Nothing Special   »   [go: up one dir, main page]

USRE44131E1 - Storage device having function for coping with computer virus - Google Patents

Storage device having function for coping with computer virus Download PDF

Info

Publication number
USRE44131E1
USRE44131E1 US09/893,445 US89344501A USRE44131E US RE44131 E1 USRE44131 E1 US RE44131E1 US 89344501 A US89344501 A US 89344501A US RE44131 E USRE44131 E US RE44131E
Authority
US
United States
Prior art keywords
file
virus
unit
infected
disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/893,445
Inventor
Yoshifusa Togawa
Takayuki Miyamoto
Kuriko Ando
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Corp
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to US09/893,445 priority Critical patent/USRE44131E1/en
Application granted granted Critical
Publication of USRE44131E1 publication Critical patent/USRE44131E1/en
Assigned to RPX CORPORATION reassignment RPX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FUJITSU LIMITED
Assigned to FUJITSU LIMITED reassignment FUJITSU LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MIYAMOTO, TAKAYUKI, NOZAWA, KURIKO, TOGAWA, YOSHIFUSA
Assigned to JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT reassignment JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: RPX CLEARINGHOUSE LLC, RPX CORPORATION
Anticipated expiration legal-status Critical
Assigned to RPX CORPORATION, RPX CLEARINGHOUSE LLC reassignment RPX CORPORATION RELEASE (REEL 038041 / FRAME 0001) Assignors: JPMORGAN CHASE BANK, N.A.
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware

Definitions

  • the present invention relates to a storage device having a function for coping with a computer virus that has the ability to prevent infection with a computer virus and to properly deal with infection with a computer virus.
  • a storage device 100 basically comprises, as shown in FIG. 1 , a disk 105 for storing files, and a controller 120 for executing driving control for the disk 105 and also executing input/output control for a personal computer 110 that is connected to the drive.
  • the storage device 100 having the foregoing components is designed to be directly accessed by a driver under the control of an operating system in the personal computer 110 comprising a CPU 112 for processing various kinds of data, a RAM 114 for storing various kinds of data and programs, a ROM 116 , and the like.
  • the storage device yields such an environment in which; a file expanded in the personal computer 110 , one running can readily destroy other files stored in the storage device.
  • a virus that intrudes from an external unit into a file via a LAN adapter 130 , keyboard 140 , display 150 , or the like rewrites another file using a physical address of the file which is indicated by low-order address bits, or rewrites a system startup area such as a bootstrap using a physical address of the system startup area which is indicated by low-order address bits, and thus destroys an original program.
  • a prior art system design is adopted such that if a virus checker (not shown) expanded in the personal computer 110 finds a file infected with a virus from among files expanded on the disk 105 in the storage device 100 , all the files expanded on the disk are cleared and then originals of the files are installed again.
  • an object of the present invention is to provide a storage device having a function, for coping with a computer virus which has the ability to prevent infection with a virus and to properly deal with an infection of a virus.
  • a storage device having a function for coping with a computer virus in accordance with the present invention comprises: an infection management table means used to manage files stored on a disk and to see if the files are infected with a virus; a table registering means for receiving a result of detection from a virus checker for detecting if a file stored on the disk is infected with a virus, and for registering the result in the infection management table means; a judging means that when a use request is made externally for a file stored on the disk, references the infection management table means so as to judge if the file is infected with a virus; and a prohibiting means that when the judging means has judged that a file is infected with a virus, prohibits the use of the file.
  • the virus checker is designed to be run by the storage device having a function for coping with a computer virus.
  • the virus checker is designed to be activated at intervals of a specific cycle.
  • the virus checker is designed to be activated in response to a command instruction.
  • the table registering means judges that a file which is stored on the disk and is a source of the writing request is infected with a virus and that registers the fact in the infection management table means.
  • the storage device having the function of coping with a computer virus in accordance with the present invention includes an invalidating means that when a writing request is issued for the system startup area stored on the disk, invalidates the writing request.
  • the storage device having the function of coping with a computer virus in accordance with the present invention includes a dedicated writing means for executing writing for the system startup area stored on the disk.
  • a writing request is issued for the system startup area stored on the disk, if the writing request specifies the use of the writing means, the invalidating means does not invalidate the writing request.
  • the table registering means judges that a file which is stored on the disk and is a source of the writing request is infected with a virus and registers the fact in the infection management table means.
  • the storage device having the function of coping with a computer virus in accordance with the present invention includes a permitting means for determining whether a writing request made for a file that is registered as a virus-infected file by the table registering means and that is running should be permitted.
  • the table registering means judges that the file which is the destination of the writing request is also infected with a virus and registers the fact in the infection management table means.
  • the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
  • the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
  • the storage device having the function of coping with a computer virus in accordance with the present invention includes a determining means for determining through interactive processing whether the use of a virus-infected file that is registered in the infection management table means should be permitted.
  • the prohibiting means does not prohibit the use of a file which is permitted by the determining means.
  • the storage device having the function of coping with a computer virus in accordance with the present invention includes: a first managing means for managing original information of files stored on a disk; a second managing means for managing differential information brought about due to modification concerning the files stored on a disk, and history information concerning the differential information brought about due to modification; and a file registering means for merging the original information of a file which is managed by the first managing means and the differential information brought about due to modification which is managed by the second managing means so as to produce a file, and then registering the produced file on the disk.
  • the first managing means manages original information that is confirmed not to be infected with a virus by the virus checker
  • the second managing means manages differential information brought about due to modification which is confirmed not to be infected with a virus by the virus checker.
  • the table registering means judges that the file stored on the disk is infected with a virus, and then registers the fact in the infection management table means.
  • the storage device having the function of coping with a computer virus in accordance with the present invention includes a restoring means for deleting a virus-infected file that is registered in the infection management table means from the disk, activating the file registering means, thus restoring the file, and then registering the file on the disk.
  • the first managing means manages original information of the virus checker
  • the second managing means manages differential information brought about due to modification concerning the virus checker and history information concerning the differential information brought about due to modification.
  • the storage device includes a generating means for merging the original information of a virus checker which is managed by the first managing means with the differential information brought about due to modification concerning a virus checker which is managed by the second managing means so as to reproduce the virus checker.
  • the generating means generates a virus checker at the time of running a virus checker.
  • the first managing means encodes and manages original information
  • the second managing means encodes and manages differential information brought about due to modification.
  • the storage device includes a decoding means for decoding encoded data managed by the first and second managing means, and an encoding means for executing inverse conversion that is inverse to conversion performed by the decoding means.
  • the storage device having the function of coping with a computer virus in accordance with the present invention includes a saving means for saving a virus-infected file that is registered in the infection management table means and virus information concerning the file in an inexecutable area, and a reading means for reading the information saved in the inexecutable area under the condition that permission information for permitting access to the inexecutable area is given.
  • the table registering means registers a virus-infected file detected by the virus checker in the infection management table means.
  • the table registering means judges that a file which is a source of the writing request is infected with a virus, and registers the fact in the infection management table means. This is intended to treat new, malign, or unusual kinds of viruses that cannot be detected by the virus checker.
  • the invalidating means invalidates the writing request.
  • the writing means is included, if the writing request specifies the use of the writing means, the invalidating means does not invalidate the writing request.
  • the table registering means judges that a file which is a source of the writing request is infected with a virus and registers the fact in the infection management table means.
  • the permitting means determines through interactive processing whether the writing request should be permitted.
  • the table registering means judges that the file which is stored on the disk and is a destination of the writing request is also infected with the virus and registers the fact in the infection management table means.
  • the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
  • a file stored on a disk is judged to be an executable file in terms of the file name, if the file is declared to be a data file, the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
  • the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
  • the judging means references the infection management table means so as to judge if the file for which the use request is made is infected with a virus.
  • the prohibiting means prohibits the use of the file that is judged to be infected with a virus. At this time, the prohibiting means does not prohibit the use of a file which is permitted by the determining means.
  • the saving means saves, that is, stores temporarily a virus-infected file whose use is prohibited and virus information concerning the file in the inexecutable area.
  • the reading means reads the saved information from the inexecutable area and outputs it as information used for virus analysis under the condition that permission information for permitting access to the inexecutable area is given.
  • the restoring means deletes a virus-infected file, which is registered in the infection management table means, from the disk, activates the file registering means, thus restores the file, and then registers the restored file on a disk.
  • the storage device having the function of coping with a computer virus in accordance with the present invention is designed to actively prevent infection with a virus, prohibits the use of a virus-infected file and restores the virus-infected file automatically, and preserves information concerning infection with viruses so that the information cannot be accessed readily. Consequently, a storage device capable of properly dealing with infection with a virus can be constructed.
  • FIG. 1 (PRIOR ART) is a block diagram showing the configuration of a typical storage device
  • FIG. 2 is a block diagram showing the configuration of an embodiment based on the basic principles of the present invention
  • FIG. 3 is a block diagram showing the configuration of the first preferred embodiment of the present invention.
  • FIG. 4 is a block diagram showing the details of an inexecutable area in FIG. 3 ;
  • FIG. 5 is a block diagram showing the configuration of the second preferred embodiment of the present invention.
  • FIG. 6 is a block diagram showing the configuration of the third preferred embodiment of the present invention.
  • FIG. 7 is a block diagram showing the configuration of the fourth preferred embodiment of the present invention.
  • FIG. 8 is a block diagram showing the configuration of the fifth preferred embodiment of the present invention.
  • FIG. 9 is a block diagram showing the configuration of the sixth preferred embodiment of the present invention.
  • FIG. 10 is a block diagram for explaining a procedure of file production in accordance with the present invention.
  • FIG. 11 is a block diagram for explaining a procedure of file storage in accordance with the present invention.
  • FIG. 12 is a block diagram showing the details of a conversion table in a ROM in accordance with the present invention.
  • FIG. 13 is a block diagram showing an example of a data structure for a file information management file in accordance with the present invention.
  • FIG. 14 is a flowchart for explaining the first example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 15 is a flowchart for explaining the second example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 16 is a flowchart for explaining the third example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 17 is a flowchart for explaining the fourth example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 18 is a flowchart for explaining the fourth example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 19 is a flowchart for explaining the fifth example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 20 is a flowchart for explaining the sixth example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 21 is a flowchart for explaining the seventh example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 22 is a flowchart for explaining the eighth example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 23 is a flowchart for explaining the ninth example of a processing flow to be executed by an embodiment of the present invention.
  • FIG. 24 is a block diagram for explaining the first example of an anti-virus operation in the embodiment shown in FIG. 2 ;
  • FIG. 25 is a block diagram for explaining the second example of the anti-virus operation in the embodiment shown in FIG. 2 ;
  • FIG. 26 is a block diagram for explaining the third example of the anti-virus operation in the embodiment shown in FIG. 2 ;
  • FIG. 27 is a block diagram for explaining the fourth example of the anti-virus operation in the embodiment shown in FIG. 2 ;
  • FIG. 28 is a block diagram for explaining the fifth example of the anti-virus operation in the embodiment shown in FIG. 2 ;
  • FIG. 29 is a block diagram for explaining the sixth example of the anti-virus operation in the embodiment shown in FIG. 2 ;
  • FIG. 30 is a block diagram for explaining the seventh example of the anti-virus operation in the embodiment shown in FIG. 2 .
  • FIG. 2 is a block diagram showing the configuration of an embodiment based on the basic principles of the present invention.
  • reference numeral 1 denotes a storage device having the function of coping with a computer virus in accordance with the present invention.
  • Reference numeral 2 denotes a data processing unit for executing data processing using a file stored in the storage device 1 having the function of coping with a computer virus.
  • the storage device 1 having the function of coping with a computer virus comprises a disk 10 , first managing means 11 , second managing means 12 , file registering means 13 , generating means 14 , virus checker 15 , infection management table means 16 , table registering means 17 , judging means 18 , prohibiting means 19 , determining means 20 , restoring means 21 , invalidating means 22 , writing means 23 , permitting means 24 , inexecutable area 25 , saving means 26 , and reading means 27 .
  • the virus checker 15 may be expanded in the data processing unit 2 .
  • the disk 10 stores files.
  • the first managing means 11 manages original information of the files stored on the disk 10 or manages original information of the virus checker 15 .
  • the second managing means 12 manages differential information brought about due to modification; that is, information concerning upgraded versions of the files stored on the disk, and history information concerning the differential information brought about due to modification, or manages differential information brought about due to modification concerning the virus checker 15 ; that is, information concerning an upgraded version of the virus checker 15 , and history information concerning the differential information brought about due to modification.
  • the first managing means 11 may encode and manage the original information of the files and virus checker 15 so as to prevent the original information from being rewritten.
  • the second managing means 12 may encode and manage the differential information brought about due to modification concerning the files and virus checker 15 so as to prevent the information from being rewritten.
  • a decoding means for decoding the encoded data and an encoding means for executing inverse conversion that is inverse to conversion performed by the decoding means are included in the second managing means 12 .
  • the file registering means 13 merges the original information of a file which is managed by the first managing means 11 with the differential information brought about due to modification concerning the file which is managed by the second managing means 12 so as to reproduce the file, and then stores the file on the disk 10 .
  • the generating means 14 merges the original information of the virus checker 15 which is managed by the first managing means 11 with the differential information brought about due to modification concerning the virus checker 15 which is managed by the second managing means 12 so as to reproduce the virus checker 15 .
  • the virus checker 15 is activated at intervals of a specific period or activated in response to a command instruction, and detects whether a file stored on the disk 10 is infected with a virus.
  • the infection management table means 16 is used to manage files stored on the disk and to see if the files are infected with viruses.
  • the table registering means 17 registers data in the infection management table means 16 .
  • the judging means 18 references the infection management table means 16 in response to a use request made for a file stored on the disk 10 by the data processing unit 2 , and judges if the file is infected with a virus. When the judging means 18 judges that a file is infected with a virus, the prohibiting means 19 prohibits the use of the file.
  • the determining means 20 determines through interactive processing whether the use of a file registered in the infection management table means 16 should be permitted.
  • the restoring means 21 deletes a virus-infected file, which is registered in the infection management table means 16 , from the disk 10 , activates the file registering means 13 , thus restores the file, and then registers the restored file on the disk 10 .
  • the invalidating means 22 invalidates the writing request.
  • the writing means 23 is prepared as a dedicated writing facility and executes writing for the system startup area stored on the disk 10 .
  • the permitting means 24 determines through interactive processing whether a writing request made for an executable file stored on the disk should be permitted.
  • the inexecutable area 25 is prepared as an area inaccessible with a normal access request.
  • the saving means 26 saves a virus-infected file registered in the infection management table means 16 and virus information concerning the file in the inexecutable area 25 .
  • the reading means 27 reads information saved in the inexecutable area 25 under the condition that permission information for permitting access to the inexecutable area 25 is given.
  • the table registering means 17 registers a virus-infected file detected by the virus checker 15 in the infection management table means 16 .
  • the table registering means 17 judges that a file which is stored on the disk 10 and is a source of the writing request is infected with a virus, and registers the fact in the infection management table means 16 . This is intended to treat new, malign, or unusual kinds of viruses that cannot be detected by the virus checker 15 .
  • the invalidating means 22 invalidates the writing request.
  • the writing means 23 is included, if the writing request specifies the use of the writing means 23 , the invalidating means 23 does not invalidate the writing request.
  • the table registering means 17 judges that a file which is stored on the disk 10 and is a source of the writing request is infected with a virus, and registers the fact in the infection management table means 16 .
  • the permitting means 24 determines through interactive processing whether the writing request should be permitted.
  • the table registering means 17 judges that a file which is stored on the disk 10 and is a destination of the writing request is also infected with the virus, and registers the fact in the infection management table means 16 .
  • the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16 .
  • a file stored on the disk is judged as an executable file in terms of the file name, if the file is declared to be a data file, the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16 .
  • the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16 .
  • the judging means 18 references the infection management table means 16 so as to judge if the file for which the use request is made is infected with a virus.
  • the prohibiting means 19 prohibits the use of the file that is judged to be infected with a virus by the judging means 18 .
  • the prohibiting means 19 does not prohibit the use of a file which is permitted by the determining means 20 .
  • the saving means 26 saves the virus-infected file whose use is prohibited and virus information concerning the file in the inexecutable area 25 that cannot be accessed readily.
  • the reading means 27 reads the saved information from the inexecutable area 25 under the condition that permission information for permitting access to the inexecutable area 25 is given, and outputs the read information as information used for virus analysis.
  • the restoring means 21 deletes a virus-infected file registered in the infection management table means 16 from the disk 10 , activates the file registering means 13 , thus restores the file, and registers the file on the disk 10 .
  • the storage device 1 having the function of coping with a computer virus shown in FIG. 2 is designed to actively prohibit infection with a virus, to prohibit the use of a file infected with a virus and restores the file automatically, and to preserve information concerning infection with viruses so that the information cannot be accessed readily.
  • a storage device capable of properly dealing with infection with a virus can be constructed.
  • a storage device having the function of coping with a computer virus in accordance with the present invention will be described below in detail in conjunction with several preferred embodiments that are more practical than the basic embodiment shown in FIG. 2 .
  • FIG. 3 shows the first preferred embodiment of the storage device 1 having the function of coping with a computer virus in accordance with the present invention.
  • the storage device 1 having the function of coping with a computer virus in this embodiment is connected to a personal computer 2 a.
  • the storage device 1 includes a disk 30 for storing files that are objects of access obtained by the personal computer 2 a as well as a ROM 31 for storing firmware or the like that executes access processing or anti-virus processing, a CPU 32 for running firmware stored in the ROM 31 and executing data transfer to or from the personal computer 2 a, and a RAM 33 prepared as a work area used by firmware that is run by the CPU 32 , and thus has the capability of a CPU.
  • the storage device 1 further includes an original information management file 34 used to manage original information of files stored on the disk 30 and original information of a virus checker prepared for inspection of the files stored on the disk.
  • a version update information management file 35 is used to manage differential information brought about due to modification concerning a file stored on the disk 30 and history information concerning the differential information brought about due to modification, and to manage differential information brought about due to modification concerning the virus checker and history information concerning the differential information brought about due to modification.
  • a file information management file 36 is used to manage the information indicating if the files are stored on the disk, and is used to determine if the original information stored in the original information management file 34 , and the differential information (brought about due to modification and which is stored in the version upgrade information management file 35 ) are infected with viruses.
  • the information indicates if the files to be managed are executable files or data files, and if the files to be managed belong to a bootstrap or an initial program loader (IPL).
  • An inexecutable area 37 which is prepared as an area that becomes accessible only when a password and ID number agree with internal data, and in which a file infected with a virus and virus information concerning the file are saved, has a data structure shown in FIG. 4 .
  • the reason why the version update information management file 35 manages history information is to make apparent which is the latest differential information brought about due to modification.
  • the inexecutable area 37 shown in FIG. 4 includes an infected-file storage area that is a storage area in which files infected with viruses are stored, and a virus information storage area that is a storage area in which virus information of the viruses is stored. Furthermore, the virus information storage area contains detailed information; such as, names of infected files that are infected with viruses, storage locations of the infected files, sizes of the storage locations of the infected files, sizes of virus information, name of viruses, and the information indicating if the viruses are of a system area infection type or a file infection type, and the information indicating if the viruses are of a file destruction type or the like.
  • controller 38 for accessing a file stored on the disk, accessing original information managed in the original information management file 34 , accessing the differential information brought about due to modification and history information which are managed in the version upgrade information management file 35 , or accessing information saved in the inexecutable area 37 .
  • the original information management file 34 and version upgrade information management file 35 are not designed to enable management of original information and differential information brought about due to modification from the viewpoint of a mere difference but may be designed to enable management of original information and differential information brought about due to modification on the basis of a relationship of succession including a parent-child relationship.
  • the storage device 1 having the function of coping with a computer virus is connected to the personal computer 2 a. Aside from this, like the second preferred embodiment shown in FIG. 5 , the storage device 1 may be connected over a LAN.
  • the original information management file 34 and version upgrade information management file 35 are separate files.
  • the original information management file and version upgrade information management file may be formed with one file. This kind of file is realized in the form of an original information/version upgrade information management file 34 / 35 shown in FIGS. 6 and 7 .
  • FIG. 3 the original information management file 34 and version upgrade information management file
  • FIG. 7 a personal computer and a storage device having the function of coping with a computer virus are united by combining the configurations shown in FIGS. 5 and 6 .
  • the embodiment shown in FIG. 3 has the configuration in which the storage device 1 having the function of coping with a computer virus is installed outside the personal computer 2 a.
  • the storage device may be installed inside the personal computer 2 a.
  • the original information management file 34 and version upgrade information management file 35 are separate files. In the embodiment shown in FIG. 9 , both the files are formed with one file.
  • the storage device 1 having the function of coping with a computer virus in accordance with the present invention has, as mentioned above, the configuration including the original information management file 34 and version upgrade information management file 35 .
  • original information of a file stored on the disk 30 is stored in the original information management file 34 ; when the file is upgraded into a new version, differential information brought about due to modification concerning the upgraded version and history information concerning the differential information brought about due to modification are stored in the version upgrade information management file 35 ; and in case a file stored on the disk 30 is infected with a virus, the file can be restored by merging the original information of the file with differential information brought about due to modification. Moreover, since original information of a file and differential information brought about due to modification concerning the file are not expanded on the disk 30 , it can be prevented that these kinds of information are infected with a virus.
  • a virus checker prepared for inspection of a file stored on a disk also has the possibility of being upgraded into a new version.
  • the original information of the virus checker is stored in the original information management file 34 .
  • Differential information brought about due to modification concerning the upgraded version and history information concerning the differential information brought about due to modification are stored in the version upgrade information management file 35 .
  • the virus checker is managed.
  • the original information management file 34 and version upgrade information management file 35 are constructed on the same medium, original information of files and a virus checker, differential information brought about due to modification concerning the files and virus checker, and history information concerning the differential information brought about due to modification can be managed totally. This is convenient in practice.
  • the disk 30 and inexecutable area 37 may be constructed on the medium.
  • Original information of files and a virus checker which is stored in the original information management file 34 and differential information brought about due to modification concerning the files and virus checker and history information concerning the differential information brought about due to modification which are stored in the version upgrade information management file 35 must not be rewritten by the personal computer 2 a.
  • the storage device 1 having the function of coping with a computer virus has the configuration in which original information 34 a of files and a virus checker which is stored in the original information management file 34 , and differential information brought about due to modification concerning the files and virus checker and history information concerning the differential information brought about due to modification which are stored in the version upgrade information management file 35 are encoded, and in which a decoding mechanism for decoding encoded data is made ready. As shown in FIG. 10 , the original information of a file or virus checker decoded by the decoding mechanism is merged with the differential information brought about due to modification concerning the file or virus checker which is decoded by the decoding mechanism in order to reproduce the file or virus checker.
  • an encoding mechanism for executing inverse conversion that is inverse to conversion performed by the decoding mechanism is made ready.
  • the original information of files and a virus checker which is encoded by the encoding mechanism is stored in the original information management file 34 .
  • the differential information brought about due to modification and history information 35 a concerning the files and virus checker which are encoded by the encoding mechanism are stored in the version upgrade information management file 35 .
  • the encoding mechanism and decoding mechanism are realized by firmware stored in an area 312 , which is reserved in order to store firmware, in the ROM 31 in the storage device 1 having the function of coping with a computer virus.
  • firmware stored in an area 312 , which is reserved in order to store firmware, in the ROM 31 in the storage device 1 having the function of coping with a computer virus.
  • a conversion table 310 is used to encode original information, differential information brought about due to modification, and history information
  • a conversion table 311 is used to decode the original information, differential information brought about due to modification, and history information which are encoded are stored in the ROM 31 .
  • the storage device 1 having the function of coping with a computer virus in accordance with the present invention includes the file information management file 36 as mentioned above.
  • the file information management file 36 manages the information indicating if files stored on the disk 30 , original information stored in the original information management file 34 , and differential information brought about due to modification which is stored in the version upgrade information management file 35 are infected with viruses, the information indicating if these files to be managed are executable files or data files, and the information indicating that the files to be managed belong to a bootstrap or an IPL.
  • FIG. 13 shows an example of a data structure for the file information management file 36 .
  • the example shown in FIG. 13 is devised on the assumption that a file which is stored on the disk and writes a bootstrap or an IPL is judged to be infected with a virus, and that a file which is stored on the disk and writes an executable file is judged to be infected with a virus. This is attributable to the fact that a normal file will not perform the former writing and will not in general perform the latter writing, either.
  • the file information management file 36 manages, as shown in FIG. 13 , file names of files to be managed, addresses of the files, execution/data type flags indicating whether the files are executable files or data files, and starting portion flags indicating if the files belong to a bootstrap or an IPL.
  • File information management file 36 also manages: infection flags ⁇ 1> indicating if it is detected by a virus checker that the files are infected with viruses, infection flags ⁇ 2> indicating if it is judged according to whether or not writing the bootstrap or IPL is attempted that the files are infected with viruses, infection flags ⁇ 3> indicating if it is judged according to whether or not writing an executable file is attempted that the files are infected with a virus, infection flags ⁇ 4> indicating if original information stored in the original information management file 34 is infected with a virus, and infection flags ⁇ 5> indicating if differential information brought about due to modification which is stored in the version upgrade information management file 35 is infected with a virus.
  • the aforesaid information is managed. Whether or not original information stored in the original information management file 34 is infected with a virus and whether or not differential information brought about due to modification which is stored in the version upgrade information management file 35 is infected with a virus is judged by the virus checker or according to whether writing the bootstrap, the IPL, or an executable file is attempted.
  • “1” is set relative to an executable file and “0” is set relative to a data file.
  • “1” is set in case a file belongs to a bootstrap or IPL, and “0” is set in any other case.
  • “1” is set when infection with a virus is detected, and “0” is set when infection with a virus it not detected.
