Antivirus Signature Distribution With Distributed Ledger

  • Published: Oct 12, 2017
  • Earliest Priority: Mar 28 2016
  • Family: 5
  • Cited Works: 1
  • Cited by: 0
  • Cites: 1
  • Additional Info: Full text

This document generally describes techniques for using a distributed ledger to implement a framework for the validation and distribution of virus signatures, which may be used by antivirus engines on computing devices to detect and remove malware. Some implementations can include accessing, by a computing system, data that identifies a plurality of virus signatures. A signature score associated with a first virus signature can be identified that is determined based on a number of signature authorities that have submitted or endorsed the first virus signature. The computing system may determine whether the first virus signature is valid based on whether the signature score satisfies a threshold score. In response to determining that the first virus signature is valid, the first virus signature can be used by the computing system to perform virus scans of one or more files maintained by the computing system. Identify Virus 1 Generate Signature for Virus 1 Submit Virus 1 Signature to Distributed Ledger Identify Signature for Virus 2 in Distributed Ledger Analyze Virus 2 Signature to Determine Effectiveness Virus 2 Signature Effective? Yes ,,No Submit Endorsement of Virus 2 to I Do Not Submit Endorsement of Distributed Ledger I Virus 2 to Distributed Ledger 414 416 | Submit Negative Endorsement of Virus 2 to Distributed Ledger

Download PDF
Document Preview
Document History
  • Publication: Oct 12, 2017
  • Application: Mar 20, 2017
    AU AU 2017/201870 A
  • Priority: Mar 28, 2016
    US US 201615082895 A

Download Citation

Sign in to the Lens