IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0470213
(2009-05-21)
|
등록번호 |
US-9152790
(2015-10-06)
|
발명자
/ 주소 |
- Glick, Adam
- Graf, Nicholas
- Smith, Spencer
|
출원인 / 주소 |
|
대리인 / 주소 |
ALG Intellectual Property, LLC
|
인용정보 |
피인용 횟수 :
4 인용 특허 :
3 |
초록
▼
A computer-implemented method for detecting fraudulent software applications that generate misleading notifications is disclosed. In one example, such a method may comprise: 1) detecting a notification generated by an application installed on the computing device, 2) accessing criteria for determini
A computer-implemented method for detecting fraudulent software applications that generate misleading notifications is disclosed. In one example, such a method may comprise: 1) detecting a notification generated by an application installed on the computing device, 2) accessing criteria for determining, based at least in part on characteristics of the notification, whether the application is trustworthy, 3) determining, by applying the criteria, that the application is untrustworthy, and then 4) performing a security operation on the application. Corresponding systems and computer-readable media are also disclosed.
대표청구항
▼
1. A computer-implemented method for detecting fraudulent software applications that generate misleading notifications, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising: monitoring a system tray of an operating system run
1. A computer-implemented method for detecting fraudulent software applications that generate misleading notifications, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising: monitoring a system tray of an operating system running on the computing device;detecting a non-browser-generated notification generated in the system tray;upon detecting the non-browser-generated notification, identifying an application, installed on the computing device, that is responsible for generating the non-browser-generated notification;accessing criteria for determining, based at least in part on characteristics of the non-browser-generated notification, whether the application represents a fraudulent application designed to generate misleading notifications that misrepresent the security status of computing devices, wherein the criteria stipulates that applications that generate non-browser-generated notifications on computing devices within a predetermined period of time after the applications are installed on the computing devices represent fraudulent applications designed to generate misleading notifications that misrepresent the security status of the computing devices;determining, by applying the criteria to the non-browser-generated notification generated by the application, that: the non-browser-generated notification represents a misleading notification designed to misrepresent the security status of the computing device;the application is a fraudulent application;performing a security operation on the application. 2. The method of claim 1, wherein the criteria further comprises criteria for determining whether the application contains at least one data pattern that is commonly associated with misleading applications. 3. The method of claim 1, wherein: identifying the application comprises: upon detecting the non-browser-generated notification, identifying a process that is responsible for generating the non-browser-generated notification;identifying the application by determining that the application is associated with the responsible process. 4. The method of claim 1, wherein: the method further comprises applying, via a trustworthiness-determination module, the criteria to the application;the trustworthiness-determination module is configured to apply criteria to applications, installed on the computing device, that generate visual notifications to users;applying the criteria to the application comprises applying the criteria to the application in response to determining that the application represents an application, installed on the computing device, that generates visual notifications to users. 5. The method of claim 1, wherein the criteria further comprises at least one of: criteria for determining whether the non-browser-generated notification contains words or phrases that are commonly associated with misleading applications;criteria for determining whether the non-browser-generated notification contains a hyperlink to an untrustworthy website;criteria for determining whether the application originated from a potentially untrustworthy source;criteria for determining whether a digital certificate associated with the application has been signed by a trusted certificate authority. 6. The method of claim 1, wherein the criteria further comprises criteria for determining whether the application was installed in a location on the computing device that is commonly associated with misleading applications. 7. The method of claim 1, wherein performing the security operation on the application comprises at least one of: terminating the application;removing the application from the computing device;blocking the application from generating network activity;quarantining the application. 8. A system for detecting fraudulent software applications that generate misleading notifications, the system comprising a device storing a plurality of modules, including: a notification-detection module programmed to: monitor a system tray of an operating system running on a computing device;detect a non-browser-generated notification generated in the system tray;upon detecting the non-browser-generated notification, identify an application, installed on the computing device, that is responsible for generating the non-browser-generated notification;a trustworthiness-determination module programmed to: access criteria for determining, based at least in part on characteristics of the non-browser-generated notification, whether the application represents a fraudulent application designed to generate misleading notifications that misrepresent the security status of computing devices, wherein the criteria stipulates that applications that generate non-browser-generated notifications on computing devices within a predetermined period of time after the applications are installed on the computing devices represent fraudulent applications designed to generate misleading notifications that misrepresent the security status of the computing devices;determine, by applying the criteria to the non-browser-generated notification generated by the application, that: the non-browser-generated notification represents a misleading notification designed to misrepresent the security status of the computing device;the application is a fraudulent application;a security module programmed to perform a security operation on the application;at least one processor configured to execute the notification-detection module, the trustworthiness-determination module, and the security module. 9. The system of claim 8, wherein the criteria further comprises criteria for determining whether the application contains at least one data pattern that is commonly associated with misleading applications. 10. The system of claim 8, wherein the notification-detection module is programmed to identify the application by: upon detecting the non-browser-generated notification, identifying a process that is responsible for generating the non-browser-generated notification;identifying the application by determining that the application is associated with the responsible process. 11. The system of claim 8, wherein the criteria further comprises criteria for determining whether the application was installed in a location on the computing device that is commonly associated with misleading applications. 12. The system of claim 8, wherein the criteria further comprises at least one of: criteria for determining whether the non-browser-generated notification contains words or phrases that are commonly associated with misleading applications;criteria for determining whether the non-browser-generated notification contains a hyperlink to an untrustworthy website;criteria for determining whether the application originated from a potentially untrustworthy source;criteria for determining whether a digital certificate associated with the application has been signed by a trusted certificate authority. 13. The system of claim 8, wherein the trustworthiness-determination module applies the criteria by applying the criteria to the application. 14. The system of claim 8, wherein the security module performs the security operation by at least one of: terminating the application;removing the application from the computing device;blocking the application from generating network activity;quarantining the application. 15. A non-transitory computer-readable-storage medium comprising one or more computer-readable instructions that, when executed by a computing device comprising at least one processor, cause the computing device to: monitor a system tray of an operating system running on the computing device;detect a non-browser-generated notification generated in the system tray;upon detecting the non-browser-generated notification, identify an application, installed on the computing device, that is responsible for generating the non-browser-generated notification;access criteria for determining, based at least in part on characteristics of the non-browser-generated notification, whether the application represents a fraudulent application designed to generate misleading notifications that misrepresent the security status of computing devices, wherein the criteria stipulates that applications that generate non-browser-generated notifications on computing devices within a predetermined period of time after the applications are installed on the computing devices represent fraudulent applications designed to generate misleading notifications that misrepresent the security status of the computing devices;determine, by applying the criteria to the non-browser-generated notification generated by the application, that: the non-browser-generated notification represents a misleading notification designed to misrepresent the security status of the computing device;the application is a fraudulent application;perform a security operation on the application. 16. The computer-readable-storage medium of claim 15, wherein the criteria further comprises criteria for determining whether the application contains at least one data pattern that is commonly associated with misleading applications. 17. The computer-readable-storage medium of claim 16, wherein the one or more computer-readable instructions further cause the computing device to identify the application by: upon detecting the non-browser-generated notification, identifying a process that is responsible for generating the non-browser-generated notification;identifying the application by determining that the application is associated with the responsible process. 18. The computer-readable-storage medium of claim 15, wherein the criteria further comprises at least one of: criteria for determining whether the non-browser-generated notification contains words or phrases that are commonly associated with misleading applications;criteria for determining whether the non-browser-generated notification contains a hyperlink to an untrustworthy website;criteria for determining whether the application originated from a potentially untrustworthy source;criteria for determining whether a digital certificate associated with the application has been signed by a trusted certificate authority. 19. The computer-readable-storage medium of claim 15, wherein the criteria further comprises criteria for determining whether the application was installed in a location on the computing device that is commonly associated with misleading applications. 20. The computer-readable-storage medium of claim 15, wherein the security operation comprises at least one of:terminating the application;removing the application from the computing device;blocking the application from generating network activity;quarantining the application.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.