System and method for preventing detection of a selected process running on a computer
First Claim
Patent Images
1. A method for concealing from a user a monitoring process running on a computer, comprising:
- receiving from the user a request to access a process file concerning a process running on the computer;
determining whether the process file requested by the user relates to the monitoring process; and
in the event that the requested process file does not relate to the monitoring process, providing the user with access to the process file;
wherein the process file associated with the monitoring process is associated with a process information pseudo file system and contains process information about the monitoring process; and
providing the user with access to the process file would reveal to the user existence of the monitoring process.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for preventing detection of a monitoring process running on a computer. A request to access a process file concerning a process running on the computer is received from a user. It is determined whether the process file requested by the user relates to the selected process. If the requested process file does not relate to the selected process, the user is provided with access to the file.
111 Citations
20 Claims
-
1. A method for concealing from a user a monitoring process running on a computer, comprising:
-
receiving from the user a request to access a process file concerning a process running on the computer; determining whether the process file requested by the user relates to the monitoring process; and in the event that the requested process file does not relate to the monitoring process, providing the user with access to the process file; wherein the process file associated with the monitoring process is associated with a process information pseudo file system and contains process information about the monitoring process; and
providing the user with access to the process file would reveal to the user existence of the monitoring process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for concealing from a user a monitoring process running on a computer, comprising:
-
a computer configured to monitor an interaction of the user with a deception environment;
receive from the user a request to access a process file concerning a process running on the computer, determine whether the process file requested by the user relates to the monitoring process and, in the event that the requested file does not relate to the monitoring process, provide the user with access to the process file;wherein the process file is associated with a process information pseudo file system and contains process information about the monitoring process; and
providing the user with access to the process file would reveal to the user existence of the monitoring process. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer program product for concealing from a user a selected process running on a computer, the computer program product being embodied in a computer readable medium and comprising computer instructions for:
-
monitoring an interaction of the user with a deception environment; receiving from the user a request to access a process file concerning a process running on the computer; determining whether the process file requested by the user relates to the monitoring process; and in the event that the requested process file does not relate to the monitoring process, providing the user with access to the process file; wherein the process file is associated with a process information pseudo file system and contains process information about the monitoring process; and
providing the user with access to the process file would reveal to the user existence of the monitoring process. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification