Disarming malware in digitally signed content
First Claim
Patent Images
1. A method for disarming malicious code in digitally-signed content in a computer system having a processor, the method comprising:
- determining, by the processor, that content is associated with a first digital signature;
modifying, by the processor, at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content; and
signing, by the processor, the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for disarming malicious code in digitally-signed content are provided. An example method includes determining that content is associated with a first digital signature, modifying at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content, and signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
33 Citations
24 Claims
-
1. A method for disarming malicious code in digitally-signed content in a computer system having a processor, the method comprising:
-
determining, by the processor, that content is associated with a first digital signature; modifying, by the processor, at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content; and signing, by the processor, the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for disarming malicious code in a computer system having a processor, the method comprising:
-
determining that input content associated with a recipient in a network is associated with a first digital signature; communicating with an authentication service to verify authenticity of the first digital signature; modifying at least a portion of digital values of the input content to disable any malicious code included in the input content, thereby creating modified input content; and signing the modified input content with a second digital signature, thereby creating signed modified input content, the signed modified input content including one or more elements indicative of the authenticity of the first digital signature. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for disarming malicious code in digitally-signed content, the system comprising:
-
a memory device storing a set of instructions; and a processor configured to execute the set of instructions to; determine that content is associated with a first digital signature; modify at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content; and sign the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
-
-
24. A system for disarming malicious code, the system comprising:
-
a memory device storing a set of instructions; and a processor configured to execute the set of instructions to; determine that input content associated with a recipient in a network is associated with a first digital signature; communicate with an authentication service to verify authenticity of the first digital signature; modify at least a portion of digital values of the input content to disable any malicious code included in the input content, thereby creating modified input content; and sign the modified input content with a second digital signature, thereby creating signed modified input content, the signed modified input content including one or more elements indicative of the authenticity of the first digital signature.
-
Specification