Browse Prior Art Database

Employment of Virus Detection Procedures at Domain Boundaries

IP.com Disclosure Number: IPCOM000122423D
Original Publication Date: 1991-Dec-01
Included in the Prior Art Database: 2005-Apr-04
Document File: 2 page(s) / 59K

Publishing Venue

IBM

Related People

Arnold, WC: AUTHOR [+4]

Abstract

The invention here disclosed consists of programs which examine executable objects for computer viruses or other malicious software when the objects cross any of a set of domain boundaries. This reduces the amount of resource spent in examining objects (compared, for instance, to periodically examining all objects in the system), while providing protection against malicious software spreading to new domains.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 57% of the total text.

Employment of Virus Detection Procedures at Domain Boundaries

      The invention here disclosed consists of programs which
examine executable objects for computer viruses or other malicious
software when the objects cross any of a set of domain boundaries.
This reduces the amount of resource spent in examining objects
(compared, for instance, to periodically examining all objects in the
system), while providing protection against malicious software
spreading to new domains.

      Boundary-crossings include, but are not limited to:
 .   The transfer of an executable object from one computer to
another over a telecommunication link.
 .   The copying of an executable object onto removeable storage
media such as tape units, diskettes, writeable optical disks, and so
forth.
 .   The transmission of an executable object via a local- or
wide-area network.
 .   The transfer, by whatever means, of an executable object from a
system owned by one administrative group to a system owned by
another.
 .   The "downloading" of an executable object to a workstation or
other system from a file-server, "host" computer, or other in
formation service.
 .   The "uploading" of an executable object from a workstation or
other system to any information service.
 .   The copying or moving of an object from the set of objects
accessible to one user in a multi-user system to the set of objects
accessible by another.
 .   The copying or moving of an object from one com...