US 12,314,405 B2
Managing the loading of sensitive modules
John R. Shaw, II, Broomfield, CO (US); and Andrew L. Sandoval, San Antonio, TX (US)
Assigned to Open Text Inc., Menlo Park, CA (US)
Filed by Open Text Inc., Menlo Park, CA (US)
Filed on Mar. 18, 2024, as Appl. No. 18/608,098.
Application 18/608,098 is a continuation of application No. 17/993,068, filed on Nov. 23, 2022, granted, now 11,966,478.
Application 17/993,068 is a continuation of application No. 17/220,773, filed on Apr. 1, 2021, granted, now 11,550,926, issued on Jan. 10, 2023.
Application 17/220,773 is a continuation of application No. 16/143,797, filed on Sep. 27, 2018, granted, now 11,030,320, issued on Jun. 8, 2021.
Claims priority of provisional application 62/657,365, filed on Apr. 13, 2018.
Prior Publication US 2024/0220637 A1, Jul. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/57 (2013.01); G06F 21/51 (2013.01); G06F 21/55 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 21/51 (2013.01); G06F 21/552 (2013.01); G06F 21/604 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for managing loading of sensitive modules, comprising:
based on an application attempting to access a module, scanning the module to obtain module attributes;
generating a sensitivity level of the module based on the module attributes;
analyzing a computing environment of the application to generate a trust level associated with the application;
determining whether to prevent access to the module by the application based on the sensitivity level and the trust level;
when the determination is to prevent access, blocking access to the module, otherwise when the determination is to not prevent access:
determining whether to monitor the application attempting to access the module;
when the determination is to monitor the application:
analyzing activity of the application;
determining whether to terminate the application based on the analyzed activity of the application, wherein the analyzed activity of the application indicates suspicious activity;
when the determination is to terminate the application, terminating the application, otherwise permitting the application to continue execution.