GB201406626D0 - System and method for developing a risk profile for an internet resource - Google Patents
System and method for developing a risk profile for an internet resourceInfo
- Publication number
- GB201406626D0 GB201406626D0 GBGB1406626.0A GB201406626A GB201406626D0 GB 201406626 D0 GB201406626 D0 GB 201406626D0 GB 201406626 A GB201406626 A GB 201406626A GB 201406626 D0 GB201406626 D0 GB 201406626D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- developing
- risk profile
- internet resource
- resource
- internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17126409P | 2009-04-21 | 2009-04-21 | |
US24138909P | 2009-09-10 | 2009-09-10 | |
US12/709,504 US8438386B2 (en) | 2009-04-21 | 2010-02-21 | System and method for developing a risk profile for an internet service |
GB1119949.4A GB2483808B (en) | 2009-04-21 | 2010-02-27 | System and method for developing a risk profile for an internet resource |
Publications (4)
Publication Number | Publication Date |
---|---|
GB201406626D0 true GB201406626D0 (en) | 2014-05-28 |
GB2512754A GB2512754A (en) | 2014-10-08 |
GB2512754A8 GB2512754A8 (en) | 2014-10-15 |
GB2512754B GB2512754B (en) | 2015-02-25 |
Family
ID=51536072
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1406626.0A Active GB2512754B (en) | 2009-04-21 | 2010-02-27 | Training a Maximum Entropy Discrimination classifier for controlling access to an Internet Resource |
GB1406624.5A Active GB2512753B (en) | 2009-04-21 | 2010-02-27 | Controlling access to Internet resources |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1406624.5A Active GB2512753B (en) | 2009-04-21 | 2010-02-27 | Controlling access to Internet resources |
Country Status (1)
Country | Link |
---|---|
GB (2) | GB2512754B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113282921A (en) * | 2021-06-11 | 2021-08-20 | 深信服科技股份有限公司 | File detection method, device, equipment and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10268976B2 (en) * | 2016-02-17 | 2019-04-23 | SecurityScorecard, Inc. | Non-intrusive techniques for discovering and using organizational relationships |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8438499B2 (en) * | 2005-05-03 | 2013-05-07 | Mcafee, Inc. | Indicating website reputations during user interactions |
US20080082662A1 (en) * | 2006-05-19 | 2008-04-03 | Richard Dandliker | Method and apparatus for controlling access to network resources based on reputation |
-
2010
- 2010-02-27 GB GB1406626.0A patent/GB2512754B/en active Active
- 2010-02-27 GB GB1406624.5A patent/GB2512753B/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113282921A (en) * | 2021-06-11 | 2021-08-20 | 深信服科技股份有限公司 | File detection method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
GB2512753A (en) | 2014-10-08 |
GB2512753B (en) | 2015-02-25 |
GB2512754A8 (en) | 2014-10-15 |
GB2512754A (en) | 2014-10-08 |
GB201406624D0 (en) | 2014-05-28 |
GB2512754B (en) | 2015-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2483808B (en) | System and method for developing a risk profile for an internet resource | |
GB2483005B (en) | Method and system for executing an internet radio application within a vehicle | |
IL210169A0 (en) | System and method for routing-based internet security | |
GB201009498D0 (en) | Method fo website optimisation | |
ZA201204186B (en) | Resource management method and system thereof | |
EP2481217A4 (en) | System and method for micro-cloud computing | |
EP2486727A4 (en) | A method and system for processing an image | |
EP2432962A4 (en) | Method and apparatus for a stair assembly | |
HK1132819A1 (en) | A method and system for determining and applying a webpage evaluation value | |
ZA201204686B (en) | A method and system for providing an internet based transaction | |
GB201015614D0 (en) | Method and system for managing healthcare resources | |
GB201004489D0 (en) | Method and system for providing internet advertisement | |
EP2256970A4 (en) | A system and method for indicating the uplink resource | |
EP2513665A4 (en) | Method and system for enhancing an image | |
GB2473513B (en) | A method and apparatus for determining processor performance | |
EP2559274A4 (en) | Method and apparatus for context-indexed network resource sections | |
EP2440409A4 (en) | Developer unit and method thereof | |
PT2934047T (en) | Resource configuration method and system | |
GB201209661D0 (en) | Method for developing software and device for same | |
PL2526531T3 (en) | Method for securing an object and corresponding object | |
ZA201207907B (en) | Billboard exposure determining system and method | |
EP2518967A4 (en) | Method, system and device for initializing internet device | |
EP2449839A4 (en) | An apparatus and a method for resource contention | |
EP2443602A4 (en) | System and method for marketing | |
GB201302047D0 (en) | Resource availablilty system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
R108 | Alteration of time limits (patents rules 1995) |
Free format text: EXTENSION APPLICATION Effective date: 20150112 |