GB2436161B - A Method and apparatus for providing network security - Google Patents
A Method and apparatus for providing network securityInfo
- Publication number
- GB2436161B GB2436161B GB0704919A GB0704919A GB2436161B GB 2436161 B GB2436161 B GB 2436161B GB 0704919 A GB0704919 A GB 0704919A GB 0704919 A GB0704919 A GB 0704919A GB 2436161 B GB2436161 B GB 2436161B
- Authority
- GB
- United Kingdom
- Prior art keywords
- network security
- providing network
- providing
- security
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H04L29/06877—
-
- H04L29/06918—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H04L29/06829—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Virology (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB0605117.1A GB0605117D0 (en) | 2006-03-14 | 2006-03-14 | A method and apparatus for providing network security |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB0704919D0 GB0704919D0 (en) | 2007-04-25 |
| GB2436161A GB2436161A (en) | 2007-09-19 |
| GB2436161B true GB2436161B (en) | 2008-10-08 |
Family
ID=36292728
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GBGB0605117.1A Ceased GB0605117D0 (en) | 2006-03-14 | 2006-03-14 | A method and apparatus for providing network security |
| GB0704919A Expired - Fee Related GB2436161B (en) | 2006-03-14 | 2007-03-14 | A Method and apparatus for providing network security |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GBGB0605117.1A Ceased GB0605117D0 (en) | 2006-03-14 | 2006-03-14 | A method and apparatus for providing network security |
Country Status (2)
| Country | Link |
|---|---|
| GB (2) | GB0605117D0 (en) |
| WO (1) | WO2007104988A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8782794B2 (en) | 2010-04-16 | 2014-07-15 | Bank Of America Corporation | Detecting secure or encrypted tunneling in a computer network |
Families Citing this family (22)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US8959624B2 (en) * | 2007-10-31 | 2015-02-17 | Bank Of America Corporation | Executable download tracking system |
| GB2470928A (en) * | 2009-06-10 | 2010-12-15 | F Secure Oyj | False alarm identification for malware using clean scanning |
| US8782209B2 (en) | 2010-01-26 | 2014-07-15 | Bank Of America Corporation | Insider threat correlation tool |
| US8800034B2 (en) | 2010-01-26 | 2014-08-05 | Bank Of America Corporation | Insider threat correlation tool |
| US8793789B2 (en) | 2010-07-22 | 2014-07-29 | Bank Of America Corporation | Insider threat correlation tool |
| US9038187B2 (en) | 2010-01-26 | 2015-05-19 | Bank Of America Corporation | Insider threat correlation tool |
| US10210162B1 (en) | 2010-03-29 | 2019-02-19 | Carbonite, Inc. | Log file management |
| US8544100B2 (en) | 2010-04-16 | 2013-09-24 | Bank Of America Corporation | Detecting secure or encrypted tunneling in a computer network |
| US8595839B2 (en) | 2011-01-21 | 2013-11-26 | International Business Machines Corporation | Selecting one of a plurality of scanner nodes to perform scan operations for an interface node receiving a file request |
| US9715325B1 (en) | 2012-06-21 | 2017-07-25 | Open Text Corporation | Activity stream based interaction |
| WO2015200211A1 (en) | 2014-06-22 | 2015-12-30 | Webroot Inc. | Network threat prediction and blocking |
| US10395133B1 (en) | 2015-05-08 | 2019-08-27 | Open Text Corporation | Image box filtering for optical character recognition |
| US10599844B2 (en) | 2015-05-12 | 2020-03-24 | Webroot, Inc. | Automatic threat detection of executable files based on static data analysis |
| US10289686B1 (en) | 2015-06-30 | 2019-05-14 | Open Text Corporation | Method and system for using dynamic content types |
| US10728034B2 (en) | 2018-02-23 | 2020-07-28 | Webroot Inc. | Security privilege escalation exploit detection and mitigation |
| US11314863B2 (en) | 2019-03-27 | 2022-04-26 | Webroot, Inc. | Behavioral threat detection definition and compilation |
| US12401411B2 (en) * | 2020-05-08 | 2025-08-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Versatile AAS receiver |
| CN115516778B (en) | 2020-05-11 | 2025-07-04 | 瑞典爱立信有限公司 | Efficient PRACH Scheduling |
| US11909482B2 (en) * | 2020-08-18 | 2024-02-20 | Qualcomm Incorporated | Federated learning for client-specific neural network parameter generation for wireless communication |
| JP7609913B2 (en) | 2023-03-29 | 2025-01-07 | 日立ヴァンタラ株式会社 | Information processing device, network device, and method for updating firmware of network device |
| CN119135441B (en) * | 2024-11-08 | 2025-03-18 | 北京升鑫网络科技有限公司 | Encrypted WEB scanning detection method, device and electronic device |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030191957A1 (en) * | 1999-02-19 | 2003-10-09 | Ari Hypponen | Distributed computer virus detection and scanning |
