A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software and applications for cyber security purposes;
software and applications for Internet content filtering;
software platforms for cyber security purposes; software and
software platforms for detecting and responding to cyber
threats and attacks; software and software platforms for
scanning, monitoring, analyzing and managing software
applications, computer systems and internet and information
networks and their vulnerabilities; software and software
platforms for desktop, laptop, mobile device, server, cloud,
network and Internet use security and protection; software
and software platforms for data protection, anti-virus
protection, anti-theft protection, backup, secure messaging,
email security, safe browsing, software updates and remote
device management; software and software platforms for
anonymous browsing, encryption, anti-tracking protection,
location management, network protection, privacy protection,
data compression, data leakage prevention, storing secure
notes and data, private messaging and location sharing;
software for on-line storage, management and sharing of
photos, videos, documents, data, emails, messaging,
contacts, location and other content; software for use of
virtual private networks (VPN); software for protection
against fraud and identity thefts; software and applications
for wireless devices; computer application software for
mobile phones; cloud servers; cloud computing software;
wireless routers; computer network routers; computer
hardware; computer peripherals; USB hardware and USB sticks;
USB operating software; software and device drivers;
downloadable electronic publications; computer hardware
modules for use with the Internet of Things (IoT); wireless
devices and hardware modules for use with the Internet of
Things (IoT); computer application software for use in
implementing the Internet of Things (IoT); computer
application software for use in implementing cyber security
solutions for the Internet of Things (IoT); Software and
applications for use in implementing cyber security
solutions for the Internet of Things (IoT); embedded
software; embedded software for use in implementing cyber
security solutions for the Internet of Things (IoT). Data processing, systematisation and management; collection
of data; computerised data processing; management and
compilation of computerised databases; retail and wholesale
services in relation to information technology equipment and
computer software; information, advisory and consultancy
services relating to all the aforesaid services. Telecommunication services in the areas of delivery of
messages by electronic transmission and in the field of
private and secure Internet browsing; providing virtual
private networks (VPN) services; private messaging services;
providing virtual private network (VPN) services for user
virtual location management; electronic transmission,
retrieval and streaming of files and data including images,
audio, video, documents, text, electronic messages, and
electronic mail over local or global communications
networks, including the Internet, intranets, extranets,
television, mobile networks, cellular and satellite
networks; secured data, sound and image transmission
services; providing access to databases; providing user
access to information on the Internet; data transfer
re-routing; secure data transfer via computer networks;
providing secure remote access to private computer networks
for implementation of Internet of Things (IoT); providing
secure remote access to private computer networks via the
Internet for implementation of Internet of Things (IoT);
information, advisory and consultancy services relating to
all the aforementioned services. Education; providing of training; arranging and conducting
seminars, conferences and workshops; providing on-line
electronic publications, not downloadable. Technological services; design and development of computer
hardware and software; research, design, development,
implementation, maintenance and updating of software
application solutions and IT security services in the field
of cyber security and information security, including
scanning, monitoring, analyzing and managing software
applications, computer systems and internet and information
networks and their vulnerabilities as well as detecting and
responding to cyber threats and attacks; research, design,
implementation, maintenance and updating of software
application solutions and IT security services in the field
of cyber security, including desktop, laptop, mobile device,
server, cloud, network and internet use security and
protection; research, design, implementation, maintenance
and updating of software application solutions and IT
security services in the field of cyber security, including
data security and protection, anti-virus protection,
anti-theft protection, backup, secure messaging, email
security, safe browsing, software updates and remote device
management; providing online, non-downloadable software for
anonymous browsing, anti-tracking protection, location
management and privacy protection; encryption services;
computer security services for protection against illegal
network access; compression of data for electronic storage;
electronic monitoring services for computer security
services for prevention of data leakage; IT consultancy,
advisory and information services; IT security services in
the nature of protection and recovery of computer data;
provision of cyber security services for networks,
endpoints, computer access and computerised transactions;
computer virus protection services; information technology
restoration services in the field of data and applications;
endpoint cyber security services; outsource service
providers in the field of information technology; technical
support services relating to computer software and
applications; monitoring of network and computer systems;
onsite and remote monitoring of computer systems, computer
networks and IT infrastructure for cyber security purposes;
providing online, non-downloadable software; providing
temporary use of non-downloadable software; Software as a
Service [SaaS], Platform as a Service [PaaS]; Infrastructure
as a Service [IaaS]; Application service provider [ASP]
services; cloud-based cyber security services; cloud
computing services; administration of cloud servers,
arranging of cloud computing services; cloud-based data
protection services; electronic monitoring of information to
detect online frauds and identity thefts; providing online,
non-downloadable software for protection against fraud and
identity thefts; information, advisory and consultancy
services relating to all the aforementioned services.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software and applications for cyber security purposes;
software and applications for Internet content filtering;
software platforms for cyber security purposes; software and
software platforms for detecting and responding to cyber
threats and attacks; software and software platforms for
scanning, monitoring, analyzing and managing software
applications, computer systems and internet and information
networks and their vulnerabilities; software and software
platforms for desktop, laptop, mobile device, server, cloud,
network and Internet use security and protection; software
and software platforms for data protection, anti-virus
protection, anti-theft protection, backup, secure messaging,
email security, safe browsing, software updates and remote
device management; software and software platforms for
anonymous browsing, encryption, anti-tracking protection,
location management, network protection, privacy protection,
data compression, data leakage prevention, storing secure
notes and data, private messaging and location sharing;
software for on-line storage, management and sharing of
photos, videos, documents, data, emails, messaging,
contacts, location and other content; software for use of
virtual private networks (VPN); software for protection
against fraud and identity thefts; software and applications
for wireless devices; computer application software for
mobile phones; cloud servers; cloud computing software;
wireless routers; computer network routers; computer
hardware; computer peripherals; USB hardware and USB sticks;
USB operating software; software and device drivers;
downloadable electronic publications; computer hardware
modules for use with the Internet of Things (IoT); wireless
devices and hardware modules for use with the Internet of
Things (IoT); computer application software for use in
implementing the Internet of Things (IoT); computer
application software for use in implementing cyber security
solutions for the Internet of Things (IoT); software and
applications for use in implementing cyber security
solutions for the Internet of Things (IoT); embedded
software; embedded software for use in implementing cyber
security solutions for the Internet of Things (IoT). Data processing, systematisation and management; collection
of data; computerised data processing; management and
compilation of computerised databases; retail and wholesale
services in relation to information technology equipment and
computer software; information, advisory and consultancy
services relating to all the aforesaid services. Telecommunication services in the areas of delivery of
messages by electronic transmission and in the field of
private and secure Internet browsing; providing virtual
private networks (VPN) services; private messaging services;
providing virtual private network (VPN) services for user
virtual location management; electronic transmission,
retrieval and streaming of files and data including images,
audio, video, documents, text, electronic messages, and
electronic mail over local or global communications
networks, including the Internet, intranets, extranets,
television, mobile networks, cellular and satellite
networks; secured data, sound and image transmission
services; providing access to databases; providing user
access to information on the Internet; data transfer
re-routing; secure data transfer via computer networks;
providing secure remote access to private computer networks
for implementation of Internet of Things (IoT); providing
secure remote access to private computer networks via the
Internet for implementation of Internet of Things (IoT);
information, advisory and consultancy services relating to
all the aforementioned services. Education; providing of training; arranging and conducting
seminars, conferences and workshops; providing on-line
electronic publications, not downloadable. Technological services; design and development of computer
hardware and software; research, design, development,
implementation, maintenance and updating of software
application solutions and IT security services in the field
of cyber security and information security, including
scanning, monitoring, analyzing and managing software
applications, computer systems and internet and information
networks and their vulnerabilities as well as detecting and
responding to cyber threats and attacks; research, design,
implementation, maintenance and updating of software
application solutions and IT security services in the field
of cyber security, including desktop, laptop, mobile device,
server, cloud, network and internet use security and
protection; research, design, implementation, maintenance
and updating of software application solutions and IT
security services in the field of cyber security, including
data security and protection, anti-virus protection,
anti-theft protection, backup, secure messaging, email
security, safe browsing, software updates and remote device
management; providing online, non-downloadable software for
anonymous browsing, anti-tracking protection, location
management and privacy protection; encryption services;
computer security services for protection against illegal
network access; compression of data for electronic storage;
electronic monitoring services for computer security
services for prevention of data leakage; IT consultancy,
advisory and information services; IT security services in
the nature of protection and recovery of computer data;
provision of cyber security services for networks,
endpoints, computer access and computerised transactions;
computer virus protection services; information technology
restoration services in the field of data and applications;
endpoint cyber security services; outsource service
providers in the field of information technology; technical
support services relating to computer software and
applications; monitoring of network and computer systems;
onsite and remote monitoring of computer systems, computer
networks and IT infrastructure for cyber security purposes;
providing online, non-downloadable software; providing
temporary use of non-downloadable software; Software as a
Service [SaaS], Platform as a Service [PaaS]; Infrastructure
as a Service [IaaS]; Application service provider [ASP]
services; cloud-based cyber security services; cloud
computing services; administration of cloud servers,
arranging of cloud computing services; cloud-based data
protection services; electronic monitoring of information to
detect online frauds and identity thefts; providing online,
non-downloadable software for protection against fraud and
identity thefts; information, advisory and consultancy
services relating to all the aforementioned services.
4.
Method for identifying network devices in computer network and an apparatus configured to identify network devices in computer network
A method for identifying devices in a computer network includes collecting data points including device related parameters/information from a device accessing network resources, determining a string distance between the set of collected data points with the data sets collected from previously known network devices and selecting the smallest string distance value and/or highest similarity score. If the determined string distance to the data set of the closest device exceeds a threshold value, the device accessing the network resources is new and its entry can be created. If the determined string distance is under a predetermined threshold value, it is determined that the device accessing the network resources is the device having the closest string distance value to the collected set of data points, and the values in a database and/or the network element of the previously known device can be updated based on the collected set of data points.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
H04L 41/08 - Configuration management of networks or network elements
G06F 18/22 - Matching criteria, e.g. proximity measures
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/12 - Discovery or management of network topologies
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; computer application software for mobile phones; cloud servers; cloud computing software; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); computer application software for use in implementing the Internet of Things (IoT); computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); embedded software; embedded software for use in implementing cyber security solutions for the Internet of Things (IoT). (1) Data processing, systematisation and management; collection of data; computerised data processing; management and compilation of computerised databases; retail and wholesale services in relation to information technology equipment and computer software; information, advisory and consultancy services relating to all the aforesaid services.
(2) Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services.
(3) Education; providing of training; arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable.
(4) Technological services; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; computer security services for protection against illegal network access; compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage; IT consultancy, advisory and information services; IT security services in the nature of protection and recovery of computer data; provision of cyber security services for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services in the field of data and applications; endpoint cyber security services; outsource service providers in the field of information technology; technical support services relating to computer software and applications; monitoring of network and computer systems; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; providing online, non-downloadable software; providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud computing services; administration of cloud servers, arranging of cloud computing services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software and software applications for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, router and gateway protection, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software applications for Internet content filtering; downloadable software platforms for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for use of virtual private networks (VPN); downloadable software for protection against fraud and identity thefts; downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable USB operating software; downloadable software and downloadable software device drivers for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; wireless devices in the nature of mobile hotspot devices, mobile phones, laptops and tablet computers; downloadable computer application software for use in implementing the Internet of Things (IoT); downloadable computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable software and computer applications for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable or integrable embedded software for use in implementing cyber security solutions for the Internet of Things (IoT) Data processing, systematisation and management in the nature of compiling electronic data into computer databases; collection of data services, namely, electronic data collection for business purposes in the field of information technology, data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities; computerised data processing; management and compilation of computerised databases; retail store services, retail web store services, wholesale store services, and wholesale web store services in relation to computer software; business information, advisory and consultancy services relating to all the aforesaid services Telecommunication services, namely, delivery of messages by electronic transmission and telecommunications services in the field of private and secure Internet browsing, namely, providing virtual private networks (VPN) services and providing private electronic messaging services; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured electronic data, sound and image transmission services; providing access to databases; providing user access to a global computer information on the Internet; data transfer re-routing, namely, transfer of data by telecommunication; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services, namely, information, advisory, and consultancy services relating to telecommunications Educational services, namely, conducting seminars, conferences, and workshops in the field of cyber security; providing of training in the field of cyber security and secure software development; arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable in the nature of manuals featuring information technology in the field of cyber security Technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software applications in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; computer security services in the nature of detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management for protection against illegal network access; digital compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage, namely, monitoring of computer systems by remote access to ensure proper functioning; IT consultancy, advisory and information services; IT security services in the nature of protection being data encryption services and recovery of computer data; provision of cyber security services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services, namely, computer network security consultancy in the field of data and applications; endpoint cyber security services, namely, detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; outsource service providers in the field of information technology; technical support services, namely, troubleshooting of computer software and software applications; monitoring of network and computer systems, namely, monitoring of network and computer systems by remote access to ensure proper functioning; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes to ensure proper functioning and to detect unauthorized access or data breach; providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PAAS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IAAS) services, namely, hosting software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security for use by others; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud-based data protection services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software and software applications for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, router and gateway protection, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software applications for Internet content filtering; downloadable software platforms for cyber security purposes for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable software and software platforms for detecting and responding to cyber threats and attacks; downloadable software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; downloadable software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; downloadable software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; downloadable software for use of virtual private networks (VPN); downloadable software for protection against fraud and identity thefts; downloadable software and software applications for wireless devices for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable computer application software for mobile phones for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable cloud computing software for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable USB operating software; downloadable software and downloadable software device drivers for use in data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, and for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities; downloadable electronic publications, namely, manuals featuring information technology in the field of cyber security; wireless devices in the nature of mobile hotspot devices, mobile phones, laptops and tablet computers; downloadable computer application software for use in implementing the Internet of Things (IoT); downloadable computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable software and computer applications for use in implementing cyber security solutions for the Internet of Things (IoT); downloadable or integrable embedded software for use in implementing cyber security solutions for the Internet of Things (IoT) Data processing, systematisation and management in the nature of compiling electronic data into computer databases; collection of data services, namely, electronic data collection for business purposes in the field of information technology, data protection, anti-virus protection, anti-theft protection, identity protection, breach news reporting, social media monitoring, personal data removal, secure messaging, email security, safe browsing, software updates, remote device management, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities; computerised data processing; management and compilation of computerised databases; retail store services, retail web store services, wholesale store services, and wholesale web store services in relation to computer software; business information, advisory and consultancy services relating to all the aforesaid services Telecommunication services, namely, delivery of messages by electronic transmission and telecommunications services in the field of private and secure Internet browsing, namely, providing virtual private networks (VPN) services and providing private electronic messaging services; providing virtual private networks (VPN) services; private electronic messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured electronic data, sound and image transmission services; providing access to databases; providing user access to a global computer information on the Internet; data transfer re-routing, namely, transfer of data by telecommunication; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services, namely, information, advisory, and consultancy services relating to telecommunications Educational services, namely, conducting seminars, conferences, and workshops in the field of cyber security; providing of training in the field of cyber security and secure software development; arranging and conducting seminars, conferences and workshops in the field of cyber security; providing on-line electronic publications, not downloadable in the nature of manuals featuring information technology in the field of cyber security Technological services, namely, research and design in the field of cyber security; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software applications in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software applications in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; data encryption services; computer security services in the nature of detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management for protection against illegal network access; digital compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage, namely, monitoring of computer systems by remote access to ensure proper functioning; IT consultancy, advisory and information services; IT security services in the nature of protection being data encryption services and recovery of computer data; provision of cyber security services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services, namely, computer network security consultancy in the field of data and applications; endpoint cyber security services, namely, detecting and responding to cyber threats and attacks, anti-virus protection, anti-theft protection, secure messaging, email security, safe browsing, software updates and remote device management; outsource service providers in the field of information technology; technical support services, namely, troubleshooting of computer software and software applications; monitoring of network and computer systems, namely, monitoring of network and computer systems by remote access to ensure proper functioning; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes to ensure proper functioning and to detect unauthorized access or data breach; providing online, non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; providing temporary use of non-downloadable software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Software as a Service (SaaS) services featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Platform as a Service (PAAS) featuring computer software platforms for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; Infrastructure as a Service (IAAS) services, namely, hosting software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security for use by others; Application service provider (ASP) featuring software for use in network protection, endpoint protection, cloud application protection, for detecting and responding to cyber threats and attacks, and for scanning and managing vulnerabilities in the field of cyber security; cloud-based cyber security services, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems; cloud-based data protection services, namely, network protection, endpoint protection, cloud application protection, detecting and responding to cyber threats and attacks, and scanning and managing vulnerabilities in the field of cyber security; electronic monitoring of personally identifying information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services, namely, information technology in the field of cyber security
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Software and applications for cyber security purposes; software and applications for Internet content filtering; software platforms for cyber security purposes; software and software platforms for detecting and responding to cyber threats and attacks; software and software platforms for scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities; software and software platforms for desktop, laptop, mobile device, server, cloud, network and Internet use security and protection; software and software platforms for data protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; software and software platforms for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing; software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; software for use of virtual private networks (VPN); software for protection against fraud and identity thefts; software and applications for wireless devices; computer application software for mobile phones; cloud servers; cloud computing software; wireless routers; computer network routers; computer hardware; computer peripherals; USB hardware and USB sticks; USB operating software; software and device drivers; downloadable electronic publications; computer hardware modules for use with the Internet of Things (IoT); wireless devices and hardware modules for use with the Internet of Things (IoT); computer application software for use in implementing the Internet of Things (IoT); computer application software for use in implementing cyber security solutions for the Internet of Things (IoT); Software and applications for use in implementing cyber security solutions for the Internet of Things (IoT); embedded software; embedded software for use in implementing cyber security solutions for the Internet of Things (IoT). (1) Data processing, systematisation and management; collection of data; computerised data processing; management and compilation of computerised databases; retail and wholesale services in relation to information technology equipment and computer software; information, advisory and consultancy services relating to all the aforesaid services.
(2) Telecommunication services in the areas of delivery of messages by electronic transmission and in the field of private and secure Internet browsing; providing virtual private networks (VPN) services; private messaging services; providing virtual private network (VPN) services for user virtual location management; electronic transmission, retrieval and streaming of files and data including images, audio, video, documents, text, electronic messages, and electronic mail over local or global communications networks, including the Internet, intranets, extranets, television, mobile networks, cellular and satellite networks; secured data, sound and image transmission services; providing access to databases; providing user access to information on the Internet; data transfer re-routing; secure data transfer via computer networks; providing secure remote access to private computer networks for implementation of Internet of Things (IoT); providing secure remote access to private computer networks via the Internet for implementation of Internet of Things (IoT); information, advisory and consultancy services relating to all the aforementioned services.
(3) Education; providing of training; arranging and conducting seminars, conferences and workshops; providing on-line electronic publications, not downloadable.
(4) Technological services; design and development of computer hardware and software; research, design, development, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security and information security, including scanning, monitoring, analyzing and managing software applications, computer systems and internet and information networks and their vulnerabilities as well as detecting and responding to cyber threats and attacks; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including desktop, laptop, mobile device, server, cloud, network and internet use security and protection; research, design, implementation, maintenance and updating of software application solutions and IT security services in the field of cyber security, including data security and protection, anti-virus protection, anti-theft protection, backup, secure messaging, email security, safe browsing, software updates and remote device management; providing online, non-downloadable software for anonymous browsing, anti-tracking protection, location management and privacy protection; encryption services; computer security services for protection against illegal network access; compression of data for electronic storage; electronic monitoring services for computer security services for prevention of data leakage; IT consultancy, advisory and information services; IT security services in the nature of protection and recovery of computer data; provision of cyber security services for networks, endpoints, computer access and computerised transactions; computer virus protection services; information technology restoration services in the field of data and applications; endpoint cyber security services; outsource service providers in the field of information technology; technical support services relating to computer software and applications; monitoring of network and computer systems; onsite and remote monitoring of computer systems, computer networks and IT infrastructure for cyber security purposes; providing online, non-downloadable software; providing temporary use of non-downloadable software; Software as a Service [SaaS], Platform as a Service [PaaS]; Infrastructure as a Service [IaaS]; Application service provider [ASP] services; cloud-based cyber security services; cloud computing services; administration of cloud servers, arranging of cloud computing services; cloud-based data protection services; electronic monitoring of information to detect online frauds and identity thefts; providing online, non-downloadable software for protection against fraud and identity thefts; information, advisory and consultancy services relating to all the aforementioned services.
9.
Method and system for verifying device ownership upon receiving a tagged communication from the device
A mobile communications device is provided with a tagging module that tags outgoing communications. Upon receiving the tagged communication, a communications provider requests from a registered owner service identified in the tag whether the mobile communications device identified in the tag is registered with the registered owner service. Upon receiving confirmation from the registered owner service that the mobile communications device is registered with the service, the communications provider provides information regarding the location of the mobile communications device to the registered owner service.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
A network node of a threat detection network, a backend server of a threat detection network, a threat detection network and a threat detection method in a threat detection network. The threat detection network comprises interconnected network nodes and a backend system, wherein at least part of the nodes comprise security agent modules which collect data related to the respective network node. The method comprises collecting and/or analyzing at the network node data related to a network node, generating at least one local behavior model at the network node related to the network node on the basis of the collected and/or analyzed data, sharing at least one generated local behavior model related to the network node with one or more other nodes and/or with the backend system, comparing user activity in a node to the generated local behavior model and/or a received behavior model, and alerting the backend and/or the other nodes, e.g. about anomalous behavior, if deviation from the generated local behavior model and/or the received behavior model is detected, and/or comparing at the backend system the anomalous data with other behavior models, e.g. with other behavior models in the same organization and/or behavior models of known malicious users, and sending from the backend system to the node results and/or data relating to the comparison.
There is provided a network security method in a computer network. The method comprises detecting, by a gateway computer, a target device being connected to the computer network, detecting the target device transmitting a DNS query for resolving a hostname into an IP address, transmitting a query to a content rating system, wherein the query comprises the resolved hostname related to the DNS query of the target device, receiving, from the content rating system, a list of categorization categories assigned to the resolved hostname, determining a type of the target device on the basis of the received list of categorization categories assigned to the hostname, and generating a security related decision on the basis of the determined type of the target device.
A method of monitoring traffic by a router acting as a gateway between a first and second network is described. The router can receive data packets sent from the first device over the TCP connection and can send a TCP ACK packet to the first device in response to each data packet. The data packets can be stored without sending them to the second device. The stored data packets can be examined in order to determine whether to block or allow the TCP connection. In the event that it is determined to allow the TCP connection, the router can send each of the stored data packets to the second device. In the event that it is determined to block the TCP connection, the router can send a TCP RST message to each of the first and second devices in order to close the TCP connection.
A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
Systems and methods enhance the security of an electronic device by causing an application on the device to intercept and analyze a communication. When the communication meets certain conditions an audio transmission is initiated. In the absence of the conditions the communication is passed to a different application.
A security code module is provided that a developer may include in an application. The application, when downloaded onto a mobile communications device, includes the security code module. The security code module then initiates a request to a server to determine the status of the mobile communications device. When the status indicates that the mobile communications device is not in the possession of the registered owner, a security component on the server performs an action in response.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
Systems and methods for enhancing the security of an electronic device by causing the electronic device to go into a mode for lost or stolen devices after a security component receives information regarding an event at the electronic device and determines that the event indicates the electronic device is lost or stolen.
In a method and system for responding to an unauthorized action on a mobile communications device, a cryptographic key is destroyed. The destruction of the cryptographic key is followed by initiating a boot sequence at the mobile communications device where the device is booted into a kernel that restricts operation of the mobile communications device to communications with a server.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
There is provided a method for privacy protection including: identifying an API request being related to a tracking service; generating and sending a predetermined number of initial requests to the tracking service when processing the API requests to the tracking service; storing the initial requests and respective responses related to the initial requests from the API in a database; analysing body objects of the stored initial requests and respective responses and generating a dynamic response recipe on the basis of the analysis; and generating a response including a response body acceptable by the tracking process on the basis of the generated dynamic response recipe.
A method is provided for comparing a usage of a mobile communications device to a stored pattern of usage. When a measure associated with a difference between the usage and the stored usage pattern exceeds a threshold, the mobile communications device is caused to emit a sound encoded with information that may be decoded by another electronic device.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Security software; software for anti-virus protection,
anti-theft protection, backup, online banking protection,
electronic messaging protection, Internet browsing
protection, filtered Internet browsing, anonymous Internet
browsing, remote device management, software updates,
computer and device performance enhancement, use of virtual
private networks (VPN), anti-tracking, privacy protection,
virtual location management, information network protection
and data leakage prevention; software for vulnerability
management, risk assessment and information security policy
compliance; software for scanning, monitoring and analysis
of software applications, computer systems and information
networks; software for assessment of information security
vulnerabilities and data protection risks; software and
hardware for protecting routers; scanning software for
securing data; computers and peripherals for anti-virus
protection, Internet browsing protection, filtered Internet
browsing, anonymous Internet browsing, remote device
management, use of virtual private networks (VPN),
anti-tracking, privacy protection, information network
protection, and data leakage prevention. Telecommunication services in the field of private and
secure Internet browsing; private and secure electronic
messaging; providing virtual private network (VPN) services;
communication via virtual private networks; data transfer
re-routing. Researching, designing, implementing and updating software;
support and maintenance services for security software;
information security services; information security services
for computer networks; services for internet and information
network analytics; scanning services for detecting
information security vulnerabilities; consulting in the
field of information security; computer programming;
monitoring and assessing information security risks of
computer networks, websites and devices; monitoring computer
network systems; information, advice and reporting services
in the fields of information security and information
technology.
There is provided a method for privacy protection including: intercepting at least part of network traffic from a client device; analysing network traffic data of the intercepted network traffic to identify any elements indicative of a website visitor tracking process; analysing the one or more elements indicative of the website visitor tracking process to identify any tracking fields comprising user specific data; selecting random tracking field data accepted by the website visitor tracking process and replacing the user specific data of the one or more tracking fields with the selected random tracking field data respectively.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Computer hardware and software for setting up and configuring local area networks; computer utility virus protection programs; network routers; security software; software for ensuring the security of electronic mail; VPN (virtual private network) operating software (1) Providing virtual private network (vpn) services
(2) Computer anti-virus protection services; computer network security services; computer programming and software design; computer software consultancy; computer software installation and maintenance; computer virus protection services; consultation services relating to computer software; design and development of computer software; design and development of electronic data security systems; design, installation, updating and maintenance of computer software; design, maintenance, development and updating of computer software; developing computer software; development of software for secure network operations; maintenance and updating of computer software; maintenance of computer software relating to computer security and prevention of computer risks; monitoring of computer systems by remote access
24.
Systems and methods for computing device protection
Embodiments of the present disclosure help protect computing devices by, among other things, identifying events that may pose a risk to a computing device based on data from sensors coupled to the computer device.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Security software for use in computers and mobile devices for use in detecting and protecting against attacks on and unauthorized access to computer and mobile devices; software for anti-virus protection, anti-theft protection, backup, online banking protection, electronic messaging protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, software updates, computer and device performance enhancement, use of virtual private networks (VPN), anti-tracking, privacy protection, virtual location management, information network protection and data leakage prevention; software for vulnerability management, risk assessment and information security policy compliance; software for scanning, monitoring and analysis of software applications, computer systems and information networks; software for assessment of information security vulnerabilities and data protection risks; software and hardware for protecting routers; scanning software for securing data; computers and peripherals for anti-virus protection, Internet browsing protection, filtered Internet browsing, anonymous Internet browsing, remote device management, use of virtual private networks (VPN), anti-tracking, privacy protection, information network protection, and data leakage prevention Telecommunication services in the field of private and secure Internet browsing; private and secure electronic messaging; providing virtual private network (VPN) services; communication via virtual private networks; data transfer re-routing Researching, designing, implementing and updating software; support services, namely, technical support services in the nature of troubleshooting of security software problems, providing technical advice relating to installation of security software and maintenance services for security software; information security services for computers and mobile devices in the nature of maintaining software security; information security services for computer networks in the nature of encrypting network communication; services for internet and information network analytics; scanning services for detecting information security vulnerabilities; consulting in the field of information security; computer programming; monitoring and assessing information security risks of computer networks, websites and devices; monitoring computer network systems; information, advice and reporting services in the fields of information security and information technology
Method(s) and apparatus are described for use in preventing unauthorized redirection and/or routing of packets transmitted in a communication network. Packets generated by one or more devices in the communications network are intercepted by an apparatus. The intercepted packets are inspected and it is detected whether at least one of the intercepted packets is associated with redirection based on an unauthorized destination. For each intercepted packet, packet and protocol inspection may be used to determine the originally intended destination of the packet and to determine any other destination(s) associated with redirection of the packet. For each intercepted packet, if the any other destination(s) are not associated with one or more authorized destinations corresponding to the originally intended destination, then the intercepted packet is associated with redirection to an unauthorized destination. Those detected intercepted packets associated with redirection based on the unauthorized destination are blocked or corrected.
A method and device for preventing a browser-originating attack in a local area network. A security device in the local area network intercepts a message from a first device in the local area network towards a second device in the local area network. The message requests connection between the first device and the second device. The security device prompts a user of the first device to approve the connection. In the event that the user approves the connection the first device is allowed to connect to the second device, and in the event that the user does not approve the connection the connection attempt is terminated.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/55 - Detecting local intrusion or implementing counter-measures
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Security software [ and hardware ], namely, software [ and hardware ] for operating secure network routers, operating home computer network security systems, computer device security, computer virus protection, secure messaging, safe internet browsing, enabling parental control features, data privacy protection, home computer network management and computer device security management; secure network routers [ Consulting services in the field of home computer network and computer device security management ]
29.
Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Software in the areas of security and digital life-style;
software for desktop, laptop, server, cloud, network and
Internet use security; software in the fields of anti-virus
protection, anti-theft protection, backup, online banking,
secure messaging, email security, safe browsing, parental
control, software updates and remote device management;
software for on-line storage, management and sharing of
photos, videos, documents, data, emails, messaging,
contacts, location and other content; software for anonymous
browsing, encryption, anti-tracking protection, location
management, network protection, privacy protection, data
compression, data leakage prevention, storing secure notes
and data, private messaging and location sharing. Telecommunication services in the areas of delivery of
messages by electronic transmission; communication via
virtual private networks (VPN), private messaging and mobile
telecommunication network services, namely location
management; electronic transmission, and streaming of files
and data including images, audio, video, documents, text,
electronic messages, and electronic mail over local or
global communications networks, including the internet,
intranets, extranets, television, mobile networks, cellular
and satellite networks; online sharing of photos, videos,
documents, data, emails, messaging, contacts, location and
other content; private messaging. Researching, designing, implementing, updating and
provisioning software solutions and information technology
services in the fields of: desktop, laptop, server, cloud,
network and Internet use security, anti-virus protection,
anti-theft protection, backup, online banking, secure
messaging, email security, safe browsing, parental control,
software updates and remote device management; on-line
storage, of photos, videos, documents, data, emails,
messaging, contacts, location and other content; interactive
hosting services which allow the user to publish and share
their data, content and images on-line; cloud hosting
provider services, namely hosting online web facilities for
others for content sharing, aggregation, streaming and
synchronization services; hosting and maintaining cloud
based services for anonymous browsing, encryption,
anti-tracking protection, location management, network
protection, privacy protection, data compression and data
leakage prevention; storing secure notes and data;
information, advisory and consultancy services relating to
above.
34.
Mobile communication device display of reduced error key layout short reach with graphical user interface
A method and system for rendering a stolen mobile communications device inoperative is presented. A determination that the mobile communications device is in a first state is made at a security component on the mobile communications device. A removal of a cryptographic key is affected at the security component on the mobile communications device.
G06F 9/00 - Arrangements for program control, e.g. control units
G06F 15/177 - Initialisation or configuration control
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
37.
System and method for mobile communications blocking based on crowd sourced information
Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, information indicating that an electronic communication received at a mobile communications device of each user in the crowd should belong in a specific category is received from a crowd. If a number of users in the crowd exceeds a threshold value, information identifying the electronic communication is stored in a database as belonging in the specific category. The database is provided to a mobile communications device of a user, where when the electronic communication is transmitted to the mobile communications device of the user, the electronic communication is blocked at the mobile communications device of the user because the electronic communication is in the specific category.
Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Methods are provided for detecting that a security event has occurred on a portable electronic device and then establishing an audio transmission between the device and one or more clients, and in some embodiments, sending a command to initiate the audio transmission. The detection of a security event may be based on, for example, detecting that the device has been turned on, detecting movement of the device, detecting that an incorrect password has been entered, the device camera has been used, contacts have been added or deleted, the SIM card as been removed or replaced, application programs have been installed or uninstalled from the device, or uncharacteristic behavior has been detected.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Security software in the areas of security and digital life-style; software for desktop, laptop, server, cloud, network and Internet use security; security software in the fields of anti-virus protection, anti-theft protection, backup, online banking, secure messaging, email security, safe browsing, parental control, software updates and remote device management; security software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; security software for anonymous browsing, encryption, anti-tracking protection, location management, network protection, privacy protection, data compression, data leakage prevention, storing secure notes and data, private messaging and location sharing. (1) Telecommunication services in the areas of delivery of messages by electronic transmission namely electronic mail services through wired and wireless access, wireless digital messaging services, web hosting services; virtual private networks (VPN), private wireless digital messaging through an application that shields user messages and browsing from third parties and location management namely providing digital locating services for digital devices namely tablet computers and smart phones; electronic transmission, retrieval and streaming of files and data comprising images, audio, video, documents, text, electronic messages, and electronic mail over local and global communications networks, the internet, intranets, extranets, television, mobile networks, cellular and satellite networks; researching, designing, implementing, updating and provisioning software solutions and information technology services in the fields of: desktop, laptop, server, cloud, network and Internet use security, anti-virus protection, anti-theft protection, computer and mobile device data backup, online banking, secure messaging, email security, safe browsing, parental control, software updates and remote device management; providing software as a service (SAAS) services featuring software for on-line storage, management and sharing of photos, videos, documents, data, emails, messaging, contacts, location and other content; interactive hosting services which allow the user to publish and share their data, content and images on-line; cloud hosting provider services including content sharing, aggregation, streaming and synchronization services; anonymous browsing, encryption, anti-tracking protection, location management namely providing digital locating services for digital devices namely tablet computers and smart phones, network protection, privacy protection, data compression and data leakage prevention; cloud computing provider services for general storage of data; information, advisory and consultancy services relating to above.
A method of detecting suspicious code that has been injected into a process. The method comprises: identifying suspicious executable memory areas assigned to the process and, for each thread in the process, inspecting a stack associated with the thread to identify a potential return address; determining whether or not the potential return address is located within a suspicious memory area; and, if the potential return address is located within a suspicious memory area, determining whether or not the instruction at the address preceding the potential return address is a function call and, if yes, determining that the potential return address is a true return address and identifying the thread and associated code as suspicious.
G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
41.
Method and apparatus for auxiliary communications with mobile communications device
A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden ROM that configures a security component to work separate and apart from the OS. A secondary transceiver is configured with the security component to send and receive security transmissions, also separate and apart from the OS and the primary transceiver of the OS. Logic to detect specified trigger events is hard-coded into the hidden ROM, and detection of such an event places the mobile communications device into a special security mode. While in the special security mode, the secondary transceiver can send and receive security messages, including the location of the mobile communications device. Further, depending upon the received messages or commands, the security component can take pre-programmed security actions, such as erasing or faking data in the device.
A graphical user interface for improved text character entry is disclosed. In some embodiments, the graphical user interface may be displayed on a mobile communications device. The graphical user interface may display a message field, a soft keyboard, and at least one visual foveal echo field. The message field may display text characters of a message being authored by a user interacting with the soft keyboard. The visual foveal echo field may be placed adjacent to a soft keyboard row and contain a portion of the message being authored by the user.
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
G06F 3/023 - Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
43.
Method and system for cloning applications from an electronic source device to an electronic target device
Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an application in a source electronic device can be cloned from the source electronic device to a target electronic device. According to an embodiment, when the application is selected, the source device can be configured to automatically collect the selected application and configuration information, state information and/or application data associated with the selected application. The collected information is referred to as “cloning data.” Once the cloning data is collected, the source device can be configured to transmit at least a portion of the cloning data to the target electronic device, which can utilize the cloning data to clone the application into the target electronic device.
Security is enhanced for a user of a mobile communications device by providing a method for managing an emergency event includes detecting, by a mobile communication device having a GUI for displaying information to a user, an indication that an emergency event is occurring. Once the emergency event is detected, a plurality of event options is displayed on the GUI to a responding user who is not an owner of the mobile communication device. Each event option is associated with at least one instruction relating to an emergency action and/or response. When an indication selecting a first event option is received, the mobile communication device executes the instruction(s) associated with the first event option.
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
A method of obtaining password data for entry to an application running on a device. The method may include running a password manager application on a device. The password manager application may identify one or more applications installed on the device. The password manager application may display the identified applications on a display of the device. The password manager application may receive a user selection of a displayed application. The password manager application may determine whether an entry exists for the selected application in a memory associated with the password manager application. If no entry exists, the password manager application may generate an entry comprising password data for the selected application. If an entry exists, the password manager application may retrieve password data relating to the selected application.
G06F 7/04 - Identity comparison, i.e. for like or unlike values
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 17/30 - Information retrieval; Database structures therefor
H04L 29/06 - Communication control; Communication processing characterised by a protocol
Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, an electronic communication identified by a phone number is intercepted at a mobile communications device before the electronic communication is received by an application program on the device. The phone number is sent to a server for the server to identify a category associated with the phone number. The category is received at the mobile communication device. Based on the received category, a determination is made as to whether the application program should be allowed to receive the electronic communication. If allowed, the electronic communication is forwarded to the application program; else, the electronic communication is not forwarded.
According to an aspect of the invention, there is provided a method of protecting a user from a compromised web resource. The method may include monitoring a user's requests for trusted web resources to determine one or more web resources to be checked. The method may include querying a network database based on the determined one or more web resources to obtain historical data relating to whether any of the one or more web resources has been compromised at any time during a preceding time period. The method may include providing a predetermined response to protect the user if any of the one or more web resources has been compromised.
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
48.
Systems and methods for applying a security policy to a device based on a comparison of locations
Location information associated with a computing device may be received by a server. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device is in a location that has been identified in the set of locations. In response to such a determination, a particular security policy may be applied to the computing device. For example, the server may transmit a command to the computing device to apply a security policy associated with the location.
Location information associated with a computing device may be received by a server. For example, the location information may indicate the current physical location of the computing device. The server may compare the current location of the computing device with a set of locations associated with the computing device. The comparison may result in a determination that the computing device has entered or left a location area. In response to such a determination, a communication may be transmitted to a user of the computing device. For example, an email may be transmitted to the user. The email may include information describing that the computing device has entered or left the location area.
Location information associated with a computing device may be periodically transmitted to a server. A user of the computing device may transmit a request to the server when the computing device is no longer able to communicate with the server. For example, the user request may be associated with locating the computing device. In response to the request, the user may be shown the latest received location information of the computing device. The last received location information may be displayed in a web page.
A computing device may be locked and contact information associated with an owner of the computing device may be displayed. For example, a request to lock the computing device may be received. In response to such a request, at least some of the functionality of the computing device may be disabled. For example, control input or input keys of the computing device may be at least partially disabled. Furthermore, contact information may be shown on the display of the computing device. For example, the phone number, address, email address, or other information of the owner of the computing device may be displayed.
A security policy may be applied to a mobile communications device based on a location of the mobile communications device. For example, a first location of the mobile communications device may be obtained and a first security policy may be applied to the mobile communications device based on the first location. Furthermore, a change in the location of the mobile communications device may be detected. For example, the location of the mobile communications device may change from the first location to a second location. In response to the mobile communications device now being located at the second location, a second security policy may be applied to the mobile communications device. Thus, different security policies may be applied to a mobile communications device as the current location of the mobile communications device changes.
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory including computer program code the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following: detecting a listing of web content elements provided by a web search engine, the web content elements relating to web pages retrieved by the web search engine; analyzing one or more web content elements of the detected listing; and categorizing the content of one or more web pages on the basis of the analysis.
Profile information associated with a mobile communications device belonging to a user is stored at a server system. Upon the server system receiving an indication that the mobile communications device needs to be replaced, the profile information is reviewed. Based on the review of the profile, an offer is generated to replace the mobile communications device.
A method of customizing an application on a device, the method comprising: at a server, receiving a request message from the device, while the device is running the application, the request message comprising information identifying the application and further information relating to a network operator associated with the device; using the further information to identify the network operator associated with the device and to obtain network operator specific customization information relating to the application; and sending a response message to the device, the response message comprising the obtained network operator specific customization information, the network operator specific customization information usable by the device to customize any of: the application components, application user interface, and application settings.
Systems and methods for remotely controlling a lost mobile communications device are disclosed. Authorization credentials may be received and a command request for an action to be performed by a lost mobile communications device may further be received. A command corresponding to the command request may be transmitted to the lost mobile communications device. In response to the transmission of the command, information about the lost mobile communications device may be received and interpreted to determine whether the transmitted command was performed or not performed by the lost mobile communications device. A notification may be provided based on whether or not the command was performed by the lost mobile communications device.
A method of discovering suspect IP addresses, the method comprising, at a client computer: monitoring the computer for malware; on detection of malware, obtaining a list of IP addresses with which a connection has been made or attempted at the client computer within a preceding time frame; sending the list of IP addresses to a central server; and receiving from the central server a blacklist of suspect IP addresses to allow the client computer to block connections with IP addresses within said blacklist.
The present invention relates to a method for synchronising files between devices between two devices. The method includes creating a rule to control the synchronisation of the file. The rule includes at least one condition for synchronisation which is dependent upon a property of a device.
The present invention relates to a method of controlling the download of anti-virus software updates to a device. The device is configured to transmit an update query to a network device requesting information on whether any updates are available for the anti-virus software. When the device receives the response it stores the response in the cache. The cache can then be queried following a trigger and, if the cache indicates an update to the anti-virus software is available the device downloads an update to the anti-virus software. In an alternative embodiment the device may download and install an update upon receiving the response to the query if the response to the query indicates that an update is available. The query may be transmitted during a scan or upon determining a change in a connection at a device.
Download control is disclosed. An apparatus comprises one or more processors, and one or more memories including computer program code. The one or more memories and the computer program code configured to, with the one or more processors, cause the apparatus at least to perform: obtain one or more cryptographic hash values of a target file to be downloaded (702); cause transmission of the one or more cryptographic hash values to a trusted source (704); obtain reputation data relating to the target file originated from the trusted source in response to the transmission of the one or more cryptographic hash values (706); and control download of the target file on the basis of the reputation data (708).
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
61.
Systems and methods for device broadcast of location information when battery is low
Location information associated with a computing device may be transmitted from the computing device to a server. The transmitting of the location information may be performed in response to the battery of the computing device being at a low level. The location information may comprise a location of the computing device or information to identify the location of the computing device. As such, when the battery of the computing device approaches a low level, the location of the computing device may be transmitted from the computing device to a server. Thus, if the battery of the computing device is depleted, a user may obtain the last known location of the computing device that was transmitted when the battery was at a low level. The location information may also be used to identify the last known location for and to apply a security policy to the computing device.
Systems and methods for uploading location information based on device movement are disclosed. In some embodiments, location information may be received or determined by a mobile communications device. The location information may be associated with a physical location of the mobile communications device. A rate of movement of the mobile communications device may be identified. In some embodiments, the location information may be transmitted or uploaded from the mobile communications device to a server. The frequency of the transmitting or uploading of the location information may be based on the rate of movement of the mobile communications device.
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: a receiver for receiving, from a client device, a data upload request relating to a data management application, wherein a data communications connection having a first data upload speed is utilized between the client device and a data management server; a processor configured to determine whether the client device is allowed to use a second data upload speed on the basis of the received data upload request, wherein the second data upload speed is faster than the first data upload speed; and a processor configured to establish the second data upload speed for the client device, if the client device is allowed to use the second data upload speed.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
64.
Method for automatically backing up digital data preserved in memory in a computer installation and data medium readable by a computer having the associated instructions stored in the memory thereof
The invention relates to a method for automatically backing up digital data preserved in memory in a computer installation to a remote backup system accessible through the computer installation via a data transmission network. This method comprises extracting and analyzing information regarding the operation of the computer installation and determining parameters of a data backup application for saving data to the backup system. Based on the result of this analysis, the digital data preserved in memory is analyzed and the digital data analyzed is classified into a plurality of classes of different priorities. The backup application is also executed on at least part of the digital data based on the parameters and classes of priorities determined.
