×

Systems and methods for obtaining information about security threats on endpoint devices

  • US 10,262,131 B2
  • Filed: 05/06/2016
  • Issued: 04/16/2019
  • Est. Priority Date: 03/22/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for obtaining information about security threats on endpoint devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • detecting, by a security program on the computing device, an attempt to access at least one suspicious file;

    before permitting the computing device to access the suspicious file;

    searching, by the security program, a security database utilized by the security program for information indicative of the trustworthiness of the suspicious file; and

    determining, by the security program, based on the search, that the security database does not store the information indicative of the trustworthiness of the suspicious file;

    in response to determining that the security database does not store the information indicative of the trustworthiness of the suspicious file;

    identifying, by the security program, at least one third-party resource that;

    is not associated with the security program; and

    is at least partially responsible for developing the suspicious file;

    determining, based on the third-party resource being at least partially responsible for developing the suspicious file, that the third-party resource potentially contains information about behaviors the suspicious file is expected to perform on the computing device;

    performing, by the security program, an online search for the third-party resource by identifying a server that is hosted by the third-party resource and potentially stores the information about the behaviors the suspicious file is expected to perform on the computing device; and

    accessing, by the security program, the server to obtain the information about the behaviors the suspicious file is expected to perform on the computing device;

    determining, by the security program based at least in part on the information about the behaviors the suspicious file is expected to perform on the computing device, whether the suspicious file represents a security threat to the computing device; and

    adding, by the security program, information to the security database that indicates whether the suspicious file represents the security threat.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×