Resisting the spread of unwanted code and data
DC CAFCFirst Claim
Patent Images
1. A method for resisting spread of unwanted code and data without scanning incoming electronic files for unwanted code and data, the method comprising the steps, performed by a computer system, of:
- (a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules;
(b) determining a purported predetermined file type of the incoming electronic file;
(c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type;
(d) determining nonconforming data in the content data that does not conform to the predetermined data format;
(e) determining that the nonconforming data is authorized; and
(f) regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized.
0 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data format, parsing the content data, to determine whether it conforms to the predetermined data format, and if the content data does conform to the predetermined data format, regenerating the parsed data to create a regenerated electronic file in the data format.
96 Citations
48 Claims
-
1. A method for resisting spread of unwanted code and data without scanning incoming electronic files for unwanted code and data, the method comprising the steps, performed by a computer system, of:
-
(a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules; (b) determining a purported predetermined file type of the incoming electronic file; (c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type; (d) determining nonconforming data in the content data that does not conform to the predetermined data format; (e) determining that the nonconforming data is authorized; and (f) regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer readable medium comprising a computer program adapted to steps of:
-
(a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules; (b) determining a purported predetermined file type of the incoming electronic file; (c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type; (d) determining nonconforming data in the content data that does not conform to the predetermined data format; (e) determining that the nonconforming data is authorized; and (f) regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized.
-
-
24. A semiconductor device comprising a memory including instructions for performing steps of:
-
(a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules; (b) determining a purported predetermined file type of the incoming electronic file; (c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type; (d) determining nonconforming data in the content data that does not conform to the predetermined data format; (e) determining that the nonconforming data is authorized; and (f) regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized. - View Dependent Claims (25)
-
-
26. A network card comprising a semiconductor device including a memory including instructions for performing steps of:
-
(a) receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules; (b) determining a purported predetermined file type of the incoming electronic file; (c) parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type; (d) determining nonconforming data in the content data that does not conform to the predetermined data format; (e) determining that the nonconforming data is authorized; and (f) regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized.
-
-
27. A system to resist spreading of unwanted code and data, comprising:
-
a computer; a memory in the computer; an input interface on the computer to receive an electronic file, the electronic file having a purported predetermined format; a conformity analyzing device to determine if the electronic file conforms to the purported predetermined format; and a threat analyzer to determine if the electronic file is authorized when the electronic file does not conform to the purported predetermined format, wherein a substitute electronic file is regenerated from the electronic file if the conformity analyzing device determines that the electronic file does not conform to the purported predetermined format and the threat filter determines that the electronic file is authorized. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A system to resist spread of unwanted code and data without scanning incoming electronic files for unwanted code and data, comprising
(a) means for receiving, at the computer system, an incoming electronic file containing content data in a predetermined file type corresponding to a set of rules; -
(b) means for determining a purported predetermined file type of the incoming electronic file; (c) means for parsing the content data in accordance with a predetermined data format comprising a set of rules corresponding to the determined purported predetermined file type; (d) means for determining nonconforming data in the content data that does not conform to the predetermined data format; (e) means for determining that the nonconforming data is authorized; and (f) means for regenerating the nonconforming data to create a substitute regenerated electronic file in the purported file type, said substitute regenerated electronic file containing the regenerated content data, if the nonconforming data is determined to be authorized. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
Specification