throbber
PTO/SB/05 (09-04)
`Approved for use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office. U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`
`UTILITY
`PATENT APPLICATION
`TRANSMITTAL
`'-(Only for new non provisional applications under 37 C.F.R. 1 .53(b))
`
`Attorney Docket No.
`
`43426.00069
`
`First Inventor
`
`Yigal EDERY
`
`""
`
`Title
`
`MALICIOUS MOBILE CODE RUNTIME MONITORING
`SYSTEM AND METHODS
`
`Express Mail Label No:
`
`EV 661 243 784 US
`
`APPLICATION ELEMENTS
`See MPEP chapter 600 concerning utility patent application contents.
`
`ADDRESS TO:
`
`Commissioner for Patents
`P.O. Box 1450
`Alexandria VA 22313·1450
`
`t~
`~'J,-
`:::>
`·- --
`-
`col()
`(\j'--
`(;51-
`'r"
`'r"
`
`I.C)
`0
`C\1
`~
`0
`
`1.[81 Fee Transmittal Form (e.g., PTO/SB/17)
`(Submit an original and a duplicate for fee processing)
`2. 0 Applicant claims small entity status.
`See 37 CFR 1.27.
`[Total Pages ~ I
`3. [81 Specification
`Both the claims and abstract must start on a new page
`(For Information on the preferred arrangement, see MPEP 608.01(a))
`4. [gl Drawing(s) (35 U.S. C. 113)
`[Total Sheets 1Q
`
`I
`
`I
`
`5. Oath or Declaration
`[Total Sheets §
`a. 0 Newly executed (original or copy)
`b.
`[81 Copy from a prior application (37 CFR 1.63 (d))
`(for a continuation/divisional with Box 18 completed)
`i. 0 DELETION OF INVENTOR{S}
`Signed statement attached deleting inventor(s)
`named in the prior application, see 37 CFR
`1 .63(d)(2) and 1.33(b).
`6.0 Application Data Sheet. See 37 CFR 1.76
`
`7.0 CD-ROM or CD·R in duplicate, large table or
`Computer Program (Appendix)
`0 Landscape Table on CD
`
`ACCOMPANYING APPLICATIONS PARTS
`
`9.0
`
`Assignment Papers (cover sheet & document(s)
`Name of Assignee
`
`10.0 37 C.F.R. 3.73(b) Statement 0 Power of Attorney
`(when there is an assignee)
`11.0 English Translation Document (if applicable)
`
`12.0
`
`Information Disclosure Statement (PTOISB/08 or PT0-1449)
`0 Copies of citations attached
`
`13. [81
`
`Preliminary Response
`
`14. [81 Return Receipt Postcard (MPEP 503)
`(Should be specifically itemized)
`
`15.0 Certified Copy of Priority Document(s)
`(if foreign priority is claimed)
`
`16.0 Nonpublication Request under 35 U.S.C. 122(b)(2)(B)(i).
`Applicant must attach form PTO/SB/35 or its equivalent.
`17.0 Other: General Authorization to Petition for Extensions of Time
`
`8. Nucleotide and/or Amino Acid Sequence Submission
`(if applicable, items a.-c. are required)
`a. 0 Computer Readable Form (CRF)
`b.
`Specification Sequence Listing on:
`i. 0 CD-ROM or CD-R (2 copies); or
`ii. 0 Paper
`c. 0 Statements verifying identity of above copies
`18. If a CONTINUING APPLICATION, check appropriate box, and supply the requisite information below and in the first sentence of the
`specification following the title, or in an Application Data Sheet under 37 CFR 1. 76:
`0 Divisional
`0 Continuation-in-part (CIP)
`1:81 Continuation
`Examiner Chirsto[!her A. Revak
`Prior application information:
`
`of prior application No: 09/861 229
`Art Unit: 2131
`
`1:81 Customer Number
`
`130256
`
`I OR 0
`
`Correspondence address below
`
`19. CORRESPONDENCE ADDRESS
`
`Name
`
`Address
`
`City
`
`Country
`
`Signature
`
`Name (Print/Type)
`
`I State I
`I Telephone
`..0
`--...
`
`I
`
`II
`
`.I
`
`h -
`
`Marc A. Sockol
`
`Zip Code
`
`Fax
`
`I Date
`
`June 22, 2005
`
`Registration No.
`(Attorney/Agent)
`
`1 40.823
`
`This collection of Information Is required by 37 CFR 1.53(b). The information Is required to obtain or retain a benefit by the ptJblic which Is to file (and by the USPTO to process) an application.
`Confidentiality Is governed by 35 U.S.C. 122 and 37 CFR 1.11 and 1.14. This collection is estimated to take 12 minutes to complete. Including gathering, preparing, and submitting the completed
`application form to the USPTO. Time will vary depending upon the Individual case. Any comments on the amount of time you require to complete this form and/or suggestions for reducing this
`burden, should be sent to the Chief Information Officer, U.S. Patent and Trademark Office, U.S. Department of Commerce, P.O. Box 1450. Alexandria, VA 22313-1450. DO NOT SEND FEES OR
`COMPLETED FORMS TO THIS ADDRESS. SEND TO: Mall Stop Patent Application, Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313·1450.
`If you need assistance In completing the fOrm, caii1·800.PT0·9199 and select option 2.
`
`0001
`
`Blue Coat Systems - Exhibit 1030
`
`

`
`PTO/SB/17 (12-04v2)
`Approved for use through 07/31/2006. OMB 0651-0032
`U.S. Patent and Trademark Office: U.S. DEPARTMENT OF COMMERCE
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it displays a valid OMB control number.
`
`c::; r
`Effective on 1210812004.
`•
`Fees pursuant to the Consolidated Appropriations Act, 2005 (H.R. 4818).
`~
`~
`c
`
`FEE TRANSMITTAL
`for FY 2005
`0 Applicant claims small entity status. See 37 CFR 1.27
`
`\..TOTAL AMOUNT OF PAYMENT
`
`($) 3,720
`
`Complete If Known
`
`Application Number
`
`Not Yet Assigned
`
`Filing Date
`
`June 22, 2005
`
`First Named Inventor Yigal EDERY
`Not Yet Assigned
`Examiner Name
`Not Yet Assigned
`Art Unit
`43426.00069
`Attorney Docket No.
`
`'
`
`~
`
`METHOD OF PAYMENT (check all that apply)
`D Check 0 Credit Card 0 Money Order 0 None D Other (please identify) :
`l8J Deposit Account Deposit Account Number: 05-0150
`Deposit Account Name: Squire, Sanders & Dempsey, L.L.P.
`For the above-identified deposit account, the Director is hereby authorized to: (check all that apply)
`0 Charge fee(s) indicated below, except for the filing fee
`~ Charge fee(s) indicated below
`~ Charge any additional fee(s) or underpayments of fee(s) ~ Credit any overpayments
`Under 37 CFR 1.16 and 1.17
`WARNING: Information on this form may become public. Credit card information should not be included on this form. Provide credit card
`information and authorization on PT0-2038.
`FEE CALCULATION
`
`1. BASIC FILING, SEARCH, AND EXAMINATION FEES
`FILING FEES
`SEARCH FEES
`Small Entitll
`Small Entitll
`Fee($)
`Fee($)
`150
`250
`100
`50
`!50
`100
`250
`!50
`100
`0
`
`Fee($)
`500
`100
`300
`500
`0
`
`Fee Paid {il
`1.120
`
`Fee Paid {il
`1.600
`
`Fees Paid {il
`I 000
`--
`- -
`- -
`- -
`Small Entitll
`lliJ.ll
`lliJ.ll
`25
`50
`100
`200
`180
`360
`Multiele Deeendent Claims
`Fee Paid {il
`lliJ.ll
`---
`- - -
`
`EXAMINATION FEES
`Small Entitll
`Fee($)
`100
`65
`80
`300
`0
`
`Fee($)
`200
`130
`160
`600
`0
`
`lliJ.ll
`Aeelication TJtee
`300
`Utility
`200
`Design
`Plant
`200
`Reissue
`300
`Provisional
`200
`2. EXCESS CLAIM FEES
`Fee Descrietion
`Each claim over 20 (including Reissues)
`Each independent claim over 3 (including Reissues)
`Multiple dependent claims
`Fee{$}
`Total Claims
`Extra Claims
`50
`76
`-20 or HP=
`56
`X
`HP = highest number of total claims paid for, if greater than 20.