| EP1408393A2 (en) * | 2002-10-07 | 2004-04-14 | Symantec Corporation | Selective detection of malicious computer code |
| US20040181687A1 (en) * | 2003-03-14 | 2004-09-16 | Nachenberg Carey S. | Stream scanning through network proxy servers |
| GB2400933A (en) * | 2003-04-25 | 2004-10-27 | Messagelabs Ltd | Identifying a file, and checking if it contains a virus |
| WO2004114045A2 (en) * | 2003-06-25 | 2004-12-29 | Nokia Inc. | Two-phase hash value matching technique in message protection systems |
| US20050108554A1 (en) * | 1997-11-06 | 2005-05-19 | Moshe Rubin | Method and system for adaptive rule-based content scanners |
| US20050216770A1 (en) * | 2003-01-24 | 2005-09-29 | Mistletoe Technologies, Inc. | Intrusion detection system |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6941478B2 (en) * | 2001-04-13 | 2005-09-06 | Nokia, Inc. | System and method for providing exploit protection with message tracking |
| US6993660B1 (en) * | 2001-08-03 | 2006-01-31 | Mcafee, Inc. | System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment |
| GB2417655B (en) * | 2004-09-15 | 2006-11-29 | Streamshield Networks Ltd | Network-based security platform |
-
2006
- 2006-03-14 GB GBGB0605117.1A patent/GB0605117D0/en not_active Ceased
-
2007
- 2007-03-14 GB GB0704919A patent/GB2436161B/en not_active Expired - Fee Related
- 2007-03-14 WO PCT/GB2007/000901 patent/WO2007104988A1/en not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050108554A1 (en) * | 1997-11-06 | 2005-05-19 | Moshe Rubin | Method and system for adaptive rule-based content scanners |
| US20030191957A1 (en) * | 1999-02-19 | 2003-10-09 | Ari Hypponen | Distributed computer virus detection and scanning |
| EP1408393A2 (en) * | 2002-10-07 | 2004-04-14 | Symantec Corporation | Selective detection of malicious computer code |
| US20050216770A1 (en) * | 2003-01-24 | 2005-09-29 | Mistletoe Technologies, Inc. | Intrusion detection system |
| US20040181687A1 (en) * | 2003-03-14 | 2004-09-16 | Nachenberg Carey S. | Stream scanning through network proxy servers |
| GB2400933A (en) * | 2003-04-25 | 2004-10-27 | Messagelabs Ltd | Identifying a file, and checking if it contains a virus |
| WO2004114045A2 (en) * | 2003-06-25 | 2004-12-29 | Nokia Inc. | Two-phase hash value matching technique in message protection systems |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8782794B2 (en) | 2010-04-16 | 2014-07-15 | Bank Of America Corporation | Detecting secure or encrypted tunneling in a computer network |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2436161A (en) | 2007-09-19 |
| WO2007104988A1 (en) | 2007-09-20 |
| GB0704919D0 (en) | 2007-04-25 |
| GB0605117D0 (en) | 2006-04-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB2436161B (en) | A Method and apparatus for providing network security | |
| GB2432933B (en) | A method and apparatus for providing network security | |
| GB2452251B (en) | Method and apparatus for authenticating a network device | |
| TWI368427B (en) | Method and apparatus for mutual authentication | |
| PT2575394E (en) | Method and apparatus for accessing a 2g/3g network | |
| GB0610503D0 (en) | Communication apparatus and method | |
| ZA200901753B (en) | Method and apparatus for automatically disarming a security system | |
| PL2145418T3 (en) | Method and apparatus in a telecommunication system | |
| EP2036243A4 (en) | Method and apparatus for secure communications | |
| EP2106089A4 (en) | A method and system for authenticating users | |
| EP2000887A4 (en) | Inputting apparatus and inputting method | |
| GB2440612B (en) | Method and apparatus for authenticating a user | |
| EP1989899A4 (en) | Method and apparatus for communication | |
| GB0716976D0 (en) | A Content protection method and apparatus | |
| ZA200803088B (en) | Method and apparatus for establishing a security association | |
| GB0706287D0 (en) | A laser method and apparatus | |
| EP2093937A4 (en) | A method and apparatus for realizing ring network protection | |
| GB2432934B (en) | A method and apparatus for providing network security | |
| GB2443516B (en) | Network communication method and apparatus | |
| GB2454941B (en) | An apparatus and method for protecting a building | |
| EP2338251A4 (en) | Network security method and apparatus | |
| GB0714340D0 (en) | A detecor method and apparatus | |
| GB0621748D0 (en) | Method and apparatus for producing security documentation | |
| EP2011051A4 (en) | System and method for authenticating a meeting | |
| GB2441763B (en) | Method and apparatus for forming a building block |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) | ||
| 732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20101118 AND 20101124 |
|
| PCNP | Patent ceased through non-payment of renewal fee |
Effective date: 20210314 |