throbber
(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(19) World Intellectual Property Organization
`International Bureau
`
`(43) International Publication Date
`18 July 2002 (18.07.2002)
`
`
`
`PCT
`
`(10) International Publication Number
`WO 02/056156 A2
`
`(51) International Patent Classification’:
`
`G06F 1/00
`
`(21) International Application Number:
`
`PCT/GB01/05767
`
`(74) Agent: WILLIAMS,Arthur, Wyn; QinetiQ Formalities,
`Aé4Building Ively Road, Farnborough, Hampshire GU14
`OLX (GB).
`
`(22) International Filing Date:
`24 December 2001 (24.12.2001)
`
`(25) Filing Language:
`
`(26) Publication Language:
`
`English
`
`English
`
`(30) Priority Data:
`0100955.4
`
`13 January 2001 (13.01.2001)
`
`GB
`
`(71) Applicant (for all designated States except US): QINE-
`TIQ LIMITED [GB/GB]}; 85 Buckingham Gate, London
`SWI1E 6PD (GB).
`
`(72) Inventor; and
`(75) Inventor/Applieant (for US only): WISEMAN,Simon,
`Robert [GB/GB]; QinetiQ Malvern, St Andrews Road,
`Malvern, Worcestershire WR14 3PS (GB).
`
`(81) Designated States (national): AT!, AG, AT., AM, AT, AU,
`AZ, BA, BB, BG,BR, BY, BZ, CA, CH, CN, CO, CR, CU,
`CZ, DE, DK, DM, DZ, EC, EE, ES, Fl, GB, GD, GE, GH,
`GM,HR,HU,ID,IL, IN, IS, JP, KE, KG, KP, KR, KZ, LC,
`LK, LR, LS, LT, LU, LV, MA, MD, MG, MK, MN, MW,
`MX, MZ, NO, NZ, OM,PH,PL, PT, RO, RU, SD, SE, SG,
`SI, SK, SL, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ,
`VN, YU, ZA, ZM, ZW.
`
`(84) Designated States (regional): ARIPO patent (GH, GM,
`KE, LS, MW, MZ, SD, SL, SZ, TZ, UG, ZM, ZW),
`Eurasian patent (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM),
`European patent (AT, BE, CH, CY, DE, DK, ES, FI, FR.
`GB, GR,IE, IT, LU, MC, NL, PT, SE, TR), OAPI patent
`(BE, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, ML, MR,
`NE, SN, TD, TG).
`
`Declaration under Rule 4.17:
`of inventorship (Rule 4.17(iv)) for US only
`
`[Continued on next page]
`
`(54) Title: COMPUTER SYSTEM PROTECTION
`
`
`
`Google Exhibit 1075
`Google v. VirtaMove
`
`56156A2
`O02/0
`
`(57) Abstract: Computer system protection to protect against harmful data from an external computer network (60)(e.g. the Inter-
`net) involves supplying incoming data (62) to a software checker (64) as the data enters a computer system (not shown). ‘he checker
`~~ (64) routes any suspect data (66) lo an encryptor (68) which encrypts it to render it unusable and harmless. Encrypted data passes
`to a computer (72) in an internal network (74) and having a desktop quarantine area or sandbox (76) for suspect data. The computer
`(72) runs main desktop applications (78) receiving encrypted data (70) for storage and transfer, but not for use in any meaningful way
`because it is encrypted. Equally well applications (78) cannot be interfered with by encrypted data (70) because encryption makes
`this impossible. On entry into the sandbox (76), the encrypted data (70) is decrypted to usable form: it then becomesaccessible by
`software (204) suitable for use in the sandbox (76) subject to sandbox constraints.
`
`=
`
`Google Exhibit 1075
`Google v. VirtaMove
`
`

`

`WO 02/056156 A2
`
`—_/NITIINTINTANATNTTAINTAATTAAAOUH TAHTA
`
`Published:
`without international search report and to be republished
`upon receipt ofthat report
`
`For two-letter codes and other abbreviations, refer to the "Guid-
`ance Notes on Codes andAbbreviations" appearing at the begin-
`ning ofeach regular issue ofthe PCT Gazette.
