Claims
- 1. A computer-implemented method for implementing security for a computing device, comprising the steps of:
identifying an allowed program that is permitted to execute on the computing device; receiving a signal that a new program is going to be executed on the computing device; suspending the execution of the new program on the computing device; determining whether the new program is the same as the allowed program; if the new program is the same as the allowed program, permitting the new program to execute on the computing device; and if the new program is not the same as the allowed program, monitoring the new program while allowing it to execute on the computing device.
- 2. The method of claim 1, wherein the step of receiving a signal that a new program is going to be executed is performed at the operating system kernel of the computing device.
- 3. The method of claim 1, wherein the step of monitoring the new program while allowing it to execute is performed at the operating system kernel of the computing device.
- 4. The method of claim 1, wherein the step of determining whether the new program is the same as the allowed program comprises:
computing a checksum for the new program, and comparing the new program's checksum to a checksum for the allowed program.
- 5. The method of claim 1, wherein the step of determining whether the new program is the same as the allowed program comprises determining whether the new program has been modified.
- 6. The method of claim 1, wherein the step of monitoring the new program while allowing it to execute comprises controlling the files the program attempts to access during execution of the new program on the computing device.
- 7. The method of claim 1, wherein the step of monitoring the new program while allowing it to execute comprises controlling the registry settings the new program attempts to access during execution of the new program on the computing device.
- 8. The method of claim 1, wherein the step of monitoring the new program while allowing it to execute comprises controlling the network activity of the new program.
- 9. The method of claim 1, wherein the step of monitoring the new program while allowing it to execute comprises determining whether a user has previously approved operation of the new program.
- 10. The method of claim 1, further comprising the step of terminating the execution of the new program if the program performs suspicious activities.
- 11. The method of claim 1, further comprising the step of taking remedial measures to protect the security of other computing device components if the new program is not the same as the allowed program.
- 12. A computer-readable medium having computer-executable instructions for performing the steps recited in claim 1.
- 13. A computer-implemented method for implementing security for a computing device comprising the steps of:
interrupting the loading of a new program for operation with the computing device; validating the new program; if the new program is validated, permitting the new program to continue loading and to execute in connection with the computing device; if the new program is not validated, monitoring the new program while it loads and executes in connection with the computing device.
- 14. The method of claim 13, wherein the step of interrupting the loading of a new program comprises:
intercepting a signal from the computing device's operating system that the new program is loading, and suspending the loading of the new program.
- 15. The method of claim 13, wherein the step of monitoring the new program comprises intercepting a signal from the computing device's operating system.
- 16. The method of claim 13, wherein the step of validating the new program comprises determining whether the new program corresponds with an approved program.
- 17. The method of claim 13, wherein the step of validating the new program comprises comparing a checksum for the new program with a previously determined checksum.
- 18. The method of claim 13, wherein the step of validating the new program comprises analyzing characteristics of the new program.
- 19. The method of claim 13, wherein the step of monitoring the new program comprises controlling the files the new program attempts to access during execution of the new program.
- 20. A computer-readable medium having computer-executable instructions for performing the steps recited in claim 13.
- 21. A computer-implemented method for performing security for a computing device during a pre-execution phase comprising the steps of:
identifying an allowed program that is permitted to execute with the computing device; receiving a signal that a new program is being loaded for execution with the computing device; suspending the loading of the new program; comparing the new program to the allowed program; and determining whether the new program is valid.
- 22. The method of claim 21, wherein the step of receiving a signal comprises receiving a signal from the computing device's operating system kernel.
- 23. The method of claim 21, wherein the step of comparing the new program to the allowed program comprises comparing a checksum of the new program to a checksum of the allowed program.
- 24. The method of claim 21, wherein the step of determining whether the new program is valid comprises determining whether a checksum of the new program corresponds to a checksum of the allowed program.
- 25. A computer-readable medium having computer-executable instructions for performing the steps recited in claim 21.
- 26. A computer-implemented method for performing security for a computing device during an execution phase comprising the steps of:
intercepting a call to open a file from the computing device's operating system; determining whether the file is restricted; if the file is restricted, taking remedial action to protect the computing device; and if the file is not restricted, permitting the call to open the file.
- 27. The method of claim 26, further comprising the step of receiving an instruction to monitor a call from an executing program.
- 28. The method of claim 26, further comprising the step of defining files that are restricted from access.
- 29. The method of claim 28, wherein the step of defining files that are restricted comprises designating a file that cannot be accessed in response to the call.
- 30. The method of claim 28, wherein the step of defining files that are restricted comprises designating a file that cannot be modified in response to the call.
- 31. The method of claim 26, further comprising the step of alerting a security management module of the presence of a malicious program.
- 32. The method of claim 26, wherein the step of taking remedial action comprises terminating the call.
- 33. The method of claim 26, wherein the step of taking remedial action comprises alerting another security module of the existence of the call.
- 34. The method of claim 26, wherein the step of taking remedial action comprises notifying the user of the existence of the call.
- 35. A computer-readable medium having computer-executable instructions for performing the steps recited in claim 26.
- 36. A system for managing security of a computing device comprising:
a pre-execution module operable for receiving notice from the computing device's operating system that a program is being loaded onto the computing device; a validation module coupled to the pre-execution monitor operable for determining whether the program is valid; a detection module coupled to the pre-execution monitor operable for intercepting a trigger from the computing device's operating system; and an execution module coupled to the detection module and operable for monitoring the program in response to the trigger intercepted by the detection module.
- 37. The system of claim 36, wherein the pre-execution module is further operable for suspending loading of the program onto the computing device.
- 38. The system of claim 36, wherein the pre-execution module is further operable for retrieving validation data.
- 39. The system of claim 36, wherein the execution module is further operable for deciding whether to terminate the trigger intercepted by the detection module.
- 40. The system of claim 36, wherein the execution module is further operable for retrieving authorization data and deciding how to respond to the trigger intercepted by the detection module.
PRIORITY AND RELATED APPLICATIONS
[0001] The present application claims priority to and incorporates herein provisional patent application entitled, “System and Method for the Managed Security Control of Processes on a Computer System,” filed on Jan. 4, 2002 and assigned U.S. Application Serial No. 60/345,432.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60345432 |
Jan 2002 |
US |