Abstract: From a first information handling system (“IHS”) to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.
Type:
Application
Filed:
January 30, 2004
Publication date:
September 23, 2004
Applicant:
WholeSecurity, Inc.
Inventors:
Michael Anthony Alagna, Mark Eric Obrecht, Charles Andrew Payne, Peter Norwood
Abstract: In a first embodiment, an information handling system determines whether a resource is likely misrepresented as a trusted resource within a global computer network. In a second embodiment, the information handling system outputs an indication of whether a resource within a global computer network is recognized as a known trusted resource.
Type:
Application
Filed:
December 11, 2003
Publication date:
June 24, 2004
Applicant:
WholeSecurity, Inc.
Inventors:
Michael Anthony Alagna, Charles Andrew Payne, Luca Loiodice, Todd Allen Smith
Abstract: A method for implementing an online transaction security product includes downloading an online transaction security product program from a web site to an information handling system. The security product program includes an anti-malicious code program configured to detect malicious code on the information handling system. Lastly, the security product program is executed, wherein the anti-malicious code program of the security product program operates to detect malicious code on the information handling system.
Type:
Application
Filed:
February 4, 2003
Publication date:
May 20, 2004
Applicant:
WholeSecurity, Inc.
Inventors:
Michael Tony Alagna, Mark Obrecht, Andy Payne, Peter Norwood
Abstract: Malicious code detection code is executed by an information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation. The detection routines associate weights to respective code under investigation in response to detections of a valid program or malicious code as a function of the detection routines. It is determined whether code under investigation is a valid program or malicious code as a function of the weights associated by the detection routines.
Type:
Application
Filed:
August 25, 2003
Publication date:
April 1, 2004
Applicant:
WholeSecurity, Inc.
Inventors:
Mark Eric Obrecht, Michael Anthony Alagna, Charles Andrew Payne
Abstract: A method for detecting malicious code on an information handling system includes executing malicious code detection code (MCDC) on the information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation running on the information handling system during the execution of the MCDC. The detection routines associate weights to respective executable code under investigation in response to detections of a valid program or malicious code as a function of respective detection routines. Lastly, executable code under investigation is determined a valid program or malicious code as a function of the weights associated by the detection routines. Computer-readable media and an information handling system are also disclosed.
Type:
Application
Filed:
August 30, 2002
Publication date:
March 18, 2004
Applicant:
WholeSecurity, Inc.
Inventors:
Mark Obrecht, Michael Tony Alagna, Andy Payne