Unlock instant, AI-driven research and patent intelligence for your innovation.

System And Method For Generating Application Control Rules

A technology of rules and application groups, applied in the field of computer security, which can solve problems such as unsolved computing equipment, insufficient and efficient solutions, etc.

Active Publication Date: 2016-08-31
AO KASPERSKY LAB
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has a disadvantage: on a computer where there is software that does not appear on the list of trusted applications but is not harmful, this software (possibly a large amount of software) will be blocked
However, these approaches do not address the problem of forming application control rules from a computing device's security perspective or do so efficiently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System And Method For Generating Application Control Rules
  • System And Method For Generating Application Control Rules
  • System And Method For Generating Application Control Rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Several exemplary aspects are described herein in the context of systems, methods, and computer program products for controlling applications executing on computers. Those of ordinary skill in the art will appreciate that the following description is illustrative only and is not intended to be limiting in any way. Other aspects will readily come to light for those skilled in the art having the benefit of this disclosure. Reference will now be made in detail to implementations of exemplary aspects as shown in the figures. Throughout the drawings and the following description, wherever possible, the same reference numbers will be used to refer to the same or like items.

[0025] figure 1 A schematic diagram of an example system for configuring control rules for an application executable on a computer is shown. Computer system 100 (will be in image 3 shown in additional detail) may be any given computing device, such as a mobile computing device. According to this ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a system and method for configuring control rules for applications executable on a computer. An example method includes classifying computer applications into one of a plurality of classification groups that include at least one predetermined classification group and an unknown classification group. The method further includes configuring control rules when the applications are classified in the unknown classification group that is done by determining, by the hardware processor, a computer competency score for a user of the computer; categorizing the applications into one or more predefined categories, and defining control rules for the application based on the determined computer competency score for the user and the one or more predefined categories of the at least one application.

Description

technical field [0001] In general, the present invention relates to the field of computer security, and more particularly, to systems and methods for generating application control rules. Background technique [0002] The number of conceivable applications (software) that can be used on computing devices (including personal computers) has grown avalanche today. Among many applications, there are many malicious programs capable of causing damage to a computer or a computer user, such as Internet worms, keyloggers and / or computer viruses. [0003] For administrators of computer networks, the problem of protecting a group of computing devices is particularly acute, where a large number of applications, some of which may be harmful, may be installed on each computer in the network. To solve this problem, a common method is to use an application control system, in which the network administrator has the right to access the An application executing on a computer in a network whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52
CPCG06F21/604G06F21/52
Inventor 安德烈·V·拉迪科夫
Owner AO KASPERSKY LAB