×

Classification of unwanted or malicious software through the identification of encrypted data communication

  • US 8,549,625 B2
  • Filed: 12/12/2008
  • Issued: 10/01/2013
  • Est. Priority Date: 12/12/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for identifying unauthorized encrypted communications, the method comprising:

  • a computer detecting an encrypted communication;

    **the computer determining a source and destination of the encrypted communication;

    the computer comparing the source of the detected encrypted communication to a predetermined list of applications authorized to send encrypted communications to the computer and the destination of the detected encrypted communication to a predetermined list of destinations authorized for encrypted communications, andif the source of the detected encrypted communication is on the predetermined list of authorized applications and the destination of the detected encrypted communication is on the predetermined list of destinations authorized for encrypted communications, the computer allowing the detected encrypted communication to proceed, andif the source of the detected encrypted communication is not on the predetermined list of authorized applications, the computer determining if the detected encrypted communication was sent from an application that is on a network trusted by the computer, and, if so, the computer adding the application on the trusted network to the predetermined list of applications authorized to send encrypted communications; and

    the computer subsequently receiving another encrypted communication from the application on the trusted network, and in response, the computer determining that a source of the other encrypted communication is the application on the trusted network and that the application on the trusted network is on the predetermined list of authorized applications, and, in response, if the destination of the other encrypted communication is on the predetermined list of destinations authorized for encrypted communications the computer allowing the other encrypted communication to proceed.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×