COMPUTER SECURITY METHOD AND SYSTEM WITH INPUT PARAMETER VALIDATION
First Claim
1. A method for handling suspicious downloadables, comprising:
- receiving a downloadable;
scanning the downloadable to identify suspicious computer operations therein; and
if at least one suspicious computer operation is identified, then;
overwriting the suspicious computer operations with substitute computer operations; and
appending monitoring program code to the downloadable thereby generating a modified downloadable, wherein the monitoring program code includes program instructions for validating input parameters for the suspicious computer operations during run-time of the downloadable.
0 Assignments
0 Petitions
Accused Products
Abstract
A security system, including a receiver for receiving a downloadable, a scanner, coupled with the receiver, for scanning the downloadable to identify suspicious computer operations therein, a code modifier, coupled with the scanner, for overwriting the suspicious computer operations with substitute computer operations, if at least one suspicious computer operation is identified by the scanner, and for appending monitoring program code to the downloadable thereby generating a modified downloadable, if at least one suspicious computer operation is identified by the scanner, and a processor, coupled with the code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for the processor to validate input parameters for the suspicious computer operations during run-time of the downloadable. A method is also described and claimed.
-
Citations
56 Claims
-
1. A method for handling suspicious downloadables, comprising:
-
receiving a downloadable; scanning the downloadable to identify suspicious computer operations therein; and if at least one suspicious computer operation is identified, then; overwriting the suspicious computer operations with substitute computer operations; and appending monitoring program code to the downloadable thereby generating a modified downloadable, wherein the monitoring program code includes program instructions for validating input parameters for the suspicious computer operations during run-time of the downloadable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer security system, comprising:
-
a receiver for receiving a downloadable; a scanner, coupled with said receiver, for scanning the downloadable to identify suspicious computer operations therein; a code modifier, coupled with said scanner, for overwriting the suspicious computer operations with substitute computer operations, if at least one suspicious computer operation is identified by said scanner, and for appending monitoring program code to the downloadable thereby generating a modified downloadable, if at least one suspicious computer operation is identified by said scanner; and a processor, coupled with said code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for said processor to validate input parameters for the suspicious computer operations during run-time of the downloadable. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method for handling suspicious downloadables, comprising:
-
receiving a downloadable; and appending monitoring program code to the downloadable thereby generating a modified downloadable, wherein the monitoring program code includes program instructions; for identifying suspicious computer operations during run-time of the downloadable; for overwriting the suspicious computer operations with substitute computer operations during run-time of the downloadable; and for validating input parameters for the suspicious operations during run-time of the downloadable. - View Dependent Claims (40, 41, 42, 43, 44, 45, 46)
-
-
47. A computer security system, comprising:
-
a receiver for receiving a downloadable; a code modifier, coupled with said scanner, for appending monitoring program code to the downloadable thereby generating a modified downloadable; and a processor, coupled with said code modifier, for executing programmed instructions, wherein the monitoring program code includes program instructions for said processor; to identify suspicious computer operations during run-time of the downloadable; to overwrite the suspicious computer operations with substitute computer operations during run-time of the downloadable; and to validate input parameters for the suspicious computer operations during run time of the downloadable. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54)
-
-
55. A method for handling suspicious downloadables, comprising:
-
scanning a downloadable to detect the presence of at least one suspicious computer operation; dynamically generating during run-time of the downloadable at least one input parameter for the at least one suspicious computer operation detected by said scanning; and determining whether or not the dynamically generated at least one input parameter corresponds to a safe input parameter for the at least one suspicious computer operation.
-
-
56. A computer security system, comprising:
-
a scanner for scanning a downloadable to detect the presence of at least one suspicious computer operation; and a processor that executes programmed instructions; for dynamically generating during run-time of the downloadable at least one input parameter for the at least one suspicious computer operation detected by said scanner; and for determining whether or not the dynamically generated at least one input parameter corresponds to a safe input parameter for the at least one suspicious computer operation.
-
Specification