×

System and method of limiting the operation of trusted applications in presence of suspicious programs

  • US 9,183,383 B1
  • Filed: 02/17/2015
  • Issued: 11/10/2015
  • Est. Priority Date: 12/05/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method for limiting the operation of trusted applications in presence of suspicious programs, the method comprising:

  • identifying, by a hardware processor, one or more trusted applications installed on a computer;

    collecting, by the hardware processor, data relating to the identified one or more trusted applications and to programs installed on the computer;

    detecting, based at least partially on the collected data, one or more suspicious programs using suspicious program detection rules indicating that the one or more suspicious programs can access protected information of a given trusted application of the identified one or more trusted applications without authorization;

    upon detecting at least one suspicious program, temporarily limiting an operation of the given trusted application;

    producing, based on both the data relating to the identified one or more trusted applications and data relating to the detected at least one suspicious program, a list of actions to remove or terminate the at least one suspicious program from the computer; and

    removing limitation of the operation of the given trusted application after the list of actions are performed to remove or terminate the at least one suspicious program from the computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×