System, method and computer program product for sending unwanted activity information to a central system
First Claim
Patent Images
1. A method, comprising:
- identifying information associated with unwanted activity, utilizing a plurality of different types of security systems of a client system, which includes a processor and a memory, and which is configured with a plurality of rules for resolving the unwanted activity independent of instructions provided by a central system, wherein at least one of the different types of security systems utilizes behavioral monitoring that includes heuristics;
sending the information to the central system for aggregating the information with additional information sets provided by additional client systems; and
receiving a response sent from the central system to the client and to the additional client systems, wherein the response is based on the information and is indicative of whether the information was verified as being associated with the unwanted activity, and wherein the response includes a rule for removing code associated with the unwanted activity, and the response includes a rule for detecting future instances of the information, and the response includes a rule for adding the information to a blacklist.
13 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for sending, to a central system, information associated with unwanted activity. In use, information associated with unwanted activity is identified utilizing a plurality of different types of security systems. Further, the information is sent to a central system.
-
Citations
14 Claims
-
1. A method, comprising:
-
identifying information associated with unwanted activity, utilizing a plurality of different types of security systems of a client system, which includes a processor and a memory, and which is configured with a plurality of rules for resolving the unwanted activity independent of instructions provided by a central system, wherein at least one of the different types of security systems utilizes behavioral monitoring that includes heuristics; sending the information to the central system for aggregating the information with additional information sets provided by additional client systems; and receiving a response sent from the central system to the client and to the additional client systems, wherein the response is based on the information and is indicative of whether the information was verified as being associated with the unwanted activity, and wherein the response includes a rule for removing code associated with the unwanted activity, and the response includes a rule for detecting future instances of the information, and the response includes a rule for adding the information to a blacklist. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
-
identifying information associated with unwanted activity, utilizing a plurality of different types of security systems of a client system, which includes a processor and a memory, and which is configured with a plurality of rules for resolving the unwanted activity independent of instructions provided by a central system, wherein at least one of the different types of security systems utilizes behavioral monitoring that includes heuristics; sending the information to the central system for aggregating the information with additional information sets provided by additional client systems; and receiving a response sent from the central system to the client and to the additional client systems, wherein the response is based on the information and is indicative of whether the information was verified as being associated with the unwanted activity, and wherein the response includes a rule for removing code associated with the unwanted activity, and the response includes a rule for detecting future instances of the information, and the response includes a rule for adding the information to a blacklist.
-
-
13. An apparatus, comprising:
a processor, wherein the apparatus is configured for; identifying information associated with unwanted activity, utilizing a plurality of different types of security systems of a client system, which includes a processor and a memory, and which is configured with a plurality of rules for resolving the unwanted activity independent of instructions provided by a central system, wherein at least one of the different types of security systems utilizes behavioral monitoring that includes heuristics; sending the information to the central system configured for aggregating the information with additional information sets provided by additional client systems; and receiving a response sent from the central system to the client and to the additional client systems, wherein the response is based on the information and is indicative of whether the information was verified as being associated with the unwanted activity, and wherein the response includes a rule for removing code associated with the unwanted activity, and the response includes a rule for detecting future instances of the information, and the response includes a rule for adding the information to a blacklist. - View Dependent Claims (14)
Specification