Systems and methods for neutralizing unauthorized attempts to monitor user activity
First Claim
Patent Images
1. A computer-implemented method, comprising:
- setting a hook to receive messages that are indicative of user activity; and
scrambling at least one of the messages to neutralize a malware that is attempting to monitor the user activity.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for neutralizing unauthorized attempts to monitor user activity are described. In one embodiment, a system includes a detection module configured to detect an attempt to receive a message that is related to a protected application program. The system also includes a neutralization module configured to set a hook to neutralize the attempt.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
setting a hook to receive messages that are indicative of user activity; and
scrambling at least one of the messages to neutralize a malware that is attempting to monitor the user activity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium comprising executable instructions to:
-
intercept a message that would otherwise be received by a keylogger; and
process the message so that the keylogger is rendered substantially ineffective. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system of managing malware, comprising:
-
a detection module configured to detect an attempt to receive a message that is related to a protected application program; and
a neutralization module configured to set a hook to neutralize the attempt. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification