×

Identification of malicious activities through non-logged-in host usage

  • US 8,631,485 B2
  • Filed: 12/22/2011
  • Issued: 01/14/2014
  • Est. Priority Date: 01/19/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for identifying a potential malware communication in a computer, the method comprising the steps of:

  • the computer receiving a data communication simulating manual interaction between a user of the computer and the computer, wherein the data communication simulates manual user input, via a keyboard, to a chat session; and

    the computer determining that no user was interactively logged on to the computer approximately at a time the data communication was received by the computer, and in response, the computer classifying the data communication as a potential malware communication.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×