The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 24, 2020

Filed:

Aug. 03, 2018
Applicant:

Microsoft Technology Licensing, Llc, Redmond, WA (US);

Inventors:

Michael Zeev Bargury, Ramat-Gan, IL;

Yotam Livny, Gadera, IL;

Moshe Israel, Ramat-Gan, IL;

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 11/34 (2006.01); G06F 21/52 (2013.01); H04L 12/24 (2006.01); G06N 20/00 (2019.01);
U.S. Cl.
CPC ...
H04L 63/0263 (2013.01); G06F 11/3409 (2013.01); G06F 21/52 (2013.01); H04L 41/0813 (2013.01); H04L 63/101 (2013.01); H04L 63/20 (2013.01); G06N 20/00 (2019.01);
Abstract

Control policies are configured to automatically update a whitelist and to permit an application, including its associated computing operations, to execute on the computer system. After the application is installed, initialization and execution of the application is triggered. Concurrently, the application's computing operations are recorded and certain control policies, such as a firewall, are paused from being enforced. The recorded computing operations are classified into at least two different categories, where one category includes computing operations associated with the application and where another category includes computing operations that are not associated with the application but that occurred while the application was running. The first category computing operations are then whitelisted so that they are identified as being permissible computing operations by the control policies. Thereafter, the control policies are again enforced thus allowing the application, including its associated computing operations, to execute without being interrupted by the control policies.


Find Patent Forward Citations

Loading…