Ahnlab, Inc.

Republic of Korea

Back to Profile

1-100 of 127 for Ahnlab, Inc. Sort by
Query
Aggregations
IP Type
        Patent 122
        Trademark 5
Jurisdiction
        World 105
        United States 22
Date
New (last 4 weeks) 1
2026 April (MTD) 1
2026 January 1
2025 December 1
2026 (YTD) 2
See more
IPC Class
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity 23
G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements 23
G06F 11/30 - Monitoring 15
H04L 29/06 - Communication control; Communication processing characterised by a protocol 14
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs 12
See more
NICE Class
09 - Scientific and electric apparatus and instruments 5
16 - Paper, cardboard and goods made from these materials 1
  1     2        Next Page

1.

ELECTRONIC DEVICE FOR IMPROVING DETECTION OF MALICIOUS SCRIPT BY USING ARTIFICIAL INTELLIGENCE MODEL AND CONTROL METHOD THEREOF

      
Application Number KR2025015275
Publication Number 2026/075431
Status In Force
Filing Date 2025-09-29
Publication Date 2026-04-09
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Min Ji
  • Jung, Seong Hoon

Abstract

Disclosed are an electronic device for improving detection of a malicious script by using an artificial intelligence model, and a control method thereof. The electronic device according to the present disclosure may comprise: a memory for storing a detection rule generation model for generating a rule for detecting a malicious script included in target data; and a processor which is connected to the memory and generates, by executing at least one instruction, a rule for detecting a malicious script included in the target data on the basis of a value output by inputting the malicious script into the malicious script detection rule generation model.

IPC Classes  ?

  • G06N 3/0475 - Generative networks
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

2.

Electronic apparatus for performing log lightweighting using extended bloom filter, and operation method thereof

      
Application Number 19268121
Grant Number 12549583
Status In Force
Filing Date 2025-07-14
First Publication Date 2026-01-15
Grant Date 2026-02-10
Owner Ahnlab, Inc. (Republic of Korea)
Inventor
  • Kong, Icksun
  • Park, Subin
  • Jang, Hyunsook

Abstract

An operation method of an electronic apparatus is disclosed. The operation method according to the present disclosure comprises extracting item-specific data that matches a plurality of preconfigured items from within log data, applying the extracted item-specific data to a hash function corresponding to each item to obtain an item-specific hash value and checking for duplication of the log data based on whether the item-specific hash value is duplicated, updating a duplication count based on the checked duplication status, and detecting a threat based on the identified item-specific data and the updated duplication count.

IPC Classes  ?

3.

METHOD AND APPARATUS FOR ENHANCING DEVICE-TO-DEVICE COMMUNICATION SECURITY

      
Application Number KR2025008001
Publication Number 2025/263907
Status In Force
Filing Date 2025-06-11
Publication Date 2025-12-26
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Park, Wang Seok
  • Kim, Byung Chul

Abstract

The present invention proposes a device-to-device communication security enhancing technique for, in communication (e.g., VPN communication) between a central device and a branch device, implementing a technical configuration of verifying and controlling (blocking or allowing) a communication connection of the branch device after initial installation on/connection to the central device.

IPC Classes  ?

4.

Operation method of electronic apparatus for performing large language model based analysis inference for malicious script action

      
Application Number 19268956
Grant Number 12462033
Status In Force
Filing Date 2025-07-14
First Publication Date 2025-11-04
Grant Date 2025-11-04
Owner Ahnlab, Inc. (Republic of Korea)
Inventor
  • Jung, Seonghoon
  • Eom, Jueon

Abstract

An operation method of at least one electronic apparatus is disclosed. The operation method according to the present disclosure comprises acquiring static and dynamic analysis results corresponding to the results obtained by performing static and dynamic analyses performed on a plurality of scripts, each classified as benign or malicious, converting the static and dynamic analysis results of each of the plurality of scripts into text formatted to match the output format of at least one Large Language Model (LLM), training the LLM based on the converted text so that the LLM infers static and dynamic analysis results from an input script, and predicting static and dynamic analysis results for at least one target script based on the trained LLM.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

5.

CODE FLOW OBFUSCATION METHOD AND DEVICE

      
Application Number KR2025004051
Publication Number 2025/211654
Status In Force
Filing Date 2025-03-28
Publication Date 2025-10-09
Owner AHNLAB, INC. (Republic of Korea)
Inventor Shim, Hyun Seok

Abstract

The objective of the present invention is to present a code flow obfuscation technique for obfuscating a code flow of an application, the method comprising: generating an unpredictable and complex obfuscation code block by using artificial intelligence (for example, generative AI); and implementing a configuration of naturally connecting a reference without affecting the code flow of the application during insertion of the obfuscation code block.

IPC Classes  ?

  • G06F 21/14 - Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

6.

INFORMATION LEAKAGE CONTROL SYSTEM AND INFORMATION LEAKAGE CONTROL METHOD

      
Application Number KR2024008663
Publication Number 2025/042007
Status In Force
Filing Date 2024-06-24
Publication Date 2025-02-27
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Yang, Chang Yeop
  • Lee, Jin Ha
  • Jeong, Yeon Hee

Abstract

The present invention presents an information leakage control system and an information leakage control method for implementing a new technology capable of controlling, through central management, leakage of digital assets that can be leaked through a WDL function (for example: an AWDL function) of an end-point device (for example: an Apple computer) having a WDL interface (for example: an AWDL interface), which cannot be controlled by a conventional network security solution.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/60 - Protecting data
  • H04L 9/40 - Network security protocols

7.

REMOTE CONTROL APP DETECTION METHOD AND DEVICE

      
Application Number KR2023020070
Publication Number 2024/128679
Status In Force
Filing Date 2023-12-07
Publication Date 2024-06-20
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Nan Ju
  • Oh, Jung Rok

Abstract

A remote control app detection method performed by a remote control app detection device according to an embodiment comprises the steps of: if a need for detection of a remote control app is identified, selecting, as an app to be inspected, an app having been executed within a pre-configured time or being currently executed; identifying a service being used by the app to be inspected; and if the service being used is declared to be a pre-configured screen-sharing service type, determining the app to be inspected as the remote control app.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

8.

CLIENT ASSET MANAGEMENT SYSTEM AND CLIENT ASSET MANAGEMENT METHOD

      
Application Number KR2023016736
Publication Number 2024/091017
Status In Force
Filing Date 2023-10-26
Publication Date 2024-05-02
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Tae Hun
  • Kim, Dong Joo
  • Ra, Wan Kyu

Abstract

The present invention presents a technology for enabling server-based client asset management without additional equipment construction even for clients, belonging to a network (hereinafter, a closed network) having limited connectivity with the outside, through a particular technical configuration by which a data packet of each client belonging to the closed network is delivered to an asset management server outside the closed network in a distinguishable form.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06Q 40/06 - Asset managementFinancial planning or analysis
  • H04L 45/74 - Address processing for routing
  • H04L 49/253 - Routing or path finding in a switch fabric using establishment or release of connections between ports
  • H04L 49/25 - Routing or path finding in a switch fabric

9.

BEHAVIOR SCAN SERVICE SYSTEM, AND METHOD FOR PROVIDING BEHAVIOR SCAN SERVICE

      
Application Number KR2023008891
Publication Number 2024/005490
Status In Force
Filing Date 2023-06-27
Publication Date 2024-01-04
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kwon, Nam
  • Kim, Won Hyeok

Abstract

In the present invention, a hash value for behavior data is generated and a scan request using same is transmitted so that analysis results of the behavior data specified by the hash value is queried, and thus a novel behavior scan service is implemented to detect cloud-based malicious code even for behavior data.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 40/151 - Transformation
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

10.

VIEW-BASED REMOTE CONTROL DETECTION METHOD, VIEW-BASED REMOTE CONTROL DETECTION DEVICE, AND COMPUTER-READABLE RECORDING MEDIUM

      
Application Number KR2022018763
Publication Number 2023/128301
Status In Force
Filing Date 2022-11-24
Publication Date 2023-07-06
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Shim, Hyunseok
  • Kim, Keonwoo

Abstract

Disclosed is a view-based remote control detection method. The view-based remote control detection method may comprise: detecting an event according to an input by a user to an application; acquiring a hardware ID for the event; determining whether the event is an input by software on the basis of the acquired hardware ID; and determining whether to block the event on the basis of the determination.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

11.

APPARATUS AND METHOD FOR ACQUIRING INFORMATION OF DEVICE

      
Application Number KR2019000680
Publication Number 2019/146956
Status In Force
Filing Date 2019-01-17
Publication Date 2019-08-01
Owner AHNLAB, INC. (Republic of Korea)
Inventor Park, Su Hyun

Abstract

An apparatus for acquiring information according to an embodiment of the present invention comprises: a communication unit for performing communication with a monitoring device for monitoring a device; an active information obtaining unit for requesting the monitoring device for first information allocated to the device; a passive information acquiring unit for acquiring second information allocated to the device from a received packet when the packet monitored by the monitoring device is received through the communication unit; and a device information acquiring unit for acquiring information about the device by using the first information received according to the request and the second information obtained.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration

12.

COMMUNICATION MANAGEMENT APPARATUS AND METHOD

      
Application Number KR2018013732
Publication Number 2019/107794
Status In Force
Filing Date 2018-11-12
Publication Date 2019-06-06
Owner AHNLAB, INC. (Republic of Korea)
Inventor Park, Su Hyun

Abstract

A communication management apparatus according to an embodiment comprises: a router that switches so as to connect to any one of a public internet network and an encrypted network; a communication unit that receives a packet from an internet of things terminal; an analysis unit that analyses an encryption level that is applied to the received packet; an encryption unit that does not encrypt the received packet if the analysed encryption level meets a predefined criteria, and that applies an encryption algorithm that is supported in the encrypted network to the received packet so as to encrypt the same if the analysed encryption level does not meet the criteria; and a control unit that controls switching of the router so that the encrypted packet is transmitted to a destination via the encrypted network, and that controls switching of the router so that the unencrypted packet is transmitted to the destination via the public internet network.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/825 - Adaptive control, at the source or intermediate nodes, upon congestion feedback, e.g. X-on X-off
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

13.

IMAGE CLASSIFICATION DEVICE AND METHOD

      
Application Number KR2018013042
Publication Number 2019/088673
Status In Force
Filing Date 2018-10-30
Publication Date 2019-05-09
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Park, Sangpyo
  • Nam, Jin Ha
  • Kim, Euntaek

Abstract

An image classification device for personal information searching according to an embodiment of the present invention classifies images to be optically recognized, according to predetermined classification criteria, and before optical recognition is performed, excludes images having low probability of including personal information, so that the number of images to be optically recognized for personal information searching can be reduced, and thus the efficiency of optical recognition can be increased and the costs can be reduced.

