Malicious mobile code runtime monitoring system and methods
DC CAFCFirst Claim
1. A computer processor-based method, comprising:
- receiving, by a computer, downloadable-information;
determining, by the computer, whether the downloadable-information includes executable code; and
based upon the determination, transmitting from the computer mobile protection code to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code.
6 Assignments
Litigations
5 Petitions

Reexaminations
Accused Products

Abstract
Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java™ applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides, within a server, firewall or other suitable “re-communicator,” for monitoring information received by the communicator, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information, more suitably by forming a protection agent including the MPC, protection policies and a detected-Downloadable. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts, more suitably in conjunction with protection policies.
101 Citations
41 Claims
-
1. A computer processor-based method, comprising:
-
receiving, by a computer, downloadable-information; determining, by the computer, whether the downloadable-information includes executable code; and based upon the determination, transmitting from the computer mobile protection code to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer processor-based system for computer security, the system comprising
an information monitor for receiving downloadable-information by a computer; -
a content inspection engine communicatively coupled to the information monitor for determining, by the computer, whether the downloadable-information includes executable code; and a protection agent engine communicatively coupled to the content inspection engine for causing mobile protection code (“
MPC”
) to be communicated by the computer to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A processor-based system for computer security, the system comprising:
-
means for receiving downloadable-information; means for determining whether the downloadable-information includes executable code; and means for causing mobile protection code to be communicated to at least one information-destination of the downloadable-information, if the downloadable-information is determined to include executable code.
-
-
14. A computer program product, comprising a computer usable medium having a computer readable program code therein, the computer readable program code adapted to be executed for computer security, the method comprising:
-
providing a system, wherein the system comprises distinct software modules, and wherein the distinct software modules comprise an information re-communicator and a mobile code executor; receiving, at the information re-communicator, downloadable-information including executable code; and causing mobile protection code to be executed by the mobile code executor at a downloadable-information destination such that one or more operations of the executable code at the destination, if attempted, will be processed by the mobile protection code. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
-
21. A processor-based system for computer security, the system comprising:
-
receiving means for receiving, at an information re-communicator of a computer, downloadable-information, including executable code; and mobile code means communicatively coupled to the receiving means for causing, by the computer, mobile protection code to be executed by a mobile code executor at a downloadable-information destination such that one or more operations of the executable code at the destination, if attempted, will be processed by the mobile protection code. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A processor-based method, comprising:
-
receiving a sandboxed package that includes mobile protection code (“
MPC”
) and a Downloadable and one or more protection policies at a computer at a Downloadable-destination;causing, by the MPC on the computer, one or more operations attempted by the Downloadable to be received by the MPC; receiving, by the MPC on the computer, an attempted operation of the Downloadable; and initiating, by the MPC on the computer, a protection policy corresponding to the attempted operation. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. A processor-based system for computer security, the system comprising:
-
a mobile code executor on a computer for initiating received mobile code; and a sandboxed package capable of being received and initiated by the mobile code executor on the computer, the sandboxed package including a Downloadable and mobile protection code (“
MPC”
) for causing one or more Downloadable operations to be intercepted by the computer and for processing the intercepted operations by the computer, if the Downloadable attempts to initiate the operations. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
-
41. A processor-based system for computer security, the system comprising:
-
receiving means for receiving a sandboxed package that includes mobile protection code (“
MPC”
) and a Downloadable and one or more protection policies at a Downloadable-destination;monitoring means for causing, by the MPC, one or more operations attempted by the Downloadable to be received by the MPC; second receiving means receiving, by the MPC, an attempted operation of the Downloadable; and initiating means for initiating, by the MPC, a protection policy corresponding to the attempted operation.
-
Specification