×

Filtering hidden data embedded in media files

  • US 9,860,212 B2
  • Filed: 05/23/2017
  • Issued: 01/02/2018
  • Est. Priority Date: 04/30/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • intercepting network traffic, by a network security device protecting a private network, directed to an intended recipient associated with the private network;

    identifying, by the network security device, existence of a media file within the network traffic;

    performing a pre-match inspection, by the network security device, of the media file by;

    generating a signature of the media file; and

    detecting presence of a potentially malicious hidden data item in a form of encoded data within one or more of a digital watermark, steganography and a barcode embedded in the media file by comparing the generated signature with a plurality of signatures of known unsafe media files;

    when no threat is identified as being associated with the media file by the pre-match inspection, then determining, by the network security device, whether the potentially malicious hidden data item violates a security policy of a plurality of security policies of the private network enforced by the network security device by performing local content inspection processing of the media file by decoding the encoded data and applying a content filter to a result of said decoding;

    when no threat is identified as being associated with the media file by the local content inspection processing, causing, by the network security device, a remote or cloud-based network security appliance external to the private network to perform further evaluation of the media file by sending the media file or the generated signature to the remote or cloud-based network security appliance;

    when no threat is identified as being associated with the media file by the remote or cloud-based network security appliance, then allowing, by the network security device, the network traffic to be delivered to the intended recipient; and

    when a threat is identified as being associated with the media file by any of the pre-match inspection, the local content evaluation and the remote or cloud-based network security appliance, then blocking, by the network security device, delivery of the network traffic to the intended recipient.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×