IPC Classes  ?

  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06T 5/50 - Image enhancement or restoration using two or more images, e.g. averaging or subtraction
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06K 9/32 - Aligning or centering of the image pick-up or image-field

14.

MALICIOUS CODE DIAGNOSIS SERVER, SYSTEM, AND METHOD

      
Application Number KR2018005672
Publication Number 2018/212610
Status In Force
Filing Date 2018-05-17
Publication Date 2018-11-22
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Jung, Taiil
  • Jang, Jaehoon
  • Kim, Woojin
  • Yang, Ikjun

Abstract

A malicious code diagnosis server according to an embodiment of the present invention comprises: a communication unit which receives file information including hash data of a file and metadata of the file stored in each client terminal from each of the plurality of client terminals; a file information organizing unit which groups only the file information having the same hash data among the received file information; a file information storage unit which maps and stores diagnostic information of the file corresponding to the grouped file information together with the grouped file information; a diagnostic information inquiry unit which inquiries the diagnostic information which is mapped to the file information comprising the same metadata as the metadata of the file for which the diagnostic is requested by the first client among the stored file information when the malicious code diagnosis is requested from the first client terminal among the plurality of client terminals; and a unit for determining whether or not to diagnose which determines whether or not to diagnose malicious code for the file on the basis of the inquired diagnostic information.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

15.

Ahnja

      
Application Number 1426615
Status Registered
Filing Date 2018-07-24
Registration Date 2018-07-24
Owner AhnLab, Inc. (Republic of Korea)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 16 - Paper, cardboard and goods made from these materials

Goods & Services

Computers installed with computer software that prevents, monitors, detects, intercepts, diagnoses and repairs all for computer security purposes; computer software that prevents, monitors, detects, intercepts, diagnoses and repairs all for computer security purposes; computer software for the purpose of providing security; protectors for telecommunication apparatus; mobile phone cases; computer program for security service using home network; electronic security system for home network; screen savers; computer software, recorded; computer programs, recorded; computer programs [downloadable software]; computer software for providing security to networks; computer programs for providing security to mobile device; computer software for providing security to mobile device; security terminal for authentification; software for ensuring the security of electronic mail; luminous signaling panels for use in automobiles; electronic indicator boards for use in automobiles; computers installed with computer software that monitors, detects, intercepts, diagnoses and repairs computer viruses; computers; computer software that monitors, detects, intercepts, diagnoses and repairs computer viruses; computer anti-virus software. Architects' models; note books; graphic reproductions; picture postcards; diary; calendars; stamps [seals]; note papers; stationery; paper for printing photographs; office requisites, except furniture; books; wrapping paper for gift; booklets; stickers; printed matters (except books and periodicals); software programmes and data processing programmes in printed form; photographs [printed]; periodicals; shopping bags of paper; labels of paper; page holders; cards; catalogues; pamphlets; millboard (paperboard); writing implements [writing instruments].

16.

SYSTEM FOR INSPECTING WHETHER NON-EXECUTABLE FILE IS MALICIOUS AND METHOD FOR INSPECTING WHETHER NON-EXECUTABLE FILE IS MALICIOUS

      
Application Number KR2017012733
Publication Number 2018/088844
Status In Force
Filing Date 2017-11-10
Publication Date 2018-05-17
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Jun, Jin Pyo
  • Kwon, Nam
  • Park, Dae Hyun

Abstract

Disclosed is a technique, which can ensure high inspection reliability while minimizing an increase of inspection complexity, a deterioration in convenience, and the occurrence of damage to a host PC, for protecting, with high reliability, a system from a malicious code included in a non-executable file by implementing a novel maliciousness inspection technique (method) suitable for a non-executable file.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

17.

SYSTEM FOR DETECTING MALICIOUS CODE AND METHOD FOR DETECTING MALICIOUS CODE

      
Application Number KR2017006466
Publication Number 2018/043885
Status In Force
Filing Date 2017-06-20
Publication Date 2018-03-08
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kang, Kyung Wan
  • Kim, Yu Hyun

Abstract

The present invention implements a malicious code detecting technique which detects a malicious code before an actual damage is caused by the malicious code, wherein the technique is exposed only to a process to be detected without being exposed to a user or a malicious code creator.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/60 - Protecting data

18.

SECURITY MANAGEMENT DEVICE AND SECURITY MANAGEMENT METHOD FOR MANAGING SECURITY OF CLIENT TERMINAL

      
Application Number KR2017007526
Publication Number 2018/016798
Status In Force
Filing Date 2017-07-13
Publication Date 2018-01-25
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Park, Young Min
  • Jung, Il Chul
  • Lee, Young Heon

Abstract

A security management device according to one embodiment comprises: a communication unit for receiving an attribute value used for determining the security of a client terminal from the client terminal; a storage unit for storing an attribute standard, which is the standard for determining the security of the client terminal; and a determination unit for comparing the attribute standard with the attribute value and determining the security of the client terminal on the basis of the compared result.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

19.

TERMINAL CONTROL APPARATUS AND METHOD USING NOTIFICATION MESSAGE

      
Application Number KR2016015429
Publication Number 2017/116147
Status In Force
Filing Date 2016-12-28
Publication Date 2017-07-06
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Nam, Jin Ha
  • Lee, Nanju

Abstract

A terminal control apparatus using a notification message according to an embodiment of the present invention may comprise: a sensing unit for sensing a notification message output request received by a user terminal through a packet based message; an analysis unit for receiving the notification message output request from the sensing unit so as to determine whether the notification message output request includes a predetermined character string; and a control unit for performing control such that the user terminal performs a predetermined operation, on the basis of the result of the determination, wherein the user terminal is configured to output a notification message on the basis of the notification message output request when the notification message output request is received.

IPC Classes  ?

20.

SECURITY MANAGEMENT DEVICE AND SECURITY MANAGEMENT METHOD IN HOME NETWORK SYSTEM

      
Application Number KR2016005538
Publication Number 2016/190663
Status In Force
Filing Date 2016-05-25
Publication Date 2016-12-01
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Han, Taesoo
  • Kim, Joosaeng
  • Yoo, Hweejae

Abstract

The present invention relates to a security management device for monitoring equipment that is connected to a plurality of devices so as to monitor the plurality of devices, the security management device comprising: a connection unit connected to the monitoring equipment; a monitoring unit for, upon being connected to the monitoring equipment through the connection unit, monitoring a task which is executed in the monitoring equipment; and a control unit for allowing or blocking the execution of the task in the monitoring equipment on the basis of the result of the task monitoring by the monitoring unit.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation

21.

Method and apparatus for managing application data of portable terminal

      
Application Number 14889499
Grant Number 09898600
Status In Force
Filing Date 2014-04-11
First Publication Date 2016-04-07
Grant Date 2018-02-20
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Taewoong
  • Park, Sangpyo

Abstract

A method for managing application data of a portable terminal according to the present invention comprises the steps of: allocating a plurality of data areas required for a data management policy for an application program; when the application program is executed, permitting connection to a specific data area of the plurality of data areas allocated for the application program on the basis of the data management policy; and executing the application program while performing the permitted connection to the specific data area.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

22.

APPARATUS AND METHOD FOR RECONSTRUCTING EXECUTION FILE

      
Application Number KR2015010123
Publication Number 2016/048070
Status In Force
Filing Date 2015-09-24
Publication Date 2016-03-31
Owner AHNLAB, INC. (Republic of Korea)
Inventor Park, Jun Yong

Abstract

According to the present invention, in execution file reconstruction corresponding to obfuscation for an execution file in the Android platform, when obfuscation for an execution file such as a DEX file is performed, information on a parent-child relationship for each class defined by a class definition item in the execution file is analyzed by recursively establishing the parent-child relationship between classes with reference to class related information on a header of the obfuscated execution file, so as to reconstruct the original class hierarchy structure.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/12 - Protecting executable software

23.

Malicious code infection system and malicious code infection method

      
Application Number 14773461
Grant Number 09965629
Status In Force
Filing Date 2014-03-07
First Publication Date 2016-01-28
Grant Date 2018-05-08
Owner AHNLAB, INC. (Republic of Korea)
Inventor Hwang, Kyu Beom

Abstract

Provided are a malicious code diagnosing system and a method of diagnosing malicious codes. According to embodiments of the present disclosure, a malicious code diagnosing operation is performed only on files that are likely to be infected by malicious codes by utilizing file change log information recorded in a file system. Accordingly, malicious code diagnosing operation can be performed more quickly and reliably than conventional diagnosing method.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

24.

METHOD AND APPARATUS FOR DETECTING REPACKAGING

      
Application Number KR2015001130
Publication Number 2015/126079
Status In Force
Filing Date 2015-02-04
Publication Date 2015-08-27
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Kwang Woo
  • Chung, Haejin
  • Park, Sijoon
  • Joo, Seol Woo

Abstract

The present invention relates to a method and an apparatus for detecting repackaging. The repackaging detection method comprises: a step for extracting file characteristic information of an application program to be inspected which can be operated in a mobile operating system; a step for acquiring file registration information for application programs to be managed, which are pre-stored in an application program database; and a step for selecting an original repackaging candidate group satisfying preset original repackaging candidate conditions, from among the application programs to be managed, according to a comparison result of the file characteristic information and the file registration information for the application programs to be managed. The present invention first selects the original repackaging candidate group when detecting whether the application programs, which can be operated in the mobile operation system, are repackaged. Therefore, similarity detection time and original repackaging detection time are greatly reduced since the existence of the original repackaging can be confirmed in the original repackaging candidate group alone when confirming whether the original repackaging substantially exists, by detecting similarity among the application programs on a 1:1 basis.

IPC Classes  ?

  • G06F 21/12 - Protecting executable software
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 11/30 - Monitoring

25.

Apparatus and method for diagnosing malicious applications

      
Application Number 14425358
Grant Number 09525706
Status In Force
Filing Date 2013-07-09
First Publication Date 2015-08-13
Grant Date 2016-12-20
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Seungwon
  • Kang, Donghyun
  • Joo, Seol Woo
  • Kim, Yonggoo
  • Hwang, Changyeon

Abstract

An apparatus for diagnosing malicious applications includes: a signature storage unit which stores malicious application executable files, which can be run in a mobile operating system, and common feature information of variant files derived from said malicious application executable files as signature data for diagnosing maliciousness; an information collection unit which collects information corresponding to common feature information from executable files which are targeted for diagnosis and are diagnosed as malicious or not; a diagnosis determination unit which compares the corresponding information collected by the information collection unit with the common feature information stored in the signature storage unit in order to determine whether the application executable files are malicious; and a result provision unit which provides the results of the determination of whether the application executable files are malicious from the diagnosis determination unit.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

26.

