Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Ao Kaspersky Lab patents


Recent patent applications related to Ao Kaspersky Lab. Ao Kaspersky Lab is listed as an Agent/Assignee. Note: Ao Kaspersky Lab may have other listings under different names/spellings. We're not affiliated with Ao Kaspersky Lab, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Ao Kaspersky Lab-related inventors


System and method for trusted presentation of information on untrusted user devices

Disclosed are systems and method for trusted presentation of information on an untrusted user device. An exemplary system includes a secure portable device which can be connected to the untrusted user device and configured to: receive data from the untrusted user device; analyze the received data to identify therein information intented for display to the user via the untrusted user device; generate a video stream containing at least part of the information intended for display to the user; generate and insert into the video stream one or more protection elements that serve to authenticate the information being outputted in the video stream; and transmit the generated video stream to the user device.. ... Ao Kaspersky Lab

System and method of preventing unfair evaluation of applications by users

Disclosed are systems and methods for blocking access to interface elements of a page of an application in an applications store. The computing device executes executing a restrictive application that restricts use of the computing device. ... Ao Kaspersky Lab

System and method of execution of code by an interpreter

Disclose are systems and methods for execution of program code by an interpreter. One exemplary method comprises: executing, by the interpreter, instructions of the program code in an emulated computer environment; when detecting, by the interpreter, an instruction of the program code associated with an unknown object for which the interpreter lacks a rule of interpretation, halting by the interpreter further execution of the instructions of the program code; obtaining, by the interpreter, an auxiliary code whose result of execution corresponds to the result of the execution of the unknown object, wherein the auxiliary code contains known objects for which the interpreter has a rule of interpretation; executing, by the interpreter, the instructions of the auxiliary code; and after completion of the execution of the auxiliary code, by the interpreter, resuming the execution of the instructions of the program code.. ... Ao Kaspersky Lab

Secure control of automotive systems using mobile devices

Disclosed are systems and methods for secure control of automotive systems using mobile devices. An exemplary method comprises: connecting a vehicle, as a peripheral device, to a mobile device, which acts as a master device, via a security device of the vehicle, wherein the security device provides secure transmission of data and commands between the vehicle and the mobile device; receiving, by the mobile device, via the security device, from one or more measurement devices of the vehicle, measurement data from one or more automotive systems of the vehicle; based on the received measurement data, forming by the mobile device control commands for actuating devices of the vehicle, wherein the control commands enable and/or regulate operation of the actuating devices of the vehicle; and transmitting, by the mobile device, via the security device, the control commands to the actuating devices of the vehicle.. ... Ao Kaspersky Lab

System and methods of detecting malicious elements of web pages

Disclosed are system and method for detecting anomalous or malicious elements of a web page. One exemplary method comprises: obtaining data about elements of a tested web page; generating at least one n-dimensional vector characterizing elements of the tested web page; retrieving a statistical model of known malicious web page elements; comparing the at least one n-dimensional vector with clusters of the statistical model of known malicious web page elements, by measuring the distance of the n-dimensional vector of the element and centers of all clusters of the statistical model; and identifying at least one malicious element of the tested web page based on results of the comparison.. ... Ao Kaspersky Lab

System and method for performing secure online banking transactions

A method and system is provided for performing secure online banking transactions. An example method includes: collecting data related to at least one transaction of the online banking operation requested by a user device; creating a plurality of verification scripts based at least on the collected data, wherein each verification script comprising at least one rule requiring collection of one or more types of identification data associated with the transaction, and wherein different verification scripts comprises different rules for collecting different types of identification data associated with the transaction of the banking operation; executing the plurality of verification scripts to collect the required identification data; determining a level of security of performing the banking operation based at least on the identification data collected by the plurality of verification scripts; and determining whether to perform or not to perform the requested banking operation based on the determined level of security.. ... Ao Kaspersky Lab

System and method for detecting malicious compound files

A method and system is provided for detecting malicious compound files. An example method includes: obtaining at least one compound file; identifying a first set of features of the at least one compound file including features associated with a header of the at least one compound file; subsequent to identifying the first set of features, identifying, by the processor, a second set of features of the at least one compound file including features associated with at least one directory of the at least one compound file; determining a hash sum of the at least one compound file based on the first and second set of features; comparing the hash sum of the at least one compound file with information associated with a plurality of compound files stored in a database; and identifying the at least one compound file as being malicious, trusted or untrusted based at least on comparison results.. ... Ao Kaspersky Lab