A method for determining appropriate actions to remedy potential security lapses following infection of a device by malware. Following detection of infection of the device the device undergoes a cleaning operation. As part of the cleaning operation infected electronic files and any other associated files or objects are removed from the device. From timestamps associated with the infected files and associated files and objects, either directly or from another source such as an anti-virus trace program, the time of infection can be estimated. This allows the system to reference timestamps on the device to determine the source of the infection. Additionally, if the type of infection is identified timestamps on the device can be used to determine where there are particular areas of vulnerability due to user actions on the device.
In accordance with an example embodiment of the present invention, there is provided a computing device (1), comprising: at least one processor (3); and at least one memory (10) including computer program code the at least one memory (10) and the computer program code configured to, with the at least one processor (3), cause the device (1) to perform at least the following: receive near field communication NFC device data related to a specific NFC device (14, 15); generate a reputation query on the basis of the received NFC device data; send the generated reputation query to a service provider (22); receive reputation data, retrieved from a reputation database (24) of NFC device reputation information, related to the specific NFC device (14, 15) from the service provider (22); and take further action on the basis of the received reputation relating to the specific NFC device (14, 15).
A method of detecting and blocking a malicious SSL connection at a client computer. The method comprises identifying, at a network firewall level, an outbound SSL connection being set up at the client computer; detecting an SSL certificate associated with the SSL connection; sending a request to a central server for reputation information on the SSL certificate; at the central server, determining reputation information in dependence upon the SSL certificate; providing said reputation information from the central server to the client computer; and using the reputation information at the client computer to determine whether or not to block the connection.
According to a first aspect of the present invention there is provided a method of scanning a computer device in order to detect potential malware when an operating system running on the computer device prevents applications installed on the device from accessing installed files of other applications installed on the device. The method comprises the steps of detecting installation of an application on the device, identifying one or more installation files that are required to perform the installation of the application, and performing a malware scan of the identified installation files and/or information obtained from the installation files.
According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points (110), (114) providing access services to client devices (106), (112). Identity information associated with the wireless access points is collected from a multiplicity of client devices (106), (112); (A1). A reputation request is received from a client device (A2), the request including identity information of an available wireless access point (A3). The received identity information is compared with the collected identity information (A4) for determining an indication of trust of the available wireless access point (A5). The indication of trust of the available wireless access point is transmitted to the client device (A6). The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point.
A method of detecting undesirable content on a social networking website. The method includes retrieving or accessing a post from a user's social networking page, identifying the content of a pre-defined set of features of the post, comparing the identified feature content with a database of known undesirable post feature content, and using the results of the comparison to determine whether the post is undesirable.
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory including executable instructions. The at least one memory and the executable instructions are configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: during the loading of an operating system, loading a boot time driver installed by an anti-virus application; reading a master boot record data by the boot time driver as soon as the operating system is ready to handle the request for reading the master boot record data; analyzing the collected master boot record data to identify any malicious entities; and in the event that malicious entities are identified, controlling the behavior of the processing system in order to disable the malicious entity.
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieving (206), from a reputation server, reputation data of uniform resource locators (URL) of one or more web sites relating to one or more web site features that are available via the web site; and determining (210, 212, 214, 216, 218) executable web site features on the basis of the retrieved reputation data.
According to a first aspect of the present invention there is provided a method of scanning for malware during execution of an application on a computer system. The method comprises detecting accesses by the application to files within a common directory, using the detected accesses to identify one or more groups of files within said common directory that the application may subsequently want to access, and scanning said one or more groups of files for malware prior to the application attempting to access files of the group or groups.
In accordance with an example embodiment of the present invention, there is provided apparatus, including: at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: receiving an application revocation request; confirming whether initiating an application revocation process is allowed; generating application revocation data once initiating the application revocation process has been allowed; storing the generated application revocation data to a reputation service network; and provide one or more revocation clients the generated application revocation data from the reputation service network in order to enable the one or more revocation clients revoking the application.
A method and apparatus for detecting malware in which a computer device that has an operating system and a memory executes an untrusted computer program. In the event that the untrusted program directly accesses a region of the memory used to store information relating to the operating system, a determination is made that the untrusted program is likely to be malware.
An example embodiment of the present invention provides an apparatus including at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: retrieve from a social networking service at least one of: user profile information of a user and user profile information of each contact node of the user in the social networking service; and a connection structure between the user and each contact node of the user, analyze the retrieved user profile information and/or the determined connection structure, and separate any outliers among the contact nodes on the basis of the analysis.
A method of updating an anti-virus application comprising an updatable module running on a client terminal. The method comprises receiving an update at the client terminal, initialising the updatable module within a sandbox environment and applying the update to the updatable module. Control tests are then run on the updated sandboxed module and if the control tests are passed, the updated module is brought out of the sandbox environment and normal scanning is allowed to proceed using the updated module. If the control tests are not passed, however, normal scanning using the updated module is prevented.
In accordance with an example embodiment of the present invention, there is provided an apparatus, comprising: at least one processor; and at least one memory including executable instructions, the at least one memory and the executable instructions being configured to, in cooperation with the at least one processor, cause the apparatus to perform at least the following: determining a passive scanning mode of an anti-virus application based on local software categorization and detected user network profile, the passive scanning mode defining adjustable anti-virus application scanning settings; and entering the passive scanning mode when configuration changes have not been detected for a predetermined period of time.
09 - Scientific and electric apparatus and instruments
Goods & Services
Feature of computer software for protecting against privacy risks and security risks in mobile communication devices; feature of software for scanning mobile communication devices, and for assessing, reporting, and preventing security risks and privacy risks on mobile communication devices; feature of downloadable software for assessing, reporting, and preventing the security risks and privacy risks of installing software designed for mobile communication devices that is available on websites and software repositories, and for assessing, reporting, and preventing the security risks and privacy risks of software after installation of the software on mobile communication devices; feature of mobile communication device anti-virus software; feature of internet security software, namely, mobile communication device firewall, and intrusion prevention, and anti-phishing software; feature of software for implementing security policy, spyware policy and privacy policy on a mobile communication device; feature of software for preventing installation of undesired software on a mobile communication device; feature of software for monitoring, backing up, preserving, and restoring mobile communications devices and mobile communications device data; feature of software for locating, recovering, securing, and disabling a user's missing, stolen, or lost mobile communication device; feature of software for remotely managing mobile communications devices
A method and apparatus for detected a Trojan in a suspicious software application in the form of at least one electronic file. A computer device determines the source from which the suspicious software application was obtained. A comparison is then made between the source from which the suspicious software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious application is more likely to contain a Trojan horse than if the sources were the same.
Mobile devices typically have some form of audio capabilities designed to be operated by the device's user, for example to place phone calls; however, if a device is misplaced or stolen, the user may wish to operate those audio capabilities remotely. Techniques are provided for determining when an audio transmission should be established between a device and one or more clients, and sending a command to initiate the audio transmission. The determination may be based on receiving a request from a client, detecting at a server that the device is lost or stolen, or detecting at the device that the device is missing. The audio transmission may be established without user intervention at the device or in response to user action at the portable electronic device. Device settings such as audio settings at the device may be overridden in connection with the audio transmission.