`Fee{$)
`lndee. Claims
`Extra Claims
`-3 or HP=
`11
`ft
`200
`=
`X
`HP = highest number of independent claims paid for, if greater than 3.
`3. APPLICATION SIZE FEE
`If the specification and drawings exceed 100 sheets of paper (excluding electronically filed sequence or computer
`listings under 37 CFR !.52( e)), the application size fee due is $250 ($125 for small entity) for each additional 50
`sheets or fraction thereof. See 35 U.S.C. 41(a)(I)(G) and 37 CFR 1.16(s).
`Number of each additional 50 or fraction thereof
`Total Sheets Extra Sheets
`- 100 = Q /50=
`Q (round up to a whole number)
`35
`X
`4. OTHER FEE(S)
`Non-English Specification, $130 fee (no small entity discount)
`Other (e.g., late filing surcharge):
`
`lliJ.ll Fee Paid {il
`Q
`0
`=
`Fees Paid {il
`- -
`- -
`
`SUBMITIED BY
`
`Signature
`
`Name (Printffype)
`
`-
`h.--~ y
`
`Marc A. Sockol
`
`I Registration No.
`
`IAttomev/Aaentl
`
`40,23
`
`Telephone
`
`(650) 656-6500
`
`Date
`
`June 22. 2005
`
`This collection of information is required by 37 CFR 1.136. The information is required to obtain or retain a benefit by the public which is to file (and by the USPTO to process) an application.
`Confidentiality is governed by 35 U.S.C. 122 and 37 CFR 1.14. This collection is estimated to take 30 minutes to complete, induding gathering, preparing. and submitting the completed
`application form to the USPTO. Time will vary depending upon the individual case. Any convnents on the amount of time you require to complete this form and/or suggestions for reduCing this
`burden. should be sent to the Chief Information Officer. U.S. Patent and Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria. VA 22313-1450. DO NOT SEND FEES
`OR COMPLETED FORMS TO THIS ADDRESS. SEND TO: Commissioner for Patents, P.O. Box 1450, Alexandria, VA 22313-1450.
`If you need assistance in completing this form, ca/11-800-PT0-9199 (1-800-786-9199) and select option 2.
`
`0002
`
`

`
`~I
`
`Express Mail Label No. EV 661 243 784 US
`
`Attorney Docket No.: 43426.00069
`
`IN THE UNITED STATES PATENT AND TRADEMARK OFFICE
`
`In Re Application Of:
`
`Examiner: Not Yet Assigned
`
`Yigal EDERY eta/.
`
`Art Unit:
`
`Not Yet Assigned
`
`Serial No: Not Yet Assigned
`
`Filed:
`
`June 22, 2005
`
`For:
`
`MALICIOUS MOBILE CODE
`RUNTIME MONITORING
`SYSTEM AND MEETINGS
`
`Commissioner of Patents
`P.O. Box 1450
`Alexandria, VA 22313-1450
`
`GENERAL AUTHORIZATION TO PETITION FOR EXTENSIONS OF TIME
`
`Dear Sir:
`
`With reference to the subject application, and pursuant to 37 C.P.R. § 1.136, Applicants
`
`hereby authorize and request the Commissioner to treat any correspondence requiring a petition
`
`for extension of time as containing such a request therefor for the appropriate length oftime.
`
`This general authorization is effective during the pendency of this application, including any
`
`division or continuing application therefrom.
`
`Where no check is received by the Commissioner, you are hereby authorized to charge
`
`payment of the requisite petition fees, or charge any additional fee required under 37 C.P.R. §
`
`In re EDERY eta/.
`
`- 1-
`
`85727.1
`
`0003
`
`

`
`Express Mail Label No. EV 661 243 784 US
`
`Attorney Docket No.: 43426.00069
`
`1.17, or credit any overpayment of same, to Deposit Account No. 05-0150.
