Improvements in resisting the spread of unwanted code and data
A technology of content data and predetermined data, which is applied in the fields of electronic digital data processing, instruments, calculations, etc., can solve the problems of high protection, users cannot download updates, time increase, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0041] figure 1 The basic system layout according to the first embodiment of the present invention is schematically shown. An electronic file is created at source 102 and transmitted over transmission medium 103 . Transmission medium 103 may be any suitable medium for transmitting electronic files, such as a hardwired or wireless system or network. The electronic file travels through the transmission medium 103 in the normal manner until it reaches its destination. In this embodiment, an AV (Anti-Virus) application 105 is installed in the destination system 109 . The AV application 105 operates such that data in the input electronic file is not allowed to enter the operating system 107 of the destination system 109 until the data is analyzed and regenerated if the data is determined to be permissible. As described below, some portions of the received electronic file may be analyzed for predefined allowable formats, and for other portions of the received electronic file a ha...
no. 2 example
[0086] In a second embodiment described below, which is similar to the first embodiment, the electronic file is an electronic mail transmitted over the Internet from an originator to a destination device (in this embodiment an Internet Service Provider (ISP)). The ISP forwards the email to the email client server, which, upon receipt, forwards the email to the intended recipient's inbox.
[0087] Figure 7 The layout of the e-mail system according to this embodiment is shown, in which the AV application of the present invention is included. The sender forwards the email from the source location 201 . The email is forwarded via the Internet 203 to an Internet Service Provider (ISP) 205 identified by the domain name contained within the email. The recipient's email client server 207 is connected to the ISP 205 via a direct open connection. The first connection is a Simple Mail Transfer Protocol (SMTP) outgoing connection for forwarding outgoing email from email client server ...
no. 3 example
[0140] refer to Figure 10 , A third embodiment of the present invention will now be described. This third embodiment incorporates all the features of the first or second embodiment, including any options discussed with respect to the first or second embodiment.
[0141] This embodiment relates to a case where an AV application blocks a part, a part, or the entire e-mail (referred to as "non-compliant part" in this embodiment). refer to image 3 , as discussed in the first embodiment, based on various reasons, such a situation may occur, for example, in step S3-15, because part of the passive content data does not conform to the predetermined format and the clear mode flag is not set, it may be set to The entire file is put into quarantine. Optionally, if the clear mode flag is set in step S3-11, some passive content data may be omitted.
[0142] In this embodiment, when the AV application determines that the electronic file or a sub-portion thereof does not conform, the e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 