METHOD FOR VERIFYING APPLICATION ON BASIS OF OBJECT EXTRACTION, AND DEVICE THEREOF

      
Application Number KR2014009127
Publication Number 2015/050348
Status In Force
Filing Date 2014-09-29
Publication Date 2015-04-09
Owner AHNLAB, INC. (Republic of Korea)
Inventor Go, Seung Won

Abstract

A device for verifying an application on the basis of object extraction, according to the present invention, can comprise: an information acquisition unit for acquiring UI objects and relevant screen images with respect to an application to be analyzed; an information storage unit for storing the acquired UI objects and the entire screen image list of the relevant screen images; an object determination unit for searching for a valid UI object by searching a screen image to be verified and for specifying an object type of the retrieved valid UI object; and a control unit generating an event corresponding to the specified object type and executing an event activity.

IPC Classes  ?

  • G06F 11/26 - Functional testing
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

27.

Computer system and signature verification server

      
Application Number 14380142
Grant Number 09852291
Status In Force
Filing Date 2013-02-21
First Publication Date 2015-03-26
Grant Date 2017-12-26
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Hwang, Kyu Beom
  • Kim, Jeong Hun

Abstract

Disclosed are a computer system, a signature verification server, a method of supporting signature verification by a computer system, and a method of verifying signature. Embodiments of the present disclosure relates to a technology of misdiagnosis verification of signature used for a malicious code diagnosis, and more particularly to technologies which derive a result of performance of a malicious code diagnosis simulation on signature in a multi-user computer environment to use an actual client antivirus software and thus can overcome physical, spatial, and temporal limitations of conventional signature misdiagnosis verification by pre-distributing preliminary application signature in a state where misdiagnosis verification has not been completed to a plurality of user computers to reflect the preliminary application signature to a malicious code diagnosis on files stored in the plurality of user computers and performing misdiagnosis verification on the preliminary application signature based on information collected in connection with a result of the diagnosis.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

28.

DEVICE AND METHOD FOR DETECTING URL CALL

      
Application Number KR2014008155
Publication Number 2015/037850
Status In Force
Filing Date 2014-09-01
Publication Date 2015-03-19
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Euntaek
  • Nam, Jinha

Abstract

According to the present invention, by receiving a URL call issued in a portable terminal and analyzing information on a URL, information on the source which has distributed the URL or the like before the URL call is transferred to a browser of the portable terminal, malicious behaviors through the URL, such as the leakage of personal information of a user, the occurrence of financial harm and the like, can be prevented. In addition, by detecting all URL call information issued in the portable terminal, URL related information in the portable terminal can be utilized and managed.

IPC Classes  ?

29.

CLIENT SYSTEM AND METHOD OF OPERATING CLIENT SYSTEM

      
Application Number KR2014006279
Publication Number 2015/005736
Status In Force
Filing Date 2014-07-11
Publication Date 2015-01-15
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Ju Suk
  • Kim, Ju Hyun

Abstract

The present invention relates to a client system in which a plurality of clients may quickly diagnose new AV-killing malicious software to fundamentally block the execution of the AV-killing malicious software, based on the sacrifice of another client system, and a method of operating a client system.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 9/44 - Arrangements for executing specific programs

30.

PHISHING SITE DETECTING METHOD USING IMAGE COMPARISON AND APPARATUS THEREFOR

      
Application Number KR2014005469
Publication Number 2014/208937
Status In Force
Filing Date 2014-06-20
Publication Date 2014-12-31
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Moon, Seongkeon
  • Kim, Kiyoung

Abstract

The present invention relates to a phishing site detecting method using image comparison, and an apparatus therefor. According to the present invention, the phishing site detecting method comprises the steps of: loading phishing detection reference information for detecting a phishing site; extracting from a target site target image information for a comparison on the basis of the phishing detection reference information; comparing the extracted comparison target image information with reference image information for a protected site included in the phishing detection reference information; and warning of the detection of a phishing site if the detection target site is determined as likely to be a phishing site based on the comparison. The method can advantageously detect a phishing site or prevent access even without the cooperation of an operating body of the detection target site, and can detect or prevent access to a phishing site solely using a communication terminal device that accesses the detection target site.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
  • G06F 11/30 - Monitoring

31.

METHOD AND APPARATUS FOR MANAGING APPLICATION DATA OF PORTABLE TERMINAL

      
Application Number KR2014003141
Publication Number 2014/181970
Status In Force
Filing Date 2014-04-11
Publication Date 2014-11-13
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Taewoong
  • Park, Sangpyo

Abstract

A method for managing application data of a portable terminal according to the present invention comprises the steps of: allocating a plurality of data areas required for a data management policy for an application program; when the application program is executed, permitting connection to a specific data area of the plurality of data areas allocated for the application program on the basis of the data management policy; and executing the application program while performing the permitted connection to the specific data area.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/44 - Arrangements for executing specific programs

32.

METHOD AND APPARATUS FOR INSPECTING MALICOUS MESSAGE

      
Application Number KR2014003107
Publication Number 2014/175583
Status In Force
Filing Date 2014-04-10
Publication Date 2014-10-30
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Joo, Seol Woo
  • Kang, Donghyun
  • Lee, Seungwon

Abstract

The present invention relates to a method and an apparatus for inspecting a malicious message. To this end, the method for inspecting a malicious message comprises the steps of: collecting, from a plurality of communication terminal devices, network access position information included in received messages and identification information data of the received messages; classifying the collected identification information data of the received messages by the same network access position information; computing the identification information data of the received messages by the same network access position information; and determining whether the received messages are malicious according to a result of comparing computed values according to the computation of the identification information data of the received messages with a predetermined reference value.

IPC Classes  ?

  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/08 - Access security
  • H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
  • H04W 24/00 - Supervisory, monitoring or testing arrangements

33.

METHOD AND APPARATUS FOR INSPECTING RISK OF MESSAGE

      
Application Number KR2014003055
Publication Number 2014/171663
Status In Force
Filing Date 2014-04-08
Publication Date 2014-10-23
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kang, Donghyun
  • Joo, Seol Woo
  • Lee, Seungwon
  • Park, Sijoon
  • Kim, Yonggoo

Abstract

The present invention relates to a method and an apparatus for inspecting risk of a message. To this end, the method for inspecting risk of a message comprises the steps of: extracting network access location information included in a received message in a message inspection mode; textually inspecting whether a connection file for a location according to the network access position information comprises an execution attribute; receiving a portion of packets in the connection file when the connection file is determined to not comprise the execution attribute; inspecting whether the connection file comprises the execution attribute by analyzing the received portion of packets; and alerting the risk of the received message when the connection file is determined to comprise the execution attribute according to the result of textual inspection or inspection by packet analysis.

IPC Classes  ?

  • H04W 12/08 - Access security
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]

34.

APPARATUS AND METHOD FOR DIAGNOSING ATTACK WHICH BYPASSES MEMORY PROTECTION MECHANISMS

      
Application Number KR2014003052
Publication Number 2014/168406
Status In Force
Filing Date 2014-04-08
Publication Date 2014-10-16
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lim, Cha Sung
  • Lee, Ju Seok

Abstract

Disclosed is an apparatus for diagnosing an attack which bypasses memory protection techniques, the apparatus comprising: a function detection unit for detecting whether a specific program function, which can alter the attribute information of a memory area, is called; an attribute inspection unit for inspecting whether the attribute information at the corresponding location of the memory area corresponds to an execution attribute when the called specific program function is detected by the function detection unit; an attribute changing unit for changing the attribute information such that an access violation occurs at the corresponding location of the memory area when the execution attribution is identified by the attribute inspection unit; an event detection unit for detecting whether the access violation occurs in the memory area; and a malicious determination unit for determining whether a shell code, which causes the access violation, is malicious when the access violation is detected by the event detection unit.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

35.

DEVICE, SYSTEM AND METHOD FOR DIAGNOSING MALWARE ON BASIS OF CLOUD

      
Application Number KR2014003054
Publication Number 2014/168408
Status In Force
Filing Date 2014-04-08
Publication Date 2014-10-16
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Yonggoo
  • Hwang, Changyeon
  • Joo, Seol Woo

Abstract

The present invention relates to cloud-based diagnosis of malware, which enables cloud-based malware diagnosis for an application and prevents the waste of resources and decrease in network speed during an upload process of an application file by partially uploading a specific partial file which is necessary to diagnose malware from among all of the files in the application when a new application for which malware diagnosis on a portable terminal has not been performed is discovered.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

36.

METHOD FOR STRENGTHENING SERVICE SECURITY FUNCTION

      
Application Number KR2014002084
Publication Number 2014/148769
Status In Force
Filing Date 2014-03-13
Publication Date 2014-09-25
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Ki Young
  • Park, Chong Phil

Abstract

Disclosed is a method for strengthening a service security function. The embodiments of the present invention relate to a technique capable of further strengthening a security function when a service is used, which confirms beforehand whether a security program is operating normally for a service requiring a high level of security by utilizing the decryption function of the operating security program to thereby allow normal use of the service only when the security program is operating normally and to induce an installation of the security program in light of the security problem when the security program is operating abnormally.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals

37.

SYSTEM AND METHOD FOR INSPECTING MALICIOUS CODE

      
Application Number KR2014001898
Publication Number 2014/137188
Status In Force
Filing Date 2014-03-07
Publication Date 2014-09-12
Owner AHNLAB, INC. (Republic of Korea)
Inventor Hwang, Kyu Beom

Abstract

Disclosed are a system and a method for inspecting a malicious code. According to the embodiments of the present invention, a malicious code inspection is performed only for files having a high possibility of being infected by a malicious code by utilizing file change log information that is recorded in a file system, so that it is possible to improve the problems of long inspection time and low inspection reliability in a conventional inspection method, and to perform a fast, highly reliable and efficient malicious code inspection.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

38.

DATA MANAGEMENT METHOD AND DEVICE FOR MOBILE APPARATUS

      
Application Number KR2014000033
Publication Number 2014/107037
Status In Force
Filing Date 2014-01-03
Publication Date 2014-07-10
Owner AHNLAB, INC. (Republic of Korea)
Inventor Park, Sangpyo

Abstract

The data management device for a mobile apparatus of the present invention comprises: a data communication monitoring block for monitoring the state of communication with an MDM server, and generating an action control signal when communication with the MDM server is not possible; a battery management block for responding to the action control signal, checking the remaining capacity in a battery of the mobile apparatus, and ascertaining if the remaining capacity is not below a predetermined minimum capacity; a time monitoring block for counting the elapsed time when the remaining capacity is below the predetermined minimum capacity; and a data management block for deleting data stored on the mobile apparatus when the remaining capacity is below the predetermined minimum capacity or when the counted elapsed time reaches a predetermined time.

IPC Classes  ?

