F-Secure Oyj

Finland

Back to Profile

1-100 of 122 for F-Secure Oyj Sort by
Query
Aggregations
IP Type
        Patent 104
        Trademark 18
Jurisdiction
        United States 59
        World 57
        Canada 6
Date
2023 3
2022 7
2021 1
2020 5
2019 2
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 36
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 23
H04W 12/12 - Detection or prevention of fraud 19
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 13
H04W 12/08 - Access security 13
See more
NICE Class
09 - Scientific and electric apparatus and instruments 18
42 - Scientific, technological and industrial services, research and design 16
38 - Telecommunications services 11
35 - Advertising and business services 6
41 - Education, entertainment, sporting and cultural services 6
See more
Status
Pending 6
Registered / In Force 116
  1     2        Next Page

1.

METHODS AND SYSTEMS FOR ADDRESSING UNREPORTED THEFT OR LOSS OF MOBILE COMMUNICATIONS DEVICES

      
Application Number 18299340
Status Pending
Filing Date 2023-04-12
First Publication Date 2023-08-03
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John G.
  • Burgess, James David
  • Grkov, Vance
  • Richardson, David Luke
  • Mandal, Ayan
  • Mangat, Cherry
  • Buck, Brian James
  • Robinson, William

Abstract

A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04W 4/029 - Location-based management or tracking services
  • H04L 9/40 - Network security protocols
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • H04W 4/02 - Services making use of location information
  • G06F 21/31 - User authentication
  • G06F 21/88 - Detecting or preventing theft or loss
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
  • H04W 12/30 - Security of mobile devices; Security of mobile applications

2.

F

      
Application Number 1725754
Status Registered
Filing Date 2022-11-14
Registration Date 2022-11-14
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; computer application software for mobile phones; cloud servers; cloud computing software; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); computer application software for use in implementing the Internet of Things (IoT); computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); Software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); embedded software; embedded software for use in implementing cyber security solutions for the Internet of Things (IoT). Data processing, systematisation and management; collection of data; computerised data processing; management and compilation of computerised databases; retail and wholesale services in relation to information technology equipment and computer software; information, advisory and consultancy services relating to all the aforesaid services. Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services. Education; providing of training; arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable. Technological services; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; computer security services for protection against illegal network access; compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage; IT consultancy, advisory and information services; IT security services in the nature of protection and recovery of computer data; provision of cyber security services for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services in the field of data and applications; endpoint cyber security services; outsource service providers in the field of information technology; technical support services relating to computer software and applications; monitoring of network and computer systems; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; providing online, non-downloadable software; providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud computing services; administration of cloud servers, arranging of cloud computing services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services.

3.

F F-Secure

      
Application Number 1725467
Status Registered
Filing Date 2022-11-14
Registration Date 2022-11-14
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; computer application software for mobile phones; cloud servers; cloud computing software; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); computer application software for use in implementing the Internet of Things (IoT); computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); embedded software; embedded software for use in implementing cyber security solutions for the Internet of Things (IoT). Data processing, systematisation and management; collection of data; computerised data processing; management and compilation of computerised databases; retail and wholesale services in relation to information technology equipment and computer software; information, advisory and consultancy services relating to all the aforesaid services. Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services. Education; providing of training; arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable. Technological services; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; computer security services for protection against illegal network access; compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage; IT consultancy, advisory and information services; IT security services in the nature of protection and recovery of computer data; provision of cyber security services for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services in the field of data and applications; endpoint cyber security services; outsource service providers in the field of information technology; technical support services relating to computer software and applications; monitoring of network and computer systems; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; providing online, non-downloadable software; providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud computing services; administration of cloud servers, arranging of cloud computing services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services.

4.

Method for identifying network devices in computer network and an apparatus configured to identify network devices in computer network

      
Application Number 17843651
Grant Number 11736353
Status In Force
Filing Date 2022-06-17
First Publication Date 2022-12-29
Grant Date 2023-08-22
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Yakovlev, Yury
  • Govea Aguilar, Elio Alejandro

Abstract

A method for identifying devices in a computer network includes collecting data points including device related parameters/information from a device accessing network resources, determining a string distance between the set of collected data points with the data sets collected from previously known network devices and selecting the smallest string distance value and/or highest similarity score. If the determined string distance to the data set of the closest device exceeds a threshold value, the device accessing the network resources is new and its entry can be created. If the determined string distance is under a predetermined threshold value, it is determined that the device accessing the network resources is the device having the closest string distance value to the collected set of data points, and the values in a database and/or the network element of the previously known device can be updated based on the collected set of data points.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 41/08 - Configuration management of networks or network elements
  • G06F 18/22 - Matching criteria, e.g. proximity measures
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/12 - Discovery or management of network topologies

5.

F F-SECURE

      
Application Number 225287200
Status Pending
Filing Date 2022-11-14
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; computer application software for mobile phones; cloud servers; cloud computing software; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); computer application software for use in implementing the Internet of Things (IoT); computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); embedded software; embedded software for use in implementing cyber security solutions for the Internet of Things (IoT). (1) Data processing, systematisation and management; collection of data; computerised data processing; management and compilation of computerised databases; retail and wholesale services in relation to information technology equipment and computer software; information, advisory and consultancy services relating to all the aforesaid services. (2) Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services. (3) Education; providing of training; arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable. (4) Technological services; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; computer security services for protection against illegal network access; compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage; IT consultancy, advisory and information services; IT security services in the nature of protection and recovery of computer data; provision of cyber security services for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services in the field of data and applications; endpoint cyber security services; outsource service providers in the field of information technology; technical support services relating to computer software and applications; monitoring of network and computer systems; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; providing online, non-downloadable software; providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud computing services; administration of cloud servers, arranging of cloud computing services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services.

6.

F F-SECURE

      
Serial Number 79367893
Status Pending
Filing Date 2022-11-14
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable software and software applications for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, router and gateway protection, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software applications for Internet content filtering; downloadable software platforms for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for use of virtual private networks (VPN); downloadable software for protection against fraud and identity thefts; downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable USB operating software; downloadable software and downloadable software device drivers for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; wireless devices in the nature of mobile hotspot devices, mobile phones, laptops and tablet computers; downloadable computer application software for use in implementing the Internet of Things (IoT); downloadable computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable software and computer applications for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable or integrable embedded software for use in implementing cyber security solutions for the Internet of Things (IoT) Data processing, systematisation and management in the nature of compiling electronic data into computer databases; collection of data services, namely, electronic data collection for business purposes in the field of information technology, data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities; computerised data processing; management and compilation of computerised databases; retail store services, retail web store services, wholesale store services, and wholesale web store services in relation to computer software; business information, advisory and consultancy services relating to all the aforesaid services Telecommunication services, namely, delivery of messages by electronic transmission and telecommunications services in the field of private and secure Internet browsing, namely, providing virtual private networks (VPN) services and providing private electronic messaging services; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured electronic data, sound and image transmission services; providing access to databases; providing user access to a global computer information on the Internet; data transfer re-routing, namely, transfer of data by telecommunication; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services, namely, information, advisory, and consultancy services relating to telecommunications Educational services, namely, conducting seminars, conferences, and workshops in the field of cyber security; providing of training in the field of cyber security and secure software development; arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable in the nature of manuals featuring information technology in the field of cyber security Technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software applications in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; computer security services in the nature of detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management for protection against illegal network access; digital compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage, namely, monitoring of computer systems by remote access to ensure proper functioning; IT consultancy, advisory and information services; IT security services in the nature of protection being data encryption services and recovery of computer data; provision of cyber security services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services, namely, computer network security consultancy in the field of data and applications; endpoint cyber security services, namely, detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; outsource service providers in the field of information technology; technical support services, namely, troubleshooting of computer software and software applications; monitoring of network and computer systems, namely, monitoring of network and computer systems by remote access to ensure proper functioning; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes to ensure proper functioning and to detect unauthorized access or data breach; providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PAAS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IAAS) services, namely, hosting software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security for use by others; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud-based data protection services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security

7.

F

      
Serial Number 79368015
Status Pending
Filing Date 2022-11-14
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Downloadable software and software applications for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, router and gateway protection, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software applications for Internet content filtering; downloadable software platforms for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for use of virtual private networks (VPN); downloadable software for protection against fraud and identity thefts; downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable USB operating software; downloadable software and downloadable software device drivers for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; wireless devices in the nature of mobile hotspot devices, mobile phones, laptops and tablet computers; downloadable computer application software for use in implementing the Internet of Things (IoT); downloadable computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable software and computer applications for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable or integrable embedded software for use in implementing cyber security solutions for the Internet of Things (IoT) Data processing, systematisation and management in the nature of compiling electronic data into computer databases; collection of data services, namely, electronic data collection for business purposes in the field of information technology, data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities; computerised data processing; management and compilation of computerised databases; retail store services, retail web store services, wholesale store services, and wholesale web store services in relation to computer software; business information, advisory and consultancy services relating to all the aforesaid services Telecommunication services, namely, delivery of messages by electronic transmission and telecommunications services in the field of private and secure Internet browsing, namely, providing virtual private networks (VPN) services and providing private electronic messaging services; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured electronic data, sound and image transmission services; providing access to databases; providing user access to a global computer information on the Internet; data transfer re-routing, namely, transfer of data by telecommunication; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services, namely, information, advisory, and consultancy services relating to telecommunications Educational services, namely, conducting seminars, conferences, and workshops in the field of cyber security; providing of training in the field of cyber security and secure software development; arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable in the nature of manuals featuring information technology in the field of cyber security Technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software applications in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; computer security services in the nature of detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management for protection against illegal network access; digital compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage, namely, monitoring of computer systems by remote access to ensure proper functioning; IT consultancy, advisory and information services; IT security services in the nature of protection being data encryption services and recovery of computer data; provision of cyber security services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services, namely, computer network security consultancy in the field of data and applications; endpoint cyber security services, namely, detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; outsource service providers in the field of information technology; technical support services, namely, troubleshooting of computer software and software applications; monitoring of network and computer systems, namely, monitoring of network and computer systems by remote access to ensure proper functioning; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes to ensure proper functioning and to detect unauthorized access or data breach; providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PAAS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IAAS) services, namely, hosting software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security for use by others; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud-based data protection services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security

8.

F

      
Application Number 225287300
Status Pending
Filing Date 2022-11-14
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 35 - Advertising and business services
  • 38 - Telecommunications services
  • 41 - Education, entertainment, sporting and cultural services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; computer application software for mobile phones; cloud servers; cloud computing software; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); computer application software for use in implementing the Internet of Things (IoT); computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); Software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); embedded software; embedded software for use in implementing cyber security solutions for the Internet of Things (IoT). (1) Data processing, systematisation and management; collection of data; computerised data processing; management and compilation of computerised databases; retail and wholesale services in relation to information technology equipment and computer software; information, advisory and consultancy services relating to all the aforesaid services. (2) Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services. (3) Education; providing of training; arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable. (4) Technological services; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; computer security services for protection against illegal network access; compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage; IT consultancy, advisory and information services; IT security services in the nature of protection and recovery of computer data; provision of cyber security services for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services in the field of data and applications; endpoint cyber security services; outsource service providers in the field of information technology; technical support services relating to computer software and applications; monitoring of network and computer systems; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; providing online, non-downloadable software; providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud computing services; administration of cloud servers, arranging of cloud computing services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services.

9.

Method and system for verifying device ownership upon receiving a tagged communication from the device

      
Application Number 17668131
Grant Number 11764967
Status In Force
Filing Date 2022-02-09
First Publication Date 2022-08-25
Grant Date 2023-09-19
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Rogers, Marc William
  • Buck, Brian James

Abstract

A mobile communications device is provided with a tagging module that tags outgoing communications. Upon receiving the tagged communication, a communications provider requests from a registered owner service identified in the tag whether the mobile communications device identified in the tag is registered with the registered owner service. Upon receiving confirmation from the registered owner service that the mobile communications device is registered with the service, the communications provider provides information regarding the location of the mobile communications device to the registered owner service.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
  • H04L 9/08 - Key distribution
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
  • H04W 12/12 - Detection or prevention of fraud

10.

METHOD OF THREAT DETECTION IN A THREAT DETECTION NETWORK AND THREAT DETECTION NETWORK

      
Application Number 17550094
Status Pending
Filing Date 2021-12-14
First Publication Date 2022-06-16
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Ståhlberg, Mika
  • Aksela, Matti

Abstract

A network node of a threat detection network, a backend server of a threat detection network, a threat detection network and a threat detection method in a threat detection network. The threat detection network comprises interconnected network nodes and a backend system, wherein at least part of the nodes comprise security agent modules which collect data related to the respective network node. The method comprises collecting and/or analyzing at the network node data related to a network node, generating at least one local behavior model at the network node related to the network node on the basis of the collected and/or analyzed data, sharing at least one generated local behavior model related to the network node with one or more other nodes and/or with the backend system, comparing user activity in a node to the generated local behavior model and/or a received behavior model, and alerting the backend and/or the other nodes, e.g. about anomalous behavior, if deviation from the generated local behavior model and/or the received behavior model is detected, and/or comparing at the backend system the anomalous data with other behavior models, e.g. with other behavior models in the same organization and/or behavior models of known malicious users, and sending from the backend system to the node results and/or data relating to the comparison.

IPC Classes  ?

11.

Display screen or portion thereof with transitional virtual camera shutter graphical user interface

      
Application Number 29663992
Grant Number D0911380
Status In Force
Filing Date 2018-09-20
First Publication Date 2021-02-23
Grant Date 2021-02-23
Owner F-SECURE CORPORATION (Finland)
Inventor Kiljander, Harri

12.

Network security

      
Application Number 16881634
Grant Number 11503082
Status In Force
Filing Date 2020-05-22
First Publication Date 2020-11-26
Grant Date 2022-11-15
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Yakovlev, Yury
  • Gunyho, Gabor
  • Rusetskiy, Andrey

Abstract

There is provided a network security method in a computer network. The method comprises detecting, by a gateway computer, a target device being connected to the computer network, detecting the target device transmitting a DNS query for resolving a hostname into an IP address, transmitting a query to a content rating system, wherein the query comprises the resolved hostname related to the DNS query of the target device, receiving, from the content rating system, a list of categorization categories assigned to the resolved hostname, determining a type of the target device on the basis of the received list of categorization categories assigned to the hostname, and generating a security related decision on the basis of the determined type of the target device.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

13.

Method for inspection and filtering of TCP streams in gateway router

      
Application Number 16868233
Grant Number 11729215
Status In Force
Filing Date 2020-05-06
First Publication Date 2020-11-12
Grant Date 2023-08-15
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Yakovlev, Yury
  • Kilkanen, Tero
  • Palonen, Markus

Abstract

A method of monitoring traffic by a router acting as a gateway between a first and second network is described. The router can receive data packets sent from the first device over the TCP connection and can send a TCP ACK packet to the first device in response to each data packet. The data packets can be stored without sending them to the second device. The stored data packets can be examined in order to determine whether to block or allow the TCP connection. In the event that it is determined to allow the TCP connection, the router can send each of the stored data packets to the second device. In the event that it is determined to block the TCP connection, the router can send a TCP RST message to each of the first and second devices in order to close the TCP connection.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 45/42 - Centralised routing
  • H04L 47/2466 - Traffic characterised by specific attributes, e.g. priority or QoS using signalling traffic
  • H04L 69/163 - In-band adaptation of TCP data exchange; In-band control procedures
  • H04L 69/16 - Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]

14.

Spam detection

      
Application Number 16789813
Grant Number 11575633
Status In Force
Filing Date 2020-02-13
First Publication Date 2020-08-20
Grant Date 2023-02-07
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor Hannikainen, Heikki

Abstract

A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 43/16 - Threshold monitoring
  • H04L 9/40 - Network security protocols
  • H04L 51/224 - Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
  • H04L 67/50 - Network services

15.

Methods and systems for enhancing electronic device security by intercepting and analyzing a communication

      
Application Number 16828548
Grant Number 11122433
Status In Force
Filing Date 2020-03-24
First Publication Date 2020-07-16
Grant Date 2021-09-14
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Richardson, David Luke
  • Mandal, Ayan
  • Mangat, Cherry
  • Grkov, Vance

Abstract

Systems and methods enhance the security of an electronic device by causing an application on the device to intercept and analyze a communication. When the communication meets certain conditions an audio transmission is initiated. In the absence of the conditions the communication is passed to a different application.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04W 12/30 - Security of mobile devices; Security of mobile applications
  • H04W 12/12 - Detection or prevention of fraud
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04W 4/029 - Location-based management or tracking services
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • H04W 4/02 - Services making use of location information
  • G06F 21/31 - User authentication
  • G06F 21/88 - Detecting or preventing theft or loss
  • H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
  • H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
  • H04W 48/02 - Access restriction performed under specific conditions
  • H04W 8/24 - Transfer of terminal data
  • H04W 12/68 - Gesture-dependent or behaviour-dependent

16.

Method and system for providing a security component to a mobile communications device in an application

      
Application Number 16685811
Grant Number 11251962
Status In Force
Filing Date 2019-11-15
First Publication Date 2020-03-19
Grant Date 2022-02-15
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Rogers, Marc William
  • Buck, Brian James

Abstract

A security code module is provided that a developer may include in an application. The application, when downloaded onto a mobile communications device, includes the security code module. The security code module then initiates a request to a server to determine the status of the mobile communications device. When the status indicates that the mobile communications device is not in the possession of the registered owner, a security component on the server performs an action in response.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04W 12/12 - Detection or prevention of fraud
  • G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
  • H04L 9/08 - Key distribution

17.

Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices

      
Application Number 16513615
Grant Number 10623960
Status In Force
Filing Date 2019-07-16
First Publication Date 2019-11-07
Grant Date 2020-04-14
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John G.
  • Burgess, James David
  • Grkov, Vance
  • Richardson, David Luke
  • Mandal, Ayan
  • Mangat, Cherry
  • Buck, Brian James
  • Robinson, William

Abstract

Systems and methods for enhancing the security of an electronic device by causing the electronic device to go into a mode for lost or stolen devices after a security component receives information regarding an event at the electronic device and determines that the event indicates the electronic device is lost or stolen.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04W 12/12 - Detection or prevention of fraud
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04W 4/029 - Location-based management or tracking services
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • H04W 4/02 - Services making use of location information
  • G06F 21/31 - User authentication
  • G06F 21/88 - Detecting or preventing theft or loss
  • H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
  • H04W 48/02 - Access restriction performed under specific conditions
  • H04W 8/24 - Transfer of terminal data
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity

18.

Method and system for responding to an unauthorized action on a mobile communications device

      
Application Number 16110963
Grant Number 10511442
Status In Force
Filing Date 2018-08-23
First Publication Date 2019-01-10
Grant Date 2019-12-17
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Rogers, Marc William
  • Buck, Brian James

Abstract

In a method and system for responding to an unauthorized action on a mobile communications device, a cryptographic key is destroyed. The destruction of the cryptographic key is followed by initiating a boot sequence at the mobile communications device where the device is booted into a kernel that restricts operation of the mobile communications device to communications with a server.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04W 12/12 - Detection or prevention of fraud
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
  • H04L 9/08 - Key distribution

19.

Method for privacy protection

      
Application Number 15978300
Grant Number 11019036
Status In Force
Filing Date 2018-05-14
First Publication Date 2018-11-22
Grant Date 2021-05-25
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Hannikainen, Heikki
  • Afanasiev, Igor

Abstract

There is provided a method for privacy protection including: identifying an API request being related to a tracking service; generating and sending a predetermined number of initial requests to the tracking service when processing the API requests to the tracking service; storing the initial requests and respective responses related to the initial requests from the API in a database; analysing body objects of the stored initial requests and respective responses and generating a dynamic response recipe on the basis of the analysis; and generating a response including a response body acceptable by the tracking process on the basis of the generated dynamic response recipe.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/54 - Interprogram communication
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 16/903 - Querying
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

20.

