein the second data includes a first type of file including detection data used in detecting non-threat-related computer code, a second type of file including reaction data used in reacting to a detected non-threat-related situation, and a third type of file including naming data used in naming the non-threat-related computer code in need of a non-threat-related reaction.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×