Claims
- 1. A system for providing protection from an exploit to a device connected to a network, comprising:
(a) a content filter that receives a message that is directed to the device; (b) a message tracker that is coupled to the content filter and is configured to determine whether the message is an unscanned message; and (c) a scanner component that is coupled to the message tracker and that is configured to receive the unscanned message and to determine whether at least one element of the message includes an exploit.
- 2. The system of claim 1, wherein an element of the message is at least one of a header, body, and an attachment.
- 3. The system of claim 1, wherein the message tracker is further configured to:
determine a first value associated with the message; and if the first value approximately matches a second value, to identify the message as a scanned message.
- 4. The system of claim 3, wherein the second value is stored in at least one of a table, database, and a list.
- 5. The system of claim 3, wherein the message tracker is further configured to set the second value to a nullity when the scanner component is updated.
- 6. The system of claim 3, wherein at least one of the first value and the second value further comprises at least one of a hash value, an algorithmic function, checksum, public key certificate, and a digital signature.
- 7. The system of claim 3, wherein the first value and the second value each further comprises a separate value for the message and a separate value for the attachment.
- 8. The system of claim 1, wherein the message tracker is further configured to:
determine a size associated with the message; determine a hash associated with the message; and if the size exceeds a pre-determined size, and the hash is substantially the same as a stored hash associated with the message, to identify the message as a scanned message.
- 9. The system of claim 1, wherein the system is operable on at least one of a firewall, a router, a switch, a server, and a dedicated platform.
- 10. A method for providing protection from an exploit to a device connected to a network, comprising:
(a) receiving a message that is directed to the device; and (b) if the message is an unscanned message, performing actions, including:
i. determining whether at least one element of the message includes an exploit; and ii. if at least one element of the message includes the exploit, quarantining the message.
- 11. The method of claim 10, wherein an element of the message is at least on of a header, body, and an attachment.
- 12. The method of claim 10, further comprising:
determining a first value associated with the message; and if the first value approximately matches a second value, identifying the message as a scanned message.
- 13. The method of claim 12, wherein the second value is stored in at least one of a table, database, and a list.
- 14. The method of claim 12, wherein the second value is set to a nullity based on a pre-determined condition.
- 15. The method of claim 12, wherein at least one of the first value, and the second value further comprises at least one of a hash value, an algorithmic function, checksum, public key certificate, and a digital signature.
- 16. The method of claim 12, wherein the first value and the second value each further comprises a separate value for the message and a separate value for the attachment.
- 17. The method of claim 10, further comprising:
if a message size exceeds a pre-determined size;
determining whether at least one of the header and the body includes the exploit; and if at least one of the header, body, and attachment of the message includes the exploit, quarantining the message.
- 18. The method of claim 10, wherein the method is operable on at least one of a firewall, a router, a switch, a server, and a dedicated platform.
- 19. A system for providing protection from an exploit to a device connected to a network, comprising:
(a) means for receiving a message that includes a header and at least one of a body and an attachment; (b) means for determining whether the message including the attachment, is an unscanned message; and (c) means for determining whether at least one of the header, attachment, and the body includes an exploit in the unscanned message.
Priority Claims (2)
Number |
Date |
Country |
Kind |
PCT/US02/11656 |
Apr 2002 |
WO |
|
PCT/US02/11685 |
Apr 2002 |
WO |
|
RELATED APPLICATION
[0001] This utility patent application is a continuation-in-part of U.S. patent application Ser. No. 10/121,959, filed Apr. 12, 2002, of which the benefit of the earlier filing date is hereby claimed under 35 U.S.C. §120, which in turn is based on a previously filed U.S. Provisional Patent application, U.S. Serial No. 60/283,757 filed on Apr. 13, 2001, the benefit of the filing date of which is hereby claimed under 35 U.S.C. §119(e), each of which is hereby incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60283757 |
Apr 2001 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10121959 |
Apr 2002 |
US |
Child |
10317296 |
Dec 2002 |
US |