Method and system for preventing computer worm dissemination using encryption
First Claim
1. A method for preventing a computer worm from unauthorized use of data indicative of at least one e-mail address stored in a data base in encrypted form, said method comprising the steps of:
- accessing a e-mail program;
decrypting said selected ones of said data to provide access thereto; and
addressing at least one e-mail message using said decrypted data.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for preventing a computer worm from unauthorized use of data indicative of at least one e-mail address stored in a data base is presented. The method comprises the steps of encrypting said data, receiving at least one e-mail message by accessing an e-mail server, decrypting said selected ones of said data to provide access thereto, and addressing at least one e-mail message using said decrypted data. The method further includes the step of re-encrypting the selected decrypted data. In one aspect of the invention, the method of encrypting the data comprises the steps of obtaining a key value, selecting each of the at least one e-mail address, encrypting the selected e-mail address using the key value; and storing said encrypted e-mail in the data base.
6 Citations
34 Claims
-
1. A method for preventing a computer worm from unauthorized use of data indicative of at least one e-mail address stored in a data base in encrypted form, said method comprising the steps of:
-
accessing a e-mail program;
decrypting said selected ones of said data to provide access thereto; and
addressing at least one e-mail message using said decrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 32)
-
-
10. A system for preventing a computer worm from unauthorized use of data indicative of at least one e-mail address stored in a data base in a encrypted form, said system comprising:
a processor in communication with a memory operable to execute code for;
decrypting said selected ones of said data; and
addressing at least one e-mail message using said decrypted data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 30, 31, 34)
- 22. The system as recited in 10, wherein said code is contained in said memory.
-
23. A method for preventing dissemination of computer worms comprising the steps of:
-
scrambling data indicative of e-mail addresses using a known scrambling technique, wherein said scrambling key is obtained from an external source; and
storing said scrambled data in lieu of said e-mail addresses in a data base.
-
-
27. A method for preventing dissemination of computer worms, comprising the steps of:
-
accessing an e-mail server containing at least one e-mail messages;
verifying data indicative of e-mail addresses stored in a data base are encrypted; and
encrypting said e-mail addresses determined not encrypted using a key value obtained from an external source.
-
Specification