Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

193 results about "Ransomware" patented technology

Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash or Bitcoin and other cryptocurrency are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

System and method for detecting malware that interferes with the user interface

System and method for detecting ransomware. A current user behavior pattern is monitored based on user input via a user input device. The user behavior is compared against a reference set of behavior patterns associated with user frustration with non-responsiveness of the user interface module. A current status pattern of the operating system is also monitored. The current status pattern is compared against a reference set of operating system status patterns associated with predefined ransomware behavior. In response to indicia of current user frustration with non-responsiveness of the user interface, and further in response to indicia of the current status pattern having a correlation to the predefined ransomware behavior, an indication of a positive detection of ransomware executing on the computer system is provided.
Owner:AO KASPERSKY LAB

Active network backup device

InactiveUS20180375826A1Widely promotedEasily causes data corruption or blackmailInput/output to record carriersTransmissionRansomwareSoftware
An active network backup device includes at least a mainframe and a hardware. The mainframe and other network devices cannot log in, create settings and access data of the hardware. Hence, the hardware can practically prevent and block viruses, ransomware and attacks by hackers; moreover, the device has a physical security switch design for switching on and off a port to ensure personal operation of the administrator and prevent the hardware from being hacked by robot program. Most importantly, the hardware cannot execute destructive instructions and thereby viruses cannot be executed or run in the hardware, which also prevents accidental deletion due to setting errors, or any ransomware or malicious programs in the disguise of setting programs being downloaded and executed by careless users.
Owner:CHANG SHENG HSIUNG +1

Method and system for preventing ransomware

ActiveCN107480527AQuickly discover cryptographic operationsDiscover cryptographic operationsPlatform integrity maintainanceRansomwareVirus
The invention relates to a method and system for preventing ransomware. The method includes the steps of creating a bait file in the system, and monitoring the bait file in real time; if monitoring that the bait file is retrieved and written by the same process, labeling a program corresponding to the process as suspected ransomware; preventing the program labeled as the suspected ransomware from conducting write operations on all files. The method and system for preventing ransomware can accurately and quickly discover the encrypted operation of the ransomware virus on the disk files, and prevent in time.
Owner:SHENZHEN LEAGSOFT TECH

Systems and methods for ransomware detection and mitigation

System and method for protecting a computing device of a target system against ransomware attacks employs a file system having a data structure used by an operating system of the computing device for managing files. A software or a hardware installed agent in the computing device performs one or more actions autonomously on behalf of the target system. The agent autonomously creates one or more trap files in the data structure of the filing system. A trap file is a file access to which indicates a probability of ransomware attack. The agent monitors access to the one or more trap files. Upon detecting access to a trap file, remedial action is performed by the target system against the probability of ransomware attack.
Owner:CYBER CRUCIBLE

Ransomware variation detection method based on sequence alignment algorithm

The invention provides a ransomware variation detection method based on a sequence alignment algorithm. The method comprises the specific steps of inputting a ransomware sample, extracting a sample feature sequence, processing the sample feature sequence into a gene sequence, and detecting a ransomware variation. The step of variation detection specifically comprises the sub-steps of clustering each gene sequence in a sample set, extracting clustering result information to acquire various ransomware families; using the sequence alignment algorithm Needleman-Wunsch to compute similarity betweena sample to be detected and a class cluster center sample of various ransomware families, screening out clusters with the similarity more than a preset threshold, and using the screened clusters to form a new ransomware training sample set; determining the ransomware family class to which the sample to be detected belongs b using the newly screened training sample set in combination with the sequence alignment algorithm and a KNN classification algorithm to achieve variation detection. According to the method, the purpose of quickly achieving ransomware variation detection is achieved by combining the sequence alignment algorithm with the existing classification algorithm.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products