×

ALTERNATE FILES RETURNED FOR SUSPICIOUS PROCESSES IN A COMPROMISED COMPUTER NETWORK

  • US 20150096048A1
  • Filed: 09/30/2014
  • Published: 04/02/2015
  • Est. Priority Date: 09/30/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of obscuring computer files from hackers in a computer, the method comprising:

  • monitoring read requests to a file system of a computer operating system;

    intercepting, at a software filter, a first read request for a first file before the first read request reaches the file system;

    ascertaining a file attribute of the first file to which the first read request is directed;

    identifying a process executable that posted the first read request;

    determining a security rating of the process executable;

    comparing the security rating to a threshold;

    revising, at the software filter, the first read request into a second read request, the revising based on the file attribute of the first file and the comparison; and

    sending the second read request to the file system.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×