  • “1” is set when infection with a virus is suspected, and “0” is set when infection with a virus is not suspected.
  • “1” is set when infection with a virus is suspected, and “0” is set when infection with a virus is neither detected nor suspected.
  • FIGS. 14 to 23 describe some examples of processing flows executed by the storage device 1 having the function of coping with a computer virus which is configured as mentioned above. Next, operations performed by the storage device 1 having the function of coping with a computer virus in accordance with the present invention will be described in detail in conjunction with these examples of processing flows.
  • the storage device 1 When activated, the storage device 1 having the function of coping with a computer virus initializes the infected-file storage area and virus information storage area (storage areas shown in FIG. 4 ) within the inexecutable area 37 (step S 141 ). Thereafter, initialization is executed by registering an ID number and password needed to access the inexecutable area 37 (step S 142 ).
  • the storage device 1 having the function of coping with a computer virus merges original information of a virus checker which is stored in the original information management file 34 with the latest differential information brought about due to modification concerning the virus checker which is stored in the version upgrade information management file 35 .
  • the virus checker is reproduced and expanded in the RAM 33 .
  • the reproduced virus checker is used to check if a file registered (original information and differential information brought about due to modification) is infected with a virus (step S 151 ). If it is judged that the file is infected with a virus, the infected file and virus information concerning the file are saved in the inexecutable area 37 (step S 152 ). Use Prohibited Due To Infection With a Virus is reported to the personal computer 2 a that is a source of registration (step S 153 ).
  • the file when it is judged that a file is not infected with a virus, the file is stored in the original information management file 34 and version upgrade information management file 35 which are destinations of registration. History information is created and stored in the version upgrade information management file 35 (step S 154 ).
  • the file (when a registered file contains differential information brought about due to modification, the file is a file created by merging the information with original information) is then expanded on the disk 30 .
  • data is registered in the file information management file 36 (step S 155 ).
  • original information of a file which is not infected with a virus is registered in the original information management file 34 .
  • Differential information brought about due to modification concerning the file which is not infected with a virus is registered in the version upgrade information management file 35 .
  • a file that contains the original information merged with the differential information brought about due to modification and that is not infected with a virus is then expanded on the disk 30 .
  • the reason why the system is designed so that a virus checker is not stored on the disk 30 in advance but produced prior to checking on infection with a virus is to prevent the virus checker itself from being infected with a virus.
  • the present invention adopts the system design of prohibiting a file infected with a virus from running, a file attempting to write a bootstrap or IPL is prohibited from running. This means that the bootstrap or IPL cannot be registered. In the present invention, therefore, when a specific command instructing registration of the bootstrap or IPL is issued, the registration is permitted.
  • the storage device 1 having the function of coping with a computer virus registers the bootstrap or IPL, for which a registration request has been made, in the original information management file 34 (step S 161 ), and fetches the bootstrap or IPL into the RAM 33 and stores it on the disk 30 (step S 162 ).
  • “1” is set in the storage area of a starting portion flag in the file information management file 36 . It is thus registered that a file stored is a bootstrap or IPL.
  • “1” is set in the storage area of an execution/data type flag, whereby it is registered that the file stored is an executable file.
  • Infection flags ⁇ 1> to ⁇ 5> are set to “0,” whereby it is registered that the file stored is not infected with a virus (step S 163 ).
  • FIGS. 17 and 18 describe a processing flow of virus-infected file detection to be executed using a virus checker (first half and second half of the fourth example).
  • FIG. 19 describes a processing flow (fifth example) of virus-infected file detection to be executed by judging the attribute of a writing-destination file.
  • the storage device 1 For detecting a virus-infected file using a virus checker, the storage device 1 having the function of coping with a computer virus first waits, as described in the fourth example of a processing flow shown in FIGS. 17 and 18 , for the start of a period of detecting a virus-infected file. When it is judged that the detecting period starts, control is passed to step S 172 .
  • Original information of a virus checker which is stored in the original information management file 34 is merged with the latest differential information brought about due to modification concerning the virus checker which is stored in the version upgrade information management file 35 in order to produce the latest virus checker.
  • the produced virus checker is expanded in the RAM 33 .
  • step S 173 one of the unprocessed files on the disk 30 is extracted at step S 173 .
  • step S 174 the produced virus checker is used to check if the extracted file is infected with a virus.
  • control is passed to step S 175 .
  • “1” is recorded as infection flag ⁇ 1> associated with the file in the file information management file 36 , whereby it is registered that the file is infected with a virus.
  • control is passed to step S 176 .
  • “0” is recorded as infection flag ⁇ 1>, whereby it is registered that the file is not infected with a virus.
  • step S 177 it is judged that all the files stored on the disk 30 have been processed. If it is judged that an unprocessed file is left, control is returned to step S 173 . If it is judged that no unprocessed file is left, control is passed to step S 178 . It is judged if a mode, in which original information stored in the original information management file 34 and differential information brought about due to modification which is stored in the version upgrade information management file 35 are also subjected to virus check, is designated. If the mode in which both the original information and differential information brought about due to modification are subjected to virus check is not designated, control is returned to step S 171 .
  • control is passed to step S 181 described in FIG. 18 .
  • One of the original information and differential information brought about due to modification is expanded in a work area in the RAM 33 .
  • the produced virus checker is used to check if the file expanded in the work area is infected with a virus. The virus check for original information or differential information brought about due to modification is carried out in order to deal with emergence of a new kind of virus.
  • step S 183 If it is judged by the virus check that the file is not infected with a virus, control is passed to step S 183 . “0” is recorded as infection flags ⁇ 4> and ⁇ 5> associated with the file in the file information management file 36 . It is thus registered that the file is not infected with a virus. By contrast, when it is judged that the file is infected with a virus, control is passed to step S 184 . “1” is recorded as infection flags ⁇ 4> and ⁇ 5> associated with the file in the file information management file 36 . It is thus registered that the original information is infected with a virus.
  • step S 185 it is judged if all original information and differential information brought about due to modification have been processed. If it is judged that an unprocessed file is left, control is returned to step S 181 . If it is judged that no unprocessed file is left, control is returned to step S 171 in FIG. 17 .
  • the storage device 1 having the function of coping with a computer virus uses a virus checker to periodically check if files stored on the disk 30 , original information stored in the original information management file 34 , and differential information brought about due to modification which is stored in the version upgrade information management file 35 are infected with viruses.
  • the results of the check are registered in the form of infection flags ⁇ 1>, ⁇ 4>, and ⁇ 5> in the file information management file 36 .
  • a virus checker is activated at intervals of a specific period.
  • the system may be designed so that the virus checker is activated in response to a command issued from the personal computer 2 a.
  • the storage device 1 having the function of coping with a computer virus actuates a virus checker.
  • the system may be designed so that the personal computer 2 a actuates the virus checker.
  • the storage device 1 having the function of coping with a computer virus first references the value of a starting portion flag in the file information management file 36 so as to judge if the writing-destination file belongs to a bootstrap or IPL.
  • step S 191 If it is judged by the judgment at step S 191 that the writing-destination file belongs to the bootstrap or IPL, control is passed to step S 192 . It is then judged that the file having issued the writing request is infected with a virus. “1” is recorded as infection flag ⁇ 2> associated with the file in the file information management file 36 , whereby it is registered that the file is infected with a virus. At step S 193 , it is reported to the personal computer 2 a that the file which made the writing request is a file infected with a virus. The processing is then terminated without writing.
  • step S 191 if it is judged at step S 191 that the writing-destination file does not belong to the bootstrap or IPL, control is passed to step S 194 .
  • the value of an execution/data type flag in the file information management file 36 is referenced in order to judge if the writing-destination file is an executable file or data file. If it is judged that the writing-destination file is a data file, writing is executed for the file at step S 195 . The processing is then terminated.
  • step S 194 if it is judged at step S 194 that the writing-destination file is an executable file, it is judged that it is highly probable that the file having issued the writing request is infected with a virus. Control is then passed to step S 196 . While the fact is being reported, a message asking if writing should be executed is output to the personal computer 2 a. A response to the inquiry is duly received.
  • step S 196 If it is judged at step S 196 that the response from the personal computer 2 a instructs that writing should not be executed, control is passed to step S 197 . “1” is recorded as infection flag ⁇ 3> associated with the file, which has issued the writing request, in the file information management file 36 , whereby it is registered that the file is infected with a virus. The processing is then terminated.
  • step S 196 if it is judged at step S 196 that a response from the personal computer 2 a instructs that writing should be executed, although it is highly probable that the file that is a source of the writing request is infected with a virus, it is instructed to ignore the probability. Control is therefore passed to step S 198 .
  • Writing is executed for the writing-destination file.
  • step S 199 “1” is recorded as infection flags ⁇ 3> associated with the writing-source and writing-destination files in the file information management file 36 , whereby it is registered that the files are infected with a virus. The processing is then terminated.
  • the storage device 1 having the function of coping with a computer virus judges that a file which is a source of the writing request is infected with a virus. The fact is registered in the form of infection flags ⁇ 2> and ⁇ 3> in the file information management file 36 . If the writing-destination file belongs to the bootstrap or IPL, executing writing is disabled. If the writing-destination file is an executable file, it is determined through interactive processing if writing should be executed for the file. When writing is executed, it is judged that the writing-destination file will also be infected with a virus. The fact is registered in the form of infection flag ⁇ 3> in the file information management file 36 .
  • the storage device 1 When receiving a loading request made for a file (executable file) stored on the disk 30 from the personal computer 2 a, as described in the sixth example of a processing flow in FIG. 20 , the storage device 1 having the function of coping with a computer virus references infection flags ⁇ 1>, ⁇ 2>, and ⁇ 3> in the file information management file 36 (step S 201 ) so as to check if the file for which the loading request is made is infected with a virus. When it is judged that the file is not infected with a virus, the file is loaded into the personal computer 2 a. Running the file is thus instructed (step S 202 ). By contrast, when it is judged that the file is infected with a virus, loading the file is rejected (step S 203 ). Running the file is thus prevented.
  • the storage device 1 having the function of coping with a computer virus gives control so that a virus-infected file registered in the file information management file 36 will not be run. Consequently, a file that is detected to be infected with a virus by a virus checker will never be run. A file that has evaded checking by the virus checker and that is detected to be infected with a virus in terms of the attribute of a writing-destination file will not be rerun. Thus, proliferation of the virus can be reliably prevented.
  • running a file infected with a virus is rejected without exception.
  • a program may be produced to have a pattern resembling the pattern of a virus, and a virus checker may make a mistake in checking.
  • the system may therefore be designed so that it is determined through interaction with the personal computer 2 a whether the run rejection should be lifted.
  • the storage device 1 having the function of coping with a computer virus first references infection flags ⁇ 1>, ⁇ 2>, and ⁇ 3> in the file information management file 36 , extracts one file infected with a virus, and deletes the file from the disk 30 at step S 211 .
  • the data of the deleted file is deleted from the file information management file 36 .
  • infection flag ⁇ 4> in the file information management file 36 is referenced, and original information of the deleted file, which is not infected with a virus, is read from the original information management file 34 .
  • Infection flag ⁇ 5> in the file information management file 36 is referenced, and the latest differential information brought about due to modification concerning the deleted file, which is not infected with a virus, is read from the original information management file 34 .
  • the original information is then merged with the differential information brought about due to modification in order to restore the deleted file.
  • the restored file is then expanded on the disk 30 .
  • data of the restored file is registered in the file information management file 36 .
  • the storage device 1 having the function of coping with a computer virus deletes a file infected with a virus from the disk 30 .
  • Original information of the file and differential information brought about due to modification are used to restore the infected file into an uninfected one.
  • the file not infected with a virus is then expanded on the disk 30 .
  • the system may be designed so that restoration is executed at intervals of a specific period. Restoring the virus-infected file may thus be executed.
  • a file infected with a virus can be restored autonomously irrespective of the personal computer 2 a.
  • the latest differential information brought about due to modification which is not infected with a virus is used to restore a file infected with a virus into the latest one.
  • the system may be designed so that differential information brought about due to modification which is identified by an instruction sent from the personal computer 2 a and pointed out by history information is used for restoration.
  • the storage device 1 having the function of coping with a computer virus executes the processing of restoring a file infected with a virus into an uninfected file.
  • the file infected with a virus and virus information concerning the file-infected file may be saved in the inexecutable area 37 .
  • the storage device 1 having the function of coping with a computer virus first references infection flags ⁇ 1>, ⁇ 2>, and ⁇ 3> in the file information management file 36 and extracts one file infected with a virus at step S 221 .
  • a virus checker expanded in advance is used to specify virus information concerning the extracted virus-infected file.
  • the extracted virus-infected file and virus information specified at step S 223 are saved in the inexecutable area 37 .
  • the extracted virus-infected file is deleted from the disk 30 .
  • step S 225 data of the deleted file is deleted from the file information management file 36 .
  • step S 226 infection flag ⁇ 4> in the file information management file 36 is referenced, and original information of the deleted file which is not infected with a virus is read from the original information management file 34 .
  • Infection flag ⁇ 5> in the file information management file 36 is referenced, and the latest differential information brought about due to modification concerning the deleted file which is not infected with a virus is read from the original information management file 34 .
  • the original information is then merged with the differential information brought about due to modification in order to restore the deleted file.
  • the restored file is then expanded on the disk 30 .
  • step S 227 data of the restored file is registered in the file information management file 36 .
  • step S 228 it is judged if an unprocessed virus-infected file is left. If no unprocessed file is left, the processing is terminated. If an unprocessed file is left, control is returned to step S 221 .
  • the storage device 1 having the function of coping with a computer virus deletes a file infected with a virus from the disk 30 , restores the file into an uninfected one that is not infected with a virus using original information and differential information brought about due to modification concerning the file, and expands the restored file on the disk 30 .
  • the file infected with a virus and virus information concerning the file are saved in the inexecutable area 37 .
  • the storage device 1 having the function of coping with a computer virus first requests entry of an ID number and password which have been registered according to the processing flow (first example) described in FIG. 14 (step S 231 ), and collates the ID number and password entered in response to the request with those registered according to the processing flow in FIG. 14 to see if they agree with each other (step S 232 ). Under the condition that they agree with each other, a virus-infected file and virus information which are saved in the inexecutable area 37 are read and output to the personal computer 2 a (step S 233 ). When a deletion request is issued for the extracted virus-infected file and virus information from the personal computer 2 a (step S 234 ), deletion is executed (step S 235 ).
  • the storage device 1 having the function of coping with a computer virus reads a virus-infected file and virus information, which are saved in the inexecutable area 37 , under the condition that an ID number and password agree with internal data.
  • the system may be designed so that the saved information is read from the inexecutable area 37 by executing reading at intervals of a specific period.
  • an encoding mechanism for converting a virus-infected file and virus information, which are saved in the inexecutable area 37 , into encoded data may be prepared.
  • the encoded data produced by the encoding mechanism is then stored in the inexecutable area 37 .
  • a decoding mechanism for executing inverse conversion that is inverse to the conversion performed by the encoding mechanism may be prepared. In this case, the virus-infected file and virus information which are saved in the inexecutable area 37 are read using the decoding mechanism.
  • FIGS. 24 to 30 are block diagrams for explaining several examples (first to seventh examples) of an anti-virus operation performed in the basic embodiment shown in FIG. 2 .
  • a virus checker 40 (which may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is received and registered in the file information management file 36 . Thus, the file information management file 36 is used to manage the information indicating if files expanded on the disk 30 are infected with viruses. Furthermore, as shown in FIG. 24 for explaining the first example of an anti-virus operation, a virus checker 40 (which may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is received and registered in the file information management file 36 . Thus, the file information management file 36 is used to manage the information indicating if files expanded on the disk 30 are infected with viruses. Furthermore, as shown in FIG.
  • the file information management file 36 is referenced to judge if the file for which the use request is made is infected with a virus. If the file is infected with a virus, the use of the file is prohibited. Thus, proliferation of the virus is prevented.
  • reference numeral 41 denotes a management file registering/referencing mechanism for registering data in the file information management file 36 and referencing the file information management file 36 for data.
  • the virus checker 40 When the system is designed so that the virus checker 40 is run by the storage device 1 having the function of coping with a computer virus, checking on an infection with a virus can be executed concurrently with an operation of the personal computer 2 a. Moreover, checking on an infection with a virus can be executed at night or the like. In case the virus checker 40 is run by the personal computer 2 a, the virus checker 40 may not be loaded from the storage device 1 having the function of coping with a computer virus but may be prepared separately.
  • Alphanumeric characters in parentheses ( 1 A) to ( 5 A) in FIGS. 24 and ( 1 B) to ( 3 B), ( 3 B)′, ( 4 B), and ( 5 B) in FIG. 25 denote processing orders.
  • the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 26 for explaining the third example of an anti-virus operation, an original information management file 34 for encoding and managing original information of files, a version upgrade information management file 35 for encoding and managing differential information brought about due to modification concerning the files, a file generating mechanism 42 for decoding and merging encoded data of original information and differential information brought about due to modification so as to generate a file, and a deleting mechanism 43 for deleting a file from the disk 30 .
  • the deleting mechanism 43 is used to delete the virus-infected file from the disk 30 .
  • the file generating mechanism 42 is used to restore the virus-infected file into an uninfected one that is not infected with a virus and expand the file on the disk 30 .
  • the system can therefore be operated by performing a minimum scale of installation.
  • alphanumeric characters in parentheses ( 1 C) to ( 14 C) denote processing orders.
  • the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 27 for explaining the fourth example of an anti-virus operation, a timer 44 for issuing a virus check instruction periodically (which may be incorporated in the personal computer 2 a as shown in FIG. 28 for explaining the fifth example of an anti-virus operation). Furthermore, encoded data of original information of the virus checker 40 is stored in the original information management file 34 . Encoded data of differential information brought about due to modification concerning the virus checker 40 is stored in the version upgrade information management file 35 . When the timer 44 issues an instruction for a virus check, the file generating mechanism 42 generates the virus checker 40 .
  • the thus-generated virus checker 40 (that may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk is infected with a virus. The result of the checking is registered in the file information management file 36 . Thus, the virus checker 40 is protected from being infected with a virus, and intrusion of the virus is prevented.
  • Alphanumeric characters in parentheses ( 1 D) to ( 3 D), ( 3 E), ( 4 D), and ( 5 D) in FIGS. 27 and ( 1 F), ( 2 F), ( 2 F)′, ( 3 F) to ( 5 F) in FIG. 28 denote processing orders.
  • the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 29 for explaining the sixth example of an anti-virus operation, a virus check starting mechanism 45 for issuing an instruction of virus check in response to an instruction sent from the personal computer 2 a. Furthermore, encoded data of original information of the virus checker 40 is stored in the original information management file 34 . Encoded data of differential information brought about due to modification concerning the virus checker 40 is stored in the version upgrade information management file 35 . When the virus check starting mechanism 45 issues an instruction of virus check, the file generating mechanism 42 generates the virus checker 40 .
  • the thus-generated virus checker 40 (that may be run by the personal computer 2 a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is registered in the file information management file 36 . Thus, the virus checker 40 is protected from being infected with a virus, and intrusion of the virus is prevented.
  • Alphanumeric characters ( 1 G) to ( 3 G), ( 3 G)′, ( 4 G) to ( 6 G) in the drawing denote processing orders.
  • the storage device 1 having the function of coping with a computer virus in accordance with the present invention which has the configuration shown in FIG. 2 , includes, as shown in FIG. 30 for explaining the seventh example of an anti-virus operation, a dedicated system writing mechanism 46 for writing a bootstrap or IPL on the disk 30 .
  • a dedicated system writing mechanism 46 for writing a bootstrap or IPL on the disk 30 .
  • the system writing mechanism 46 is used to run a program, writing the bootstrap or IPL on the disk 30 is permitted. This is intended to guarantee normal writing as an exception to the rule that a file attempting to write the bootstrap or IPL on the disk 30 is judged to be infected with a virus and that executing the file is prohibited.
  • a file infected with a virus is detected by the virus checker 40 .
  • a file attempting to write a bootstrap or IPL or an executable file is judged to be infected with a virus.
  • infection with a virus can be prevented more reliably. That is to say, when the size of a file is varied by running the file, the file stored on the disk 30 is judged to be infected with a virus (for example, judged periodically).
  • a file stored on the disk 30 is judged to be an executable file in terms of the fine name, if the file is declared to be a data file in the file information management file 36 , the file stored on the disk 30 is judged to be infected with a virus (for example, judged at the start of processing).
  • a file is stored on the disk 30 , if original information is not registered in the original information management file 36 and differential information brought about due to modification is not registered in the version upgrade information management file 37 , the file stored on the disk 30 is judged to be infected with a virus (judged periodically or at the time of access to the file).
  • Checking if the size of a file is varied by running the file is achieved by, for example, merging original information managed in the original information management file 34 with differential information brought about due to modification which is managed in the version upgrade information management file 35 in order to produce a file, and by comparing the size of the produced file with the size of the file stored on the disk 30 .
  • a storage device 1 having the function of coping with a computer virus in accordance with the present invention infection with a virus is prevented actively.
  • the use of a file infected with a virus is prohibited, and the file is restored automatically.
  • information concerning infection with viruses is preserved so that it cannot be accessed readily. Consequently, a storage device capable of properly dealing with infection with a virus can be constructed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A storage device, having the function of coping with a computer virus which has the ability to prevent infection with a computer virus and properly deal with infection with a computer virus, comprises: an infection management table used to manage files stored on a disk to see if the files are infected with viruses; a table registering unit for receiving a result of detection from a virus checker for detecting if a file stored on a disk is infected with a virus, and for registering the result in the infection management table; a judging unit that when a use request is made externally for a file stored on the disk, references the infection management table so as to judge if the file is infected with a virus; and a prohibiting unit that when the judging unit judges that a file is infected with a virus, prohibits the use of the file.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a storage device having a function for coping with a computer virus that has the ability to prevent infection with a computer virus and to properly deal with infection with a computer virus.
In recent years, computer systems using computer programs have prevailed in enterprises, households, and the like. Accordingly, the number of occurrences of computer viruses that destroy or damage the computer systems and that have an auto-proliferation ability has tended to increase markedly.
In particular, recently-procurable personal computers are interconnected over a network such as a local area network (LAN) and adopt the configuration enabling information exchange through data communications. The fear that a computer virus (hereinafter abbreviated to a virus) residing in one personal computer spreads into the other personal computers connected over the network is becoming more and more serious.
This makes it necessary to construct a storage device having the ability to freely use files while preventing the breeding of a virus and to delete a file infected with a virus or restore the infected file into an uninfected state.
2. Description of the Related Art
For a clear understanding of problems concerning viruses destroying computer systems, infection with a virus in a typical storage device will be described with reference to FIG. 1.
A storage device 100 basically comprises, as shown in FIG. 1, a disk 105 for storing files, and a controller 120 for executing driving control for the disk 105 and also executing input/output control for a personal computer 110 that is connected to the drive.
The storage device 100 having the foregoing components is designed to be directly accessed by a driver under the control of an operating system in the personal computer 110 comprising a CPU 112 for processing various kinds of data, a RAM 114 for storing various kinds of data and programs, a ROM 116, and the like. In other words, the storage device yields such an environment in which; a file expanded in the personal computer 110, one running can readily destroy other files stored in the storage device.
On the other hand, a virus that intrudes from an external unit into a file via a LAN adapter 130, keyboard 140, display 150, or the like rewrites another file using a physical address of the file which is indicated by low-order address bits, or rewrites a system startup area such as a bootstrap using a physical address of the system startup area which is indicated by low-order address bits, and thus destroys an original program.
This poses a problem that files stored in a storage device are readily infected with a virus.
In an effort to cope with the above problem, a prior art system design is adopted such that if a virus checker (not shown) expanded in the personal computer 110 finds a file infected with a virus from among files expanded on the disk 105 in the storage device 100, all the files expanded on the disk are cleared and then originals of the files are installed again.
However, in the prior art, it is detected whether any of the files expanded on a disk in a storage device is infected with a virus. If any of the files is infected, the file is treated properly. The prior art does not adopt a method of actively preventing infection with a virus. There is therefore a problem that files expanded on the disk in the storage device are readily infected with a virus.
Moreover, in the prior art, when it is detected that any of files expanded on a disk in a storage device is infected with a virus, all the files expanded on the disk are cleared and then originals of the files are installed again. This poses a problem that a user is obliged to incur an enormous work load.
In the prior art, a file judged to be infected with a virus is cleared in its entirety. It cannot be analyzed as to what kind of virus destroyed the file. This poses a problem in that an anti-virus measure cannot be examined.
SUMMARY OF THE INVENTION
In view of the above-described problems, an object of the present invention is to provide a storage device having a function, for coping with a computer virus which has the ability to prevent infection with a virus and to properly deal with an infection of a virus.
To solve the above problems, a storage device having a function for coping with a computer virus in accordance with the present invention comprises: an infection management table means used to manage files stored on a disk and to see if the files are infected with a virus; a table registering means for receiving a result of detection from a virus checker for detecting if a file stored on the disk is infected with a virus, and for registering the result in the infection management table means; a judging means that when a use request is made externally for a file stored on the disk, references the infection management table means so as to judge if the file is infected with a virus; and a prohibiting means that when the judging means has judged that a file is infected with a virus, prohibits the use of the file.
In the storage device having the function of coping with a computer virus in accordance with the present invention, preferably, the virus checker is designed to be run by the storage device having a function for coping with a computer virus.
Furthermore, in the storage device having the function of coping with a computer virus in accordance with the present invention, the virus checker is designed to be activated at intervals of a specific cycle.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, the virus checker is designed to be activated in response to a command instruction.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, when a writing request is issued for a system startup area stored on a disk, the table registering means judges that a file which is stored on the disk and is a source of the writing request is infected with a virus and that registers the fact in the infection management table means.
More preferably, the storage device having the function of coping with a computer virus in accordance with the present invention includes an invalidating means that when a writing request is issued for the system startup area stored on the disk, invalidates the writing request.
