GB201217613D0 - Security method and apparatus - Google Patents
Security method and apparatusInfo
- Publication number
- GB201217613D0 GB201217613D0 GBGB1217613.7A GB201217613A GB201217613D0 GB 201217613 D0 GB201217613 D0 GB 201217613D0 GB 201217613 A GB201217613 A GB 201217613A GB 201217613 D0 GB201217613 D0 GB 201217613D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- security method
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer And Data Communications (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1217613.7A GB2506605A (en) | 2012-10-02 | 2012-10-02 | Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1217613.7A GB2506605A (en) | 2012-10-02 | 2012-10-02 | Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201217613D0 true GB201217613D0 (en) | 2012-11-14 |
GB2506605A GB2506605A (en) | 2014-04-09 |
Family
ID=47225550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1217613.7A Withdrawn GB2506605A (en) | 2012-10-02 | 2012-10-02 | Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2506605A (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3416085B1 (en) * | 2017-06-16 | 2020-06-03 | AO Kaspersky Lab | System and method of detecting malicious files with the use of elements of static analysis |
RU2654146C1 (en) | 2017-06-16 | 2018-05-16 | Акционерное общество "Лаборатория Касперского" | System and method of detecting malicious files accompanied with using the static analysis elements |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080082662A1 (en) * | 2006-05-19 | 2008-04-03 | Richard Dandliker | Method and apparatus for controlling access to network resources based on reputation |
US8800030B2 (en) * | 2009-09-15 | 2014-08-05 | Symantec Corporation | Individualized time-to-live for reputation scores of computer files |
US20110185428A1 (en) * | 2010-01-27 | 2011-07-28 | Mcafee, Inc. | Method and system for protection against unknown malicious activities observed by applications downloaded from pre-classified domains |
US8819826B2 (en) * | 2010-01-27 | 2014-08-26 | Mcafee, Inc. | Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation |
-
2012
- 2012-10-02 GB GB1217613.7A patent/GB2506605A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB2506605A (en) | 2014-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201215481D0 (en) | Apparatus and method | |
GB201205986D0 (en) | Apparatus and method | |
GB2505533B (en) | Security method and apparatus | |
GB201220323D0 (en) | Apparatus and method | |
HK1206134A1 (en) | Authentication apparatus and method | |
EP2880774A4 (en) | Method and apparatus | |
GB201417643D0 (en) | Apparatus And Method | |
GB2507545B (en) | Apparatus and method | |
GB201212090D0 (en) | Method and apparatus | |
GB201212045D0 (en) | Apparatus and method | |
GB201210929D0 (en) | Apparatus and method | |
GB201210361D0 (en) | Apparatus and method | |
EP2729893A4 (en) | Security method and apparatus | |
GB201217613D0 (en) | Security method and apparatus | |
EP2839527A4 (en) | Apparatus and method | |
GB2507664B (en) | Apparatus and method | |
GB201215752D0 (en) | Apparatus and method | |
GB201211205D0 (en) | Apparatus and method | |
GB201204726D0 (en) | Method and apparatus | |
EP2813119A4 (en) | Method and apparatus | |
GB201421234D0 (en) | Apparatus and method | |
GB201301087D0 (en) | Apparatus and method | |
GB201220799D0 (en) | Apparatus and method | |
GB201220774D0 (en) | Apparatus and method | |
GB201220665D0 (en) | Apparatus and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |