System and method for handling unwanted telephone calls through a branching node

    公开(公告)号:US11616879B2

    公开(公告)日:2023-03-28

    申请号:US17834132

    申请日:2022-06-07

    申请人: AO Kaspersky Lab

    摘要: Disclosed herein are systems and methods for handling unwanted telephone calls through a branching node. In one aspect, an exemplary method comprises, intercepting a call request from a terminal device of a calling party to a terminal device of a called party, establishing a connection through the branching node via two different communication channels, a first communication channel being with the terminal device of the called party and a second communication channel being with a call recorder; duplicating media data between the terminal devices such that one data stream is directed towards a receiving device of the media data and a second data stream is directed towards the call recorder; recording and sending the recorded call to an automatic speech recognizer for converting the media file to digital information suitable for analysis; and when the call is unwanted, handling the call based on classification of the call.

    SYSTEM AND METHOD FOR HANDLING UNWANTED TELEPHONE CALLS THROUGH A BRANCHING NODE

    公开(公告)号:US20220303388A1

    公开(公告)日:2022-09-22

    申请号:US17834132

    申请日:2022-06-07

    申请人: AO Kaspersky Lab

    摘要: Disclosed herein are systems and methods for handling unwanted telephone calls through a branching node. In one aspect, an exemplary method comprises, intercepting a call request from a terminal device of a calling party to a terminal device of a called party, establishing a connection through the branching node via two different communication channels, a first communication channel being with the terminal device of the called party and a second communication channel being with a call recorder; duplicating media data between the terminal devices such that one data stream is directed towards a receiving device of the media data and a second data stream is directed towards the call recorder; recording and sending the recorded call to an automatic speech recognizer for converting the media file to digital information suitable for analysis; and when the call is unwanted, handling the call based on classification of the call.

    SYSTEM AND METHOD FOR CONTROLLING ACCESS OF MACHINE CODE TO OPERATING SYSTEM RESOURCES
    3.
    发明申请
    SYSTEM AND METHOD FOR CONTROLLING ACCESS OF MACHINE CODE TO OPERATING SYSTEM RESOURCES 有权
    用于控制机器操作系统资源的系统和方法

    公开(公告)号:US20160292450A1

    公开(公告)日:2016-10-06

    申请号:US15164323

    申请日:2016-05-25

    申请人: AO Kaspersky Lab

    IPC分类号: G06F21/62 G06F21/55 G06F21/57

    摘要: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining and forming a correspondence between the native image and the parent assembly based at least upon a template; in response to detecting an update to the native image, generating an updated image of the native image; determining whether there is a correspondence between the updated image of the native image and the parent assembly based at least upon the template; and in response to detecting no correspondence between the updated image of the native image and the parent assembly, restricting an access of the updated image of the native image to the resources of the operating system of the device.

    摘要翻译: 公开了一种用于控制机器代码的本机映像到设备的操作系统的资源的访问的系统和方法。 示例性方法包括获得机器码的本机图像; 识别创建本机映像的父组件; 至少基于模板来确定和形成本机图像和母体组件之间的对应关系; 响应于检测到对所述本机图像的更新,生成所述本机图像的更新图像; 至少基于所述模板来确定所述原始图像的更新图像和所述父组件之间是否存在对应关系; 并且响应于检测到本地图像的更新图像与父组件之间没有对应关系,限制本地图像的更新图像对设备的操作系统的资源的访问。

    System and method of controlling access of a native image of a machine code to operating system resources
    4.
    发明授权
    System and method of controlling access of a native image of a machine code to operating system resources 有权
    控制机器代码的本机映像对操作系统资源的访问的系统和方法

    公开(公告)号:US09384364B1

    公开(公告)日:2016-07-05

    申请号:US14811135

    申请日:2015-07-28

    申请人: AO Kaspersky Lab

    IPC分类号: G06F21/62

    摘要: Disclosed is a system and method for controlling access of a native image of a machine code to resources of an operating system of a device. An example method includes obtaining the native image of the machine code; identifying a parent assembly from which the native image was created; determining a category of trust of the parent assembly; determining a category of trust of the native image based on the category of trust of the parent assembly; and restricting access of the native image that has an untrusted category of trust to the resources of the operating system of the device.

