Patent application number | Description | Published |
20100011029 | Malware detection - According to a first aspect of the present invention there is provided a method of detecting malware in a mobile telecommunications device | 01-14-2010 |
20100262584 | Disinfecting a file system - A method and apparatus for disinfecting an infected electronic file in a file system. A file system is scanned using an anti-virus application to identify the infected electronic file. Once the infected file has been identified, information identifying the infected electronic file is sent to a remote node, which queries a database storing a plurality commonly used electronic files to determine whether a clean version of the electronic file is stored at the database. If so, then all or part of the clean version of the infected electronic file is sent from the remote node, and used to replace all or part of the electronic file stored in the file system. | 10-14-2010 |
20110082838 | Computer security method and apparatus - A method of controlling a process on a computer system for backing-up files stored in a primary storage medium, to a secondary storage medium. The method comprises monitoring a file system implemented on the computer system in order to detect write operations made by the file system to said primary storage medium. Upon detection of a write operation, the integrity of a file being written is verified and/or changes in the file identified with respect to a version of the file currently stored in the primary storage medium and which is being replaced. In the event that the integrity of a file being written by the file system is compromised, and/or any identified changes in the file are suspicious, then the file is identified to the back-up process such that automatic back-up of the file is inhibited. | 04-07-2011 |
20110083186 | Malware detection by application monitoring - A method of detecting malware on a computer system. The method comprises monitoring the behaviour of trusted applications running on the computer system and, in the event that unexpected behaviour of an application is detected, identifying a file or files responsible for the unexpected behaviour and tagging the file(s) as malicious or suspicious. The unexpected behaviour of the application may comprise, for example, dropping executable files, performing modifications to a registry branch which is not a registry branch of the application, reading a file type class which is not a file type class of the application, writing portable executable (PE) files, and crashing and re-starting of the application. | 04-07-2011 |
20110084803 | Controlling location information - A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application. | 04-14-2011 |
20120002839 | Malware image recognition - According to a first aspect of the present invention there is provided a method of detecting malware or other potentially unwanted programs. The method includes, at each of a plurality of client terminals, when it is determined that a program may be malware or a potentially unwanted program, generating image recognition data from displayed image data that includes image elements generated by the program, and sending the image recognition data to a central server. At the central server, storing the received image recognition data, and using the stored image recognition data to detect the presence of a malware or potentially unwanted program at the client terminals. | 01-05-2012 |
20120079584 | Authenticating A Node In A Communication Network - A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an authentication request. The authentication request includes a first certificate that has previously been presented to the second node by a node purporting to be the first node. The authentication node retrieves a second certificate belonging to the first node from the first node, and compares the first certificate with the second certificate. If the certificates match, then the first node's identity can be authenticated but if the certificates do not match, then the first node's identity cannot be authenticated. The results of the comparison are then sent to the second node. | 03-29-2012 |
20120084865 | False Alarm Detection For Malware Scanning - A method of scanning files for malware on a computer system. The method includes receiving a file to be scanned in the system, and using at least one malware scanning engine to determine whether or not the file possesses properties that are indicative of malware. If it is determined that the file does possess properties that are indicative of malware, then at least one cleanliness scanning engine is used to determine whether or not the file possesses properties that are indicative of a clean file. If it is determined that the file possesses properties that are indicative of a clean file, then a false alarm is signalled. | 04-05-2012 |
20130067576 | Restoration of file damage caused by malware - In accordance with an example embodiment of the present invention, there is provided a method including: detecting a malware in a computer system and in response to the detection of the malware in the computer system initiating a deactivation of malware; detecting a file altered by the malware in response to a successful deactivation of the malware; and initiating a restoration of the altered file in response to the detection of the file altered by the malware. | 03-14-2013 |
20130081129 | Outbound Connection Detection and Blocking at a Client Computer - A method of detecting and blocking a malicious SSL connection at a client computer. The method includes identifying, at a network firewall level, an outbound SSL connection being set up at the client computer; detecting an SSL certificate associated with the SSL connection; sending a request to a central server for reputation information on the SSL certificate; at the central server, determining reputation information in dependence upon the SSL certificate; providing said reputation information from the central server to the client computer; and using the reputation information at the client computer to determine whether or not to block the connection. | 03-28-2013 |
20130262706 | Data Syncronisation - The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device. | 10-03-2013 |
Patent application number | Description | Published |
