Patents Assigned to WithSecure Corporation
  • Patent number: 11811803
    Abstract: There is provided a method comprising: detecting a new process start at a network node of a computer network; determining that said process requires external code modules; observing the times at which one or more external code modules required by the new process are loaded relative to the process starting time; determining that the usage of an external code module required by the new process is anomalous when the time elapsed between the start of the process and loading of said external code module lies outside predetermined expected boundaries; and taking further action to protect the network node and/or the computer network based on determining that the usage of the external code module required by the detected new process is anomalous.
    Type: Grant
    Filed: November 10, 2020
    Date of Patent: November 7, 2023
    Assignee: WITHSECURE CORPORATION
    Inventors: Paolo Palumbo, Dmitriy Komashinskiy
  • Patent number: 11811788
    Abstract: A method comprising: receiving raw data related to one or more network nodes, wherein dissimilar data types are aligned as input events; filtering one or more of the input events by using an adjustable threshold that is based on a filtering score, wherein the filtering score is an estimate of the likelihood that the input event is followed by a security related detection; processing only input events passed through the filtering by an enrichment process; and analysing the data received from the enrichment process for generating a security related decision.
    Type: Grant
    Filed: March 6, 2020
    Date of Patent: November 7, 2023
    Assignee: WITHSECURE CORPORATION
    Inventor: Matti Aksela
  • Patent number: 11647029
    Abstract: A method of probing and responding to a security breach in a computer network security system includes defining first and second rules and defining a model to output a probability that a security breach has occurred based on an input and to generate commands. Data is collected at first nodes according to the first rules and a first portion of the collected data is selected and sent from the first nodes to a second node. The selected first portion is input into the model to obtain an output probability that a security breach has occurred and the following steps are performed: determining signs of a security breach, generating a first command with the model to cause a second portion of the collected data to be selected, and generating a second command with the model to cause a change in settings at one or more of the first nodes.
    Type: Grant
    Filed: December 7, 2018
    Date of Patent: May 9, 2023
    Assignee: Withsecure Corporation
    Inventors: Paolo Palumbo, Dmitry Komashinskiy, Szymon Grzybowski
  • Patent number: 11606368
    Abstract: A method including: establishing an internal swarm intelligence network including security agent modules of a plurality of interconnected network nodes of a local computer network, collecting data related to the respective network nodes, sharing information based on the collected data in the established internal swarm intelligence network, and using the collected data and information received from the internal swarm intelligence network for generating and adapting models related to the respective network node nodes. In case a new threat is identified, the threat is verified and contained, a new threat model is generated and the generated new threat model is shared. The security alert and/or the generated new threat model is transmitted to a security service network for enabling the security service network to share the received security alert and/or the new threat model.
    Type: Grant
    Filed: November 11, 2019
    Date of Patent: March 14, 2023
    Assignee: Withsecure Corporation
    Inventors: Matti Aksela, Mika Stahlberg
  • Patent number: 11575633
    Abstract: A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.
    Type: Grant
    Filed: February 13, 2020
    Date of Patent: February 7, 2023
    Assignee: WithSecure Corporation
    Inventor: Heikki Hannikainen
  • Patent number: 11528286
    Abstract: A method for monitoring a directory environment of a computer network to detect vulnerabilities. The method comprises, at a first computer on the computer network, changing a configuration of the directory environment and, with a replication service, replicating the change at a second computer on the computer network. The method further comprises extracting information relating to the change from the replication service and using the extracted information to detect a vulnerability in the directory environment.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: December 13, 2022
    Assignee: WITHSECURE CORPORATION
    Inventors: Jacques Louw, Keith Kirton
  • Patent number: 11457020
    Abstract: There is provided a method comprising: generating and sharing an initial value of an integrity token between an endpoint node and a security backend computer, collecting data at the endpoint node, wherein dissimilar data types are aligned as input events, generating a new integrity token every time a new input event is written to a local repository of the endpoint node, wherein the new integrity token is generated based on the new input event and a prior integrity token that was generated prior to the new integrity token, removing the prior integrity token generated prior to the new integrity token from the endpoint node each time a new integrity token has been generated, and sending one or more input events with the new integrity token to the security backend computer for enabling the security backend computer checking integrity of the data received from the endpoint.
    Type: Grant
    Filed: May 19, 2020
    Date of Patent: September 27, 2022
    Assignee: WITHSECURE CORPORATION
    Inventors: Paolo Palumbo, Alexey Kirichenko, Valtteri Niemi, Sara Ramezanian, Tommi Meskanen
  • Patent number: 11451584
    Abstract: A method of protecting a computer system against remote exploitation attacks performed over a network to which the computer system is connected. The method includes: a) identifying a network connection that is not associated with a successful authentication and which carries a traffic level in excess of a predefined threshold; b) reporting the identified network connection as a real or potential remote exploitation attack; and c) taking an action or actions to mitigate against the real or potential remote exploitation attack.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: September 20, 2022
    Assignee: Withsecure Corporation
    Inventor: Mikko Suominen
  • Patent number: 11449610
    Abstract: There is provided a method of detecting a threat against a computer system. The method includes monitoring installation and operation of multiple different versions of the same application in a computer system; analysing evolutionary changes between the behaviours of the different versions of the same application; detecting and monitoring a new version of the same application in a computer system; monitoring the behavior of the computer system to detect one or more procedures of the monitored application that do not match expected behaviors of the monitored application on the basis of the analysis; and upon detection of one or more procedures not matching the expected behaviors of the monitored application, identifying the monitored application as malicious or suspicious.
    Type: Grant
    Filed: March 18, 2019
    Date of Patent: September 20, 2022
    Assignee: Withsecure Corporation
    Inventors: Mikko Suominen, Dmitriy Komashinskiy, Fredrik Kock
  • Patent number: 11436326
    Abstract: A method of scanning files for malware on a computer system. The method comprises detecting a file to be scanned for malware in the computer system, determining the file being a partial file that comprises only a part of the file content, searching for an original clean file associated with the partial file, wherein the original clean file is a full copy of the partial file, based on finding a candidate original clean file associated with the partial file, calculating a partial hash of the same length as the partial file for the candidate original clean file, and based on determining that partial hashes of the candidate original clean file and the partial file match, signalling a false alarm.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: September 6, 2022
    Assignee: WithSecure Corporation
    Inventor: Jarno Niemelä