WIPO logo
Mobile | Deutsch | Español | Français | 日本語 | 한국어 | Português | Русский | 中文 | العربية |
PATENTSCOPE

Search International and National Patent Collections
World Intellectual Property Organization
Search
 
Browse
 
Translate
 
Options
 
News
 
Login
 
Help
 
Machine translation
1. (WO2012107255) DETECTING A TROJAN HORSE
Latest bibliographic data on file with the International Bureau   

Pub. No.:    WO/2012/107255    International Application No.:    PCT/EP2012/050304
Publication Date: 16.08.2012 International Filing Date: 10.01.2012
Chapter 2 Demand Filed:    10.12.2012    
IPC:
G06F 21/00 (2006.01)
Applicants: F-SECURE CORPORATION [FI/FI]; Tammasaarenkatu 7, PL24 FI-00181 Helsinki (FI) (For All Designated States Except US).
STÅHLBERG, Mika [FI/FI]; (FI) (For US Only).
NIEMELÄ, Jarno [FI/FI]; (FI) (For US Only).
KASSLIN, Kimmo [FI/FI]; (FI) (For US Only)
Inventors: STÅHLBERG, Mika; (FI).
NIEMELÄ, Jarno; (FI).
KASSLIN, Kimmo; (FI)
Agent: MITCHELL, Matthew; Marks & Clerk LLP Fletcher House Heatley Road The Oxford Science Park Oxford OX4 4GE (GB)
Priority Data:
12/931,855 11.02.2011 US
Title (EN) DETECTING A TROJAN HORSE
(FR) DÉTECTION D'UN CHEVAL DE TROIE
Abstract: front page image
(EN)A method and apparatus for detected a Trojan in a suspicious software application in the form of at least one electronic file. A computer device determines the source from which the suspicious software application was obtained. A comparison is then made between the source from which the suspicious software application was obtained and a source from which an original, clean version of the software application was obtained. If the sources differ, then it is determined that the suspicious application is more likely to contain a Trojan horse than if the sources were the same.
(FR)L'invention concerne un procédé et un appareil pour détecter un cheval de Troie dans une application logicielle suspecte sous la forme d'au moins un fichier électronique. Un dispositif informatique détermine la source à partir de laquelle l'application logicielle suspecte a été obtenue. Une comparaison est ensuite faite entre la source à partir de laquelle l'application logicielle suspecte a été obtenue et une source à partir de laquelle une version originale propre de l'application logicielle a été obtenue. Si les sources diffèrent, il est déterminé que l'application suspecte est plus susceptible de contenir un cheval de Troie que si les sources étaient les mêmes.
Designated States: AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IS, JP, KE, KG, KM, KN, KP, KR, KZ, LA, LC, LK, LR, LS, LT, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW.
African Regional Intellectual Property Organization (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, SZ, TZ, UG, ZM, ZW)
Eurasian Patent Organization (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM)
European Patent Office (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, IE, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR)
African Intellectual Property Organization (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, ML, MR, NE, SN, TD, TG).
Publication Language: English (EN)
Filing Language: English (EN)