Method and system for protecting a computer and a network from hostile downloadables
DC CAFCFirst Claim
1. A computer-based method, comprising the steps of:
- receiving an incoming Downloadable;
performing a hashing function on the incoming Downloadable to compute an incoming Downloadable ID;
retrieving security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable;
appending a representation of the retrieved Downloadable security profile data to the incoming Downloadable, to generate an appended Downloadable; and
transmitting the appended Downloadable to a destination computer.
7 Assignments
Litigations
5 Petitions

Accused Products

Abstract
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
105 Citations
30 Claims
-
1. A computer-based method, comprising the steps of:
-
receiving an incoming Downloadable; performing a hashing function on the incoming Downloadable to compute an incoming Downloadable ID; retrieving security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable; appending a representation of the retrieved Downloadable security profile data to the incoming Downloadable, to generate an appended Downloadable; and transmitting the appended Downloadable to a destination computer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for managing Downloadables, comprising:
-
a receiver for receiving an incoming Downloadable; a Downloader identifier for performing a hashing function on the incoming Downloadable to compute an incoming Downloadable ID; a database manager for retrieving security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable; a file appender coupled with said receiver for appending are presentation of the Downloadable security profile data to the incoming Downloadable, to generate an appended Downloadable; and a transmitter coupled with said file appender, for transmitting the appended Downloadable to a destination computer. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-based method, comprising the steps of:
-
receiving an incoming Downloadable; performing a hashing function on the incoming Downloadable to compute an incoming Downloadable ID; retrieving security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable; and transmitting the incoming Downloadable and a representation of the retrieved Downloadable security profile data to a destination computer, via a transport protocol transmission. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A system for managing Downloadables, comprising:
-
a receiver for receiving an incoming Downloadable; a Downloadable identifier for performing a hashing function on the incoming Downloadable to compute an incoming Downloadable ID; a database manager for retrieving security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable; and a transmitter coupled with said receiver, for transmitting the incoming Downloadable and a representation of the retrieved Downloadable security profile data to a destination computer, via a transport protocol transmission. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A computer-readable storage medium storing program code for causing at least one computing device to:
-
receive an incoming Downloadable; perform a hashing function on the incoming Downloadable to compute an incoming Downloadable ID; retrieve security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable; append a representation of the retrieved Downloadable security profile data to the incoming Downloadable, to generate an appended Downloadable; and transmit the appended Downloadable to a destination computer.
-
-
30. A computer-readable storage medium storing program code for causing at least one computing device to:
-
receive an incoming Downloadable; perform a hashing function on the incoming Downloadable to compute an incoming Downloadable ID; retrieve security profile data for the incoming Downloadable from a database of Downloadable security profiles indexed according to Downloadable IDs, based on the incoming Downloadable ID, the security profile data including a list of suspicious computer operations that may be attempted by the Downloadable; and transmit the incoming Downloadable and a representation of the retrieved Downloadable security profile data to a destination computer, via a transport protocol transmission.
-
Specification