Method for detection of persistent malware on a network node
    1.
    发明授权
    Method for detection of persistent malware on a network node 有权
    在网络节点上检测持久性恶意软件的方法

    公开(公告)号:US09380071B2

    公开(公告)日:2016-06-28

    申请号:US14363484

    申请日:2012-04-02

    摘要: The present invention relates to methods and devices for detecting persistency of a first network node (12). In a first aspect of the invention, a method is provided comprising the steps of monitoring (S101), during a specified observation period, whether the first network node has established a connection to a second network node (13), and determining (S102) a total number of sessions of connectivity occurring during said specified observation period in which the first network node connects to the second network node. Further, the method comprises the steps of determining (S103), from the total number of sessions, a number of sessions comprising at least one communication flow between the first network node and the second network node, and determining (S104) inter-session persistence of the first network node on the basis of the total number of sessions and the number of sessions comprising at least one communication flow.

    摘要翻译: 本发明涉及用于检测第一网络节点(12)的持续性的方法和设备。 在本发明的第一方面中,提供了一种方法,包括以下步骤:在指定的观察期间,监视(S101)第一网络节点是否建立了与第二网络节点(13)的连接,并且确定(S102) 在第一网络节点连接到第二网络节点的所述指定观察期期间发生的连接会话的总数。 此外,该方法包括以下步骤:从总会话数量确定(S103)包括第一网络节点和第二网络节点之间的至少一个通信流的会话数,并且确定(S104)会话间持续性 基于会话的总数和包括至少一个通信流的会话的数量的第一网络节点。

    Method for Detection of Persistent Malware on a Network Node
    2.
    发明申请
    Method for Detection of Persistent Malware on a Network Node 有权
    网络节点上持久性恶意软件检测方法

    公开(公告)号:US20150180898A1

    公开(公告)日:2015-06-25

    申请号:US14363484

    申请日:2012-04-02

    IPC分类号: H04L29/06 H04L12/26

    摘要: The present invention relates to methods and devices for detecting persistency of a first network node (12). In a first aspect of the invention, a method is provided comprising the steps of monitoring (S101), during a specified observation period, whether the first network node has established a connection to a second network node (13), and determining (S102) a total number of sessions of connectivity occurring during said specified observation period in which the first network node connects to the second network node. Further, the method comprises the steps of determining (S103), from the total number of sessions, a number of sessions comprising at least one communication flow between the first network node and the second network node, and determining (S104) inter-session persistence of the first network node on the basis of the total number of sessions and the number of sessions comprising at least one communication flow.

    摘要翻译: 本发明涉及用于检测第一网络节点(12)的持续性的方法和设备。 在本发明的第一方面中,提供了一种方法,包括以下步骤:在指定的观察期间,监视(S101)第一网络节点是否建立了与第二网络节点(13)的连接,并确定(S102) 在第一网络节点连接到第二网络节点的所述指定观察期期间发生的连接会话的总数。 此外,该方法包括以下步骤:从总会话数量确定(S103)包括第一网络节点和第二网络节点之间的至少一个通信流的会话数量,并且确定(S104)会话间持续性 基于会话的总数和包括至少一个通信流的会话的数量的第一网络节点。

    Security Policy Distribution to Communication Terminals
    3.
    发明申请
    Security Policy Distribution to Communication Terminals 有权
    通信终端的安全策略分配

    公开(公告)号:US20100293595A1

    公开(公告)日:2010-11-18

    申请号:US12863746

    申请日:2008-01-22

    IPC分类号: H04L29/06

    摘要: A method and arrangement for distributing a security policy to a communication terminal having an association with a home communication network, but being present in a visited communication network. The home communication network (106) generates its own preferred security policy Ph and the visited communication network (102) generates its own preferred security policy Pv. A communication network entity (104) in the visited communication network combines the security policies and selects security algorithms/functions to apply from the combined security policy. By generating a security policy vectors of both networks and combine them before the security algorithms are selected, enables both networks to influence the selection without affecting use of existing signalling messages.

