Content extractor and analysis system
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving a first file;
extracting content of interest within the first file;
repackaging the content of interest into one or more files of valid formatted type to produce a first reduced file;
applying a signature to the reduced file; and
storing the signature and associating the signature with the first file.
3 Assignments
0 Petitions
Accused Products
Abstract
A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and unwanted software. The system can implement centralized policies that allow an administrator to approve, block, quarantine, and log file activities. The system can extract content of interest from a file container, repackage the content of interest as another valid file type, perform hashes on the content of interest, associate the hash of the container with the hash of the repackaged content, transfer the repackaged content, and store the hash with other security-related information.
-
Citations
27 Claims
-
1. A computer-implemented method comprising:
-
receiving a first file;
extracting content of interest within the first file;
repackaging the content of interest into one or more files of valid formatted type to produce a first reduced file;
applying a signature to the reduced file; and
storing the signature and associating the signature with the first file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 16, 22, 23, 24, 25, 27)
-
-
14. A computer system comprising:
-
a memory including meta-information regarding files, including, for each file, a signature of the contents and state information indicating whether and with what conditions certain specified file operations can be performed;
a host computer responsive to receiving a first file for extracting content of interest within the first file, repackaging the content of interest into one or more files of valid formatted type to produce a first reduced file, applying a signature or hash to the first reduced file; and
storing the signature or hash and associating the signature or hash with the first file. - View Dependent Claims (15, 17, 18, 19, 20, 21, 26)
-
Specification