System and method for attaching a downloadable security profile to a downloadable
DC CAFCFirst Claim
1. A method comprising:
- receiving by an inspector a Downloadable;
generating by the inspector a first Downloadable security profile that identifies suspicious code in the received Downloadable; and
linking by the inspector the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients.
6 Assignments
Litigations
4 Petitions

Reexamination
Accused Products

Abstract
A system comprises an inspector and a protection engine. The inspector includes a content inspection engine that uses a set of rules to generate a Downloadable security profile corresponding to a Downloadable, e.g., Java™ applets, ActiveX™ controls, JavaScript™ scripts, or Visual Basic scripts. The content inspection engine links the Downloadable security profile to the Downloadable. The set of rules may include a list of suspicious operations, or a list of suspicious code patterns. The first content inspection engine may link to the Downloadable a certificate that identifies the content inspection engine which created the Downloadable security profile. Additional content inspection engines may generate and link additional Downloadable security profiles to the Downloadable. Each additional Downloadable security profile may also include a certificate that identifies its creating content inspection engine. Each content inspection engine preferably creates a Downloadable ID that identifies the Downloadable to which the Downloadable security profile corresponds. The protection includes a Downloadable interceptor for receiving a Downloadable, a file reader coupled to the interceptor for determining whether the Downloadable includes a Downloadable security profile, an engine coupled to the file reader for determining whether to trust the Downloadable security profile, and a security policy analysis engine coupled to the verification engine for comparing the Downloadable security profile against a security policy if the engine determines that the Downloadable security profile is trustworthy. A Downloadable ID verification engine retrieves the Downloadable ID that identifies the Downloadable to which the Downloadable security profile corresponds, generates the Downloadable ID for the Downloadable and compares the generated Downloadable to the linked Downloadable. The protection engine further includes a certificate authenticator for authenticating the certificate that identifies a content inspection engine which created the Downloadable security profile as from a trusted source. The certificate authenticator can also authenticate a certificate that identifies a developer that created the Downloadable.
718 Citations
44 Claims
-
1. A method comprising:
-
receiving by an inspector a Downloadable; generating by the inspector a first Downloadable security profile that identifies suspicious code in the received Downloadable; and linking by the inspector the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An inspector system comprising:
-
memory storing a first rule set; and a first content inspection engine for using the first rule set to generate a first Downloadable security profile that identifies suspicious code in a Downloadable, and for linking the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method performed by a network gateway comprising:
-
receiving a Downloadable with a linked Downloadable security profile that identifies suspicious code in the Downloadable, the Downloadable security profile being linked to the Downloadable before the web server make the Downloadable available to the web client; and comparing the Downloadable security profile against a security policy.
-
-
23. A method performed by a network gateway comprising:
-
receiving a Downloadable with a linked first Downloadable security profile that identifies suspicious code in the Downloadable, the Downloadable security profile being linked to the Downloadable before the web server make the Downloadable available to the web client; determining whether to trust the first Downloadable security profile; and comparing the first Downloadable security profile against the security policy if the first Downloadable security profile is trustworthy. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A network gateway system comprising:
-
a Downloadable interceptor for receiving a Downloadable; a file reader coupled to the interceptor for determining whether the Downloadable includes a linked Downloadable security profile that identifies suspicious code in the Downloadable, wherein if the Downloadable includes a linked Downloadable security profile, the Downloadable was linked before the web server makes the Downloadable available to the web client; an engine coupled to the file reader for determining whether to trust the Downloadable security profile; and a security policy analysis engine coupled to a verification engine for comparing the Downloadable security profile against a security policy if the engine determines that the Downloadable security profile is trustworthy. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A computer-readable storage medium storing program code for causing a data processing system on an inspector to perform the steps of:
-
receiving a Downloadable; generating a first Downloadable security profile that identifies suspicious code in the received Downloadable; and linking the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients.
-
-
42. A computer-readable storage medium storing program code for causing a data processing system on a network gateway to perform the steps of:
-
receiving a Downloadable with a linked first Downloadable security profile that identifies suspicious code in the Downloadable, the Downloadable security profile being linked to the Downloadable before the web server make the Downloadable available to the web client; determining whether to trust the first Downloadable security profile; and comparing the first Downloadable security profile against the security policy if the first Downloadable security profile is trustworthy.
-
-
43. An inspector system comprising:
-
means for receiving a Downloadable; means for generating a first Downloadable security profile that identifies suspicious code in the received Downloadable; and means for linking the first Downloadable security profile to the Downloadable before a web server makes the Downloadable available to web clients.
-
-
44. A network gateway system comprising:
-
means for receiving a Downloadable with a linked first Downloadable security profile that identifies suspicious code in the Downloadable, the Downloadable security profile being linked to the Downloadable before the web server make the Downloadable available to the web client; means for determining whether to trust the first Downloadable security profile; and means for comparing the first Downloadable security profile against the security policy if the first Downloadable security profile is trustworthy.
-
Specification