The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 10, 2015

Filed:

Feb. 17, 2015
Applicant:

Kaspersky Lab Zao, Moscow, RU;

Inventors:

Victor V. Yablokov, Moscow, RU;

Konstantin M. Filatov, Moscow, RU;

Evgeny Y. Eliseev, Moscow, RU;

Roman S. Unuchek, Moscow, RU;

Assignee:

AO Kaspersky Lab, Moscow, RU;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/56 (2013.01); G06F 21/62 (2013.01); G06F 21/55 (2013.01); G06F 12/14 (2006.01); G06F 21/74 (2013.01); G06F 21/88 (2013.01); G06F 21/12 (2013.01); G06F 21/44 (2013.01); G06F 21/50 (2013.01); G06F 12/16 (2006.01);
U.S. Cl.
CPC ...
G06F 21/55 (2013.01); G06F 12/14 (2013.01); G06F 12/16 (2013.01); G06F 21/12 (2013.01); G06F 21/121 (2013.01); G06F 21/44 (2013.01); G06F 21/50 (2013.01); G06F 21/554 (2013.01); G06F 21/629 (2013.01); G06F 21/6245 (2013.01); G06F 21/6281 (2013.01); G06F 21/74 (2013.01); G06F 21/88 (2013.01); G06F 2201/86 (2013.01); G06F 2221/031 (2013.01); G06F 2221/033 (2013.01);
Abstract

Disclosed are systems and methods for limiting the operation of trusted applications in presence of suspicious programs. An example method includes: identifying one or more trusted applications installed on a computer; collecting data about applications and programs installed on the computer; checking for the presence of one or more suspicious programs using suspicious program detection rules, wherein a program is considered to be suspicious when it can access protected information of a trusted application without authorization; and when at least one suspicious program is found, limiting the operation of the trusted application until the suspicious program is terminated or removed from the computer.


Find Patent Forward Citations

Loading…