ARRANGEMENT AND METHOD OF THREAT DETECTION IN A COMPUTER OR COMPUTER NETWORK

Disclosed is an arrangement and a method, e.g. a computer implemented method, of threat detection in a computer or computer network, wherein the method includes determining that an application is starting at a computer, such as a network node or an endpoint, intercepting the application start, ident...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: AQUILINO, Broderick, TURBIN, Pavel
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator AQUILINO, Broderick
TURBIN, Pavel
description Disclosed is an arrangement and a method, e.g. a computer implemented method, of threat detection in a computer or computer network, wherein the method includes determining that an application is starting at a computer, such as a network node or an endpoint, intercepting the application start, identifying the risk rating of the application, based on the identified risk rating of the application creating a snapshot of the computer if the risk rating of the application is high, such as above a certain risk rating threshold value, and/or if the risk rating of the application is unknown, and allowing the application to run after the identification of the risk rating of the application. If the application is determined to be malware when the application is running, stopping the application, removing the malware and reverting changes made to the computer based on the snapshot of the computer.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2023388340A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2023388340A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2023388340A13</originalsourceid><addsrcrecordid>eNrjZPBxDApy9HN39XX1C1Fw9HNR8HUN8fB3UfB3UwjxCHJ1DFFwcQ1xdQ7x9PdT8PRTcFRw9vcNCA1xDVLwD0Kw_VxDwv2DvHkYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkbGxhYWxiYGjoTFxqgBeyS7O</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ARRANGEMENT AND METHOD OF THREAT DETECTION IN A COMPUTER OR COMPUTER NETWORK</title><source>esp@cenet</source><creator>AQUILINO, Broderick ; TURBIN, Pavel</creator><creatorcontrib>AQUILINO, Broderick ; TURBIN, Pavel</creatorcontrib><description>Disclosed is an arrangement and a method, e.g. a computer implemented method, of threat detection in a computer or computer network, wherein the method includes determining that an application is starting at a computer, such as a network node or an endpoint, intercepting the application start, identifying the risk rating of the application, based on the identified risk rating of the application creating a snapshot of the computer if the risk rating of the application is high, such as above a certain risk rating threshold value, and/or if the risk rating of the application is unknown, and allowing the application to run after the identification of the risk rating of the application. If the application is determined to be malware when the application is running, stopping the application, removing the malware and reverting changes made to the computer based on the snapshot of the computer.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231130&amp;DB=EPODOC&amp;CC=US&amp;NR=2023388340A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231130&amp;DB=EPODOC&amp;CC=US&amp;NR=2023388340A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>AQUILINO, Broderick</creatorcontrib><creatorcontrib>TURBIN, Pavel</creatorcontrib><title>ARRANGEMENT AND METHOD OF THREAT DETECTION IN A COMPUTER OR COMPUTER NETWORK</title><description>Disclosed is an arrangement and a method, e.g. a computer implemented method, of threat detection in a computer or computer network, wherein the method includes determining that an application is starting at a computer, such as a network node or an endpoint, intercepting the application start, identifying the risk rating of the application, based on the identified risk rating of the application creating a snapshot of the computer if the risk rating of the application is high, such as above a certain risk rating threshold value, and/or if the risk rating of the application is unknown, and allowing the application to run after the identification of the risk rating of the application. If the application is determined to be malware when the application is running, stopping the application, removing the malware and reverting changes made to the computer based on the snapshot of the computer.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPBxDApy9HN39XX1C1Fw9HNR8HUN8fB3UfB3UwjxCHJ1DFFwcQ1xdQ7x9PdT8PRTcFRw9vcNCA1xDVLwD0Kw_VxDwv2DvHkYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkbGxhYWxiYGjoTFxqgBeyS7O</recordid><startdate>20231130</startdate><enddate>20231130</enddate><creator>AQUILINO, Broderick</creator><creator>TURBIN, Pavel</creator><scope>EVB</scope></search><sort><creationdate>20231130</creationdate><title>ARRANGEMENT AND METHOD OF THREAT DETECTION IN A COMPUTER OR COMPUTER NETWORK</title><author>AQUILINO, Broderick ; TURBIN, Pavel</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2023388340A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>AQUILINO, Broderick</creatorcontrib><creatorcontrib>TURBIN, Pavel</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>AQUILINO, Broderick</au><au>TURBIN, Pavel</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ARRANGEMENT AND METHOD OF THREAT DETECTION IN A COMPUTER OR COMPUTER NETWORK</title><date>2023-11-30</date><risdate>2023</risdate><abstract>Disclosed is an arrangement and a method, e.g. a computer implemented method, of threat detection in a computer or computer network, wherein the method includes determining that an application is starting at a computer, such as a network node or an endpoint, intercepting the application start, identifying the risk rating of the application, based on the identified risk rating of the application creating a snapshot of the computer if the risk rating of the application is high, such as above a certain risk rating threshold value, and/or if the risk rating of the application is unknown, and allowing the application to run after the identification of the risk rating of the application. If the application is determined to be malware when the application is running, stopping the application, removing the malware and reverting changes made to the computer based on the snapshot of the computer.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2023388340A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title ARRANGEMENT AND METHOD OF THREAT DETECTION IN A COMPUTER OR COMPUTER NETWORK
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T15%3A13%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=AQUILINO,%20Broderick&rft.date=2023-11-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2023388340A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true