USRE44131E1 - Storage device having function for coping with computer virus - Google Patents
Storage device having function for coping with computer virus Download PDFInfo
- Publication number
- USRE44131E1 USRE44131E1 US09/893,445 US89344501A USRE44131E US RE44131 E1 USRE44131 E1 US RE44131E1 US 89344501 A US89344501 A US 89344501A US RE44131 E USRE44131 E US RE44131E
- Authority
- US
- United States
- Prior art keywords
- file
- virus
- unit
- infected
- disk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/567—Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
Definitions
- the present invention relates to a storage device having a function for coping with a computer virus that has the ability to prevent infection with a computer virus and to properly deal with infection with a computer virus.
- a storage device 100 basically comprises, as shown in FIG. 1 , a disk 105 for storing files, and a controller 120 for executing driving control for the disk 105 and also executing input/output control for a personal computer 110 that is connected to the drive.
- the storage device 100 having the foregoing components is designed to be directly accessed by a driver under the control of an operating system in the personal computer 110 comprising a CPU 112 for processing various kinds of data, a RAM 114 for storing various kinds of data and programs, a ROM 116 , and the like.
- the storage device yields such an environment in which; a file expanded in the personal computer 110 , one running can readily destroy other files stored in the storage device.
- a virus that intrudes from an external unit into a file via a LAN adapter 130 , keyboard 140 , display 150 , or the like rewrites another file using a physical address of the file which is indicated by low-order address bits, or rewrites a system startup area such as a bootstrap using a physical address of the system startup area which is indicated by low-order address bits, and thus destroys an original program.
- a prior art system design is adopted such that if a virus checker (not shown) expanded in the personal computer 110 finds a file infected with a virus from among files expanded on the disk 105 in the storage device 100 , all the files expanded on the disk are cleared and then originals of the files are installed again.
- an object of the present invention is to provide a storage device having a function, for coping with a computer virus which has the ability to prevent infection with a virus and to properly deal with an infection of a virus.
- a storage device having a function for coping with a computer virus in accordance with the present invention comprises: an infection management table means used to manage files stored on a disk and to see if the files are infected with a virus; a table registering means for receiving a result of detection from a virus checker for detecting if a file stored on the disk is infected with a virus, and for registering the result in the infection management table means; a judging means that when a use request is made externally for a file stored on the disk, references the infection management table means so as to judge if the file is infected with a virus; and a prohibiting means that when the judging means has judged that a file is infected with a virus, prohibits the use of the file.
- the virus checker is designed to be run by the storage device having a function for coping with a computer virus.
- the virus checker is designed to be activated at intervals of a specific cycle.
- the virus checker is designed to be activated in response to a command instruction.
- the table registering means judges that a file which is stored on the disk and is a source of the writing request is infected with a virus and that registers the fact in the infection management table means.
- the storage device having the function of coping with a computer virus in accordance with the present invention includes an invalidating means that when a writing request is issued for the system startup area stored on the disk, invalidates the writing request.
- the storage device having the function of coping with a computer virus in accordance with the present invention includes a dedicated writing means for executing writing for the system startup area stored on the disk.
- a writing request is issued for the system startup area stored on the disk, if the writing request specifies the use of the writing means, the invalidating means does not invalidate the writing request.
- the table registering means judges that a file which is stored on the disk and is a source of the writing request is infected with a virus and registers the fact in the infection management table means.
- the storage device having the function of coping with a computer virus in accordance with the present invention includes a permitting means for determining whether a writing request made for a file that is registered as a virus-infected file by the table registering means and that is running should be permitted.
- the table registering means judges that the file which is the destination of the writing request is also infected with a virus and registers the fact in the infection management table means.
- the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
- the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
- the storage device having the function of coping with a computer virus in accordance with the present invention includes a determining means for determining through interactive processing whether the use of a virus-infected file that is registered in the infection management table means should be permitted.
- the prohibiting means does not prohibit the use of a file which is permitted by the determining means.
- the storage device having the function of coping with a computer virus in accordance with the present invention includes: a first managing means for managing original information of files stored on a disk; a second managing means for managing differential information brought about due to modification concerning the files stored on a disk, and history information concerning the differential information brought about due to modification; and a file registering means for merging the original information of a file which is managed by the first managing means and the differential information brought about due to modification which is managed by the second managing means so as to produce a file, and then registering the produced file on the disk.
- the first managing means manages original information that is confirmed not to be infected with a virus by the virus checker
- the second managing means manages differential information brought about due to modification which is confirmed not to be infected with a virus by the virus checker.
- the table registering means judges that the file stored on the disk is infected with a virus, and then registers the fact in the infection management table means.
- the storage device having the function of coping with a computer virus in accordance with the present invention includes a restoring means for deleting a virus-infected file that is registered in the infection management table means from the disk, activating the file registering means, thus restoring the file, and then registering the file on the disk.
- the first managing means manages original information of the virus checker
- the second managing means manages differential information brought about due to modification concerning the virus checker and history information concerning the differential information brought about due to modification.
- the storage device includes a generating means for merging the original information of a virus checker which is managed by the first managing means with the differential information brought about due to modification concerning a virus checker which is managed by the second managing means so as to reproduce the virus checker.
- the generating means generates a virus checker at the time of running a virus checker.
- the first managing means encodes and manages original information
- the second managing means encodes and manages differential information brought about due to modification.
- the storage device includes a decoding means for decoding encoded data managed by the first and second managing means, and an encoding means for executing inverse conversion that is inverse to conversion performed by the decoding means.
- the storage device having the function of coping with a computer virus in accordance with the present invention includes a saving means for saving a virus-infected file that is registered in the infection management table means and virus information concerning the file in an inexecutable area, and a reading means for reading the information saved in the inexecutable area under the condition that permission information for permitting access to the inexecutable area is given.
- the table registering means registers a virus-infected file detected by the virus checker in the infection management table means.
- the table registering means judges that a file which is a source of the writing request is infected with a virus, and registers the fact in the infection management table means. This is intended to treat new, malign, or unusual kinds of viruses that cannot be detected by the virus checker.
- the invalidating means invalidates the writing request.
- the writing means is included, if the writing request specifies the use of the writing means, the invalidating means does not invalidate the writing request.
- the table registering means judges that a file which is a source of the writing request is infected with a virus and registers the fact in the infection management table means.
- the permitting means determines through interactive processing whether the writing request should be permitted.
- the table registering means judges that the file which is stored on the disk and is a destination of the writing request is also infected with the virus and registers the fact in the infection management table means.
- the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
- a file stored on a disk is judged to be an executable file in terms of the file name, if the file is declared to be a data file, the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
- the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
- the judging means references the infection management table means so as to judge if the file for which the use request is made is infected with a virus.
- the prohibiting means prohibits the use of the file that is judged to be infected with a virus. At this time, the prohibiting means does not prohibit the use of a file which is permitted by the determining means.
- the saving means saves, that is, stores temporarily a virus-infected file whose use is prohibited and virus information concerning the file in the inexecutable area.
- the reading means reads the saved information from the inexecutable area and outputs it as information used for virus analysis under the condition that permission information for permitting access to the inexecutable area is given.
- the restoring means deletes a virus-infected file, which is registered in the infection management table means, from the disk, activates the file registering means, thus restores the file, and then registers the restored file on a disk.
- the storage device having the function of coping with a computer virus in accordance with the present invention is designed to actively prevent infection with a virus, prohibits the use of a virus-infected file and restores the virus-infected file automatically, and preserves information concerning infection with viruses so that the information cannot be accessed readily. Consequently, a storage device capable of properly dealing with infection with a virus can be constructed.
- FIG. 1 (PRIOR ART) is a block diagram showing the configuration of a typical storage device
- FIG. 2 is a block diagram showing the configuration of an embodiment based on the basic principles of the present invention
- FIG. 3 is a block diagram showing the configuration of the first preferred embodiment of the present invention.
- FIG. 4 is a block diagram showing the details of an inexecutable area in FIG. 3 ;
- FIG. 5 is a block diagram showing the configuration of the second preferred embodiment of the present invention.
- FIG. 6 is a block diagram showing the configuration of the third preferred embodiment of the present invention.
- FIG. 7 is a block diagram showing the configuration of the fourth preferred embodiment of the present invention.
- FIG. 8 is a block diagram showing the configuration of the fifth preferred embodiment of the present invention.
- FIG. 9 is a block diagram showing the configuration of the sixth preferred embodiment of the present invention.
- FIG. 10 is a block diagram for explaining a procedure of file production in accordance with the present invention.
- FIG. 11 is a block diagram for explaining a procedure of file storage in accordance with the present invention.
- FIG. 12 is a block diagram showing the details of a conversion table in a ROM in accordance with the present invention.
- FIG. 13 is a block diagram showing an example of a data structure for a file information management file in accordance with the present invention.
- FIG. 14 is a flowchart for explaining the first example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 15 is a flowchart for explaining the second example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 16 is a flowchart for explaining the third example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 17 is a flowchart for explaining the fourth example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 18 is a flowchart for explaining the fourth example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 19 is a flowchart for explaining the fifth example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 20 is a flowchart for explaining the sixth example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 21 is a flowchart for explaining the seventh example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 22 is a flowchart for explaining the eighth example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 23 is a flowchart for explaining the ninth example of a processing flow to be executed by an embodiment of the present invention.
- FIG. 24 is a block diagram for explaining the first example of an anti-virus operation in the embodiment shown in FIG. 2 ;
- FIG. 25 is a block diagram for explaining the second example of the anti-virus operation in the embodiment shown in FIG. 2 ;
- FIG. 26 is a block diagram for explaining the third example of the anti-virus operation in the embodiment shown in FIG. 2 ;
- FIG. 27 is a block diagram for explaining the fourth example of the anti-virus operation in the embodiment shown in FIG. 2 ;
- FIG. 28 is a block diagram for explaining the fifth example of the anti-virus operation in the embodiment shown in FIG. 2 ;
- FIG. 29 is a block diagram for explaining the sixth example of the anti-virus operation in the embodiment shown in FIG. 2 ;
- FIG. 30 is a block diagram for explaining the seventh example of the anti-virus operation in the embodiment shown in FIG. 2 .