Methods and systems for causing mobile communications devices to emit sounds with encoded information

      
Application Number 15920305
Grant Number 10419936
Status In Force
Filing Date 2018-03-13
First Publication Date 2018-07-19
Grant Date 2019-09-17
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John G.
  • Burgess, James David
  • Grkov, Vance
  • Richardson, David Luke
  • Mandal, Ayan
  • Mangat, Cherry
  • Buck, Brian James
  • Robinson, William

Abstract

A method is provided for comparing a usage of a mobile communications device to a stored pattern of usage. When a measure associated with a difference between the usage and the stored usage pattern exceeds a threshold, the mobile communications device is caused to emit a sound encoded with information that may be decoded by another electronic device.

IPC Classes  ?

  • H04M 3/16 - Automatic or semi-automatic exchanges with lock-out or secrecy provision in party-line systems
  • H04W 12/08 - Access security
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • H04W 4/02 - Services making use of location information
  • H04W 12/12 - Detection or prevention of fraud
  • G06F 21/31 - User authentication
  • G06F 21/88 - Detecting or preventing theft or loss
  • H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
  • H04W 8/24 - Transfer of terminal data
  • H04W 48/02 - Access restriction performed under specific conditions
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity

21.

F-Secure

      
Application Number 1350927
Status Registered
Filing Date 2016-11-10
Registration Date 2016-11-10
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Security software; software for anti-virus protection, anti-theft protection, backup, online banking protection, electronic messaging protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, software updates, computer and device performance enhancement, use of virtual private networks (VPN), anti-tracking, privacy protection, virtual location management, information network protection and data leakage prevention; software for vulnerability management, risk assessment and information security policy compliance; software for scanning, monitoring and analysis of software applications, computer systems and information networks; software for assessment of information security vulnerabilities and data protection risks; software and hardware for protecting routers; scanning software for securing data; computers and peripherals for anti-virus protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, use of virtual private networks (VPN), anti-tracking, privacy protection, information network protection, and data leakage prevention. Telecommunication services in the field of private and secure Internet browsing; private and secure electronic messaging; providing virtual private network (VPN) services; communication via virtual private networks; data transfer re-routing. Researching, designing, implementing and updating software; support and maintenance services for security software; information security services; information security services for computer networks; services for internet and information network analytics; scanning services for detecting information security vulnerabilities; consulting in the field of information security; computer programming; monitoring and assessing information security risks of computer networks, websites and devices; monitoring computer network systems; information, advice and reporting services in the fields of information security and information technology.

22.

Method for privacy protection

      
Application Number 15284771
Grant Number 10652344
Status In Force
Filing Date 2016-10-04
First Publication Date 2017-04-06
Grant Date 2020-05-12
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Bejerasco, Christine
  • Aquino, Karmina
  • Hannikainen, Heikki

Abstract

There is provided a method for privacy protection including: intercepting at least part of network traffic from a client device; analysing network traffic data of the intercepted network traffic to identify any elements indicative of a website visitor tracking process; analysing the one or more elements indicative of the website visitor tracking process to identify any tracking fields comprising user specific data; selecting random tracking field data accepted by the website visitor tracking process and replacing the user specific data of the one or more tracking fields with the selected random tracking field data respectively.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]

23.

F-Secure

      
Application Number 181161000
Status Registered
Filing Date 2016-11-29
Registration Date 2018-04-23
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

(1) Computer hardware and software for setting up and configuring local area networks; computer utility virus protection programs; network routers; security software; software for ensuring the security of electronic mail; VPN (virtual private network) operating software (1) Providing virtual private network (vpn) services (2) Computer anti-virus protection services; computer network security services; computer programming and software design; computer software consultancy; computer software installation and maintenance; computer virus protection services; consultation services relating to computer software; design and development of computer software; design and development of electronic data security systems; design, installation, updating and maintenance of computer software; design, maintenance, development and updating of computer software; developing computer software; development of software for secure network operations; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems by remote access

24.

Systems and methods for computing device protection

      
Application Number 14715198
Grant Number 10489862
Status In Force
Filing Date 2015-05-18
First Publication Date 2016-11-24
Grant Date 2019-11-26
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Hering, John Gunther
  • Mahaffey, Kevin
  • Buck, Brian James
  • Robinson, William Neil

Abstract

Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device.

IPC Classes  ?

  • G06Q 40/08 - Insurance
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

25.

F-SECURE

      
Serial Number 79210343
Status Registered
Filing Date 2016-11-10
Registration Date 2018-08-28
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Security software for use in computers and mobile devices for use in detecting and protecting against attacks on and unauthorized access to computer and mobile devices; software for anti-virus protection, anti-theft protection, backup, online banking protection, electronic messaging protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, software updates, computer and device performance enhancement, use of virtual private networks (VPN), anti-tracking, privacy protection, virtual location management, information network protection and data leakage prevention; software for vulnerability management, risk assessment and information security policy compliance; software for scanning, monitoring and analysis of software applications, computer systems and information networks; software for assessment of information security vulnerabilities and data protection risks; software and hardware for protecting routers; scanning software for securing data; computers and peripherals for anti-virus protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, use of virtual private networks (VPN), anti-tracking, privacy protection, information network protection, and data leakage prevention Telecommunication services in the field of private and secure Internet browsing; private and secure electronic messaging; providing virtual private network (VPN) services; communication via virtual private networks; data transfer re-routing Researching, designing, implementing and updating software; support services, namely, technical support services in the nature of troubleshooting of security software problems, providing technical advice relating to installation of security software and maintenance services for security software; information security services for computers and mobile devices in the nature of maintaining software security; information security services for computer networks in the nature of encrypting network communication; services for internet and information network analytics; scanning services for detecting information security vulnerabilities; consulting in the field of information security; computer programming; monitoring and assessing information security risks of computer networks, websites and devices; monitoring computer network systems; information, advice and reporting services in the fields of information security and information technology

26.

Unauthorised/malicious redirection

      
Application Number 14557552
Grant Number 09407650
Status In Force
Filing Date 2014-12-02
First Publication Date 2016-05-26
Grant Date 2016-08-02
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor Niemela, Jarno

Abstract

Method(s) and apparatus are described for use in preventing unauthorized redirection and/or routing of packets transmitted in a communication network. Packets generated by one or more devices in the communications network are intercepted by an apparatus. The intercepted packets are inspected and it is detected whether at least one of the intercepted packets is associated with redirection based on an unauthorized destination. For each intercepted packet, packet and protocol inspection may be used to determine the originally intended destination of the packet and to determine any other destination(s) associated with redirection of the packet. For each intercepted packet, if the any other destination(s) are not associated with one or more authorized destinations corresponding to the originally intended destination, then the intercepted packet is associated with redirection to an unauthorized destination. Those detected intercepted packets associated with redirection based on the unauthorized destination are blocked or corrected.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

27.

Preventing browser-originating attacks

      
Application Number 14940388
Grant Number 09712556
Status In Force
Filing Date 2015-11-13
First Publication Date 2016-05-19
Grant Date 2017-07-18
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Hirvonen, Timo
  • Stahlberg, Mika

Abstract

A method and device for preventing a browser-originating attack in a local area network. A security device in the local area network intercepts a message from a first device in the local area network towards a second device in the local area network. The message requests connection between the first device and the second device. The security device prompts a user of the first device to approve the connection. In the event that the user approves the connection the first device is allowed to connect to the second device, and in the event that the user does not approve the connection the connection attempt is terminated.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

28.

SENSE

      
Serial Number 86928890
Status Registered
Filing Date 2016-03-04
Registration Date 2017-11-07
Owner F-SECURE CORPORATION (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Security software [ and hardware ], namely, software [ and hardware ] for operating secure network routers, operating home computer network security systems, computer device security, computer virus protection, secure messaging, safe internet browsing, enabling parental control features, data privacy protection, home computer network management and computer device security management; secure network routers [ Consulting services in the field of home computer network and computer device security management ]

29.

Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such

      
Application Number 14937781
Grant Number 09955352
Status In Force
Filing Date 2015-11-10
First Publication Date 2016-03-03
Grant Date 2018-04-24
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John G.
  • Burgess, James David
  • Grkov, Vance
  • Richardson, David Luke
  • Mandal, Ayan
  • Mangat, Cherry
  • Buck, Brian James
  • Robinson, William

Abstract

A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.

IPC Classes  ?

  • H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
  • H04W 12/08 - Access security
  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/02 - Services making use of location information
  • H04W 12/12 - Detection or prevention of fraud
  • G06F 21/31 - User authentication
  • G06F 21/88 - Detecting or preventing theft or loss
  • H04W 8/24 - Transfer of terminal data
  • H04W 4/22 - Emergency connection handling
  • H04W 48/02 - Access restriction performed under specific conditions

30.

Display screen or portion thereof with graphical user interface with interleaved rows of text and reduced error key layout short reach

      
Application Number 29441096
Grant Number D0738886
Status In Force
Filing Date 2012-12-31
First Publication Date 2015-09-15
Grant Date 2015-09-15
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

31.

Display screen or portion thereof with graphical user interface with interleaved rows of text and reduced error key layout short reach

      
Application Number 29441091
Grant Number D0735215
Status In Force
Filing Date 2012-12-31
First Publication Date 2015-07-28
Grant Date 2015-07-28
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

32.

Display screen with graphical user interface with interleaved rows of text and reduced error key layout short reach

      
Application Number 29440724
Grant Number D0735238
Status In Force
Filing Date 2012-12-26
First Publication Date 2015-07-28
Grant Date 2015-07-28
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

33.