  • H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities
  • H04W 88/18 - Service support devicesNetwork management devices

39.

METHOD FOR MANAGING DATA IN MOBILE DEVICE AND APPARATUS THEREFOR

      
Application Number KR2013011094
Publication Number 2014/106994
Status In Force
Filing Date 2013-12-03
Publication Date 2014-07-10
Owner AHNLAB, INC. (Republic of Korea)
Inventor Park, Sang Pyo

Abstract

According to the present invention, an apparatus for managing data in a mobile device includes: a time monitor block for monitoring whether a losing command message arrives in a predetermined deletion start time by counting the time elapse, after registering the reception time of the losing command message coming from an MDM server; a battery management block for checking the remaining power of the battery of the mobile device during the registration of the reception time so as to determine whether the remaining power is equal to or less than a predetermined minimum value; a terminal management execution block for requesting the MDM server to confirm the start of the date deletion when the remaining power is equal to or less than the predetermined minimum value or the counted time elapse reaches the predetermined deletion time; and a data management block for deleting the data stored in the mobile device when receiving an approval message from the MDM server for the confirmation request.

IPC Classes  ?

  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities

40.

SYSTEM FOR PREVENTING MALWARE INVASION, AND METHOD FOR OPERATING SAID SYSTEM FOR PREVENTING MALWARE INVASION

      
Application Number KR2014000012
Publication Number 2014/107028
Status In Force
Filing Date 2014-01-02
Publication Date 2014-07-10
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Joo Saeng
  • Han, Tae Soo
  • Kong, Ick Sun
  • Lee, Woo Beom

Abstract

Disclosed are a system for preventing malware invasion and a method for operating the system for preventing malware invasion. Embodiments of the present invention relate to a technology which monitors a data packet transmitted via a session connected between a terminal system and an external device, changes (treats (removes malware) and records information for inducing disconnection of the session) the relevant data packet, when the data packet infected with malware is found, and transmits the changed data packet in the original transmission direction. Thus, the external device or the terminal system that receives the changed data packet may disconnect the session based on the changed data packet. As a result, malicious invasion from an external source can be effectively prevented, and the problem of neglecting a shared session caused by the prevention of the invasion can be effectively solved.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • G06F 11/30 - Monitoring
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

41.

APPARATUS FOR SECURING MOBILE DATA AND METHOD THEREFOR

      
Application Number KR2014000081
Publication Number 2014/107060
Status In Force
Filing Date 2014-01-06
Publication Date 2014-07-10
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Moon, Seongkeon
  • Jang, Sang Keun
  • Park, Sehyun

Abstract

The present invention relates to an apparatus for securing mobile data and a method therefor. The disclosed apparatus for securing mobile data includes: a data security control unit for obtaining a security token and the additional information and seed used in the generation of the security token from a server stage to request encoding or decoding of the data by using the security token; and a data security processing unit for generating a verifying token based on the additional information and seed supplied from the data security control unit to process the requested encoding or decoding of the data if the security token matches the verifying token.

IPC Classes  ?

42.

P2P-BASED UPDATE DEVICE AND METHOD OF OPERATING P2P-BASED UPDATE DEVICE

      
Application Number KR2013011068
Publication Number 2014/104601
Status In Force
Filing Date 2013-12-02
Publication Date 2014-07-03
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Min Seok
  • Beak, Seok Jun
  • Joo, Young Jong

Abstract

The present invention discloses a P2P-based update device and a method of operating the P2P-based update device. Embodiments of the present invention relate to a technology in which if a client attempts to access a server to obtain group information on clients related to a P2P-based file update, it is possible to decrease instances where unnecessary group information is generated and provided, and thus prevent a decrease in the performance of the server and increase efficiency in file updating by not providing group information but interrupting access by the client when the client is not authenticated by the server or a metadata file is not effective.

IPC Classes  ?

  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 9/44 - Arrangements for executing specific programs

43.

APPARATUS AND METHOD FOR DIAGNOSING MALICIOUS APPLICATION

      
Application Number KR2013010994
Publication Number 2014/098387
Status In Force
Filing Date 2013-11-29
Publication Date 2014-06-26
Owner AHNLAB, INC. (Republic of Korea)
Inventor Joo, Seol Woo

Abstract

According to the present invention, in diagnosing a malicious application in a portable terminal such as an Android OS-based smart phone, the malicious application can be rapidly and accurately diagnosed, and performance degradation of the terminal can be prevented by extracting a DEX file including the execution codes of an application in an apk file which is an installation file of the application, uncompressing only a partial region of a DEX file header including hash information for verifying the DEX file in the DEX file, and checking for the presence of the malicious application by comparing the hash information recorded in the DEX file header with signature hash information.

IPC Classes  ?

  • G06F 21/12 - Protecting executable software
  • G06F 11/30 - Monitoring
  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs

44.

METHOD AND DEVICE FOR MANAGING AND CONTROLLING APPLICATIONS OF MOBILE TERMINAL AND RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING METHOD THEREFOR IS RECORDED

      
Application Number KR2013009002
Publication Number 2014/092319
Status In Force
Filing Date 2013-10-08
Publication Date 2014-06-19
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Yong Dae
  • Kim, Tae Woong

Abstract

A method for managing and controlling applications of a mobile terminal of the present invention comprises: a step of classifying applications into first mode applications and second mode applications according to a pre-set application management policy so as to make an operating system (OS)application execution list; a step of backing up the first mode applications when the second mode is selected, and then deleting the first mode applications from the OS application execution list; and a step of executing the selected second mode applications when one of the second mode applications for the OS application execution list is selected.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

45.

APPARATUS AND METHOD FOR DETECTING FRAUDULENT/ALTERED APPLICATIONS

      
Application Number KR2013010971
Publication Number 2014/088262
Status In Force
Filing Date 2013-11-29
Publication Date 2014-06-12
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Joo, Seol Woo
  • Lee, Seungwon
  • Hwang, Changyeon

Abstract

The present invention relates to an apparatus and method for detecting fraudulent/altered applications, which can accurately detect fraudulent/altered applications by recognizing the application being diagnosed using signature information for each pre-stored application, and determining whether the recognized application is fraudulent/altered using verification signature information set for diagnosing whether the recognized application is fraudulent/altered. In addition, damage due to the fraudulent/altered applications can be reduced by blocking or deleting the fraudulent/altered applications according to a policy.

IPC Classes  ?

  • G06F 21/12 - Protecting executable software
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

46.

ABNORMAL PATH CALL DETECTING APPARATUS AND ABNORMAL PATH CALL DETECTING METHOD

      
Application Number KR2013011069
Publication Number 2014/088276
Status In Force
Filing Date 2013-12-02
Publication Date 2014-06-12
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Il Yong
  • Choi, Yoo Na

Abstract

Disclosed are an abnormal path call detecting apparatus and an abnormal path call detecting method. Embodiments of the present invention pertain to a technology for efficiently increasing the reliability of a determination result of whether a function call is an abnormal path call by determining whether a significant function not exposed externally is called through an abnormal path by a malicious subject using a last branch record (LBR).

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs

47.

COMPUTER SYSTEM AND METHOD OF USING WHITE LIST OF SAID COMPUTER SYSTEM

      
Application Number KR2013008988
Publication Number 2014/058211
Status In Force
Filing Date 2013-10-08
Publication Date 2014-04-17
Owner AHNLAB, INC. (Republic of Korea)
Inventor Hwang, Kyu Beom

Abstract

A computer system and a method of using the white list of the computer system are disclosed. When considering that malicious codes may not be activated for a plurality of files sequentially stored when a specific program (e.g., an OS program) is installed, embodiments of the present invention set a safer and more reliable white list in an environment that examines malicious code files based on the white list, and examine the malicious code files based on the white list, so that it is possible to effectively improve the speed and safety of examining the malicious code files when compared to a typical technique.

IPC Classes  ?

  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

48.

Method and apparatus for connecting to server using trusted IP address of domain

      
Application Number 14122078
Grant Number 09577948
Status In Force
Filing Date 2012-06-01
First Publication Date 2014-04-10
Grant Date 2017-02-21
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Byoung Hoon
  • Kim, Seong Cheol

Abstract

An apparatus for connecting to an update server includes an update unit configured to connect to the update server over a network using a pre-stored domain name address of the update server and an IP address acquisition unit configured to acquire an IP address of the connected update server. The IP address acquired by the IP address acquisition unit is stored as a trusted IP address in a storage unit. The apparatus further includes a reconnection processing unit configured to fetch the trusted IP address of the update server and try connecting to the update server using the trusted IP address in the case of failure to connect to the update server using the pre-stored domain name address.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/14 - Counter-measures to a fault
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal

49.

APPARATUS AND METHOD FOR DETECTING MALICIOUS SHELLCODE BY USING DEBUG EVENT

      
Application Number KR2013006093
Publication Number 2014/042344
Status In Force
Filing Date 2013-07-09
Publication Date 2014-03-20
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lim, Cha Sung
  • Lee, Ju Seok

Abstract

An apparatus for detecting a malicious shellcode by using a debug event comprises: an alarm setting unit for setting a debug event to occur when a mother process, which is generated by a mother program executing a non-executable file, attempts to execute a file without an execution attribute; an information storage unit for storing address range information on a memory in which normal modules used by the mother process are loaded; and a maliciousness determination unit for determining, by using the acquired address range information, whether the non-executable file is malicious if the debug event occurs.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/30 - Monitoring
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software

50.

APPARATUS AND METHOD FOR DIAGNOSING MALICIOUS APPLICATIONS

      
Application Number KR2013006095
Publication Number 2014/035043
Status In Force
Filing Date 2013-07-09
Publication Date 2014-03-06
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Seungwon
  • Kang, Donghyun
  • Joo, Seol Woo
  • Kim, Yonggoo
  • Hwang, Changyeon

Abstract

An apparatus for diagnosing malicious applications includes: a signature storage unit which stores malicious application executable files, which can be run in a mobile operating system, and common feature information of variant files derived from said malicious application executable files as signature data for diagnosing maliciousness; an information collection unit which collects information corresponding to common feature information from executable files which are targeted for diagnosis and are diagnosed as malicious or not; a diagnosis determination unit which compares the corresponding information collected by the information collection unit with the common feature information stored in the signature storage unit in order to determine whether the application executable files are malicious; and a result provision unit which provides the results of the determination of whether the application executable files are malicious from the diagnosis determination unit.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/30 - Monitoring

51.

