E-mail virus protection system and method
First Claim
Patent Images
1. A method for protecting a network from a virus contained in an email message as executable code, the method comprising:
- (a) receiving the e-mail message in a gatekeeper server;
(b) providing a sacrificial server in communication with the gatekeeper server and forwarding the e-mail from the gatekeeper server to the sacrificial server;
(c) converting the e-mail message from an executable format to a non-executable format by using one of a plurality of application-level conversion processes selected in accordance with a type of the e-mail message, the non-executable format retaining an appearance, human readability and semantic content of the e-mail message; and
(d) forwarding the non-executable format to the recipient of the e-mail message.
4 Assignments
0 Petitions
Accused Products
Abstract
A network is protected from e-mail viruses through the use of a sacrificial server. Any executable programs or other suspicious parts of incoming e-mail messages are forwarded to a sacrificial server, where they are converted to non-executable format such as Adobe Acrobat PDF and sent to the recipient. The sacrificial server is then checked for virus activity. After the execution is completed, the sacrificial server is rebooted.
-
Citations
43 Claims
-
1. A method for protecting a network from a virus contained in an email message as executable code, the method comprising:
-
(a) receiving the e-mail message in a gatekeeper server;
(b) providing a sacrificial server in communication with the gatekeeper server and forwarding the e-mail from the gatekeeper server to the sacrificial server;
(c) converting the e-mail message from an executable format to a non-executable format by using one of a plurality of application-level conversion processes selected in accordance with a type of the e-mail message, the non-executable format retaining an appearance, human readability and semantic content of the e-mail message; and
(d) forwarding the non-executable format to the recipient of the e-mail message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for protecting a network from a virus contained in an e-mail message as executable code, the system comprising:
-
a workstation computer on the network used by a recipient of the e-mail message;
a gatekeeper server, in communication with the workstation computer over the network, for receiving the e-mail message; and
a sacrificial server on the network for converting the e-mail message from an executable format to a non-executable format by using one of a plurality of application-level conversion processes selected in accordance with a type of the e-mail message, the non-executable format retaining an appearance, human readability and semantic content of the e-mail message and forwarding the converted e-mail message to the workstation computer. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 34)
-
-
33. A sacrificial server for use on a network, the sacrificial server comprising:
-
communication means for receiving an e-mail attachment from the network; and
processing means for converting the e-mail attachment from an executable format to a non-executable format by using one of a plurality of application-level conversion processes selected in accordance with a type of the e-mail message, the non-executable format retaining an appearance, human readability and semantic content of the e-mail message and for returning the e-mail attachment to the network. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification