Buffered viewing of electronic documents
First Claim
1. A computer-implemented method of buffering an electronic document containing a plurality of unsafe features received from a sender, said method comprising:
- establishing, by a client computer, a set of rules and patterns to detect said plurality of unsafe features in source codes;
receiving, by said client computer, an original source code of said electronic document containing said plurality of unsafe features, said plurality of unsafe features including undesired executable coding including hidden commands which, when executed, causes said client computer to perform undesired operations;
caching, by said client computer, said electronic document in a buffer of said client computer;
determining, by said client computer, said electronic document contains said plurality of unsafe features by applying said set of rules and patterns to said electronic document to identify said undesired executable coding;
producing, by said client computer, an alternate source code of said electronic document, which eliminates said undesired executable coding of said plurality of unsafe features from said original source code by replacing said undesired executable coding with said alternate source code which does not cause said client computer to perform said undesired operations and displays a message indicating said plurality of unsafe features have been removed;
presenting, by said client computer, a description of said undesired executable coding of said plurality of unsafe features from said original source code, said description identifying said hidden commands and explaining an effect of said undesired executable coding in a window display on said client computer;
presenting, to a user of said client computer, a choice of whether to replace said undesired executable coding from said original source code with said alternate source code to produce a safe electronic document, and caching said safe electronic document in said buffer;
gathering, by said client computer, information about said choice of said user, and using said information to adjust said set of rules and patterns; and
executing, by said client computer, said safe electronic document that is cached so as to display said safe electronic document corresponding to said electronic document and said message indicating said plurality of unsafe features contained in said electronic document have been removed, said safe electronic document avoiding performance, by said client computer, of said undesired operations.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, program storage device, and method of buffering an electronic document received from a host computer, wherein the method comprises determining whether an original source code of the electronic document includes executable coding which when executed by a client computer, causes the client computer to perform undesired operations, and producing an alternate source code of the electronic document, which eliminates the coding, wherein the undesired operations are characterized as undesirable based on predetermined settings established by the client computer. The electronic document comprises any of a web page, electronic mail message, an electronic mail attachment, a note in a hypertext format, a text document, a text file, and an application-specific electronic document. Each of the original source code and the alternate source code comprises a hypertext transfer protocol (HTTP) source code.
60 Citations
41 Claims
-
1. A computer-implemented method of buffering an electronic document containing a plurality of unsafe features received from a sender, said method comprising:
-
establishing, by a client computer, a set of rules and patterns to detect said plurality of unsafe features in source codes; receiving, by said client computer, an original source code of said electronic document containing said plurality of unsafe features, said plurality of unsafe features including undesired executable coding including hidden commands which, when executed, causes said client computer to perform undesired operations; caching, by said client computer, said electronic document in a buffer of said client computer; determining, by said client computer, said electronic document contains said plurality of unsafe features by applying said set of rules and patterns to said electronic document to identify said undesired executable coding; producing, by said client computer, an alternate source code of said electronic document, which eliminates said undesired executable coding of said plurality of unsafe features from said original source code by replacing said undesired executable coding with said alternate source code which does not cause said client computer to perform said undesired operations and displays a message indicating said plurality of unsafe features have been removed; presenting, by said client computer, a description of said undesired executable coding of said plurality of unsafe features from said original source code, said description identifying said hidden commands and explaining an effect of said undesired executable coding in a window display on said client computer; presenting, to a user of said client computer, a choice of whether to replace said undesired executable coding from said original source code with said alternate source code to produce a safe electronic document, and caching said safe electronic document in said buffer; gathering, by said client computer, information about said choice of said user, and using said information to adjust said set of rules and patterns; and executing, by said client computer, said safe electronic document that is cached so as to display said safe electronic document corresponding to said electronic document and said message indicating said plurality of unsafe features contained in said electronic document have been removed, said safe electronic document avoiding performance, by said client computer, of said undesired operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method of filtering an electronic document containing a plurality of unsafe features received from a sender, said method comprising:
-
establishing, by a client computer, a set of rules and patterns to detect said plurality of unsafe features in coding instructions; receiving, by a client computer, first coding instructions of said electronic document including said plurality of unsafe features including undesired executable coding and hidden commands that cause changes in a configuration of said client computer which are undesired by said client computer; caching, by said client computer, said electronic document in a buffer of said client computer; determining, by said client computer, said electronic document contains said plurality of unsafe features by applying said set of rules and patterns to said electronic document to identify said undesired executable coding; producing, by said client computer, second coding instructions for said electronic document, which eliminates said undesired executable coding of said plurality of unsafe features from said first coding instructions by replacing said undesired executable coding with said second coding instructions which do not cause said client computer to change said configuration and display a message indicating said plurality of unsafe features have been removed; presenting, by said computer, a description of said undesired executable coding of said plurality of unsafe features from said first coding instructions, said description identifying said hidden commands and explaining an effect on said unsafe features in a window display on said client computer; presenting, to a user of said client computer, a choice of whether to replace said undesired executable coding from said first coding instructions with said second coding instructions to produce a safe electronic document, and caching said safe electronic document in said buffer; and executing, by said client computer, said safe electronic document that is cached, so as to display said safe electronic document corresponding to said electronic document and said message indicating said plurality of unsafe features contained in said electronic document have been removed, said safe electronic document avoiding said changes of said configuration of said client computer which are undesired.
-
-
17. A computer system comprising a non-transitory program storage device for storing instructions executable by a client computer to perform a method for filtering an electronic document containing a plurality of unsafe features received from a sender, said system comprising:
-
a memory that caches source codes; and a processor processing operations of; establishing a set of rules and patterns to detect said plurality of unsafe features in said source codes; receiving an original source code of said electronic document containing said plurality of unsafe features, said plurality of unsafe features including undesired executable coding including hidden commands which, when executed, perform undesired operations; caching said electronic document in a buffer of said client computer; determining said electronic document contains said plurality of unsafe features by applying said set of rules and patterns to said electronic document to identify said undesired executable coding; producing an alternate source code of said electronic document, which eliminates said undesired executable coding of said plurality of unsafe features from said original source code by replacing said undesired executable coding with said alternate source code which does not perform said undesired operations and displays a message indicating said plurality of unsafe features have been removed; presenting a description of said undesired executable coding of said plurality of unsafe features from said original source code, said description identifying said hidden commands and explaining an effect of said undesired executable coding in a window display; presenting to a user, a choice of whether to replace said undesired executable coding from said original source code with said alternate source code to produce a safe electronic document, and caching said safe electronic document in said buffer; gathering information about said choice of said user, and using said information to adjust said set of rules and patterns; and executing said safe electronic document that is cached so as to display said safe electronic document corresponding to said electronic document and said message indicating said plurality of unsafe features contained in said electronic document have been removed, said safe electronic document avoiding performance of said undesired operations. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A tangible program storage device readable by computer, tangibly embodying a program of instructions executable by said computer to perform a computer-implemented method of buffering an electronic document containing a plurality of unsafe features received from a sender, said method comprising:
-
establishing a set of rules and patterns to detect said plurality of unsafe features in said source codes; receiving an original source code of said electronic document containing said plurality of unsafe features, said plurality of unsafe features including undesired executable coding including hidden commands which, when executed, perform undesired operations; caching said electronic document in a buffer of said client computer; determining said electronic document contains said plurality of unsafe features by applying said set of rules and patterns to said electronic document to identify said undesired executable coding; producing an alternate source code of said electronic document, which eliminates said undesired executable coding of said plurality of unsafe features from said original source code by replacing said undesired executable coding with said alternate source code which does not perform said undesired operations and displays a message indicating said plurality of unsafe features have been removed; presenting a description of said undesired executable coding of said plurality of unsafe features from said original source code, said description identifying said hidden commands and explaining an effect of said undesired executable coding in a window display; presenting to a user, a choice of whether to replace said undesired executable coding from said original source code with said alternate source code to produce a safe electronic document in said buffer; gathering information about said choice of said user, and using said information to adjust said set of rules and patterns; and executing said safe electronic document that is cached so as to display said safe electronic document corresponding to said electronic document and said message indicating said plurality of unsafe features contained in said electronic document have been removed, said safe electronic document avoiding performance of said undesired operations. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification