DISARMING MALWARE IN DIGITALLY SIGNED CONTENT
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for disarming malicious code in digitally-signed content are provided. An example method includes determining that content is associated with a first digital signature, modifying at least a portion of digital values of the content to disable any malicious code included in the content, thereby creating modified content, and signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
6 Citations
44 Claims
-
1-24. -24. (canceled)
-
25. A system for disarming malicious code in digitally-signed content, the system comprising:
-
means for determining that content is associated with a first digital signature; means for creating modified content by modifying at least a portion of digital values of the content to disable any malicious code included in the content; and means for signing the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
-
-
38. A method for disarming malicious code in a computer system having a processor, the method comprising:
-
determining that input content associated with a recipient in a network is signed with a first digital signature; verify authenticity of the first digital signature; generating modified input content by modifying at least a portion of digital values of the input content to disable any malicious code included in the input content; and signing the modified input content with a second digital signature, the signed modified input content including one or more elements indicative of the authenticity of the first digital signature.
-
-
44. A non-transitory computer-readable medium comprising instructions that when executed by a processor cause the processor to:
-
determine that content is associated with a first digital signature; create modified content by modifying at least a portion of digital values of the content to disable any malicious code included in the content; and sign the modified content with a second digital signature, thereby creating signed modified content, the signed modified content including a data element corresponding to the first digital signature.
-
Specification