A method of providing a degree of authentication for a content link presented to one or more peer users by a sharing user via the Internet. The method comprises, at a server, associating said content link with authentication data provided by said sharing user, and storing the associated content link and authentication data in a storage location. A redirection link that links to the stored associated content link and authentication data is then presented to a peer user via a user interface of a client computer of the peer user. Upon submission of an access request from said client computer to said redirection link, said content link and said authentication data is then delivered to the client computer. The authentication data is then presented to the peer user via said user interface and the peer user is able to choose, via the user interface, to submit an access request to said content link.
According to a first aspect of the present invention, there is provided a method of processing a plurality of files to determine whether each of said files comprises malware. The method comprises selecting a file for processing and obtaining first data relating to said file. It is determined whether, based upon the first data, malware detection processing can be selected. Malware detection processing to be applied to said file is selected based upon said first data if it is determined that malware detection processing can be selected based upon the first data. If it is determined that, based upon the first data, malware detection processing cannot be selected, second data relating to the file is obtained and malware detection processing to be applied to said file is selected based upon said first and second obtained data. The selected malware detection processing is applied to said file.
A method and apparatus for managing communications in a communication network. A telephony device determines that a software application is attempting to contact a telephone number. It then determines that the telephone number matches at least one predetermined criterion, such as the E. telephone number being a premium rate number or having a different country code to that of the device. The device then sends a query to a reputation server. The query includes information identifying the software application. The device receives a response from the reputation server, the response including a reputation relating to the software application. On the basis of the received reputation relating to the software application, the device can take further action such as preventing contact from being established.
A computer-implemented method of scanning a plurality of files stored in a memory of a computer for malware. The computer comprises a processor. The method comprises, for each respective file of said plurality of files in said memory determining, using said processor, whether a relationship between the respective file and stored data satisfies a predetermined criterion. The stored data indicates one or more files determined not to contain malware and for which data associated with each of said one or more files has a predetermined characteristic. If the relationship satisfies the predetermined criterion, the respective file is processed according to said first processing method and if said relationship does not satisfy said predetermined criterion, the respective file is processed according to said second processing method.
A method of controlling access to web content at a client computer. The method comprises registering an access control status at the client computer, and detecting an attempt to access a website having an access control mechanism. In response to such detection, the access attempt is suspended and said access control status registered at the client computer compared with an access control status currently registered at the website. If these do not correspond, then the access control status registered at the website is changed to correspond with that registered at the client computer.
A method and apparatus for detecting a Return-Oriented Programming exploitation. At a computer device, a mechanism to detect a control transfer of a code location in a memory is established. This may be, for example, hooking the control transfer. The code location relates to an electronic file. In the event that a control transfer of the code location is detected, a comparison is made between a destination code location address with values in the freed stack. If the code location address matches any of the values in the freed stack, then it is determined that the control transfer of the code location relates to a Return-Oriented Programming exploitation.
A method and apparatus for detecting a suspicious entity in a communication network. A receiving device receives a message from a sender. A processor obtains domain information or a user identity, and further contact information from data contained in the message. A reputation query message is sent to a Network Reputation Server (NRS), the reputation query message including the domain information or user identity. A reply is received from the NRS that indicates that the domain information or user identity is related to a suspicious entity. The receiving device then associates the contact information with the suspicious entity. In this way, if a user of the receiving device attempts to use the contact information, they can be prevented from doing this or informed that it relates to a suspicious entity.
A method of disinfecting an infected electronic file in a file system. At a computer device, a file system is scanned using an anti-virus application to identify the infected electronic file. All or part of an uninfected version of the electronic file is obtained from a backup database of the file system. The backup system includes data from which a plurality of backup copies of at least part of the file system may be obtained. All or part of the infected electronic file is replaced with all or part of the uninfected electronic file. A determination is made as to whether any of the plurality of backup copies include an infected version of the file. If any of the plurality of backup copies include an infected version of the electronic file, the electronic file in the backup database is replaced with all or part of the uninfected version of the electronic file.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A method of analysing a computer on which are installed a plurality of applications each comprising a set of inter-related objects. The method first comprises identifying a local dependency network for each of one or more of said applications, a local dependency network comprising at least a set of object paths and inter-object relationships. The (or each) local application dependency network is then compared against a database of known application dependency networks to determine whether the application associated with the local dependency network is known. The results of the comparison are then used to identify malware and/or orphan objects.
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable ring tones for mobile devices; sound alarms; downloadable sound files and alert tones for locating and recovering a user's missing, stolen, or lost mobile communication device; a feature of computer or mobile device software, namely, a sound-based alarm that also emits flashing lights from the display, provided via computer or mobile device software for locating and recovering a user's missing, stolen, or lost mobile communication device; software for remotely managing mobile communications devices
A method and apparatus for identifying an electronic file as polymorphic malware. A server receives from a client device a hash value and metadata associated with an electronic file. The server determines that the received metadata relates to corresponding metadata stored at a database, the corresponding stored metadata being associated with a further hash value that differs from the received hash value. A determination is made that each of the received hash values have been reported by fewer than a predetermined number of clients and, as a result, it is determined that the electronic file is likely to be polymorphic malware.
A method of performing an anti-virus scan on an electronic file. An anti-virus application running at a computer device determines that an electronic file requires scanning. The electronic file is placed in a queue for analysis, and the state of the electronic file is altered such that it can be written to a memory but not accessed before analysis is complete. An icon associated with the electronic file is altered to indicate that the analysis is not yet complete, the icon being displayable on a display device. Once the electronic file has been analysed, the icon associated with the electronic file is altered again to indicate that it has been analysed.
According to a first aspect of the present invention there is provided a method of scanning a computer system for malware. The method comprises determining when an application being executed on the computer system is attempting to open a file, adding data written to the open file by the application into a malware scanner queue, and ensuring that the application has been notified that the file has been closed before scanning the queued file data to determine if it relates to potential malware.
GPS receivers are included in many mobile communications devices; however, there are circumstances where GPS is unavailable or undesirable to use. In an implementation, a device identifies nearby wireless signals, such as Wi-Fi access points and cell towers, and compares them to a database of known signals to determine an approximate location for the device. Because such a database can be large and change rapidly, it may not be appropriate to store the database entirely on a device. Instead, a server may store the database. In an implementation, to minimize the time required to determine a device's location, the device may first transmit location-related information to a server and receive a subset of the database corresponding to an area near the device so that future locations nearby can be determined without needing to communicate with the server.
According to a first aspect of the present invention there is provided a method of protecting a computer system from malware, which malware attempts to prevent detection or analysis when executed in an emulated computer system. The method comprises determining if an executable file should be identified as being legitimate and, if not, executing the executable file whilst providing indications to the executable file that it is being executed within an emulated computer system.
A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.
A method and apparatus for configuring an application at a device in a communications network. A server receives a request message from the device. The request message includes information that identifies the application, and further information relating to either or both of the device type or a network operator associated with the device. The further information is sued by the server to obtain specific configuration information relating to the application. A response is sent to the device, the response including the obtained specific configuration. The specific configuration information is subsequently be used by the device to configure the application.
A method and apparatus for controlling location information at a computer device such as a mobile telephone. Location information is intercepted and obtained by, for example, intercepting it from an Application Programming Interface destined for a location application. The location application is identified, and a rule is determined for applying to the location information on the basis of the identified location application. The rule is applied to the location information to give amended location information, and the amended location information is then sent to the location application.
A method and apparatus for configuring an application at a device in a communications network. A server receives a request message from the device. The request message includes information that identifies the application, and further information relating to either or both of the device type or a network operator associated with the device. The further information is sued by the server to obtain specific configuration information relating to the application. A response is sent to the device, the response including the obtained specific configuration. The specific configuration information issubsequently be used by the device to configure the application.