Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Filing Names

F secure Corporation
F secure Corporation_20131212

F secure Corporation patents

Recent patent applications related to F secure Corporation. F secure Corporation is listed as an Agent/Assignee. Note: F secure Corporation may have other listings under different names/spellings. We're not affiliated with F secure Corporation, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "F" | F secure Corporation-related inventors

Mitigating multiple advanced evasion technique attacks

Aspects of the invention relate to a method of identifying a potential attack in network traffic that includes payload data transmitted to a host entity in the network. The method includes: monitoring and checking said traffic on route to said host entity for intrusion attacks at a network entity acting... F secure Corporation

Preventing security threats in a computer network

Aspects of the invention relate to a method for preventing communication through covert channels in a Local Area Network (LAN). The method includes suspending an inbound or an outbound network connection related to a network element for a predetermined period of time, determining if any respective outbound or inbound network... F secure Corporation

Authenticating or controlling software application on end user device

A method of authenticating or controlling a software application on an end user device. The method includes selecting a code signing certificate related to an application developer; selecting one or more clean files from a database of known clean files signed with the selected code signing certificate; generating an application... F secure Corporation

Security of computer resources

There is provided a method for improving security of computer resources, including obtaining raw memory snapshots of a computer memory of one or more computing systems during runtime of identical processes relating to a predetermined application or a service; forming a map of expected memory behaviour relating to the application... F secure Corporation

Detection of malware-usable clean file

There are provided measures for enabling the detection of a malware-usable clean file or, stated differently, the detection of malware using a clean file. Such measures could exemplarily include identifying a vulnerable clean file in a computer system, which does not constitute malware but is vulnerable for usage by malware,... F secure Corporation

Method and detecting exploits

Methods and apparatus are disclosed for detecting if a source of initial content is serving exploits to a target device exposed to initial content. The method includes selecting at least two target devices and dividing the selected target devices into at least two groups, and causing the at least two... F secure Corporation

Evasive intrusion detection in private network

There are provided measures for enabling evasive intrusion detection in a private network. Such measures could exemplarily include a system for intrusion detection in a private network, said private network including a plurality of endpoints and an endpoint security system for monitoring security of the plurality of endpoints, said system... F secure Corporation

Protection against malicious attacks

There provided a method, including executing on a processor the steps of: monitoring DNS related network traffic including domain name-to-IP key value pairs, monitoring at least such non-DNS related network traffic that is targeting routable IP addresses, determining whether the monitored non-DNS related network traffic is related to a domain... F secure Corporation

Detection of coordinated cyber-attacks

A method of detecting coordinated attacks on computer and computer networks via the internet. The method includes using a web crawler to crawl the world wide web to identify domains and subdomains and their associated IP addresses, and to identify links between domains and subdomains, and storing the results in... F secure Corporation

Behaviour based malware prevention

A method of detecting malware present on a computer system. A set of applications is predefined as benign, and profiles are provided for respective benign applications. Each profile identifies one or more procedures known to be performed by the associated benign application, each procedure being identified by a characteristic action... F secure Corporation

Security of computer resources

A method including providing access to a reference database storing information on known behaviour of trusted computer processes and on resources the trusted computer processes need from a configuration database; detecting, by a first computer process from a second computer process, a request for specified resource stored in the configuration... F secure Corporation

Malware removal

A method and apparatus for scanning for or removing malware from a computer device. Under normal circumstances, the computer device is controlled by a first operating system installed in a memory of the device. In order to scan for or remove the malware from the computer device, control of the... F secure Corporation

Advanced local-network threat response

There are provided measures for enabling advanced local-network threat response. Such measures could exemplarily include detecting a security threat initiated by a local-network host at a local-network honeypot entity, triggering a threat response operation at a local-network backend entity upon detection of the security threat by the local-network honeypot entity,... F secure Corporation

Malware detection

There is provided a malware analysis method including at a computer device having an operating system and a memory: collecting Dynamic Link Library (DLL) data under a system folder, the data including at least the DLL name and all pairs of exported function names and function addresses relative to the... F secure Corporation

Method for privacy protection

There is provided a method for privacy protection including: intercepting at least part of network traffic from a client device; analysing network traffic data of the intercepted network traffic to identify any elements indicative of a website visitor tracking process; analysing the one or more elements indicative of the website... F secure Corporation

Controlling access to web resources

The invention relates to a method including at a user device: receiving a communication message over the Internet or other network; analysing web resource data related to one or more web resource hyperlinks included in the received communication message to find any user logging in elements by detecting functions for... F secure Corporation

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with F secure Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for F secure Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by