System and method for comprehensive general electric protection for computers against malicious programs that may steal information and/or cause damages
First Claim
1. A security system for a computer comprising:
- a. a processor;
b. a monitoring and capturing system that is configured to conduct, using the processor, constant statistical analyses of various events in the computer to define normal behavior to be able to subsequently identify significant deviations from the normal behavior;
c. storage;
d. a security rules database that is configured to store statistics of the normal behavior continuously during operation, the security rules database residing in the storage; and
e. a user interface that is configured to interact with a user of the computer regarding acceptable behavior patterns and to warn the user of perceived dangers;
wherein the security system prevents applications and/or drivers from accessing without user permission at least one of Fax sending functions and other TAPI functions.
1 Assignment
0 Petitions
Accused Products
Abstract
In the prior art of computer security by default programs are allowed to do whatever they like to other programs or to their data files or to critical files of the operating system, which is as absurd as letting a guest in a hotel bother other guests as he pleases, steal their property or copy it or destroy it, or have free access to the hotel'"'"'s management resources. The present concept is based on automatic segregation between programs. This is preferably done by creating automatically an unlimited number of Virtual Environments (VEs) with virtual sharing of resources, so that the programs in each VE think that they are alone on the computer, and (unless explicitly allowed by the user) any changes that they think they made in virtually shared resources are in reality only made in their own VE, while the user preferably has an integrated view of the computer.
-
Citations
13 Claims
-
1. A security system for a computer comprising:
-
a. a processor; b. a monitoring and capturing system that is configured to conduct, using the processor, constant statistical analyses of various events in the computer to define normal behavior to be able to subsequently identify significant deviations from the normal behavior; c. storage; d. a security rules database that is configured to store statistics of the normal behavior continuously during operation, the security rules database residing in the storage; and e. a user interface that is configured to interact with a user of the computer regarding acceptable behavior patterns and to warn the user of perceived dangers; wherein the security system prevents applications and/or drivers from accessing without user permission at least one of Fax sending functions and other TAPI functions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 11, 12, 13)
-
-
9. A security system for a computer comprising:
-
a. a processor; b. a monitoring and capturing system that is configured to conduct, using the processor, constant statistical analyses of various events in the computer to define normal behavior to be able to subsequently identify significant deviations from the normal behavior; c. storage; d. a security rules database that is configured to store statistics of the normal behavior continuously during operation, the security rules database residing in the storage; and c. a user interface that is configured to interact with a user of the computer regarding acceptable behavior patterns and to warn the user of perceived dangers; wherein the security system prevents applications and/or drivers from accessing without user permission also USB devices.
-
-
10. A security system for a computer comprising:
-
a. a processor; b. a monitoring and capturing system that is configured to conduct, using the processor, constant statistical analyses of various events in the computer to define normal behavior to be able to subsequently identify significant deviations from the normal behavior; c. storage; d. a security rules database that is configured to store statistics of the normal behavior continuously during operation, the security rules database residing in the storage; and c. a user interface that is configured to interact with a user of the computer regarding acceptable behavior patterns and to warn the user of perceived dangers; wherein the security system prevents applications and/or drivers from accessing without user permission also at least one of Bluetooth communication devices, infra-red, and other wireless communication channels.
-
Specification