    摘要翻译: 公开了一种用于控制机器代码的本机映像到设备的操作系统的资源的访问的系统和方法。 示例性方法包括获得机器码的本机图像; 识别创建本机映像的父组件; 确定父组件的信任类别; 基于父组件的信任类别确定本地图像的信任类别; 并且将具有不可信任信任类别的本地映像的访问权限于设备的操作系统的资源。

    SYSTEM AND METHOD FOR CLASSIFYING INCOMING EVENTS BY USER'S MOBILE DEVICE BASED ON USER PREFERENCES

    公开(公告)号:US20240276225A1

    公开(公告)日:2024-08-15

    申请号:US18644392

    申请日:2024-04-24

    申请人: AO Kaspersky Lab

    IPC分类号: H04W12/122 G06N5/04 G06N20/00

    CPC分类号: H04W12/122 G06N5/04 G06N20/00

    摘要: Disclosed herein are methods and systems for classifying incoming events by user's mobile device based on user preferences. In one aspect, an exemplary method comprises: intercepting an incoming event received by a mobile device, analyzing content of the intercepted event to determine one or more attributes of the intercepted event, comparing the intercepted event to a plurality of previously collected and classified events, stored in an event repository, based on the one or more determined attributes to identify one or more similar events, determining a rating value of the one or more similar events based on a matrix of user preferences, wherein the rating value indicates probability that the corresponding event belongs to a particular class of events, and classifying the intercepted event as undesirable on the mobile device if the rating value of the one or more similar events is less than a predetermined threshold value.

    SYSTEM AND METHOD FOR RECOGNIZING UNDESIRABLE CALLS

    公开(公告)号:US20240171675A1

    公开(公告)日:2024-05-23

    申请号:US18360898

    申请日:2023-07-28

    申请人: AO Kaspersky Lab

    IPC分类号: H04M3/42 H04M3/436

    CPC分类号: H04M3/42059 H04M3/436

    摘要: Disclosed herein are systems and methods for recognizing undesirable calls on a remote device. In one aspect, an exemplary method comprises, generating, for each call, a call identifier from a probabilistic hash received from a secure device, the probabilistic hash having been computed by the secure device based on a unique call identifier associated with call data collected for the call; analyzing the generated call identifiers to identify at least one of the generated call identifiers as a suspicious call identifier; requesting data, from the secure device associated with the suspicious call identifiers, where the requested data includes at least information about the call associated with the suspicious call identifier; and analyzing data received in response to the request and recognizing suspicious call identifier and the call associated with the suspicious call identifier as undesirable based on the analysis of the data received in response to the request.

    System and method for handling unwanted telephone calls

    公开(公告)号:US11388286B2

    公开(公告)日:2022-07-12

    申请号:US17335123

    申请日:2021-06-01

    申请人: AO Kaspersky Lab

    摘要: Disclosed herein are systems and methods for handling unwanted telephone calls. In one aspect, an exemplary method comprises, intercepting a call request for a call from a terminal device of a calling party to a terminal device of a called party, generating a call recording containing media data transmitted within a connection established by the intercepted call request, determining attributes of the generated call recording, classifying the call as an unwanted call based on the determined attributes, wherein the classification is performed by a classifier trained on previously collected unwanted calls, and wherein the call is classified as unwanted when the attributes belong to an unwanted call class that is known, and handling the call in accordance with the classification of the call, the handling including at least securing information of the call.

    System and method for classifying incoming events by user's mobile device

    公开(公告)号:US11997494B2

    公开(公告)日:2024-05-28

    申请号:US17332174

    申请日:2021-05-27

    申请人: AO Kaspersky Lab

    CPC分类号: H04W12/122 G06N5/04 G06N20/00

    摘要: A method for classifying incoming events includes intercepting an incoming event received by a mobile device. The content of the intercepted event is analyzed to determine one or more attributes of the intercepted event. The intercepted event is compared to a plurality of previously collected and classified events, stored in an event repository, based on the one or more determined attributes to identify one or more similar events. A rating of each of the one or more similar events is determined. The rating characterizes probability that the corresponding event belongs to a particular class. The intercepted event is classified as undesirable on the mobile device if the rating value of the one or more similar events is less than a predetermined threshold value.

    System and method of determining a trust level of a file

    公开(公告)号:US11275836B2

    公开(公告)日:2022-03-15

    申请号:US16669798

    申请日:2019-10-31

    申请人: AO Kaspersky Lab

    摘要: Disclosed herein are systems and methods for determining trust levels of files on a computing device. In one aspect, an exemplary method comprises, selecting file names which are stable, generating at least one group of files from at least two files of the selected file names, the at least two files being components of a same application, searching for a presence of a dominant developer such that at least one private key of the dominant developer has been used to sign at least one file of the group of files that is generated, when a dominant developer is found, determining a trust level for all files of the group in accordance with verdicts associated with the dominant developer, and when the dominant developer is not found, determining the trust level for all the files of the group based on verdicts of outside services that have been assigned to the files of the group.