×

Method and system for minimizing the effects of rogue security software

  • US 8,479,289 B1
  • Filed: 10/27/2009
  • Issued: 07/02/2013
  • Est. Priority Date: 10/27/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computing system implemented process for minimizing the effects of rogue security software comprising:

  • providing a security system to monitor a given user computing system to detect any alerts generated regarding the given user computing system, the security system being implemented, at least in part, on one or more computing systems;

    detecting a given alert regarding the given user computing system through the security system;

    analyzing the given alert regarding the given user computing system using one or more processors associated with the one or more computing systems and determining that the given alert is a malware alert, wherein a malware alert is an alert that is generated to alert a user of the user computing system of one or more malware files the alert indicates are present within the user computing system;

    transforming data indicating a status of the given alert regarding the given user computing system to data indicating a status of malware alert using one or more processors associated with the one or more computing systems;

    taking one or more actions to protect a user of the given user computing system from responding to the given malware alert while an initial malware alert analysis of the given malware alert is performed;

    performing the initial malware alert analysis of the given malware alert using one or more processors associated with the one or more computing systems and determining that the malware alert is associated with rogue security software, wherein determining that the malware alert is associated with rogue security software comprises determining that at least one of the files indicated by the alert is not present within the system;

    transforming data indicating a status of the given malware alert to data indicating a status of malware alert potentially associated with rogue security software using one or more processors associated with the one or more computing systems; and

    taking one or more actions to protect a user of the given user computing system from responding to the given malware alert at least until further analysis of the given malware alert is performed.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×