20120159631 | Anti-Virus Scanning - A method and apparatus for performing an anti-virus scan of a file system. Intermediate scanning results are obtained for a file in the file system, prior to a scan of the file being completed. The intermediate scanning results are then stored in a database. The intermediate scanning results can be used to speed up subsequent scans, and to provide other useful information to an on-line anti-virus server. In a subsequent scan of the file system, a determination is made whether intermediate scanning results relating to the file are available in the database. If they are available for a particular type of intermediate scan, then a scan need not be performed for the file. If they are not, then the scan can be performed. | 06-21-2012 |
20120317169 | Security configuration - An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving, from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining executable web site features on the basis of the retrieved reputation data. | 12-13-2012 |
20130095751 | Near Field Communication Security - In accordance with an example embodiment of the present invention, there is provided a computing device, including at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the device to perform at least the following: receive near field communication device data related to a specific NFC device; generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider; receive reputation data, retrieved from a reputation database of NFC device reputation information, related to the specific NFC device from the service provider; and take further action on the basis of the received reputation relating to the specific NFC device. | 04-18-2013 |
20140123245 | Security Configuration - An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving, from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining executable web site features on the basis of the retrieved reputation data. | 05-01-2014 |
20140137220 | Obtaining Password Data - A method of obtaining password data for entry to an application running on a device. The method may include running a password manager application on a device. The password manager application may identify one or more applications installed on the device. The password manager application may display the identified applications on a display of the device. The password manager application may receive a user selection of a displayed application. The password manager application may determine whether an entry exists for the selected application in a memory associated with the password manager application. If no entry exists, the password manager application may generate an entry comprising password data for the selected application. If an entry exists, the password manager application may retrieve password data relating to the selected application. | 05-15-2014 |
20140237582 | Authenticating a Node in a Communication Network - A method and apparatus for authenticating a first node's identity in a communication network. An authentication node receives from a second node an authentication request. The authentication request includes a first certificate that has previously been presented to the second node by a node purporting to be the first node. The authentication node retrieves a second certificate belonging to the first node from the first node, and compares the first certificate with the second certificate. If the certificates match, then the first node's identity can be authenticated but if the certificates do not match, then the first node's identity cannot be authenticated. The results of the comparison are then sent to the second node. | 08-21-2014 |
20140259119 | Controlling Access to Web Content - A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer. | 09-11-2014 |
20140317754 | Detecting Unauthorised Changes to Website Content - Methods, apparatus, systems are provided for use in detecting unauthorised changes to websites of web operators. Authorised content policy sets for each of a multiplicity of websites from web operators are collected and stored. In addition, content information obtained in respect web content downloaded from said websites by a multiplicity of client devices, client proxy devices, and/or client gateway devices is used to identify websites that do not conform to respective policy sets. Alerts are sent to the web operator of any non-conforming website. Optionally, alerts may be sent to client devices, client gateway devices, and/or client proxy devices for use in scanning or blocking the web content from non-conforming websites. | 10-23-2014 |
Patent application number | Description | Published |
20140130164 | Malicious Object Detection - Malicious object detection is disclosed. An apparatus includes one or more processors, and one or more memories including computer program code. The one or more memories and the computer program code are configured to, with the one or more processors, cause the apparatus at least to perform: obtain image data; obtain association data relating to the image data; identify the image data as corresponding to an identified image among known reference images; and set reputation data of the association data as suspicious, if the association data does not match acceptable associations for the identified image. | 05-08-2014 |
20140373153 | Anti-Malware Tool for Mobile Apparatus - A method, apparatus, and computer program for monitoring security of a mobile apparatus are disclosed. The method includes executing a security application in a mobile apparatus; monitoring, by the security application, user interface locking status of the mobile apparatus; determining, as a result of said monitoring, that the user interface has been locked; identifying an application that has caused said locking of the user interface; checking a reputation status of the identified application; upon detecting, as a result of said reputation status check, that the identified application has a bad reputation status, restricting operation of the identified application and unlocking the user interface. | 12-18-2014 |
20150178499 | PROTECTING MULTI-FACTOR AUTHENTICATION - Methods are detailed for online fraud prevention. In one approach state information of a first and a second device is monitored, both of which are associated with one user. During a multi-factor authentication procedure which utilizes at least one of the first and the second devices for authorizing a transaction by an Internet domain, a security server participates in a supplemental security procedure which is conditional on the monitored state information. In another approach the second device receives a message that is ostensibly related to multi-factor authorization by an Internet domain, and in response sends a query about state information of the first device. Based on the response to the query that indicates the state information, the second device performs a supplemental security procedure. | 06-25-2015 |
