Automated detection of harmful content
First Claim
Patent Images
1. A method for automatically detecting malicious content by computer security routine executed in a processing device, the method comprising:
- detecting, in the processing device, a user input to a social status update publication application, wherein the user input indicates that a user wants to share content with at least one other user through the social status update publication application;
suspending a sharing operation of the social status update publication application and performing, by the processing device before determining whether or not to allow the sharing, a security check for suspiciousness in the content the user intends to share;
upon detecting in the security check that the content the user intends to share comprises malware, cancelling the suspended sharing operation; and
upon detecting no malicious content in the security check, allowing continuation of the suspended sharing operation.
2 Assignments
0 Petitions
Accused Products
Abstract
This document discloses a solution for automatically detecting malicious content by computer security routine executed in a processing device. A user input to a social media application is detected by the computer security routine. The user input indicates that a user wants to share content with at least one other user through the social media application. In response, the computer security routine suspends said sharing and performs, before determining whether or not to allow the sharing, a security check for suspiciousness of contents the user intends to share.
-
Citations
21 Claims
-
1. A method for automatically detecting malicious content by computer security routine executed in a processing device, the method comprising:
-
detecting, in the processing device, a user input to a social status update publication application, wherein the user input indicates that a user wants to share content with at least one other user through the social status update publication application; suspending a sharing operation of the social status update publication application and performing, by the processing device before determining whether or not to allow the sharing, a security check for suspiciousness in the content the user intends to share; upon detecting in the security check that the content the user intends to share comprises malware, cancelling the suspended sharing operation; and upon detecting no malicious content in the security check, allowing continuation of the suspended sharing operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
at least one processor; and at least one non-transitory memory including a computer program code, wherein the at least one non-transitory memory and the computer program code are configured, with the at least one processor, to cause the apparatus to; execute a computer security routine; detect a user input to a social status update publication application, wherein the user input indicates that a user wants to share content with at least one other user through the social status update publication application; suspend a sharing operation of the social status update publication application and perform, before determining whether or not to allow the sharing, a security check for suspiciousness in the content the user intends to share; upon detecting in the security check that the content the user intends to share comprises malware, cancel the suspended sharing operation; and upon detecting no malicious content in the security check, allow continuation of the suspended sharing operation. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product embodied on a non-transitory distribution medium readable by a computer and comprising program instructions which, when loaded into an apparatus, execute a computer process comprising:
-
detecting a user input to a social status update publication application, wherein the user input indicates that a user wants to share content with at least one other user through the social status update publication application; suspending a sharing operation of the social status update publication application and performing, before determining whether or not to allow the sharing, a security check for suspiciousness in the content the user intends to share; upon detecting in the security check that the content the user intends to share comprises malware, cancelling the suspended sharing operation; and upon detecting no malicious content in the security check, allowing continuation of the suspended sharing operation.
-
Specification