×

Systems and methods for performing security analyses of applications configured for cloud-based platforms

  • US 9,223,961 B1
  • Filed: 04/04/2012
  • Issued: 12/29/2015
  • Est. Priority Date: 04/04/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for performing security analyses of applications configured for cloud-based platforms, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying an online platform that hosts an online service and that is capable of hosting a plurality of third-party applications integrated with the online service and configured to operate on the online platform, wherein the online service hosts and/or processes data via one or more cloud-based applications;

    identifying, by a security system separate from the online service, at least one third-party application by identifying user-facing content within the online service that references the third-party application, the third-party application being;

    separate from and configured to operate on the online platform;

    specifically designed to be integrated with the online service and enhancing the online service by customizing an interaction with the online service;

    retrieving, from the online service by the security system, metadata describing;

    at least one characteristic of the third-party application;

    the interaction of the third-party application with the online service;

    an internet resource provided via a canvas page that comprises at least a portion of the third-party application;

    in response to determining that the third-party application is separate from the online platform, performing, by the security system, a security analysis of the third-party application instead of the online service that determines a most probable classification of the third-party application, based at least in part on the metadata describing at least one characteristic of the third-party application, the interaction of the third-party application with the online service, and the internet resource provided via the canvas page, and flagging the third-party application as malicious based on the security analysis.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×