    摘要翻译: 一种用于将安全策略分发给具有与归属通信网络相关联但存在于被访问的通信网络中的通信终端的方法和装置。 家庭通信网络(106)生成其自己的优选安全策略Ph,并且被访问的通信网络(102)生成其自己的优选安全策略Pv。 访问通信网络中的通信网络实体(104)组合安全策略并选择从组合的安全策略应用的安全算法/功能。 通过生成两个网络的安全策略向量并在选择安全算法之前将它们组合起来,使得两个网络能够影响选择,而不影响现有信令消息的使用。

    Method and arrangement for detecting fraud in telecommunication networks
    4.
    发明授权
    Method and arrangement for detecting fraud in telecommunication networks 有权
    电讯网络欺诈检测方法及安排

    公开(公告)号:US09088602B2

    公开(公告)日:2015-07-21

    申请号:US13391486

    申请日:2009-08-25

    IPC分类号: H04L29/06

    摘要: Method and arrangement in a mediating function (204) for supporting detection of fraud in a network, when a network security function (200) is employed for analyzing activities in the network in view of predefined alert criteria, and a fraud detection function (202) is employed for analyzing e.g. charging information of users. When a first alert is received from a first one of the network security function and the fraud detection function, indicating that the predefined alert criteria of said first function have been satisfied, the alert criteria of the second one of said network security function and fraud detection function are modified based on the received first alert. Thereby, the network security and fraud detection functions can be correlated and made more efficient regarding accuracy and/or speed in detecting fraud.

    摘要翻译: 根据预定义的警报标准,当采用网络安全功能(200)来分析网络中的活动时,用于支持网络中的欺诈检测的中介功能(204)中的方法和装置,以及欺诈检测功能(202) 用于分析例如 用户收费信息。 当从网络安全功能和欺诈检测功能中的第一个接收到第一警报,指示已经满足所述第一功能的预定警报标准时,所述网络安全功能和欺诈检测中的第二个的警报标准 功能根据收到的第一个警报进行修改。 因此,可以将网络安全和欺诈检测功能相关联并且在检测欺诈中的准确性和/或速度方面更有效率。

    DETECTION OF PARTICULAR TRAFFIC IN COMMUNICATION NETWORKS
    5.
    发明申请
    DETECTION OF PARTICULAR TRAFFIC IN COMMUNICATION NETWORKS 审中-公开
    检测通信网络中的特殊业务

    公开(公告)号:US20100150006A1

    公开(公告)日:2010-06-17

    申请号:US12337254

    申请日:2008-12-17

    IPC分类号: G06F11/30

    摘要: A method for detecting a particular data traffic in a communication network having a plurality of nodes comprises: maintaining a list of detecting scans to be applied to an incoming data traffic; receiving the incoming data traffic; and applying a subset of the detecting scans in the list to the incoming data traffic. A network node for detecting a particular traffic in a communication network having a plurality of nodes comprises: a list of detecting scans to be applied to an incoming data traffic; an input for receiving the incoming data traffic; and an inspection chain, which applies a subset of detecting scans in the list to the incoming data traffic.

    摘要翻译: 一种用于检测具有多个节点的通信网络中的特定数据业务的方法,包括:维护要应用于输入数据业务的检测扫描的列表; 接收传入数据流量; 以及将列表中的检测扫描的子集应用于输入数据业务。 用于检测具有多个节点的通信网络中的特定业务的网络节点包括:要应用于输入数据业务的检测扫描的列表; 用于接收输入数据流量的输入; 以及检查链,其将列表中的检测扫描的子集应用于输入数据流量。

    Security policy distribution to communication terminals
    6.
    发明授权
    Security policy distribution to communication terminals 有权
    通信终端的安全策略分配

    公开(公告)号:US08819765B2

    公开(公告)日:2014-08-26

    申请号:US12863746

    申请日:2008-01-22

    IPC分类号: G06F17/00 H04L29/06

    摘要: A method and arrangement for distributing a security policy to a communication terminal having an association with a home communication network, but being present in a visited communication network. The home communication network generates its own preferred security policy Ph and the visited communication network generates its own preferred security policy Pv. A communication network entity in the visited communication network combines the security policies and selects security algorithms and/or functions to apply from the combined security policy. By generating security policy vectors of both networks and combining them before the security algorithms are selected, both networks are able to influence the selection without requiring the use of signaling messages.