Method and system of repairing vulnerabilities of smart devices

Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes: transmitting a request through the network to obtain access to a smart device; obtaining settings of the smart device by accessing a configuration file containing settings of the smart device; comparing each of the settings of the device with known vulnerabilities to identify a vulnerability of the smart device that can be exploited; determining a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and transmitting instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file.. ... Ao Kaspersky Lab

System and method for calculating projected impact generated by sports implements and gaming equipment

Disclosed are systems and methods of calculating projected impact generated by sports and gaming implements. An exemplary method comprises: receiving a measurement from a sensor associated with a subject of impact; receiving a measurement from a sensor associated with an object of impact; wherein the at least one received measurement includes one or more characteristics of movement of the subject in response to an external stimuli and one or more characteristics of movement of the object in response to the impact by the subject; calculating, by a projection tool, a projected impact of the subject on the object before the actual impact; and calculating, by a modeling tool, a model of movement of the object in response to the impact by the subject based at least on the projected impact and one or more rules defining a movement of the object based on the projected impact by the subject.. ... Ao Kaspersky Lab

System and method for detecting anomalous elements of web pages

Disclosed are system and method for detecting anomalous elements of web pages. One exemplary method comprises: obtaining access to a web site, by a client computing device, by requesting a web page associated with the web site via a web server; executing the web page by the client computing device to gather data relating to the web page; determining at least one n-dimensional vector based at least on the gathered data; creating at least one cluster comprising a set of values of coordinates of vectors for at least one element of the web page in n-dimensional space based on the at least one n-dimensional vector; creating a statistical model of the web page based on the at least one cluster; and using the statistical model for detecting anomalous elements of the web page.. ... Ao Kaspersky Lab

System and method of detecting malicious code in files

Disclosed are system and method for detecting malicious code in files. One exemplary method comprises: intercepting, by a processor, one or more application program interface (api) calls during an execution of a process launched from a file of a computing device; determining and detecting, by the processor, a presence of an exit condition of the process; in response to detecting the exit condition, identifying one or more signatures of a first type and transferring one or more saved memory dumps of the computing device to an emulator for execution; and determining and identifying a malicious code in the file in response to detecting one or more signatures of a second type based at least upon execution results of the transferred memory dumps of the computing device.. ... Ao Kaspersky Lab

System and method of distributing software updates

Disclosed is a system and method for distributing software updates to terminal nodes in a network. The system includes a network administration server configured to: receive from security applications installed on a plurality of terminal nodes in the network criteria characterizing the terminal nodes and identifiers of other terminal nodes in broadcast domains of the terminal nodes; based on the criteria, select terminal nodes to be used as active and passive update agents for each broadcast domain; and transmit to the security applications of the selected active update agents for each broadcast domain, one or more software updates for further distribution of the software updates by the active update agents to one or more passive update agents and the plurality of terminal nodes in the same broadcast domain.. ... Ao Kaspersky Lab

Detecting unauthorized remote administration using dependency rules

Disclosed are a system and method for protecting computers from unauthorized remote administration. One exemplary method includes: intercepting events occurring in the computer system including a first event and a second event associated with data transfer with an application executing in the computer system; determining that the first intercepted event is dependent on the second intercepted event based on parameters of the first intercepted event and the second intercepted event; generating a rule defining a dependency of at least one parameter of the first intercepted event on at least one parameter of the second intercepted event; responsive to determining a degree of similarity of the generated rule and a previously created rule exceeds a threshold value, identifying at least one application as a remote administration application that created the first and second identified intercepted events; and blocking the identified remote administration application from exchanging data with the computer system.. ... Ao Kaspersky Lab

System and method of identifying suspicious user behavior in a user's interaction with various banking services