- FIG. 2 is a block diagram showing the configuration of an embodiment based on the basic principles of the present invention.
- reference numeral 1 denotes a storage device having the function of coping with a computer virus in accordance with the present invention.
- Reference numeral 2 denotes a data processing unit for executing data processing using a file stored in the storage device 1 having the function of coping with a computer virus.
- the storage device 1 having the function of coping with a computer virus comprises a disk 10 , first managing means 11 , second managing means 12 , file registering means 13 , generating means 14 , virus checker 15 , infection management table means 16 , table registering means 17 , judging means 18 , prohibiting means 19 , determining means 20 , restoring means 21 , invalidating means 22 , writing means 23 , permitting means 24 , inexecutable area 25 , saving means 26 , and reading means 27 .
- the virus checker 15 may be expanded in the data processing unit 2 .
- the disk 10 stores files.
- the first managing means 11 manages original information of the files stored on the disk 10 or manages original information of the virus checker 15 .
- the second managing means 12 manages differential information brought about due to modification; that is, information concerning upgraded versions of the files stored on the disk, and history information concerning the differential information brought about due to modification, or manages differential information brought about due to modification concerning the virus checker 15 ; that is, information concerning an upgraded version of the virus checker 15 , and history information concerning the differential information brought about due to modification.
- the first managing means 11 may encode and manage the original information of the files and virus checker 15 so as to prevent the original information from being rewritten.
- the second managing means 12 may encode and manage the differential information brought about due to modification concerning the files and virus checker 15 so as to prevent the information from being rewritten.
- a decoding means for decoding the encoded data and an encoding means for executing inverse conversion that is inverse to conversion performed by the decoding means are included in the second managing means 12 .
- the file registering means 13 merges the original information of a file which is managed by the first managing means 11 with the differential information brought about due to modification concerning the file which is managed by the second managing means 12 so as to reproduce the file, and then stores the file on the disk 10 .
- the generating means 14 merges the original information of the virus checker 15 which is managed by the first managing means 11 with the differential information brought about due to modification concerning the virus checker 15 which is managed by the second managing means 12 so as to reproduce the virus checker 15 .
- the virus checker 15 is activated at intervals of a specific period or activated in response to a command instruction, and detects whether a file stored on the disk 10 is infected with a virus.
- the infection management table means 16 is used to manage files stored on the disk and to see if the files are infected with viruses.
- the table registering means 17 registers data in the infection management table means 16 .
- the judging means 18 references the infection management table means 16 in response to a use request made for a file stored on the disk 10 by the data processing unit 2 , and judges if the file is infected with a virus. When the judging means 18 judges that a file is infected with a virus, the prohibiting means 19 prohibits the use of the file.
- the determining means 20 determines through interactive processing whether the use of a file registered in the infection management table means 16 should be permitted.
- the restoring means 21 deletes a virus-infected file, which is registered in the infection management table means 16 , from the disk 10 , activates the file registering means 13 , thus restores the file, and then registers the restored file on the disk 10 .
- the invalidating means 22 invalidates the writing request.
- the writing means 23 is prepared as a dedicated writing facility and executes writing for the system startup area stored on the disk 10 .
- the permitting means 24 determines through interactive processing whether a writing request made for an executable file stored on the disk should be permitted.
- the inexecutable area 25 is prepared as an area inaccessible with a normal access request.
- the saving means 26 saves a virus-infected file registered in the infection management table means 16 and virus information concerning the file in the inexecutable area 25 .
- the reading means 27 reads information saved in the inexecutable area 25 under the condition that permission information for permitting access to the inexecutable area 25 is given.
- the table registering means 17 registers a virus-infected file detected by the virus checker 15 in the infection management table means 16 .
- the table registering means 17 judges that a file which is stored on the disk 10 and is a source of the writing request is infected with a virus, and registers the fact in the infection management table means 16 . This is intended to treat new, malign, or unusual kinds of viruses that cannot be detected by the virus checker 15 .
- the invalidating means 22 invalidates the writing request.
- the writing means 23 is included, if the writing request specifies the use of the writing means 23 , the invalidating means 23 does not invalidate the writing request.
- the table registering means 17 judges that a file which is stored on the disk 10 and is a source of the writing request is infected with a virus, and registers the fact in the infection management table means 16 .
- the permitting means 24 determines through interactive processing whether the writing request should be permitted.
- the table registering means 17 judges that a file which is stored on the disk 10 and is a destination of the writing request is also infected with the virus, and registers the fact in the infection management table means 16 .
- the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16 .
- a file stored on the disk is judged as an executable file in terms of the file name, if the file is declared to be a data file, the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16 .
- the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16 .
- the judging means 18 references the infection management table means 16 so as to judge if the file for which the use request is made is infected with a virus.
- the prohibiting means 19 prohibits the use of the file that is judged to be infected with a virus by the judging means 18 .
- the prohibiting means 19 does not prohibit the use of a file which is permitted by the determining means 20 .
- the saving means 26 saves the virus-infected file whose use is prohibited and virus information concerning the file in the inexecutable area 25 that cannot be accessed readily.
- the reading means 27 reads the saved information from the inexecutable area 25 under the condition that permission information for permitting access to the inexecutable area 25 is given, and outputs the read information as information used for virus analysis.
- the restoring means 21 deletes a virus-infected file registered in the infection management table means 16 from the disk 10 , activates the file registering means 13 , thus restores the file, and registers the file on the disk 10 .
- the storage device 1 having the function of coping with a computer virus shown in FIG. 2 is designed to actively prohibit infection with a virus, to prohibit the use of a file infected with a virus and restores the file automatically, and to preserve information concerning infection with viruses so that the information cannot be accessed readily.
- a storage device capable of properly dealing with infection with a virus can be constructed.
- a storage device having the function of coping with a computer virus in accordance with the present invention will be described below in detail in conjunction with several preferred embodiments that are more practical than the basic embodiment shown in FIG. 2 .
- FIG. 3 shows the first preferred embodiment of the storage device 1 having the function of coping with a computer virus in accordance with the present invention.
- the storage device 1 having the function of coping with a computer virus in this embodiment is connected to a personal computer 2 a.
- the storage device 1 includes a disk 30 for storing files that are objects of access obtained by the personal computer 2 a as well as a ROM 31 for storing firmware or the like that executes access processing or anti-virus processing, a CPU 32 for running firmware stored in the ROM 31 and executing data transfer to or from the personal computer 2 a, and a RAM 33 prepared as a work area used by firmware that is run by the CPU 32 , and thus has the capability of a CPU.
- the storage device 1 further includes an original information management file 34 used to manage original information of files stored on the disk 30 and original information of a virus checker prepared for inspection of the files stored on the disk.
- a version update information management file 35 is used to manage differential information brought about due to modification concerning a file stored on the disk 30 and history information concerning the differential information brought about due to modification, and to manage differential information brought about due to modification concerning the virus checker and history information concerning the differential information brought about due to modification.
- a file information management file 36 is used to manage the information indicating if the files are stored on the disk, and is used to determine if the original information stored in the original information management file 34 , and the differential information (brought about due to modification and which is stored in the version upgrade information management file 35 ) are infected with viruses.
- the information indicates if the files to be managed are executable files or data files, and if the files to be managed belong to a bootstrap or an initial program loader (IPL).
- An inexecutable area 37 which is prepared as an area that becomes accessible only when a password and ID number agree with internal data, and in which a file infected with a virus and virus information concerning the file are saved, has a data structure shown in FIG. 4 .
- the reason why the version update information management file 35 manages history information is to make apparent which is the latest differential information brought about due to modification.
- the inexecutable area 37 shown in FIG. 4 includes an infected-file storage area that is a storage area in which files infected with viruses are stored, and a virus information storage area that is a storage area in which virus information of the viruses is stored. Furthermore, the virus information storage area contains detailed information; such as, names of infected files that are infected with viruses, storage locations of the infected files, sizes of the storage locations of the infected files, sizes of virus information, name of viruses, and the information indicating if the viruses are of a system area infection type or a file infection type, and the information indicating if the viruses are of a file destruction type or the like.
- controller 38 for accessing a file stored on the disk, accessing original information managed in the original information management file 34 , accessing the differential information brought about due to modification and history information which are managed in the version upgrade information management file 35 , or accessing information saved in the inexecutable area 37 .
- the original information management file 34 and version upgrade information management file 35 are not designed to enable management of original information and differential information brought about due to modification from the viewpoint of a mere difference but may be designed to enable management of original information and differential information brought about due to modification on the basis of a relationship of succession including a parent-child relationship.
- the storage device 1 having the function of coping with a computer virus is connected to the personal computer 2 a. Aside from this, like the second preferred embodiment shown in FIG. 5 , the storage device 1 may be connected over a LAN.
- the original information management file 34 and version upgrade information management file 35 are separate files.
- the original information management file and version upgrade information management file may be formed with one file. This kind of file is realized in the form of an original information/version upgrade information management file 34 / 35 shown in FIGS. 6 and 7 .
- FIG. 3 the original information management file 34 and version upgrade information management file
- FIG. 7 a personal computer and a storage device having the function of coping with a computer virus are united by combining the configurations shown in FIGS. 5 and 6 .
- the embodiment shown in FIG. 3 has the configuration in which the storage device 1 having the function of coping with a computer virus is installed outside the personal computer 2 a.
- the storage device may be installed inside the personal computer 2 a.
- the original information management file 34 and version upgrade information management file 35 are separate files. In the embodiment shown in FIG. 9 , both the files are formed with one file.
- the storage device 1 having the function of coping with a computer virus in accordance with the present invention has, as mentioned above, the configuration including the original information management file 34 and version upgrade information management file 35 .
- original information of a file stored on the disk 30 is stored in the original information management file 34 ; when the file is upgraded into a new version, differential information brought about due to modification concerning the upgraded version and history information concerning the differential information brought about due to modification are stored in the version upgrade information management file 35 ; and in case a file stored on the disk 30 is infected with a virus, the file can be restored by merging the original information of the file with differential information brought about due to modification. Moreover, since original information of a file and differential information brought about due to modification concerning the file are not expanded on the disk 30 , it can be prevented that these kinds of information are infected with a virus.
- a virus checker prepared for inspection of a file stored on a disk also has the possibility of being upgraded into a new version.
- the original information of the virus checker is stored in the original information management file 34 .
- Differential information brought about due to modification concerning the upgraded version and history information concerning the differential information brought about due to modification are stored in the version upgrade information management file 35 .
- the virus checker is managed.
- the original information management file 34 and version upgrade information management file 35 are constructed on the same medium, original information of files and a virus checker, differential information brought about due to modification concerning the files and virus checker, and history information concerning the differential information brought about due to modification can be managed totally. This is convenient in practice.
- the disk 30 and inexecutable area 37 may be constructed on the medium.
- Original information of files and a virus checker which is stored in the original information management file 34 and differential information brought about due to modification concerning the files and virus checker and history information concerning the differential information brought about due to modification which are stored in the version upgrade information management file 35 must not be rewritten by the personal computer 2 a.
- the storage device 1 having the function of coping with a computer virus has the configuration in which original information 34 a of files and a virus checker which is stored in the original information management file 34 , and differential information brought about due to modification concerning the files and virus checker and history information concerning the differential information brought about due to modification which are stored in the version upgrade information management file 35 are encoded, and in which a decoding mechanism for decoding encoded data is made ready. As shown in FIG. 10 , the original information of a file or virus checker decoded by the decoding mechanism is merged with the differential information brought about due to modification concerning the file or virus checker which is decoded by the decoding mechanism in order to reproduce the file or virus checker.
- an encoding mechanism for executing inverse conversion that is inverse to conversion performed by the decoding mechanism is made ready.
- the original information of files and a virus checker which is encoded by the encoding mechanism is stored in the original information management file 34 .
- the differential information brought about due to modification and history information 35 a concerning the files and virus checker which are encoded by the encoding mechanism are stored in the version upgrade information management file 35 .
- the encoding mechanism and decoding mechanism are realized by firmware stored in an area 312 , which is reserved in order to store firmware, in the ROM 31 in the storage device 1 having the function of coping with a computer virus.
- firmware stored in an area 312 , which is reserved in order to store firmware, in the ROM 31 in the storage device 1 having the function of coping with a computer virus.
- a conversion table 310 is used to encode original information, differential information brought about due to modification, and history information
- a conversion table 311 is used to decode the original information, differential information brought about due to modification, and history information which are encoded are stored in the ROM 31 .
- the storage device 1 having the function of coping with a computer virus in accordance with the present invention includes the file information management file 36 as mentioned above.
- the file information management file 36 manages the information indicating if files stored on the disk 30 , original information stored in the original information management file 34 , and differential information brought about due to modification which is stored in the version upgrade information management file 35 are infected with viruses, the information indicating if these files to be managed are executable files or data files, and the information indicating that the files to be managed belong to a bootstrap or an IPL.
- FIG. 13 shows an example of a data structure for the file information management file 36 .
- the example shown in FIG. 13 is devised on the assumption that a file which is stored on the disk and writes a bootstrap or an IPL is judged to be infected with a virus, and that a file which is stored on the disk and writes an executable file is judged to be infected with a virus. This is attributable to the fact that a normal file will not perform the former writing and will not in general perform the latter writing, either.
- the file information management file 36 manages, as shown in FIG. 13 , file names of files to be managed, addresses of the files, execution/data type flags indicating whether the files are executable files or data files, and starting portion flags indicating if the files belong to a bootstrap or an IPL.
- File information management file 36 also manages: infection flags ⁇ 1> indicating if it is detected by a virus checker that the files are infected with viruses, infection flags ⁇ 2> indicating if it is judged according to whether or not writing the bootstrap or IPL is attempted that the files are infected with viruses, infection flags ⁇ 3> indicating if it is judged according to whether or not writing an executable file is attempted that the files are infected with a virus, infection flags ⁇ 4> indicating if original information stored in the original information management file 34 is infected with a virus, and infection flags ⁇ 5> indicating if differential information brought about due to modification which is stored in the version upgrade information management file 35 is infected with a virus.
- the aforesaid information is managed. Whether or not original information stored in the original information management file 34 is infected with a virus and whether or not differential information brought about due to modification which is stored in the version upgrade information management file 35 is infected with a virus is judged by the virus checker or according to whether writing the bootstrap, the IPL, or an executable file is attempted.
- “1” is set relative to an executable file and “0” is set relative to a data file.
- “1” is set in case a file belongs to a bootstrap or IPL, and “0” is set in any other case.
- “1” is set when infection with a virus is detected, and “0” is set when infection with a virus it not detected.
- “1” is set when infection with a virus is suspected, and “0” is set when infection with a virus is not suspected.
- “1” is set when infection with a virus is suspected, and “0” is set when infection with a virus is neither detected nor suspected.
- FIGS. 14 to 23 describe some examples of processing flows executed by the storage device 1 having the function of coping with a computer virus which is configured as mentioned above. Next, operations performed by the storage device 1 having the function of coping with a computer virus in accordance with the present invention will be described in detail in conjunction with these examples of processing flows.
- the storage device 1 When activated, the storage device 1 having the function of coping with a computer virus initializes the infected-file storage area and virus information storage area (storage areas shown in FIG. 4 ) within the inexecutable area 37 (step S 141 ). Thereafter, initialization is executed by registering an ID number and password needed to access the inexecutable area 37 (step S 142 ).
- the storage device 1 having the function of coping with a computer virus merges original information of a virus checker which is stored in the original information management file 34 with the latest differential information brought about due to modification concerning the virus checker which is stored in the version upgrade information management file 35 .
- the virus checker is reproduced and expanded in the RAM 33 .
- the reproduced virus checker is used to check if a file registered (original information and differential information brought about due to modification) is infected with a virus (step S 151 ). If it is judged that the file is infected with a virus, the infected file and virus information concerning the file are saved in the inexecutable area 37 (step S 152 ). Use Prohibited Due To Infection With a Virus is reported to the personal computer 2 a that is a source of registration (step S 153 ).
- the file when it is judged that a file is not infected with a virus, the file is stored in the original information management file 34 and version upgrade information management file 35 which are destinations of registration. History information is created and stored in the version upgrade information management file 35 (step S 154 ).
- the file (when a registered file contains differential information brought about due to modification, the file is a file created by merging the information with original information) is then expanded on the disk 30 .
- data is registered in the file information management file 36 (step S 155 ).
- original information of a file which is not infected with a virus is registered in the original information management file 34 .
- Differential information brought about due to modification concerning the file which is not infected with a virus is registered in the version upgrade information management file 35 .
- a file that contains the original information merged with the differential information brought about due to modification and that is not infected with a virus is then expanded on the disk 30 .
- the reason why the system is designed so that a virus checker is not stored on the disk 30 in advance but produced prior to checking on infection with a virus is to prevent the virus checker itself from being infected with a virus.
- the present invention adopts the system design of prohibiting a file infected with a virus from running, a file attempting to write a bootstrap or IPL is prohibited from running. This means that the bootstrap or IPL cannot be registered. In the present invention, therefore, when a specific command instructing registration of the bootstrap or IPL is issued, the registration is permitted.
- the storage device 1 having the function of coping with a computer virus registers the bootstrap or IPL, for which a registration request has been made, in the original information management file 34 (step S 161 ), and fetches the bootstrap or IPL into the RAM 33 and stores it on the disk 30 (step S 162 ).
- “1” is set in the storage area of a starting portion flag in the file information management file 36 . It is thus registered that a file stored is a bootstrap or IPL.
- “1” is set in the storage area of an execution/data type flag, whereby it is registered that the file stored is an executable file.
- Infection flags ⁇ 1> to ⁇ 5> are set to “0,” whereby it is registered that the file stored is not infected with a virus (step S 163 ).
- FIGS. 17 and 18 describe a processing flow of virus-infected file detection to be executed using a virus checker (first half and second half of the fourth example).
- FIG. 19 describes a processing flow (fifth example) of virus-infected file detection to be executed by judging the attribute of a writing-destination file.
- the storage device 1 For detecting a virus-infected file using a virus checker, the storage device 1 having the function of coping with a computer virus first waits, as described in the fourth example of a processing flow shown in FIGS. 17 and 18 , for the start of a period of detecting a virus-infected file. When it is judged that the detecting period starts, control is passed to step S 172 .
- Original information of a virus checker which is stored in the original information management file 34 is merged with the latest differential information brought about due to modification concerning the virus checker which is stored in the version upgrade information management file 35 in order to produce the latest virus checker.
- the produced virus checker is expanded in the RAM 33 .
- step S 173 one of the unprocessed files on the disk 30 is extracted at step S 173 .
- step S 174 the produced virus checker is used to check if the extracted file is infected with a virus.
- control is passed to step S 175 .
- “1” is recorded as infection flag ⁇ 1> associated with the file in the file information management file 36 , whereby it is registered that the file is infected with a virus.
- control is passed to step S 176 .
- “0” is recorded as infection flag ⁇ 1>, whereby it is registered that the file is not infected with a virus.
- step S 177 it is judged that all the files stored on the disk 30 have been processed. If it is judged that an unprocessed file is left, control is returned to step S 173 . If it is judged that no unprocessed file is left, control is passed to step S 178 . It is judged if a mode, in which original information stored in the original information management file 34 and differential information brought about due to modification which is stored in the version upgrade information management file 35 are also subjected to virus check, is designated. If the mode in which both the original information and differential information brought about due to modification are subjected to virus check is not designated, control is returned to step S 171 .
- control is passed to step S 181 described in FIG. 18 .
- One of the original information and differential information brought about due to modification is expanded in a work area in the RAM 33 .
- the produced virus checker is used to check if the file expanded in the work area is infected with a virus. The virus check for original information or differential information brought about due to modification is carried out in order to deal with emergence of a new kind of virus.
- step S 183 If it is judged by the virus check that the file is not infected with a virus, control is passed to step S 183 . “0” is recorded as infection flags ⁇ 4> and ⁇ 5> associated with the file in the file information management file 36 . It is thus registered that the file is not infected with a virus. By contrast, when it is judged that the file is infected with a virus, control is passed to step S 184 . “1” is recorded as infection flags ⁇ 4> and ⁇ 5> associated with the file in the file information management file 36 . It is thus registered that the original information is infected with a virus.