Method and apparatus for detecting malicious shell codes using debugging events

      
Application Number 13875421
Grant Number 08646076
Status In Force
Filing Date 2013-05-02
First Publication Date 2014-02-04
Grant Date 2014-02-04
Owner Ahnlab, Inc. (Republic of Korea)
Inventor
  • Lim, Cha Sung
  • Lee, Ju Seok

Abstract

An apparatus for detecting malicious shell codes using a debugging event includes an alert setting unit configured to set a mother program to run a non-executable file to trigger the debugging event when a mother process created by the mother program tries to execute a code with no execution attribute; and an information storage unit configured to store information on an address range in which modules to be used by the mother process are loaded in a memory. Further, the apparatus includes a malicious code determination unit configured to determine whether the non-executable file is malicious using the information on the address range when there occurs the debugging event.

IPC Classes  ?

  • G06F 12/14 - Protection against unauthorised use of memory

52.

COMPUTER SYSTEM, METHOD FOR SHIFTING ADDRESS COMPUTER SYSTEM, AND METHOD FOR MONITORING SYSTEM FUNCTION OF COMPUTER SYSTEM

      
Application Number KR2013005206
Publication Number 2014/014200
Status In Force
Filing Date 2013-06-12
Publication Date 2014-01-23
Owner AHNLAB, INC. (Republic of Korea)
Inventor Seo, Dong Pil

Abstract

Disclosed are a computer system, a method for shifting an address of a computer system, and a method for monitoring a system function of a computer system. The present invention according to embodiments can effectively use an entire address range of a memory device by storing an address redirection function redirected to an inaccessible residual address range within an accessible partial address range of the entire address range of the memory device, and can thereby provide a same security level function as a 32-bit OS by enabling hooking in a kernel mode such as the 32-bit OS in 64-bit OS environment by monitoring the system function, when having a memory access module for supporting a method for accessing a memory area having the number of bits corresponding to the entire address range of the memory device, that is, the number of bits being less than the number of bits of the OS environment.

IPC Classes  ?

53.

APPARATUS AND METHOD FOR DIAGNOSING MALICIOUS CODE USING CACHING

      
Application Number KR2013005085
Publication Number 2014/010829
Status In Force
Filing Date 2013-06-10
Publication Date 2014-01-16
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Joo, Seol Woo
  • Lee, Kwang Woo
  • Nam, Jin Ha

Abstract

In the present invention, when malicious code is diagnosed for files installed in a mobile terminal, all files including the application file are diagnosed. However, for application files generating relatively heavy loads, diagnostic information for diagnosing is stored in a caching DB together with unique information capable of ensuring the integrity of the corresponding application file, and then previous diagnostic information is output as a diagnosis result as to whether the malicious code exists without performing malicious code diagnosis for the same application as that which is stored in the caching DB. Accordingly, load generation due to malicious code diagnosis can be minimized in a mobile terminal.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/30 - Monitoring

54.

APPARATUS AND METHOD FOR DIAGNOSING MALICIOUS APPLICATIONS

      
Application Number KR2013005643
Publication Number 2014/010847
Status In Force
Filing Date 2013-06-26
Publication Date 2014-01-16
Owner AHNLAB, INC. (Republic of Korea)
Inventor Joo, Seol Woo

Abstract

The present invention relates to diagnosing malicious applications in a mobile terminal, such as an Android OS-based smart phone. According to the present invention, only after a certificate file is uncompressed, which has hash information on all individual files included in an APK file of an application, the hash information on all the individual files included in the APK file existing in the uncompressed certificate file is compared to pre-stored signature hash information. Accordingly, the degradation of performance of the terminal can be prevented, and malicious applications can be rapidly and accurately diagnosed.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

55.

Method and apparatus for inspecting non-portable executable files

      
Application Number 13887610
Grant Number 08627478
Status In Force
Filing Date 2013-05-06
First Publication Date 2013-11-14
Grant Date 2014-01-07
Owner Ahnlab, Inc. (Republic of Korea)
Inventor
  • Lim, Cha Sung
  • Lee, Ju Seok

Abstract

An apparatus for inspecting a non-PE file includes a data loading unit configured to load candidate malicious address information related to a malicious code of the non-PE file; and a program link unit configured to acquire normal address range information of a module being loaded on a memory when an application program adapted for the non-PE file is executed and set up a candidate malicious address corresponding to the candidate malicious address information to be a breakpoint of the application program. Further, the apparatus includes a malicious code determination unit configured to determine whether a next execution address is within the normal address range information when there occurs an event derived from the breakpoint.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

56.

APPARATUS AND METHOD FOR CHECKING MALICIOUS FILE

      
Application Number KR2013003934
Publication Number 2013/168951
Status In Force
Filing Date 2013-05-07
Publication Date 2013-11-14
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lim, Cha Sung
  • Lee, Ju Seok

Abstract

The present invention relates to an apparatus and method for checking malicious files. The apparatus includes: a program driving unit outputting an execution address of an instruction executed when driving a program corresponding to a non-executable file; an address storing unit storing normal address range information according to the driving of the program; and a maliciousness determining unit determining whether the non-executable file is malicious according to whether the execution address is outside the normal address range information. Accordingly, the present invention has the effect of quickly and accurately identifying maliciousness of a non-executable file before a malicious code in the non-executable file is executed.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/28 - Error detectionError correctionMonitoring by checking the correct order of processing

57.

Apparatus and method for detecting malicious files

      
Application Number 13777181
Grant Number 08763128
Status In Force
Filing Date 2013-02-26
First Publication Date 2013-11-14
Grant Date 2014-06-24
Owner Ahnlab, Inc. (Republic of Korea)
Inventor
  • Lim, Cha Sung
  • Lee, Ju Seok

Abstract

An apparatus for detecting a malicious file, includes a program driving unit configured to output an execution address of a command executed by driving a program corresponding to a non-executable file; and an address storage unit configured to store normal address range information in accordance with the driving of the program. Further, the apparatus includes a maliciousness determination unit configured to determine whether the non-executable file is malicious depending on whether the execution address is not within the normal address range information.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

58.

DEVICE AND METHOD FOR BLOCKING MODIFICATIONS TO WEBPAGE INFORMATION

      
Application Number KR2013003189
Publication Number 2013/168902
Status In Force
Filing Date 2013-04-16
Publication Date 2013-11-14
Owner AHNLAB, INC. (Republic of Korea)
Inventor Kim, Yunseock

Abstract

The present invention blocking an interface function called by a browser plug-in comprises: a monitoring unit for monitoring whether a target interface function for accessing or revising cookie information or the information of a webpage run by a browser is called; a determination unit for determining whether the caller of the interface function is a plug-in when the interface function is called; and a blocking unit for blocking the use of the interface function which is called when the caller of the interface function is the plug-in.

IPC Classes  ?

59.

APPARATUS AND METHOD FOR CHECKING NON-EXECUTABLE FILES

      
Application Number KR2013003427
Publication Number 2013/168913
Status In Force
Filing Date 2013-04-23
Publication Date 2013-11-14
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lim, Cha Sung
  • Lee, Ju Seok

Abstract

The present invention relates to an apparatus and a method for checking non-executable files. The apparatus includes: a data loading unit that loads malicious candidate address information related to a malicious code of a non-executable file; a program connection unit that obtains normal address range information for a module, which is stored in a memory, and sets a breakpoint for the malicious candidate address information; a maliciousness determining unit that determines whether a next execution address belongs to the normal address range information when an event for the breakpoint occurs. Accordingly, the present invention has the effect of quickly and accurately detecting a malicious non-executable file before a malicious code in the non-executable file is executed.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/28 - Error detectionError correctionMonitoring by checking the correct order of processing

60.

System and method for detecting malware in file based on genetic map of file

      
Application Number 13977250
Grant Number 09141796
Status In Force
Filing Date 2011-12-27
First Publication Date 2013-10-24
Grant Date 2015-09-22
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Jeong Hun
  • Hwang, Kyu Beom

Abstract

A method for detecting whether a file includes malware is performed on a device. The method includes extracting information of at least two predetermined items in the file; creating a genetic map for the file by altering the extracted information into a previously set format; comparing the created genetic map with a previously stored malware genetic map to obtain a similarity between the created genetic map and the previously stored malware genetic map; and determining that the file is a malware when the similarity is higher than a reference value.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

61.

APPARATUS AND METHOD FOR ADDING/READING INFORMATION TO/FROM DIGITALLY-SIGNED PE FILE

      
Application Number KR2013001998
Publication Number 2013/137633
Status In Force
Filing Date 2013-03-13
Publication Date 2013-09-19
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Kiyoung
  • Kim, Joosaeng
  • Kim, Hyun Oh

Abstract

The present invention relates to an apparatus for adding information to a digitally-signed PE file, including: a parsing unit for parsing a digitally-signed PE file; a size-adjusting unit for increasing, by a preset unit, a size value of a certificate table section stored in the parsed PE file; and an information-changing unit for adding data necessary for the certificate table section and adjusting a cyclic redundancy check value, wherein, even though information is added to the digitally signed PE file, the digital signature is valid and the added information is to be read.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/12 - Protecting executable software

62.

Method and apparatus for blocking malicious access to process

      
Application Number 13883351
Grant Number 09185131
Status In Force
Filing Date 2011-11-03
First Publication Date 2013-08-29
Grant Date 2015-11-10
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Yunseock
  • Yang, Jaegap
  • Kim, Hanju

Abstract

An apparatus for blocking an external access to a browser includes an access monitor for monitoring whether a program is accessing the browser; and a document-object acquisition detector for detecting whether the program detected to access the browser by the access monitor acquires a document object of the browser; and an injection blocker for blocking the access of the program to the browser when the document object acquisition detector detects the document object acquisition by the corresponding program.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

63.

COMPUTER SYSTEM AND SIGNATURE VERIFICATION SERVER

      
Application Number KR2013001355
Publication Number 2013/125866
Status In Force
Filing Date 2013-02-21
Publication Date 2013-08-29
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Hwang, Kyubeom
  • Kim, Jeonghun

Abstract

Disclosed are a computer system and a signature verification server, a method for supporting signature verification by a computer system, and a method for signature verification. Embodiments of the present invention relate to a technique for error verification of a signature which is used when diagnosing malicious code, in which a preliminary-use signatures, for which error verification has not been completed, are distributed ahead of time to a plurality of user computers so that when files stored in a plurality of terminals are being diagnosed for malicious code, the preliminary-use signatures are applied, and the error verification is performed against the preliminary-use signatures on the basis of information collected relating to the results of the diagnosis, thus, in a plurality of user environments in which actual client vaccines are to be applied, results for simulation of a malicious code diagnosis with respect to a signature can be obtained, thereby allowing physical, spatial and temporal limitations of existing error verification of a signature to be overcome.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/30 - Monitoring
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

64.

