Disarming malware in protected content
First Claim
1. A method of disarming malicious code in protected content in a computer system having a processor, the method comprising:
- determining, by the processor, that a received input file intended for a recipient is protected;
accessing a credential associated with the intended recipient for accessing the protected input file;
accessing, by the processor, the content of the protected input file based on the credential;
modifying, by the processor, at least a portion of digital values of the content configuring to disable any malicious code included in the content without intentionally altering non-malicious functionality of the received input file, thereby creating a modified input file, wherein the modified input file is modified to be substantially similar to the received input file; and
protecting, by the processor, the modified input file based on the credential associated with the intended recipient.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods of disarming malicious code in protected content in a computer system having a processor are provided. The method includes determining that a received input file intended for a recipient is protected, the recipient may be connected to a network; accessing a credential associated with the intended recipient for accessing the protected input file; accessing the content of the protected input file based on the credential; modifying at least a portion of digital values of the content of the input file configuring to disable any malicious code included in the input file, thereby creating a modified input file; and protecting the modified input file based on the credential associated with the intended recipient. The method also includes forwarding the protected modified input file to the intended recipient in the network.
-
Citations
23 Claims
-
1. A method of disarming malicious code in protected content in a computer system having a processor, the method comprising:
-
determining, by the processor, that a received input file intended for a recipient is protected; accessing a credential associated with the intended recipient for accessing the protected input file; accessing, by the processor, the content of the protected input file based on the credential; modifying, by the processor, at least a portion of digital values of the content configuring to disable any malicious code included in the content without intentionally altering non-malicious functionality of the received input file, thereby creating a modified input file, wherein the modified input file is modified to be substantially similar to the received input file; and protecting, by the processor, the modified input file based on the credential associated with the intended recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of disarming malicious code in protected content in a computer system having a processor, the method comprising:
-
determining, by the processor, that a received content intended for a recipient is protected; accessing, by the processor, a credential for accessing the protected content; accessing, by the processor, the digital values of the protected content based on the credential; modifying, by the processor, at least a portion of the digital values of the content configuring to disable any malicious code included in the content without intentionally altering non-malicious functionality of the received content, thereby creating modified content, wherein the modified content is modified to be substantially similar to the received content; and enabling access to the modified content by the intended recipient. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A system for disarming malicious code in protected content, the system comprising:
-
a memory device storing a set of instructions; and a processor configured to execute the set of instructions to; determine that a received content intended for a recipient in a network is protected; access a credential for accessing the protected content; access the digital values of the protected content based on the credential; modify at least a portion of the digital values of the content configuring to disable any malicious code included in the content without intentionally altering non-malicious functionality of the received content, thereby creating modified content, wherein the modified content is modified to be substantially similar to the received content; and enable access to the modified content by the intended recipient.
-
Specification