- step S 185 it is judged if all original information and differential information brought about due to modification have been processed. If it is judged that an unprocessed file is left, control is returned to step S 181 . If it is judged that no unprocessed file is left, control is returned to step S 171 in FIG. 17 .
- the storage device 1 having the function of coping with a computer virus uses a virus checker to periodically check if files stored on the disk 30 , original information stored in the original information management file 34 , and differential information brought about due to modification which is stored in the version upgrade information management file 35 are infected with viruses.
- the results of the check are registered in the form of infection flags ⁇ 1>, ⁇ 4>, and ⁇ 5> in the file information management file 36 .
- a virus checker is activated at intervals of a specific period.
- the system may be designed so that the virus checker is activated in response to a command issued from the personal computer 2 a.
- the storage device 1 having the function of coping with a computer virus actuates a virus checker.
- the system may be designed so that the personal computer 2 a actuates the virus checker.
- the storage device 1 having the function of coping with a computer virus first references the value of a starting portion flag in the file information management file 36 so as to judge if the writing-destination file belongs to a bootstrap or IPL.
- step S 191 If it is judged by the judgment at step S 191 that the writing-destination file belongs to the bootstrap or IPL, control is passed to step S 192 . It is then judged that the file having issued the writing request is infected with a virus. “1” is recorded as infection flag ⁇ 2> associated with the file in the file information management file 36 , whereby it is registered that the file is infected with a virus. At step S 193 , it is reported to the personal computer 2 a that the file which made the writing request is a file infected with a virus. The processing is then terminated without writing.
- step S 191 if it is judged at step S 191 that the writing-destination file does not belong to the bootstrap or IPL, control is passed to step S 194 .
- the value of an execution/data type flag in the file information management file 36 is referenced in order to judge if the writing-destination file is an executable file or data file. If it is judged that the writing-destination file is a data file, writing is executed for the file at step S 195 . The processing is then terminated.
- step S 194 if it is judged at step S 194 that the writing-destination file is an executable file, it is judged that it is highly probable that the file having issued the writing request is infected with a virus. Control is then passed to step S 196 . While the fact is being reported, a message asking if writing should be executed is output to the personal computer 2 a. A response to the inquiry is duly received.
- step S 196 If it is judged at step S 196 that the response from the personal computer 2 a instructs that writing should not be executed, control is passed to step S 197 . “1” is recorded as infection flag ⁇ 3> associated with the file, which has issued the writing request, in the file information management file 36 , whereby it is registered that the file is infected with a virus. The processing is then terminated.
- step S 196 if it is judged at step S 196 that a response from the personal computer 2 a instructs that writing should be executed, although it is highly probable that the file that is a source of the writing request is infected with a virus, it is instructed to ignore the probability. Control is therefore passed to step S 198 .
- Writing is executed for the writing-destination file.
- step S 199 “1” is recorded as infection flags ⁇ 3> associated with the writing-source and writing-destination files in the file information management file 36 , whereby it is registered that the files are infected with a virus. The processing is then terminated.
- the storage device 1 having the function of coping with a computer virus judges that a file which is a source of the writing request is infected with a virus. The fact is registered in the form of infection flags ⁇ 2> and ⁇ 3> in the file information management file 36 . If the writing-destination file belongs to the bootstrap or IPL, executing writing is disabled. If the writing-destination file is an executable file, it is determined through interactive processing if writing should be executed for the file. When writing is executed, it is judged that the writing-destination file will also be infected with a virus. The fact is registered in the form of infection flag ⁇ 3> in the file information management file 36 .
- the storage device 1 When receiving a loading request made for a file (executable file) stored on the disk 30 from the personal computer 2 a, as described in the sixth example of a processing flow in FIG. 20 , the storage device 1 having the function of coping with a computer virus references infection flags ⁇ 1>, ⁇ 2>, and ⁇ 3> in the file information management file 36 (step S 201 ) so as to check if the file for which the loading request is made is infected with a virus. When it is judged that the file is not infected with a virus, the file is loaded into the personal computer 2 a. Running the file is thus instructed (step S 202 ). By contrast, when it is judged that the file is infected with a virus, loading the file is rejected (step S 203 ). Running the file is thus prevented.
- the storage device 1 having the function of coping with a computer virus gives control so that a virus-infected file registered in the file information management file 36 will not be run. Consequently, a file that is detected to be infected with a virus by a virus checker will never be run. A file that has evaded checking by the virus checker and that is detected to be infected with a virus in terms of the attribute of a writing-destination file will not be rerun. Thus, proliferation of the virus can be reliably prevented.
- running a file infected with a virus is rejected without exception.
- a program may be produced to have a pattern resembling the pattern of a virus, and a virus checker may make a mistake in checking.
- the system may therefore be designed so that it is determined through interaction with the personal computer 2 a whether the run rejection should be lifted.
- the storage device 1 having the function of coping with a computer virus first references infection flags ⁇ 1>, ⁇ 2>, and ⁇ 3> in the file information management file 36 , extracts one file infected with a virus, and deletes the file from the disk 30 at step S 211 .
- the data of the deleted file is deleted from the file information management file 36 .
- infection flag ⁇ 4> in the file information management file 36 is referenced, and original information of the deleted file, which is not infected with a virus, is read from the original information management file 34 .
- Infection flag ⁇ 5> in the file information management file 36 is referenced, and the latest differential information brought about due to modification concerning the deleted file, which is not infected with a virus, is read from the original information management file 34 .
- the original information is then merged with the differential information brought about due to modification in order to restore the deleted file.
- the restored file is then expanded on the disk 30 .
- data of the restored file is registered in the file information management file 36 .
- the storage device 1 having the function of coping with a computer virus deletes a file infected with a virus from the disk 30 .
- Original information of the file and differential information brought about due to modification are used to restore the infected file into an uninfected one.
- the file not infected with a virus is then expanded on the disk 30 .
- the system may be designed so that restoration is executed at intervals of a specific period. Restoring the virus-infected file may thus be executed.
- a file infected with a virus can be restored autonomously irrespective of the personal computer 2 a.
- the latest differential information brought about due to modification which is not infected with a virus is used to restore a file infected with a virus into the latest one.
- the system may be designed so that differential information brought about due to modification which is identified by an instruction sent from the personal computer 2 a and pointed out by history information is used for restoration.
- the storage device 1 having the function of coping with a computer virus executes the processing of restoring a file infected with a virus into an uninfected file.
- the file infected with a virus and virus information concerning the file-infected file may be saved in the inexecutable area 37 .
- the storage device 1 having the function of coping with a computer virus first references infection flags ⁇ 1>, ⁇ 2>, and ⁇ 3> in the file information management file 36 and extracts one file infected with a virus at step S 221 .
- a virus checker expanded in advance is used to specify virus information concerning the extracted virus-infected file.
- the extracted virus-infected file and virus information specified at step S 223 are saved in the inexecutable area 37 .
- the extracted virus-infected file is deleted from the disk 30 .
- step S 225 data of the deleted file is deleted from the file information management file 36 .
- step S 226 infection flag ⁇ 4> in the file information management file 36 is referenced, and original information of the deleted file which is not infected with a virus is read from the original information management file 34 .
- Infection flag ⁇ 5> in the file information management file 36 is referenced, and the latest differential information brought about due to modification concerning the deleted file which is not infected with a virus is read from the original information management file 34 .
- the original information is then merged with the differential information brought about due to modification in order to restore the deleted file.
- the restored file is then expanded on the disk 30 .
- step S 227 data of the restored file is registered in the file information management file 36 .
- step S 228 it is judged if an unprocessed virus-infected file is left. If no unprocessed file is left, the processing is terminated. If an unprocessed file is left, control is returned to step S 221 .
- the storage device 1 having the function of coping with a computer virus deletes a file infected with a virus from the disk 30 , restores the file into an uninfected one that is not infected with a virus using original information and differential information brought about due to modification concerning the file, and expands the restored file on the disk 30 .
- the file infected with a virus and virus information concerning the file are saved in the inexecutable area 37 .
- the storage device 1 having the function of coping with a computer virus first requests entry of an ID number and password which have been registered according to the processing flow (first example) described in FIG. 14 (step S 231 ), and collates the ID number and password entered in response to the request with those registered according to the processing flow in FIG. 14 to see if they agree with each other (step S 232 ). Under the condition that they agree with each other, a virus-infected file and virus information which are saved in the inexecutable area 37 are read and output to the personal computer 2 a (step S 233 ). When a deletion request is issued for the extracted virus-infected file and virus information from the personal computer 2 a (step S 234 ), deletion is executed (step S 235 ).
- the storage device 1 having the function of coping with a computer virus reads a virus-infected file and virus information, which are saved in the inexecutable area 37 , under the condition that an ID number and password agree with internal data.
- the system may be designed so that the saved information is read from the inexecutable area 37 by executing reading at intervals of a specific period.
- an encoding mechanism for converting a virus-infected file and virus information, which are saved in the inexecutable area 37 , into encoded data may be prepared.
- the encoded data produced by the encoding mechanism is then stored in the inexecutable area 37 .
- a decoding mechanism for executing inverse conversion that is inverse to the conversion performed by the encoding mechanism may be prepared. In this case, the virus-infected file and virus information which are saved in the inexecutable area 37 are read using the decoding mechanism.
- FIGS. 24 to 30 are block diagrams for explaining several examples (first to seventh examples) of an anti-virus operation performed in the basic embodiment shown in FIG. 2 .
- a virus checker 40 (which may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is received and registered in the file information management file 36 . Thus, the file information management file 36 is used to manage the information indicating if files expanded on the disk 30 are infected with viruses. Furthermore, as shown in FIG. 24 for explaining the first example of an anti-virus operation, a virus checker 40 (which may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is received and registered in the file information management file 36 . Thus, the file information management file 36 is used to manage the information indicating if files expanded on the disk 30 are infected with viruses. Furthermore, as shown in FIG.
- the file information management file 36 is referenced to judge if the file for which the use request is made is infected with a virus. If the file is infected with a virus, the use of the file is prohibited. Thus, proliferation of the virus is prevented.
- reference numeral 41 denotes a management file registering/referencing mechanism for registering data in the file information management file 36 and referencing the file information management file 36 for data.
- the virus checker 40 When the system is designed so that the virus checker 40 is run by the storage device 1 having the function of coping with a computer virus, checking on an infection with a virus can be executed concurrently with an operation of the personal computer 2 a. Moreover, checking on an infection with a virus can be executed at night or the like. In case the virus checker 40 is run by the personal computer 2 a, the virus checker 40 may not be loaded from the storage device 1 having the function of coping with a computer virus but may be prepared separately.
- Alphanumeric characters in parentheses ( 1 A) to ( 5 A) in FIGS. 24 and ( 1 B) to ( 3 B), ( 3 B)′, ( 4 B), and ( 5 B) in FIG. 25 denote processing orders.
- the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 26 for explaining the third example of an anti-virus operation, an original information management file 34 for encoding and managing original information of files, a version upgrade information management file 35 for encoding and managing differential information brought about due to modification concerning the files, a file generating mechanism 42 for decoding and merging encoded data of original information and differential information brought about due to modification so as to generate a file, and a deleting mechanism 43 for deleting a file from the disk 30 .
- the deleting mechanism 43 is used to delete the virus-infected file from the disk 30 .
- the file generating mechanism 42 is used to restore the virus-infected file into an uninfected one that is not infected with a virus and expand the file on the disk 30 .
- the system can therefore be operated by performing a minimum scale of installation.
- alphanumeric characters in parentheses ( 1 C) to ( 14 C) denote processing orders.
- the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 27 for explaining the fourth example of an anti-virus operation, a timer 44 for issuing a virus check instruction periodically (which may be incorporated in the personal computer 2 a as shown in FIG. 28 for explaining the fifth example of an anti-virus operation). Furthermore, encoded data of original information of the virus checker 40 is stored in the original information management file 34 . Encoded data of differential information brought about due to modification concerning the virus checker 40 is stored in the version upgrade information management file 35 . When the timer 44 issues an instruction for a virus check, the file generating mechanism 42 generates the virus checker 40 .
- the thus-generated virus checker 40 (that may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk is infected with a virus. The result of the checking is registered in the file information management file 36 . Thus, the virus checker 40 is protected from being infected with a virus, and intrusion of the virus is prevented.
- Alphanumeric characters in parentheses ( 1 D) to ( 3 D), ( 3 E), ( 4 D), and ( 5 D) in FIGS. 27 and ( 1 F), ( 2 F), ( 2 F)′, ( 3 F) to ( 5 F) in FIG. 28 denote processing orders.
- the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 29 for explaining the sixth example of an anti-virus operation, a virus check starting mechanism 45 for issuing an instruction of virus check in response to an instruction sent from the personal computer 2 a. Furthermore, encoded data of original information of the virus checker 40 is stored in the original information management file 34 . Encoded data of differential information brought about due to modification concerning the virus checker 40 is stored in the version upgrade information management file 35 . When the virus check starting mechanism 45 issues an instruction of virus check, the file generating mechanism 42 generates the virus checker 40 .
- the thus-generated virus checker 40 (that may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is registered in the file information management file 36 . Thus, the virus checker 40 is protected from being infected with a virus, and intrusion of the virus is prevented.
- Alphanumeric characters ( 1 G) to ( 3 G), ( 3 G)′, ( 4 G) to ( 6 G) in the drawing denote processing orders.
- the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 30 for explaining the seventh example of an anti-virus operation, a dedicated system writing mechanism 46 for writing a bootstrap or IPL on the disk 30 .
- a dedicated system writing mechanism 46 for writing a bootstrap or IPL on the disk 30 .
- the system writing mechanism 46 is used to run a program, writing the bootstrap or IPL on the disk 30 is permitted. This is intended to guarantee normal writing as an exception to the rule that a file attempting to write the bootstrap or IPL on the disk 30 is judged to be infected with a virus and that executing the file is prohibited.
- a file infected with a virus is detected by the virus checker 40 .
- a file attempting to write a bootstrap or IPL or an executable file is judged to be infected with a virus.
- infection with a virus can be prevented more reliably. That is to say, when the size of a file is varied by running the file, the file stored on the disk 30 is judged to be infected with a virus (for example, judged periodically).
- a file stored on the disk 30 is judged to be an executable file in terms of the fine name, if the file is declared to be a data file in the file information management file 36 , the file stored on the disk 30 is judged to be infected with a virus (for example, judged at the start of processing).
- a file is stored on the disk 30 , if original information is not registered in the original information management file 36 and differential information brought about due to modification is not registered in the version upgrade information management file 37 , the file stored on the disk 30 is judged to be infected with a virus (judged periodically or at the time of access to the file).
- Checking if the size of a file is varied by running the file is achieved by, for example, merging original information managed in the original information management file 34 with differential information brought about due to modification which is managed in the version upgrade information management file 35 in order to produce a file, and by comparing the size of the produced file with the size of the file stored on the disk 30 .
- a storage device 1 having the function of coping with a computer virus in accordance with the present invention infection with a virus is prevented actively.
- the use of a file infected with a virus is prohibited, and the file is restored automatically.
- information concerning infection with viruses is preserved so that it cannot be accessed readily. Consequently, a storage device capable of properly dealing with infection with a virus can be constructed.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (70)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/893,445 USRE44131E1 (en) | 1995-06-02 | 2001-06-29 | Storage device having function for coping with computer virus |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP7-136331 | 1995-06-02 | ||
JP13633195A JP4162099B2 (en) | 1995-06-02 | 1995-06-02 | Device having function to cope with virus infection and storage device thereof |
US08/656,908 US5918008A (en) | 1995-06-02 | 1996-06-03 | Storage device having function for coping with computer virus |
US09/893,445 USRE44131E1 (en) | 1995-06-02 | 2001-06-29 | Storage device having function for coping with computer virus |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/656,908 Reissue US5918008A (en) | 1995-06-02 | 1996-06-03 | Storage device having function for coping with computer virus |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE44131E1 true USRE44131E1 (en) | 2013-04-02 |
Family
ID=15172729
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/656,908 Ceased US5918008A (en) | 1995-06-02 | 1996-06-03 | Storage device having function for coping with computer virus |
US09/893,445 Expired - Lifetime USRE44131E1 (en) | 1995-06-02 | 2001-06-29 | Storage device having function for coping with computer virus |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/656,908 Ceased US5918008A (en) | 1995-06-02 | 1996-06-03 | Storage device having function for coping with computer virus |
Country Status (2)
Country | Link |
---|---|
US (2) | US5918008A (en) |
JP (1) | JP4162099B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120246729A1 (en) * | 2011-03-24 | 2012-09-27 | Samsung Electronics Co., Ltd. | Data storage devices including integrated anti-virus circuits and method of operating the same |
US20120331572A1 (en) * | 1999-04-30 | 2012-12-27 | Hoshiko Llc | Method and apparatus for identifying and characterizing errant electronic files |
Families Citing this family (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6151643A (en) | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US6857099B1 (en) * | 1996-09-18 | 2005-02-15 | Nippon Steel Corporation | Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program |
US6260172B1 (en) * | 1997-09-05 | 2001-07-10 | Nippon Steel Corporation | Semiconductor device with logic rewriting and security protection function |
US6088803A (en) * | 1997-12-30 | 2000-07-11 | Intel Corporation | System for virus-checking network data during download to a client device |
US6029256A (en) * | 1997-12-31 | 2000-02-22 | Network Associates, Inc. | Method and system for allowing computer programs easy access to features of a virus scanning engine |
US5987610A (en) * | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6401210B1 (en) * | 1998-09-23 | 2002-06-04 | Intel Corporation | Method of managing computer virus infected files |
US6338141B1 (en) * | 1998-09-30 | 2002-01-08 | Cybersoft, Inc. | Method and apparatus for computer virus detection, analysis, and removal in real time |
US6389539B1 (en) * | 1998-09-30 | 2002-05-14 | International Business Machines Corporation | Method and system for enhancing security access to a data processing system |
US6266774B1 (en) | 1998-12-08 | 2001-07-24 | Mcafee.Com Corporation | Method and system for securing, managing or optimizing a personal computer |
US6499109B1 (en) * | 1998-12-08 | 2002-12-24 | Networks Associates Technology, Inc. | Method and apparatus for securing software distributed over a network |
