SYSTEM AND METHOD OF TRUSTED APPLICATIONS OPERATION IN THE PRESENCE OF SUSPICIOUS APPLICATIONS Russian patent published in 2016 - IPC G06F21/53 G06F21/55 

Abstract RU 2595511 C2

FIELD: information technology.

SUBSTANCE: invention relates to computer security. System of limitation of trusted applications operation in presence of suspicious applications includes means of analysis for collection of data on installed applications; determining among installed applications trusted application as result of which protected information is generated; tool for emulating installed applications determination in artificial medium, detecting at least one suspicious application which has possibility of unauthorised processing of protected information, formed as result of trusted application operation; database of rules; locking means for limitation of trusted application operation as result of which protected information is generated, upon detection of suspicious application which has possibility of unauthorised processing of protected information, generated as result trusted application operation, production of list of operations required to execute to remove limitation from trusted application.

EFFECT: higher safety of processing of protected information.

2 cl, 3 dwg, 1 tbl

Similar patents RU2595511C2

Title Year Author Number
SYSTEM AND METHOD OF DETECTING FRAUDULENT ONLINE TRANSACTIONS 2014
  • Golovanov Sergej Jur'Evich
  • Monastyrskij Aleksej Vladimirovich
RU2571721C2
SYSTEM AND METHOD OF PROTECTING COMPUTER APPLICATIONS 2011
  • Rusakov Vjacheslav Evgen'Evich
  • Shirjaev Aleksandr Vasil'Evich
RU2460133C1
SYSTEM AND METHOD FOR ANTIVIRUS SCANNING OF OBJECTS ON A MOBILE DEVICE 2023
  • Iablokov Viktor Vladimirovich
  • Filatov Konstantin Mikhailovich
RU2818877C1
SYSTEM AND METHOD FOR BLOCKING ACCESS TO PROTECTED APPLICATIONS 2016
  • Kalinin Aleksandr Valentinovich
  • Polozov Pavel Leonidovich
  • Levchenko Vyacheslav Ivanovich
  • Yudin Maksim Vitalevich
RU2634168C1
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS 2010
  • Zajtsev Oleg Vladimirovich
  • Denisov Vitalij Igorevich
RU2446459C1
SYSTEM AND METHOD FOR PROVIDING PRIVACY OF INFORMATION USED DURING AUTHENTICATION AND AUTHORISATION OPERATIONS USING TRUSTED DEVICE 2013
  • Borovikov Nikolaj Vasilevich
RU2583710C2
SYSTEM AND METHOD OF BLOCKING ELEMENTS OF APPLICATION INTERFACE 2013
  • Filatov Konstantin Mikhajlovich
  • Yablokov Viktor Vladimirovich
RU2645265C2
METHOD OF CONTROLLING APPLICATIONS 2015
  • Ladikov Andrej Vladimirovich
RU2587424C1
SAFE AUTHENTICATION WITH LOGIN AND PASSWORD IN INTERNET NETWORK USING ADDITIONAL TWO-FACTOR AUTHENTICATION 2016
  • Petrovichev Dmitrij Leonidovich
  • Baranov Artem Olegovich
  • Goncharov Evgenij Viktorovich
RU2635276C1
SYSTEM AND METHOD OF PROVIDING SAFETY OF ONLINE TRANSACTIONS 2013
  • Monastyrskij Aleksej Vladimirovich
  • Golovanov Sergej Yurevich
  • Martynenko Vladislav Valerevich
  • Rusakov Vyacheslav Evgenevich
RU2587423C2

RU 2 595 511 C2

Authors

Yablokov Viktor Vladimirovich

Filatov Konstantin Mikhajlovich

Eliseev Evgenij Yurevich

Unuchek Roman Sergeevich

Dates

2016-08-27Published

2014-12-05Filed