F

      
Application Number 1240626
Status Registered
Filing Date 2014-08-29
Registration Date 2014-08-29
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software in the areas of security and digital life-style; software for desktop, laptop, server, cloud, network and Internet use security; software in the fields of anti-virus protection, anti-theft protection, backup, online banking, secure messaging, email security, safe browsing, parental control, software updates and remote device management; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing. Telecommunication services in the areas of delivery of messages by electronic transmission; communication via virtual private networks (VPN), private messaging and mobile telecommunication network services, namely location management; electronic transmission, and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the internet, intranets, extranets, television, mobile networks, cellular and satellite networks; online sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; private messaging. Researching, designing, implementing, updating and provisioning software solutions and information technology services in the fields of: desktop, laptop, server, cloud, network and Internet use security, anti-virus protection, anti-theft protection, backup, online banking, secure messaging, email security, safe browsing, parental control, software updates and remote device management; on-line storage, of photos, videos, documents, data, emails, messaging, contacts, location and other content; interactive hosting services which allow the user to publish and share their data, content and images on-line; cloud hosting provider services, namely hosting online web facilities for others for content sharing, aggregation, streaming and synchronization services; hosting and maintaining cloud based services for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression and data leakage prevention; storing secure notes and data; information, advisory and consultancy services relating to above.

34.

Mobile communication device display of reduced error key layout short reach with graphical user interface

      
Application Number 29440726
Grant Number D0724605
Status In Force
Filing Date 2012-12-26
First Publication Date 2015-03-17
Grant Date 2015-03-17
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

35.

Mobile communication device display of reduced error key layout long reach with graphical user interface

      
Application Number 29440725
Grant Number D0724097
Status In Force
Filing Date 2012-12-26
First Publication Date 2015-03-10
Grant Date 2015-03-10
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

36.

Method and system for rendering a stolen mobile communications device inoperative

      
Application Number 14297524
Grant Number 10084603
Status In Force
Filing Date 2014-06-05
First Publication Date 2014-12-18
Grant Date 2018-09-25
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Rogers, Marc William
  • Buck, Brian James

Abstract

A method and system for rendering a stolen mobile communications device inoperative is presented. A determination that the mobile communications device is in a first state is made at a security component on the mobile communications device. A removal of a cryptographic key is affected at the security component on the mobile communications device.

IPC Classes  ?

  • G06F 9/00 - Arrangements for program control, e.g. control units
  • G06F 15/177 - Initialisation or configuration control
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
  • H04L 9/08 - Key distribution
  • H04W 12/12 - Detection or prevention of fraud
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

37.

System and method for mobile communications blocking based on crowd sourced information

      
Application Number 14455794
Grant Number 09210559
Status In Force
Filing Date 2014-08-08
First Publication Date 2014-11-27
Grant Date 2015-12-08
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Edwards, Stephen J.
  • Nandwani, Ankur Bharatbhushan
  • Ramakrishna, Rohan Nagarakere
  • Buck, Brian James
  • Yerra, Kesava Abhinav

Abstract

Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, information indicating that an electronic communication received at a mobile communications device of each user in the crowd should belong in a specific category is received from a crowd. If a number of users in the crowd exceeds a threshold value, information identifying the electronic communication is stored in a database as belonging in the specific category. The database is provided to a mobile communications device of a user, where when the electronic communication is transmitted to the mobile communications device of the user, the electronic communication is blocked at the mobile communications device of the user because the electronic communication is in the specific category.

IPC Classes  ?

  • H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
  • H04W 4/16 - Communication-related supplementary services, e.g. call-transfer or call-hold
  • H04W 12/06 - Authentication
  • H04M 3/436 - Arrangements for screening incoming calls
  • H04L 12/58 - Message switching systems
  • H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/08 - Access security
  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04M 3/42 - Systems providing special services or facilities to subscribers
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

38.

Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer

      
Application Number 14339291
Grant Number 09569643
Status In Force
Filing Date 2014-07-23
First Publication Date 2014-11-13
Grant Date 2017-02-14
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Grkov, Vance
  • Richardson, David
  • Mandal, Ayan
  • Mangat, Cherry
  • Mahaffey, Kevin Patrick

Abstract

Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected.

IPC Classes  ?

  • H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
  • H04M 1/68 - Circuit arrangements for preventing eavesdropping
  • H04M 3/16 - Automatic or semi-automatic exchanges with lock-out or secrecy provision in party-line systems
  • G06F 21/88 - Detecting or preventing theft or loss
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04M 3/42 - Systems providing special services or facilities to subscribers
  • G06F 3/16 - Sound input; Sound output
  • H04W 8/24 - Transfer of terminal data

39.

F

      
Application Number 169259400
Status Registered
Filing Date 2014-09-05
Registration Date 2017-07-24
Owner F-Secure Corporation (Finland)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

(1) Security software in the areas of security and digital life-style; software for desktop, laptop, server, cloud, network and Internet use security; security software in the fields of anti-virus protection, anti-theft protection, backup, online banking, secure messaging, email security, safe browsing, parental control, software updates and remote device management; security software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; security software for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing. (1) Telecommunication services in the areas of delivery of messages by electronic transmission namely electronic mail services through wired and wireless access, wireless digital messaging services, web hosting services; virtual private networks (VPN), private wireless digital messaging through an application that shields user messages and browsing from third parties and location management namely providing digital locating services for digital devices namely tablet computers and smart phones; electronic transmission, retrieval and streaming of files and data comprising images, audio, video, documents, text, electronic messages, and electronic mail over local and global communications networks, the internet, intranets, extranets, television, mobile networks, cellular and satellite networks; researching, designing, implementing, updating and provisioning software solutions and information technology services in the fields of: desktop, laptop, server, cloud, network and Internet use security, anti-virus protection, anti-theft protection, computer and mobile device data backup, online banking, secure messaging, email security, safe browsing, parental control, software updates and remote device management; providing software as a service (SAAS) services featuring software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; interactive hosting services which allow the user to publish and share their data, content and images on-line; cloud hosting provider services including content sharing, aggregation, streaming and synchronization services; anonymous browsing, encryption, anti-tracking protection, location management namely providing digital locating services for digital devices namely tablet computers and smart phones, network protection, privacy protection, data compression and data leakage prevention; cloud computing provider services for general storage of data; information, advisory and consultancy services relating to above.

40.

IMPROVED MALWARE DETECTION

      
Application Number EP2014051650
Publication Number 2014/124806
Status In Force
Filing Date 2014-01-28
Publication Date 2014-08-21
Owner F-SECURE CORPORATION (Finland)
Inventor Suominen, Mikko

Abstract

A method of detecting suspicious code that has been injected into a process. The method comprises: identifying suspicious executable memory areas assigned to the process and, for each thread in the process, inspecting a stack associated with the thread to identify a potential return address; determining whether or not the potential return address is located within a suspicious memory area; and, if the potential return address is located within a suspicious memory area, determining whether or not the instruction at the address preceding the potential return address is a function call and, if yes, determining that the potential return address is a true return address and identifying the thread and associated code as suspicious.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

41.

Method and apparatus for auxiliary communications with mobile communications device

      
Application Number 13732083
Grant Number 08855599
Status In Force
Filing Date 2012-12-31
First Publication Date 2014-07-03
Grant Date 2014-10-07
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Buck, Brian James
  • Wang, Jinggang

Abstract

A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden ROM that configures a security component to work separate and apart from the OS. A secondary transceiver is configured with the security component to send and receive security transmissions, also separate and apart from the OS and the primary transceiver of the OS. Logic to detect specified trigger events is hard-coded into the hidden ROM, and detection of such an event places the mobile communications device into a special security mode. While in the special security mode, the secondary transceiver can send and receive security messages, including the location of the mobile communications device. Further, depending upon the received messages or commands, the security component can take pre-programmed security actions, such as erasing or faking data in the device.

IPC Classes  ?

  • H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
  • H04W 12/08 - Access security
  • H04W 12/06 - Authentication
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

42.

Graphical user interface for improved text character entry

      
Application Number 13784414
Grant Number 09367240
Status In Force
Filing Date 2013-03-04
First Publication Date 2014-06-26
Grant Date 2016-06-14
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

Abstract

A graphical user interface for improved text character entry is disclosed. In some embodiments, the graphical user interface may be displayed on a mobile communications device. The graphical user interface may display a message field, a soft keyboard, and at least one visual foveal echo field. The message field may display text characters of a message being authored by a user interacting with the soft keyboard. The visual foveal echo field may be placed adjacent to a soft keyboard row and contain a portion of the message being authored by the user.

IPC Classes  ?

  • G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
  • G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
  • G06F 3/023 - Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes

43.

Method and system for cloning applications from an electronic source device to an electronic target device

      
Application Number 13692858
Grant Number 09071627
Status In Force
Filing Date 2012-12-03
First Publication Date 2014-06-05
Grant Date 2015-06-30
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

Abstract

Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an application in a source electronic device can be cloned from the source electronic device to a target electronic device. According to an embodiment, when the application is selected, the source device can be configured to automatically collect the selected application and configuration information, state information and/or application data associated with the selected application. The collected information is referred to as “cloning data.” Once the cloning data is collected, the source device can be configured to transmit at least a portion of the cloning data to the target electronic device, which can utilize the cloning data to clone the application into the target electronic device.

IPC Classes  ?

  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor

44.

Method and system for managing an emergency for enhanced user security using a mobile communication device

      
Application Number 13688003
Grant Number 09210561
Status In Force
Filing Date 2012-11-28
First Publication Date 2014-05-29
Grant Date 2015-12-08
Owner F-SECURE CORPORATION (Finland)
Inventor Buck, Brian James

Abstract

Security is enhanced for a user of a mobile communications device by providing a method for managing an emergency event includes detecting, by a mobile communication device having a GUI for displaying information to a user, an indication that an emergency event is occurring. Once the emergency event is detected, a plurality of event options is displayed on the GUI to a responding user who is not an owner of the mobile communication device. Each event option is associated with at least one instruction relating to an emergency action and/or response. When an indication selecting a first event option is received, the mobile communication device executes the instruction(s) associated with the first event option.

IPC Classes  ?

  • H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
  • H04W 4/22 - Emergency connection handling
  • H04W 12/06 - Authentication

45.

