International Business Machines Corporation
Automatic idle-state scanning for malicious code
Last updated:
Abstract:
A computer-implemented method may include obtaining a predicted idle-state duration of a first device. The computer-implemented method may further include obtaining a value corresponding to an available processing capacity of the first device. The computer-implemented method may further include making a first determination that the predicted idle-state duration of the first device exceeds a time required to perform a security scan of the first device using the available processing capacity of the first device. The computer-implemented method may further include making a second determination to perform a security scan of the first device in response to the first determination.
Status:
Grant
Type:
Utility
Filling date:
12 Apr 2019
Issue date:
10 Aug 2021