`
`Date: June 22, 2005
`
`Respectfully submitted,
`
`By:
`
`h.-lr-2-tJ
`
`Marc A. Sockol
`Attorney for Applicant(s)
`Reg. No. 40,823
`
`Squire, Sanders & Dempsey L.L.P.
`600 Hansen Way
`Palo Alto, CA 94304-1043
`Telephone: (650) 856-6500
`Facsimile: (650) 843-8777
`
`Express Mail Label No.
`
`EV 661 243 784 US
`
`In re EDERY eta/.
`
`-2-
`
`85727.1
`
`0004
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`APPLICATION FOR
`
`UNITED STATES PATENT
`
`IN THE NAME OF
`
`Yigal Edery, Nimrod Vered, David Kroll and Shlomo Touboul
`
`OF
`
`FIN JAN SOFTWARE, LTD.
`
`MALICIOUS MOBILE CODE RUNTIME MONITORING
`
`SYSTEM AND METHODS
`
`DOCKET NO. 43426.00069
`
`Please direct communications to:
`
`Intellectual Property Department
`
`Squire, Sanders & Dempsey L.L.P.
`
`600 Hansen Way
`
`Palo Alto, CA 94304-1043
`
`(650) 856-6500
`
`Express Mail Number EL 661 243 784 US
`
`1
`
`0005
`
`

`
`MALICIOUS MOBILE CODE RUNTIME MONITORING SYSTEM AND METHODS
`
`ATTORNEY DOCKET 43426.00069
`
`PRIORITY REFERENCE TO RELATED APPLICATIONS
`
`This application is a continuation of and incorporates by reference patent
`
`5
`
`application serial number 09/861,229, which claims benefit of reference provisional
`
`application serial number 60/205,591 entitled "Computer Network Malicious Code Run(cid:173)
`
`time Monitoring," filed on May 17, 2000 by inventors Nimrod Itzak Vered, e.t al. This
`
`application also incorporates by reference the provisional application serial number
`
`60/205,591. This application is also a Continuation-In-Part of and hereby incorporates by
`
`10
`
`reference patent application serial number 09/539,667, now U.S. Patent No. 6,804,780,
`
`entitled "System and Method for Protecting a Computer and a Network from Hostile
`
`Downloadables" filed on March 30, 2000 by inventor Shlomo Touboul. This application
`
`is also a Continuation-In-Part of and hereby incorporates by reference patent application
`
`serial number 09/551,302, now U.S. Patent No. 6,480,962, entitled "System and Method
`
`15
`
`for Protecting a Client During Runtime From Hostile Downloadables", filed on Aprill8,
`
`2000 by inventor Shlomo Touboul.
`
`BACKGROUND OF THE INVENTION
`
`Field of the Invention
`
`20
`
`This invention relates generally to computer networks, and more particularly
`
`provides a system and methods for protecting network-connectable devices from
`
`undesirable downloadable operation.
`
`Description of the Background Art
`
`25
`
`Advances in networking techilology continue to impact an increasing number and
`
`diversity of users. The Internet, for example, already provides to expert, intermediate and
`
`even novice users the informational, product and service resources of over 100,000
`
`interconnected networks owned by governments, universities, nonprofit groups,
`
`companies, etc. Unfortunately, particularly the Internet and other public networks have
`
`2
`
`0006
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`also become a major sourc.e of potentially system-fatal or otherwise damaging computer
`
`code commonly referred to as "viruses."
`
`Efforts to forestall viruses from attacking networked computers have thus far met
`
`with only limited success at best. Typically, a virus protection program designed to
`
`5
`
`identify and remove or protect against the initiating of known viruses is installed on a
`
`network firewall or individually networked computer. The program is then inevitably
`
`surmounted by some new virus that often causes damage to one or more computers. The
`
`damage is then assessed and, if isolated, the new virus is analyzed. A corresponding new
`
`virus protection program (or update thereof) is then developed and installed to combat the
`
`10
`
`new virus, and the new program operates successfully until yet another new virus appears
`
`- and so on. Of course, damage has already typically been incurred.
