Labeling objects on an endpoint for encryption management

Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granul...

Full description

Saved in:
Bibliographic Details
Main Authors Shaw, John Edward Tyrone, Schütz, Harald, Watkiss, Neil Robert Tyndale, Cook, Robert W, Merry, Anthony John, Reed, Simon Neil, Thomas, Andrew J, Harris, Mark D, Ray, Kenneth D, Schiappa, Daniel Salvatore
Format Patent
LanguageEnglish
Published 08.05.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Threat detection instrumentation is simplified by providing and updating labels for computing objects in a context-sensitive manner. This may include simple labeling schemes to distinguish between objects, e.g., trusted/untrusted processes or corporate/private data. This may also include more granular labeling schemes such as a three-tiered scheme that identifies a category (e.g., financial, e-mail, game), static threat detection attributes (e.g., signatures, hashes, API calls), and explicit identification (e.g., what a file or process calls itself). By tracking such data for various computing objects and correlating these labels to malware occurrences, rules can be written for distribution to endpoints to facilitate threat detection based on, e.g., interactions of labeled objects, changes to object labels, and so forth. In this manner, threat detection based on complex interactions of computing objects can be characterized in a platform independent manner and pre-processed on endpoints without requiring significant communications overhead with a remote threat management facility.
Bibliography:Application Number: US201414485769