20160050220 | Detection of Webcam Abuse - A method of detecting unauthorised use of a webcam or a microphone on a computer system, the method including, at the computer, identifying a process that is using the webcam or the microphone, determining whether information is visibly displayed by the computer system to indicate to a user the use of the webcam or the microphone by the process; and using a result of the step of determining to identify said process as malware or potential malware. | 02-18-2016 |
Patent application number | Description | Published |
20090190548 | Data transmission in a mobile communication system apparatus, system and method - An apparatus, system, and method may include providing a plurality of data streams in respective subchannels and modulating a first data stream of the plurality of data streams at least partially with a different modulation constellation than a second data stream of the plurality of data streams. The method may also include transmitting the first and second data streams using a same radio resource to user terminals using different subchannels of the radio resource. | 07-30-2009 |
20110051631 | Method and Device for Processing Data Blocks and Communication System Comprising Such Device - A method and a device for processing data blocks are provided, wherein each resource unit includes at least two portions of user data, wherein each portion of user data is associated with a user; and wherein subsequent resource units include different combinations of portions of user data. Furthermore, a communication system is provided comprising such a device. | 03-03-2011 |
20110103447 | Method and Device for Testing a Mobile Station's Capability of Processing at Least One Second Channel and Communication System Comprising Such Device - A method and a device are provided for testing a mobile station's capability of processing at least two channels in a resource unit is provided, wherein a base station provides a test message to the mobile station; wherein the mobile station's capability of processing the at least two channels is determined based upon the mobile station's feedback. Further, a communication system comprising such a device is suggested. | 05-05-2011 |
20130201913 | Employing Reference Signals in Communications - A method is provided, including receiving a signal on a communications channel, correlating the received signal and a reference signal and determining, on the basis of a result of the correlation, whether the reference signal can be employed on the communications channel. | 08-08-2013 |
20140349568 | Detection of Intentional Radio Jamming - There is provided a method, an apparatus, and a computer program for acquiring, in a radio communication network infrastructure, a message from a terminal device indicating communication quality below a determined threshold in a radio connection between the radio communication network infrastructure and the terminal device; detecting presence of an intentional radio interference source, wherein the detection is based on at least one measurement report received from the terminal device; and upon a result of said detection of the intentional radio interference source, causing transmission of a notification message to a determined target entity. | 11-27-2014 |
Patent application number | Description | Published |
20090074666 | Peptide vaccine for influenza virus - The invention relates to the method for evaluating the potential of a chemical entity, such as an antibody, to bind to a peptide epitope derived from the divalent sialoside binding site of hemagglutinin protein of influenza virus. The invention also provides peptide epitopes for use in the prevention and/or treatment of influenza or for the development of such treatment or vaccine against influenza. | 03-19-2009 |
20100074920 | PEPTIDE VACCINE FOR INFLUENZA VIRUS - The invention relates to the method for evaluating the potential of a chemical entity, such as an antibody, to bind to a peptide epitope derived from the divalent sialoside binding site of hemagglutinin protein of influenza virus. The invention also provides peptide epitopes 5 for use in the prevention and/or treatment of influenza or for the development of such treatment or vaccine against influenza. | 03-25-2010 |
20100184150 | NUTRITIONAL COMPOSITIONS - The present invention is directed to a novel saccharide composition isolated from a yeast culture. The invention is also directed to yeast cell based saccharide composition with increased water-solubility. The saccharide compositions disclosed in the invention can be used as nutritional or pharmaceutical additives or as part of nutritional or pharmaceutical composition in order to promote the health of an animal or human subject to which said composition is administered. The invention is also directed to methods of producing said saccharide compositions. | 07-22-2010 |
20110191867 | PEPTIDE VACCINE FOR INFLUENZA VIRUS - The invention provides peptide epitopes for use in the prevention and/or treatment of influenza or for the development of such treatment or vaccine against influenza. The invention also relates to a method for evaluating the potential of a chemical entity, such as an antibody, to bind to a peptide epitope derived from the divalent sialoside binding site of hemagglutinin protein of influenza virus, and to conjugates containing one or more such peptide epitopes. The peptide epitopes of the invention are cyclic peptides comprising a 7-mer peptide derived from H1, H3 or H5 hemagglutinin of influenza virus. The 7-mer peptide has a sequence corresponding to the loop sequence at positions 220-226 of X31-hemagglutinin. | 08-04-2011 |
20110250235 | PRODUCTION OF A SACCHARIDE COMPOSITION COMPRISING GLUCANS AND MANNANS BY ALKALINE AND ACID HYDROLYSIS OF YEAST CELLS - The present invention is directed to a method of production of an immunostimulatory composition having a saccharide fraction, the method including the steps of hydrolyses of yeast cells and recovering the soluble fraction. The saccharide fraction having composition thus obtained may be incorporated as a food or beverage component or be used as a pharmaceutical for treatment of specific conditions. | 10-13-2011 |