Sophos Limited

United Kingdom

Back to Profile

1-3 of 3 for Sophos Limited Sort by
Query
Patent
Canada - CIPO
Excluding Subsidiaries
Aggregations Reset Report
IPC Class
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system 2
G06F 11/30 - Monitoring 1
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 1
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules 1
H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis 1
See more
Status
Pending 2
Registered / In Force 1
Found results for  patents

1.

FORENSIC ANALYSIS OF COMPUTING ACTIVITY AND MALWARE DETECTION USING AN EVENT GRAPH

      
Document Number 03020559
Status Pending
Filing Date 2017-04-11
Open to Public Date 2017-10-19
Owner SOPHOS LIMITED (United Kingdom)
Inventor
  • Ladnai, Beata
  • Harris, Mark David
  • Thomas, Andrew J.
  • Smith, Andrew G.P.
  • Humphries, Russell
  • Ray, Kenneth D.

Abstract

A data recorder stores endpoint activity on an ongoing basis as sequences of events that causally relate computer objects such as processes and files. When a security event is detected, an event graph may be generated based on these causal relationships among the computing objects. For a root cause analysis, the event graph may be traversed in a reverse order from the point of an identified security event (e.g., a malware detection event) to preceding computing objects, while applying one or more cause identification rules to identify a root cause of the security event. Once a root cause is identified, the event graph may be traversed forward from the root cause to identify other computing objects that are potentially compromised by the root cause. Further, patterns within the event graph can be used to detect the presence of malware on the endpoint.

IPC Classes  ?

  • H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 9/40 - Network security protocols
  • G06F 11/30 - Monitoring

2.

ENCRYPTION TECHNIQUES

      
Document Number 03014175
Status Pending
Filing Date 2016-06-17
Open to Public Date 2017-08-17
Owner SOPHOS LIMITED (United Kingdom)
Inventor
  • Ray, Kenneth D.
  • Thomas, Andrew J.
  • Merry, Anthony John
  • Schutz, Harald
  • Berger, Andreas
  • Shaw, John Edward Tyrone
  • Ortner, Stefan
  • Vanbiervliet, Vincent
  • Gruber, Norbert
  • Hein, Markus
  • Wintersberger, Gerald
  • Wenzel, Artur
  • Humphries, Russell
  • Sullivan, Gordon

Abstract

A portable encryption format wraps encrypted files in a self-executing container that facilitates transparent, identity-based decryption for properly authenticated users while also providing local password access to wrapped files when identity-based decryption is not available.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 51/08 - Annexed information, e.g. attachments
  • H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/16 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
  • H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route

3.

CLOUD-BASED KEY MANAGEMENT

      
Document Number 02864347
Status In Force
Filing Date 2014-09-22
Open to Public Date 2015-06-16
Grant Date 2020-04-07
Owner SOPHOS LIMITED (United Kingdom)
Inventor Brenner, Stephan

Abstract

Cloud storage of sensitive data is improved by ensuring that all cloud-based data is encrypted at all times, not only when the data is at rest (i.e., stored), but also while data is being processed or communicated. Cryptographic keys can advantageously be managed via cloud based resources without exposing sensitive data. Instead, a key management system maintains cryptographic functions on administrative hosts and endpoints outside of cloud-based resources so that any vulnerabilities of the cloud-based resources will expose only encrypted data, and keys and sensitive data will never be exposed in unencrypted form. Thus sensitive data is protected end-to-end among hosts and endpoints using, e.g., platform independent cryptographic functions and libraries within a web browser or the like, and the cloud functions simply as a storing and forwarding medium for secure data.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system