US Patent Application No: 2010/0043,072

Number of patents in Portfolio can not be more than 2000

COMPUTER PROTECTION AGAINST MALWARE AFFECTION

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method is provided of protecting a computer against malware affection. The computer has a data storage and an operating system for managing the data storage. The method comprises providing a filter module in the operating system which operates to detect an attempt to store data in the data storage, to determine a data format of the data to be stored in the data storage, and to prevent storage of the data if the data format is determined to relate to a predefined type. The filter module may be provided as a file system filter driver in a kernel of the operating system. The filter module may be arranged to operate between an input/output manager of the operating system and a driver associated with the data storage. The input/output manager and driver associated with the data storage may form part of the kernel of the operating system.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

  • Assignment data not available. Check PTO

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Rothwell, William Grant Lohn-Ammannsegg, CH 2 24

Cited Art Landscape

Patent Info (Count) # Cites Year
 
PERRY WAYDE MERRITT (1)
* 2004/0098,394 Localized intelligent data management for a storage system 18 2003
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (1)
* 2004/0064,604 Filter driver for blocking access by host to devices 2 2002
 
GIGATRUST (1)
* 6,986,058 Method and system for providing data security using file spoofing 1 2000
 
WATCHGUARD TECHNOLOGIES, INC. (1)
* 2001/0044,904 Secure remote kernel communication 49 2001
 
GFI SOFTWARE LTD (1)
* 2003/0212,913 System and method for detecting a potentially malicious executable file 20 2003
 
III HOLDINGS 1, LLC (1)
* 6,993,649 Method of altering a computer operating system to boot and run from protected media 23 2002
 
EMC CORPORATION (1)
* 2002/0129,277 Using a virus checker in one file server to check for viruses in another file server 46 2001
 
INTEL CORPORATION (1)
* 7,043,697 Virtual display driver 11 2000
 
FINJAN, INC. (1)
* 2002/0013,910 Malicious mobile code runtime monitoring system and methods 13 2001
 
BIOSENTIENTS, INC. (1)
* 2002/0156,756 Intelligent molecular object data structure and method for application in heterogeneous data environments with high data density and dynamic application needs 53 2001
 
Rudra Technologies Pte Ltd. (1)
* 2009/0038,011 SYSTEM AND METHOD OF IDENTIFYING AND REMOVING MALWARE ON A COMPUTER SYSTEM 19 2005
 
MICROSOFT TECHNOLOGY LICENSING, LLC (13)
* 2001/0020,245 Method and system for deterministic ordering of software modules 2 2001
* 2004/0002,942 System and method for managing file names for file system filter drivers 9 2002
* 7,444,317 System and method for managing file names for file system filter drivers 3 2002
* 2004/0111,389 Managed file system filter model and architecture 5 2002
* 2005/0097,143 Legacy filter support in a new managed file system filter model 3 2003
* 2005/0091,655 Associating runtime objects with a set and controlling access to resources as a function thereof 72 2004
* 2006/0101,264 System and method of aggregating the knowledge base of antivirus software applications 10 2004
* 2006/0101,476 Method and system for recording and replaying input-output requests issued by a user-mode program 7 2004
* 7,676,508 Method and system for recording and replaying input-output requests issued by a user-mode program 4 2004
* 2006/0117,056 Method and system of detecting file system namespace changes and restoring consistency 22 2004
* 2006/0116,985 Method and system for maintaining namespace consistency with a file system 6 2004
* 7,599,907 Method and system applying policy on screened files 3 2004
* 2006/0117,063 Method and system of applying policy on screened files 12 2004
 
SYMANTEC CORPORATION (2)
* 7,478,431 Heuristic detection of computer viruses 27 2002
* 2006/0053,228 Method and apparatus for allowing sharing of streamable applications 23 2004
 
GREEN BORDER TECHNOLOGIES (1)
* 7,694,328 Systems and methods for secure client applications 34 2004
 
SnoopWall, Inc. (1)
* 2005/0044,418 Proactive network security system to protect against hackers 24 2004
 
LUMENSION SECURITY, INC. (2)
* 2002/0133,711 Method and system for shadowing accesses to removable medium storage devices 5 2001
* 7,278,158 Method and system for shadowing accesses to removable medium storage devices 12 2001
 
