Patents Assigned to Webroot Software, Inc.
  • Publication number: 20120005752
    Abstract: A method and system for detecting and removing a hidden pestware file is described. One illustrative embodiment detects, using direct drive access, a file on a computer storage device; determines whether the file is also detectable by the operating system by attempting to access the file using a standard file Application-Program-Interface (API) function call of the operating system; identifies the file as a potential hidden pestware file, when the file is undetectable by the operating system; confirms through an automated pestware-signature scan of the potential hidden pestware file that the potential hidden pestware file is a hidden pestware file; and removes automatically, using direct drive access, the hidden pestware file from the storage device.
    Type: Application
    Filed: July 18, 2011
    Publication date: January 5, 2012
    Applicant: WEBROOT SOFTWARE, INC.
    Inventor: Patrick Sprowls
  • Patent number: 8079032
    Abstract: A method and system for rendering harmless a locked pestware executable object is described. In one illustrative embodiment, a locked pestware executable object is detected on a storage device of a computer, the locked pestware executable object being inaccessible via the computer's operating system; the locked pestware executable object is accessed through direct drive access; and data in the locked pestware executable object is modified in a manner that renders it harmless to the computer.
    Type: Grant
    Filed: March 22, 2006
    Date of Patent: December 13, 2011
    Assignee: Webroot Software, Inc.
    Inventor: Tony Nichols
  • Publication number: 20110289587
    Abstract: A method and system for detecting and removing a hidden pestware file is described. One illustrative embodiment detects, using direct drive access, a file on a computer storage device; determines whether the file is also detectable by the operating system by attempting to access the file using a standard file Application-Program-Interface (API) function call of the operating system; identifies the file as a potential hidden pestware file, when the file is undetectable by the operating system; confirms through an automated pestware-signature scan of the potential hidden pestware file that the potential hidden pestware file is a hidden pestware file; and removes automatically, using direct drive access, the hidden pestware file from the storage device.
    Type: Application
    Filed: July 18, 2011
    Publication date: November 24, 2011
    Applicant: WEBROOT SOFTWARE, INC.
    Inventor: Patrick Sprowls
  • Patent number: 8065664
    Abstract: A system and method for defining and detecting pestware is described. One embodiment includes receiving a file and placing at least a portion of the file into a processor-readable memory of a computer. A plurality of execution paths within code of the pestware file are followed and particular instructions within the execution paths are identified. A representation of the relative locations of each of the particular instructions within the code of the file are compared against a pestware-definition file so as to determine whether the file is a potential pestware file.
    Type: Grant
    Filed: August 7, 2006
    Date of Patent: November 22, 2011
    Assignee: Webroot Software, Inc.
    Inventor: Michael Burtscher
  • Patent number: 8065514
    Abstract: A system and method for enabling access to user-level data is described. One embodiment includes accessing a user-level portable executable (PE) file. In this embodiment, the boot-loader registry of a computer is modified during an installation period to include a reference to the user-level PE file. The operating system uses the reference during an early boot-time to image the PE file into memory as a boot-file.
    Type: Grant
    Filed: July 2, 2010
    Date of Patent: November 22, 2011
    Assignee: Webroot Software, Inc.
    Inventor: Min Wang
  • Publication number: 20110239298
    Abstract: Systems, methods and non-transitory, tangible computer readable storage mediums encoded with processor readable instructions to scan files for malware are disclosed. An exemplary method includes writing, via a communication pathway, a first file to a storage medium that is utilized by the computer, requesting access to the first file so as to enable the first file to be scanned for malware, and delaying, when the first file resides on the storage medium, access to the first file while there is at least one I/O operation relative to the storage medium that has a higher priority level than a priority level of the request to access the first file. In addition, except to enable the first file to be scanned for malware, access to the first file is prevented until the first file has been scanned for malware.
    Type: Application
    Filed: March 25, 2010
    Publication date: September 29, 2011
    Applicant: WEBROOT SOFTWARE, INC.
    Inventor: Michael Burtscher
  • Publication number: 20110197272
    Abstract: Systems and methods for protecting client computers are described. One method includes receiving webpage data at a proxy from a webpage before the data reaches an intended recipient; gathering scripting-language-data from the webpage data; normalizing the scripting-language-data so as to generate normalized data; emulating execution of the normalized scripting-language-data with a inspection-point-script-execution engine that that is adapted to provide inspection points instead of effectuating particular functions, and determining whether to block the data from the intended recipient by analyzing inspection-data collected from the inspection points.
