Detecting an audio/visual threat
First Claim
Patent Images
1. A method of detecting if a processing system has been compromised with audio/visual threat, wherein the method comprises:
- identifying a requesting entity and a target entity, wherein the requesting entity originates one or more requests to perform an activity in relation to the target entity, and wherein the target entity comprises an audio and/or visual communication device of the processing system;
intercepting the one or more requests to perform the activity associated with the audio and/or visual communication device of the processing system;
recording the intercepted one or more requests and properties associated with the requesting entity and the target entity in an intercepted request log file; and
performing a behavioural analysis of a trend in the processing system using the intercepted request log file to determine if the processing system exhibits behavioural characteristics indicative of the processing system having been compromised with an audio/visual threat.
7 Assignments
0 Petitions
Accused Products
Abstract
A method, system, computer program product and/or computer readable medium of instructions for detecting if a processing system has been compromised with audio/visual threat. The method comprises steps of intercepting one or more requests to perform an activity associated with an audio and/or visual communication device of the processing system; and performing a behavioural analysis of the processing system to determine if the processing system exhibits behavioural characteristics indicative of the processing system having been compromised with an audio/visual threat.
16 Citations
20 Claims
-
1. A method of detecting if a processing system has been compromised with audio/visual threat, wherein the method comprises:
-
identifying a requesting entity and a target entity, wherein the requesting entity originates one or more requests to perform an activity in relation to the target entity, and wherein the target entity comprises an audio and/or visual communication device of the processing system; intercepting the one or more requests to perform the activity associated with the audio and/or visual communication device of the processing system; recording the intercepted one or more requests and properties associated with the requesting entity and the target entity in an intercepted request log file; and performing a behavioural analysis of a trend in the processing system using the intercepted request log file to determine if the processing system exhibits behavioural characteristics indicative of the processing system having been compromised with an audio/visual threat. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system to detect if a processing system has been compromised with audio/visual threat, the system comprising:
-
a processor; memory in electronic communication with the processor; an interception module configured to; identify a requesting entity and a target entity, wherein the requesting entity originates one or more requests to perform an activity in relation to the target entity, and wherein the target entity comprises an audio and/or visual communication device of the processing system; intercept the one or more requests in the processing system to perform the activity associated with the audio and/or visual communication device of the processing system; record the intercepted one or more requests and properties associated with the requesting entity and the target entity in an intercepted request log file; and an analysis module configured to; perform a behavioural analysis of a trend in the processing system using the intercepted request log file to determine if the processing system exhibits behavioural characteristics indicative of the processing system having been compromised with an audio/visual threat. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product comprising a non-transitory computer readable medium having a computer program recorded therein or thereon, the computer program being configured to detect if a processing system has been compromised with audio/visual threat, wherein the computer program product configures the client processing system to:
-
identify a requesting entity and a target entity, wherein the requesting entity originates one or more requests to perform an activity in relation to the target entity, and wherein the target entity comprises an audio and/or visual communication device of the processing system; intercept the one or more requests in the processing system to perform the activity associated with the audio and/or visual communication device of the processing system; record the intercepted one or more requests and properties associated with the requesting entity and the target entity in an intercepted request log file; and perform a behavioural analysis of a trend in the processing system using the intercepted request log file to determine if the processing system exhibits behavioural characteristics indicative of the processing system having been compromised with an audio/visual threat.
-
Specification