US6961749B1 (en) | 1999-08-25 | 2005-11-01 | Network Appliance, Inc. | Scalable file server with highly available pairs |
US6954858B1 (en) | 1999-12-22 | 2005-10-11 | Kimberly Joyce Welborn | Computer virus avoidance system and mechanism |
US6763466B1 (en) * | 2000-01-11 | 2004-07-13 | Networks Associates Technology, Inc. | Fast virus scanning |
JP3251000B2 (en) * | 2000-09-07 | 2002-01-28 | 松本建工株式会社 | Insulation structure of house and heat shield used |
US6928555B1 (en) * | 2000-09-18 | 2005-08-09 | Networks Associates Technology, Inc. | Method and apparatus for minimizing file scanning by anti-virus programs |
US7086090B1 (en) * | 2000-10-20 | 2006-08-01 | International Business Machines Corporation | Method and system for protecting pervasive devices and servers from exchanging viruses |
US7778981B2 (en) * | 2000-12-01 | 2010-08-17 | Netapp, Inc. | Policy engine to control the servicing of requests received by a storage server |
US7346928B1 (en) * | 2000-12-01 | 2008-03-18 | Network Appliance, Inc. | Decentralized appliance virus scanning |
US20020178375A1 (en) * | 2001-01-31 | 2002-11-28 | Harris Corporation | Method and system for protecting against malicious mobile code |
US7272724B2 (en) * | 2001-02-20 | 2007-09-18 | Mcafee, Inc. | User alerts in an anti computer virus system |
US7363657B2 (en) * | 2001-03-12 | 2008-04-22 | Emc Corporation | Using a virus checker in one file server to check for viruses in another file server |
US7114184B2 (en) * | 2001-03-30 | 2006-09-26 | Computer Associates Think, Inc. | System and method for restoring computer systems damaged by a malicious computer program |
US7673343B1 (en) * | 2001-07-26 | 2010-03-02 | Mcafee, Inc. | Anti-virus scanning co-processor |
US7665137B1 (en) * | 2001-07-26 | 2010-02-16 | Mcafee, Inc. | System, method and computer program product for anti-virus scanning in a storage subsystem |
US7093294B2 (en) * | 2001-10-31 | 2006-08-15 | International Buisiness Machines Corporation | System and method for detecting and controlling a drone implanted in a network attached device such as a computer |
JP4567275B2 (en) * | 2002-02-28 | 2010-10-20 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method |
US7171691B2 (en) * | 2002-04-10 | 2007-01-30 | International Business Machines Corporation | Content sanitation via transcoding |
JP3979285B2 (en) * | 2002-12-17 | 2007-09-19 | 株式会社日立製作所 | Information processing system |
US20040128539A1 (en) * | 2002-12-30 | 2004-07-01 | Intel Corporation | Method and apparatus for denial of service attack preemption |
JP3835421B2 (en) * | 2003-03-28 | 2006-10-18 | コニカミノルタビジネステクノロジーズ株式会社 | Control program and control device |
WO2004095277A1 (en) * | 2003-04-24 | 2004-11-04 | Fujitsu Limited | File control method, program and device |
JP4462849B2 (en) * | 2003-05-30 | 2010-05-12 | 株式会社日立製作所 | Data protection apparatus, method and program |
US7523493B2 (en) * | 2003-08-29 | 2009-04-21 | Trend Micro Incorporated | Virus monitor and methods of use thereof |
US7962914B2 (en) * | 2003-11-25 | 2011-06-14 | Emc Corporation | Method and apparatus for load balancing of distributed processing units based on performance metrics |
US8544096B2 (en) * | 2003-12-30 | 2013-09-24 | Emc Corporation | On-access and on-demand distributed virus scanning |
US20050229250A1 (en) * | 2004-02-26 | 2005-10-13 | Ring Sandra E | Methodology, system, computer readable medium, and product providing a security software suite for handling operating system exploitations |
JP2005322285A (en) | 2004-05-07 | 2005-11-17 | Hitachi Ltd | Disk recording and reproducing apparatus |
US8154987B2 (en) * | 2004-06-09 | 2012-04-10 | Intel Corporation | Self-isolating and self-healing networked devices |
US7441272B2 (en) * | 2004-06-09 | 2008-10-21 | Intel Corporation | Techniques for self-isolation of networked devices |
US20060015939A1 (en) * | 2004-07-14 | 2006-01-19 | International Business Machines Corporation | Method and system to protect a file system from viral infections |
JP4539212B2 (en) * | 2004-07-23 | 2010-09-08 | 富士ゼロックス株式会社 | Image processing device |
JP4729890B2 (en) * | 2004-09-07 | 2011-07-20 | 富士ゼロックス株式会社 | File management device |
US7591018B1 (en) * | 2004-09-14 | 2009-09-15 | Trend Micro Incorporated | Portable antivirus device with solid state memory |
US20060095961A1 (en) * | 2004-10-29 | 2006-05-04 | Priya Govindarajan | Auto-triage of potentially vulnerable network machines |
US8887295B2 (en) * | 2005-06-27 | 2014-11-11 | Safend Ltd. | Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way |
DE102005029887A1 (en) * | 2005-06-27 | 2007-01-04 | Giesecke & Devrient Gmbh | Integrity protected disk |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US8613095B2 (en) * | 2006-06-30 | 2013-12-17 | The Invention Science Fund I, Llc | Smart distribution of a malware countermeasure |
US9258327B2 (en) | 2006-04-27 | 2016-02-09 | Invention Science Fund I, Llc | Multi-network virus immunization |
US8539581B2 (en) * | 2006-04-27 | 2013-09-17 | The Invention Science Fund I, Llc | Efficient distribution of a malware countermeasure |
US8966630B2 (en) * | 2006-04-27 | 2015-02-24 | The Invention Science Fund I, Llc | Generating and distributing a malware countermeasure |
US8117654B2 (en) * | 2006-06-30 | 2012-02-14 | The Invention Science Fund I, Llc | Implementation of malware countermeasures in a network device |
JP4895718B2 (en) * | 2006-08-14 | 2012-03-14 | 株式会社リコー | Image forming apparatus, data recovery method, and recording medium |
JP4876793B2 (en) * | 2006-08-29 | 2012-02-15 | 富士ゼロックス株式会社 | Data storage device and program |
US8099785B1 (en) | 2007-05-03 | 2012-01-17 | Kaspersky Lab, Zao | Method and system for treatment of cure-resistant computer malware |
US7783666B1 (en) | 2007-09-26 | 2010-08-24 | Netapp, Inc. | Controlling access to storage resources by using access pattern based quotas |
US7392544B1 (en) * | 2007-12-18 | 2008-06-24 | Kaspersky Lab, Zao | Method and system for anti-malware scanning with variable scan settings |
JP4705961B2 (en) * | 2008-01-25 | 2011-06-22 | Sky株式会社 | Virus damage range prediction system |
KR100977179B1 (en) * | 2008-03-19 | 2010-08-23 | 엔에이치엔비즈니스플랫폼 주식회사 | Method and System for Searching malicious code |
US20100083381A1 (en) * | 2008-09-30 | 2010-04-01 | Khosravi Hormuzd M | Hardware-based anti-virus scan service |
JP2009134740A (en) * | 2009-01-19 | 2009-06-18 | Seiko Epson Corp | Electronic appliance |
WO2014049758A1 (en) | 2012-09-26 | 2014-04-03 | 富士通株式会社 | Information processing device, information processing method, and information processing program |
MY167995A (en) * | 2014-10-17 | 2018-10-10 | Mimos Berhad | System for improving security in a vpn workflow |
JP6908874B2 (en) * | 2016-10-27 | 2021-07-28 | コニカミノルタ株式会社 | Information processing systems, information processing equipment and programs |
Citations (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62224843A (en) | 1986-03-26 | 1987-10-02 | Hitachi Ltd | Database medium content maintaining system |
JPS6355631A (en) | 1986-08-27 | 1988-03-10 | Fujitsu Ltd | Patch control method for program |
US4926476A (en) | 1989-02-03 | 1990-05-15 | Motorola, Inc. | Method and apparatus for secure execution of untrusted software |
US4962533A (en) | 1989-02-17 | 1990-10-09 | Texas Instrument Incorporated | Data protection for computer systems |
US4975950A (en) | 1988-11-03 | 1990-12-04 | Lentz Stephen A | System and method of protecting integrity of computer data and software |
US4984272A (en) | 1988-11-30 | 1991-01-08 | At&T Bell Laboratories | Secure file handling in a computer operating system |
US5050212A (en) | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
US5121345A (en) | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
US5144660A (en) | 1988-08-31 | 1992-09-01 | Rose Anthony M | Securing a computer against undesired write operations to or read operations from a mass storage device |
US5208858A (en) | 1990-02-05 | 1993-05-04 | Siemens Aktiengesellschaft | Method for allocating useful data to a specific originator |
US5265163A (en) | 1989-12-13 | 1993-11-23 | International Business Machines Corp. | Computer system security device |
US5276735A (en) | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
US5278901A (en) | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
JPH06110718A (en) | 1992-09-30 | 1994-04-22 | Toshiba Corp | Virus protection system |
US5311591A (en) | 1992-05-15 | 1994-05-10 | Fischer Addison M | Computer system security method and apparatus for creating and using program authorization information data structures |
US5313639A (en) | 1992-06-26 | 1994-05-17 | George Chao | Computer with security device for controlling access thereto |
US5319776A (en) | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
JPH06168114A (en) | 1992-11-30 | 1994-06-14 | Nippon Syst Project:Kk | Computer virus defensing device |
US5337360A (en) | 1992-04-06 | 1994-08-09 | Fischer Addison M | Method and apparatus for creating, supporting, and using travelling programs |
JPH06230959A (en) | 1993-02-02 | 1994-08-19 | Otec:Kk | Method and device for controlling prevention against computer virus |
US5343527A (en) | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
US5343524A (en) | 1991-06-21 | 1994-08-30 | Mu Xiao Chun | Intelligent security device |
JPH06242957A (en) | 1993-02-16 | 1994-09-02 | Fujitsu Ltd | Program execution controller |
JPH06250861A (en) | 1993-01-19 | 1994-09-09 | Internatl Business Mach Corp <Ibm> | Method and equipment for evaluating and sampling computer virus and signature of other undesired existing software |
US5347578A (en) | 1992-03-17 | 1994-09-13 | International Computers Limited | Computer system security |
JPH06259012A (en) | 1993-03-05 | 1994-09-16 | Hitachi Ltd | Enciphering method by hierarchic key control and information communication system |
US5349655A (en) | 1991-05-24 | 1994-09-20 | Symantec Corporation | Method for recovery of a computer program infected by a computer virus |
JPH06274419A (en) | 1993-03-23 | 1994-09-30 | Mitsubishi Kasei Corp | Information recording medium and recording method data thereof |
US5355414A (en) | 1993-01-21 | 1994-10-11 | Ast Research, Inc. | Computer security system |
US5359659A (en) | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
US5361359A (en) | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
JPH06350784A (en) | 1993-06-08 | 1994-12-22 | Ricoh Co Ltd | Facsimile equipment |
JPH06348486A (en) | 1991-04-22 | 1994-12-22 | Acer Inc | Method and system to protect computer system from computer virus |