COMPUTER SYSTEM AND SYSTEM FOR COMPOUND RULE CREATION ON BASIS OF FILE AND BEHAVIOR

      
Application Number KR2013001356
Publication Number 2013/125867
Status In Force
Filing Date 2013-02-21
Publication Date 2013-08-29
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Hwang, Kyubeom
  • Kim, Jeonghun

Abstract

Disclosed are a computer system, a system for compound rule creation on the basis of files and behavior, a method for supporting rule creation by a computer system, and a method for compound rule creation on the basis of files and behavior. Embodiments of the present invention pertain to a technique for creating a response rule for malicious code diagnosis by collecting samples of malicious code behavior and linking a file diagnosis therewith, in which information, such as suspicious behavior and the file responsible for the behavior, is collected, from a plurality of environments of actual computer users, as samples on the basis of occurrence of suspicious malicious behavior according to a behavior surveillance rule, and a new response rule, that is, a behavior surveillance rule and/or a file diagnosis rule (signature), is created and distributed, thus linking malicious code-based behavior and file diagnosis and using unspecified plurality of user computer environments. Thus, the technique allows a smooth response to a variety of environments, and can address existing limitations such as those regarding the effectiveness and speed of diagnosis by improving same and reducing the possibility of a mis-diagnosis.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

65.

USER DEVICE AND A METHOD OF DIAGNOSING MALICIOUS CODE USING SAME

      
Application Number KR2013000843
Publication Number 2013/115603
Status In Force
Filing Date 2013-02-01
Publication Date 2013-08-08
Owner AHNLAB, INC. (Republic of Korea)
Inventor Lee, Chang Woo

Abstract

The present invention relates to a user device and to a method of diagnosing malicious code using same, wherein a user device having the functions of diagnosing and curing malicious code is connected with a computing apparatus via wired or wireless means (USB interface, Bluetooth, wireless LAN, etc.), thus detecting and curing malicious code by real-time monitoring under the control of the user. According to the present invention, simple operation of the user device connected with the computing apparatus makes it possible to diagnose and cure malicious code, and enables the user to easily check the procedure of diagnosing, discovering and curing malicious code through an LED and a speaker of the user device, so that even users with poor computing capability may readily diagnose and cure malicious codes.

IPC Classes  ?

  • G06F 3/14 - Digital output to display device
  • G06F 3/16 - Sound inputSound output
  • G06F 9/44 - Arrangements for executing specific programs

66.

WHITELIST SYNCHRONIZATION SERVER AND CLIENT APPARATUS

      
Application Number KR2012011613
Publication Number 2013/111949
Status In Force
Filing Date 2012-12-27
Publication Date 2013-08-01
Owner AHNLAB, INC. (Republic of Korea)
Inventor Hwang, Kyubeom

Abstract

The present invention relates to a whitelist synchronization server, to a method for controlling the synchronization of the whitelist synchronization server, to a client apparatus, and to a method for operating the client apparatus. The embodiments of the present invention relate to a technology enabling highly reliable and effective updating and synchronization of a whitelist between the server and the client by allowing the server to divide a whitelist file for each period and provide the client with information for each period, and allowing the whitelist to be updated by collecting/using only the necessary information on the whitelist file included in the client in a corresponding period.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

67.

P2P-BASED UPDATE CLIENT, SERVER DEVICE, SYSTEM, AND METHOD

      
Application Number KR2012011453
Publication Number 2013/100551
Status In Force
Filing Date 2012-12-26
Publication Date 2013-07-04
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Min-Seok
  • Baek, Seok-Jun

Abstract

A peer-to-peer (P2P)-based update server device comprises: a meta data information analysis unit which analyzes information of a meta data file transmitted from each client through a network using a P2P-based protocol, and groups clients having the same meta data file information into one group; a sub-group management unit which groups clients, which are grouped into the group, into one or more sub-groups according to additional information of each client; and a control unit which manages information on the generated group and sub-group, and transmits information on the sub-group to a corresponding client.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 17/40 - Data acquisition and logging

68.

SERVER, CLIENT, AND METHOD FOR VERIFYING DATA INTEGRITY IN P2P-BASED NETWORK

      
Application Number KR2012011455
Publication Number 2013/100553
Status In Force
Filing Date 2012-12-26
Publication Date 2013-07-04
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Min-Seok
  • Baek, Seok-Jun

Abstract

A server apparatus for verifying data integrity in a P2P-based network includes: a metadata file creating unit for creating a metadata file; a metadata verification file creating unit for creating a metadata verification file for verifying the integrity of the metadata file; an electronic signing unit for electronically signing the metadata verification file; a metadata verification file integrity checking unit for checking the integrity of the digitally signed metadata verification file; and a controller for creating the metadata verification file for verifying the integrity of the metadata file, and transmitting the metadata file and the metadata verification file by using a P2P-based protocol.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

69.

BACKUP DEVICE AND BACKUP SERVER FOR TARGET INFORMATION

      
Application Number KR2012011608
Publication Number 2013/100648
Status In Force
Filing Date 2012-12-27
Publication Date 2013-07-04
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Jun, Jinpyo
  • Park, Junhyo
  • Choi, Byeongchang
  • Cho, Myoungjin

Abstract

The present information relates to a backup device for target information, a method of operating the backup device, a backup server, and a method of operating the backup server. According to embodiments of the present invention, when storing backup information corresponding to target information in a quarantine station (backup storage area) on a local disc prior to treating target information infected with a malicious code, if the storage status of the backup storage area satisfies an external backup condition, some backup information from the backup storage area is uploaded/stored in a remote backup server. Thus, the embodiments relate to a technology for ensuring reliability such as totality and integrity of backup information as well as recency of backup information.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 12/16 - Protection against loss of memory contents
  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

70.

SYSTEM, USER TERMINAL, METHOD, AND APPARATUS FOR PROTECTING AND RECOVERING SYSTEM FILE.

      
Application Number KR2012007235
Publication Number 2013/100320
Status In Force
Filing Date 2012-09-07
Publication Date 2013-07-04
Owner AHNLAB, INC. (Republic of Korea)
Inventor Hwang, Changyeon

Abstract

An apparatus for protecting and recovering a system file comprises: a system file setting unit which sets a system file within an operating system program of a computing apparatus; a hash value calculation unit which calculates a hash value for the set system file on a preset cycle, and stores the calculated hash value in a storage unit; and a file backup unit which encodes the system file corresponding to the calculated hash value, and stores the encoded system file in the storage unit.

IPC Classes  ?

  • G06F 9/22 - Microcontrol or microprogram arrangements

71.

APPARATUS AND METHOD FOR UPDATING APPLICATIONS

      
Application Number KR2012007719
Publication Number 2013/100326
Status In Force
Filing Date 2012-09-25
Publication Date 2013-07-04
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Nam, Jin Ha
  • Chung, Hae Jin
  • Moon, Seong Keon

Abstract

The apparatus for updating applications creates a synchronization application list based on applications which use an identical module, extracts information on applications which use an updating module received from an application distribution server from the synchronization application list, and includes a updating module distribution unit for transmitting the updating module and the information on the application to one or more terminals. Accordingly, the terminal updates the module of an application corresponding to the information on the application through the updating module.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

72.

APPARATUS AND METHOD FOR DETECTING SIMILARITY BETWEEN APPLICATIONS

      
Application Number KR2012007641
Publication Number 2013/089340
Status In Force
Filing Date 2012-09-24
Publication Date 2013-06-20
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Kiyoung
  • Go, Seungwon
  • Kim, Seil

Abstract

The present invention relates to a technology for detecting similarity between applications, which measures the similarity between applications by utilizing information on the basis of the characteristics of the applications operating on the basis of an Android mobile platform by using analysis of a DEX signature, a developer's signature, and an inside APK file through file information extraction, and by using analysis and comparison of class and method files. According to the present invention, forgeries made by re-packaging Android applications and even similarity between apps can be relatively easily determined. Through this, the rights and interests of an application developer can be protected, and a user can precisely determine whether the corresponding application is normal.

IPC Classes  ?

73.

DEVICE AND METHOD FOR ANALYZING API-BASED APPLICATION

      
Application Number KR2012007449
Publication Number 2013/077538
Status In Force
Filing Date 2012-09-18
Publication Date 2013-05-30
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Go, Seungwon
  • Kim, Yongdae
  • Kim, Seil
  • Yoo, Yeongjin
  • Kim, Jongman

Abstract

The present invention relates to an API-based application analysis technology which analyzes and diagnoses the properties and risks of an application installed in a mobile device on the basis of usage information of a mobile operating system platform API. To this end, the technology classifies the operating system platform API in terms of an action element and a pattern, provides a weight to each to create a diagnosis policy model, and then analyzes an API extracted from a corresponding application to analyze a functional property and risk. According to the present invention, since analysis on an application installed in a mobile device is automatically made, it is possible to more objectively and quickly analyze the tendencies and risk of the application without depending on an analyst, and it is possible to provide a guide to risk elements and risks to be predicted to a mobile device user along with quantitative figures that are risks and API distribution by risk element.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions

74.

MALICIOUS CODE DIAGNOSIS/REMOVAL SERVICE DEVICE AND METHOD THEREFOR

      
Application Number KR2012008935
Publication Number 2013/077565
Status In Force
Filing Date 2012-10-29
Publication Date 2013-05-30
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Kyung Hee
  • Kim, Keonwoo
  • Jeong, Eunjin

Abstract

The present invention relates to a malicious code diagnosis/removal service device in virtualization environment, including: a malicious code diagnosis/removal service unit for a hypervisor which stores test target Identification (ID) signatures according to service information for diagnosing and removing malicious codes; and a malicious code diagnosis/removal service unit for a guest Operating System (OS) which diagnoses and removes the malicious codes using the test target ID signatures.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 11/30 - Monitoring

75.

TERMINAL DEVICE AND ACCESS POINT ACCESS METHOD OF THE TERMINAL DEVICE

      
Application Number KR2012006130
Publication Number 2013/022213
Status In Force
Filing Date 2012-08-01
Publication Date 2013-02-14
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Kwangwoo
  • Lee, Sungkeun
  • Kim, Euntack

Abstract

Disclosed are a terminal device and an AP access method of the terminal device. In the method, the terminal device receives an inside AP list from an AP management server, collects an accessible AP list, and then compares the inside AP list with the accessible AP list, so as to determine whether there is an overlap AP between the two lists. When it is determined that there is an overlap AP between the two lists, the terminal device decides that the terminal device is located within a company or a predetermined area, so that it is possible to determine whether the terminal device is located within or out of a company.

IPC Classes  ?

  • H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
  • H04W 88/02 - Terminal devices
  • H04W 48/00 - Access restrictionNetwork selectionAccess point selection

76.