Obtaining password data

      
Application Number 14070754
Grant Number 09984215
Status In Force
Filing Date 2013-11-04
First Publication Date 2014-05-15
Grant Date 2018-05-29
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor Niemela, Jarno

Abstract

A method of obtaining password data for entry to an application running on a device. The method may include running a password manager application on a device. The password manager application may identify one or more applications installed on the device. The password manager application may display the identified applications on a display of the device. The password manager application may receive a user selection of a displayed application. The password manager application may determine whether an entry exists for the selected application in a memory associated with the password manager application. If no entry exists, the password manager application may generate an entry comprising password data for the selected application. If an entry exists, the password manager application may retrieve password data relating to the selected application.

IPC Classes  ?

  • G06F 7/04 - Identity comparison, i.e. for like or unlike values
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 17/30 - Information retrieval; Database structures therefor
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/31 - User authentication
  • G06F 21/60 - Protecting data

46.

System and method for call blocking and SMS blocking

      
Application Number 13693877
Grant Number 08913994
Status In Force
Filing Date 2012-12-04
First Publication Date 2014-05-08
Grant Date 2014-12-16
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Edwards, Stephen J.
  • Nandwani, Ankur Bharatbhushan
  • Ramakrishna, Rohan Nagarakere
  • Buck, Brian James
  • Yerra, Kesava Abhinav

Abstract

Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, an electronic communication identified by a phone number is intercepted at a mobile communications device before the electronic communication is received by an application program on the device. The phone number is sent to a server for the server to identify a category associated with the phone number. The category is received at the mobile communication device. Based on the received category, a determination is made as to whether the application program should be allowed to receive the electronic communication. If allowed, the electronic communication is forwarded to the application program; else, the electronic communication is not forwarded.

IPC Classes  ?

  • H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
  • H04W 4/16 - Communication-related supplementary services, e.g. call-transfer or call-hold
  • H04W 12/06 - Authentication
  • H04M 3/436 - Arrangements for screening incoming calls
  • H04L 12/58 - Message switching systems
  • H04M 3/42 - Systems providing special services or facilities to subscribers
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

47.

Protecting a user from a compromised web resource

      
Application Number 14070903
Grant Number 09231971
Status In Force
Filing Date 2013-11-04
First Publication Date 2014-05-08
Grant Date 2016-01-05
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Patel, Andrew
  • Afanasiev, Igor
  • Kesti, Veli-Jussi
  • Rahu, Urmas
  • Yakovlev, Yury
  • Konola, Jarkko
  • Pirttilahti, Janne

Abstract

According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

48.

Systems and methods for applying a security policy to a device based on a comparison of locations

      
Application Number 14051261
Grant Number 08825007
Status In Force
Filing Date 2013-10-10
First Publication Date 2014-02-13
Grant Date 2014-09-02
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John Gunther
  • Burgess, James

Abstract

Location information associated with a computing device may be received by a server. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device is in a location that has been identified in the set of locations. In response to such a determination, a particular security policy may be applied to the computing device. For example, the server may transmit a command to the computing device to apply a security policy associated with the location.

IPC Classes  ?

  • H04W 88/02 - Terminal devices
  • G06F 21/60 - Protecting data
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 4/02 - Services making use of location information
  • H04W 12/08 - Access security
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04W 8/24 - Transfer of terminal data

49.

Systems and methods for transmitting a communication based on a device leaving or entering an area

      
Application Number 14051373
Grant Number 08774788
Status In Force
Filing Date 2013-10-10
First Publication Date 2014-02-13
Grant Date 2014-07-08
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John Gunther
  • Burgess, James

Abstract

Location information associated with a computing device may be received by a server. For example, the location information may indicate the current physical location of the computing device. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device has entered or left a location area. In response to such a determination, a communication may be transmitted to a user of the computing device. For example, an email may be transmitted to the user. The email may include information describing that the computing device has entered or left the location area.

IPC Classes  ?

50.

Systems and methods for displaying location information of a device

      
Application Number 14050644
Grant Number 09100925
Status In Force
Filing Date 2013-10-10
First Publication Date 2014-02-06
Grant Date 2015-08-04
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John Gunther
  • Burgess, James

Abstract

Location information associated with a computing device may be periodically transmitted to a server. A user of the computing device may transmit a request to the server when the computing device is no longer able to communicate with the server. For example, the user request may be associated with locating the computing device. In response to the request, the user may be shown the latest received location information of the computing device. The last received location information may be displayed in a web page.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/02 - Services making use of location information
  • G06F 21/60 - Protecting data
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04W 8/24 - Transfer of terminal data

51.

Systems and methods for locking and disabling a device in response to a request

      
Application Number 14051343
Grant Number 09179434
Status In Force
Filing Date 2013-10-10
First Publication Date 2014-02-06
Grant Date 2015-11-03
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John Gunther
  • Burgess, James

Abstract

A computing device may be locked and contact information associated with an owner of the computing device may be displayed. For example, a request to lock the computing device may be received. In response to such a request, at least some of the functionality of the computing device may be disabled. For example, control input or input keys of the computing device may be at least partially disabled. Furthermore, contact information may be shown on the display of the computing device. For example, the phone number, address, email address, or other information of the owner of the computing device may be displayed.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/02 - Services making use of location information
  • G06F 21/60 - Protecting data
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04W 8/24 - Transfer of terminal data

52.

Systems and methods for applying a security policy to a device based on location

      
Application Number 14050804
Grant Number 09167550
Status In Force
Filing Date 2013-10-10
First Publication Date 2014-02-06
Grant Date 2015-10-20
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John Gunther
  • Burgess, James

Abstract

A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/02 - Services making use of location information
  • G06F 21/60 - Protecting data
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04W 8/24 - Transfer of terminal data

53.

METHOD AND APPARATUS FOR WEB PAGE CONTENT CATEGORIZATION

      
Application Number EP2013063287
Publication Number 2014/005885
Status In Force
Filing Date 2013-06-25
Publication Date 2014-01-09
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Bejerasco, Christine
  • Aquino, Karmina

Abstract

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following: detecting a listing of web content elements provided by a web search engine, the web content elements relating to web pages retrieved by the web search engine; analyzing one or more web content elements of the detected listing; and categorizing the content of one or more web pages on the basis of the analysis.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 17/30 - Information retrieval; Database structures therefor

54.

System and method for providing offers for mobile devices

      
Application Number 13960585
Grant Number 08635109
Status In Force
Filing Date 2013-08-06
First Publication Date 2013-12-05
Grant Date 2014-01-21
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Burgess, James David
  • Hering, John Gunther

Abstract

Profile information associated with a mobile communications device belonging to a user is stored at a server system. Upon the server system receiving an indication that the mobile communications device needs to be replaced, the profile information is reviewed. Based on the review of the profile, an offer is generated to replace the mobile communications device.

IPC Classes  ?

55.

Configuring a client application

      
Application Number 13853623
Grant Number 09009274
Status In Force
Filing Date 2013-03-29
First Publication Date 2013-11-28
Grant Date 2015-04-14
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Paalanen, Jarkko
  • Pehkonen, Pekka
  • Salmi, Timo

Abstract

A method of customizing an application on a device, the method comprising: at a server, receiving a request message from the device, while the device is running the application, the request message comprising information identifying the application and further information relating to a network operator associated with the device; using the further information to identify the network operator associated with the device and to obtain network operator specific customization information relating to the application; and sending a response message to the device, the response message comprising the obtained network operator specific customization information, the network operator specific customization information usable by the device to customize any of: the application components, application user interface, and application settings.

IPC Classes  ?

  • G06F 15/177 - Initialisation or configuration control
  • G06F 9/445 - Program loading or initiating
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
  • H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities

56.

Systems and methods for remotely controlling a lost mobile communications device

      
Application Number 13849379
Grant Number 08929874
Status In Force
Filing Date 2013-03-22
First Publication Date 2013-11-14
Grant Date 2015-01-06
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John Gunther
  • Burgess, James

Abstract

Systems and methods for remotely controlling a lost mobile communications device are disclosed. Authorization credentials may be received and a command request for an action to be performed by a lost mobile communications device may further be received. A command corresponding to the command request may be transmitted to the lost mobile communications device. In response to the transmission of the command, information about the lost mobile communications device may be received and interpreted to determine whether the transmitted command was performed or not performed by the lost mobile communications device. A notification may be provided based on whether or not the command was performed by the lost mobile communications device.

IPC Classes  ?

  • H04W 88/02 - Terminal devices
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/02 - Services making use of location information
  • G06F 21/60 - Protecting data
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04W 8/24 - Transfer of terminal data

57.

DISCOVERY OF SUSPECT IP ADDRESSES

      
Application Number EP2013055392
Publication Number 2013/156220
Status In Force
Filing Date 2013-03-15
Publication Date 2013-10-24
Owner F-SECURE CORPORATION (Finland)
Inventor Turbin, Pavel

Abstract

A method of discovering suspect IP addresses, the method comprising, at a client computer: monitoring the computer for malware; on detection of malware, obtaining a list of IP addresses with which a connection has been made or attempted at the client computer within a preceding time frame; sending the list of IP addresses to a central server; and receiving from the central server a blacklist of suspect IP addresses to allow the client computer to block connections with IP addresses within said blacklist.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

58.

DATA SYNCRONISATION

      
Application Number EP2013051741
Publication Number 2013/149739
Status In Force
Filing Date 2013-01-30
Publication Date 2013-10-10
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Ståhlberg, Mika
  • Hyppönen, Mikko
  • Kasslin, Kimmo
  • Tikkanen, Antti
  • Niemelä, Jarno
  • Konola, Jarkko

Abstract

The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

59.

CONTROLLING ANTI-VIRUS SOFTWARE UPDATES

      
Application Number EP2013050716
Publication Number 2013/143714
Status In Force
Filing Date 2013-01-16
Publication Date 2013-10-03
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Palumbo, Paolo
  • Patel, Andrew

Abstract

The present invention relates to a method of controlling the download of anti-virus software updates to a device. The device is configured to transmit an update query to a network device requesting information on whether any updates are available for the anti-virus software. When the device receives the response it stores the response in the cache. The cache can then be queried following a trigger and, if the cache indicates an update to the anti-virus software is available the device downloads an update to the anti-virus software. In an alternative embodiment the device may download and install an update upon receiving the response to the query if the response to the query indicates that an update is available. The query may be transmitted during a scan or upon determining a change in a connection at a device.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

60.

