Systems and methods for computer security
First Claim
Patent Images
1. A method for maintaining computer security comprising:
- receiving, at a proxy server, an email directed from an email server to an email client associated with the email server;
scanning an email message included in the received email using intrusion detection signatures to determine if the email message would exploit a vulnerability associated with the email server;
determining whether an attachment included in the received email is infected with malicious code;
byparsing the received email;
converting the received email into an internal format; and
determining, at the proxy server, whether the converted received email includes malicious code using a virus signature file; and
based on a determination that the attachment is infected;
removing the attachment from the received email;
modifying the received email, the modification indicating that the attachment was removed; and
sending the modified email to the email client.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for maintaining computer security comprises receiving an incoming email destined for an email server, determining whether the received incoming email is infected with malicious code and blocking the incoming email determined to be infected with malicious code from reaching the email server.
32 Citations
26 Claims
-
1. A method for maintaining computer security comprising:
-
receiving, at a proxy server, an email directed from an email server to an email client associated with the email server; scanning an email message included in the received email using intrusion detection signatures to determine if the email message would exploit a vulnerability associated with the email server; determining whether an attachment included in the received email is infected with malicious code;
byparsing the received email; converting the received email into an internal format; and determining, at the proxy server, whether the converted received email includes malicious code using a virus signature file; and based on a determination that the attachment is infected; removing the attachment from the received email; modifying the received email, the modification indicating that the attachment was removed; and sending the modified email to the email client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system for maintaining computer security comprising:
one or more computers configured to store computer code executable by the one or more computers, the computer code configured to; receive, at a proxy server, an email directed from an email server to an email client associated with the email server; scan an email message included in the received email using intrusion detection signatures to determine if the email message would exploit a vulnerability associated with the email server; determine whether an attachment included in the received email is infected with malicious code; and based on a determination that the attachment is infected; remove the attachment from the received email; modify the received email, the modification indicating that the attachment was removed; and send the modified email to the email client; wherein the computer code is further configured to determine whether an attachment included in the received email is infected with malicious code by; parsing the received email; converting the received email into an internal format; and determining, at the proxy server, whether the converted received email includes malicious code using a virus signature file. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
18. A computer system for maintaining computer security comprising:
one or more computers configured to store computer code executable by the one or more computers, the computer code configured to; receive, at a proxy server, an email directed from an email server to an email client associated with the email server; scan an email message included in the received email using intrusion detection signatures to determine if the email message would exploit a vulnerability associated with the email server; determine whether an attachment included in the received email is infected with malicious code by; parsing the received email; converting the received email into an internal format; and determining, at the proxy server, whether the converted received email includes malicious code using a virus signature file; and based on a determination where the attachment is infected; remove the attachment from the received email; modify the received email, the modification indicating that the attachment was removed; and send the modified email to the email client. - View Dependent Claims (19)
-
20. A non-transitory computer storage medium including computer executable code for maintaining computer security, wherein the code is configured to:
-
receive, at a proxy server, an email directed from an email server to an email client associated with the email server; scan an email message included in the received email using intrusion detection signatures to determine if the email message would exploit a vulnerability associated with the email server; determine whether an attachment included in the received email is infected with malicious code by; parsing the received email; converting the received email into an internal format; and determining, at the proxy server, whether the converted received email includes malicious code using a virus signature file; and based on a determination that the attachment is infected; remove the attachment from the received email; modify the received email, the modification indicating that the attachment was removed; and send the modified email to the email client. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification