Method and system for detecting a keylogger on a computer
First Claim
Patent Images
1. A method for detecting a keylogger on a computer, comprising:
- creating, in a memory of the computer, a hidden window;
generating a unique, unpredictable data pattern;
inputting, to the hidden window, the unique, unpredictable data pattern in a manner that mimics keyboard input from a user;
scanning running processes in the memory other than a keylogger detection process for the unique, unpredictable data pattern; and
performing a secondary scan of a suspect process, the suspect process having an associated buffer that contains the unique, unpredictable data pattern.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and system for detecting a keylogger on a computer is described. One illustrative embodiment creates, in a memory of the computer, a hidden window; generates a unique, unpredictable data pattern; inputs, to the hidden window, the unique, unpredictable data pattern in a manner that mimics keyboard input from a user; scans running processes in the memory other than a keylogger detection process for the unique, unpredictable data pattern; and performs a secondary scan of a suspect process, the suspect process having an associated buffer that contains the unique, unpredictable data pattern.
-
Citations
20 Claims
-
1. A method for detecting a keylogger on a computer, comprising:
-
creating, in a memory of the computer, a hidden window; generating a unique, unpredictable data pattern; inputting, to the hidden window, the unique, unpredictable data pattern in a manner that mimics keyboard input from a user; scanning running processes in the memory other than a keylogger detection process for the unique, unpredictable data pattern; and performing a secondary scan of a suspect process, the suspect process having an associated buffer that contains the unique, unpredictable data pattern. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a processor; and a memory connected with the processor, the memory containing a plurality of program instructions to detect a keylogger on a computer, the plurality of program instructions being configured to cause the processor to; create, in the memory, a hidden window; generate a unique, unpredictable data pattern; input, to the hidden window, the unique, unpredictable data pattern in a manner that mimics keyboard input from a user; scan running processes in the memory other than a keylogger detection process for the unique, unpredictable data pattern; and perform a secondary scan of a suspect process, the suspect process having an associated buffer that contains the unique, unpredictable data pattern. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage medium containing program instructions to detect a keylogger on a computer, comprising:
-
a first instruction segment to create, in a memory of the computer, a hidden window; a second instruction segment to generate a unique, unpredictable data pattern; a third instruction segment to input, to the hidden window, the unique, unpredictable data pattern in a manner that mimics keyboard input from a user; a fourth instruction segment to scan running processes in the memory other than a keylogger detection process for the unique, unpredictable data pattern; and a fifth instruction segment to perform a secondary scan of a suspect process, the suspect process having an associated buffer that contains the unique, unpredictable data pattern. - View Dependent Claims (20)
-
Specification