Method and apparatus for monitoring text-based communications to secure a computer
First Claim
Patent Images
1. A method for monitoring text-based communications to secure a computer, comprising:
- identifying a type of software application associated with a presentation of text-based communications on a display associated with the computer;
determining if a heuristic exists for the type of software application, wherein the heuristic is one of a plurality of heuristics each associated with a respective software application;
defining at least one portion of the computer display that is associated with the text-based communications using the heuristic based at least in part on the type of software application; and
examining the at least one portion of the computer display to identify textual data within the text-based communications.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for monitoring text-based communications to secure a computer is described. In one embodiment, the method for monitoring text-based communications to secure a computer includes defining at least one portion of the computer display that is associated with text-based communications and examining the at least one portion of the computer display to identify textual data within the text-based communications.
24 Citations
20 Claims
-
1. A method for monitoring text-based communications to secure a computer, comprising:
-
identifying a type of software application associated with a presentation of text-based communications on a display associated with the computer; determining if a heuristic exists for the type of software application, wherein the heuristic is one of a plurality of heuristics each associated with a respective software application; defining at least one portion of the computer display that is associated with the text-based communications using the heuristic based at least in part on the type of software application; and examining the at least one portion of the computer display to identify textual data within the text-based communications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for monitoring text-based communications to secure a computer, comprising:
at least one computer processor configured to; identify a type of software application associated with a presentation of text-based communications on a display associated with the computer; determine if a heuristic exists for the type of software application, wherein the heuristic is one of a plurality of heuristics each associated with a respective software application; define at least one portion of the computer display that is associated with the text-based communications using the heuristic based at least in part on the type of software application; and examine the at least one portion of the computer display to identify textual data within the text-based communications. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification