System and method for protecting a computer and a network from hostile downloadables
DC CAFCFirst Claim
1. A computer-based method, comprising the steps of:
- receiving an incoming Downloadable addressed to a client, by a server that serves as a gateway to the client;
comparing, by the server, Downloadable security profile data pertaining to the Downloadable, the Downloadable security profile data includes a list a suspicious computer operations that may be attempted by the Downloadable, against a security policy to determine if the security policy has been violated; and
preventing execution of the Downloadable by the client if the security policy has been violated.
5 Assignments
Litigations
0 Petitions
Reexamination
Accused Products
Abstract
A system protects a computer from suspicious Downloadables. The system comprises a security policy, an interface for receiving a Downloadable, and a comparator, coupled to the interface, for applying the security policy to the Downloadable to determine if the security policy has been violated. The Downloadable may include a Java™ applet, an ActiveX™ control, a JavaScript™ script, or a Visual Basic script. The security policy may include a default security policy to be applied regardless of the client to whom the Downloadable is addressed, or a specific security policy to be applied based on the client or the group to which the client belongs. The system uses an ID generator to compute a Downloadable ID identifying the Downloadable, preferably, by fetching all components of the Downloadable and performing a hashing function on the Downloadable including the fetched components. Further, the security policy may indicate several tests to perform, including (1) a comparison with known hostile and non-hostile Downloadables; (2) a comparison with Downloadables to be blocked or allowed per administrative override; (3) a comparison of the Downloadable security profile data against access control lists; (4) a comparison of a certificate embodied in the Downloadable against trusted certificates; and (5) a comparison of the URL from which the Downloadable originated against trusted and untrusted URLs. Based on these tests, a logical engine can determine whether to allow or block the Downloadable.
802 Citations
68 Claims
-
1. A computer-based method, comprising the steps of:
-
receiving an incoming Downloadable addressed to a client, by a server that serves as a gateway to the client; comparing, by the server, Downloadable security profile data pertaining to the Downloadable, the Downloadable security profile data includes a list a suspicious computer operations that may be attempted by the Downloadable, against a security policy to determine if the security policy has been violated; and preventing execution of the Downloadable by the client if the security policy has been violated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 61, 62)
-
-
32. A system for execution by a server that serves as a gateway to a client, the system comprising:
-
a security policy; an interface for receiving an incoming Downloadable addressed to a client; a comparator, coupled to the interface, for comparing Downloadable security profile data pertaining to the Downloadable, the Downloadable security profile data includes a list a suspicious computer operations that may be attempted by the Downloadable, against the security policy to determine if the security policy has been violated; and a logical engine for preventing execution of the Downloadable by the client if the security policy has been violated. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 63)
-
-
64. A system for execution on a server that serves as a gateway to a client, comprising:
-
means for receiving an incoming Downloadable addressed to a client; means for comparing Downloadable security profile data pertaining to the Downloadable, the Downloadable security profile data includes a list a suspicious computer operations that may be attempted by the Downloadable, against a security policy to determine if the security policy has been violated; and means for preventing execution of the Downloadable by the client if the security policy has been violated.
-
-
65. A computer-readable storage medium storing program code for causing a server that serves as a gateway to a client to perform the steps of:
-
receiving an incoming Downloadable addressed to a client; comparing Downloadable security profile data pertaining to the Downloadable against a security policy to determine if the security policy has been violated; and preventing execution of the Downloadable by the client if the security policy has been violated.
-
-
66. A method, comprising:
-
receiving a Downloadable; decomposing the Downloadable into Downloadable security profile data;
the Downloadable security profile data includes a list a suspicious computer operations that may be attempted by the Downloadable,comparing the Downloadable security profile data against a security policy; and preventing execution of the Downloadable if the Downloadable security profile data violates the security policy. - View Dependent Claims (67)
-
-
68. A method, comprising:
-
providing memory storing known-Downloadable security profile data and a that includes a list a suspicious computer operations that may be attempted by a Downloadable known-Downloadable ID corresponding to the Downloadable security profile data; receiving an incoming Downloadable; fetching all components referenced by the incoming Downloadable; performing a hashing function of the Downloadable and the components to compute an incoming-Downloadable ID; comparing the known-Downloadable ID against the incoming-Downloadable ID; retrieving the Downloadable security profile data if the known-Downloadable ID and the incoming-Downloadable ID match; and comparing the Downloadable security profile data against a security policy to determine if the incoming Downloadable violates the security policy.
-
Specification