FIELD: information technologies.
SUBSTANCE: method of determining the status of the risk of the application which covering protected application, in which a protected application is detected covering the active element interface of the protected application interface elements of the application status is unknown; facility for gathering information about the application with unknown status; facility for analysis of the obtained information is analysed by comparing application information with unknown status with information from the data base, which contains forbidden and safe characteristics for applications, implemented covering protected application; analysis tool as a result of comparison of the application status which covering protected application.
EFFECT: technical result consists in decreasing the number of applications, danger status of which is not known, by determining the status of such applications.
15 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF DETERMINING THE CATEGORY OF PROXY APPLICATION | 2014 |
|
RU2580032C2 |
METHOD FOR DETECTING HARMFUL ASSEMBLIES | 2015 |
|
RU2628920C2 |
METHOD OF CATEGORIZING ASSEMBLIES AND DEPENDENT IMAGES | 2015 |
|
RU2635271C2 |
MACHINE CODE ACCESS LIMITATION METHOD TO THE OPERATING SYSTEM RESOURCES | 2016 |
|
RU2625052C1 |
METHOD FOR ANTI-VIRUS SCANNING OF COMPUTER SYSTEM | 2015 |
|
RU2617925C2 |
SYSTEM AND METHOD OF PROVIDING SAFETY OF ONLINE TRANSACTIONS | 2013 |
|
RU2587423C2 |
METHOD OF BLOCKING NETWORK CONNECTIONS WITH RESOURCES FROM PROHIBITED CATEGORIES | 2018 |
|
RU2702080C1 |
SYSTEM AND METHOD OF BLOCKING ELEMENTS OF APPLICATION INTERFACE | 2013 |
|
RU2645265C2 |
SYSTEM AND METHOD FOR DETERMINING THE FILE TRUST LEVEL | 2019 |
|
RU2750628C2 |
METHOD OF CONTROLLING APPLICATIONS | 2015 |
|
RU2587424C1 |
Authors
Dates
2016-04-10—Published
2014-08-01—Filed