RESISTING THE SPREAD OF UNWANTED CODE AND DATA
First Claim
Patent Images
1. A method for resisting spread of unwanted code and data without scanning incoming electronic files for unwanted code and data, the method comprising the steps, performed by a computer system, of:
- (a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules;
(b) determining a purported predetermined file type of the incoming electronic file;
(c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type;
(d) determining nonconforming data in the content data that does not conform to the predetermined data format;
(e) determining that the nonconforming data is authorized; and
(f) regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized.
0 Assignments
0 Petitions
Accused Products
Abstract
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data format, parsing the content data, to determine whether it conforms to the predetermined data format, and if the content data does conform to the predetermined data format, regenerating the parsed data to create a regenerated electronic file in the data format.
-
Citations
31 Claims
-
1. A method for resisting spread of unwanted code and data without scanning incoming electronic files for unwanted code and data, the method comprising the steps, performed by a computer system, of:
-
(a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules; (b) determining a purported predetermined file type of the incoming electronic file; (c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type; (d) determining nonconforming data in the content data that does not conform to the predetermined data format; (e) determining that the nonconforming data is authorized; and (f) regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for resisting spread of unwanted code and data without scanning incoming electronic files for unwanted code and data, the method comprising the steps, performed by a computer system, of:
-
(a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules; (b) determining a purported predetermined file type of the incoming electronic file; (c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type; (d) determining conforming data in the content data that conforms to the predetermined data format; and (e) regenerating the conforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification