会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明公开
    • DETECTION OF SUSPECT WIRELESS ACCESS POINTS
    • ERKENNUNGVERDÄCHTIGERDRAHTLOSER ZUGANGSPUNKTE
    • EP2742711A1
    • 2014-06-18
    • EP12751026.1
    • 2012-08-07
    • F-Secure Corporation
    • STÅHLBERG, MikaNIEMELÄ, Jarno
    • H04W12/12H04W12/10H04W88/08H04L29/06
    • H04W12/12H04L63/126H04L63/14H04W12/10H04W88/08
    • According to aspects of the present invention there are provided methods and apparatus for detecting a suspect wireless access point in a communication network including a plurality of wireless access points providing access services to client devices. Identity information associated with the wireless access points is collected from a multiplicity of client devices. A reputation request is received from a client device, the request including identity information of an available wireless access point. The received identity information is compared with the collected identity information for determining an indication of trust of the available wireless access point. The indication of trust of the available wireless access point is transmitted to the client device. The wireless access points may include a cellular wireless access point or base station, wireless access point, a Wi-Fi access point, or a femto-cell access point.
    • 根据本发明的方面,提供了一种用于检测通信网络中的可疑无线接入点的方法和装置,包括向客户端设备提供接入服务的多个无线接入点。 从多个客户端设备收集与无线接入点相关联的身份信息。 从客户设备接收到信誉请求,该请求包括可用无线接入点的身份信息。 将接收到的身份信息与收集的身份信息进行比较,以确定可用无线接入点的信任指示。 可用无线接入点的信任指示被发送到客户端设备。 无线接入点可以包括蜂窝无线接入点或基站,无线接入点,Wi-Fi接入点或毫微微小区接入点。
    • 5. 发明公开
    • MALWARE DETECTION
    • 发现有害
    • EP2465068A1
    • 2012-06-20
    • EP10725807.1
    • 2010-06-30
    • F-Secure Corporation
    • STÅHLBERG, Mika
    • G06F21/00
    • G06F21/566
    • According to a first aspect of the present invention there is provided a method of detecting potential malware. The method comprises, at a server, receiving a plurality of code samples, the code samples including at least one code sample known to be malware and at least one code sample known to be legitimate, executing each of the code samples in an emulated computer system, extracting bytestrings from any changes in the memory of the emulated computer system that result from the execution of each sample, using the extracted bytestrings to determine one or more rules for differentiating between malware and legitimate code, and sending the rule(s) to one or more client computers. At the or each client computer, for a given target code, executing the target code in an emulated computer system, extracting bytestrings from any changes in the memory of the emulated computer system that result from the execution of the target code, and applying the rule(s) received from the server to the extracted bytestrings to determine if the target code is potential malware.