System and method for detecting malicious applications
First Claim
Patent Images
1. A method for detecting malicious applications comprising:
- determining whether a communication is attempting to occur, wherein the communication is associated with a first application;
determining whether there is a second application associated with the first application; and
determining whether the second application is trusted.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for detecting malicious computer applications. According to an embodiment of the present invention, it is determined whether a communication is attempting to occur, wherein the communication is associated with a first application. It is also determined whether there is a second application associated with the first application; and also determined whether the second application is trusted.
28 Citations
20 Claims
-
1. A method for detecting malicious applications comprising:
-
determining whether a communication is attempting to occur, wherein the communication is associated with a first application;
determining whether there is a second application associated with the first application; and
determining whether the second application is trusted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for detecting malicious applications comprising:
-
a processor configured to determine whether a communication is attempting to occur, wherein the communication is associated with a first application;
determine whether there is a second application associated with the first application; and
determine whether the second application is trusted; and
a memory coupled with the processor, wherein the memory provides instructions to the processor. - View Dependent Claims (12, 15, 16, 17, 18, 19)
-
-
20. A computer program product for detecting malicious applications, the computer program product being embodied in a computer readable medium and comprising computer instructions for:
-
determining whether a communication is attempting to occur, wherein the communication is associated with a first application;
determining whether there is a second application associated with the first application; and
determining whether the second application is trusted.
-
Specification