Ex parte ARNOLD et al. - Page 2




          Appeal No. 1997-3499                                                        
          Application 08/366,281                                                      

               This is a decision on appeal under 35 U.S.C. § 134 from                
          the final rejection of claims 1, 8, 9, 16, 17, and 21.                      
          Claims 2-7, 10-15, 18-20, and 22 stand objected to.                         
               We reverse.                                                            
                                     BACKGROUND                                       
               The disclosed invention relates to a virus signature                   
          detection method and system for locating virus patterns during              
          normal memory "scrubbing" operations.                                       
               Claim 1 is reproduced below.                                           
                    1.  A method for operating a computer system having               
               a central processing unit (CPU) for processing data                    
               responsive to interrupt signals and stored instructions,               
               having a memory for storing data in a plurality of                     
               addressable locations and having scrubbing means for the               
               continuous autonomous detection and correction of soft                 
               bit errors in said data stored in said memory, said                    
               method comprising the steps of:                                        
                    (a) providing one or more items of said data read by              
               said scrubbing means from a first memory address;                      
                    (b) mapping said one or more data items to produce a              
               code signature related to said one or more data items                  
               according to a first predetermined transformation;                     
                    (c) comparing said code signature to each of one or               
               more stored target signatures to determine a measure of                
               similarity therebetween;                                               
                    (d) producing a CPU interrupt signal when said                    
               measure of similarity equals or exceeds a predetermined                
               threshold; and                                                         

                                        - 2 -                                         





Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  Next 

Last modified: November 3, 2007