System and method for detecting malicious applications
First Claim
Patent Images
1. A method for handling communications associated with computer applications comprising:
- determining whether a communication from a first computer to a second computer is attempting to occur, wherein the communication is associated with a first application that is trusted;
determining whether a second application launched the first application;
determining whether the second application is trusted; and
initiating a security response relating to the communication in the event it is determined that the second application is not trusted.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for detecting malicious computer applications. According to an embodiment of the present invention, it is determined whether a communication is attempting to occur, wherein the communication is associated with a first application. It is also determined whether there is a second application associated with the first application; and also determined whether the second application is trusted.
-
Citations
14 Claims
-
1. A method for handling communications associated with computer applications comprising:
-
determining whether a communication from a first computer to a second computer is attempting to occur, wherein the communication is associated with a first application that is trusted; determining whether a second application launched the first application; determining whether the second application is trusted; and initiating a security response relating to the communication in the event it is determined that the second application is not trusted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for handling communications associated with computer applications comprising:
-
a processor configured to; determine whether a communication from a first computer to a second computer is attempting to occur, wherein the communication is associated with a first application; determine whether a second application launched the first application; determine whether the second application is trusted; and initiate a security response relating to the communication in the event it is determined that the second application is not trusted; and a memory coupled with the processor, wherein the memory provides instructions to the processor. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium for handling communications associated with computer applications, the storage medium comprising computer instruction for:
-
determining whether a communication from a first computer to a second computer is attempting to occur, wherein the communication is associated with a first application; determining whether a second application launched the first application; determining whether the second application is trusted; and initiating a security response relating to the communication in the event it is determined that the second application is not trusted.
-
Specification