`
`To make matters worse, certain classes of viruses are not well recognized or
`
`understood, let alone protected against. It is observed by this inventor, for example, that
`
`Downloadable information comprising program code can include distributable
`
`15
`
`components (e.g. Java™ applets and JavaScript scripts, ActiveXTM controls, Visual
`
`Basic, add-ins and/or others). It can also include, for example, application programs,
`
`Trojan horses, multiple compressed programs such as zip or meta files, among others.
`
`U.S. Patent 5,983,348 to Shuang, however, teaches a protection system for protecting
`
`against only distributable components including "Java applets or ActiveX controls", and
`
`20
`
`further does so using resource intensive and high bandwidth static Downloadable content
`
`and operational analysis, and modification of the Downloadable component; Shuang
`
`further fails to detect or protect against additional program code included within a tested
`
`Downloadable. U.S. Patent 5,974,549 to Golan teaches a protection systeiD: that further
`
`focuses only on protecting against ActiveX controls and not other distributable
`
`25
`
`components, let alone other Downloadable types. U.S. patent 6,167,520 to Touboul
`
`enables more accurate protection than Shuang or Golan, but lacks the greater flexibility
`
`and efficiency taught herein, as do Shuang and Golan.
`
`Accordingly, there remains a need for efficient, accurate and flexible protection of
`
`computers and other network connectable devices from malicious Downloadables.
`
`30
`
`3
`
`0007
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`SUMMARY OF THE INVENTION
`
`The present invention provides protection systems and methods capable of
`
`protecting a personal computer ("PC") or other persistently or even intermittently
`
`network accessible devices or processes from harmful, undesirable, suspicious or other
`
`5
`
`"malicious" operations that might otherwise be effectuated by remotely operable code.
`
`While enabling the capabilities of prior systems, the present invention is not nearly so
`
`limited, resource intensive or inflexible, and yet enables more reliable protection. For
`
`example, remotely operable code that is protectable against can include downloadable
`
`application programs, Trojan horses and program code groupings, as well as software
`
`10
`
`"components", such as Java™ applets, Activex™ controls, JavaScriptTMNisual Basic
`
`scripts, add-ins, etc., among others. Protection can also be provided in a distributed
`
`interactively, automatically or mixed configurable manner using protected client, server
`
`or other parameters, redirection, local/remote logging, etc., and other server/client based
`
`protection measures can also be separately and/or interoperably utilized, among other
`
`15
`
`examples.
`
`In one aspect, embodiments of the invention provide for determining, within one
`
`or more network "servers" (e.g. firewalls, resources, gateways, email relays or other
`
`devices/processes that are capable of receiving-and-transferring a Downloadable) whether
`
`received information includes executable code (and is a "Downloadable"). Embodiments
`
`20
`
`also provide for delivering static, configurable and/or extensible remotely operable
`
`protection policies to a Downloadable-destination, more typically as a sandboxed package
`
`including the mobile protection code, downloadable policies and one or more received
`
`Downloadables. Further client-based or remote protection code/policies can also be
`
`utilized in a distributed manner. Embodiments also provide for causing the mobile
`
`25
`
`protection code to be executed within a Downloadable-destination in a manner that
`
`enables various Downloadable operations to be detected, intercepted or further responded
`
`to via protection operations. Additional server/information-destination device security or
`
`other protection is also enabled, among still further aspects.
`
`A protection engine according to an embodiment of the invention is operable
`
`30 within one or more network servers, firewalls or other network connectable information
`
`4
`
`0008
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`re-communicating devices (as are referred to herein summarily one or more "servers" or
`
`"re-communicators"). The protection engine includes an information monitor for
`
`monitoring information received by the server, and a code detection engine for
`
`determining whether the received information includes executable code. The protection
`
`5
`
`engine also includes a packaging engine for causing a sandboxed package, typically·
`
`including mobile protection code and downloadable protection policies to be sent to a
`
`Downloadable-destination in conjunction with the received information, if the received
`
`information is determined to be a Downloadable.
`
`A sandboxed package according to an embodiment of the invention is receivable
`
`10 · by and operable with a remote Downloadable-destination. The sandboxed package
`
`includes mobile protection code ("MPC") for causing one or more predetermined
`
`malicious operations or operation combinations of a Downloadable to be monitored or
`
`otherwise intercepted. The sandboxed package also includes protection policies (operable
`
`alone or in conjunction with further Downloadable-destination stored or received
`
`15
`
`policies/MPCs) for causing one or more predetermined operations to be performed if one
`
`or more undesirable operations of the Downloadable is/are intercepted. The sandboxed
`
`package can also include a corresponding Downloadable and can provide for initiating the
`
`Downloadable in a protective "sandbox". The MPC/policies can further include a
`
`communicator for enabling further MPC/policy information or "modules" to be utiiized
`
`20
`
`and/or for event logging or other purposes.
`
`A.sandbox protection system according to an embodiment of the invention
`
`comprises an installer for enabling a received MPC to be executed within a
`
`Downloadable-destination (device/process) and further causing a Downloadable
`
`application program, distributable component or other received downloadable code to be
`
`25
`
`received and installed within the Downloadabie-destination. The protection system also
`
`includes a diverter for monitoring one or more operation attempts of the Downloadable,
`
`an operation analyzer for determining one or more responses to the attempts, and a
`
`security enforcer for effectuating responses to the monitored operations. The protection
`
`system can further include one or more security policies according to which one or more
`
`30
`
`protection system elements are operable automatically (e.g. programmatically) or in
`
`5
`
`0009
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`conjunction with user intervention (e.g. as enabled by the security enforcer). The security
`
`policies can also be configurable/extensible in accordance with further downloadable
`
`and/or Downloadable-destination information.
`
`A method according to an embodiment of the invention includes receiving
`
`5
`
`downloadable information, determining whether the downloadable information includes
`
`executable code, and causing a mobile protection code and security policies to be
`
`communicated to a network client in conjunction with security policies and the
`
`downloadable information if the downloadable information is determined to include
`
`executable code. The determining can further provide multiple tests for detecting, alone
`
`10
`
`or together, whether the downloadable infomiation includes executable code.
`
`A further method according to an embodiment of the invention includes forming a
`
`sandboxed package that includes mobile protection code ("MPC"), protection policies,
`
`and a received, detected-Downloadable, and causing the sandboxed package to be
`
`communicated to and installed by a receiving device or process ("user device") for
`
`15
`
`responding to one or more malicious operation attempts by the detected-Downloadable
`
`from within the user device. The MPC/policies can further include a base "module" and
`
`a "communicator" for enabling further up/downloading of one or more further "modules"
`
`or other information (e.g. events, user/user device information,·etc.).
`
`Another method according to an embodiment of the invention includes installing,
`
`20 within a user device, received mobile protection code ("MPC") and protection policies in
`
`conjunction with the user device receiving a downloadable application program,
`
`component or other Downloadable(s). The method also includes determining, by the
`
`MPC, a resource access attempt by the Downloadable, and initiating, by the MPC, <?ne or
`
`more predetermined operations corresponding to the attempt. (Predetermined operations
`
`25
`
`can, for example, comprise initiating user, administrator, client, network or protection
`
`system determinable operations, including but not limited to modifying the Downloadable
`
`operation, extricating the Downloadable, notifying a user/another, maintaining a
`
`local/remote log, causing one or more MPCs/policies to be downloaded, etc.)
`
`Advantageously, systems and methods according to embodiments of the invention
`
`30
`
`enable potentially damaging, undesirable or otherwise malicious operations by even
`
`6
`
`0010
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`unknown mobile code to be detected, prevented, modified and/or otherwise protected
`
`against without modifying the mobile code. Such protection is further enabled in a
`
`manner that is capable of minimizing server and client resource requirements, does not
`
`require pre-installation of security code within a Downloadable-destination, and provides
`
`5
`
`for client specific or generic and readily updateable security measures to be flexibly and
`
`efficiently implemented. Embodiments further provide for thwarting efforts to bypass
`
`security measures (e.g. by "hiding" undesirable operation causing information within
`
`apparently inert or otherwise "friendly" downloadable information) and/or dividing or
`
`combining security measures for even greater flexibility and/or efficiency.
`
`10
`
`Embodiments also provide for determining protection policies that can be
`
`downloaded and/or ascertained from other security information (e.g. browser settings,
`
`administrative policies, user input, uploaded information, etc.). Different actions in
`
`response to different Downloadable operations, clients, users and/or other criteria are also
`
`enabled, and embodiments provide for implementing other security measures, such as
`
`15
`
`verifying a downloadable source, certification, authentication, etc. Appropriate action
`
`can also be accomplished automatically (e.g. programmatically) and/or in conjunction
`
`with alerting one or more users/administrators, utilizing user input, etc. Embodiments
`
`further enable desirable Downloadable operations to remain substantially unaffected,
`
`among other aspects.
`
`20
`
`25
`
`7
`
`0011
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. la is a block diagram illustrating a network system in accordance with an
`
`embodiment of the present invention;
`
`FIG. 1 b is a block diagram illustrating a network subsystem example in
`
`5
`
`accordance with an embodiment of the invention;
`
`FIG. lc is a block diagram illustrating a further network subsystem example in
`
`accordance with an embodiment of the invention;
`
`FIG. 2 is a block diagram illustrating a computer system in accordance with an
`
`embodiment of the invention;
`
`10
`
`FIG. 3 is a flow diagram broadly illustrating a protection system host according to
`
`an embodiment of the invention;
`
`FIG. 4 is a block diagram illustrating a protection engine according to an
`
`embodiment of the invention;
`
`FIG. 5 is a block diagram illustrating a content inspection engine according to an
`
`15
`
`embodiment of the invention;
`
`FIG. 6a is a block diagram illustrating protection engine parameters according to
`
`an embodiment of the invention;
`
`FIG. 6b is a flow diagram illustrating a linking engine use in conjunction with
`
`ordinary, compressed and distributable sandbox package utilization, according to an
`
`20
`
`embodiment of the invention';
`
`FIG. 7a is a flow diagram illustrating a sandbox protection system operating
`
`within a destination system, according to an embodiment of the invention;
`
`FIG. 7b is a block diagram illustrating memory allocation usable in conjunction
`
`with the protection system ofFIG. 7a, according to an embodiment of the invention;
`
`25
`
`FIG. 7c is a block diagram illustrating a mobile protection code according to an
`
`embodiment of the invention;
`
`FIG. 8 is a flowchart illustrating a method for examining a Downloadable in
`
`accordance with the present invention;
`
`FIG. 9 is a flowchart illustrating a server based protection method according to an
`
`30
`
`embodiment of the invention;
`
`8
`
`0012
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`FIG. 1 Oa is a flowchart illustrating method for determining if a potential(cid:173)
`
`Downloadable includes or is likely to include executable code, according to an
`
`embodiment of the invention;
`
`FIG. lOb is a flowchart illustrating a method for forming a protection agent,
`
`5
`
`according to an embodiment of the invention;
`
`FIG. 11 is a flowchart illustrating a method for protecting a Downloadable
`
`destination according to an embodiment of the invention;
`
`FIG. 12a is a flowchart illustrating a method for forming a Downloadable access
`
`interceptor according to an embodiment of the invention; and
`
`10
`
`FIG. 12b is a flowchart illustrating a method for implementing mobile protection
`
`policies according to an embodiment of the invention.
`
`15
`
`DETAILED DESCRIPTION
`
`In providing malicious mobile code runtime monitoring systems and methods,
`
`embodiments of the invention enable actually or potentially undesirable operations of
`
`even unknown malicious code to be.efficiently and flexibly avoided. Embodiments
`
`20
`
`provide, within one or more "servers" (e.g. firewalls, resources, gateways, email relays or
`
`other information re-communicating devices), for receiving downloadable-information
`
`and detecting whether the downloadable-information includes one or more instances of
`
`executable code (e.g. as with a Trojan horse, zip/meta file etc.). Embodiments also
`
`provide for separately or interoperably conducting additional security measures within the
`
`25
`
`server, within a Downloadable-destination of a detected-Downloadable, or both.
