Unlock instant, AI-driven research and patent intelligence for your innovation.

Improvements in resisting the spread of unwanted code and data

A technology of content data and predetermined data, which is applied in the fields of electronic digital data processing, instruments, calculations, etc., can solve the problems of high protection, users cannot download updates, time increase, etc.

Inactive Publication Date: 2014-01-22
GLASSWALL IP
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While this is acceptable in virus scan mode, in monitor mode it adds a growing wait time to the time it takes to access files
Furthermore, as downloads become larger and need to be downloaded more frequently, there is a very high risk that users will not be able to download the necessary updates, and thus will not be protected against the latest (and thus most dangerous) viruses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improvements in resisting the spread of unwanted code and data
  • Improvements in resisting the spread of unwanted code and data
  • Improvements in resisting the spread of unwanted code and data

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0041] figure 1 The basic system layout according to the first embodiment of the present invention is schematically shown. An electronic file is created at source 102 and transmitted over transmission medium 103 . Transmission medium 103 may be any suitable medium for transmitting electronic files, such as a hardwired or wireless system or network. The electronic file travels through the transmission medium 103 in the normal manner until it reaches its destination. In this embodiment, an AV (Anti-Virus) application 105 is installed in the destination system 109 . The AV application 105 operates such that data in the input electronic file is not allowed to enter the operating system 107 of the destination system 109 until the data is analyzed and regenerated if the data is determined to be permissible. As described below, some portions of the received electronic file may be analyzed for predefined allowable formats, and for other portions of the received electronic file a ha...

no. 2 example

[0086] In a second embodiment described below, which is similar to the first embodiment, the electronic file is an electronic mail transmitted over the Internet from an originator to a destination device (in this embodiment an Internet Service Provider (ISP)). The ISP forwards the email to the email client server, which, upon receipt, forwards the email to the intended recipient's inbox.

[0087] Figure 7 The layout of the e-mail system according to this embodiment is shown, in which the AV application of the present invention is included. The sender forwards the email from the source location 201 . The email is forwarded via the Internet 203 to an Internet Service Provider (ISP) 205 identified by the domain name contained within the email. The recipient's email client server 207 is connected to the ISP 205 via a direct open connection. The first connection is a Simple Mail Transfer Protocol (SMTP) outgoing connection for forwarding outgoing email from email client server ...

no. 3 example

[0140] refer to Figure 10 , A third embodiment of the present invention will now be described. This third embodiment incorporates all the features of the first or second embodiment, including any options discussed with respect to the first or second embodiment.

[0141] This embodiment relates to a case where an AV application blocks a part, a part, or the entire e-mail (referred to as "non-compliant part" in this embodiment). refer to image 3 , as discussed in the first embodiment, based on various reasons, such a situation may occur, for example, in step S3-15, because part of the passive content data does not conform to the predetermined format and the clear mode flag is not set, it may be set to The entire file is put into quarantine. Optionally, if the clear mode flag is set in step S3-11, some passive content data may be omitted.

[0142] In this embodiment, when the AV application determines that the electronic file or a sub-portion thereof does not conform, the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of processing an electronic file by identifying portions of content data in the electronic file and determining if each portion of content data is passive content data having a fixed purpose or active content data having an associated function. If a portion is passive content data, then a determination is made as to whether the portion of passive content data is to be re-generated. If a portion is active content data, then the portion is analysed to determine whether the portion of active content data is to be re-generated. A re-generated electronic file is then created from the portions of content data which are determined to be re-generated.

Description

[0001] Case Description [0002] This application is a divisional application of a Chinese patent application with the filing date of November 8, 2007, the application number of 200780050858.7, and the title of "Improvements to Prevent the Spread of Harmful Codes and Data". technical field [0003] The present invention relates to computer systems and methods of operating such systems for preventing the spread of harmful code and data. In particular, the present invention is an improvement over the system and method described in the applicant's related UK patent application 0511749.4. Background technique [0004] Over the past decade, computer systems have been increasingly attacked by harmful code. The most extreme (by far) example of harmful code is a computer virus. Like its biological namesake, a computer virus infects a machine, and from there, by commandeering the resources of the e-mail system and using the address books of every computer it logs into, emails conta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/565G06Q10/107H04L63/1408H04L63/145H04L63/1416G06F2221/03
Inventor 塞缪尔·哈里森·哈顿特雷沃·戈达德
Owner GLASSWALL IP