×

Malicious mobile code runtime monitoring system and methods

  • US 10,552,603 B2
  • Filed: 11/16/2015
  • Issued: 02/04/2020
  • Est. Priority Date: 05/17/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A processor-based method, comprising:

  • receiving, by a server, a file;

    detecting whether the file includes one or more instances of executable code, including detecting, by a detector engine of the server, that the file includes one or more instances of executable code when the file is determined to include a code pattern indicative of executable code;

    generating, by a protection engine, mobile protection code when one or more instances of executable code is detected by the code detector;

    receiving, by a linking engine, the generated mobile protection code and the file containing the one or more instance of executable code, and bundling, by the linking engine, the mobile protection code, at least one security policy, and the file into a sandboxed package, wherein the bundling does not alter the file;

    unbundling the sandboxed package in the following order;

    mobile protection code first, at least one security policy second and the file third; and

    transferring the file, by the server, to a destination when no instances of executable code are detected therein.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×