METHOD AND APPARATUS FOR COMBATING WEB-BASED SURREPTITIOUS BINARY INSTALLATIONS
First Claim
Patent Images
1. A method for combating web-based surreptitious binary installations on a computing device, the method comprising:
- intercepting a download of a file to a local file system of the computing device;
storing the file in the local file system when the file is correlated with a user consent; and
storing the file in a secure zone of the computing device when the file is not correlated with a user consent, wherein files stored in the secure zone cannot be executed or propagated.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method and apparatus for combating web-based surreptitious binary installations. One embodiment of a method combating web-based surreptitious binary installations on a computing device includes intercepting a download of a file to a local file system of the computing device, storing the file in the local file system when the file is correlated with a user consent, and storing the file in a secure zone of the computing device when the file is not correlated with a user consent, wherein files stored in the secure zone cannot be executed or propagated.
-
Citations
20 Claims
-
1. A method for combating web-based surreptitious binary installations on a computing device, the method comprising:
-
intercepting a download of a file to a local file system of the computing device; storing the file in the local file system when the file is correlated with a user consent; and storing the file in a secure zone of the computing device when the file is not correlated with a user consent, wherein files stored in the secure zone cannot be executed or propagated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable medium containing an executable program for combating web-based surreptitious binary installations on a computing device, where the program performs steps comprising:
-
intercepting a download of a file to a local file system of the computing device; storing the file in the local file system when the file is correlated with a user consent; and storing the file in a secure zone of the computing device when the file is not correlated with a user consent, wherein files stored in the secure zone cannot be executed or propagated. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for combating web-based surreptitious binary installations on a computing device, the system comprising:
-
an I/O redirector for intercepting a download of a file to a local file system of the computing device; a correlator for correlating the file to a user consent; a local file system for storing the file when the file is correlated with a user consent; and a secure zone for storing the file when the file is not correlated with a user consent, wherein the secure zone prevents the file from executing or propagating. - View Dependent Claims (18, 19, 20)
-
Specification