File conversion in restricted process
First Claim
1. A method of removing malicious code from a file of a first file format, the method comprising:
- configuring at least one processor to perform the functions of;
in response to a request to open the file, loading into a restricted process a converter capable of converting the file from the first file format to a second file format so as to limit damage caused by malicious code during the conversion of the file and wherein the converter within the restricted process has limited access privileges to an operating system; and
removing malicious code using the converter loaded in the restricted process to convert the file from the first file format into a converted file of the second file format; and
opening the converted file after the converting.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.
53 Citations
19 Claims
-
1. A method of removing malicious code from a file of a first file format, the method comprising:
-
configuring at least one processor to perform the functions of; in response to a request to open the file, loading into a restricted process a converter capable of converting the file from the first file format to a second file format so as to limit damage caused by malicious code during the conversion of the file and wherein the converter within the restricted process has limited access privileges to an operating system; and removing malicious code using the converter loaded in the restricted process to convert the file from the first file format into a converted file of the second file format; and opening the converted file after the converting. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer readable storage medium storing computer instructions executed upon access by a processor, wherein the computer readable storage media does not consist of a propagated data signal, wherein the instructions when executed perform a method of opening a file, the method comprising:
-
receiving a request to open a file of a first file format; loading into a restricted process a converter capable of converting the file from the first file format to a second file format so as to limit damage caused by malicious code during the conversion of the file and wherein the converter within the restricted process has limited access privileges to an operating system; converting the file from the first file format into a converted file in the second file format using the converter loaded in the restricted process, wherein the converting eliminates any malicious code present in the file from the converted file and after the converting, opening the converted file. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of opening a file, the method comprising:
-
configuring at least one processor to perform the functions of; receiving a request to open a file; examining a portion of the file'"'"'s data to determine a true file format for the file; determining whether the true file format is of a format that is blocked from being opened; in response to a determination that the file format is not of a format that is blocked, opening the file; and in response to a determination that the file format is of a format that is blocked; loading into a restricted process a converter capable of converting the file from the first file format to a second file format so as to limit damage caused by malicious code during the conversion of the file and wherein the converter within the restricted process has limited access privileges to an operating system; converting the file from the first file format into a converted file in the second file format using the converter loaded in the restricted process, wherein the converting eliminates malicious code present in the file from the converted file; and after the converting, opening the converted file. - View Dependent Claims (16, 17, 18, 19)
-
Specification