`
`Embodiments further provide for causing mobile protection code ("MPC") and
`
`downloadable protection policies· to be communicated to, installed and executed within
`
`one or more received information destinations in conjunction with a detected(cid:173)
`
`Downloadable. Embodiments also provide, within an information-destination, for
`
`30
`
`detecting malicious operations of the detected-Downloadable and causing responses
`
`9
`
`0013
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`thereto in accordance with the protection policies (which can correspond to one or more
`
`user, Downloadable, source, destination, or other parameters), or further downloaded or
`
`downloadable-destination based policies (which can also be configurable or extensible).
`
`(Note that the term "or", as used herein, is generally intended to mean "and/or" unless
`
`5
`
`otherwise indicated.)
`
`FIGS. 1a through 1c illustrate a computer network system 100 according to an
`
`embodiment of the invention: FIG. 1a broadly Illustrates system 100, while FIGS. 1b and
`
`1c illustrate exemplary protectable subsystem implementations corresponding with
`
`system 104 or 106 of FIG~ 1a.
`
`10
`
`Beginning with FIG. 1a, computer network system 100 includes an external
`
`computer network 101, such as a Wide Area Network or "WAN" (e.g. the Internet),
`
`which is coupled to one or more network resource servers (summarily depicted as
`
`resource server-1 102 and resource server-N 103). Where external network 101 includes
`
`the Internet, resource servers 1-N (102, 103) might provide one or more resources
`
`15
`
`including web pages, streaming media, transaction-facilitating information, program
`
`updates or other downloadable information, summarily depicted as resources 121, 131
`
`and 132. Such information can also include more traditionally viewed "Downloadables"
`
`or "mobile code" (i.e. distributable components), as well as downloadable application
`
`programs or other further Downloadables, such as those that are discussed herein. (It will
`
`20
`
`be appreciated that interconnected networks can also provide various other resources as
`
`well.)
`
`Also coupled via external network 101 are subsystems 104-106. Subsystems 104-
`
`106 can, for example, include one or more servers, personal computers ("PCs"), smart
`
`appliances, personal information managers or other devices/processes that are at least
`
`25
`
`temporarily or otherwise intermittently directly or indirectly connectable in a wired or
`
`wireless manner to external network 101 (e.g. using a dialup, DSL, cable modem,
`
`cellular connection, IRJRF, or various other suitable current or future connection
`
`alternatives). One or more of subsystems 104-106 might further operate as user devices
`
`that are connectable to external network 101 via an internet service provider ("ISP") or
`
`10
`
`0014
`
`

`
`ATTORNEY DOCKET 43426.00069
`
`local area network ("LAN"), such as a corporate intranet, or home, portable device or
`
`smart appliance network, among other examples.
`
`FIG. 1a also broadly illustrates how embodiments of the invention are capable of
`
`selectively, modifiably or extensibly providing protection to one or more determinable
`
`5
`
`ones of networked subsystems 104-106 or elements thereof (not shown) against
`
`potentially harmful or other undesirable ("malicious") effects in conjunction with
`
`receiving downloadable information. "Protected" subsystem 104, for example, utilizes a
`
`protection in accordance with the teachings herein, while "unprotected" subsystem-N 105
`
`employs no protection, and protected subsystem-M 106 might employ one or more
`
`· 10
`
`protections including those according to the teachings herein, other protection, or some
`
`combination.
`
`System 100 implementations are also capable of providing protection to redundant
`
`elements 107 of one or more of subsystems 104-106 that might be utilized, such as
`
`backups, failsafe elements, redundant networks, etc. Where included, such redundant
`
`15
`
`elements are also similarly protectable in a separate, combined or coordinated manner
`
`using embodiments of the present invention either alone or in conjunction with other
`
`protection mechanisms. In such cases, protection can be similarly provided singly, as a
`
`composite of component operations or in a backup fashion. Care should, however, be
`
`exercised to avoid potential repeated protection engine execution corresponding to a
`
`20
`
`single Downloadable; such "chaining" can cause a Downloadable to operate incorrectly
`
`or not at

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket