METHOD AND APPARATUS FOR IMMUNIZING DATA IN COMPUTER SYSTEMS FROM CORRUPTION
First Claim
1. A method for immunizing a recipient'"'"'s computer system in a data processing network from the corrupting contents of a message of a given protocol received over a communications path through a server with a message buffer, said method comprising the steps of:
- A) providing for the recipient an isolated protocol-based controlled environment set for the incoming message including;
i) message criteria by which a message can be determined to be free of corrupting contents, and ii) message transmission criteria for defining alternate message dispositions, B) receiving the message in the message buffer, and C) controlling the destination of the message by;
i) processing the received message from the message buffer in the controlled environment set according to the message criteria, ii) selecting a transmission criterion in response to said processing of the message, and iii) disposing of the message in accordance with the selected transmission criterion.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for immunizing a computer network against adverse effects caused by the receipt of a corrupting message. Each message transfers into a protocol-based controlled environment for a specific recipient where message criteria determine whether the incoming message is deemed to be a valid or suspicious message. Transmission criteria determine the final message disposition. If the message is valid, it is delivered to a recipient computer system in the network. If the incoming message is suspicious, the message is isolated in the controlled environment where the transmission criteria may provide remote access to the recipient.
39 Citations
80 Claims
-
1. A method for immunizing a recipient'"'"'s computer system in a data processing network from the corrupting contents of a message of a given protocol received over a communications path through a server with a message buffer, said method comprising the steps of:
-
A) providing for the recipient an isolated protocol-based controlled environment set for the incoming message including;
i) message criteria by which a message can be determined to be free of corrupting contents, and ii) message transmission criteria for defining alternate message dispositions, B) receiving the message in the message buffer, and C) controlling the destination of the message by;
i) processing the received message from the message buffer in the controlled environment set according to the message criteria, ii) selecting a transmission criterion in response to said processing of the message, and iii) disposing of the message in accordance with the selected transmission criterion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. An immunization system for immunizing a recipient'"'"'s computer system in a data processing network from the corrupting contents of a message of a given protocol received over a communications path through a server with a message buffer that receives a message, said system comprising:
-
A) an isolated protocol-based controlled environment set for the incoming message including;
i) message criteria by which a message can be determined to be free of corrupting contents, and ii) message transmission criteria for defining alternate message dispositions, B) a controlled environment set for processing the received message from the message buffer according to the message criteria, i) means for selecting a transmission criterion in response to the message processing, and ii) means for disposing of the message in accordance with the selected transmission criterion. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80)
-
Specification