    摘要翻译: 一种用于将安全策略分发给具有与归属通信网络相关联但存在于被访问的通信网络中的通信终端的方法和装置。 家庭通信网络生成自己的首选安全策略Ph,并且被访问的通信网络生成其自己的优选安全策略Pv。 访问通信网络中的通信网络实体组合安全策略并选择从组合的安全策略应用的安全算法和/或功能。 通过在选择安全算法之前生成两个网络的安全策略向量并组合它们,两个网络能够影响选择,而不需要使用信令消息。

    CHALLENGING A FIRST TERMINAL INTENDING TO COMMUNICATE WITH A SECOND TERMINAL
    7.
    发明申请
    CHALLENGING A FIRST TERMINAL INTENDING TO COMMUNICATE WITH A SECOND TERMINAL 有权
    挑选第一个终端用于与第二个终端通信

    公开(公告)号:US20120059897A1

    公开(公告)日:2012-03-08

    申请号:US13320328

    申请日:2009-05-20

    IPC分类号: G06F15/16

    摘要: The invention relates to a method, party challenging device (18) and computer program products for providing a challenge to a first terminal (10) intending to communicate with a second terminal (24) via two networks (N1, N2). The party challenging device receives a first electronic message (1M) concerning a transfer of media from the first terminal to the second terminal sent from the first terminal (10) and addressed to the second terminal (24), obtains communication contextual data associated with the first party or the first terminal, provides an electronic challenge message (CHM) including a challenge (CHl1) based on the obtained data and sends the challenge message to the first terminal in order to enable a decision to be made how to process the invitation message for the second terminal based on the correctness of a response (RM) including a response to the challenge.

    摘要翻译: 本发明涉及一种方法,一方挑战性装置(18)和用于向第一终端(10)提供有意通过两个网络(N1,N2)与第二终端(24)进行通信的计算机程序产品。 派对挑战装置接收关于从第一终端(10)发送的媒体从第一终端到第二终端的传送并寻址到第二终端(24)的第一电子消息(1M),获得与第一终端相关联的通信上下文数据 第一方或第一终端基于获得的数据提供包括质询(CH1)的电子质询消息(CHM),并将询问消息发送到第一终端,以便能够做出如何处理邀请消息的决定 基于包括对挑战的响应的响应(RM)的正确性的第二终端。

    Authentication of warning messages in a network
    8.
    发明授权
    Authentication of warning messages in a network 有权
    认证网络中的警告消息

    公开(公告)号:US09467433B2

    公开(公告)日:2016-10-11

    申请号:US14130166

    申请日:2012-06-14

    IPC分类号: H04L29/06 H04W12/10 H04W4/22

    摘要: There is described herein a device (101) for communicating with a network. The device (101) comprises a communications unit for receiving data, a notification device for providing a notification to a user, and a control unit for controlling the operation of the communications unit and notification unit. The communications unit is configured to receive an information message (110, 112, 115), and to receive security authentication data (110, 112, 115) associated with the information message if such security authentication data is available. The control unit is configured to operate in a first or second configuration. In the first configuration it ignores the security authentication data, (111, 113), and instructs the notification unit to convey the notification to the user. In the second configuration, it verifies the information message (116) on the basis of the security authentication data and instructs the notification unit to convey the notification to the user if the verification is successful. The communications unit is configured to receive a configuration message (114) indicating the configuration in which the control unit should operate, and the control unit is configured to change configuration if the indicated configuration is different to the current configuration.

