GB201217613D0 - Security method and apparatus - Google Patents

Security method and apparatus

Info

Publication number
GB201217613D0
GB201217613D0 GBGB1217613.7A GB201217613A GB201217613D0 GB 201217613 D0 GB201217613 D0 GB 201217613D0 GB 201217613 A GB201217613 A GB 201217613A GB 201217613 D0 GB201217613 D0 GB 201217613D0
Authority
GB
United Kingdom
Prior art keywords
security method
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1217613.7A
Other versions
GB2506605A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WithSecure Oyj
Original Assignee
F Secure Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F Secure Oyj filed Critical F Secure Oyj
Priority to GB1217613.7A priority Critical patent/GB2506605A/en
Publication of GB201217613D0 publication Critical patent/GB201217613D0/en
Publication of GB2506605A publication Critical patent/GB2506605A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer And Data Communications (AREA)
GB1217613.7A 2012-10-02 2012-10-02 Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains Withdrawn GB2506605A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1217613.7A GB2506605A (en) 2012-10-02 2012-10-02 Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1217613.7A GB2506605A (en) 2012-10-02 2012-10-02 Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains

Publications (2)

Publication Number Publication Date
GB201217613D0 true GB201217613D0 (en) 2012-11-14
GB2506605A GB2506605A (en) 2014-04-09

Family

ID=47225550

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1217613.7A Withdrawn GB2506605A (en) 2012-10-02 2012-10-02 Identifying computer file based security threats by analysis of communication requests from files to recognise requests sent to untrustworthy domains

Country Status (1)

Country Link
GB (1) GB2506605A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3416085B1 (en) * 2017-06-16 2020-06-03 AO Kaspersky Lab System and method of detecting malicious files with the use of elements of static analysis
RU2654146C1 (en) 2017-06-16 2018-05-16 Акционерное общество "Лаборатория Касперского" System and method of detecting malicious files accompanied with using the static analysis elements

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080082662A1 (en) * 2006-05-19 2008-04-03 Richard Dandliker Method and apparatus for controlling access to network resources based on reputation
US8800030B2 (en) * 2009-09-15 2014-08-05 Symantec Corporation Individualized time-to-live for reputation scores of computer files
US20110185428A1 (en) * 2010-01-27 2011-07-28 Mcafee, Inc. Method and system for protection against unknown malicious activities observed by applications downloaded from pre-classified domains
US8819826B2 (en) * 2010-01-27 2014-08-26 Mcafee, Inc. Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation

Also Published As

Publication number Publication date
GB2506605A (en) 2014-04-09

Similar Documents

Publication Publication Date Title
GB201215481D0 (en) Apparatus and method
GB201205986D0 (en) Apparatus and method
GB2505533B (en) Security method and apparatus
GB201220323D0 (en) Apparatus and method
HK1206134A1 (en) Authentication apparatus and method
EP2880774A4 (en) Method and apparatus
GB201417643D0 (en) Apparatus And Method
GB2507545B (en) Apparatus and method
GB201212090D0 (en) Method and apparatus
GB201212045D0 (en) Apparatus and method
GB201210929D0 (en) Apparatus and method
GB201210361D0 (en) Apparatus and method
EP2729893A4 (en) Security method and apparatus
GB201217613D0 (en) Security method and apparatus
EP2839527A4 (en) Apparatus and method
GB2507664B (en) Apparatus and method
GB201215752D0 (en) Apparatus and method
GB201211205D0 (en) Apparatus and method
GB201204726D0 (en) Method and apparatus
EP2813119A4 (en) Method and apparatus
GB201421234D0 (en) Apparatus and method
GB201301087D0 (en) Apparatus and method
GB201220799D0 (en) Apparatus and method
GB201220774D0 (en) Apparatus and method
GB201220665D0 (en) Apparatus and method

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)