Claims
- 1. A method for preventing a computer worm from unauthorized use of data indicative of at least one e-mail address stored in a data base in encrypted form, said method comprising the steps of:
accessing a e-mail program; decrypting said selected ones of said data to provide access thereto; and addressing at least one e-mail message using said decrypted data.
- 2. The method as recited in claim 1 further comprising the step of:
encrypting said selected decrypted data.
- 3. The method as recited in claim 1, wherein said encrypted data form comprises the steps of:
obtaining a key value; selecting each of said at least one e-mail address; encrypting said selected e-mail address using said key value; and storing said encrypted e-mail in said data base.
- 4. The method as recited in claim 1, wherein the step of decrypting said data comprises the steps of:
obtaining a key value; selecting desired ones of said at least one e-mail address stored in said data base; and decrypting said selected desired ones of said at least one e-mail address.
- 5. The method as recited in claim 3, wherein the step of obtaining said key value comprises the steps of:
determining whether a key value is available; and inputting said key value when said key value is unavailable.
- 6. The method as recited in claim 4, wherein the step of obtaining said key value comprises the steps of:
determining whether a key value is available; and inputting said key value when said key value is unavailable.
- 7. The method as recited in claim 1, wherein the step of receiving said e-mail messages further comprises the steps of:
verifying said data is encrypted.
- 8. The method as recited in claim 1, wherein the step of encrypting utilizes a method selected from the group comprising: public/private key, translation, proxy, substitution.
- 9. The method as recited in claim 1, wherein the step of decryption utilizes a method selected from the group comprising: public/private key, translation, proxy, substitution.
- 10. A system for preventing a computer worm from unauthorized use of data indicative of at least one e-mail address stored in a data base in a encrypted form, said system comprising:
a processor in communication with a memory operable to execute code for:
decrypting said selected ones of said data; and addressing at least one e-mail message using said decrypted data.
- 11. The system as recited in claim 10, wherein said processor is further operable to execute code for:
encrypting said selected decrypted data.
- 12. The system as recited in claim 10, wherein said processor is operable to encrypt said data by executing code to:
obtain a key value; select each of said at least one e-mail address; encrypt said selected e-mail address using said key value; and store said encrypted e-mail in said a data base.
- 13. The system as recited in claim 10, wherein said processor decrypting code is operable to:
obtain a key value; select desired ones of said at least one e-mail address stored in said data base; and decrypt said selected desired ones of said at least one e-mail address.
- 14. The system as recited in claim 12, wherein said processor key obtaining code is operable to:
determine whether a key value is available; and to receive said key value when said key value is unavailable.
- 15. The system as recited in claim 13, processor key obtaining code is operable to:
determine whether a key value is available; and to receive said key value when said key value is unavailable.
- 16. The system as recited in claim 10, wherein processor is further operable to execute code for:
verifying said data is encrypted prior to receiving said e-mail.
- 17. The system as recited in claim 10, wherein said processor is further operable to execute code for encrypting said data wherein said encryption process is selected from the group comprising: public/private key, translation, proxy, substitution.
- 18. The system as recited in claim 10, wherein said processor is further operable to execute code for decrypting said data wherein said decryption process is selected from the group comprising: public/private key, translation, proxy, substitution.
- 19. The system as recited in claim 10, wherein said key value is contained in an external device.
- 20. The system as recited in claim 19, wherein said external device is in communication with said processor over network.
- 21. The system as recited in claim 20 wherein said network is selected from the group comprising: PCMCIA, PCI, USB, ISA, SCSI, FIREWIRE, BLUETOOTH, PS/2, WIFI.
- 22. The system as recited in 10, wherein said code is contained in said memory.
- 23. A method for preventing dissemination of computer worms comprising the steps of:
scrambling data indicative of e-mail addresses using a known scrambling technique, wherein said scrambling key is obtained from an external source; and storing said scrambled data in lieu of said e-mail addresses in a data base.
- 24. The method as recited in claim 23 wherein said scrambling technique is selected from the group comprising: public/private key, translation, proxy, substitution.
- 25. The method as recited in claim 23 further comprising the steps of:
descrambling selected ones of said scrambling data using a known scrambling technique, wherein said scrambling key is obtained from an external source; and addressing at least one e-mail message using said descrambled selected data.
- 26. The method as recited in claim 25 further comprising the steps of:
scrambling said decrypted data using a known scrambling technique, wherein said scrambling key is obtained from an external source; and storing said scrambled data in lieu of said e-mail addresses.
- 27. A method for preventing dissemination of computer worms, comprising the steps of:
accessing an e-mail server containing at least one e-mail messages; verifying data indicative of e-mail addresses stored in a data base are encrypted; and encrypting said e-mail addresses determined not encrypted using a key value obtained from an external source.
- 28. The method as recited in claim 27 wherein said external source is a memory medium.
- 29. The method as recited in claim 27 wherein said external source is an interactive medium.
- 30. The method as recited in claim 19 wherein said external device is a memory medium.
- 31. The method as recited in claim 19 wherein said external device is an interactive medium.
- 32. The method as recited in claim 1, wherein said data base may be selected from the group comprising: a local data base, a local address file, a local address book, a remotely located data base, a remotely located address book, a remotely located address file.
- 33. The method as recited in claim 23, wherein said data base may be selected from the group comprising: a local data base, a local address file, a local address book, a remotely located data base, a remotely located address book, a remotely located address file.
- 34. The system as recited in claim 10, wherein said data base may be selected from the group comprising: a local data base, a local address file, a local address book, a remotely located data base, a remotely located address book, a remotely located address file.
CLAIM OF PRIORITY FILING
[0001] This application is related to, and claims the benefit, pursuant to 35 U.S.C. §119, of the earlier filing date of U.S. Provisional Application Serial No. 60/298,737, entitled “Method and System for Preventing Computer Worm Dissemination Using Encryption, having a filing date of Jun. 14, 2001.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60298737 |
Jun 2001 |
US |