    摘要翻译: 这里描述了用于与网络通信的设备(101)。 设备(101)包括用于接收数据的通信单元,用于向用户提供通知的通知装置,以及用于控制通信单元和通知单元的操作的控制单元。 通信单元被配置为接收信息消息(110,112,115),并且如果这种安全认证数据可用,则接收与该信息消息相关联的安全认证数据(110,112,115)。 控制单元被配置为以第一或第二配置操作。 在第一配置中,它忽略安全认证数据(111,113),并指示通知单元向用户传达通知。 在第二配置中,它根据安全认证数据来验证信息消息(116),并且如果验证成功则指示通知单元向用户传达该通知。 通信单元被配置为接收指示控制单元应该运行的配置的配置消息(114),并且如果所指示的配置与当前配置不同,则配置控制单元来改变配置。

    Challenging a first terminal intending to communicate with a second terminal
    9.
    发明授权
    Challenging a first terminal intending to communicate with a second terminal 有权
    挑战与第二个终端进行通信的第一个终端

    公开(公告)号:US09252959B2

    公开(公告)日:2016-02-02

    申请号:US13320328

    申请日:2009-05-20

    摘要: The invention relates to a method, party challenging device (18) and computer program products for providing a challenge to a first terminal (10) intending to communicate with a second terminal (24) via two networks (N1, N2). The party challenging device receives a first electronic message (1M) concerning a transfer of media from the first terminal to the second terminal sent from the first terminal (10) and addressed to the second terminal (24), obtains communication contextual data associated with the first party or the first terminal, provides an electronic challenge message (CHM) including a challenge (CHl1) based on the obtained data and sends the challenge message to the first terminal in order to enable a decision to be made how to process the invitation message for the second terminal based on the correctness of a response (RM) including a response to the challenge.

    摘要翻译: 本发明涉及一种方法,一方挑战性装置(18)和用于向第一终端(10)提供有意通过两个网络(N1,N2)与第二终端(24)进行通信的计算机程序产品。 派对挑战装置接收关于从第一终端(10)发送的媒体从第一终端到第二终端的传送并寻址到第二终端(24)的第一电子消息(1M),获得与第一终端相关联的通信上下文数据 第一方或第一终端基于获得的数据提供包括质询(CH1)的电子质询消息(CHM),并将询问消息发送到第一终端,以便能够做出如何处理邀请消息的决定 基于包括对挑战的响应的响应(RM)的正确性的第二终端。

    Method and arrangement for enabling play-out of media
    10.
    发明授权
    Method and arrangement for enabling play-out of media 有权
    实现媒体播放的方法和布置

    公开(公告)号:US08738910B2

    公开(公告)日:2014-05-27

    申请号:US13514100

    申请日:2009-12-07

    IPC分类号: H04L9/32

    摘要: Methods and arrangements for enabling the use of a first device (300) for controlling transfer of media content from a content provider (306) to a second device (302). The first device has a pre-established security association with the communications network. When the network detects a request made by the first device for delivery of media content to the second device, key information is established which enables determination of one or more media keys for encryption of the media content. The network sends key information to the content provider and to the first device. The content provider then delivers media content encrypted by the media key(s) to the second device. Further, the first device forward the media key(s) over a local communication link to the second device for decryption of media content encrypted by the media key(s) when delivered by the content provider.

    摘要翻译: 允许使用第一设备(300)来控制媒体内容从内容提供商(306)传送到第二设备(302)的方法和装置。 第一个设备与通信网络有预先建立的安全关联。 当网络检测到由第一设备发送用于向第二设备传送媒体内容的请求时,建立了能够确定用于加密媒体内容的一个或多个媒体密钥的密钥信息。 网络向内容提供商和第一个设备发送密钥信息。 然后,内容提供商将由媒体密钥加密的媒体内容传送到第二设备。 此外,当由内容提供商递送时,第一设备通过本地通信链路将媒体密钥转发到第二设备以解密由媒体密钥加密的媒体内容。