METHOD AND SYSTEM FOR PROTECTION AGAINST INFORMATION STEALING SOFTWARE
First Claim
1. A computer-implemented method for verifying whether data transmitted over a computer network is a password, the method comprising the step of analyzing the data with a weak validation file to identify passwords.
16 Assignments
0 Petitions
Accused Products
Abstract
A system and method for identifying infection of unwanted software on an electronic device is disclosed. A software agent configured to generate a bait and is installed on the electronic device. The bait can simulate a situation in which the user performs a login session and submits personal information or it may just contain artificial sensitive information. Parameters may be inserted into the bait such as the identity of the electronic device that the bait is installed upon. The output of the electronic device is monitored and analyzed for attempts of transmitting the bait. The output is analyzed by correlating the output with the bait and can be done by comparing information about the bait with the traffic over a computer network in order to decide about the existence and the location of unwanted software. Furthermore, it is possible to store information about the bait in a database and then compare information about a user with the information in the database in order to determine if the electronic device that transmitted the bait contains unwanted software.
403 Citations
10 Claims
- 1. A computer-implemented method for verifying whether data transmitted over a computer network is a password, the method comprising the step of analyzing the data with a weak validation file to identify passwords.
-
5. A system for verifying whether data transmitted over a computer network is a password, the system comprising:
a traffic analyzer in communication with the computer network, the traffic analyzer being configured to analyze the data with a weak validation file in order to identify passwords. - View Dependent Claims (6, 7)
-
8. A system for verifying whether data transmitted over a computer network is a password, the system comprising:
data analyzer means in communication with the computer network, the data analyzer means using a weak validation file to analyze the data and determine whether the data is a password. - View Dependent Claims (9, 10)
Specification