Systems and methods for restoring applications

    公开(公告)号:US09733929B1

    公开(公告)日:2017-08-15

    申请号:US12839615

    申请日:2010-07-20

    IPC分类号: G06F9/44

    摘要: A method for restoring applications may include: 1) identifying an installation file that includes an application; 2) monitoring the installation file to identify a set of application files generated as a result of installing the application from the installation file; 3) assigning, to each application file in the set of application files, an application identifier that associates each application file in the set of application files with the application; 4) backing up the application by copying each application file in the set of application files to a backup storage system; 5) receiving a request to restore each application file in the set of application files; and 6) restoring the application by using the application identifier to locate each application file in the set of application files within the backup storage system. Various other methods, systems, and computer-readable media are also disclosed.

    Systems and methods for collecting file access history information
    3.
    发明授权
    Systems and methods for collecting file access history information 有权
    用于收集文件访问历史信息的系统和方法

    公开(公告)号:US08204907B1

    公开(公告)日:2012-06-19

    申请号:US12268253

    申请日:2008-11-10

    申请人: Spencer Smith

    发明人: Spencer Smith

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30091

    摘要: A method for managing file access history information is described. An application opening a file is identified. Access rights used to open the file are determined. A time parameter associated with the opening of the file is recorded. An access frequency parameter for the file over a predetermined period of time is calculated. File access history information associated with the file is stored.

    摘要翻译: 描述用于管理文件访问历史信息的方法。 识别打开文件的应用程序。 确定用于打开文件的访问权限。 记录与打开文件相关联的时间参数。 计算在预定时间段内文件的访问频率参数。 存储与文件相关联的文件访问历史信息。

    Context-aware real-time computer-protection systems and methods
    4.
    发明授权
    Context-aware real-time computer-protection systems and methods 有权
    上下文感知实时计算机保护系统和方法

    公开(公告)号:US08161556B2

    公开(公告)日:2012-04-17

    申请号:US12336959

    申请日:2008-12-17

    IPC分类号: G08B23/00 G06F12/14

    CPC分类号: G06F21/564 G06F21/562

    摘要: A computer-implemented method for determining, in response to an event of interest, whether to perform a real-time file scan by examining the full context of the event of interest may comprise: 1) detecting an event of interest, 2) identifying at least one file associated with the event of interest, 3) accessing contextual metadata associated with the event of interest, 4) accessing at least one rule that comprises criteria for determining, based on the event of interest and the contextual metadata, whether to perform a security scan on the file, and then 5) determining, by applying the rule, whether to perform the security scan on the file. Corresponding systems and computer-readable media are also disclosed.

    摘要翻译: 用于响应于感兴趣的事件来确定是否通过检查感兴趣事件的完整上下文来执行实时文件扫描的计算机实现的方法可以包括:1)检测感兴趣的事件,2)在 与感兴趣的事件相关联的至少一个文件,3)访问与感兴趣的事件相关联的上下文元数据,4)访问至少一个规则,其包括基于感兴趣的事件和上下文元数据来确定是否执行 安全扫描文件,然后5)通过应用规则确定是否对文件执行安全扫描。 还公开了相应的系统和计算机可读介质。

    Systems and methods for detecting fraudulent software applications that generate misleading notifications
    6.
    发明授权
    Systems and methods for detecting fraudulent software applications that generate misleading notifications 有权
    用于检测产生误导性通知的欺诈性软件应用程序的系统和方法

    公开(公告)号:US09152790B1

    公开(公告)日:2015-10-06

    申请号:US12470213

    申请日:2009-05-21

    IPC分类号: G06F21/56

    CPC分类号: G06F21/566 G06F21/554

    摘要: A computer-implemented method for detecting fraudulent software applications that generate misleading notifications is disclosed. In one example, such a method may comprise: 1) detecting a notification generated by an application installed on the computing device, 2) accessing criteria for determining, based at least in part on characteristics of the notification, whether the application is trustworthy, 3) determining, by applying the criteria, that the application is untrustworthy, and then 4) performing a security operation on the application. Corresponding systems and computer-readable media are also disclosed.

