Patents Assigned to WholeSecurity, Inc.
  • Publication number: 20040187023
    Abstract: From a first information handling system (“IHS”) to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.
    Type: Application
    Filed: January 30, 2004
    Publication date: September 23, 2004
    Applicant: WholeSecurity, Inc.
    Inventors: Michael Anthony Alagna, Mark Eric Obrecht, Charles Andrew Payne, Peter Norwood
  • Publication number: 20040123157
    Abstract: In a first embodiment, an information handling system determines whether a resource is likely misrepresented as a trusted resource within a global computer network. In a second embodiment, the information handling system outputs an indication of whether a resource within a global computer network is recognized as a known trusted resource.
    Type: Application
    Filed: December 11, 2003
    Publication date: June 24, 2004
    Applicant: WholeSecurity, Inc.
    Inventors: Michael Anthony Alagna, Charles Andrew Payne, Luca Loiodice, Todd Allen Smith
  • Publication number: 20040098607
    Abstract: A method for implementing an online transaction security product includes downloading an online transaction security product program from a web site to an information handling system. The security product program includes an anti-malicious code program configured to detect malicious code on the information handling system. Lastly, the security product program is executed, wherein the anti-malicious code program of the security product program operates to detect malicious code on the information handling system.
    Type: Application
    Filed: February 4, 2003
    Publication date: May 20, 2004
    Applicant: WholeSecurity, Inc.
    Inventors: Michael Tony Alagna, Mark Obrecht, Andy Payne, Peter Norwood
  • Publication number: 20040064736
    Abstract: Malicious code detection code is executed by an information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation. The detection routines associate weights to respective code under investigation in response to detections of a valid program or malicious code as a function of the detection routines. It is determined whether code under investigation is a valid program or malicious code as a function of the weights associated by the detection routines.
    Type: Application
    Filed: August 25, 2003
    Publication date: April 1, 2004
    Applicant: WholeSecurity, Inc.
    Inventors: Mark Eric Obrecht, Michael Anthony Alagna, Charles Andrew Payne
  • Publication number: 20040054917
    Abstract: A method for detecting malicious code on an information handling system includes executing malicious code detection code (MCDC) on the information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation running on the information handling system during the execution of the MCDC. The detection routines associate weights to respective executable code under investigation in response to detections of a valid program or malicious code as a function of respective detection routines. Lastly, executable code under investigation is determined a valid program or malicious code as a function of the weights associated by the detection routines. Computer-readable media and an information handling system are also disclosed.
    Type: Application
    Filed: August 30, 2002
    Publication date: March 18, 2004
    Applicant: WholeSecurity, Inc.
    Inventors: Mark Obrecht, Michael Tony Alagna, Andy Payne