W. QUINN, INC. (1)
* 2002/0174,102 Filter driver for identifying disk files by analysis of content 4 2002
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
* 9,141,792 Application-level anomaly detection 0 2013
 
CHECKMARX LTD. (3)
* 9,141,806 Mining source code for violations of programming rules 0 2011
* 2013/0239,219 MINING SOURCE CODE FOR VIOLATIONS OF PROGRAMMING RULES 2 2011
9,128,728 Locating security vulnerabilities in source code 0 2013
 
TREND MICRO INCORPORATED (2)
* 7,971,258 Methods and arrangement for efficiently detecting and removing malware 6 2007
* 8,850,569 Instant messaging malware protection 0 2008
 
KASPERSKY LAB ZAO (1)
* 8,099,785 Method and system for treatment of cure-resistant computer malware 5 2007
 
SAMSUNG ELECTRONICS CO., LTD. (2)
* 8,966,511 Computer system and method for preventing dynamic-link library injection attack 0 2010
* 2011/0179,430 Computer System and Method for Preventing Dynamic-Link Library Injection Attack 0 2010
 
GfK Holding Inc. (2)
8,818,927 Method for generating rules and parameters for assessing relevance of information derived from internet traffic 0 2011
8,862,880 Two-stage anonymization of mobile network subscriber personal information 0 2011
 
AVG NETHERLANDS B.V. (2)
8,769,690 Protection from malicious web content 0 2010
* 2011/0030,058 SYSTEM AND METHOD FOR SCANNING AND MARKING WEB CONTENT 8 2010
 
ISOLATED TECHNOLOGIES, INCORPORATED (1)
8,875,273 Code domain isolation 0 2011
 
PALO ALTO NETWORKS, INC. (3)
* 9,215,239 Malware detection based on traffic analysis 0 2012
9,104,870 Detecting malware 0 2012
9,143,522 Heuristic botnet detection 0 2013
 
Triumfant, Inc. (1)
8,707,427 Automated malware detection and remediation 1 2010
 
ALIBABA GROUP HOLDING LIMITED (1)
* 9,152,788 Detecting a malware process 0 2013
 
INTEL CORPORATION (1)
9,183,391 Managing device driver cross ring accesses 0 2013
 
Givonetti, Raymond R. (1)
* 8,082,585 Protecting computers from malware using a hardware solution that is not alterable by any software 1 2010
 
MICROSOFT TECHNOLOGY LICENSING, LLC (3)
* 2010/0281,173 DELEGATED ADMINISTRATION FOR REMOTE MANAGEMENT 2 2009
* 8,621,628 Protecting user mode processes from improper tampering or termination 1 2010
* 2011/0209,219 Protecting User Mode Processes From Improper Tampering or Termination 14 2010
 
PHISON ELECTRONICS CORP. (2)
* 8,776,232 Controller capable of preventing spread of computer viruses and storage system and method thereof 0 2009
* 2010/0287,616 CONTROLLER CAPABLE OF PREVENTING SPREAD OF COMPUTER VIRUSES AND STORAGE SYSTEM AND METHOD THEREOF 1 2009
 
Greencastle Technology, Inc. (2)
* 8,763,129 Vulnerability shield system 0 2009
* 2010/0024,035 VULNERABILITY SHIELD SYSTEM 1 2009
 
CYBERNET SYSTEMS CORPORATION (2)
* 8,806,619 System and methods for detecting software vulnerabilities and malicious code 0 2008
* 2009/0165,135 SYSTEM AND METHODS FOR DETECTING SOFTWARE VULNERABILITIES AND MALICIOUS CODE 6 2008
 
TALATI FAMILY LP (1)
* 9,185,086 Apparatus, system and method for secure data exchange 0 2015
 
WEBROOT INC. (2)
* 8,499,283 Detection of scripting-language-based exploits using parse tree transformation 2 2011
* 2011/0197,177 DETECTION OF SCRIPTING-LANGUAGE-BASED EXPLOITS USING PARSE TREE TRANSFORMATION 9 2011
* Cited By Examiner