US5379342A (en) | 1993-01-07 | 1995-01-03 | International Business Machines Corp. | Method and apparatus for providing enhanced data verification in a computer system |
US5379414A (en) | 1992-07-10 | 1995-01-03 | Adams; Phillip M. | Systems and methods for FDC error detection and prevention |
US5396609A (en) | 1989-01-19 | 1995-03-07 | Gesellschaft Fur Strahlen- Und Umweltforschung Mbh (Gsf) | Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address regions |
JPH0764786A (en) | 1993-08-30 | 1995-03-10 | Canon Inc | Method for controlling program using contract and system for realizing the method |
US5402492A (en) | 1993-06-18 | 1995-03-28 | Ast Research, Inc. | Security system for a stand-alone computer |
US5406624A (en) | 1992-09-04 | 1995-04-11 | Algorithmic Research Ltd. | Data processor systems |
US5414833A (en) | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
JPH07146788A (en) | 1993-11-22 | 1995-06-06 | Fujitsu Ltd | System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method |
US5428795A (en) | 1992-07-31 | 1995-06-27 | International Business Machines Corporation | Method of and apparatus for providing automatic security control of distributions within a data processing system |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5442706A (en) | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
US5444850A (en) | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot |
US5448668A (en) | 1993-07-08 | 1995-09-05 | Perelson; Alan S. | Method of detecting changes to a collection of digital signals |
US5473687A (en) | 1993-12-29 | 1995-12-05 | Infosafe Systems, Inc. | Method for retrieving secure information from a database |
US5473769A (en) | 1992-03-30 | 1995-12-05 | Cozza; Paul D. | Method and apparatus for increasing the speed of the detecting of computer viruses |
JPH0816386A (en) | 1994-07-04 | 1996-01-19 | Fujitsu Ltd | External storage device coping with virus |
US5502815A (en) * | 1992-03-30 | 1996-03-26 | Cozza; Paul D. | Method and apparatus for increasing the speed at which computer viruses are detected |
US5530757A (en) | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification |
US5539828A (en) | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
US5572590A (en) | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5606615A (en) | 1995-05-16 | 1997-02-25 | Lapointe; Brian K. | Computer security system |
US5613002A (en) | 1994-11-21 | 1997-03-18 | International Business Machines Corporation | Generic disinfection of programs infected with a computer virus |
US5625692A (en) | 1995-01-23 | 1997-04-29 | International Business Machines Corporation | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing |
US5651069A (en) | 1994-12-08 | 1997-07-22 | International Business Machines Corporation | Software-efficient message authentication |
US5659614A (en) | 1994-11-28 | 1997-08-19 | Bailey, Iii; John E. | Method and system for creating and storing a backup copy of file data stored on a computer |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
US5675645A (en) | 1995-04-18 | 1997-10-07 | Ricoh Company, Ltd. | Method and apparatus for securing executable programs against copying |
US5689247A (en) | 1994-12-30 | 1997-11-18 | Ortho Pharmaceutical Corporation | Automated system for identifying authorized system users |
US5721877A (en) | 1995-05-31 | 1998-02-24 | Ast Research, Inc. | Method and apparatus for limiting access to nonvolatile memory device |
US5724425A (en) | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
US5802275A (en) | 1994-06-22 | 1998-09-01 | Lucent Technologies Inc. | Isolation of non-secure software from secure software to limit virus infection |
US5809138A (en) | 1994-07-25 | 1998-09-15 | Netz Computing Ltd. | Method for protecting storage media against computer virus infection |
US6381694B1 (en) | 1994-02-18 | 2002-04-30 | Apple Computer, Inc. | System for automatic recovery from software problems that cause computer failure |
US20100235916A1 (en) * | 2001-12-21 | 2010-09-16 | Radatti Peter V | Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects |
-
1995
- 1995-06-02 JP JP13633195A patent/JP4162099B2/en not_active Expired - Lifetime
-
1996
- 1996-06-03 US US08/656,908 patent/US5918008A/en not_active Ceased
-
2001
- 2001-06-29 US US09/893,445 patent/USRE44131E1/en not_active Expired - Lifetime
Patent Citations (76)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS62224843A (en) | 1986-03-26 | 1987-10-02 | Hitachi Ltd | Database medium content maintaining system |
JPS6355631A (en) | 1986-08-27 | 1988-03-10 | Fujitsu Ltd | Patch control method for program |
US5144660A (en) | 1988-08-31 | 1992-09-01 | Rose Anthony M | Securing a computer against undesired write operations to or read operations from a mass storage device |
US4975950A (en) | 1988-11-03 | 1990-12-04 | Lentz Stephen A | System and method of protecting integrity of computer data and software |
US5121345A (en) | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
US4984272A (en) | 1988-11-30 | 1991-01-08 | At&T Bell Laboratories | Secure file handling in a computer operating system |
US5396609A (en) | 1989-01-19 | 1995-03-07 | Gesellschaft Fur Strahlen- Und Umweltforschung Mbh (Gsf) | Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address regions |
US4926476A (en) | 1989-02-03 | 1990-05-15 | Motorola, Inc. | Method and apparatus for secure execution of untrusted software |
US4962533A (en) | 1989-02-17 | 1990-10-09 | Texas Instrument Incorporated | Data protection for computer systems |
US5265163A (en) | 1989-12-13 | 1993-11-23 | International Business Machines Corp. | Computer system security device |
US5208858A (en) | 1990-02-05 | 1993-05-04 | Siemens Aktiengesellschaft | Method for allocating useful data to a specific originator |
US5319776A (en) | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5050212A (en) | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
JPH06348486A (en) | 1991-04-22 | 1994-12-22 | Acer Inc | Method and system to protect computer system from computer virus |
US5511184A (en) | 1991-04-22 | 1996-04-23 | Acer Incorporated | Method and apparatus for protecting a computer system from computer viruses |
US5349655A (en) | 1991-05-24 | 1994-09-20 | Symantec Corporation | Method for recovery of a computer program infected by a computer virus |
US5408642A (en) | 1991-05-24 | 1995-04-18 | Symantec Corporation | Method for recovery of a computer program infected by a computer virus |
US5343524A (en) | 1991-06-21 | 1994-08-30 | Mu Xiao Chun | Intelligent security device |
US5442706A (en) | 1992-02-27 | 1995-08-15 | Hughes Aircraft Company | Secure mobile storage |
US5347578A (en) | 1992-03-17 | 1994-09-13 | International Computers Limited | Computer system security |
US5473769A (en) | 1992-03-30 | 1995-12-05 | Cozza; Paul D. | Method and apparatus for increasing the speed of the detecting of computer viruses |
US5502815A (en) * | 1992-03-30 | 1996-03-26 | Cozza; Paul D. | Method and apparatus for increasing the speed at which computer viruses are detected |
US5337360A (en) | 1992-04-06 | 1994-08-09 | Fischer Addison M | Method and apparatus for creating, supporting, and using travelling programs |
US5390247A (en) | 1992-04-06 | 1995-02-14 | Fischer; Addison M. | Method and apparatus for creating, supporting, and using travelling programs |
US5276735A (en) | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
US5278901A (en) | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
US5311591A (en) | 1992-05-15 | 1994-05-10 | Fischer Addison M | Computer system security method and apparatus for creating and using program authorization information data structures |
US5412717A (en) | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5359659A (en) | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
US5313639A (en) | 1992-06-26 | 1994-05-17 | George Chao | Computer with security device for controlling access thereto |
US5379414A (en) | 1992-07-10 | 1995-01-03 | Adams; Phillip M. | Systems and methods for FDC error detection and prevention |
US5428795A (en) | 1992-07-31 | 1995-06-27 | International Business Machines Corporation | Method of and apparatus for providing automatic security control of distributions within a data processing system |
US5361359A (en) | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
US5406624A (en) | 1992-09-04 | 1995-04-11 | Algorithmic Research Ltd. | Data processor systems |
JPH06110718A (en) | 1992-09-30 | 1994-04-22 | Toshiba Corp | Virus protection system |
JPH06168114A (en) | 1992-11-30 | 1994-06-14 | Nippon Syst Project:Kk | Computer virus defensing device |
US5379342A (en) | 1993-01-07 | 1995-01-03 | International Business Machines Corp. | Method and apparatus for providing enhanced data verification in a computer system |
JPH06250861A (en) | 1993-01-19 | 1994-09-09 | Internatl Business Mach Corp <Ibm> | Method and equipment for evaluating and sampling computer virus and signature of other undesired existing software |
US5452442A (en) | 1993-01-19 | 1995-09-19 | International Business Machines Corporation | Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5355414A (en) | 1993-01-21 | 1994-10-11 | Ast Research, Inc. | Computer security system |
JPH06230959A (en) | 1993-02-02 | 1994-08-19 | Otec:Kk | Method and device for controlling prevention against computer virus |
JPH06242957A (en) | 1993-02-16 | 1994-09-02 | Fujitsu Ltd | Program execution controller |
JPH06259012A (en) | 1993-03-05 | 1994-09-16 | Hitachi Ltd | Enciphering method by hierarchic key control and information communication system |
JPH06274419A (en) | 1993-03-23 | 1994-09-30 | Mitsubishi Kasei Corp | Information recording medium and recording method data thereof |
JPH06350784A (en) | 1993-06-08 | 1994-12-22 | Ricoh Co Ltd | Facsimile equipment |
US5402492A (en) | 1993-06-18 | 1995-03-28 | Ast Research, Inc. | Security system for a stand-alone computer |
US5448668A (en) | 1993-07-08 | 1995-09-05 | Perelson; Alan S. | Method of detecting changes to a collection of digital signals |
US5444850A (en) | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot |
JPH0764786A (en) | 1993-08-30 | 1995-03-10 | Canon Inc | Method for controlling program using contract and system for realizing the method |
US5930357A (en) | 1993-08-30 | 1999-07-27 | Canon Kabushiki Kaisha | Method of managing contracts for licensed program use and a management system thereof |
US5414833A (en) | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
US5343527A (en) | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
US5881151A (en) | 1993-11-22 | 1999-03-09 | Fujitsu Limited | System for creating virus diagnosing mechanism, method of creating the same, virus diagnosing apparatus and method therefor |