Disclosed are system and method for identifying suspicious user behavior during a user's interaction with various banking services. One exemplary method comprises: receiving information relating to user's interaction with two or more banking services from at least two computing devices used by a user for interacting through a user account with each banking service; receiving an identifier of each computing device; determining a model of user behavior based at least on received information and identifers; calculating a probability of fraud based at least on the model of user behavior; determining and forming patterns of suspicious user behavior; and determining whether a current user activity in interacting with at least one banking services is suspicious based at least upon the patterns.. ... Ao Kaspersky Lab

02/01/18 / #20180032745

System and method of blocking access to protected applications

Disclosed are systems and methods for blocking access to protected applications. An exemplary method includes: intercepting access by a process of first information to be displayed on the user's device; determining second information based on the interception of the access by the process, the second information associated with the process; determining a region on a display of the user's device associated with the first information; analyzing one or more intersections between the region and at least one graphic interface associated with the process; and blocking the access by the process to the first information based on the analysis of the one or more intersections between the region and the at least one graphic interface associated with the process.. ... Ao Kaspersky Lab

02/01/18 / #20180032726

Elimination of false positives in antivirus records

Systems and methods for managing antivirus records. A method can include providing a data store of antivirus records, providing an antivirus application to be executed on each of a plurality of user computers, and executing instructions by a remote server to implement a processing tool configured to collect an antivirus record parameter for a particular antivirus record and collect statistical data of a detection events associated with the antivirus record, and a processing tool to configured to determine a false activation using the antivirus record parameter and the statistical data.. ... Ao Kaspersky Lab

01/04/18 / #20180006999

Computer security architecture and related computing method

A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. ... Ao Kaspersky Lab

12/28/17 / #20170374057

System and method for secure online authentication

Disclosed are systems and methods for secure online authentication. An exemplary method comprises: determining, via a processor of a computing device, a connection being established between a browser application installed on a computer system and a protected website; obtaining information relating to the protected website in response to obtaining a request for authentication from the protected website; establishing a protected data transmission channel with the protected website to receive at least one certificate of the protected website; performing authentication and transmitting authentication data to the protected website; and in response to an indication of a successful authentication from the protected website, transmitting identification information to the browser application for enabling access to the protected website.. ... Ao Kaspersky Lab

12/28/17 / #20170373923

System and method for determining and forming a list of update agents

Disclosed are system and method for determining and forming a list of update agents for a plurality of network terminal nodes connecting with at least one server in a network. One exemplary method comprises: receiving, by at least one network terminal node of the plurality of network terminal nodes, at least one unique identifier assigned by the server to the at least one network terminal node; broadcasting in the network the at least one unique identifier by the at least one network terminal node; collecting data relating to the at least one network terminal node and other network terminal nodes broadcasting in a same broadcasting domain of the network; and transmitting the data to the server for determining and forming a list of update agents for the same broadcasting domain of the network.. ... Ao Kaspersky Lab

12/07/17 / #20170351859

System and method of detecting malicious computer systems

Disclosed are systems and method for detecting a malicious computer system. An exemplary method comprises: collecting, via a processor, characteristics of a computer system; determining relations between collected characteristics of the computer system; determining a time dependacy of at least one state of the computer system based on determined relations; determining the at least one state of the computer system based at least on determined time dependacy; and analyzing the at least one state of the computer system in connection with selected patterns representing a legal or malicious computer system to determine a degree of harmfulness of the computer system.. ... Ao Kaspersky Lab

12/07/17 / #20170351600

System and method of transfer of control between memory locations

Disclosed are system and method for controlling execution of a program. An example method includes determining a memory sector for storing at least a portion of execution instructions of the computer program in virtual memory address space; determining, in the virtual memory address space, one or more pages that contain code instructions and data associated with the memory sector; creating a duplicate of the virtual memory address space comprising the memory sector and the one or more pages; tagging the memory sector and the one or more pages in both the virtual memory address space and its duplicate; receiving a notification to transfer execution of the computer program between different memory sectors while executing instructions stored in either the virtual memory address space or its duplicate; and transferring execution of the computer program to a memory location other than the one in which the notification was received.. ... Ao Kaspersky Lab

11/23/17 / #20170337377

System and method of distributing files between virtual machines forming a distributed system for performing antivirus scans