    摘要翻译: 公开了一种用于检测产生误导通知的欺诈软件应用的计算机实现的方法。 在一个示例中,这样的方法可以包括:1)检测由安装在计算设备上的应用产生的通知,2)访问用于至少部分地基于通知的特征确定应用是否可信的准入 )通过应用标准确定应用程序不可信任,然后4)对应用程序执行安全操作。 还公开了相应的系统和计算机可读介质。

    Systems and methods for automatically detecting and preventing phishing attacks
    7.
    发明授权
    Systems and methods for automatically detecting and preventing phishing attacks 有权
    用于自动检测和防止网络钓鱼攻击的系统和方法

    公开(公告)号:US08776196B1

    公开(公告)日:2014-07-08

    申请号:US13557051

    申请日:2012-07-24

    CPC分类号: H04L63/1483 H04L63/1408

    摘要: A computer-implemented method for automatically detecting and preventing phishing attacks may include (1) maintaining a credentials store for a user of the computing device that identifies both at least one known-legitimate website and credentials associated with the known-legitimate website, (2) detecting an attempt by the user to enter the same credentials that are associated with the known-legitimate website into a new website that is not associated with the credentials in the credentials store, and then, prior to allowing the credentials to pass to the new website, (3) automatically warning the user that the new website potentially represents an attempt to phish the credentials associated with the known-legitimate website from the user. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于自动检测和防止网络钓鱼攻击的计算机实现的方法可以包括(1)维护用于识别至少一个已知合法网站和与已知合法网站相关联的证书的计算设备的用户的凭证存储(2) )检测用户尝试将与已知合法网站相关联的相同凭证输入到与凭证存储器中的凭证不相关联的新网站,然后在允许凭据传递到新的 网站,(3)自动向用户发出警告,表示新网站可能代表尝试从用户那里窃取与已知合法网站相关联的凭据。 还公开了各种其它方法,系统和计算机可读介质。

    Interstitial redirection management
    9.
    发明授权
    Interstitial redirection management 有权
    插页式重定向管理

    公开(公告)号:US08918515B1

    公开(公告)日:2014-12-23

    申请号:US11054978

    申请日:2005-02-10

    IPC分类号: G06F9/44 H04L29/08

    摘要: An interstitial manager (100) monitors (210) network communications received by a client computer and detects (215) a potential to initiate contact with a remote computer system. When a potential to initiate contact with a remote computer system is detected (215), the interstitial manager (100) determines (220) whether the potential to initiate contact with the remote computer system entails redirection to an alternate location. The determination (220) of whether the potential to initiate contact with the remote system entails redirection is responsive to satisfying at least one condition from the group of conditions consisting of determining whether a client browser attempts to contact an address associated with the remote computer system, and identifying at least one link embedded within the network communication possessing characteristics consistent with interstitial redirection. Responsive to determining (220) that the potential to initiate contact with the remote computer system entails redirection to an alternate location, the interstitial manager (100) invokes (230) interstitial management procedures.

    摘要翻译: 间歇性管理器(100)监视(210)由客户计算机接收的网络通信,并且检测(215)发起与远程计算机系统的联系的潜力。 当检测到与远程计算机系统发起联系的可能性(215)时,间隙管理器(100)确定(220)是否发起与远程计算机系统的联系的可能性需要重定向到备用位置。 决定(220)是否发起与远程系统的接触的可能性需要重定向响应于满足从确定客户端浏览器是否尝试联系与远程计算机系统相关联的地址的条件组中的至少一个条件, 并且识别嵌入在具有与间质重定向一致的特征的网络通信内的至少一个链路。 响应于确定(220)与远程计算机系统发起联系的可能性需要重定向到替代位置,所述插页式管理器(100)调用(230)间隙管理过程。

    User interface based malware detection
    10.
    发明授权
    User interface based malware detection 有权
    基于用户界面的恶意软件检测

    公开(公告)号:US08776227B1

    公开(公告)日:2014-07-08

    申请号:US12968206

    申请日:2010-12-14

    CPC分类号: G06F21/566 G06F2221/032

    摘要: Malware with fake or misleading anti-malware user interfaces (UIs) are detected. Processes running on a computer system are monitored and their window creation events are detected. The structures of the created windows are retrieved to detect presence of UI features that are commonly presented in known fake or misleading anti-malware UIs (“fakeAVUIs”). If a window includes a UI feature commonly presented in known fakeAVUIs, that window is determined suspicious and additional tests are applied to determine the validity of information in the window. If the information in the window is determined invalid, then the process that created the window is determined to be malware and a remediating action is applied to the process.

    摘要翻译: 检测到具有假或误导性的反恶意软件用户界面(UI)的恶意软件。 监视在计算机系统上运行的进程,并检测其窗口创建事件。 检索创建的窗口的结构以检测通常在已知的假的或误导的反恶意软件UI(“假的AVI”)中呈现的UI特征的存在。 如果窗口包含通常在已知的假AVA中呈现的UI特征,则该窗口被确定为可疑,并且应用附加测试来确定窗口中的信息的有效性。 如果窗口中的信息被确定为无效,则创建该窗口的进程被确定为恶意软件,并且将修复操作应用于该进程。