More preferably, the storage device having the function of coping with a computer virus in accordance with the present invention includes a dedicated writing means for executing writing for the system startup area stored on the disk. When a writing request is issued for the system startup area stored on the disk, if the writing request specifies the use of the writing means, the invalidating means does not invalidate the writing request.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, when a writing request is issued for an executable file stored on a disk, the table registering means judges that a file which is stored on the disk and is a source of the writing request is infected with a virus and registers the fact in the infection management table means.
More preferably, the storage device having the function of coping with a computer virus in accordance with the present invention includes a permitting means for determining whether a writing request made for a file that is registered as a virus-infected file by the table registering means and that is running should be permitted.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, when a writing request is permitted by the permitting means, if a file that is a destination of the writing request is rewritten, the table registering means judges that the file which is the destination of the writing request is also infected with a virus and registers the fact in the infection management table means.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, when the size of a file is varied by running the file, the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
More particularly, in the storage device having the function of coping with a computer virus in accordance with the present invention, although a file stored on the disk is judged to be an executable file in terms of the file name, if the file is declared to be a data file, the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
More preferably, the storage device having the function of coping with a computer virus in accordance with the present invention includes a determining means for determining through interactive processing whether the use of a virus-infected file that is registered in the infection management table means should be permitted. The prohibiting means does not prohibit the use of a file which is permitted by the determining means.
More preferably, the storage device having the function of coping with a computer virus in accordance with the present invention includes: a first managing means for managing original information of files stored on a disk; a second managing means for managing differential information brought about due to modification concerning the files stored on a disk, and history information concerning the differential information brought about due to modification; and a file registering means for merging the original information of a file which is managed by the first managing means and the differential information brought about due to modification which is managed by the second managing means so as to produce a file, and then registering the produced file on the disk.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, the first managing means manages original information that is confirmed not to be infected with a virus by the virus checker, and the second managing means manages differential information brought about due to modification which is confirmed not to be infected with a virus by the virus checker.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, as for a file which is stored on the disk, of which original information is not registered in the first managing means, and of which differential information brought about due to modification is not registered in the second managing means, the table registering means judges that the file stored on the disk is infected with a virus, and then registers the fact in the infection management table means.
More preferably, the storage device having the function of coping with a computer virus in accordance with the present invention includes a restoring means for deleting a virus-infected file that is registered in the infection management table means from the disk, activating the file registering means, thus restoring the file, and then registering the file on the disk.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, the first managing means manages original information of the virus checker, and the second managing means manages differential information brought about due to modification concerning the virus checker and history information concerning the differential information brought about due to modification. The storage device includes a generating means for merging the original information of a virus checker which is managed by the first managing means with the differential information brought about due to modification concerning a virus checker which is managed by the second managing means so as to reproduce the virus checker.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, the generating means generates a virus checker at the time of running a virus checker.
More preferably, in the storage device having the function of coping with a computer virus in accordance with the present invention, the first managing means encodes and manages original information, and the second managing means encodes and manages differential information brought about due to modification. The storage device includes a decoding means for decoding encoded data managed by the first and second managing means, and an encoding means for executing inverse conversion that is inverse to conversion performed by the decoding means.
More preferably, the storage device having the function of coping with a computer virus in accordance with the present invention includes a saving means for saving a virus-infected file that is registered in the infection management table means and virus information concerning the file in an inexecutable area, and a reading means for reading the information saved in the inexecutable area under the condition that permission information for permitting access to the inexecutable area is given.
In the storage device having the function of coping with a computer virus in accordance with the present invention, the table registering means registers a virus-infected file detected by the virus checker in the infection management table means.
Furthermore, when a writing request is issued for a system startup area stored on a disk, since a normal file will not issue such a writing request, the table registering means judges that a file which is a source of the writing request is infected with a virus, and registers the fact in the infection management table means. This is intended to treat new, malign, or unusual kinds of viruses that cannot be detected by the virus checker. At this time, when a writing request is issued, the invalidating means invalidates the writing request. When the writing means is included, if the writing request specifies the use of the writing means, the invalidating means does not invalidate the writing request.
Moreover, when a writing request is issued for an executable file stored on a disk, since a normal file will not issue such a writing request, the table registering means judges that a file which is a source of the writing request is infected with a virus and registers the fact in the infection management table means. The permitting means determines through interactive processing whether the writing request should be permitted. When the permitting means permits the writing request, since the file is rewritten, the table registering means judges that the file which is stored on the disk and is a destination of the writing request is also infected with the virus and registers the fact in the infection management table means.
When the size of a file is varied by running the file, the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
Although a file stored on a disk is judged to be an executable file in terms of the file name, if the file is declared to be a data file, the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
As for a file which is stored on a disk, of which original information is not registered in the first managing means, and of which differential information brought about due to modification is not registered in the second managing means, the table registering means judges that the file stored on the disk is infected with a virus and registers the fact in the infection management table means.
As mentioned above, when a virus-infected file is registered in the infection management table means, if a data processing unit makes a use request for the file stored on the disk, the judging means references the infection management table means so as to judge if the file for which the use request is made is infected with a virus. On receipt of a result of the judgment, the prohibiting means prohibits the use of the file that is judged to be infected with a virus. At this time, the prohibiting means does not prohibit the use of a file which is permitted by the determining means.
The saving means saves, that is, stores temporarily a virus-infected file whose use is prohibited and virus information concerning the file in the inexecutable area. The reading means reads the saved information from the inexecutable area and outputs it as information used for virus analysis under the condition that permission information for permitting access to the inexecutable area is given.
On the other hand, the restoring means deletes a virus-infected file, which is registered in the infection management table means, from the disk, activates the file registering means, thus restores the file, and then registers the restored file on a disk.
As mentioned above, the storage device having the function of coping with a computer virus in accordance with the present invention is designed to actively prevent infection with a virus, prohibits the use of a virus-infected file and restores the virus-infected file automatically, and preserves information concerning infection with viruses so that the information cannot be accessed readily. Consequently, a storage device capable of properly dealing with infection with a virus can be constructed.
BRIEF DESCRIPTION OF THE DRAWINGS
The above objects and features of the present invention will be more apparent from the following description of some preferred embodiments with reference to the accompanying drawings, wherein:
FIG. 1 (PRIOR ART) is a block diagram showing the configuration of a typical storage device;
FIG. 2 is a block diagram showing the configuration of an embodiment based on the basic principles of the present invention;
FIG. 3 is a block diagram showing the configuration of the first preferred embodiment of the present invention;
FIG. 4 is a block diagram showing the details of an inexecutable area in FIG. 3;
FIG. 5 is a block diagram showing the configuration of the second preferred embodiment of the present invention;
FIG. 6 is a block diagram showing the configuration of the third preferred embodiment of the present invention;
FIG. 7 is a block diagram showing the configuration of the fourth preferred embodiment of the present invention;
FIG. 8 is a block diagram showing the configuration of the fifth preferred embodiment of the present invention;
FIG. 9 is a block diagram showing the configuration of the sixth preferred embodiment of the present invention;
FIG. 10 is a block diagram for explaining a procedure of file production in accordance with the present invention;
FIG. 11 is a block diagram for explaining a procedure of file storage in accordance with the present invention;
FIG. 12 is a block diagram showing the details of a conversion table in a ROM in accordance with the present invention;
FIG. 13 is a block diagram showing an example of a data structure for a file information management file in accordance with the present invention;
FIG. 14 is a flowchart for explaining the first example of a processing flow to be executed by an embodiment of the present invention;
FIG. 15 is a flowchart for explaining the second example of a processing flow to be executed by an embodiment of the present invention;
FIG. 16 is a flowchart for explaining the third example of a processing flow to be executed by an embodiment of the present invention;
FIG. 17 is a flowchart for explaining the fourth example of a processing flow to be executed by an embodiment of the present invention;
FIG. 18 is a flowchart for explaining the fourth example of a processing flow to be executed by an embodiment of the present invention;
FIG. 19 is a flowchart for explaining the fifth example of a processing flow to be executed by an embodiment of the present invention;
FIG. 20 is a flowchart for explaining the sixth example of a processing flow to be executed by an embodiment of the present invention;
FIG. 21 is a flowchart for explaining the seventh example of a processing flow to be executed by an embodiment of the present invention;
FIG. 22 is a flowchart for explaining the eighth example of a processing flow to be executed by an embodiment of the present invention;
FIG. 23 is a flowchart for explaining the ninth example of a processing flow to be executed by an embodiment of the present invention;
FIG. 24 is a block diagram for explaining the first example of an anti-virus operation in the embodiment shown in FIG. 2;
FIG. 25 is a block diagram for explaining the second example of the anti-virus operation in the embodiment shown in FIG. 2;
FIG. 26 is a block diagram for explaining the third example of the anti-virus operation in the embodiment shown in FIG. 2;
FIG. 27 is a block diagram for explaining the fourth example of the anti-virus operation in the embodiment shown in FIG. 2;
FIG. 28 is a block diagram for explaining the fifth example of the anti-virus operation in the embodiment shown in FIG. 2;
FIG. 29 is a block diagram for explaining the sixth example of the anti-virus operation in the embodiment shown in FIG. 2; and
FIG. 30 is a block diagram for explaining the seventh example of the anti-virus operation in the embodiment shown in FIG. 2.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
Hereinafter, the description of some preferred embodiments according to the present invention will be given with reference to the accompanying drawings.
FIG. 2 is a block diagram showing the configuration of an embodiment based on the basic principles of the present invention.
In the drawing, reference numeral 1 denotes a storage device having the function of coping with a computer virus in accordance with the present invention. Reference numeral 2 denotes a data processing unit for executing data processing using a file stored in the storage device 1 having the function of coping with a computer virus.
The storage device 1 having the function of coping with a computer virus comprises a disk 10, first managing means 11, second managing means 12, file registering means 13, generating means 14, virus checker 15, infection management table means 16, table registering means 17, judging means 18, prohibiting means 19, determining means 20, restoring means 21, invalidating means 22, writing means 23, permitting means 24, inexecutable area 25, saving means 26, and reading means 27. Herein, the virus checker 15 may be expanded in the data processing unit 2.
The disk 10 stores files. The first managing means 11 manages original information of the files stored on the disk 10 or manages original information of the virus checker 15. The second managing means 12 manages differential information brought about due to modification; that is, information concerning upgraded versions of the files stored on the disk, and history information concerning the differential information brought about due to modification, or manages differential information brought about due to modification concerning the virus checker 15; that is, information concerning an upgraded version of the virus checker 15, and history information concerning the differential information brought about due to modification.
The first managing means 11 may encode and manage the original information of the files and virus checker 15 so as to prevent the original information from being rewritten. The second managing means 12 may encode and manage the differential information brought about due to modification concerning the files and virus checker 15 so as to prevent the information from being rewritten. At this time, a decoding means for decoding the encoded data and an encoding means for executing inverse conversion that is inverse to conversion performed by the decoding means are included in the second managing means 12.
The file registering means 13 merges the original information of a file which is managed by the first managing means 11 with the differential information brought about due to modification concerning the file which is managed by the second managing means 12 so as to reproduce the file, and then stores the file on the disk 10. The generating means 14 merges the original information of the virus checker 15 which is managed by the first managing means 11 with the differential information brought about due to modification concerning the virus checker 15 which is managed by the second managing means 12 so as to reproduce the virus checker 15.
The virus checker 15 is activated at intervals of a specific period or activated in response to a command instruction, and detects whether a file stored on the disk 10 is infected with a virus. The infection management table means 16 is used to manage files stored on the disk and to see if the files are infected with viruses. The table registering means 17 registers data in the infection management table means 16. The judging means 18 references the infection management table means 16 in response to a use request made for a file stored on the disk 10 by the data processing unit 2, and judges if the file is infected with a virus. When the judging means 18 judges that a file is infected with a virus, the prohibiting means 19 prohibits the use of the file.
The determining means 20 determines through interactive processing whether the use of a file registered in the infection management table means 16 should be permitted. The restoring means 21 deletes a virus-infected file, which is registered in the infection management table means 16, from the disk 10, activates the file registering means 13, thus restores the file, and then registers the restored file on the disk 10. When a writing request is issued for a system startup area stored on the disk 10, the invalidating means 22 invalidates the writing request. The writing means 23 is prepared as a dedicated writing facility and executes writing for the system startup area stored on the disk 10.
The permitting means 24 determines through interactive processing whether a writing request made for an executable file stored on the disk should be permitted. The inexecutable area 25 is prepared as an area inaccessible with a normal access request. The saving means 26 saves a virus-infected file registered in the infection management table means 16 and virus information concerning the file in the inexecutable area 25. The reading means 27 reads information saved in the inexecutable area 25 under the condition that permission information for permitting access to the inexecutable area 25 is given.
In the embodiment of the present invention shown in FIG. 2, the table registering means 17 registers a virus-infected file detected by the virus checker 15 in the infection management table means 16.
Furthermore, when a writing request is issued for a system startup area stored on the disk 10, since a normal file will not issue such a writing request, the table registering means 17 judges that a file which is stored on the disk 10 and is a source of the writing request is infected with a virus, and registers the fact in the infection management table means 16. This is intended to treat new, malign, or unusual kinds of viruses that cannot be detected by the virus checker 15. When the writing request is issued, the invalidating means 22 invalidates the writing request. However, when the writing means 23 is included, if the writing request specifies the use of the writing means 23, the invalidating means 23 does not invalidate the writing request.
When a writing request is issued for an executable file stored on the disk 10, since a normal file will not issue such a writing request, the table registering means 17 judges that a file which is stored on the disk 10 and is a source of the writing request is infected with a virus, and registers the fact in the infection management table means 16. At this time, the permitting means 24 determines through interactive processing whether the writing request should be permitted. When the permitting means 24 permits the writing request, since the file is rewritten, the table registering means 17 judges that a file which is stored on the disk 10 and is a destination of the writing request is also infected with the virus, and registers the fact in the infection management table means 16.
Moreover, when the size of a file is varied by running the file, the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16.
Moreover, although a file stored on the disk is judged as an executable file in terms of the file name, if the file is declared to be a data file, the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16.
Moreover, as for a file which is stored on the disk 10, of which original information is not registered in the first managing means 11, and of which differential information brought about due to modification is not registered in the second managing means 12, the table registering means 17 judges that the file stored on the disk 10 is infected with a virus, and registers the fact in the infection management table means 16.
As mentioned above, when a virus-infected file is registered in the infection management table means 16, if the data processing unit 2 makes a use request for the file stored on the disk 10, the judging means 18 references the infection management table means 16 so as to judge if the file for which the use request is made is infected with a virus. On receipt of a result of the judgment, the prohibiting means 19 prohibits the use of the file that is judged to be infected with a virus by the judging means 18. At this time, the prohibiting means 19 does not prohibit the use of a file which is permitted by the determining means 20.
The saving means 26 saves the virus-infected file whose use is prohibited and virus information concerning the file in the inexecutable area 25 that cannot be accessed readily. The reading means 27 reads the saved information from the inexecutable area 25 under the condition that permission information for permitting access to the inexecutable area 25 is given, and outputs the read information as information used for virus analysis.
On the other hand, the restoring means 21 deletes a virus-infected file registered in the infection management table means 16 from the disk 10, activates the file registering means 13, thus restores the file, and registers the file on the disk 10.
As mentioned above, the storage device 1 having the function of coping with a computer virus shown in FIG. 2 is designed to actively prohibit infection with a virus, to prohibit the use of a file infected with a virus and restores the file automatically, and to preserve information concerning infection with viruses so that the information cannot be accessed readily. Thus, a storage device capable of properly dealing with infection with a virus can be constructed.
A storage device having the function of coping with a computer virus in accordance with the present invention will be described below in detail in conjunction with several preferred embodiments that are more practical than the basic embodiment shown in FIG. 2.
FIG. 3 shows the first preferred embodiment of the storage device 1 having the function of coping with a computer virus in accordance with the present invention.
The storage device 1 having the function of coping with a computer virus in this embodiment is connected to a personal computer 2a. The storage device 1 includes a disk 30 for storing files that are objects of access obtained by the personal computer 2a as well as a ROM 31 for storing firmware or the like that executes access processing or anti-virus processing, a CPU 32 for running firmware stored in the ROM 31 and executing data transfer to or from the personal computer 2a, and a RAM 33 prepared as a work area used by firmware that is run by the CPU 32, and thus has the capability of a CPU.
The storage device 1 further includes an original information management file 34 used to manage original information of files stored on the disk 30 and original information of a virus checker prepared for inspection of the files stored on the disk. A version update information management file 35 is used to manage differential information brought about due to modification concerning a file stored on the disk 30 and history information concerning the differential information brought about due to modification, and to manage differential information brought about due to modification concerning the virus checker and history information concerning the differential information brought about due to modification. A file information management file 36 is used to manage the information indicating if the files are stored on the disk, and is used to determine if the original information stored in the original information management file 34, and the differential information (brought about due to modification and which is stored in the version upgrade information management file 35) are infected with viruses. The information indicates if the files to be managed are executable files or data files, and if the files to be managed belong to a bootstrap or an initial program loader (IPL). An inexecutable area 37 which is prepared as an area that becomes accessible only when a password and ID number agree with internal data, and in which a file infected with a virus and virus information concerning the file are saved, has a data structure shown in FIG. 4. Herein, the reason why the version update information management file 35 manages history information is to make apparent which is the latest differential information brought about due to modification.
The inexecutable area 37 shown in FIG. 4 includes an infected-file storage area that is a storage area in which files infected with viruses are stored, and a virus information storage area that is a storage area in which virus information of the viruses is stored. Furthermore, the virus information storage area contains detailed information; such as, names of infected files that are infected with viruses, storage locations of the infected files, sizes of the storage locations of the infected files, sizes of virus information, name of viruses, and the information indicating if the viruses are of a system area infection type or a file infection type, and the information indicating if the viruses are of a file destruction type or the like.
Further included is a controller 38 for accessing a file stored on the disk, accessing original information managed in the original information management file 34, accessing the differential information brought about due to modification and history information which are managed in the version upgrade information management file 35, or accessing information saved in the inexecutable area 37.
Herein, the original information management file 34 and version upgrade information management file 35 are not designed to enable management of original information and differential information brought about due to modification from the viewpoint of a mere difference but may be designed to enable management of original information and differential information brought about due to modification on the basis of a relationship of succession including a parent-child relationship.
In the first preferred embodiment shown in FIG. 3, the storage device 1 having the function of coping with a computer virus is connected to the personal computer 2a. Aside from this, like the second preferred embodiment shown in FIG. 5, the storage device 1 may be connected over a LAN. In the embodiment shown in FIG. 3, the original information management file 34 and version upgrade information management file 35 are separate files. In the third preferred embodiment shown in FIG. 6 and the fourth preferred embodiment shown in FIG. 7, the original information management file and version upgrade information management file may be formed with one file. This kind of file is realized in the form of an original information/version upgrade information management file 34/35 shown in FIGS. 6 and 7. In the embodiment shown in FIG. 7, a personal computer and a storage device having the function of coping with a computer virus are united by combining the configurations shown in FIGS. 5 and 6. The embodiment shown in FIG. 3 has the configuration in which the storage device 1 having the function of coping with a computer virus is installed outside the personal computer 2a. Alternatively, like the fifth preferred embodiment shown in FIG. 8 and the sixth preferred embodiment shown in FIG. 9, the storage device may be installed inside the personal computer 2a. To be more specific, in the embodiment shown in FIG. 8, the original information management file 34 and version upgrade information management file 35 are separate files. In the embodiment shown in FIG. 9, both the files are formed with one file.
The storage device 1 having the function of coping with a computer virus in accordance with the present invention has, as mentioned above, the configuration including the original information management file 34 and version upgrade information management file 35.
The foregoing configuration is adopted for the following reasons: original information of a file stored on the disk 30 is stored in the original information management file 34; when the file is upgraded into a new version, differential information brought about due to modification concerning the upgraded version and history information concerning the differential information brought about due to modification are stored in the version upgrade information management file 35; and in case a file stored on the disk 30 is infected with a virus, the file can be restored by merging the original information of the file with differential information brought about due to modification. Moreover, since original information of a file and differential information brought about due to modification concerning the file are not expanded on the disk 30, it can be prevented that these kinds of information are infected with a virus.
A virus checker prepared for inspection of a file stored on a disk also has the possibility of being upgraded into a new version. The original information of the virus checker is stored in the original information management file 34. Differential information brought about due to modification concerning the upgraded version and history information concerning the differential information brought about due to modification are stored in the version upgrade information management file 35. Thus, the virus checker is managed.
Incidentally, when the original information management file 34 and version upgrade information management file 35 are constructed on the same medium, original information of files and a virus checker, differential information brought about due to modification concerning the files and virus checker, and history information concerning the differential information brought about due to modification can be managed totally. This is convenient in practice. In addition, the disk 30 and inexecutable area 37 may be constructed on the medium.
Original information of files and a virus checker which is stored in the original information management file 34, and differential information brought about due to modification concerning the files and virus checker and history information concerning the differential information brought about due to modification which are stored in the version upgrade information management file 35 must not be rewritten by the personal computer 2a.
The storage device 1 having the function of coping with a computer virus has the configuration in which original information 34a of files and a virus checker which is stored in the original information management file 34, and differential information brought about due to modification concerning the files and virus checker and history information concerning the differential information brought about due to modification which are stored in the version upgrade information management file 35 are encoded, and in which a decoding mechanism for decoding encoded data is made ready. As shown in FIG. 10, the original information of a file or virus checker decoded by the decoding mechanism is merged with the differential information brought about due to modification concerning the file or virus checker which is decoded by the decoding mechanism in order to reproduce the file or virus checker. Moreover, an encoding mechanism for executing inverse conversion that is inverse to conversion performed by the decoding mechanism is made ready. As shown in FIG. 11, the original information of files and a virus checker which is encoded by the encoding mechanism is stored in the original information management file 34. The differential information brought about due to modification and history information 35a concerning the files and virus checker which are encoded by the encoding mechanism are stored in the version upgrade information management file 35.
More particularly, the encoding mechanism and decoding mechanism are realized by firmware stored in an area 312, which is reserved in order to store firmware, in the ROM 31 in the storage device 1 having the function of coping with a computer virus. For realizing the mechanisms, as shown in FIG. 12, a conversion table 310 is used to encode original information, differential information brought about due to modification, and history information, and a conversion table 311 is used to decode the original information, differential information brought about due to modification, and history information which are encoded are stored in the ROM 31.
Furthermore, the storage device 1 having the function of coping with a computer virus in accordance with the present invention includes the file information management file 36 as mentioned above.
The file information management file 36 manages the information indicating if files stored on the disk 30, original information stored in the original information management file 34, and differential information brought about due to modification which is stored in the version upgrade information management file 35 are infected with viruses, the information indicating if these files to be managed are executable files or data files, and the information indicating that the files to be managed belong to a bootstrap or an IPL.
FIG. 13 shows an example of a data structure for the file information management file 36. The example shown in FIG. 13 is devised on the assumption that a file which is stored on the disk and writes a bootstrap or an IPL is judged to be infected with a virus, and that a file which is stored on the disk and writes an executable file is judged to be infected with a virus. This is attributable to the fact that a normal file will not perform the former writing and will not in general perform the latter writing, either.
Specifically, the file information management file 36 manages, as shown in FIG. 13, file names of files to be managed, addresses of the files, execution/data type flags indicating whether the files are executable files or data files, and starting portion flags indicating if the files belong to a bootstrap or an IPL. File information management file 36 also manages: infection flags <1> indicating if it is detected by a virus checker that the files are infected with viruses, infection flags <2> indicating if it is judged according to whether or not writing the bootstrap or IPL is attempted that the files are infected with viruses, infection flags <3> indicating if it is judged according to whether or not writing an executable file is attempted that the files are infected with a virus, infection flags <4> indicating if original information stored in the original information management file 34 is infected with a virus, and infection flags <5> indicating if differential information brought about due to modification which is stored in the version upgrade information management file 35 is infected with a virus. Thus, the aforesaid information is managed. Whether or not original information stored in the original information management file 34 is infected with a virus and whether or not differential information brought about due to modification which is stored in the version upgrade information management file 35 is infected with a virus is judged by the virus checker or according to whether writing the bootstrap, the IPL, or an executable file is attempted.
