Malicious mobile code runtime monitoring system and methods

  • US 8,677,494 B2
  • Filed: 11/07/2011
  • Issued: 03/18/2014
  • Est. Priority Date: 01/29/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-based method, comprising the steps of:

  • receiving an incoming Downloadable;

    deriving security profile data for the Downloadable, including a list of suspicious computer operations that may be attempted by the Downloadable; and

    storing the Downloadable security profile data in a database.

View all claims
  • 6 Assignments
Timeline View
Assignment View