摘要 |
<p>Managing and controlling the execution of software programs with a computing device to protect the computing device from malicious activities. A protector system implements a two-step process to ensure that software programs do not perform malicious activities which may damage the computing device or other computing resources to which the device is coupled. In the first phase, the protector system determines whether a software program has been previously approved and validates (435) that the software program has not been altered. If the software program is validated during the first phase, this will minimize or eliminate security monitoring operations while the software program is executing during the second phase (450). If the software program cannot be validated, the protector system enters the second phase (455) and detects and observes executing activities at the kernel level of the operating system so the suspicious actions can be anticipated and addressed before they are able to do harm to the computing device.</p> |