×

Resisting the spread of unwanted code and data

  • US 8,533,824 B2
  • Filed: 11/08/2007
  • Issued: 09/10/2013
  • Est. Priority Date: 12/04/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a computer system for processing an electronic file, the method comprising the steps, performed by the computer system, of:

  • identifying a portion of content data in the electronic file;

    determining, by the computer system, if the identified portion of content data is passive content data having a fixed purpose or active content data having an associated function;

    if the identified portion of content data is determined to be passive content data, then;

    determining a file type or protocol of the portion of passive content data; and

    determining whether the portion of passive content data is to be re-generated by determining if the passive content data conforms to a predetermined data format comprising a set of rules corresponding to the file type or protocol;

    if the identified portion of content data is determined to be active content data, then analysing the portion of active content data to determine whether the portion of active content data is known good and therefore is to be re-generated; and

    re-generating the portion of content data to create a re-generated electronic file, if the portion of content data is determined to be re-generated,wherein said step of analyzing a portion of active content data comprises;

    (a) generating a hash for the portion of active content data, including normalizing the portion of active content data and generating a hash for the normalized portion of active content data;

    (b) determining if the generated hash is present in a hash database of hashed normalized known good active content data; and

    (c) determining that the portion of active content data is to be re-generated if it is determined in (b) that the generated hash is present in the hash database of normalized known known good active content data,wherein the method resists spread of unwanted code and data without scanning the electronic file for the unwanted code and data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×