Herein, in the storage area of an execution/date type flag, “1” is set relative to an executable file and “0” is set relative to a data file. In the storage area of a starting portion flag, “1” is set in case a file belongs to a bootstrap or IPL, and “0” is set in any other case. In the storage area of infection flag <1> or <2>, “1” is set when infection with a virus is detected, and “0” is set when infection with a virus it not detected. In the storage area of infection flag <3>, “1” is set when infection with a virus is suspected, and “0” is set when infection with a virus is not suspected. In the storage area of infection flag <4> or <5>, “1” is set when infection with a virus is suspected, and “0” is set when infection with a virus is neither detected nor suspected.
FIGS. 14 to 23 describe some examples of processing flows executed by the storage device 1 having the function of coping with a computer virus which is configured as mentioned above. Next, operations performed by the storage device 1 having the function of coping with a computer virus in accordance with the present invention will be described in detail in conjunction with these examples of processing flows.
When activated, the storage device 1 having the function of coping with a computer virus initializes the infected-file storage area and virus information storage area (storage areas shown in FIG. 4) within the inexecutable area 37 (step S141). Thereafter, initialization is executed by registering an ID number and password needed to access the inexecutable area 37 (step S142).
On the other hand, for registering original information of a purchased file in the original information management file 34 or registering differential information brought about due to modification concerning the file in the version upgrade information management file 35, the storage device 1 having the function of coping with a computer virus merges original information of a virus checker which is stored in the original information management file 34 with the latest differential information brought about due to modification concerning the virus checker which is stored in the version upgrade information management file 35. Thus, the virus checker is reproduced and expanded in the RAM 33.
As shown in the second example of a processing flow in FIG. 15, the reproduced virus checker is used to check if a file registered (original information and differential information brought about due to modification) is infected with a virus (step S151). If it is judged that the file is infected with a virus, the infected file and virus information concerning the file are saved in the inexecutable area 37 (step S152). Use Prohibited Due To Infection With a Virus is reported to the personal computer 2a that is a source of registration (step S153).
By contrast, when it is judged that a file is not infected with a virus, the file is stored in the original information management file 34 and version upgrade information management file 35 which are destinations of registration. History information is created and stored in the version upgrade information management file 35 (step S154). The file (when a registered file contains differential information brought about due to modification, the file is a file created by merging the information with original information) is then expanded on the disk 30. At the same time, data is registered in the file information management file 36 (step S155).
As mentioned above, original information of a file which is not infected with a virus is registered in the original information management file 34. Differential information brought about due to modification concerning the file which is not infected with a virus is registered in the version upgrade information management file 35. A file that contains the original information merged with the differential information brought about due to modification and that is not infected with a virus is then expanded on the disk 30. Herein, the reason why the system is designed so that a virus checker is not stored on the disk 30 in advance but produced prior to checking on infection with a virus is to prevent the virus checker itself from being infected with a virus.
In the second example of a processing flow in FIG. 15, it is confirmed that original information of a file registered in the original information management file 34 is not infected with a virus, and it is also confirmed that differential information brought about due to modification concerning the file registered in the version upgrade information management file 35 is not infected with a virus. A file that is expanded on the disk 30 by merging original information with differential information brought about due to modification is checked by processing that will be described later in order to see if the file is infected with a virus. The confirmation is therefore not absolutely needed. In the description of the second example of a processing flow in FIG. 15, the storage device 1 having the function of coping with a computer virus actuates a virus checker. Alternatively, the system may be designed so that the personal computer 2a actuates the virus checker.
As mentioned above, in this embodiment of the present invention, it is judged that a file being stored on the disk 30 and attempting to write a bootstrap or an IPL is infected with a virus. This is attributable to the fact that a normal file will not perform such writing.
As described later, since the present invention adopts the system design of prohibiting a file infected with a virus from running, a file attempting to write a bootstrap or IPL is prohibited from running. This means that the bootstrap or IPL cannot be registered. In the present invention, therefore, when a specific command instructing registration of the bootstrap or IPL is issued, the registration is permitted.
As shown in the third example of a processing flow in FIG. 16, when a specific command instructing registration of a bootstrap of IPL is issued, the storage device 1 having the function of coping with a computer virus registers the bootstrap or IPL, for which a registration request has been made, in the original information management file 34 (step S161), and fetches the bootstrap or IPL into the RAM 33 and stores it on the disk 30 (step S162). Along with storage on the disk 30, “1” is set in the storage area of a starting portion flag in the file information management file 36. It is thus registered that a file stored is a bootstrap or IPL. “1” is set in the storage area of an execution/data type flag, whereby it is registered that the file stored is an executable file. Infection flags <1> to <5> are set to “0,” whereby it is registered that the file stored is not infected with a virus (step S163).
Next, virus-infected file detection to be executed by the storage device 1 having the function of coping with a computer virus will be described. The detection falls into two procedures; a procedure to be executed using a virus checker, and a procedure to be executed by judging the attribute of a writing-destination file. FIGS. 17 and 18 describe a processing flow of virus-infected file detection to be executed using a virus checker (first half and second half of the fourth example). FIG. 19 describes a processing flow (fifth example) of virus-infected file detection to be executed by judging the attribute of a writing-destination file.
For detecting a virus-infected file using a virus checker, the storage device 1 having the function of coping with a computer virus first waits, as described in the fourth example of a processing flow shown in FIGS. 17 and 18, for the start of a period of detecting a virus-infected file. When it is judged that the detecting period starts, control is passed to step S172. Original information of a virus checker which is stored in the original information management file 34 is merged with the latest differential information brought about due to modification concerning the virus checker which is stored in the version upgrade information management file 35 in order to produce the latest virus checker. The produced virus checker is expanded in the RAM 33.
Thereafter, one of the unprocessed files on the disk 30 is extracted at step S173. At step S174, the produced virus checker is used to check if the extracted file is infected with a virus. When it is judged by the checking that a file is infected with a virus, control is passed to step S175. “1” is recorded as infection flag <1> associated with the file in the file information management file 36, whereby it is registered that the file is infected with a virus. By contrast, when it is judged that the file is not infected with a virus, control is passed to step S176. “0” is recorded as infection flag <1>, whereby it is registered that the file is not infected with a virus.
At step S177, it is judged that all the files stored on the disk 30 have been processed. If it is judged that an unprocessed file is left, control is returned to step S173. If it is judged that no unprocessed file is left, control is passed to step S178. It is judged if a mode, in which original information stored in the original information management file 34 and differential information brought about due to modification which is stored in the version upgrade information management file 35 are also subjected to virus check, is designated. If the mode in which both the original information and differential information brought about due to modification are subjected to virus check is not designated, control is returned to step S171.
By contrast, if it is judged that the mode, in which both the original information stored in the original information management file 34 and the differential information brought about due to modification which is stored in the version upgrade information management file 35 are also subjected to virus check, is designated, control is passed to step S181 described in FIG. 18. One of the original information and differential information brought about due to modification is expanded in a work area in the RAM 33. At step S182, the produced virus checker is used to check if the file expanded in the work area is infected with a virus. The virus check for original information or differential information brought about due to modification is carried out in order to deal with emergence of a new kind of virus.
If it is judged by the virus check that the file is not infected with a virus, control is passed to step S183. “0” is recorded as infection flags <4> and <5> associated with the file in the file information management file 36. It is thus registered that the file is not infected with a virus. By contrast, when it is judged that the file is infected with a virus, control is passed to step S184. “1” is recorded as infection flags <4> and <5> associated with the file in the file information management file 36. It is thus registered that the original information is infected with a virus.
At step S185, it is judged if all original information and differential information brought about due to modification have been processed. If it is judged that an unprocessed file is left, control is returned to step S181. If it is judged that no unprocessed file is left, control is returned to step S171 in FIG. 17.
As mentioned above, the storage device 1 having the function of coping with a computer virus uses a virus checker to periodically check if files stored on the disk 30, original information stored in the original information management file 34, and differential information brought about due to modification which is stored in the version upgrade information management file 35 are infected with viruses. The results of the check are registered in the form of infection flags <1>, <4>, and <5> in the file information management file 36.
In the fourth example of a processing flow shown in FIGS. 17 and 18, a virus checker is activated at intervals of a specific period. Alternatively, the system may be designed so that the virus checker is activated in response to a command issued from the personal computer 2a. Moreover, in the fourth example of a processing flow in FIGS. 17 and 18, the storage device 1 having the function of coping with a computer virus actuates a virus checker. Alternatively, the system may be designed so that the personal computer 2a actuates the virus checker.
On the other hand, for detecting a virus-infected file by judging the attribute of a writing-destination file, when a writing request for a file stored on the disk 30 is issued from the personal computer 2a (the writing request is issued by a file loaded from the disk 30 to the personal computer 2a), as described in the fifth example of a processing flow in FIG. 19, the storage device 1 having the function of coping with a computer virus first references the value of a starting portion flag in the file information management file 36 so as to judge if the writing-destination file belongs to a bootstrap or IPL.
If it is judged by the judgment at step S191 that the writing-destination file belongs to the bootstrap or IPL, control is passed to step S192. It is then judged that the file having issued the writing request is infected with a virus. “1” is recorded as infection flag <2> associated with the file in the file information management file 36, whereby it is registered that the file is infected with a virus. At step S193, it is reported to the personal computer 2a that the file which made the writing request is a file infected with a virus. The processing is then terminated without writing.
By contrast, if it is judged at step S191 that the writing-destination file does not belong to the bootstrap or IPL, control is passed to step S194. The value of an execution/data type flag in the file information management file 36 is referenced in order to judge if the writing-destination file is an executable file or data file. If it is judged that the writing-destination file is a data file, writing is executed for the file at step S195. The processing is then terminated.
By contrast, if it is judged at step S194 that the writing-destination file is an executable file, it is judged that it is highly probable that the file having issued the writing request is infected with a virus. Control is then passed to step S196. While the fact is being reported, a message asking if writing should be executed is output to the personal computer 2a. A response to the inquiry is duly received.
If it is judged at step S196 that the response from the personal computer 2a instructs that writing should not be executed, control is passed to step S197. “1” is recorded as infection flag <3> associated with the file, which has issued the writing request, in the file information management file 36, whereby it is registered that the file is infected with a virus. The processing is then terminated.
Herein, even when a file that is a source of a writing request writes itself, “1” is recorded as infection flag <3> associated with the file in the file information management file 36. This is attributable not only to the fact that it is highly probable that a file attempting to write an executable file is infected with a virus, but also to the system design of the present invention that upgrading a file into a new version is realized by registering differential information brought about due to modification in the version upgrade information management file 35 and that upgrading a file into a new version without following this procedure is illegal.
By the way, if it is judged at step S196 that a response from the personal computer 2a instructs that writing should be executed, although it is highly probable that the file that is a source of the writing request is infected with a virus, it is instructed to ignore the probability. Control is therefore passed to step S198. Writing is executed for the writing-destination file. At step S199, “1” is recorded as infection flags <3> associated with the writing-source and writing-destination files in the file information management file 36, whereby it is registered that the files are infected with a virus. The processing is then terminated.
As mentioned above, when a writing request is issued for a file stored on the disk 30, if the writing-destination file belongs to a bootstrap or IPL, or if the writing-destination file is an executable file, the storage device 1 having the function of coping with a computer virus judges that a file which is a source of the writing request is infected with a virus. The fact is registered in the form of infection flags <2> and <3> in the file information management file 36. If the writing-destination file belongs to the bootstrap or IPL, executing writing is disabled. If the writing-destination file is an executable file, it is determined through interactive processing if writing should be executed for the file. When writing is executed, it is judged that the writing-destination file will also be infected with a virus. The fact is registered in the form of infection flag <3> in the file information management file 36.
Next, processing to be executed for a virus-infected file by the storage device 1 having the function of coping with a computer virus will be described.
When receiving a loading request made for a file (executable file) stored on the disk 30 from the personal computer 2a, as described in the sixth example of a processing flow in FIG. 20, the storage device 1 having the function of coping with a computer virus references infection flags <1>, <2>, and <3> in the file information management file 36 (step S201) so as to check if the file for which the loading request is made is infected with a virus. When it is judged that the file is not infected with a virus, the file is loaded into the personal computer 2a. Running the file is thus instructed (step S202). By contrast, when it is judged that the file is infected with a virus, loading the file is rejected (step S203). Running the file is thus prevented.
As mentioned above, the storage device 1 having the function of coping with a computer virus gives control so that a virus-infected file registered in the file information management file 36 will not be run. Consequently, a file that is detected to be infected with a virus by a virus checker will never be run. A file that has evaded checking by the virus checker and that is detected to be infected with a virus in terms of the attribute of a writing-destination file will not be rerun. Thus, proliferation of the virus can be reliably prevented.
In the sixth example of a processing flow in FIG. 20, running a file infected with a virus is rejected without exception. However, a program may be produced to have a pattern resembling the pattern of a virus, and a virus checker may make a mistake in checking. The system may therefore be designed so that it is determined through interaction with the personal computer 2a whether the run rejection should be lifted.
On the other hand, when a command instructing restoration of a virus-infected file stored on the disk 30 is issued from the personal computer 2a, as described in the seventh example of a processing flow in FIG. 21, the storage device 1 having the function of coping with a computer virus first references infection flags <1>, <2>, and <3> in the file information management file 36, extracts one file infected with a virus, and deletes the file from the disk 30 at step S211. At step S212, the data of the deleted file is deleted from the file information management file 36.
At step S213, infection flag <4> in the file information management file 36 is referenced, and original information of the deleted file, which is not infected with a virus, is read from the original information management file 34. Infection flag <5> in the file information management file 36 is referenced, and the latest differential information brought about due to modification concerning the deleted file, which is not infected with a virus, is read from the original information management file 34. The original information is then merged with the differential information brought about due to modification in order to restore the deleted file. The restored file is then expanded on the disk 30. At step S214, data of the restored file is registered in the file information management file 36. At step S215, it is judged if an unprocessed virus-infected file is left. If no unprocessed file is left, the processing is terminated. If an unprocessed file is left, control is returned to step S211.
As mentioned above, the storage device 1 having the function of coping with a computer virus deletes a file infected with a virus from the disk 30. Original information of the file and differential information brought about due to modification are used to restore the infected file into an uninfected one. The file not infected with a virus is then expanded on the disk 30.
In the seventh example of a processing flow in FIG. 21, when a restoration command is issued for a virus-infected file from the personal computer 2a, restoring the virus-infected file is executed. Alternatively, the system may be designed so that restoration is executed at intervals of a specific period. Restoring the virus-infected file may thus be executed. When this system design is adopted, a file infected with a virus can be restored autonomously irrespective of the personal computer 2a. In the seventh example of a processing flow in FIG. 21, the latest differential information brought about due to modification which is not infected with a virus is used to restore a file infected with a virus into the latest one. Alternatively, the system may be designed so that differential information brought about due to modification which is identified by an instruction sent from the personal computer 2a and pointed out by history information is used for restoration.
When the seventh example of a processing flow in FIG. 21 is employed, the storage device 1 having the function of coping with a computer virus executes the processing of restoring a file infected with a virus into an uninfected file. At this time, as described in the eighth example of a processing flow in FIG. 22, the file infected with a virus and virus information concerning the file-infected file may be saved in the inexecutable area 37.
Specifically, according to the eighth example of a processing flow in FIG. 22, when a command instructing restoration of a virus-infected file stored on the disk 30 is issued from the personal computer 2a, the storage device 1 having the function of coping with a computer virus first references infection flags <1>, <2>, and <3> in the file information management file 36 and extracts one file infected with a virus at step S221. At step S222, a virus checker expanded in advance is used to specify virus information concerning the extracted virus-infected file. At step S223, the extracted virus-infected file and virus information specified at step S223 are saved in the inexecutable area 37. At step S224, the extracted virus-infected file is deleted from the disk 30.
At step S225, data of the deleted file is deleted from the file information management file 36. At step S226, infection flag <4> in the file information management file 36 is referenced, and original information of the deleted file which is not infected with a virus is read from the original information management file 34. Infection flag <5> in the file information management file 36 is referenced, and the latest differential information brought about due to modification concerning the deleted file which is not infected with a virus is read from the original information management file 34. The original information is then merged with the differential information brought about due to modification in order to restore the deleted file. The restored file is then expanded on the disk 30. At step S227, data of the restored file is registered in the file information management file 36. At step S228, it is judged if an unprocessed virus-infected file is left. If no unprocessed file is left, the processing is terminated. If an unprocessed file is left, control is returned to step S221.
As mentioned above, the storage device 1 having the function of coping with a computer virus deletes a file infected with a virus from the disk 30, restores the file into an uninfected one that is not infected with a virus using original information and differential information brought about due to modification concerning the file, and expands the restored file on the disk 30. At this time, the file infected with a virus and virus information concerning the file are saved in the inexecutable area 37.
The virus-infected file and virus information concerning the file, which are saved in the inexecutable area 37, become very useful information for analysis of an intruding virus. However, if anybody is allowed to access this kind of useful information, there arises a fear that the information may be rewritten by mistake.
When a command instructing reading of saved information from the inexecutable area 37 is issued from the personal computer 2a, as describe in the ninth example of a processing flow in FIG. 23, the storage device 1 having the function of coping with a computer virus first requests entry of an ID number and password which have been registered according to the processing flow (first example) described in FIG. 14 (step S231), and collates the ID number and password entered in response to the request with those registered according to the processing flow in FIG. 14 to see if they agree with each other (step S232). Under the condition that they agree with each other, a virus-infected file and virus information which are saved in the inexecutable area 37 are read and output to the personal computer 2a (step S233). When a deletion request is issued for the extracted virus-infected file and virus information from the personal computer 2a (step S234), deletion is executed (step S235).
As mentioned above, the storage device 1 having the function of coping with a computer virus reads a virus-infected file and virus information, which are saved in the inexecutable area 37, under the condition that an ID number and password agree with internal data.
In the ninth example of a processing flow in FIG. 23, when a Read command is issued for the inexecutable area 37 from the personal computer 2a, saved information is read from the inexecutable area 37. Alternatively, the system may be designed so that the saved information is read from the inexecutable area 37 by executing reading at intervals of a specific period. For further improving security, an encoding mechanism for converting a virus-infected file and virus information, which are saved in the inexecutable area 37, into encoded data may be prepared. The encoded data produced by the encoding mechanism is then stored in the inexecutable area 37. In addition, a decoding mechanism for executing inverse conversion that is inverse to the conversion performed by the encoding mechanism may be prepared. In this case, the virus-infected file and virus information which are saved in the inexecutable area 37 are read using the decoding mechanism.
FIGS. 24 to 30 are block diagrams for explaining several examples (first to seventh examples) of an anti-virus operation performed in the basic embodiment shown in FIG. 2.
In the storage device 1 having the function of coping with a computer virus in accordance with the present invention shown in FIG. 2, as shown in FIG. 24 for explaining the first example of an anti-virus operation, a virus checker 40 (which may be run by the personal computer 2a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is received and registered in the file information management file 36. Thus, the file information management file 36 is used to manage the information indicating if files expanded on the disk 30 are infected with viruses. Furthermore, as shown in FIG. 25 for explaining the second example of an anti-virus operation, when a use request is made for a file expanded on the disk 30 via the personal computer 2a, the file information management file 36 is referenced to judge if the file for which the use request is made is infected with a virus. If the file is infected with a virus, the use of the file is prohibited. Thus, proliferation of the virus is prevented.
In FIGS. 24 and 25, reference numeral 41 denotes a management file registering/referencing mechanism for registering data in the file information management file 36 and referencing the file information management file 36 for data. When the system is designed so that the virus checker 40 is run by the storage device 1 having the function of coping with a computer virus, checking on an infection with a virus can be executed concurrently with an operation of the personal computer 2a. Moreover, checking on an infection with a virus can be executed at night or the like. In case the virus checker 40 is run by the personal computer 2a, the virus checker 40 may not be loaded from the storage device 1 having the function of coping with a computer virus but may be prepared separately. Alphanumeric characters in parentheses (1A) to (5A) in FIGS. 24 and (1B) to (3B), (3B)′, (4B), and (5B) in FIG. 25 denote processing orders.
The storage device 1 having the function of coping with a computer virus in accordance with the present invention, which has the configuration shown in FIG. 2, includes, as shown in FIG. 26 for explaining the third example of an anti-virus operation, an original information management file 34 for encoding and managing original information of files, a version upgrade information management file 35 for encoding and managing differential information brought about due to modification concerning the files, a file generating mechanism 42 for decoding and merging encoded data of original information and differential information brought about due to modification so as to generate a file, and a deleting mechanism 43 for deleting a file from the disk 30. When it is judged that a file for which a use request is made is infected with a virus, the deleting mechanism 43 is used to delete the virus-infected file from the disk 30. The file generating mechanism 42 is used to restore the virus-infected file into an uninfected one that is not infected with a virus and expand the file on the disk 30. The system can therefore be operated by performing a minimum scale of installation. In the drawing, alphanumeric characters in parentheses (1C) to (14C) denote processing orders.
Moreover, the storage device 1 having the function of coping with a computer virus in accordance with the present invention, which has the configuration shown in FIG. 2, includes, as shown in FIG. 27 for explaining the fourth example of an anti-virus operation, a timer 44 for issuing a virus check instruction periodically (which may be incorporated in the personal computer 2a as shown in FIG. 28 for explaining the fifth example of an anti-virus operation). Furthermore, encoded data of original information of the virus checker 40 is stored in the original information management file 34. Encoded data of differential information brought about due to modification concerning the virus checker 40 is stored in the version upgrade information management file 35. When the timer 44 issues an instruction for a virus check, the file generating mechanism 42 generates the virus checker 40. The thus-generated virus checker 40 (that may be run by the personal computer 2a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk is infected with a virus. The result of the checking is registered in the file information management file 36. Thus, the virus checker 40 is protected from being infected with a virus, and intrusion of the virus is prevented. Alphanumeric characters in parentheses (1D) to (3D), (3E), (4D), and (5D) in FIGS. 27 and (1F), (2F), (2F)′, (3F) to (5F) in FIG. 28 denote processing orders.
The storage device 1 having the function of coping with a computer virus in accordance with the present invention, which has the configuration shown in FIG. 2, includes, as shown in FIG. 29 for explaining the sixth example of an anti-virus operation, a virus check starting mechanism 45 for issuing an instruction of virus check in response to an instruction sent from the personal computer 2a. Furthermore, encoded data of original information of the virus checker 40 is stored in the original information management file 34. Encoded data of differential information brought about due to modification concerning the virus checker 40 is stored in the version upgrade information management file 35. When the virus check starting mechanism 45 issues an instruction of virus check, the file generating mechanism 42 generates the virus checker 40. The thus-generated virus checker 40 (that may be run by the personal computer 2a or storage device 1 having the function of coping with a computer virus) checks if a file expanded on the disk 30 is infected with a virus. The result of the checking is registered in the file information management file 36. Thus, the virus checker 40 is protected from being infected with a virus, and intrusion of the virus is prevented. Alphanumeric characters (1G) to (3G), (3G)′, (4G) to (6G) in the drawing denote processing orders.
Moreover, the storage device 1 having the function of coping with a computer virus in accordance with the present invention, which has the configuration shown in FIG. 2, includes, as shown in FIG. 30 for explaining the seventh example of an anti-virus operation, a dedicated system writing mechanism 46 for writing a bootstrap or IPL on the disk 30. When the system writing mechanism 46 is used to run a program, writing the bootstrap or IPL on the disk 30 is permitted. This is intended to guarantee normal writing as an exception to the rule that a file attempting to write the bootstrap or IPL on the disk 30 is judged to be infected with a virus and that executing the file is prohibited.
In the aforesaid examples shown in FIGS. 24 to 30, a file infected with a virus is detected by the virus checker 40. In addition, a file attempting to write a bootstrap or IPL or an executable file is judged to be infected with a virus. Aside from this, if the criteria described below are added, infection with a virus can be prevented more reliably. That is to say, when the size of a file is varied by running the file, the file stored on the disk 30 is judged to be infected with a virus (for example, judged periodically). Although a file stored on the disk 30 is judged to be an executable file in terms of the fine name, if the file is declared to be a data file in the file information management file 36, the file stored on the disk 30 is judged to be infected with a virus (for example, judged at the start of processing). Although a file is stored on the disk 30, if original information is not registered in the original information management file 36 and differential information brought about due to modification is not registered in the version upgrade information management file 37, the file stored on the disk 30 is judged to be infected with a virus (judged periodically or at the time of access to the file).
Checking if the size of a file is varied by running the file is achieved by, for example, merging original information managed in the original information management file 34 with differential information brought about due to modification which is managed in the version upgrade information management file 35 in order to produce a file, and by comparing the size of the produced file with the size of the file stored on the disk 30.
As described so far, in several preferred embodiments of a storage device 1 having the function of coping with a computer virus in accordance with the present invention, infection with a virus is prevented actively. The use of a file infected with a virus is prohibited, and the file is restored automatically. Furthermore, information concerning infection with viruses is preserved so that it cannot be accessed readily. Consequently, a storage device capable of properly dealing with infection with a virus can be constructed.

Claims (70)

We claim:
1. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit; and
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus.
2. A storage device having the function of coping with a computer virus according to claim 1, wherein said virus checker is designed to be run by said storage device having the function of coping with a computer virus.
3. A storage device having the function of coping with a computer virus according to claim 2, wherein said virus checker is designed to be activated at intervals of a specific period.
4. A storage device having the function of coping with a computer virus according to claim 2, wherein said virus checker is designed to be activated in response to a command instruction.
5. A storage device having the function of coping with a computer virus according to claim 2, wherein when a writing request is issued for a system startup area stored on said disk, said table registering unit judges that a file which is stored on said disk and is a source of the writing request is infected with a virus, and registers the fact in said infection management table unit.
6. A storage device having the function of coping with a computer virus according to claim 5, further comprising an invalidating unit that when a writing request is issued for a system startup area stored on said disk, invalidates the writing request.
7. A storage device having the function of coping with a computer virus according to claim 5, further comprising a determining unit for determining through interactive processing whether the use of a virus-infected file that is registered in said infection management table unit should be permitted, wherein said prohibiting unit does not prohibit the use of a file which is permitted by said determining unit.
8. A storage device having the function of coping with a computer virus according to claim 5, further comprising a first managing unit for managing original information of files stored on said disk, a second managing unit for managing differential information brought about due to modification concerning the files stored on said disk and history information concerning the differential information brought about due to modification, and a file registering unit for merging original information of a file managed by said first managing unit with differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk.
9. A storage device having the function of coping with a computer virus according to claim 5, further comprising a saving unit for saving a virus-infected file that is registered in said infection management table unit and virus information concerning the file in an inexecutable area, and a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given.
10. A storage device having the function of coping with a computer virus according to claim 2, when a writing request is issued for an executable file stored on said disk, said table registering unit judges that a file which is stored on said disk and is a source of the writing request is infected with a virus, and registers the fact in said infection management table unit.
11. A storage device having the function of coping with a computer virus according to claim 2, wherein when the size of a file is varied by running the file, said table registering unit judges that the file, said table registering unit judges that the file stored on said disk is infected with a virus, and registers the fact in said infection management table unit.
12. A storage device having the function of coping with a computer virus according to claim 2, wherein although a file stored on said disk is judged to be an executable file in terms of the file name, if the file is declared to be a data file, said table registering unit judges that the file stored on said disk is infected with a virus, and registers the fact in said infection management table unit.
13. A storage device having the function of coping with a computer virus according to claim 2, further comprising a determining unit for determining through interactive processing whether the use of a virus-infected file that is registered in said infection management table unit should be permitted, wherein said prohibiting unit does not prohibit the use of a file which is permitted by said determining unit.
14. A storage device having the function of coping with a computer virus according to claim 25, further comprising an invalidating unit that when a writing request is issued for a system startup area stored on said disk, invalidates the writing request.
15. A storage device having the function of coping with a computer virus according to claim 14, further comprising a dedicated writing unit for executing writing for a system startup area stored on said disk, wherein when a writing request is issued for the system startup area stored on said disk, if the writing request specifies the use of said writing unit, said invalidating unit does not invalidate the writing request.
16. A storage device having the function of coping with a computer virus according to claim 2, further comprising a first managing unit for managing original information of files stored on said disk, a second managing unit for managing differential information brought about due to modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification, and file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk.
17. A storage device having the function of coping with a computer virus according to claim 2, further comprising a saving unit for saving a virus-infected file that is registered in said infection management table unit and virus information concerning the file in an inexecutable area, and a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given.
18. A storage device having the function of coping with a computer virus according to claim 26, further comprising a permitting unit for determining through interactive processing whether a writing request made for a file, which is registered as a virus-infected file by said table registering unit and is running, should be permitted.
19. A storage device having the function of coping with a computer virus according to claim 18, wherein when a writing request is permitted by said permitting unit, if a file that is a destination of the writing request is rewritten, said table registering unit judges that the file which is stored on said disk and is the destination of the writing request is infected with a virus and registers the fact in said infection management table unit.
20. A storage device having the function of coping with a computer virus according to claim 18, further comprising a determining unit for determining through interactive processing whether the use of a virus-infected file that is registered in said infection management table unit should be permitted, wherein said prohibiting unit does not prohibit the use of a file which is permitted by said determining unit.
21. A storage device having the function of coping with a computer virus according to claim 18, further comprising a first managing unit for managing original information of files stored on said disk, a second managing unit for managing differential information brought about due to modification concerning the files stored on said disk and history information concerning the differential information brought about due to modification, and a file registering unit for merging original information of a file managed by said first managing unit with differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk.
22. A storage device having the function of coping with a computer virus according to claim 18, further comprising a saving unit for saving a virus-infected file that is registered in said infection management table unit and virus information concerning the file in an inexecutable area, and a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given.
23. A storage device having the function of coping with a computer virus according to claim 1, wherein said virus checker is designed to be activated at intervals of a specific period.
24. A storage device having the function of coping with a computer virus according to claim 1, wherein said virus checker is designed to be activated in response to a command instruction.
25. A storage device having the function of coping with a computer virus according to claim 1, wherein when a writing request is issued for a system startup area stored on said disk, said table registering unit judges that a file which is stored on said disk and is a source of the writing request is infected with a virus, and registers the fact in said infection management table unit.
26. A storage device having the function of coping with a computer virus according to claim 1, wherein when a writing request is issued for an executable file stored on said disk, said table registering unit judges that a file which is stored on said disk and is a source of the writing request is infected with a virus, and registers the fact in said infection management table unit.
27. A storage device, having the function of coping with a computer virus according to claim 1, wherein when the size of a file is varied by running the file, said table registering unit judges that the file stored on said disk is infected with a virus, and registers the fact in said infection management table unit.
28. A storage device having the function of coping with a computer virus according to claim 1, wherein although a file stored on said disk is judged to be an declared to be a data file, said table registering unit judges that the file stored on said disk is infected with a virus, and registers the fact in said infection management table unit.
29. A storage device having the function of coping with a computer virus according to claim 1, further comprising a determining unit for determining through interactive processing whether the use of a virus-infected file that is registered in said infection management table unit should be permitted, wherein said prohibiting unit does not prohibit the use of a file which is permitted by said determining unit.
30. A storage device having the function of coping with a computer virus according to claim 1, further comprising:
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein said first managing unit manages original information that is confirmed not to be infected with a virus by said virus checker, and said second managing unit manages differential information brought about due to modification which is confirmed not to be infected with a virus by said virus checker.
31. A storage device having the function of coping with a computer virus according to claim 1, further comprising:
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein as for a file which is stored on said disk, of which original information is not registered in said first managing unit, and of which differential information brought about due to modification is not registered in said second managing unit, said table registering unit judges that the file stored on said disk is infected with a virus and registers the fact in said infection management table unit.
32. A storage device having the function of coping with a computer virus according to claim 1, further comprising:
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein said first managing unit manages original information of said virus checker, and said second managing unit manages differential information brought about due to modification concerning said virus checker and history information concerning the differential information brought about due to modification.
33. A storage device having the function of coping with a computer virus according to claim 32, wherein said generating unit generates said virus checker at the time of running said virus checker.
34. A storage device having the function of coping with a computer virus according to claim 1, further comprising:
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein said first managing unit encodes and manages original information, and said second managing unit encodes and manages differential information brought about due to modification, further comprising a decoding unit for decoding encoded data managed by said first and second managing unit, and an encoding unit for executing inverse conversion that is inverse to conversion performed by said decoding unit.
35. A storage device having the function of coping with a computer virus according to claim 1, further comprising:
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification;
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk; and
a saving unit for saving a virus-infected file that is registered in said infection management table unit and virus information concerning the file in an executable area, and a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given.
36. A storage device having the function of coping with a computer virus according to claim 1, further comprising:
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification;
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk; and
a restoring unit for deleting a virus-infected file, which is registered in said infection management table unit, from said disk, activating said file registering unit, thus restoring the file, and then registering the restored file on said disk,
wherein said first managing unit encodes and manages original information, and said second managing unit encodes and manages original information, and said second managing unit encodes and manages differential information brought about due to modification, further comprising a decoding unit for decoding encoded data managed by said first and second managing units, and an encoding unit for executing inverse conversion that is inverse to conversion performed by said decoding unit.
37. A storage device having the function of coping with a computer virus according to claim 1, further comprising:
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification;
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk;
a restoring unit for deleting a virus-infected file, which is registered in said infection management table unit, from said disk, activating said file registering unit, thus restoring the file, and then registering the restored file on said disk; and
a saving unit for saving a virus-infected file that is registered in said infection management table unit and virus information concerning the file in an inexecutable area, and a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given.
38. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit used to manage files stored on said disk to see if the files are infected with viruses;
a table registering unit for receiving a result of detection from a virus checker for detecting if a file stored on said disk is infected with a virus, and for registering the result in said infection management table unit;
a judging unit that, when a use request is made externally for a file stored on said disk, references said infection management table unit so as to judge if the file is infected with a virus;
a prohibiting unit that, when said judging unit judges that a file is infected with a virus, prohibits the use of the file, wherein when a writing request is issued for a system startup area stored on said disk, said table registering unit judges that a file which is stored on said disk and is a source of the writing request is infected with a virus, and registers the fact in said infection management table unit; and
a file registering unit for merging original information of a file managed by a first managing unit with differential information brought about due to modification concerning a file which is managed by a second managing unit so as to produce a produced file, and for registering the produced file on said disk.
39. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit used to manage files stored on said disk to see if the files are infected with viruses;
a table registering unit for receiving a result of detection from a virus checker for detecting if a file stored on said disk is infected with a virus, and for registering the result in said infection management table unit;
a judging unit that, when a use request is made externally for a file stored on said disk, references said infection management table unit so as to judge if the file is infected with a virus;
a prohibiting unit that, when said judging unit judges that a file is infected with a virus, prohibits the use of the file;
a saving unit for saving a virus-infected table unit and virus information concerning the file in an inexecutable area;
a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given; and
a file registering unit for merging original information of a file managed by a first managing unit with differential information brought about due to modification concerning a file which is managed by a second managing unit so as to produce a produced file, and for registering the produced file on said disk.
40. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit used to manage files stored on said disk to see if the files are infected with viruses;
a table registering unit for receiving a result of detection from a virus checker for detecting if a file stored on said disk is infected with a virus, and for registering the result in said infection management table unit;
a judging unit that, when a use request is made externally for a file stored on said disk, references said infection management table unit so as to judge if the file is infected with a virus;
a prohibiting unit that, when said judging unit judges that a file is infected with a virus, prohibits the use of the file;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification;
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a produced file, and for registering the produced file on said disk;
a restoring unit for deleting a virus-infected file, which is registered in said infection management table unit, from said disk, activating said file registering unit, thus restoring the file, and then registering the restored file on said disk.
41. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit used to manage files stored on said disk to see if the files are infected with viruses;
a table registering unit for internally receiving a result of detection from a virus checker which internally detects that a file stored on said disk is infected with a virus, and for registering the result in said infection management table unit;
a judging unit that, when a use request is made externally for a file stored on said disk, references said infection management table unit so as to judge if the file is infected with a virus;
a prohibiting unit that, when said judging unit judges that a file is infected with a virus, prohibits the use of the file; and
a file registering unit for merging original information of a file managed by a first managing unit with differential information brought about due to modification concerning a file which is managed by a second managing unit so as to produce a produced file, and for registering the produced file on said disk.
42. A method of storing a computer program on a computer storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising the steps of:
managing files stored on said disk to see if the files are infected with viruses;
receiving a result of detection from a virus checker for detecting if a file stored on said disk is infected with a virus;
registering the result of detection;
referencing said infection management table unit so as to judge if the file is infected with a virus when a use request is made externally for a file stored on said disk;
prohibiting the use of the file when judging that a file is infected with a virus;
judging that a stored file on said disk is a source of the use request infected with a virus and registering when the use request is issued for a system startup area stored on said disks;
merging original information of a file managed by a first managing unit with differential information brought about due to modification concerning a file which is managed by a second managing unit so as to produce a produced file; and
registering the produced file on said disk.
43. A method of storing a computer program on a computer storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising the steps of:
managing files stored on said disk to see if the files are infected with viruses;
receiving a result of detection from a virus checker for detecting if a file stored on said disk is infected with a virus;
registering the result of detection;
judging if the file is infected with a virus when a use request is made externally for a file stored on said disk;
prohibiting use of the infected file when judging that a file is infected with a virus;
saving a virus-infected table and virus information concerning the file in an inexecutable area;
reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given;
merging original information of a file managed by a first managing unit with differential information brought about due to modification concerning a file which is managed by a second managing unit so as to produce a produced file; and
registering the produced file on said disk.
44. A method of storing a computer program on a computer storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising the steps of:
managing files stored on said disk to see if the files are infected with viruses;
receiving a result of detection from a virus checker for detecting if a file stored on said disk is infected with a virus;
registering the result of detection;
judging if the file is infected with a virus when a use request is made externally for a file stored on said disk;
prohibiting the use of the file when judging that a file is infected with a virus;
managing original information of files stored on said disk;
managing differential information brought about by modification concerning the files stored on said disk and history information concerning said differential information brought about due to the modification;
merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a produced file;
registering the produced file on said disk;
deleting a registered virus-infected file from said disk, thus restoring the file; and
registering the restored file on said disk.
45. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit;
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein said first managing unit manages original information that is confirmed not to be infected with a virus by said virus checker, and said second managing unit manages differential information brought about due to modification which is confirmed not to be infected with a virus by said virus checker.
46. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit;
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein as for a file which is stored on said disk, of which original information is not registered in said first managing unit, and of which differential information brought about due to modification is not registered in said second managing unit, said table registering unit judges that the file stored on said disk is infected with a virus and registers the fact in said infection management table unit.
47. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit;
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein said first managing unit manages original information of said virus checker, and said second managing unit manages differential information brought about due to modification concerning said virus checker and history information concerning the differential information brought about due to modification.
48. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit;
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification; and
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk,
wherein said first managing unit encodes and manages original information, and said second managing unit encodes and manages differential information brought about due to modification, further comprising a decoding unit for decoding encoded data managed by said first and second managing unit, and an encoding unit for executing inverse conversion that is inverse to conversion performed by said decoding unit.
49. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit;
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification;
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk; and
a saving unit for saving a virus-infected file that is registered in said infection management table unit and virus information concerning the file in an executable area, and a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given.
50. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit;
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification;
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk;
a restoring unit for deleting a virus-infected file, which is registered in said infection management table unit, from said disk, activating said file registering unit, thus restoring the file, and then registering the restored file on said disk,
wherein said first managing unit encodes and manages original information, and said second managing unit encodes and manages original information, and said second managing unit encodes and manages differential information brought about due to modification, further comprising a decoding unit for decoding encoded data managed by said first and second managing unit, and an encoding unit for executing inverse conversion that is inverse to conversion performed by said decoding unit.
51. A storage device, having the function of coping with a computer virus, which has the ability to deal with infection of a file stored on a disk with a virus, comprising:
an infection management table unit for registering virus infected files which are stored on said disk;
a virus checker for detecting if a file stored on said disk is infected with a virus, wherein the virus checker is activated at intervals of a specific period or in response to a command instruction;
a table registering unit for registering a result of detection from said virus checker in said infection management table unit;
a judging unit for judging if a file is infected with a virus in response to an external use request externally made for a file stored on said disk by referencing said infection management table unit;
a prohibiting unit for prohibiting use of the externally requested file when said judging unit judges that the externally requested file is infected with a virus;
a first managing unit for managing original information of files stored on said disk;
a second managing unit for managing differential information brought about modification concerning the files stored on said disk and history information concerning said differential information brought about due to modification;
a file registering unit for merging the original information of a file managed by said first managing unit with the differential information brought about due to modification concerning the file which is managed by said second managing unit so as to produce a file, and for registering the produced file on said disk;
a restoring unit for deleting a virus-infected file, which is registered in said infection management table unit, from said disk, activating said file registering unit, thus restoring the file, and then registering the restored file on said disk; and
a saving unit for saving a virus-infected file that is registered in said infection management table unit and virus information concerning the file in an inexecutable area, and a reading unit for reading information saved in said inexecutable area under the condition that permission information for permitting access to said inexecutable area is given.
52. An apparatus, comprising:
a virus scanner adapted to scan a file stored in a storage device for infection with a virus;
a quarantining device adapted to quarantine the file from non-infected files on the storage device, when the file is infected; and
a converting device adapted to in response to a detection of the infection with the virus prohibit use of the infected file based upon executing an encoding process for security that converts the infected file into encoded data,
thereby in response to the detection of the infection with the virus, the infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the infected file was stored.
53. The method according to claim 52 wherein the other storage area as a quarantine is an inexecutable area.
54. An apparatus comprising:
a storage device adapted to store a plurality of files and a status for each of the files indicating whether each of the files is infected with a virus;
a virus checking device adapted to select a file to be checked for infection with a virus;
a quarantining device adapted to quarantine an infected file on the storage device; and
a converting device adapted to in response to a detection of the infection with the virus prohibit use of the infected file based upon executing an encoding process for security that converts the infected file into encoded data,
thereby in response to the detection of the infection with the virus, the infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the infected file was stored.
55. An apparatus, comprising:
a storage device adapted to store a plurality of files and a status for each of the files indicating whether each of the files is infected with a virus;
a virus checking device adapted for selection of a file to be checked for infection with a virus; and
a converting device adapted to in response to a detection of the infection with the virus prohibit use of an infected file based upon executing an encoding process for security that converts the infected file into encoded data,
thereby in response to the detection of the infection with the virus, the infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the infected file was stored.
56. A method, comprising:
scanning a file for infection with a virus using a computer;
quarantining the file from non-infected files if the file is infected with a virus; and
in response to a detection of the infection with the virus prohibiting use of the infected file by executing an encoding process for security that converts the infected file into encoded data,
thereby in response to the detection of the infection with the virus, the infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the infected file was stored.
57. A computer readable storage medium controlling a computer by:
scanning a file for infection with a virus;
quarantining the file if infected with a virus; and
in response to a detection of the infection with the virus prohibiting use of the infected file by executing an encoding process for security that converts the infected file into encoded data,
thereby in response to the detection of the infection with the virus, the infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the infected file was stored.
58. A method comprising:
scanning a file for infection with a virus using a computer;
isolating the file from non-infected files, if the file is infected with a virus; and
in response to a detection of the infection with the virus prohibiting use of the infected file via executing an encoding process for security that converts the infected file into encoded data,
thereby in response to the detection of the infection with the virus, the infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the infected file was stored.
59. A method for performing an anti-virus operation, the method comprising:
detecting a virus-infected file in a storage device using a computer;
in response to the detection of the virus-infected file prohibiting use of the virus-infected file based upon converting for security the virus-infected file into encoded data; and
storing the encoded data of the virus-infected file,
thereby in response to the detection of the virus-infected file, the virus-infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the virus-infected file was stored.
60. The method according to claim 59 further comprising:
executing inverse conversion of said encoded data for restoring the virus-infected file.
61. The method according to claim 59 further comprising:
registering virus information of the virus-infected file in an infection management table.
62. The method according to claim 61 further comprising:
outputting the virus information for a virus analysis.
63. The method according to claim 61, further comprising:
deleting the virus information of the virus-infected file registered in the infection management table through an interactive process.
64. The method according to claim 61 wherein the virus information contains a virus name and a storage location in which the virus-infected file was stored.
65. The method according to claim 59 wherein an operation of said detecting is activated periodically or activated in response to a command instruction.
66. The method according to claim 59 wherein the encoded data is stored in a different storage area from a storage area in which the virus-infected file was stored.
67. The method according to claim 59 wherein the encoded data is stored in a storage area which cannot be accessed readily.
68. A method for performing an anti-virus operation, the method comprising:
detecting a virus-infected file using a computer;
in response to the detection of the virus-infected file prohibiting use of the virus-infected file by encoding the virus-infected file for security; and
storing the encoded virus infected file,
thereby in response to the detection of the virus-infected file, the virus-infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the virus-infected file was stored.
69. A method for performing an anti-virus operation, the method comprising:
detecting a virus-infected file in a storage device using a computer;
in response to the detection of the virus-infected file converting for security the virus-infected file into encoded data; and
storing the encoded data of the virus infected file,
thereby in response to the detection of the virus-infected file, the virus-infected file is deleted and the encoded data is stored in another storage area different from a storage area in which the virus-infected file was stored and the converting into the encoded data prohibits use of the virus-infected file.
70. The method according to claim 69, wherein the use comprises executing.
US09/893,445 1995-06-02 2001-06-29 Storage device having function for coping with computer virus Expired - Lifetime USRE44131E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/893,445 USRE44131E1 (en) 1995-06-02 2001-06-29 Storage device having function for coping with computer virus