DOWNLOAD CONTROL

      
Application Number FI2013050121
Publication Number 2013/144425
Status In Force
Filing Date 2013-02-05
Publication Date 2013-10-03
Owner F-SECURE CORPORATION (Finland)
Inventor Hirvonen, Timo

Abstract

Download control is disclosed. An apparatus comprises one or more processors, and one or more memories including computer program code. The one or more memories and the computer program code configured to, with the one or more processors, cause the apparatus at least to perform: obtain one or more cryptographic hash values of a target file to be downloaded (702); cause transmission of the one or more cryptographic hash values to a trusted source (704); obtain reputation data relating to the target file originated from the trusted source in response to the transmission of the one or more cryptographic hash values (706); and control download of the target file on the basis of the reputation data (708).

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

61.

Systems and methods for device broadcast of location information when battery is low

      
Application Number 13842884
Grant Number 08682400
Status In Force
Filing Date 2013-03-15
First Publication Date 2013-09-12
Grant Date 2014-03-25
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Mahaffey, Kevin Patrick
  • Hering, John Gunther
  • Burgess, James

Abstract

Location information associated with a computing device may be transmitted from the computing device to a server. The transmitting of the location information may be performed in response to the battery of the computing device being at a low level. The location information may comprise a location of the computing device or information to identify the location of the computing device. As such, when the battery of the computing device approaches a low level, the location of the computing device may be transmitted from the computing device to a server. Thus, if the battery of the computing device is depleted, a user may obtain the last known location of the computing device that was transmitted when the battery was at a low level. The location information may also be used to identify the last known location for and to apply a security policy to the computing device.

IPC Classes  ?

62.

System and method for uploading location information based on device movement

      
Application Number 13863240
Grant Number 09042876
Status In Force
Filing Date 2013-04-15
First Publication Date 2013-09-12
Grant Date 2015-05-26
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Buck, Brian James
  • Mahaffey, Kevin Patrick
  • Yerra, Kesava Abhinav
  • Lamantia, Matthew John Joseph

Abstract

Systems and methods for uploading location information based on device movement are disclosed. In some embodiments, location information may be received or determined by a mobile communications device. The location information may be associated with a physical location of the mobile communications device. A rate of movement of the mobile communications device may be identified. In some embodiments, the location information may be transmitted or uploaded from the mobile communications device to a server. The frequency of the transmitting or uploading of the location information may be based on the rate of movement of the mobile communications device.

IPC Classes  ?

  • H04M 3/00 - Automatic or semi-automatic exchanges
  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04W 12/12 - Detection or prevention of fraud
  • H04M 1/725 - Cordless telephones
  • H04W 4/02 - Services making use of location information
  • G01S 19/16 - Anti-theft; Abduction
  • G01S 19/34 - Power consumption
  • H04W 8/24 - Transfer of terminal data
  • H04W 4/08 - User group management
  • H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
  • H04W 4/22 - Emergency connection handling

63.

MANAGEMENT OF DATA UPLOAD SPEED

      
Application Number EP2013050785
Publication Number 2013/127559
Status In Force
Filing Date 2013-01-17
Publication Date 2013-09-06
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Kuosa, Jussi
  • Valtonen, Hannu
  • Maaranen, Hannu
  • Pänkälä, Janne
  • Tan, Kuan Eeik
  • Konola, Jarkko
  • Tikka, Sami
  • Sukanen, Jari

Abstract

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: a receiver for receiving, from a client device, a data upload request relating to a data management application, wherein a data communications connection having a first data upload speed is utilized between the client device and a data management server; a processor configured to determine whether the client device is allowed to use a second data upload speed on the basis of the received data upload request, wherein the second data upload speed is faster than the first data upload speed; and a processor configured to establish the second data upload speed for the client device, if the client device is allowed to use the second data upload speed.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

64.

Method for automatically backing up digital data preserved in memory in a computer installation and data medium readable by a computer having the associated instructions stored in the memory thereof

      
Application Number 13774274
Grant Number 08667240
Status In Force
Filing Date 2013-02-22
First Publication Date 2013-07-11
Grant Date 2014-03-04
Owner F-Secure Corporation (Finland)
Inventor Camborde, Christophe

Abstract

The invention relates to a method for automatically backing up digital data preserved in memory in a computer installation to a remote backup system accessible through the computer installation via a data transmission network. This method comprises extracting and analyzing information regarding the operation of the computer installation and determining parameters of a data backup application for saving data to the backup system. Based on the result of this analysis, the digital data preserved in memory is analyzed and the digital data analyzed is classified into a plurality of classes of different priorities. The backup application is also executed on at least part of the digital data based on the parameters and classes of priorities determined.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures

65.

DISINFECTION OF A FILE SYSTEM

      
Application Number EP2012075038
Publication Number 2013/087603
Status In Force
Filing Date 2012-12-11
Publication Date 2013-06-20
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Ståhlberg, Mika
  • Hyppönen, Mikko
  • Kasslin, Kimmo
  • Kesti, Veli-Jussi
  • Nyman, Kai
  • Harmonen, Timo

Abstract

A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

66.

NEAR FIELD COMMUNICATION SECURITY

      
Application Number EP2012070112
Publication Number 2013/053788
Status In Force
Filing Date 2012-10-11
Publication Date 2013-04-18
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Kasslin, Kimmo
  • Niemelä, Jarno

Abstract

In accordance with an example embodiment of the present invention, there is provided a computing device (1), comprising: at least one processor (3); and at least one memory (10) including computer program code the at least one memory (10) and the computer program code configured to, with the at least one processor (3), cause the device (1) to perform at least the following: receive near field communication NFC device data related to a specific NFC device (14, 15); generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider (22); receive reputation data, retrieved from a reputation database (24) of NFC device reputation information, related to the specific NFC device (14, 15) from the service provider (22); and take further action on the basis of the received reputation relating to the specific NFC device (14, 15).

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

67.

OUTBOUND CONNECTION DETECTION AND BLOCKING AT A CLIENT COMPUTER

      
Application Number EP2012065393
Publication Number 2013/041295
Status In Force
Filing Date 2012-08-07
Publication Date 2013-03-28
Owner F-SECURE CORPORATION (Finland)
Inventor Niemelä, Jarno

Abstract

A method of detecting and blocking a malicious SSL connection at a client computer. The method comprises identifying, at a network firewall level, an outbound SSL connection being set up at the client computer; detecting an SSL certificate associated with the SSL connection; sending a request to a central server for reputation information on the SSL certificate; at the central server, determining reputation information in dependence upon the SSL certificate; providing said reputation information from the central server to the client computer; and using the reputation information at the client computer to determine whether or not to block the connection.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

68.

MALWARE SCANNING

      
Application Number EP2012063875
Publication Number 2013/037528
Status In Force
Filing Date 2012-07-16
Publication Date 2013-03-21
Owner
  • F-SECURE CORPORATION (Finland)
  • JÄPPINEN, Jani (Finland)
Inventor Turbin, Pavel

Abstract

According to a first aspect of the present invention there is provided a method of scanning a computer device in order to detect potential malware when an operating system running on the computer device prevents applications installed on the device from accessing installed files of other applications installed on the device. The method comprises the steps of detecting installation of an application on the device, identifying one or more installation files that are required to perform the installation of the application, and performing a malware scan of the identified installation files and/or information obtained from the installation files.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

69.

DETECTION OF SUSPECT WIRELESS ACCESS POINTS

      
Application Number EP2012065483
Publication Number 2013/023966
Status In Force
Filing Date 2012-08-07
Publication Date 2013-02-21
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Ståhlberg, Mika
  • Niemelä, Jarno

Abstract

According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points (110), (114) providing access services to client devices (106), (112). Identity information associated with the wireless access points is collected from a multiplicity of client devices (106), (112); (A1). A reputation request is received from a client device (A2), the request including identity information of an available wireless access point (A3). The received identity information is compared with the collected identity information (A4) for determining an indication of trust of the available wireless access point (A5). The indication of trust of the available wireless access point is transmitted to the client device (A6). The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point.

IPC Classes  ?

70.

DETECTING UNDESIRABLE CONTENT ON A SOCIAL NETWORK

      
Application Number EP2012059547
Publication Number 2013/010698
Status In Force
Filing Date 2012-05-23
Publication Date 2013-01-24
Owner F-SECURE CORPORATION (Finland)
Inventor Masood, Syed Ghouse

Abstract

A method of detecting undesirable content on a social networking website. The method includes retrieving or accessing a post from a user's social networking page, identifying the content of a pre-defined set of features of the post, comparing the identified feature content with a database of known undesirable post feature content, and using the results of the comparison to determine whether the post is undesirable.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

71.

SECURITY METHOD AND APPARATUS

      
Application Number IB2011052994
Publication Number 2013/005079
Status In Force
Filing Date 2011-07-06
Publication Date 2013-01-10
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Kasslin, Kimmo
  • Turbin, Pavel

Abstract

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory including executable instructions. The at least one memory and the executable instructions are configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: during the loading of an operating system, loading a boot time driver installed by an anti-virus application; reading a master boot record data by the boot time driver as soon as the operating system is ready to handle the request for reading the master boot record data; analyzing the collected master boot record data to identify any malicious entities; and in the event that malicious entities are identified, controlling the behavior of the processing system in order to disable the malicious entity.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

72.

METHOD AND DEVICE FOR SECURITY CONFIGURATION

      
Application Number EP2012060222
Publication Number 2012/168132
Status In Force
Filing Date 2012-05-31
Publication Date 2012-12-13
Owner F-SECURE CORPORATION (Finland)
Inventor Niemelä, Jarno

Abstract

An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving (206), from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining (210, 212, 214, 216, 218) executable web site features on the basis of the retrieved reputation data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

73.

LOOK AHEAD MALWARE SCANNING

      
Application Number EP2012055733
Publication Number 2012/156143
Status In Force
Filing Date 2012-03-29
Publication Date 2012-11-22
Owner F-SECURE CORPORATION (Finland)
Inventor Turbin, Pavel

Abstract

According to a first aspect of the present invention there is provided a method of scanning for malware during execution of an application on a computer system. The method comprises detecting accesses by the application to files within a common directory, using the detected accesses to identify one or more groups of files within said common directory that the application may subsequently want to access, and scanning said one or more groups of files for malware prior to the application attempting to access files of the group or groups.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

74.

APPLICATION REVOCATION

      
Application Number IB2012052315
Publication Number 2012/156869
Status In Force
Filing Date 2012-05-09
Publication Date 2012-11-22
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Reijonen, Antti
  • Rapeli, Marko
  • Rautakorpi, Jarno

Abstract

In accordance with an example embodiment of the present invention, there is provided apparatus, including: at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: receiving an application revocation request; confirming whether initiating an application revocation process is allowed; generating application revocation data once initiating the application revocation process has been allowed; storing the generated application revocation data to a reputation service network; and provide one or more revocation clients the generated application revocation data from the reputation service network in order to enable the one or more revocation clients revoking the application.

IPC Classes  ?

75.

MALWARE DETECTION

      
Application Number EP2012054567
Publication Number 2012/152479
Status In Force
Filing Date 2012-03-15
Publication Date 2012-11-15
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Turkulainen, Jarkko
  • Larvala, Samuli
  • Komashinskiy, Dmitriy
  • Tikkanen, Antti
  • Hentunen, Daavid

Abstract

A method and apparatus for detecting malware in which a computer device that has an operating system and a memory executes an untrusted computer program. In the event that the untrusted program directly accesses a region of the memory used to store information relating to the operating system, a determination is made that the untrusted program is likely to be malware.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

76.

CONTROLLING VIRTUAL SOCIAL NETWORKS

      
Application Number IB2012052099
Publication Number 2012/150532
Status In Force
Filing Date 2012-04-26
Publication Date 2012-11-08
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Masood, Syed Ghouse
  • Ropponen, Matti
  • Visti, Sami

Abstract

An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieve from a social networking service at least one of: user profile information of a user and user profile information of each contact node of the user in the social networking service; and a connection structure between the user and each contact node of the user, analyze the retrieved user profile information and/or the determined connection structure, and separate any outliers among the contact nodes on the basis of the analysis.

IPC Classes  ?

  • G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
  • G06F 17/30 - Information retrieval; Database structures therefor

77.

UPDATING ANTI-VIRUS SOFTWARE

      
Application Number EP2012052058
Publication Number 2012/146402
Status In Force
Filing Date 2012-02-07
Publication Date 2012-11-01
Owner F-SECURE CORPORATION (Finland)
Inventor Turbin, Pavel

Abstract

A method of updating an anti-virus application comprising an updatable module running on a client terminal. The method comprises receiving an update at the client terminal, initialising the updatable module within a sandbox environment and applying the update to the updatable module. Control tests are then run on the updated sandboxed module and if the control tests are passed, the updated module is brought out of the sandbox environment and normal scanning is allowed to proceed using the updated module. If the control tests are not passed, however, normal scanning using the updated module is prevented.

IPC Classes  ?

78.

ANTI-VIRUS SCANNING

      
Application Number FI2011000025
Publication Number 2012/143594
Status In Force
Filing Date 2011-04-21
Publication Date 2012-10-26
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Turbin, Pavel
  • Nyman, Kai

Abstract

In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: determining a passive scanning mode of an anti-virus application based on local software categorization and detected user network profile, the passive scanning mode defining adjustable anti-virus application scanning settings; and entering the passive scanning mode when configuration changes have not been detected for a predetermined period of time.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/06 - by sensing unauthorised manipulation of, or intrusion into, an enclosure e.g. a housing or a room

79.

SIGNAL FLARE

      
Serial Number 85748654
Status Registered
Filing Date 2012-10-08
Registration Date 2014-04-01
Owner F-SECURE CORPORATION (Finland)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Feature of computer software for protecting against privacy risks and security risks in mobile communication devices; feature of software for scanning mobile communication devices, and for assessing, reporting, and preventing security risks and privacy risks on mobile communication devices; feature of downloadable software for assessing, reporting, and preventing the security risks and privacy risks of installing software designed for mobile communication devices that is available on websites and software repositories, and for assessing, reporting, and preventing the security risks and privacy risks of software after installation of the software on mobile communication devices; feature of mobile communication device anti-virus software; feature of internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; feature of software for implementing security policy, spyware policy and privacy policy on a mobile communication device; feature of software for preventing installation of undesired software on a mobile communication device; feature of software for monitoring, backing up, preserving, and restoring mobile communications devices and mobile communications device data; feature of software for locating, recovering, securing, and disabling a user's missing, stolen, or lost mobile communication device; feature of software for remotely managing mobile communications devices

80.

DETECTING A TROJAN HORSE

      
Application Number EP2012050304
Publication Number 2012/107255
Status In Force
Filing Date 2012-01-10
Publication Date 2012-08-16
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Ståhlberg, Mika
  • Niemelä, Jarno
  • Kasslin, Kimmo

Abstract

A method and apparatus for detected a Trojan in a suspicious software application in the form of at least one electronic file. A computer device determines the source from which the suspicious software application was obtained. A comparison is then made between the source from which the suspicious software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious application is more likely to contain a Trojan horse than if the sources were the same.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

81.

System and method for remotely-initiated audio communication

      
Application Number 13410979
Grant Number 08855601
Status In Force
Filing Date 2012-03-02
First Publication Date 2012-08-02
Grant Date 2014-10-07
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Grkov, Vance
  • Richardson, David
  • Mandal, Ayan
  • Mangat, Cherry
  • Mahaffey, Kevin

Abstract

Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Techniques are provided for determining when an audio transmission should be established between a device and one or more clients, and sending a command to initiate the audio transmission. The determination may be based on receiving a request from a client, detecting at a server that the device is lost or stolen, or detecting at the device that the device is missing. The audio transmission may be established without user intervention at the device or in response to user action at the portable electronic device. Device settings such as audio settings at the device may be overridden in connection with the audio transmission.

IPC Classes  ?

  • H04M 1/66 - Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
  • H04M 1/68 - Circuit arrangements for preventing eavesdropping
  • H04M 3/16 - Automatic or semi-automatic exchanges with lock-out or secrecy provision in party-line systems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04M 3/42 - Systems providing special services or facilities to subscribers
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 8/24 - Transfer of terminal data

82.

SHARING CONTENT ONLINE

      
Application Number EP2011050543
Publication Number 2012/097864
Status In Force
Filing Date 2011-01-17
Publication Date 2012-07-26
Owner F-SECURE CORPORATION (Finland)
Inventor Torkkel, Juha

Abstract

A method of providing a degree of authentication for a content link presented to one or more peer users by a sharing user via the Internet. The method comprises, at a server, associating said content link with authentication data provided by said sharing user, and storing the associated content link and authentication data in a storage location. A redirection link that links to the stored associated content link and authentication data is then presented to a peer user via a user interface of a client computer of the peer user. Upon submission of an access request from said client computer to said redirection link, said content link and said authentication data is then delivered to the client computer. The authentication data is then presented to the peer user via said user interface and the peer user is able to choose, via the user interface, to submit an access request to said content link.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 21/60 - Protecting data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

83.

MALWARE DETECTION

      
Application Number EP2012050124
Publication Number 2012/098018
Status In Force
Filing Date 2012-01-05
Publication Date 2012-07-26
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Turbin, Pavel
  • Lehtonen, Jari
  • Ståhlberg, Mika
  • Nyman, Kai
  • Patel, Andrew

Abstract

According to a first aspect of the present invention, there is provided a method of processing a plurality of files to determine whether each of said files comprises malware. The method comprises selecting a file for processing and obtaining first data relating to said file. It is determined whether, based upon the first data, malware detection processing can be selected. Malware detection processing to be applied to said file is selected based upon said first data if it is determined that malware detection processing can be selected based upon the first data. If it is determined that, based upon the first data, malware detection processing cannot be selected, second data relating to the file is obtained and malware detection processing to be applied to said file is selected based upon said first and second obtained data. The selected malware detection processing is applied to said file.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

84.

BLOCKING OF APPLICATION INITIATED CALLS

      
Application Number EP2012050725
Publication Number 2012/098165
Status In Force
Filing Date 2012-01-18
Publication Date 2012-07-26
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Niemelä, Jarno
  • Norkio, Antero

Abstract

A method and apparatus for managing communications in a communication network. A telephony device determines that a software application is attempting to contact a telephone number. It then determines that the telephone number matches at least one predetermined criterion, such as the E. telephone number being a premium rate number or having a different country code to that of the device. The device then sends a query to a reputation server. The query includes information identifying the software application. The device receives a response from the reputation server, the response including a reputation relating to the software application. On the basis of the received reputation relating to the software application, the device can take further action such as preventing contact from being established.

IPC Classes  ?

  • H04M 3/38 - Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
  • H04M 1/67 - Preventing unauthorised calls from a telephone set by electronic means

85.

MALWARE DETECTION

      
Application Number EP2012050126
Publication Number 2012/095348
Status In Force
Filing Date 2012-01-05
Publication Date 2012-07-19
Owner F-SECURE CORPORATION (Finland)
Inventor Turbin, Pavel

Abstract

A computer-implemented method of scanning a plurality of files stored in a memory of a computer for malware. The computer comprises a processor. The method comprises, for each respective file of said plurality of files in said memory determining, using said processor, whether a relationship between the respective file and stored data satisfies a predetermined criterion. The stored data indicates one or more files determined not to contain malware and for which data associated with each of said one or more files has a predetermined characteristic. If the relationship satisfies the predetermined criterion, the respective file is processed according to said first processing method and if said relationship does not satisfy said predetermined criterion, the respective file is processed according to said second processing method.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

86.