JPH07146788A (en) | 1993-11-22 | 1995-06-06 | Fujitsu Ltd | System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method |
KR0132998B1 (en) | 1993-11-22 | 1998-04-24 | 세끼자와 다다시 | System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method |
US5473687A (en) | 1993-12-29 | 1995-12-05 | Infosafe Systems, Inc. | Method for retrieving secure information from a database |
US5666411A (en) | 1994-01-13 | 1997-09-09 | Mccarty; Johnnie C. | System for computer software protection |
US6381694B1 (en) | 1994-02-18 | 2002-04-30 | Apple Computer, Inc. | System for automatic recovery from software problems that cause computer failure |
US5572590A (en) | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures |
US5539828A (en) | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
US5724425A (en) | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
US5802275A (en) | 1994-06-22 | 1998-09-01 | Lucent Technologies Inc. | Isolation of non-secure software from secure software to limit virus infection |
US5530757A (en) | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification |
JPH0816386A (en) | 1994-07-04 | 1996-01-19 | Fujitsu Ltd | External storage device coping with virus |
US5809138A (en) | 1994-07-25 | 1998-09-15 | Netz Computing Ltd. | Method for protecting storage media against computer virus infection |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5613002A (en) | 1994-11-21 | 1997-03-18 | International Business Machines Corporation | Generic disinfection of programs infected with a computer virus |
US5659614A (en) | 1994-11-28 | 1997-08-19 | Bailey, Iii; John E. | Method and system for creating and storing a backup copy of file data stored on a computer |
US5651069A (en) | 1994-12-08 | 1997-07-22 | International Business Machines Corporation | Software-efficient message authentication |
US5689247A (en) | 1994-12-30 | 1997-11-18 | Ortho Pharmaceutical Corporation | Automated system for identifying authorized system users |
US5625692A (en) | 1995-01-23 | 1997-04-29 | International Business Machines Corporation | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing |
US5675645A (en) | 1995-04-18 | 1997-10-07 | Ricoh Company, Ltd. | Method and apparatus for securing executable programs against copying |
US5606615A (en) | 1995-05-16 | 1997-02-25 | Lapointe; Brian K. | Computer security system |
US5721877A (en) | 1995-05-31 | 1998-02-24 | Ast Research, Inc. | Method and apparatus for limiting access to nonvolatile memory device |
US20100235916A1 (en) * | 2001-12-21 | 2010-09-16 | Radatti Peter V | Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects |
Non-Patent Citations (26)
Title |
---|
"MS-DOX/V FM V Sidebook 88SP-3060-1," Fujitsu Ltd., 1994, 1st edition, pp. 19-36. |
Akira Watanabe, "Computer Virus Dictionary", Ohmsha Ltd., Nov. 25, 1993, pp. 82-117. |
CBR Staff Writer; Computer Business Review; Secure Data Network Offers Automatic Back-Up Service, Virus Screening, In US, [online], Nov. 27, 1989 [retrieved Apr. 12, 2011]. Retrieved from the Internet:. (2 pages). |
CBR Staff Writer; Computer Business Review; Secure Data Network Offers Automatic Back-Up Service, Virus Screening, In US, [online], Nov. 27, 1989 [retrieved Apr. 12, 2011]. Retrieved from the Internet:<URL: http://www.cbronline.com/news>. (2 pages). |
Coursey, David; Networking; ISDN Technology Boosts Remote LAN, PC Backup, Sep. 9, 1991, p. 33 (2 pages). |
Decision of Final Rejection (Office Action) for corresponding Japanese Application No. 7-136331 dated Feb. 7, 2006. |
Ghannam M. Al-Dossary, "Computer Virus Prevention and Containment on Mainframes," Proceeding of 1989 International Carnahan Conference on Security Technology (ICCST in Zurich), 1989, pp. 23-31. |
Joe Rizzo, "Antivirus Software Operating on Netware: Comparably Priced-Choice Depends on Reliability and Usability", Nikkei Open Systems, Nikkei BP, Dec. 10, 1993, vol. 9, pp. 163-168. |
Kyodo News Service, Virusbuster Book 1, Aug. 25, 1993 (10 pages-cover page, pp. 5, 50-56 and 60) (Partial English Translation as identified of pp. 52, 53, and 60-5 pages). |
Magid, Lawrence J.; Los Angeles Times; ‘Future’ Products Already Here [online], Feb. 22, 1990 [retrieved Jan. 20, 2011]. Retrieved from the Internet:<URL: http://articles.latimes.com/1990-02-22/business/fi-1323—1—secure-data-network>. (2 pages). |
Magid, Lawrence J.; Los Angeles Times; 'Future' Products Already Here [online], Feb. 22, 1990 [retrieved Jan. 20, 2011]. Retrieved from the Internet:. (2 pages). |
Masaru Tanaka, "Special Security Method for PCLAN! Topical Security for PC LAN (2) Anit-Virus Software Challenging Network Viruses," Computer and Network LAN, Ohmsha Ltd. Feb. 1, 1994. vol. 13, No. 2, pp. 52-56. |
Mims, Bob; Deseret News; Data Vault Backs Up Data For Small Businesses, [online], Jun. 5, 1991 [retrieved on Jan. 20, 2010]. Retrieved from the Internet:. (2 pages). |
Mims, Bob; Deseret News; Data Vault Backs Up Data For Small Businesses, [online], Jun. 5, 1991 [retrieved on Jan. 20, 2010]. Retrieved from the Internet:<URL: www.deseretnews.com/article/165762/DATA-VAULT-BACKS-UP-DATA-FOR-SMALL-BUSINESSES.html>. (2 pages). |
Newman, Richard; Disaster Recovery Journal; PC Backup Technology Arrives [online], circa 1988-1992 [retrieved on Jan. 20, 2011]. Retrieved from the Internet:<URL: http://www.drj.com/article-archives/data-processing-recovery/pc-backup-technology-arrives.html>. (3 pages). |
Notice of Allowance mailed Dec. 21, 1998 in corresponding U.S. Appl. No. 08/656,908. |
Notice of Reasons for Rejection (Office Action) for corresponding Japanese Application No. 7-136331 dated Jul. 26, 2005. |
Notice of Reasons for Rejection (Office Action) for corresponding Japanese Application No. 7-136331 dated Oct. 25, 2005. |
Office Action mailed May 1, 1998 in corresponding U.S. Appl. No. 08/656,908. |
Office Action mailed Sep. 18, 1997 in corresponding U.S. Appl. No. 08/656,908. |
Paul Ferrill, et al., "Product Comparison: Network Virus Protection, An Ounce of Prevention," Infoworld, Feb. 13, 1995, vol. 17, Issue 7, pp. 84- 99 (18 pages). |
Peter Norton Symantec Corp., Norton Antivirus, 1992, Chapter 2, 3, 4, 6, B-4-B-7. |
Reed, Frank; Warren, Eric; Business Wire, New York; Secure Data Network Inc. Introduces Nation's First Online PC Data Backup And Retrieval Service, Oct. 31, 1989 (2 pages). |
Richard Ford, et al., "Virus Bulletin-The Authoritative International Publication on Computer Virus Prevention, Recognition and Removal," ISSN 0956-9979, Jul. 1993 (pp. 1-24). |
Richard Ford, et al., "Virus Bulletin-The International Publication on Computer Virus Prevention, Recognition and Removal," ISSN 0956-9979, Dec. 1994 (pp. 1-24). |
Secure Data Network Offers Automatic Back-Up service, Virus screening, In US, p. 1, Dated Nov. 28, 1989. * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120331572A1 (en) * | 1999-04-30 | 2012-12-27 | Hoshiko Llc | Method and apparatus for identifying and characterizing errant electronic files |
US9239924B2 (en) * | 1999-04-30 | 2016-01-19 | Intellectual Ventures I Llc | Identifying and characterizing electronic files using a two-stage calculation |
US10235442B2 (en) | 1999-04-30 | 2019-03-19 | Intellectual Ventures I Llc | Method and apparatus for identifying and characterizing errant electronic files |
US20120246729A1 (en) * | 2011-03-24 | 2012-09-27 | Samsung Electronics Co., Ltd. | Data storage devices including integrated anti-virus circuits and method of operating the same |
US8683594B2 (en) * | 2011-03-24 | 2014-03-25 | Samsung Electronics Co., Ltd. | Data storage devices including integrated anti-virus circuits and method of operating the same |
Also Published As
Publication number | Publication date |
---|---|
JPH08328846A (en) | 1996-12-13 |
US5918008A (en) | 1999-06-29 |
JP4162099B2 (en) | 2008-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE44131E1 (en) | Storage device having function for coping with computer virus | |
US6928555B1 (en) | Method and apparatus for minimizing file scanning by anti-virus programs | |
US7346781B2 (en) | Initiating execution of a computer program from an encrypted version of a computer program | |
JP4828199B2 (en) | System and method for integrating knowledge base of anti-virus software applications | |
US5822517A (en) | Method for detecting infection of software programs by memory resident software viruses | |
US7665123B1 (en) | Method and apparatus for detecting hidden rootkits | |
US6802028B1 (en) | Computer virus detection and removal | |
CN101231683A (en) | Method for secure data processing on a computer system | |
US7631356B2 (en) | System and method for foreign code detection | |
US7251735B2 (en) | Buffer overflow protection and prevention | |
US20060185016A1 (en) | System, computer program product and method of selecting sectors of a hard disk on which to perform a virus scan | |
US20100235916A1 (en) | Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects | |
JP4253320B2 (en) | Virus-compatible storage device and information processing device | |
JP4109285B2 (en) | Device, storage device, and file processing method | |
JP4129022B2 (en) | Device, storage device, and file processing method | |
JP4627266B2 (en) | Information leakage prevention system due to unknown malware | |
KR100613126B1 (en) | Method and apparatus for deleting virus code, and information storage medium storing a program thereof | |
JP4303231B2 (en) | Virus-compatible storage device and information processing device | |
JPH10187434A (en) | Security keeping system | |
JP2005258498A (en) | Server restoration method | |
JPH08147159A (en) | Information processor | |
JPH0844556A (en) | Software structure and mechanism for security and system protection in electronic computer | |
JP3417065B2 (en) | Virus-compatible external storage device, data processing device, and data processing method | |
JP4109284B2 (en) | File processing method | |
JP2005099982A (en) | File monitoring device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUJITSU LIMITED;REEL/FRAME:032821/0875 Effective date: 20140211 |
|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TOGAWA, YOSHIFUSA;MIYAMOTO, TAKAYUKI;NOZAWA, KURIKO;REEL/FRAME:032956/0687 Effective date: 19960521 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001 Effective date: 20160226 |
|
AS | Assignment |
Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030 Effective date: 20171222 Owner name: RPX CORPORATION, CALIFORNIA Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030 Effective date: 20171222 |