    Type: Application
    Filed: February 9, 2010
    Publication date: August 11, 2011
    Applicant: WEBROOT SOFTWARE, INC.
    Inventor: Rajesh Mony
  • Patent number: 7996898
    Abstract: A system and method for reducing false positive indications of pestware on a protected computer is disclosed. In one variation, the method includes tracking activities of a user at the protected computer, monitoring events at the protected computer, identifying events that are potentially indicative of pestware, comparing at least one of the events with at least one of the activities of the user and initiating, in response to the comparing indicating the activities of the user are unconnected with the events, a user prompt that informs the user about the events to enable the user to make a decision relative to managing the events.
    Type: Grant
    Filed: October 25, 2005
    Date of Patent: August 9, 2011
    Assignee: Webroot Software, Inc.
    Inventors: Sarah L. Mood, Bradley D. Stowers, Michael P. Greene
  • Patent number: 7996903
    Abstract: A method and system for detecting and removing a hidden pestware file is described. One illustrative embodiment detects, using direct drive access, a file on a computer storage device; determines whether the file is also detectable by the operating system by attempting to access the file using a standard file Application-Program-Interface (API) function call of the operating system; identifies the file as a potential hidden pestware file, when the file is undetectable by the operating system; confirms through an automated pestware-signature scan of the potential hidden pestware file that the potential hidden pestware file is a hidden pestware file; and removes automatically, using direct drive access, the hidden pestware file from the storage device.
    Type: Grant
    Filed: July 7, 2006
    Date of Patent: August 9, 2011
    Assignee: Webroot Software, Inc.
    Inventor: Patrick Sprowls
  • Patent number: 7971249
    Abstract: Systems and methods for managing pestware processes on a protected computer are described. In one implementation, a reference point in the executable memory that is associated with a process running in the executable memory is located. A first and second sets of information from corresponding first and second portions of the executable memory are then retrieved. The first and second portions of the executable memory are separated by a defined offset, and each of the first and second portions of the executable memory are offset from the reference point. The process is identifiable as a particular type of pestware when the first and second sets of information each include information previously found to be separated by the defined offset in other processes that are of the particular type of pestware. In some variations, the reference point is a starting address and/or an API implementation in the process.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: June 28, 2011
    Assignee: Webroot Software, Inc.
    Inventor: Jefferson Delk Horne
  • Publication number: 20100313006
    Abstract: A system and method for enabling access to user-level data is described. One embodiment includes accessing user-level data associated with a kernel-level function using a portable executable (PE) file. The user-level data is accessed during a boot-time of a computer. In this embodiment, the PE file is also accessed using the computer.
    Type: Application
    Filed: July 2, 2010
    Publication date: December 9, 2010
    Applicant: WEBROOT SOFTWARE, INC.
    Inventor: Min Wang
  • Publication number: 20100306522
    Abstract: A system and method for enabling access to user-level data is described. One embodiment includes accessing a user-level portable executable (PE) file. In this embodiment, the boot-loader registry of a computer is modified during an installation period to include a reference to the user-level PE file. The operating system uses the reference during an early boot-time to image the PE file into memory as a boot-file.
    Type: Application
    Filed: July 2, 2010
    Publication date: December 2, 2010
    Applicant: WEBROOT SOFTWARE, INC.
    Inventor: Min Wang
  • Patent number: 7769992
    Abstract: A system and method for enabling access to user-level data is described. One embodiment includes accessing user-level data associated with a kernel-level function using a portable executable (PE) file. The user-level data is accessed during a boot-time of a computer. In this embodiment, the PE file is also accessed using the computer.
    Type: Grant
    Filed: August 18, 2006
    Date of Patent: August 3, 2010
    Assignee: Webroot Software, Inc.
    Inventor: Min Wang
  • Patent number: 7721333
    Abstract: A method and system for detecting a keylogger on a computer is described. One illustrative embodiment creates, in a memory of the computer, a hidden window; generates a unique, unpredictable data pattern; inputs, to the hidden window, the unique, unpredictable data pattern in a manner that mimics keyboard input from a user; scans running processes in the memory other than a keylogger detection process for the unique, unpredictable data pattern; and performs a secondary scan of a suspect process, the suspect process having an associated buffer that contains the unique, unpredictable data pattern.
    Type: Grant
    Filed: January 18, 2006
    Date of Patent: May 18, 2010
    Assignee: Webroot Software, Inc.
    Inventor: Jefferson Delk Horne
  • Patent number: 7591016
    Abstract: Systems and methods for managing pestware processes on a protected computer are described. In one implementation, a reference point in the executable memory that is associated with a process running in the executable memory is located. A first and second sets of information from corresponding first and second portions of the executable memory are then retrieved. The first and second portions of the executable memory are separated by a defined offset, and each of the first and second portions of the executable memory are offset from the reference point. The process is identifiable as a particular type of pestware when the first and second sets of information each include information previously found to be separated by the defined offset in other processes that are of the particular type of pestware. In some variations, the reference point is a starting address and/or an API implementation in the process.
    Type: Grant
    Filed: April 14, 2005
    Date of Patent: September 15, 2009
    Assignee: Webroot Software, Inc.
    Inventor: Jefferson Delk Horne
  • Patent number: 7590707
    Abstract: A method and system for identifying network addresses associated with suspect network destinations is described.
    Type: Grant
    Filed: August 7, 2006
    Date of Patent: September 15, 2009
    Assignee: Webroot Software, Inc.
    Inventors: Harry Murphey McCloy, III, Craig Mitchell Shifman
  • Patent number: 7571476
    Abstract: Systems and methods for managing multiple related pestware processes on a protected computer are described. One embodiment is configured to identify a location of each of a plurality of files in at least one file storage device of the protected computer and store a list of the location of each of the plurality of files. The list of the plurality of files is then sorted so as to generate a sorted list. Each of the plurality of files is then sequentially accessed as listed in the sorted list so as to retrieve information from each of the plurality of files. Information from the plurality of files is then analyzed to determine whether any of the plurality of files are potential pestware files. In variations, the files in the file storage device are enumerated, and information from the files is accessed, by circumventing the operating system of the protected computer.
    Type: Grant
    Filed: April 14, 2005
    Date of Patent: August 4, 2009
    Assignee: Webroot Software, Inc.
    Inventor: Jefferson Delk Horne
  • Patent number: 7565695
    Abstract: Systems and methods for scanning files for pestware on a protected computer are described. In one variation, locations of each of a plurality of files in a file storage device of the protected computer are identified while substantially circumventing an operating system of the protected computer. Information from each of the plurality of files is retrieved and analyzed so as to determine whether any of the plurality of files are potential pestware files. In variations, the operating system is circumvented while the information from each of the plurality of files is retrieved. In other variations, before information is retrieved from each of the plurality of files, a listing of the plurality of files is sorted according to the locations of the files on the storage device so as to reduce, even further, the time required to access the plurality of files.
    Type: Grant
    Filed: April 12, 2005
    Date of Patent: July 21, 2009
    Assignee: Webroot Software, Inc.
    Inventor: Michael Burtscher
  • Publication number: 20090144826
    Abstract: Systems and methods for identifying malware distribution sites are described. In one embodiment, a system includes a malware detection module configured to analyze a file of a protected computer to determine that the file is associated with malware. The system also includes a Web site identification module configured to search a download history log of the protected computer to identify a Web site from which the file was downloaded.
    Type: Application
    Filed: June 30, 2005
    Publication date: June 4, 2009
    Applicant: Webroot Software, Inc.
    Inventor: Paul Piccard
  • Patent number: 7533131
    Abstract: Systems and methods for managing pestware are described. One system includes a pestware shield configured to detect pestware activity on a protected computer; a heuristics engine configured to identify repeat pestware activity; a drive scan module configured to scan files stored on the storage device and to identify pestware in the scanned files; a program memory scan module configured to scan programs running in the program memory of the protected computer and to identify pestware in the scanned programs; a registry scan module configured to identify any attempts to change data in the registry file; and a quarantine module configured to quarantine the pestware identified by either the drive scan module or the program memory module.
    Type: Grant
    Filed: October 1, 2004
    Date of Patent: May 12, 2009
    Assignee: Webroot Software, Inc.
    Inventors: Steve Thomas, Bradley D. Stowers, Kevin Barton, Jeffery Herman