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP7-136331 1995-06-02
JP13633195A JP4162099B2 (en) 1995-06-02 1995-06-02 Device having function to cope with virus infection and storage device thereof
US08/656,908 US5918008A (en) 1995-06-02 1996-06-03 Storage device having function for coping with computer virus
US09/893,445 USRE44131E1 (en) 1995-06-02 2001-06-29 Storage device having function for coping with computer virus

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US08/656,908 Reissue US5918008A (en) 1995-06-02 1996-06-03 Storage device having function for coping with computer virus

Publications (1)

Publication Number Publication Date
USRE44131E1 true USRE44131E1 (en) 2013-04-02

Family

ID=15172729

Family Applications (2)

Application Number Title Priority Date Filing Date
US08/656,908 Ceased US5918008A (en) 1995-06-02 1996-06-03 Storage device having function for coping with computer virus
US09/893,445 Expired - Lifetime USRE44131E1 (en) 1995-06-02 2001-06-29 Storage device having function for coping with computer virus

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US08/656,908 Ceased US5918008A (en) 1995-06-02 1996-06-03 Storage device having function for coping with computer virus

Country Status (2)

Country Link
US (2) US5918008A (en)
JP (1) JP4162099B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120246729A1 (en) * 2011-03-24 2012-09-27 Samsung Electronics Co., Ltd. Data storage devices including integrated anti-virus circuits and method of operating the same
US20120331572A1 (en) * 1999-04-30 2012-12-27 Hoshiko Llc Method and apparatus for identifying and characterizing errant electronic files

Families Citing this family (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6151643A (en) 1996-06-07 2000-11-21 Networks Associates, Inc. Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
US6857099B1 (en) * 1996-09-18 2005-02-15 Nippon Steel Corporation Multilevel semiconductor memory, write/read method thereto/therefrom and storage medium storing write/read program
US6260172B1 (en) * 1997-09-05 2001-07-10 Nippon Steel Corporation Semiconductor device with logic rewriting and security protection function
US6088803A (en) * 1997-12-30 2000-07-11 Intel Corporation System for virus-checking network data during download to a client device
US6029256A (en) * 1997-12-31 2000-02-22 Network Associates, Inc. Method and system for allowing computer programs easy access to features of a virus scanning engine
US5987610A (en) * 1998-02-12 1999-11-16 Ameritech Corporation Computer virus screening methods and systems
US6401210B1 (en) * 1998-09-23 2002-06-04 Intel Corporation Method of managing computer virus infected files
US6338141B1 (en) * 1998-09-30 2002-01-08 Cybersoft, Inc. Method and apparatus for computer virus detection, analysis, and removal in real time
US6389539B1 (en) * 1998-09-30 2002-05-14 International Business Machines Corporation Method and system for enhancing security access to a data processing system
US6266774B1 (en) 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US6499109B1 (en) * 1998-12-08 2002-12-24 Networks Associates Technology, Inc. Method and apparatus for securing software distributed over a network
US6961749B1 (en) 1999-08-25 2005-11-01 Network Appliance, Inc. Scalable file server with highly available pairs
US6954858B1 (en) 1999-12-22 2005-10-11 Kimberly Joyce Welborn Computer virus avoidance system and mechanism
US6763466B1 (en) * 2000-01-11 2004-07-13 Networks Associates Technology, Inc. Fast virus scanning
JP3251000B2 (en) * 2000-09-07 2002-01-28 松本建工株式会社 Insulation structure of house and heat shield used
US6928555B1 (en) * 2000-09-18 2005-08-09 Networks Associates Technology, Inc. Method and apparatus for minimizing file scanning by anti-virus programs
US7086090B1 (en) * 2000-10-20 2006-08-01 International Business Machines Corporation Method and system for protecting pervasive devices and servers from exchanging viruses
US7778981B2 (en) * 2000-12-01 2010-08-17 Netapp, Inc. Policy engine to control the servicing of requests received by a storage server
US7346928B1 (en) * 2000-12-01 2008-03-18 Network Appliance, Inc. Decentralized appliance virus scanning
US20020178375A1 (en) * 2001-01-31 2002-11-28 Harris Corporation Method and system for protecting against malicious mobile code
US7272724B2 (en) * 2001-02-20 2007-09-18 Mcafee, Inc. User alerts in an anti computer virus system
US7363657B2 (en) * 2001-03-12 2008-04-22 Emc Corporation Using a virus checker in one file server to check for viruses in another file server
US7114184B2 (en) * 2001-03-30 2006-09-26 Computer Associates Think, Inc. System and method for restoring computer systems damaged by a malicious computer program
US7673343B1 (en) * 2001-07-26 2010-03-02 Mcafee, Inc. Anti-virus scanning co-processor
US7665137B1 (en) * 2001-07-26 2010-02-16 Mcafee, Inc. System, method and computer program product for anti-virus scanning in a storage subsystem
US7093294B2 (en) * 2001-10-31 2006-08-15 International Buisiness Machines Corporation System and method for detecting and controlling a drone implanted in a network attached device such as a computer
JP4567275B2 (en) * 2002-02-28 2010-10-20 株式会社エヌ・ティ・ティ・ドコモ Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method
US7171691B2 (en) * 2002-04-10 2007-01-30 International Business Machines Corporation Content sanitation via transcoding
JP3979285B2 (en) * 2002-12-17 2007-09-19 株式会社日立製作所 Information processing system
US20040128539A1 (en) * 2002-12-30 2004-07-01 Intel Corporation Method and apparatus for denial of service attack preemption
JP3835421B2 (en) * 2003-03-28 2006-10-18 コニカミノルタビジネステクノロジーズ株式会社 Control program and control device
WO2004095277A1 (en) * 2003-04-24 2004-11-04 Fujitsu Limited File control method, program and device
JP4462849B2 (en) * 2003-05-30 2010-05-12 株式会社日立製作所 Data protection apparatus, method and program
US7523493B2 (en) * 2003-08-29 2009-04-21 Trend Micro Incorporated Virus monitor and methods of use thereof
US7962914B2 (en) * 2003-11-25 2011-06-14 Emc Corporation Method and apparatus for load balancing of distributed processing units based on performance metrics
US8544096B2 (en) * 2003-12-30 2013-09-24 Emc Corporation On-access and on-demand distributed virus scanning
US20050229250A1 (en) * 2004-02-26 2005-10-13 Ring Sandra E Methodology, system, computer readable medium, and product providing a security software suite for handling operating system exploitations
JP2005322285A (en) 2004-05-07 2005-11-17 Hitachi Ltd Disk recording and reproducing apparatus
US8154987B2 (en) * 2004-06-09 2012-04-10 Intel Corporation Self-isolating and self-healing networked devices
US7441272B2 (en) * 2004-06-09 2008-10-21 Intel Corporation Techniques for self-isolation of networked devices
US20060015939A1 (en) * 2004-07-14 2006-01-19 International Business Machines Corporation Method and system to protect a file system from viral infections
JP4539212B2 (en) * 2004-07-23 2010-09-08 富士ゼロックス株式会社 Image processing device
JP4729890B2 (en) * 2004-09-07 2011-07-20 富士ゼロックス株式会社 File management device
US7591018B1 (en) * 2004-09-14 2009-09-15 Trend Micro Incorporated Portable antivirus device with solid state memory
US20060095961A1 (en) * 2004-10-29 2006-05-04 Priya Govindarajan Auto-triage of potentially vulnerable network machines
US8887295B2 (en) * 2005-06-27 2014-11-11 Safend Ltd. Method and system for enabling enterprises to use detachable memory devices that contain data and executable files in controlled and secure way
DE102005029887A1 (en) * 2005-06-27 2007-01-04 Giesecke & Devrient Gmbh Integrity protected disk
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US8613095B2 (en) * 2006-06-30 2013-12-17 The Invention Science Fund I, Llc Smart distribution of a malware countermeasure
US9258327B2 (en) 2006-04-27 2016-02-09 Invention Science Fund I, Llc Multi-network virus immunization
US8539581B2 (en) * 2006-04-27 2013-09-17 The Invention Science Fund I, Llc Efficient distribution of a malware countermeasure
US8966630B2 (en) * 2006-04-27 2015-02-24 The Invention Science Fund I, Llc Generating and distributing a malware countermeasure
US8117654B2 (en) * 2006-06-30 2012-02-14 The Invention Science Fund I, Llc Implementation of malware countermeasures in a network device
JP4895718B2 (en) * 2006-08-14 2012-03-14 株式会社リコー Image forming apparatus, data recovery method, and recording medium
JP4876793B2 (en) * 2006-08-29 2012-02-15 富士ゼロックス株式会社 Data storage device and program
US8099785B1 (en) 2007-05-03 2012-01-17 Kaspersky Lab, Zao Method and system for treatment of cure-resistant computer malware
US7783666B1 (en) 2007-09-26 2010-08-24 Netapp, Inc. Controlling access to storage resources by using access pattern based quotas
US7392544B1 (en) * 2007-12-18 2008-06-24 Kaspersky Lab, Zao Method and system for anti-malware scanning with variable scan settings
JP4705961B2 (en) * 2008-01-25 2011-06-22 Sky株式会社 Virus damage range prediction system
KR100977179B1 (en) * 2008-03-19 2010-08-23 엔에이치엔비즈니스플랫폼 주식회사 Method and System for Searching malicious code
US20100083381A1 (en) * 2008-09-30 2010-04-01 Khosravi Hormuzd M Hardware-based anti-virus scan service
JP2009134740A (en) * 2009-01-19 2009-06-18 Seiko Epson Corp Electronic appliance
WO2014049758A1 (en) 2012-09-26 2014-04-03 富士通株式会社 Information processing device, information processing method, and information processing program
MY167995A (en) * 2014-10-17 2018-10-10 Mimos Berhad System for improving security in a vpn workflow
JP6908874B2 (en) * 2016-10-27 2021-07-28 コニカミノルタ株式会社 Information processing systems, information processing equipment and programs

Citations (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS62224843A (en) 1986-03-26 1987-10-02 Hitachi Ltd Database medium content maintaining system
JPS6355631A (en) 1986-08-27 1988-03-10 Fujitsu Ltd Patch control method for program
US4926476A (en) 1989-02-03 1990-05-15 Motorola, Inc. Method and apparatus for secure execution of untrusted software
US4962533A (en) 1989-02-17 1990-10-09 Texas Instrument Incorporated Data protection for computer systems
US4975950A (en) 1988-11-03 1990-12-04 Lentz Stephen A System and method of protecting integrity of computer data and software
US4984272A (en) 1988-11-30 1991-01-08 At&T Bell Laboratories Secure file handling in a computer operating system
US5050212A (en) 1990-06-20 1991-09-17 Apple Computer, Inc. Method and apparatus for verifying the integrity of a file stored separately from a computer
US5121345A (en) 1988-11-03 1992-06-09 Lentz Stephen A System and method for protecting integrity of computer data and software
US5144660A (en) 1988-08-31 1992-09-01 Rose Anthony M Securing a computer against undesired write operations to or read operations from a mass storage device
US5208858A (en) 1990-02-05 1993-05-04 Siemens Aktiengesellschaft Method for allocating useful data to a specific originator
US5265163A (en) 1989-12-13 1993-11-23 International Business Machines Corp. Computer system security device
US5276735A (en) 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5278901A (en) 1992-04-30 1994-01-11 International Business Machines Corporation Pattern-oriented intrusion-detection system and method
JPH06110718A (en) 1992-09-30 1994-04-22 Toshiba Corp Virus protection system
US5311591A (en) 1992-05-15 1994-05-10 Fischer Addison M Computer system security method and apparatus for creating and using program authorization information data structures
US5313639A (en) 1992-06-26 1994-05-17 George Chao Computer with security device for controlling access thereto
US5319776A (en) 1990-04-19 1994-06-07 Hilgraeve Corporation In transit detection of computer virus with safeguard
JPH06168114A (en) 1992-11-30 1994-06-14 Nippon Syst Project:Kk Computer virus defensing device
US5337360A (en) 1992-04-06 1994-08-09 Fischer Addison M Method and apparatus for creating, supporting, and using travelling programs
JPH06230959A (en) 1993-02-02 1994-08-19 Otec:Kk Method and device for controlling prevention against computer virus
US5343527A (en) 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components
US5343524A (en) 1991-06-21 1994-08-30 Mu Xiao Chun Intelligent security device
JPH06242957A (en) 1993-02-16 1994-09-02 Fujitsu Ltd Program execution controller
JPH06250861A (en) 1993-01-19 1994-09-09 Internatl Business Mach Corp <Ibm> Method and equipment for evaluating and sampling computer virus and signature of other undesired existing software
US5347578A (en) 1992-03-17 1994-09-13 International Computers Limited Computer system security
JPH06259012A (en) 1993-03-05 1994-09-16 Hitachi Ltd Enciphering method by hierarchic key control and information communication system
US5349655A (en) 1991-05-24 1994-09-20 Symantec Corporation Method for recovery of a computer program infected by a computer virus
JPH06274419A (en) 1993-03-23 1994-09-30 Mitsubishi Kasei Corp Information recording medium and recording method data thereof
US5355414A (en) 1993-01-21 1994-10-11 Ast Research, Inc. Computer security system
US5359659A (en) 1992-06-19 1994-10-25 Doren Rosenthal Method for securing software against corruption by computer viruses
US5361359A (en) 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
JPH06350784A (en) 1993-06-08 1994-12-22 Ricoh Co Ltd Facsimile equipment
JPH06348486A (en) 1991-04-22 1994-12-22 Acer Inc Method and system to protect computer system from computer virus
US5379342A (en) 1993-01-07 1995-01-03 International Business Machines Corp. Method and apparatus for providing enhanced data verification in a computer system
US5379414A (en) 1992-07-10 1995-01-03 Adams; Phillip M. Systems and methods for FDC error detection and prevention
US5396609A (en) 1989-01-19 1995-03-07 Gesellschaft Fur Strahlen- Und Umweltforschung Mbh (Gsf) Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address regions
JPH0764786A (en) 1993-08-30 1995-03-10 Canon Inc Method for controlling program using contract and system for realizing the method
US5402492A (en) 1993-06-18 1995-03-28 Ast Research, Inc. Security system for a stand-alone computer
US5406624A (en) 1992-09-04 1995-04-11 Algorithmic Research Ltd. Data processor systems
US5414833A (en) 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
JPH07146788A (en) 1993-11-22 1995-06-06 Fujitsu Ltd System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method
US5428795A (en) 1992-07-31 1995-06-27 International Business Machines Corporation Method of and apparatus for providing automatic security control of distributions within a data processing system
US5440723A (en) * 1993-01-19 1995-08-08 International Business Machines Corporation Automatic immune system for computers and computer networks
US5442706A (en) 1992-02-27 1995-08-15 Hughes Aircraft Company Secure mobile storage
US5444850A (en) 1993-08-04 1995-08-22 Trend Micro Devices Incorporated Method and apparatus for controlling network and workstation access prior to workstation boot
US5448668A (en) 1993-07-08 1995-09-05 Perelson; Alan S. Method of detecting changes to a collection of digital signals
US5473687A (en) 1993-12-29 1995-12-05 Infosafe Systems, Inc. Method for retrieving secure information from a database
US5473769A (en) 1992-03-30 1995-12-05 Cozza; Paul D. Method and apparatus for increasing the speed of the detecting of computer viruses
JPH0816386A (en) 1994-07-04 1996-01-19 Fujitsu Ltd External storage device coping with virus
US5502815A (en) * 1992-03-30 1996-03-26 Cozza; Paul D. Method and apparatus for increasing the speed at which computer viruses are detected
US5530757A (en) 1994-06-28 1996-06-25 International Business Machines Corporation Distributed fingerprints for information integrity verification
US5539828A (en) 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
US5572590A (en) 1994-04-12 1996-11-05 International Business Machines Corporation Discrimination of malicious changes to digital information using multiple signatures
US5606609A (en) 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5606615A (en) 1995-05-16 1997-02-25 Lapointe; Brian K. Computer security system
US5613002A (en) 1994-11-21 1997-03-18 International Business Machines Corporation Generic disinfection of programs infected with a computer virus
US5625692A (en) 1995-01-23 1997-04-29 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US5651069A (en) 1994-12-08 1997-07-22 International Business Machines Corporation Software-efficient message authentication
US5659614A (en) 1994-11-28 1997-08-19 Bailey, Iii; John E. Method and system for creating and storing a backup copy of file data stored on a computer
US5666411A (en) 1994-01-13 1997-09-09 Mccarty; Johnnie C. System for computer software protection
US5675645A (en) 1995-04-18 1997-10-07 Ricoh Company, Ltd. Method and apparatus for securing executable programs against copying
US5689247A (en) 1994-12-30 1997-11-18 Ortho Pharmaceutical Corporation Automated system for identifying authorized system users
US5721877A (en) 1995-05-31 1998-02-24 Ast Research, Inc. Method and apparatus for limiting access to nonvolatile memory device
US5724425A (en) 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5802275A (en) 1994-06-22 1998-09-01 Lucent Technologies Inc. Isolation of non-secure software from secure software to limit virus infection
US5809138A (en) 1994-07-25 1998-09-15 Netz Computing Ltd. Method for protecting storage media against computer virus infection
US6381694B1 (en) 1994-02-18 2002-04-30 Apple Computer, Inc. System for automatic recovery from software problems that cause computer failure
US20100235916A1 (en) * 2001-12-21 2010-09-16 Radatti Peter V Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects

Patent Citations (76)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS62224843A (en) 1986-03-26 1987-10-02 Hitachi Ltd Database medium content maintaining system
JPS6355631A (en) 1986-08-27 1988-03-10 Fujitsu Ltd Patch control method for program
US5144660A (en) 1988-08-31 1992-09-01 Rose Anthony M Securing a computer against undesired write operations to or read operations from a mass storage device
US4975950A (en) 1988-11-03 1990-12-04 Lentz Stephen A System and method of protecting integrity of computer data and software
US5121345A (en) 1988-11-03 1992-06-09 Lentz Stephen A System and method for protecting integrity of computer data and software
US4984272A (en) 1988-11-30 1991-01-08 At&T Bell Laboratories Secure file handling in a computer operating system
US5396609A (en) 1989-01-19 1995-03-07 Gesellschaft Fur Strahlen- Und Umweltforschung Mbh (Gsf) Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address regions
US4926476A (en) 1989-02-03 1990-05-15 Motorola, Inc. Method and apparatus for secure execution of untrusted software
US4962533A (en) 1989-02-17 1990-10-09 Texas Instrument Incorporated Data protection for computer systems
US5265163A (en) 1989-12-13 1993-11-23 International Business Machines Corp. Computer system security device
US5208858A (en) 1990-02-05 1993-05-04 Siemens Aktiengesellschaft Method for allocating useful data to a specific originator
US5319776A (en) 1990-04-19 1994-06-07 Hilgraeve Corporation In transit detection of computer virus with safeguard
US5050212A (en) 1990-06-20 1991-09-17 Apple Computer, Inc. Method and apparatus for verifying the integrity of a file stored separately from a computer
JPH06348486A (en) 1991-04-22 1994-12-22 Acer Inc Method and system to protect computer system from computer virus
US5511184A (en) 1991-04-22 1996-04-23 Acer Incorporated Method and apparatus for protecting a computer system from computer viruses
US5349655A (en) 1991-05-24 1994-09-20 Symantec Corporation Method for recovery of a computer program infected by a computer virus
US5408642A (en) 1991-05-24 1995-04-18 Symantec Corporation Method for recovery of a computer program infected by a computer virus
US5343524A (en) 1991-06-21 1994-08-30 Mu Xiao Chun Intelligent security device
US5442706A (en) 1992-02-27 1995-08-15 Hughes Aircraft Company Secure mobile storage
US5347578A (en) 1992-03-17 1994-09-13 International Computers Limited Computer system security
US5473769A (en) 1992-03-30 1995-12-05 Cozza; Paul D. Method and apparatus for increasing the speed of the detecting of computer viruses
US5502815A (en) * 1992-03-30 1996-03-26 Cozza; Paul D. Method and apparatus for increasing the speed at which computer viruses are detected
US5337360A (en) 1992-04-06 1994-08-09 Fischer Addison M Method and apparatus for creating, supporting, and using travelling programs
US5390247A (en) 1992-04-06 1995-02-14 Fischer; Addison M. Method and apparatus for creating, supporting, and using travelling programs
US5276735A (en) 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5278901A (en) 1992-04-30 1994-01-11 International Business Machines Corporation Pattern-oriented intrusion-detection system and method
US5311591A (en) 1992-05-15 1994-05-10 Fischer Addison M Computer system security method and apparatus for creating and using program authorization information data structures
US5412717A (en) 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
US5359659A (en) 1992-06-19 1994-10-25 Doren Rosenthal Method for securing software against corruption by computer viruses
US5313639A (en) 1992-06-26 1994-05-17 George Chao Computer with security device for controlling access thereto
US5379414A (en) 1992-07-10 1995-01-03 Adams; Phillip M. Systems and methods for FDC error detection and prevention
US5428795A (en) 1992-07-31 1995-06-27 International Business Machines Corporation Method of and apparatus for providing automatic security control of distributions within a data processing system
US5361359A (en) 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
US5406624A (en) 1992-09-04 1995-04-11 Algorithmic Research Ltd. Data processor systems
JPH06110718A (en) 1992-09-30 1994-04-22 Toshiba Corp Virus protection system
JPH06168114A (en) 1992-11-30 1994-06-14 Nippon Syst Project:Kk Computer virus defensing device
US5379342A (en) 1993-01-07 1995-01-03 International Business Machines Corp. Method and apparatus for providing enhanced data verification in a computer system
JPH06250861A (en) 1993-01-19 1994-09-09 Internatl Business Mach Corp <Ibm> Method and equipment for evaluating and sampling computer virus and signature of other undesired existing software
US5452442A (en) 1993-01-19 1995-09-19 International Business Machines Corporation Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities
US5440723A (en) * 1993-01-19 1995-08-08 International Business Machines Corporation Automatic immune system for computers and computer networks
US5355414A (en) 1993-01-21 1994-10-11 Ast Research, Inc. Computer security system
JPH06230959A (en) 1993-02-02 1994-08-19 Otec:Kk Method and device for controlling prevention against computer virus
JPH06242957A (en) 1993-02-16 1994-09-02 Fujitsu Ltd Program execution controller
JPH06259012A (en) 1993-03-05 1994-09-16 Hitachi Ltd Enciphering method by hierarchic key control and information communication system
JPH06274419A (en) 1993-03-23 1994-09-30 Mitsubishi Kasei Corp Information recording medium and recording method data thereof
JPH06350784A (en) 1993-06-08 1994-12-22 Ricoh Co Ltd Facsimile equipment
US5402492A (en) 1993-06-18 1995-03-28 Ast Research, Inc. Security system for a stand-alone computer
US5448668A (en) 1993-07-08 1995-09-05 Perelson; Alan S. Method of detecting changes to a collection of digital signals
US5444850A (en) 1993-08-04 1995-08-22 Trend Micro Devices Incorporated Method and apparatus for controlling network and workstation access prior to workstation boot
JPH0764786A (en) 1993-08-30 1995-03-10 Canon Inc Method for controlling program using contract and system for realizing the method
US5930357A (en) 1993-08-30 1999-07-27 Canon Kabushiki Kaisha Method of managing contracts for licensed program use and a management system thereof
US5414833A (en) 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5343527A (en) 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components
US5881151A (en) 1993-11-22 1999-03-09 Fujitsu Limited System for creating virus diagnosing mechanism, method of creating the same, virus diagnosing apparatus and method therefor
JPH07146788A (en) 1993-11-22 1995-06-06 Fujitsu Ltd System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method
KR0132998B1 (en) 1993-11-22 1998-04-24 세끼자와 다다시 System and method for preparing virus diagnostic mechanism and virus diagnostic mechanism and diagnostic method
US5473687A (en) 1993-12-29 1995-12-05 Infosafe Systems, Inc. Method for retrieving secure information from a database
US5666411A (en) 1994-01-13 1997-09-09 Mccarty; Johnnie C. System for computer software protection
US6381694B1 (en) 1994-02-18 2002-04-30 Apple Computer, Inc. System for automatic recovery from software problems that cause computer failure
US5572590A (en) 1994-04-12 1996-11-05 International Business Machines Corporation Discrimination of malicious changes to digital information using multiple signatures
US5539828A (en) 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
US5724425A (en) 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5802275A (en) 1994-06-22 1998-09-01 Lucent Technologies Inc. Isolation of non-secure software from secure software to limit virus infection
US5530757A (en) 1994-06-28 1996-06-25 International Business Machines Corporation Distributed fingerprints for information integrity verification
JPH0816386A (en) 1994-07-04 1996-01-19 Fujitsu Ltd External storage device coping with virus
US5809138A (en) 1994-07-25 1998-09-15 Netz Computing Ltd. Method for protecting storage media against computer virus infection
US5606609A (en) 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5613002A (en) 1994-11-21 1997-03-18 International Business Machines Corporation Generic disinfection of programs infected with a computer virus
US5659614A (en) 1994-11-28 1997-08-19 Bailey, Iii; John E. Method and system for creating and storing a backup copy of file data stored on a computer
US5651069A (en) 1994-12-08 1997-07-22 International Business Machines Corporation Software-efficient message authentication
US5689247A (en) 1994-12-30 1997-11-18 Ortho Pharmaceutical Corporation Automated system for identifying authorized system users
US5625692A (en) 1995-01-23 1997-04-29 International Business Machines Corporation Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
US5675645A (en) 1995-04-18 1997-10-07 Ricoh Company, Ltd. Method and apparatus for securing executable programs against copying
US5606615A (en) 1995-05-16 1997-02-25 Lapointe; Brian K. Computer security system
US5721877A (en) 1995-05-31 1998-02-24 Ast Research, Inc. Method and apparatus for limiting access to nonvolatile memory device
US20100235916A1 (en) * 2001-12-21 2010-09-16 Radatti Peter V Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects

Non-Patent Citations (26)

* Cited by examiner, † Cited by third party
Title
"MS-DOX/V FM V Sidebook 88SP-3060-1," Fujitsu Ltd., 1994, 1st edition, pp. 19-36.
Akira Watanabe, "Computer Virus Dictionary", Ohmsha Ltd., Nov. 25, 1993, pp. 82-117.
CBR Staff Writer; Computer Business Review; Secure Data Network Offers Automatic Back-Up Service, Virus Screening, In US, [online], Nov. 27, 1989 [retrieved Apr. 12, 2011]. Retrieved from the Internet:. (2 pages).
CBR Staff Writer; Computer Business Review; Secure Data Network Offers Automatic Back-Up Service, Virus Screening, In US, [online], Nov. 27, 1989 [retrieved Apr. 12, 2011]. Retrieved from the Internet:<URL: http://www.cbronline.com/news>. (2 pages).
Coursey, David; Networking; ISDN Technology Boosts Remote LAN, PC Backup, Sep. 9, 1991, p. 33 (2 pages).
Decision of Final Rejection (Office Action) for corresponding Japanese Application No. 7-136331 dated Feb. 7, 2006.
Ghannam M. Al-Dossary, "Computer Virus Prevention and Containment on Mainframes," Proceeding of 1989 International Carnahan Conference on Security Technology (ICCST in Zurich), 1989, pp. 23-31.
Joe Rizzo, "Antivirus Software Operating on Netware: Comparably Priced-Choice Depends on Reliability and Usability", Nikkei Open Systems, Nikkei BP, Dec. 10, 1993, vol. 9, pp. 163-168.
Kyodo News Service, Virusbuster Book 1, Aug. 25, 1993 (10 pages-cover page, pp. 5, 50-56 and 60) (Partial English Translation as identified of pp. 52, 53, and 60-5 pages).
Magid, Lawrence J.; Los Angeles Times; ‘Future’ Products Already Here [online], Feb. 22, 1990 [retrieved Jan. 20, 2011]. Retrieved from the Internet:<URL: http://articles.latimes.com/1990-02-22/business/fi-1323—1—secure-data-network>. (2 pages).
Magid, Lawrence J.; Los Angeles Times; 'Future' Products Already Here [online], Feb. 22, 1990 [retrieved Jan. 20, 2011]. Retrieved from the Internet:. (2 pages).
Masaru Tanaka, "Special Security Method for PCLAN! Topical Security for PC LAN (2) Anit-Virus Software Challenging Network Viruses," Computer and Network LAN, Ohmsha Ltd. Feb. 1, 1994. vol. 13, No. 2, pp. 52-56.
Mims, Bob; Deseret News; Data Vault Backs Up Data For Small Businesses, [online], Jun. 5, 1991 [retrieved on Jan. 20, 2010]. Retrieved from the Internet:. (2 pages).
Mims, Bob; Deseret News; Data Vault Backs Up Data For Small Businesses, [online], Jun. 5, 1991 [retrieved on Jan. 20, 2010]. Retrieved from the Internet:<URL: www.deseretnews.com/article/165762/DATA-VAULT-BACKS-UP-DATA-FOR-SMALL-BUSINESSES.html>. (2 pages).
Newman, Richard; Disaster Recovery Journal; PC Backup Technology Arrives [online], circa 1988-1992 [retrieved on Jan. 20, 2011]. Retrieved from the Internet:<URL: http://www.drj.com/article-archives/data-processing-recovery/pc-backup-technology-arrives.html>. (3 pages).
Notice of Allowance mailed Dec. 21, 1998 in corresponding U.S. Appl. No. 08/656,908.
Notice of Reasons for Rejection (Office Action) for corresponding Japanese Application No. 7-136331 dated Jul. 26, 2005.
Notice of Reasons for Rejection (Office Action) for corresponding Japanese Application No. 7-136331 dated Oct. 25, 2005.
Office Action mailed May 1, 1998 in corresponding U.S. Appl. No. 08/656,908.
Office Action mailed Sep. 18, 1997 in corresponding U.S. Appl. No. 08/656,908.
Paul Ferrill, et al., "Product Comparison: Network Virus Protection, An Ounce of Prevention," Infoworld, Feb. 13, 1995, vol. 17, Issue 7, pp. 84- 99 (18 pages).
Peter Norton Symantec Corp., Norton Antivirus, 1992, Chapter 2, 3, 4, 6, B-4-B-7.
Reed, Frank; Warren, Eric; Business Wire, New York; Secure Data Network Inc. Introduces Nation's First Online PC Data Backup And Retrieval Service, Oct. 31, 1989 (2 pages).
Richard Ford, et al., "Virus Bulletin-The Authoritative International Publication on Computer Virus Prevention, Recognition and Removal," ISSN 0956-9979, Jul. 1993 (pp. 1-24).
Richard Ford, et al., "Virus Bulletin-The International Publication on Computer Virus Prevention, Recognition and Removal," ISSN 0956-9979, Dec. 1994 (pp. 1-24).
Secure Data Network Offers Automatic Back-Up service, Virus screening, In US, p. 1, Dated Nov. 28, 1989. *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331572A1 (en) * 1999-04-30 2012-12-27 Hoshiko Llc Method and apparatus for identifying and characterizing errant electronic files
US9239924B2 (en) * 1999-04-30 2016-01-19 Intellectual Ventures I Llc Identifying and characterizing electronic files using a two-stage calculation
US10235442B2 (en) 1999-04-30 2019-03-19 Intellectual Ventures I Llc Method and apparatus for identifying and characterizing errant electronic files
US20120246729A1 (en) * 2011-03-24 2012-09-27 Samsung Electronics Co., Ltd. Data storage devices including integrated anti-virus circuits and method of operating the same
US8683594B2 (en) * 2011-03-24 2014-03-25 Samsung Electronics Co., Ltd. Data storage devices including integrated anti-virus circuits and method of operating the same

Also Published As

Publication number Publication date
JPH08328846A (en) 1996-12-13
US5918008A (en) 1999-06-29
JP4162099B2 (en) 2008-10-08

Similar Documents

Publication Publication Date Title
USRE44131E1 (en) Storage device having function for coping with computer virus
US6928555B1 (en) Method and apparatus for minimizing file scanning by anti-virus programs
US7346781B2 (en) Initiating execution of a computer program from an encrypted version of a computer program
JP4828199B2 (en) System and method for integrating knowledge base of anti-virus software applications
US5822517A (en) Method for detecting infection of software programs by memory resident software viruses
US7665123B1 (en) Method and apparatus for detecting hidden rootkits
US6802028B1 (en) Computer virus detection and removal
CN101231683A (en) Method for secure data processing on a computer system
US7631356B2 (en) System and method for foreign code detection
US7251735B2 (en) Buffer overflow protection and prevention
US20060185016A1 (en) System, computer program product and method of selecting sectors of a hard disk on which to perform a virus scan
US20100235916A1 (en) Apparatus and method for computer virus detection and remediation and self-repair of damaged files and/or objects
JP4253320B2 (en) Virus-compatible storage device and information processing device
JP4109285B2 (en) Device, storage device, and file processing method
JP4129022B2 (en) Device, storage device, and file processing method
JP4627266B2 (en) Information leakage prevention system due to unknown malware
KR100613126B1 (en) Method and apparatus for deleting virus code, and information storage medium storing a program thereof
JP4303231B2 (en) Virus-compatible storage device and information processing device
JPH10187434A (en) Security keeping system
JP2005258498A (en) Server restoration method
JPH08147159A (en) Information processor
JPH0844556A (en) Software structure and mechanism for security and system protection in electronic computer
JP3417065B2 (en) Virus-compatible external storage device, data processing device, and data processing method
JP4109284B2 (en) File processing method
JP2005099982A (en) File monitoring device

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUJITSU LIMITED;REEL/FRAME:032821/0875

Effective date: 20140211

AS Assignment

Owner name: FUJITSU LIMITED, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TOGAWA, YOSHIFUSA;MIYAMOTO, TAKAYUKI;NOZAWA, KURIKO;REEL/FRAME:032956/0687

Effective date: 19960521

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL

Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001

Effective date: 20160226

AS Assignment

Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA

Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030

Effective date: 20171222

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030

Effective date: 20171222