CONTROLLING ACCESS TO WEB CONTENT

      
Application Number EP2011074324
Publication Number 2012/093082
Status In Force
Filing Date 2011-12-30
Publication Date 2012-07-12
Owner F-SECURE CORPORATION (Finland)
Inventor Niemelä, Jarno

Abstract

A method of controlling access to web content at a client computer. The method comprises registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

87.

DETECTING A RETURN-ORIENTED PROGRAMMING EXPLOIT

      
Application Number EP2011071974
Publication Number 2012/084507
Status In Force
Filing Date 2011-12-06
Publication Date 2012-06-28
Owner F-SECURE CORPORATION (Finland)
Inventor Hentunen, David

Abstract

A method and apparatus for detecting a Return-Oriented Programming exploitation. At a computer device, a mechanism to detect a control transfer of a code location in a memory is established. This may be, for example, hooking the control transfer. The code location relates to an electronic file. In the event that a control transfer of the code location is detected, a comparison is made between a destination code location address with values in the freed stack. If the code location address matches any of the values in the freed stack, then it is determined that the control transfer of the code location relates to a Return-Oriented Programming exploitation.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

88.

DETECTING A SUSPICIOUS ENTITY IN A COMMUNICATION NETWORK

      
Application Number EP2011070492
Publication Number 2012/079912
Status In Force
Filing Date 2011-11-18
Publication Date 2012-06-21
Owner F-SECURE CORPORATION (Finland)
Inventor Niemelä, Jarno

Abstract

A method and apparatus for detecting a suspicious entity in a communication network. A receiving device receives a message from a sender. A processor obtains domain information or a user identity, and further contact information from data contained in the message. A reputation query message is sent to a Network Reputation Server (NRS), the reputation query message including the domain information or user identity. A reply is received from the NRS that indicates that the domain information or user identity is related to a suspicious entity. The receiving device then associates the contact information with the suspicious entity. In this way, if a user of the receiving device attempts to use the contact information, they can be prevented from doing this or informed that it relates to a suspicious entity.

IPC Classes  ?

  • H04L 12/58 - Message switching systems
  • H04W 4/12 - Messaging; Mailboxes; Announcements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

89.

DISINFECTION OF A FILE SYSTEM

      
Application Number EP2011069392
Publication Number 2012/065858
Status In Force
Filing Date 2011-11-04
Publication Date 2012-05-24
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Sten, Rasmus
  • Takala, Pasi

Abstract

A method of disinfecting an infected electronic file in a file system. At a computer device, a file system is scanned using an anti-virus application to identify the infected electronic file. All or part of an uninfected version of the electronic file is obtained from a backup database of the file system. The backup system includes data from which a plurality of backup copies of at least part of the file system may be obtained. All or part of the infected electronic file is replaced with all or part of the uninfected electronic file. A determination is made as to whether any of the plurality of backup copies include an infected version of the file. If any of the plurality of backup copies include an infected version of the electronic file, the electronic file in the backup database is replaced with all or part of the uninfected version of the electronic file.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

90.

COMPUTER SYSTEM ANALYSIS METHOD AND APPARATUS

      
Application Number EP2011065479
Publication Number 2012/052221
Status In Force
Filing Date 2011-09-07
Publication Date 2012-04-26
Owner F-SECURE CORPORATION (Finland)
Inventor Turbin, Pavel

Abstract

A method of analysing a computer on which are installed a plurality of applications each comprising a set of inter-related objects. The method first comprises identifying a local dependency network for each of one or more of said applications, a local dependency network comprising at least a set of object paths and inter-object relationships. The (or each) local application dependency network is then compared against a database of known application dependency networks to determine whether the application associated with the local dependency network is known. The results of the comparison are then used to identify malware and/or orphan objects.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

91.

SCREAM

      
Serial Number 85578971
Status Registered
Filing Date 2012-03-23
Registration Date 2013-10-29
Owner F-SECURE CORPORATION (Finland)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Downloadable ring tones for mobile devices; sound alarms; downloadable sound files and alert tones for locating and recovering a user's missing, stolen, or lost mobile communication device; a feature of computer or mobile device software, namely, a sound-based alarm that also emits flashing lights from the display, provided via computer or mobile device software for locating and recovering a user's missing, stolen, or lost mobile communication device; software for remotely managing mobile communications devices

92.

IDENTIFYING POLYMORPHIC MALWARE

      
Application Number EP2011057805
Publication Number 2012/007202
Status In Force
Filing Date 2011-05-13
Publication Date 2012-01-19
Owner F-SECURE CORPORATION (Finland)
Inventor Harmonen, Timo

Abstract

A method and apparatus for identifying an electronic file as polymorphic malware. A server receives from a client device a hash value and metadata associated with an electronic file. The server determines that the received metadata relates to corresponding metadata stored at a database, the corresponding stored metadata being associated with a further hash value that differs from the received hash value. A determination is made that each of the received hash values have been reported by fewer than a predetermined number of clients and, as a result, it is determined that the electronic file is likely to be polymorphic malware.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

93.

ANTI-VIRUS APPLICATION AND METHOD

      
Application Number EP2011057723
Publication Number 2011/154215
Status In Force
Filing Date 2011-05-12
Publication Date 2011-12-15
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Tikkanen, Antti
  • Ståhlberg, Mika

Abstract

A method of performing an anti-virus scan on an electronic file. An anti-virus application running at a computer device determines that an electronic file requires scanning. The electronic file is placed in a queue for analysis, and the state of the electronic file is altered such that it can be written to a memory but not accessed before analysis is complete. An icon associated with the electronic file is altered to indicate that the analysis is not yet complete, the icon being displayable on a display device. Once the electronic file has been analysed, the icon associated with the electronic file is altered again to indicate that it has been analysed.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

94.

MALWARE SCANNING

      
Application Number EP2011057489
Publication Number 2011/147674
Status In Force
Filing Date 2011-05-10
Publication Date 2011-12-01
Owner F-SECURE CORPORATION (Finland)
Inventor Turbin, Pavel

Abstract

According to a first aspect of the present invention there is provided a method of scanning a computer system for malware. The method comprises determining when an application being executed on the computer system is attempting to open a file, adding data written to the open file by the application into a malware scanner queue, and ensuring that the application has been notified that the file has been closed before scanning the queued file data to determine if it relates to potential malware.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

95.

Mobile device geolocation

      
Application Number 13162477
Grant Number 09232491
Status In Force
Filing Date 2011-06-16
First Publication Date 2011-10-06
Grant Date 2016-01-05
Owner F-SECURE CORPORATION (Finland)
Inventor Mahaffey, Kevin Patrick

Abstract

GPS receivers are included in many mobile communications devices; however, there are circumstances where GPS is unavailable or undesirable to use. In an implementation, a device identifies nearby wireless signals, such as Wi-Fi access points and cell towers, and compares them to a database of known signals to determine an approximate location for the device. Because such a database can be large and change rapidly, it may not be appropriate to store the database entirely on a device. Instead, a server may store the database. In an implementation, to minimize the time required to determine a device's location, the device may first transmit location-related information to a server and receive a subset of the database corresponding to an area near the device so that future locations nearby can be determined without needing to communicate with the server.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/02 - Services making use of location information
  • G06F 21/60 - Protecting data
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04W 8/24 - Transfer of terminal data

96.

MALWARE PROTECTION

      
Application Number EP2011053835
Publication Number 2011/113807
Status In Force
Filing Date 2011-03-15
Publication Date 2011-09-22
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Niemelä, Jarno
  • Hyppönen, Mikko
  • Kangas, Santeri

Abstract

According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file whilst providing indications to the executable file that it is being executed within an emulated computer system.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

97.

CONTROLLING LOCATION INFORMATION

      
Application Number EP2010064104
Publication Number 2011/045163
Status In Force
Filing Date 2010-09-24
Publication Date 2011-04-21
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Niemelä, Jarno
  • Kesti, Veli-Jussi
  • Palomäki, Pirkka

Abstract

A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

98.

Configuring a client application

      
Application Number 12587592
Grant Number 08443059
Status In Force
Filing Date 2009-10-08
First Publication Date 2011-04-14
Grant Date 2013-05-14
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Paalanen, Jarkko
  • Pehkonen, Pekka
  • Salmi, Timo

Abstract

A method and apparatus for configuring an application at a device in a communications network. A server receives a request message from the device. The request message includes information that identifies the application, and further information relating to either or both of the device type or a network operator associated with the device. The further information is sued by the server to obtain specific configuration information relating to the application. A response is sent to the device, the response including the obtained specific configuration. The specific configuration information is subsequently be used by the device to configure the application.

IPC Classes  ?

  • G06F 15/177 - Initialisation or configuration control

99.

Controlling location information

      
Application Number 12587716
Grant Number 08981902
Status In Force
Filing Date 2009-10-13
First Publication Date 2011-04-14
Grant Date 2015-03-17
Owner
  • F-SECURE CORPORATION (Finland)
  • F-SECURE CORPORATION (Finland)
Inventor
  • Niemelä, Jarno
  • Kesti, Veli-Jussi
  • Palomäki, Pirkka

Abstract

A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.

IPC Classes  ?

  • G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission
  • H04W 24/00 - Supervisory, monitoring or testing arrangements
  • G01S 19/00 - Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04W 4/02 - Services making use of location information
  • H04W 8/16 - Mobility data transfer selectively restricting mobility tracking

100.

CONFIGURING A CLIENT APPLICATION

      
Application Number EP2010063961
Publication Number 2011/042303
Status In Force
Filing Date 2010-09-22
Publication Date 2011-04-14
Owner F-SECURE CORPORATION (Finland)
Inventor
  • Paalanen, Jarkko
  • Salmi, Timo
  • Pehkonen, Pekka

Abstract

A method and apparatus for configuring an application at a device in a communications network. A server receives a request message from the device. The request message includes information that identifies the application, and further information relating to either or both of the device type or a network operator associated with the device. The further information is sued by the server to obtain specific configuration information relating to the application. A response is sent to the device, the response including the obtained specific configuration. The specific configuration information issubsequently be used by the device to configure the application.

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data
  1     2        Next Page