Nov. 13, 2012
ICAP Patent Brokerage
announces for auction malware scanning and cleaning IP portfolios from eAcceleration Corporation, which include patented automated malware removal and data scanning technologies. These portfolios will be included as two lots in the 17
ICAP Ocean Tomo IP Auction on
November 29, 2012
, at The Ritz Carlton in
San Francisco, California
"We are excited to be offering these improved anti-malware technologies to our global base of buyers. This technology could be an exclusive differentiator as it provides automated, high-level protection for computers and other electronic devices from viruses and other malicious software," says
, CEO of ICAP Patent Brokerage.
Key Characteristics & Benefits
As Internet communications proliferate and the demand for digital security increases, anti-malware software applications are crucial to protecting computers, and ultimately, computer users – individuals, government institutions, or large corporations. The described patents are relevant to any company wishing to manufacture and/or provide software solutions for the scanning and automated cleaning of computers for viruses, spyware, adware, or other unwanted programs.
Lot 23 – Accelerated Data & File Scanning
The first sales offering includes an improved method for testing files and other digital objects stored on a hard disk drive for predefined patterns, such as those associated with malware. This technology accelerates file scanning by using an index of drive cylinders and physical addresses, plus parallel data streaming. Thus, creating an efficient means of virus and malware scanning that takes less time than traditional file by file, byte by byte scanning. The method also consumes less processing resources freeing up resources for other tasks in the computer.
Lot 24 – Automated Malware Removal
The second portfolio for sale includes an automated virus and malware cleaner that recognizes a potential malware infection – virus or undesirable software – and removes the intrusion. Malware frequently infiltrates a user's computer or electronic device beyond where an individual can direct anti-malware programs to remedy the situation. Once a potential infection is identified, the patented system calculates the extent of malware infiltration on system resources and programs, and then downloads and performs the necessary malware removal operations.