Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
1. (WO2019046166) SYSTEMS AND METHODS FOR PREVENTING MALICIOUS APPLICATIONS FROM EXPLOITING APPLICATION SERVICES
Latest bibliographic data on file with the International BureauSubmit observation

Pub. No.: WO/2019/046166 International Application No.: PCT/US2018/048095
Publication Date: 07.03.2019 International Filing Date: 27.08.2018
IPC:
G06F 9/455 (2018.01) ,G06F 21/53 (2013.01) ,G06F 21/55 (2013.01) ,H04L 29/06 (2006.01) ,H04W 12/12 (2009.01)
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
9
Arrangements for programme control, e.g. control unit
06
using stored programme, i.e. using internal store of processing equipment to receive and retain programme
44
Arrangements for executing specific programmes
455
Emulation; Software simulation
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52
during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
53
by executing in a restricted environment, e.g. sandbox or secure virtual machine
G PHYSICS
06
COMPUTING; CALCULATING; COUNTING
F
ELECTRIC DIGITAL DATA PROCESSING
21
Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50
Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55
Detecting local intrusion or implementing counter-measures
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29
Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02
Communication control; Communication processing
06
characterised by a protocol
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
W
WIRELESS COMMUNICATION NETWORKS
12
Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
12
Fraud detection
Applicants:
SYMANTEC CORPORATION [US/US]; 350 Ellis Street Mountain View, California 94043, US
Inventors:
DHARMADHIKARI, Mayur; IN
MEEL, Pankaj; IN
JOSHI, Nikhil; IN
Agent:
HANKS, Bryan; US
Priority Data:
15/688,91129.08.2017US
Title (EN) SYSTEMS AND METHODS FOR PREVENTING MALICIOUS APPLICATIONS FROM EXPLOITING APPLICATION SERVICES
(FR) SYSTÈMES ET PROCÉDÉS PERMETTANT D'EMPÊCHER DES APPLICATIONS MALVEILLANTES D'EXPLOITER DES SERVICES D'APPLICATION
Abstract:
(EN) The disclosed computer-implemented method for preventing malicious applications from exploiting application services may include (i) identifying an attempt by an application, executing within a sandboxed environment that isolates the application's data and code execution from at least one other application executing within an operating system on the computing device, to launch at least one application service, (ii) determining that the application represents a potential security risk, (iii) prompting a user of the computing device to remediate the potential security risk posed by the application by performing a recommended security action, and (iv) while waiting for the user to perform the recommended security action, securing the computing device by blocking the attempt by the application to launch the application service. Various other methods, systems, and computer-readable media are also disclosed.
(FR) La présente invention concerne un procédé mis en œuvre par ordinateur qui permet d'empêcher des applications malveillantes d'exploiter des services d'application et peut comprendre (i) l'identification d'une tentative par une application, exécutée dans un environnement de bac à sable qui isole les données de l'application et l'exécution de code d'au moins une autre application s'exécutant dans un système d'exploitation sur le dispositif informatique, de lancer au moins un service d'application, (ii) l'évaluation que l'application représente un risque potentiel de sécurité, (iii) l'invitation par message d'un utilisateur du dispositif informatique à remédier au risque potentiel de sécurité posé par l'application en effectuant une action de sécurité recommandée, et (iv) tout en attendant que l'utilisateur effectue l'action de sécurité recommandée, à sécuriser le dispositif informatique en bloquant la tentative par l'application de lancer le service d'application. La présente invention concerne également divers autres procédés, systèmes et supports lisibles par ordinateur.
front page image
Designated States: AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW
African Regional Intellectual Property Organization (ARIPO) (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW)
Eurasian Patent Organization (AM, AZ, BY, KG, KZ, RU, TJ, TM)
European Patent Office (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG)
Publication Language: English (EN)
Filing Language: English (EN)