A method and system is provided for detecting malicious files in a distributed network having a plurality of virtual machines. An example method includes: determining and obtaining, by a virtual machine, at least one file for performing an antivirus scan; collecting data relating to characteristics of computing resources of each virtual machine and parameters relating to the antivirus scan; determining an approximation time function of the characteristics of the computing resources and an approximation function of the one or more parameters for determining an approximation time function of effectiveness of the antivirus scan; and beased at least on the approximation time function of effectiveness of the antivirus scan, selecting one virtual machine to perform the antivirus scan in order to determine whether the at least one file is malicious.. ... Ao Kaspersky Lab

11/23/17 / #20170337371

System and method of detecting unwanted software

Disclosed are system and method for detecting one or more unwanted applications in a computing device. One exemplary method comprises: obtaining information relating to a first application installed on the computing device; detecting a first file associated with the first application; identifying a second file being related to the first file based at least upon selected conditions; identifying a second application installed on the computing device using at least one of the first and second files; determining a frequency of use for each of the first and second applications; and determining whether the first application is an unwanted application based on the frequency of use for each of the first and second applications.. ... Ao Kaspersky Lab

11/23/17 / #20170337370

System and method for protecting mobile device when interacting with a computer

Disclosed are systems and methods for protecting data of a mobile device when interacting with a computer. An exemplary system comprises: a mobile device connected with a computer via a security adapter for charging purposes. ... Ao Kaspersky Lab

10/26/17 / #20170310648

System and method for protecting transmission of audio data from microphone to application processes

Disclosed are systems and methods for protecting transmission of audio data from microphone to application process. An exemplary method includes receiving a request from a software process to obtain an audio stream from an audio endpoint device; allocating a data buffer for the software process; processing and encrypting audio data received from the audio endpoint device by audio processing objects; storing the encrypted audio data in the allocated data buffer; installing an interceptor of a api function call for the software process; and decrypting the encrypted audio data from the allocated data buffer by the software process using the interceptor of the api function call.. ... Ao Kaspersky Lab

10/26/17 / #20170308898

System and method of recognizing transactions as trusted

A system and method is provided for recognizing transactions as trusted. An exemplary method includes receiving parameters for a plurality of transactions executed by a user and obtaining one or more attributes of the user from a bank associated with the user. ... Ao Kaspersky Lab

09/21/17 / #20170272460

Method and system of eliminating vulnerabilities of smart devices

Disclosed are systems and methods for eliminating vulnerabilities of smart devices connected to a data network. An example method includes: identifying a router providing access to the data network, obtaining access to the network and transmitting a request through the data network to obtain access to a smart device on the network. ... Ao Kaspersky Lab

09/21/17 / #20170272459

Method and system of eliminating vulnerabilities of a router

A method and system is provided for eliminating vulnerabilities on a data network including a router for directing data in the data network. An example method includes transmitting a request through the data network to obtain access to a device coupled to the data network; accessing the device to obtain a list of available resources of the device; comparing each of the available resources of the device with resource rules in a database to identify network vulnerabilities associated with the available resources and determining an action for repairing the network vulnerabilities associated with the available resources of the device. ... Ao Kaspersky Lab

09/14/17 / #20170262631

System and method of controlling file access of applications based on vulnerabilities of applications

Disclosed are systems and methods for controlling opening of computer files by vulnerable applications. An example method includes: responsive to detecting creation by a source software application of a computer file on the user computer, determining a file access policy associated with the computer file based on one or more parameters of the computer file; responsive to detecting a request from a consumer software application to open the computer file, determining an application launching policy associated with the consumer software application based on one or more vulnerabilities identified for the consumer software application; determining a file opening policy associated with the computer file and the consumer software application based on the file access policy, the application launching policy, and respective priorities amongst the policies; and controlling opening of the computer file by the consumer software application according to the determined file opening policy.. ... Ao Kaspersky Lab

08/24/17 / #20170244752

System and method of protection of technological systems from cyber attacks

Disclosed are systems and methods for protection of a technological system (ts) from cyber attacks. An exemplary method comprises: obtaining a real state of the ts; initializing a cybernetic control system (ccs) by synchronizing the ccs with the ts; comparing, by the ccs, the real state of the ts with an ideal state of the ts; based on the comparison, identifying a deviation of the real state of the ts from the ideal state of the ts; when the deviation is identified, checking an integrity of at least functional interconnections of the states of one or more elements of the ts; determining whether the ideal state of the ts is a modeling error based on one or more confirmed sustained functional interconnections between elements of the ts; and identifying anomalies in the ts based on one or more disturbed functional interconnections between elements of the ts.. ... Ao Kaspersky Lab

08/24/17 / #20170243223

System and method of detecting fraudulent user transactions

Disclosed are system and method for detecting fraudulent activity in user transactions. An exemplary method comprising: collecting user behavior data during user's interaction via an input device with one or more groups of elements of a graphical interface of an application on a computing device; calculating, by a processor, an anomalous user behavior coefficient for each group of elements of the graphical interface based on the collected user behavior data; detecting, by the processor, a fraudulent activity when a combination of anomalous user behavior coefficients exceeds a predetermined threshold value; and in response to detecting a fraudulent activity, blocking, by the processor, the interaction of the user with the application.. ... Ao Kaspersky Lab

06/22/17 / #20170180400

System and method for controlling access to data of a user device using a security application that provides accessibility services

Disclosed are systems and methods for controlling access to data of a user device using a security application that provides accessibility services. An exemplary method comprises: executing, on the user device, the security application and one or more user applications; intercepting, by an interception module of the security application using a plurality of accessibility api functions, data accessed by a user application being executed on the user device; determining, by a categorization module of the security application, a category of intercepted data; intercepting, by the interception module using the accessibility api functions, one or more events of user's interaction with a user interface of the user application; and determining, by an access control module of the security application, an access control policy that specifies and controls whether to allow a user's access to the intercepted data based on the category of intercepted data and types of intercepted events.. ... Ao Kaspersky Lab

06/22/17 / #20170177859

System and method for executing calls from os process to file system

Disclosed are system and method for executing calls to a file system of a computer. An exemplary method comprises intercepting, by a software agent, a call to the file system; determining one or more parameters of the call that identify its functionality; determining a priority of executing the call based on the one or more parameters; storing information about the call, the parameters and the priority into a database; selecting from the database, one or more calls for execution based at least in part on relative priorities of execution of the plurality of calls stored in the database; determining whether to execute or not to execute a selected call based on whether the selected call interferes with execution of an earlier selected call; and when the selected call does not interfere with execution of an earlier selected call, passing the selected call to the file system for execution.. ... Ao Kaspersky Lab

05/11/17 / #20170134347

System amd method for secure transmission of web pages using encryption of their content

Disclosed are systems and method for secure transmission of web pages using encryption of their content. An exemplary method comprises: receiving from a remote server, by a processor of a proxy server, a web page requested by a user device; analyzing, by the processor, the received web page to select one or more elements of the web page for encryption based at least upon a list of web page elements predetermined by the proxy server to protect against malware attacks; encrypting the code of the one or more selected elements; generating a script containing the encrypted code of the one or more selected elements; and replacing the code of the one or more selected elements in the web page with the script containing the encrypted code of the one or more selected elements prior to transmitting the web page to the user device.. ... Ao Kaspersky Lab

05/11/17 / #20170132418

System and method updating disk encryption software and performing pre-boot compatibility verification

Disclosed are systems and method or updating full disk encryption (fde) software on a computer. An example method comprises: obtaining an updated version of the fde software; blocking operations of the fde software on a boot drive of the computer; updating one or more components of the fde software based on the updated version of the fde software; modifying a booting process of an operating system of the computer to allow execution of a new version of a pre-boot compatibility verification component before the booting process; executing the new version of the pre-boot compatibility verification component, without decrypting and encrypting data on the boot drive, to determine if the boot drive is compatible with the updated fde software; and if the boot drive is determined to be compatible with the updated fde software, performing the booting process of the operating system of the computer.. ... Ao Kaspersky Lab

05/11/17 / #20170132412

System and method for protection of memory pages using a hypervisor

Disclosed are systems and methods for protecting memory pages of a computing device using a hypervisor. An exemplary method comprises: in response to receiving a hypercall from a trusted program, detecting by the hypervisor a token associated with the trusted program; checking the token associated with the trusted program against a saved token of the hypervisor; in response to detecting that the token associated with the trusted program matches the saved token of the hypervisor, transmitting addresses of a plurality of memory pages from the hypervisor to the trusted program; and performing a checksums verification for data stored in the plurality of memory pages.. ... Ao Kaspersky Lab

05/04/17 / #20170126707

System and method for distributing most effective antivirus records to user devices

Disclosed are system and method for distributing most effective antivirus records to user devices. An exemplary method includes: collecting, by a server, statistics on the use of a plurality of antivirus records deployed on a plurality of user devices; calculating, by the server, a coefficient of effectiveness of each antivirus record based on the collected statistics on the use of the plurality of antivirus records by the plurality of user devices; identifying, by the server, a group of the plurality of antivirus records having the largest coefficients of effectiveness, wherein the group is a number of the plurality of antivirus records not exceeding a threshold value; and transmitting, by the server, the group of antivirus records to at least one of the plurality of user devices for storage in an antivirus database for use by an antivirus application of the at least one user device.. ... Ao Kaspersky Lab

03/30/17 / #20170093893

System and method for blocking execution of scripts

Disclosed are exemplary aspects of systems and methods for blocking execution of scripts. An exemplary method comprises: intercepting a request for a script from a client to a server; generating a bytecode of the intercepted script; computing a hash sum of the generated bytecode; determining a degree of similarity between the hash sum of the bytecode and a plurality of hash sums of malicious and clean scripts stored in a database; identifying a similar hash sum from the database whose degree of similarity with the hash sum of the bytecode is within a threshold of similarity; determining a coefficient of trust of the similar hash sum; determining whether the requested script is malicious based on the degree of similarity and the coefficient of trust of the similar hash sum; and blocking the execution of the malicious script on the client.. ... Ao Kaspersky Lab

03/30/17 / #20170093892

System and method for generating sets of antivirus records for detection of malware on user devices

Disclosed are systems and method for generating a set of antivirus records to be used for detection of malicious files on a user's devices. An exemplary method includes maintaining, by a server, a database of malicious files; generating, by the server, at least one antivirus record for each malicious file; calculating an effectiveness of each antivirus record by determining how many different malicious files were detected using each antivirus record; generating a set of most effective antivirus records; and transmitting, by the server, the set of most effective antivirus records to a client device.. ... Ao Kaspersky Lab

03/30/17 / #20170091457

Systems and methods for switching emulation of executable file

Systems and methods to detect malicious executable files having a script language interpreter by combining a script emulator and a machine code emulator. A system includes an analyzer configured to convert a script into pseudocode and monitor an emulation process of the pseudocode, a script emulator configured to sequentially emulate the pseudocode and write emulation results to an emulator operation log, and a machine code emulator configured to emulate the pseudocode if a transition from pseudocode to machine code is detected by the analyzer, such that the analyzer can analyze the emulator operation log to determine if the executable file is malicious.. ... Ao Kaspersky Lab

03/30/17 / #20170091455

System and method for configuring antivirus scans

Disclosed are systems and method for configuring antivirus scans on a computer. An example method comprising: identifying, by a hardware processor, a software object that requires an antivirus scan; collecting, by the hardware processor, information for setting antivirus scan of the object; accessing, by the hardware processor, a data store of antivirus setting rules; selecting, by the hardware processor, a date and time for the start of the antivirus scan of the object based on the collected information and one or more antivirus setting rules; selecting, by the hardware processor, an antivirus scan method based on the collected information, the selected date and time, and one or more antivirus setting rules; and performing, by the hardware processor, an antivirus scan of the object using the selected antivirus scan method and at the selected date and time.. ... Ao Kaspersky Lab

02/09/17 / #20170041342

System and method of utilizing a dedicated computer security service

Disclosed are systems and method for utilizing a dedicated computer security service. An exemplary method includes storing in an electronic database rules that indicate when to use either a first cloud service or a second cloud service for one of the security services, receiving a request from a client computer to access the security service, determining parameters relating to the received request, applying the parameters to the plurality of rules to determine an instruction indicating whether to transmit the request to the first cloud service or the second cloud service; and transmitting the request to either the first cloud service or the second cloud service, based on the instruction, to use the at least one security service.. ... Ao Kaspersky Lab

01/05/17 / #20170006046

System and method for determining web pages modified with malicious code

Disclosed are a system and method for determining web pages modified with malicious code. An example method includes: intercepting an attempt to access a website; selecting, by a processor, one or more malicious software configuration files based on the intercepting of the attempt to access the website; creating a verification web page based on one or more code fragments from the selected one or more malicious software configuration files; opening the verification web page; and determining, by the processor, whether malicious code has been injected into the opened verification web page.. ... Ao Kaspersky Lab

01/05/17 / #20170006045

System and method of detecting malicious files on mobile devices

Disclosed are system, method and computer program product for detecting malicious files on mobile devices. An example method includes: analyzing a file to identify classes and methods contained in said classes; identifying a bytecode array for each identified method; determining instructions contained in each method by identifying a corresponding operation code from the bytecode array of each method; dividing the determined instructions for each method into a plurality of groups based on similarity of functionality among said instructions; forming a vector for each method on the basis of the results of the division of the instructions into the plurality of groups; comparing the formed vectors with a plurality of vectors of known malicious files to determine a degree of similarity between the compared vectors; and determining whether the analyzed file is malicious or clean based on the degree of similarity between the compared vectors.. ... Ao Kaspersky Lab

01/05/17 / #20170005983

Computer security architecture and related computing method

A computer security architecture applies selected rules from among a set of rules defining one or more security policies to a given set of security context parameters to produce security verdicts, each representing whether a certain action requested by a subject entity is permissible. Each security policy is associated with a corresponding communication interface. ... Ao Kaspersky Lab

01/05/17 / #20170004310

System and method for detecting harmful files executable on a virtual stack machine based on parameters of the files and the virtual stack machine

Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the virtual stack machine to identify both parameters of a file section of the file and parameters of a function of the virtual stack machine when executing the file; identifying, in a database, at least one cluster of safe files based on the identified parameters of the file section of the file and the identified parameters of the virtual stack machine; creating, using at least one clustering rule, a data cluster based on the identified at least one cluster of safe files; calculating at least one checksum of the created data cluster; and determining that the file executable on the virtual stack machine is harmful if the computed at least one checksum matches a checksum in a database of checksums of harmful files.. ... Ao Kaspersky Lab

01/05/17 / #20170004309

System and method for detecting malicious code in address space of a process

Disclosed are system and method for detecting malicious code in address space of a process. An exemplary method comprises: detecting a first process executed on the computer in association with an application; intercepting at least one function call made by the first process to a second process; determining one or more attributes associated with the at least one function call; determining whether to perform malware analysis of code associated with the at least one function call in an address space associated with the second process based on application of one or more rules to the one or more attributes; and upon determining to perform malware analysis of the code, determining whether the code in the address space is malicious.. ... Ao Kaspersky Lab

01/05/17 / #20170004305

System and method of preventing execution of undesirable programs

Disclosed are systems and methods for controlling execution of programs on a computer. An exemplary method includes detecting an unknown program installed on a computer; identifying undesirable actions performed by the unknown program on the computer, wherein the undesirable actions include at least one of: actions performed by the program without knowledge of a user, actions for accessing personal user data on the computer, and actions effecting user's working with other programs or operating system of the computer determining whether the unknown program is undesirable or not based on the identified undesirable actions of the program; when the unknown program is determined be undesirable, prompting the user to select whether to allow or prohibit execution of the undesirable program on the computer; and when the unknown program is determined not to be undesirable, allowing execution of the unknown program on the computer.. ... Ao Kaspersky Lab

01/05/17 / #20170004304

System and method for generating rules for detecting modified or corrupted external devices

Disclosed are systems and methods for generating rules for detecting modified or corrupted external devices connected to a computer system. An exemplary method includes analyzing data associated with the external device connected to the computer system based on stored data associated with one or more other devices; identifying at least one anomaly associated with the analyzed data that indicates the detected external device is modified or corrupted; generating at least one rule in response to the identified anomaly, wherein the at least one rule is based on the external device; and storing the at least one rule in a database accessible to the computer system.. ... Ao Kaspersky Lab








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Ao Kaspersky Lab in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Ao Kaspersky Lab with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###