×

Mapping process changes

  • US 9,824,205 B2
  • Filed: 12/14/2016
  • Issued: 11/21/2017
  • Est. Priority Date: 06/08/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • identifying one or more characteristics of a particular process that is to be run in an isolated environment and that is characterized as possibly malware;

    before the particular process is run in the isolated environment, selecting, by a process manager running on a computer system and based on one or more of the characteristics of the particular process, a particular permission scheme from among (i) a first permission scheme in which a user is prompted for permission a single time in advance of a first change being made to a copy object by the particular process and is not subsequently prompted for permission for any other change being made to the copy object by the particular process after that, and (ii) a second permission scheme in which the user is prompted for permission in response to each change being made to the copy object by the particular process;

    obtaining, by the process manager and according to the particular permission scheme, an isolated copy object that (a) is in the isolated environment, and (b) corresponds to an actual object that is not in the isolated environment;

    after selecting the particular permission scheme, running the particular process in the isolated environment on the computer system, thereby generating one or more changes to the isolated copy object; and

    copying, by the process manager and according to the particular permission scheme, one or more of the changes to the isolated copy object to the actual object that is not in the isolated environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×