发明名称 Adaptive integrity validation for portable information handling systems
摘要 Portable information handling systems dynamically allocate resources to anti-malware functions based upon available resources and threat status. Dynamic allocation of resources to anti-malware functions provides a timely and targeted response to specific threats with resources dedicated based upon availability and the impact on other information handling system functions. An adaptive mobile integrity validation system interfaces with plural portable information handling systems to selectively update anti-malware settings as threats emerge.
申请公布号 US9460283(B2) 申请公布日期 2016.10.04
申请号 US201213647872 申请日期 2012.10.09
申请人 DELL PRODUCTS L.P. 发明人 Gnesda Nicholas;Salunke Abhay
分类号 G06F21/00;G06F21/56 主分类号 G06F21/00
代理机构 Terrile, Cannatti, Chambers & Holland, LLP 代理人 Terrile, Cannatti, Chambers & Holland, LLP ;Holland Robert W.
主权项 1. An information handling system comprising: a housing; a processor disposed in the housing and operable to process information; memory disposed in the housing and interfaced with the processor to store the information; a network interface disposed in the housing and interfaced with the processor, the network interface operable to communicate with a network; and an integrity validation module executing on the processor and operable to dynamically change anti-malware settings based upon one or more predetermined factors detected at an information handling system, the anti-malware settings including at least the frequency of anti-malware scans, the integrity validation module receiving a notification from an external network location regarding a first threat and, in response to the notification, increasing anti-malware settings associated with the threat and decreasing anti-malware settings associated with at least a different second threat, the increasing and decreasing anti-malware settings causing an increase in processing resources spent protecting against the first threat and a decrease in processing resources spent protecting against the second threat; wherein the first threat comprises a threat associated with applications associated with keyed inputs made at the information handling system, the integrity validation module detecting whether a peripheral keyboard is connected at the housing or disconnected from the housing, the integrity validation module increasing anti-malware settings for the first threat if the peripheral keyboard is physically connected at the housing and decreasing the anti-malware settings for the first threat if the peripheral keyboard is physically disconnected at the housing.
地址 Round Rock TX US