Method of detecting computer security threats
First Claim
Patent Images
1. A method of detecting computer security threats, comprising the steps of:
- providing a reference database of selected parameters to be monitored relating to one of human behaviour when operating a computer or software behaviour during operation of a computer;
monitoring one of human behaviour or software behaviour originating from a selected computer over a time interval; and
comparing the monitored behaviours to the selected parameters in the reference database and determining the presence or absence of a potential security threat from such comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of detecting computer security threats. A first step involves providing a reference database of selected parameters to be monitored relating to one of human behaviour when operating a computer or software behaviour during operation of a computer. A second step involves monitoring one of human behaviour or software behaviour originating from a selected computer over a time interval. A third step involves comparing the monitored behaviours to the selected parameters in the reference database and determining the presence or absence of a potential security threat from such comparison.
25 Citations
10 Claims
-
1. A method of detecting computer security threats, comprising the steps of:
-
providing a reference database of selected parameters to be monitored relating to one of human behaviour when operating a computer or software behaviour during operation of a computer;
monitoring one of human behaviour or software behaviour originating from a selected computer over a time interval; and
comparing the monitored behaviours to the selected parameters in the reference database and determining the presence or absence of a potential security threat from such comparison. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of detecting computer security threats, comprising the steps of:
-
providing a reference database of selected parameters to be monitored relating to software behaviour during operation of a computer, the selected parameters tending to indicate a likelihood that viruses or spy ware are present in the software;
monitoring software behaviour originating from a selected computer over a time interval; and
comparing the monitored software behaviour to the selected parameters in the reference database and determining the presence or absence of a potential security threat posed by the software behaviour from such comparison. - View Dependent Claims (8)
-
-
9. A method of detecting computer security threats, comprising the steps of:
-
providing a reference database of selected parameters to be monitored relating to human behaviour when operating a computer, the selected parameters tending to indicate a likelihood of computer use by an unauthorized user;
monitoring human behaviour originating from a selected computer over a time interval; and
comparing the monitored human behaviour to the selected parameters in the reference database and determining the presence or absence of a potential security threat posed by an unauthorized user from such comparison. - View Dependent Claims (10)
-
Specification