Apparatus, system, and method for preventing infection by malicious code

      
Application Number 13574346
Grant Number 08813229
Status In Force
Filing Date 2011-01-20
First Publication Date 2013-01-10
Grant Date 2014-08-19
Owner Ahnlab, Inc. (Republic of Korea)
Inventor
  • Lee, Jae Han
  • Kim, Jeong Hun
  • Kim, Sung Hyun

Abstract

The invention relates to an apparatus for preventing infection by malicious code, comprising: a database in which files installed in an agent system, DNA values for each part of the files, and index information for indicating whether each file is normal or malicious are stored; a calculation unit which calculates a DNA value for a part of a file for which an execution is requested in the agent system; and a file inspection unit which searches the database to extract, in a group, files having the DNA value calculated by the calculation unit, inspects whether an object file is normal or malicious on the basis of the index information on the files extracted in a group, and allows the execution of the object file or makes a request for the calculation of DNA values of other parts which selectively include one part of the object file.

IPC Classes  ?

  • G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions

77.

METHOD AND APPARATUS FOR CONNECTING TO SERVER USING TRUSTED IP ADDRESS OF DOMAIN

      
Application Number KR2012004353
Publication Number 2013/002495
Status In Force
Filing Date 2012-06-01
Publication Date 2013-01-03
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Byoung Hoon
  • Kim, Seong Cheol

Abstract

An apparatus for connecting to an update server includes an update unit configured to connect to the update server over a network using a pre-stored domain name address of the update server and an IP address acquisition unit configured to acquire an IP address of the connected update server. The IP address acquired by the IP address acquisition unit is stored as a trusted IP address in a storage unit. The apparatus further includes a reconnection processing unit configured to fetch the trusted IP address of the update server and try connecting to the update server using the trusted IP address in the case of failure to connect to the update server using the pre-stored domain name address.

IPC Classes  ?

  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation

78.

METHOD AND APPARATUS FOR PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACK

      
Application Number KR2012005043
Publication Number 2013/002538
Status In Force
Filing Date 2012-06-26
Publication Date 2013-01-03
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Park, Chan Hee
  • Kim, Woo Kyum

Abstract

An apparatus for preventing a distributed denial of service (DDoS) attack transmits a redirect message containing a redirect URL (Uniform resource Locator) to a client terminal that has transmitted a request for accessing a web server, in place of the web server. The apparatus authenticates the client terminal that re-sends the request for accessing the web server as a normal client terminal, and permits the client terminal to access the web server.

IPC Classes  ?

  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

79.

System and method for logical separation of a server by using client virtualization

      
Application Number 13582609
Grant Number 08713640
Status In Force
Filing Date 2011-03-04
First Publication Date 2012-12-27
Grant Date 2014-04-29
Owner AHNLAB, Inc. (Republic of Korea)
Inventor
  • Park, Heean
  • Kang, Kyung Wan
  • Kim, Kwang Tae

Abstract

A system for logically separating a server using client virtualization includes a client terminal including a virtual environment generation unit for generating a virtual environment, and a virtualized server including a local storage unit, an authentication server for performing authentication on the client terminal when a request for access to the local storage unit is received from a process executed in the virtual environment, and a virtualization filter drier for allowing or blocking the access request to the local storage unit based on the authentication result of the client terminal. The client terminal further includes a virtualization filter driver for transmitting the access request from the process executed in the virtual environment to the local storage unit, and blocking the access request from the process without being made through the virtual environment to the local storage unit.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

80.

UPDATE APPARATUS AND METHOD

      
Application Number KR2012004955
Publication Number 2012/177080
Status In Force
Filing Date 2012-06-22
Publication Date 2012-12-27
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Kwang Woo
  • Lee, Sung Keun
  • Nam, Jin Ha

Abstract

According to an update apparatus and an update method, it is possible to configure a native library from a target library to be updated, configure an interface library providing a Java Native Interface (JNI) function, which is a wrapper function for the target library, and then call an unload function for the target library through the interface library, so that the target library can be efficiently updated in the JAVA environment.

IPC Classes  ?

81.

AHNLAB MDS

      
Serial Number 85803048
Status Registered
Filing Date 2012-12-14
Registration Date 2014-08-26
Owner AhnLab, Inc. (Republic of Korea)
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

[ Computer network security devices, namely, computer network adapters, hubs, routers, and switches; ] computer software for security purposes, namely, protecting data and information by preventing unauthorized users from accessing them; downloadable computer software for security purposes, namely, protecting data and information by preventing unauthorized users from accessing them; downloadable computer software for security of mobile devices, namely, protecting data and information by preventing unauthorized users from accessing them; computer software that monitors, detects, intercepts, diagnoses and repairs computer viruses, all for computer security purposes; computers installed with computer software that monitors, detects, intercepts, diagnoses and repairs computer viruses, all for computer security purposes; [ encoded smart cards containing programming used to monitor, detect, intercept, diagnose and repair computer viruses for computer security purposes; ] computer software that monitors, detects, intercepts, diagnoses and repairs viruses of mobile devices, for security purposes

82.

COMPUTING APPARATUS AND AUTOMATIC CONNECTION SWITCHING METHOD OF THE COMPUTING APPARATUS

      
Application Number KR2012004101
Publication Number 2012/161526
Status In Force
Filing Date 2012-05-24
Publication Date 2012-11-29
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Park, Hee An
  • Kang, Kyung Wan
  • Kim, Kwang Tae

Abstract

Disclosed is a method that blocks access by a first process, which is allowed to access only an external server, to an internal server, and simultaneously, supports the access to the internal server through a second process, which is allowed to access only the internal server, and that blocks the access of the second process to the external server and simultaneously, supports the access to the external through the first process, whereby a user's inconveniences caused by blocking access to a server can be minimized while maintaining network security.

IPC Classes  ?

  • G06F 21/22 - by restricting access to, or manipulation of, programmes or processes

83.

Apparatus and method for detecting malicious sites

      
Application Number 13505858
Grant Number 08745740
Status In Force
Filing Date 2010-11-01
First Publication Date 2012-09-13
Grant Date 2014-06-03
Owner AHNLAB., Inc. (Republic of Korea)
Inventor
  • Oh, Ju Hyun
  • Lee, Chang Woo
  • Park, Chong Phil

Abstract

The invention relates to an apparatus for detecting malicious sites, comprising: a monitoring unit for monitoring all processes being executed in a computing apparatus; a hook code insertion unit for inserting a hook code in a process executed in a browser when the execution of the browser is detected by the monitoring unit; a danger level determining unit that, upon the detection of a website movement, uses the hook code to inspect a stack structure of a process implemented according to the website movement and determine whether or not to perform the stack structure inspection, and determines whether or not the website to which the movement has been made is a malicious site; and a database for storing a list of sites determined to be malicious.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

84.

METHOD OF DETECTING ARP SPOOFING ATTACKS USING ARP LOCKING AND COMPUTER-READABLE RECORDING MEDIUM STORING PROGRAM FOR EXECUTING THE METHOD

      
Application Number KR2012000930
Publication Number 2012/108687
Status In Force
Filing Date 2012-02-08
Publication Date 2012-08-16
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Joosaeng
  • Han, Taesoo
  • Kim, Jong Hyun

Abstract

A method of detecting Address Resolution Protocol (ARP) spoofing attack, includes initializing an ARP cache if an IP address of the ARP cache is consistent with any one of the IP addresses of the candidate senders and a MAC address of the ARP cache is not consistent with a MAC address of a candidate sender of which IP address is consistent with that of the ARP cache. The method further includes blocking an inbound packet having an ARP response if an IP address of a sender sending the ARP response is consistent with any one of the IP addresses of the candidate senders and a MAC address of the sender is not consistent with a MAC address of the candidate sender of which IP address is consistent with that of the sender sending the ARP response.

IPC Classes  ?

  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

85.

METHOD AND APPARATUS FOR DETECTING A MALWARE IN FILES

      
Application Number KR2011009810
Publication Number 2012/091341
Status In Force
Filing Date 2011-12-19
Publication Date 2012-07-05
Owner AHNLAB, INC. (Republic of Korea)
Inventor Hwang, Kyu Beom

Abstract

An apparatus for detecting a malware in files includes an acquisition unit configured to obtain from a file system information about a first time point when an interested folder is created by the file system, and information about a second time point when an interested file is created in the interested folder by the file system, a candidate determination unit configured to determine whether the interested file is a candidate file to be subjected to a malware inspection, based on the information on the first and the second time point, and an inspection unit configured to perform the malware inspection on the interested file determined to be the candidate file for the malware inspection.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

86.

SYSTEM AND METHOD FOR DETECTING MALWARE IN FILE BASED ON GENETIC MAP OF FILE

      
Application Number KR2011010141
Publication Number 2012/091400
Status In Force
Filing Date 2011-12-27
Publication Date 2012-07-05
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Jeong Hun
  • Hwang, Kyu Beom

Abstract

A method for detecting whether a file includes malware is performed on a device. The method includes extracting information of at least two predetermined items in the file; creating a genetic map for the file by altering the extracted information into a previously set format; comparing the created genetic map with a previously stored malware genetic map to obtain a similarity between the created genetic map and the previously stored malware genetic map; and determining that the file is a malware when the similarity is higher than a reference value.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

87.

SYSTEM AND METHOD FOR DETECTING MALICIOUS CONTENT IN NON-PE FILE

      
Application Number KR2011010309
Publication Number 2012/091488
Status In Force
Filing Date 2011-12-29
Publication Date 2012-07-05
Owner AHNLAB. INC. (Republic of Korea)
Inventor Sim, Sun Young

Abstract

There is provided a method for detecting whether malicious content is included in a non-PE (Portable Executable) file. The method includes extracting information from a portion within the non-PE file in which the malicious content can be inserted and determining whether the malicious content is included in the non-PE file on the basis of the extracted information.

IPC Classes  ?

  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

88.

APPARATUS AND METHOD FOR REMOVING MALICIOUS CODE

      
Application Number KR2011009407
Publication Number 2012/077966
Status In Force
Filing Date 2011-12-07
Publication Date 2012-06-14
Owner AHNLAB, INC. (Republic of Korea)
Inventor Kim, Kyung Hee

Abstract

Disclosed are an apparatus and a method for removing a malicious code. Accordingly, the present invention provides a technology of mixing a cloud computing based network detecting scheme and a conventional malicious code detecting scheme for providing a detection engine to a client terminal according to a situation based on characteristics of the client terminal, helping efficiently cope with a malicious code.

IPC Classes  ?

  • G06F 11/28 - Error detectionError correctionMonitoring by checking the correct order of processing
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

89.

Method and apparatus for protecting data using a virtual environment

      
Application Number 13389883
Grant Number 08782798
Status In Force
Filing Date 2010-08-10
First Publication Date 2012-06-07
Grant Date 2014-07-15
Owner Ahnlab, Inc. (Republic of Korea)
Inventor
  • Kang, Kyung Wan
  • Kim, Kwang Tae
  • Park, Heean

Abstract

The present invention relates to a method and apparatus for protecting data using a virtual environment, which creates a safe virtual environment that supports the execution of application programs being operated on a computer and which enables important data to be inputted or outputted only within the virtual environment, such that access to the important data is prevented in a general local environment. According to the present invention, data leakage is initially prevented to protect data, and convenience is provided in that a user may use the computer in a general manner while performing desired work.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

90.

Method for detecting and preventing a DDoS attack using cloud computing, and server

      
Application Number 13386516
Grant Number 09386036
Status In Force
Filing Date 2010-07-12
First Publication Date 2012-05-17
Grant Date 2016-07-05
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Jeong Hun
  • Kim, Sung Hyun

Abstract

A method for detecting and preventing a Distributed Denial of Service (DDoS) attack in a cloud computing environment including a plurality of clients connected to a server, the method includes collecting, by the server, file deoxyribonucleic acid (DNA) extracted from a file currently being executed by each of the clients and traffic information about network traffic caused by the file, from each client by using an agent that is installed in the client and that monitors the file currently being executed by the client. Further, the method includes analyzing, by the server, a risk level of a DDoS attack based on whether the file DNA of the file is malicious or unidentified and based on the traffic information. Furthermore, the method includes sending a command related to whether to block the file to the client according to the analyzed risk level.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

91.

METHOD AND APPARATUS FOR BLOCKING MALICIOUS ACCESS TO PROCESS

      
Application Number KR2011008324
Publication Number 2012/060639
Status In Force
Filing Date 2011-11-03
Publication Date 2012-05-10
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Kim, Yunseock
  • Yang, Jaegap
  • Kim, Hanju

Abstract

An apparatus for blocking an external access to a browser includes an access monitor for monitoring whether a program is accessing the browser; and a document-object acquisition detector for detecting whether the program detected to access the browser by the access monitor acquires a document object of the browser; and an injection blocker for blocking the access of the program to the browser when the document object acquisition detector detects the document object acquisition by the corresponding program.

IPC Classes  ?

  • G06F 21/52 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure

92.

Apparatus and method for preemptively protecting against malicious code by selective virtualization

      
Application Number 13148177
Grant Number 08984629
Status In Force
Filing Date 2010-02-03
First Publication Date 2011-12-01
Grant Date 2015-03-17
Owner Ahnlab., Inc. (Republic of Korea)
Inventor
  • Kim, Kwang Tae
  • Hwang, Yongseok

Abstract

In an apparatus and method for protecting resources of a computing system from a malicious code by selective virtualization, at least a part of the resources is classified as compulsory resources for executing a program on the computing system. When a vulnerable program executed in a separate space attempts to access one of the compulsory resources, an operating system level virtualization is performed. Further, when the vulnerable program attempts to access one of the resources of the computing system which is other than the compulsory resources, the vulnerable program is permitted to access a modified resource which is generated by modifying content of the resource.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/50 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

93.

TERMINAL DEVICE AND METHOD FOR CONFIRMING FILE DISTRIBUTOR OF SAME TERMINAL DEVICE

      
Application Number KR2011002339
Publication Number 2011/126254
Status In Force
Filing Date 2011-04-05
Publication Date 2011-10-13
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Hwang, Yong Seok
  • Kim, Jeong Hun
  • Kim, Sung Hyun
  • Kang, Kyung Wan

Abstract

Disclosed are a terminal device and a method for confirming a file distributor of same terminal device. The present invention according to embodiments caches the files pre-executed through the terminal device and file distributor information and can previously prevent diffusion of malicious codes by comparing the cached files with a new file and extracting the distributor information of the new file when the new file is generated from the terminal device.

IPC Classes  ?

  • G06F 15/00 - Digital computers in generalData processing equipment in general
  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/73 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
  • G06F 9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs

94.

MOBILE COMMUNICATION TERMINAL HAVING A BEHAVIOR-BASED MALICIOUS CODE DETECTION FUNCTION AND DETECTION METHOD THEREOF

      
Application Number KR2011002176
Publication Number 2011/122845
Status In Force
Filing Date 2011-03-30
Publication Date 2011-10-06
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Jae Hun
  • Nam, Jin Ha
  • Lee, Sung Keun

Abstract

A mobile communication terminal comprises: a system unit which performs application installation and removal, outputs an installation completion message upon completion of the application installation, and provides, upon receipt of request for authority information on the application, the requested authority information; a behavior information database in which behavior information data is stored; and an inspection unit which makes a request for the authority information to the system unit and receives the authority information, upon receipt of the installation completion message from the system unit, and which compares the authority information and the behavior information data stored in the behavior information database to examine whether the application is a malicious code or not.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/30 - Monitoring
  • G06F 21/31 - User authentication
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements
  • H04B 1/40 - Circuits

95.

SYSTEM AND METHOD FOR LOGICAL SEPARATION OF A SERVER BY USING CLIENT VIRTUALIZATION

      
Application Number KR2011001490
Publication Number 2011/108877
Status In Force
Filing Date 2011-03-04
Publication Date 2011-09-09
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Park, Heean
  • Kang, Kyung Wan
  • Kim, Kwang Tae

Abstract

A system for logical separation of a server by using client virtualization comprises: a client terminal equipped with a virtual environment generator for generating a virtual environment; and a virtualization server which includes a local storage unit, an authentication unit for performing authentication of the client terminal at a request for an access from a process being executed in the virtual environment to the local storage unit, and a virtualization filter driver on the server side for allowing or blocking the access to the local storage unit on the basis of the authentication result of the client terminal. The client terminal further comprises a virtualization filter driver on the filter side for transmitting the request for an access from the process being executed in the virtual environment to the local storage unit, and blocking the request for an access from the process that has not undergone the virtual environment to the local storage unit.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06F 21/20 - by restricting access to nodes in a computer system or computer network

96.

NETWORK SPLITTING DEVICE, SYSTEM AND METHOD USING VIRTUAL ENVIRONMENTS

      
Application Number KR2011001468
Publication Number 2011/108863
Status In Force
Filing Date 2011-03-03
Publication Date 2011-09-09
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Park, Heean
  • Kang, Kyung Wan
  • Kim, Kwang Tae

Abstract

A network splitting device using virtual environments serves to connect user equipment that is connected to a company network and an external network. The network splitting device comprises a packet transmitting/receiving section for receiving a packet that has been generated in the virtual environment of the user equipment, and transmitting the packet either to the external network or to the company network; a packet analysis section for analyzing the packet that has been sent from the packet transmitting/receiving section; and a packet processing section that splits the packet and then transmits the split packets to the external network or the company network, according to the packet analysis result and a preset packet processing policy.

IPC Classes  ?

97.

DEVICE AND METHOD FOR BLOCKING MALICIOUS CODE USING EXECUTABLE FILES

      
Application Number KR2011001469
Publication Number 2011/108864
Status In Force
Filing Date 2011-03-03
Publication Date 2011-09-09
Owner AHNLAB, INC. (Republic of Korea)
Inventor Lee, Jae Han

Abstract

A device for blocking malicious code using executable files comprises: a database which stores an original DNA value for each executable file stored in an agent system; a blocking unit which sets a blocking mode for blocking movement, alteration or generation of the executable files, and, in the blocking mode, backs up an original before any executable file in the agent system is altered if any executable file is being altered; and a file execution unit which, if there is an execution request for a specific executable file in the agent system, compares the DNA value of the specific executable file with the original DNA value of the specific executable file stored on the database and thereby determines whether to execute the specific executable file, and which restores and executes the backed-up original if the specific executable file is any such altered executable file.

IPC Classes  ?

  • G06F 21/20 - by restricting access to nodes in a computer system or computer network
  • G06F 9/06 - Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
  • G06F 9/44 - Arrangements for executing specific programs

98.

APPARATUS, SYSTEM, AND METHOD FOR PREVENTING INFECTION BY MALICIOUS CODE

      
Application Number KR2011000411
Publication Number 2011/090329
Status In Force
Filing Date 2011-01-20
Publication Date 2011-07-28
Owner AHNLAB, INC. (Republic of Korea)
Inventor
  • Lee, Jae Han
  • Kim, Jeong Hun
  • Kim, Sung Hyun

Abstract

The invention relates to an apparatus for preventing infection by malicious code, comprising: a database in which files installed in an agent system, DNA values for each portion of the files, and index information for indicating whether each file is normal or malicious are stored; a calculation unit which calculates a DNA value for a portion of a file for which an execution is requested in the agent system; and a file inspection unit which searches the database to extract, in a group, files having the DNA value calculated by the calculation unit, inspects whether an object file is normal or malicious on the basis of the index information on the files extracted in a group, and allows the execution of the object file or makes a request for the calculation of DNA values of other portions which selectively include one portion of the object file.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 21/56 - Computer malware detection or handling, e.g. anti-virus arrangements

99.

SPOOFING PREVENTION METHOD AND APPARATUS

      
Application Number KR2011000231
Publication Number 2011/087285
Status In Force
Filing Date 2011-01-13
Publication Date 2011-07-21
Owner AHNLAB., INC. (Republic of Korea)
Inventor Lee, Kwang Woo

Abstract

A spoofing prevention method comprises: receiving an information packet that includes host IP address and MAC address of at least one host to build an IP-MAC database; comparing the IP address and the MAC address included in an out-bound packet that has been transmitted from the host with the IP-MAC address pair of the IP-MAC database; deciding the out-bound packet as a spoofing packet if the IP address and the MAC address of the out-bound packet do not coincide with the IP-MAC address pair of the IP-MAC database; and filtering the spoofing packet.

IPC Classes  ?

  • H04L 12/22 - Arrangements for preventing the taking of data from a data transmission channel without authorisation
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

100.

SYSTEM AND METHOD FOR UPDATING SIGNATURE DATABASE AND APPARATUS FOR UPDATING DATABASE OF A CLIENT TERMINAL

      
Application Number KR2010008750
Publication Number 2011/074824
Status In Force
Filing Date 2010-12-08
Publication Date 2011-06-23
Owner AHNLAB., INC. (Republic of Korea)
Inventor
  • Yang, Yong Cheol
  • Kim, Keon Woo

Abstract

A signature database updating system comprises: a transaction information generating unit which generates transaction information for each database version on the basis of modification details for each database version, and stores the generated transaction information in a storage unit; a transaction log generating unit compares transaction information of the newest version and transaction information of other versions from among transaction information for each database version to generate transaction logs for each database version, and stores the generated transaction logs to the storage unit; and an updating server device which extracts a transaction log from the storage unit on the basis of database version information upon receipt of database version information from a client terminal, and transmits the extracted transaction log to the client terminal to update the database of the client terminal.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 15/177 - Initialisation or configuration control
  • G06F 21/24 - by protecting data directly, e.g. by labelling
  1     2        Next Page