Disarming malware in digitally signed content
First Claim
Patent Images
1. A system for disarming malicious code in digitally-signed content, the system comprising:
- means for determining that content is associated with a first digital signature;
means for creating modified content by modifying at least a portion of digital values of the content to disable any malicious code included in the content; and
means for signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for disarming malicious code in digitally-signed content are provided. An example method includes determining that content is associated with a first digital signature, modifying at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content, and signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
36 Citations
20 Claims
-
1. A system for disarming malicious code in digitally-signed content, the system comprising:
-
means for determining that content is associated with a first digital signature; means for creating modified content by modifying at least a portion of digital values of the content to disable any malicious code included in the content; and means for signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for disarming malicious code in a computer system having a processor, the method comprising:
-
determining that input content associated with a recipient in a network is signed with a first digital signature; verify authenticity of the first digital signature; generating modified input content by modifying at least a portion of digital values of the input content to disable any malicious code included in the input content; and signing the modified input content with a second digital signature, the signed modified input content including one or more elements indicative of the authenticity of the first digital signature. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising instructions that when executed by a processor cause the processor to:
-
determine that content is associated with a first digital signature; create modified content by modifying at least a portion of digital values of the content to disable any malicious code included in the content; and sign the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
-
Specification