Techniques for protecting against unauthorized tech support calls
First Claim
1. A computer-implemented method for protecting against unauthorized tech support voice calls, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- registering a client security application installed on a client computing device, wherein the client security application is associated with a mobile computing device such that the client security application and a mobile security application installed on the mobile computing device share a common license key, wherein the client computing device is separate from the mobile computing device;
receiving a notification to start monitoring the client computing device, the notification being triggered after a voice call commences on the mobile computing device;
monitoring activities of the client computing device for a change to the client computing device that presents security risks to the client computing device;
alerting a user of the client computing device of the security risks to the client computing device associated with the activities; and
preventing one or more of the activities of the client computing device to protect the client computing device from security risks associated with the one or more prevented activities.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for protecting against unauthorized technique support calls are disclosed. In one embodiment, the techniques may be realized as a system for protecting against unauthorized technique support calls including one or more computer processors. The one or more computer processors may be configured to register a client security application installed on a client device. The client security application may be associated with a mobile device. The client device may be separate from the mobile device. The one or more computer processors may further be configured to receive a notification to start monitoring the client device. The one or more computer processors may further be configured to monitor activities of the client device. The one or more computer processors may further be configured to alert a user of the client device for security risks associated with the activities.
-
Citations
13 Claims
-
1. A computer-implemented method for protecting against unauthorized tech support voice calls, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
registering a client security application installed on a client computing device, wherein the client security application is associated with a mobile computing device such that the client security application and a mobile security application installed on the mobile computing device share a common license key, wherein the client computing device is separate from the mobile computing device; receiving a notification to start monitoring the client computing device, the notification being triggered after a voice call commences on the mobile computing device; monitoring activities of the client computing device for a change to the client computing device that presents security risks to the client computing device; alerting a user of the client computing device of the security risks to the client computing device associated with the activities; and preventing one or more of the activities of the client computing device to protect the client computing device from security risks associated with the one or more prevented activities. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable medium storing a computer-readable program for protecting against unauthorized tech support voice calls, comprising:
-
computer-readable instructions to register a client security application installed on a client computing device, wherein the client security application is associated with a mobile computing device such that the client security application and a mobile security application installed on the mobile computing device share a common license key, wherein the client computing device is separate from the mobile computing device; computer-readable instructions to receive a notification to start monitoring the client computing device, the notification being triggered after a voice call commences on the mobile computing device; computer-readable instructions to monitor activities of the client computing device for a change to the client computing device that presents security risks to the client computing device; computer-readable instructions to alert a user of the client computing device of the security risks to the client computing device associated with the activities; and computer-readable instructions to prevent one or more of the activities of the client computing device to protect the client computing device from security risks associated with the one or more prevented activities. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification