Abstract: A system and method of protecting a computer includes providing a whitelist of known applications and a set of rules for determining if a program is benign. Upon an attempt to initiate a program, determining if the program is in the whitelist and if the program is in the whitelist, allowing the program to run. If the program is not in the whitelist, determining if the program is benign based upon the set of rules or strategy and presenting the rule/strategy to the user. If the user accepts the rule/strategy, running the program and updating the whitelist for allowing future attempts to run the program and any other program that conforms to the one rule. If the program is not determined to be benign, the program is not allowed to execution unless a specific override is made.
Type:
Application
Filed:
September 11, 2020
Publication date:
March 17, 2022
Applicant:
PC Matic, Inc.
Inventors:
Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, JR.
Abstract: A system and method of protecting a computer includes providing a whitelist of known applications and a set of rules for determining if a program is benign. Upon an attempt to initiate a program, determining if the program is in the whitelist and if the program is in the whitelist, allowing the program to run. If the program is not in the whitelist, determining if the program is benign based upon the set of rules or strategy and presenting the rule/strategy to the user. If the user accepts the rule/strategy, running the program and updating the whitelist for allowing future attempts to run the program and any other program that conforms to the one rule. If the program is not determined to be benign, the program is not allowed to execution unless a specific override is made.
Type:
Grant
Filed:
September 11, 2020
Date of Patent:
March 15, 2022
Assignee:
PC MATIC, INC.
Inventors:
Matthew Quincy Riley, Robert J. Cheng, Robert J. Woodworth, Jr.
Abstract: A system for providing a password hint authenticates a username and password against a stored username and stored password. Upon failure of the authentication, the system determines a password formation rule that was in force when the user created the stored password then compares the password to the password formation rule and if the password violated any part of the password formation rule, the system reports each part of the password that violated the any part of the password formation rule.
Abstract: A system for providing a password hint authenticates a username and password against a stored username and stored password. Upon failure of the authentication, the system determines a password formation rule that was in force when the user created the stored password then compares the password to the password formation rule and if the password violated any part of the password formation rule, the system reports each part of the password that violated the any part of the password formation rule.
Abstract: A system for computer security includes a device protected by the system for computer security having software running on the device that detects an attempt to run a script in a browser. Responsive to the attempt to run the script in the browser or a pattern of function calls made by the script, the software running on the device scans the script and/or monitors the function calls to determine if the script is an infinite alert. If the script is an infinite alert, the software running on the device prevents execution of the script or kills the script if it is already running. If the script is not an infinite alert, the software running on the device allows execution/completion of the script. Determining if the script includes an infinite alert includes, for example, a certain length of script or finding certain 800 numbers and/or specific keywords in the script.
Abstract: A super-shield system for protecting a computer from malicious software uses a whitelist to determine if a program is safe to run. As new malicious software is created, inadvertent attempts at execution of executables including such malicious software is prevented being that the new malicious software are not listed in the whitelist. When attempts are made to run unknown software, the executable is forwarded to a server where further analysis is performed to determine if the executable contains suspect code (e.g., malicious software).
Abstract: A super-shield system for protecting a computer from malicious software uses a whitelist to determine is a program is safe to run. As new malicious software are created, inadvertent attempts at execution of executables including such malicious software is prevented being that the new malicious software are not listed in the whitelist. When attempts are made to run unknown software, the executable is forwarded to a server where further analysis is performed to determine if the executable contains suspect code (e.g., malicious software).
Abstract: A system for protecting a computer from malicious software uses a whitelist to determine is a program is safe to run. As new malicious software is created, attempts at execution of executables including such malicious software are prevented being that the new malicious software is not listed in the whitelist. When such attempts are made, the executable is forwarded to a server where further analysis is performed to determine if the executable contains suspect code (e.g., malicious software) including running the executable in a sandbox to analyze how the executable behaves and running industry virus scanners against the executable to see if those scanners can find a virus. If such research finds that the executable is well-behaved, the executable is added to the whitelist and future execution is allowed.