GB201222212D0 - Malware detection - Google Patents
Malware detectionInfo
- Publication number
- GB201222212D0 GB201222212D0 GBGB1222212.1A GB201222212A GB201222212D0 GB 201222212 D0 GB201222212 D0 GB 201222212D0 GB 201222212 A GB201222212 A GB 201222212A GB 201222212 D0 GB201222212 D0 GB 201222212D0
- Authority
- GB
- United Kingdom
- Prior art keywords
- keys
- trusted
- public
- computer devices
- devices
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000001514 detection method Methods 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a method of maintaining a database of trusted public keys in a plurality of computer devices. Preferably, the keys are stored in a memory 102 of said device 101. The keys must be suitable for the purpose of eliminating the need to scan trusted files for malware at the computer devices (e.g. see S8, fig. 2). In the method, public keys are identified at a network based service, preferably a certificate authority or CA. The keys belong to a public key infrastructure or PKI architecture and are used in the digital signing of electronic files. The keys, which the method verifies as belonging to a trusted source, are sent securely to the devices.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1222212.1A GB2495648A (en) | 2008-09-11 | 2008-09-11 | Maintaining a database of trusted public keys in a plurality of computer devices |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1222212.1A GB2495648A (en) | 2008-09-11 | 2008-09-11 | Maintaining a database of trusted public keys in a plurality of computer devices |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201222212D0 true GB201222212D0 (en) | 2013-01-23 |
GB2495648A GB2495648A (en) | 2013-04-17 |
Family
ID=47602347
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1222212.1A Withdrawn GB2495648A (en) | 2008-09-11 | 2008-09-11 | Maintaining a database of trusted public keys in a plurality of computer devices |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2495648A (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2571381C1 (en) * | 2014-10-17 | 2015-12-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method to replenish data base of trusted certificates used during antivirus check |
RU2571382C1 (en) * | 2014-10-17 | 2015-12-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for antivirus scanning depending on certificate trust level |
US10313324B2 (en) | 2014-12-02 | 2019-06-04 | AO Kaspersky Lab | System and method for antivirus checking of files based on level of trust of their digital certificates |
RU2617925C2 (en) * | 2015-06-30 | 2017-04-28 | Закрытое акционерное общество "Лаборатория Касперского" | Method for anti-virus scanning of computer system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6763459B1 (en) * | 2000-01-14 | 2004-07-13 | Hewlett-Packard Company, L.P. | Lightweight public key infrastructure employing disposable certificates |
US20020078347A1 (en) * | 2000-12-20 | 2002-06-20 | International Business Machines Corporation | Method and system for using with confidence certificates issued from certificate authorities |
JP2005537711A (en) * | 2002-08-28 | 2005-12-08 | ドコモ コミュニケーションズ ラボラトリーズ ユー・エス・エー インコーポレーティッド | Certificate-based encryption and public key structure infrastructure |
JP3894181B2 (en) * | 2003-10-10 | 2007-03-14 | 株式会社日立製作所 | Method and apparatus for speeding up public key certificate verification |
-
2008
- 2008-09-11 GB GB1222212.1A patent/GB2495648A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
GB2495648A (en) | 2013-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7958364B2 (en) | System and method for digitally signing electronic documents | |
US8516261B2 (en) | Message sending/receiving method | |
PH12019501715A1 (en) | Digital certificate management method and apparatus, and electronic device | |
US11283626B2 (en) | Apparatus and methods for distributed certificate enrollment | |
WO2016057086A3 (en) | Common modulus rsa key pairs for signature generation and encryption/decryption | |
WO2019072272A3 (en) | Domain name management scheme for cross-chain interactions in blockchain systems | |
GB2573666A (en) | Verifying authenticity of computer readable information using the blockchain | |
MX2020000328A (en) | GENERATION OF DECLARATION OF AUTHENTICATION OF KEYS THAT PROVIDE THE ANONYMITY OF THE DEVICE. | |
MX2021014176A (en) | Method and system for blockchain variant using digital signatures. | |
TW200605592A (en) | Distributed management of a certificate revocation list | |
WO2009158086A3 (en) | Techniques for ensuring authentication and integrity of communications | |
WO2011056321A3 (en) | Key certification in one round trip | |
MX2018016420A (en) | Electronic credental management system. | |
BR112013016797A2 (en) | method and apparatus for using identity information for digital signaling and content integrity and authenticity encryption in content-oriented networks | |
MX2014011953A (en) | Detecting network intrusion using a decoy cryptographic key. | |
DE50200601D1 (en) | Devices and methods for the certification of digital signatures | |
NZ549544A (en) | Method and apparatus for digital rights management using certificate revocation list | |
WO2014138430A3 (en) | Secure simple enrollment | |
JP2013509805A5 (en) | ||
JP2016521937A5 (en) | ||
MX2019008693A (en) | Addressing a trusted execution environment using signing key. | |
TW200726170A (en) | Method and system for secure authentication in a wireless network | |
FI20075776A0 (en) | End-to-end encrypted communications | |
NZ613485A (en) | Method for authenticating first communication equipment by means of second communication equipment | |
WO2009126209A3 (en) | Methods and apparatus for authentication and identity management using a public key infrastructure (pki) in an ip-based telephony environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |