[go: up one dir, main page]

GB201222212D0 - Malware detection - Google Patents

Malware detection

Info

Publication number
GB201222212D0
GB201222212D0 GBGB1222212.1A GB201222212A GB201222212D0 GB 201222212 D0 GB201222212 D0 GB 201222212D0 GB 201222212 A GB201222212 A GB 201222212A GB 201222212 D0 GB201222212 D0 GB 201222212D0
Authority
GB
United Kingdom
Prior art keywords
keys
trusted
public
computer devices
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB1222212.1A
Other versions
GB2495648A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WithSecure Oyj
Original Assignee
F Secure Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F Secure Oyj filed Critical F Secure Oyj
Priority to GB1222212.1A priority Critical patent/GB2495648A/en
Publication of GB201222212D0 publication Critical patent/GB201222212D0/en
Publication of GB2495648A publication Critical patent/GB2495648A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method of maintaining a database of trusted public keys in a plurality of computer devices. Preferably, the keys are stored in a memory 102 of said device 101. The keys must be suitable for the purpose of eliminating the need to scan trusted files for malware at the computer devices (e.g. see S8, fig. 2). In the method, public keys are identified at a network based service, preferably a certificate authority or CA. The keys belong to a public key infrastructure or PKI architecture and are used in the digital signing of electronic files. The keys, which the method verifies as belonging to a trusted source, are sent securely to the devices.
GB1222212.1A 2008-09-11 2008-09-11 Maintaining a database of trusted public keys in a plurality of computer devices Withdrawn GB2495648A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1222212.1A GB2495648A (en) 2008-09-11 2008-09-11 Maintaining a database of trusted public keys in a plurality of computer devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1222212.1A GB2495648A (en) 2008-09-11 2008-09-11 Maintaining a database of trusted public keys in a plurality of computer devices

Publications (2)

Publication Number Publication Date
GB201222212D0 true GB201222212D0 (en) 2013-01-23
GB2495648A GB2495648A (en) 2013-04-17

Family

ID=47602347

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1222212.1A Withdrawn GB2495648A (en) 2008-09-11 2008-09-11 Maintaining a database of trusted public keys in a plurality of computer devices

Country Status (1)

Country Link
GB (1) GB2495648A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2571381C1 (en) * 2014-10-17 2015-12-20 Закрытое акционерное общество "Лаборатория Касперского" System and method to replenish data base of trusted certificates used during antivirus check
RU2571382C1 (en) * 2014-10-17 2015-12-20 Закрытое акционерное общество "Лаборатория Касперского" System and method for antivirus scanning depending on certificate trust level
US10313324B2 (en) 2014-12-02 2019-06-04 AO Kaspersky Lab System and method for antivirus checking of files based on level of trust of their digital certificates
RU2617925C2 (en) * 2015-06-30 2017-04-28 Закрытое акционерное общество "Лаборатория Касперского" Method for anti-virus scanning of computer system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6763459B1 (en) * 2000-01-14 2004-07-13 Hewlett-Packard Company, L.P. Lightweight public key infrastructure employing disposable certificates
US20020078347A1 (en) * 2000-12-20 2002-06-20 International Business Machines Corporation Method and system for using with confidence certificates issued from certificate authorities
JP2005537711A (en) * 2002-08-28 2005-12-08 ドコモ コミュニケーションズ ラボラトリーズ ユー・エス・エー インコーポレーティッド Certificate-based encryption and public key structure infrastructure
JP3894181B2 (en) * 2003-10-10 2007-03-14 株式会社日立製作所 Method and apparatus for speeding up public key certificate verification

Also Published As

Publication number Publication date
GB2495648A (en) 2013-04-17

Similar Documents

Publication Publication Date Title
US7958364B2 (en) System and method for digitally signing electronic documents
US8516261B2 (en) Message sending/receiving method
PH12019501715A1 (en) Digital certificate management method and apparatus, and electronic device
US11283626B2 (en) Apparatus and methods for distributed certificate enrollment
WO2016057086A3 (en) Common modulus rsa key pairs for signature generation and encryption/decryption
WO2019072272A3 (en) Domain name management scheme for cross-chain interactions in blockchain systems
GB2573666A (en) Verifying authenticity of computer readable information using the blockchain
MX2020000328A (en) GENERATION OF DECLARATION OF AUTHENTICATION OF KEYS THAT PROVIDE THE ANONYMITY OF THE DEVICE.
MX2021014176A (en) Method and system for blockchain variant using digital signatures.
TW200605592A (en) Distributed management of a certificate revocation list
WO2009158086A3 (en) Techniques for ensuring authentication and integrity of communications
WO2011056321A3 (en) Key certification in one round trip
MX2018016420A (en) Electronic credental management system.
BR112013016797A2 (en) method and apparatus for using identity information for digital signaling and content integrity and authenticity encryption in content-oriented networks
MX2014011953A (en) Detecting network intrusion using a decoy cryptographic key.
DE50200601D1 (en) Devices and methods for the certification of digital signatures
NZ549544A (en) Method and apparatus for digital rights management using certificate revocation list
WO2014138430A3 (en) Secure simple enrollment
JP2013509805A5 (en)
JP2016521937A5 (en)
MX2019008693A (en) Addressing a trusted execution environment using signing key.
TW200726170A (en) Method and system for secure authentication in a wireless network
FI20075776A0 (en) End-to-end encrypted communications
NZ613485A (en) Method for authenticating first communication equipment by means of second communication equipment
WO2009126209A3 (en) Methods and apparatus for authentication and identity management using a public key infrastructure (pki) in an ip-based telephony environment

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)