`
`

`

`WO 02/056136
`
`PCT/GB01/035767
`
`Computer System Protection
`
`This invention relates to a method for computer system protection against unwanted external
`
`interference such as for example by viruses, to a computer program for implementing such
`
`protection and to a computer system protected thereby.
`
`Computer software applications offer progressively more flexible features and become
`
`better integrated as computer technology develops. Unfortunately this has the effect of
`
`increasing the exposure of computer systems to attack: attacks by Trojan Horse software
`
`exploit hidden features of applications software running on a victim’s computer, and
`
`attacks by virusesresult in software introduced by an attacker spreading from one computer
`
`10
`
`to another. Computer system protection therefore becomes progressively moredifficult as
`
`technology advances. Attacks on computer systems may damage information they hold,
`
`leak that information or preventlegitimate computer system users carrying out their work.
`
`Current industry best practice in computer system protection, as described in the text book
`
`“Network Security” by Kaufman, Perlman and Speciner, is to apply a software checker to
`
`15
`
`data as it enters a computer system: the checker identifies a potential attack, allowing any
`
`data that appears to be an attack to be rejected. Unfortunately, it is very difficult to identify
`
`an attack accurately using software checkers and it is often necessary to err on the side of
`
`caution. The result is that data that is harmless and perhaps valuable maynot be allowed to
`
`enter the system.
`
`20
`
`A computer system which rejects harmless and sometimes valuable data is not a reliable
`
`business tool, so to reduce the loss of data it is known to place rejected data in what is
`
`referred to as “quarantine”: quarantine is a region of computer storage not accessible by
`
`normal users and their software applications such as word processors, but instead accessible
`
`by computer experts who can inspect rejected data manually and decide whetheror notit is
`
`25
`
`harmful. Expert manual inspection of data in quarantine can be much more accurate at
`
`detecting an attack than a software checker. Thus a proportion of data that is rejected by an
`
`automatic software checker may subsequently be identified as harmless and allowedto enter
`
`the computer system.
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`Manual inspection of quarantined data improves reliability of communication between a
`
`computer system and the outside world,. butit results in delay which can be significant and
`
`it requires costly expert staff to implement it. Moreover, automatic checkers and manual
`inspection are both proneto failure. In particular, both automatic and manual checks are
`poor at detecting new and therefore unfamiliar forms of attack. Forms of attack are
`associated with functionalities available in applications; new forms of attack therefore
`appear as software applications are further developed. Hence current industry best practice
`in computer system protection is costly and ineffective, and this situation will not improve.
`
`Another prior art technique referred to as “sandboxing” is described in the text book
`
`10
`
`“JAVA Security” by Scott Oaks: it provides an alternative to the data rejection approach.In
`
`this technique data is allowed to enter a computer system, but the system environment,i.e.
`
`the way in which the data can be used, is constrained. Should data prove to constitute an
`attack, the Trojan Horse or virus which it implements has access only to the constrained
`environment and cannot corrupt software applications outside it, i.e. beyond the sandbox
`
`15
`
`boundary.
`
`The most common form of sandbox is that provided for JAVA® applets, which are self
`
`contained elements of software written in Sun Microsystems’ language JAVA that can be
`
`executed on a wide variety of different types of computer. Unfortunately, the JAVA®
`
`sandbox suffers from the drawback of only working for JAVA® applets and not for data in
`
`20
`
`any other form. For example, a Microsoft® Word document cannot be edited by the
`
`Microsoft® Wordapplication within a JAVA® sandbox.
`
`More general-purpose sandboxes have been built or proposed, but are not in general use:
`examples include research software from University California Berkeley called Janus and
`described in a paper entitled “Janus: An Approach for Confinement of Untrusted
`
`25
`
`Applications”, David A. Wagner, UC Berkeley Computer Science Division, report CSD- -
`
`99-1056, August 1999. These utilise security features within an operating system to
`separate software executing within the sandbox from other software executing on a
`computer system in the form of a main workstation desktop.
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`The use of sandboxing does not, however, really solve the problem. This is because viruses
`maystill spread freely within the constrained environment provided by the sandbox and
`users will inevitably need to move data across the sandbox boundary,to reflect business
`
`needs to exchange data.
`
`It is an objectof the invention to provide an alternative form of computer system protection.
`
`The present invention provides computer system protection including a sandbox application
`for receiving potentially harmful data and defining a sandbox desktop, characterised in that
`it also includes means for encrypting potentially harmful data to render it harmless and
`means for decrypting encrypted data for processing by means of an application constrained
`by the sandbox application.
`
`The invention provides the advantage of enabling potentially harmful data to be examined
`and executed while constrained by the sandbox application: this in turn allows a user to
`decide the data’s importance while the data is quarantined by encryption. Unwanted
`material can be discarded, avoiding the need for further inspection. Moreover, important
`messages need not be delayed awaiting expert inspection, but instead made available to a
`system user in a constrained quarantine environment provided by a sandbox desktop.
`
`The sandbox application may be arranged to employ a desktop application which does not
`communicate with applications associated with a main desktop of a computer system to
`
`which the protection is applied.
`
`The computer system protection may includes means for enabling a user to retrieve data
`from the sandboxapplication in encrypted form forrelaying to expert inspection and means
`for checking decrypted data released from the sandbox desktop for potentially harmful
`content. It may be mounted upon a computerlinked via a firewall to an external network,
`
`In another aspect, the invention provides a protected computer system having a sandbox
`application for receiving potentially harmful data and defining a sandbox desktop,
`characterised in that it also includes a firewall protecting a checker from an external
`
`10
`
`15
`
`20
`
`25
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`network to which it is linked, the checker includes means for encrypting potentially harmful
`data to render it harmless and the system has means for decrypting encrypted data for
`processing by the sandbox application.
`
`The protected computer system may include software for encrypting potentially harmful data
`which a user wishes to process using applications associated: with a main desktop of the
`system instead of a sandbox application. It may also include software for encrypting
`potentially harmful data to renderit harmless and software for decrypting encrypted data for
`"processing by meansof applications constrained by the sandbox application.
`
`The sandbox application may be arranged to employ a desktop application which does not
`communicate with applications associated with a main desktop of a computer system to
`which the protection is applied.
`
`The protected computer system may include software for enabling a user to retrieve data
`from the sandbox application in encrypted form for relaying to expert inspection, and
`software for checking decrypted data released from the sandbox desktop for potentially
`harmful content. It may linked via a firewall to an external network.
`
`10
`
`15
`
`In a further aspect, the present invention provides a methodof protecting a computer system
`against harmful data, the system including a sandbox application for receiving potentially
`harmful data and defining a sandbox desktop, characterised in that the method incorporates
`the steps of:-
`
`20
`
`(a)
`
`(b)
`
`encrypting potentially harmful data to renderit harmless, and
`
`decrypting encrypted data for processing by meansof an application constrained by
`the sandbox application.
`
`The sandbox may incorporate a desktop application which does not communicate with
`applications associated with a main desktop of a computer system protected by the method.
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`The method may include the step of retrieving data from the sandbox application in
`encrypted form for relaying to expert inspection. It may also include checking decrypted
`data released from the sandbox desktop for potentially harmful content, and may be used
`with a computer system linked via a firewall to an external network .
`
`The present invention also provides a method of protecting a computer system having a
`sandbox application for receiving potentially harmful data and defining a sandbox desktop,
`characterised in that the method includes:
`
`(a)
`
`(b)
`
`(c)
`
`10
`
`using a firewall to protect a checker from an external network to which the system is
`linked,
`
`using the checker to encrypt potentially harmful data to renderit harmless, and
`
`decrypting encrypted data for processing by the sandbox application.
`
`In a still further aspect, the present invention provides computer software for protecting a
`computer system against harmful data, the system including a sandbox application for
`receiving potentially harmful data and defining a sandbox desktop, characterised in that the
`
`15
`
`computer software is arrangedto:-
`
`a) encrypt potentially harmful data to renderit harmless, and
`
`b) decrypt encrypted data for processing while being constrained by the sandbox
`application.
`
`The computer software may incorporate within the sandbox a desktop application arranged
`not to communicate with applications associated with a main desktop of a computer system
`which it protects. It may be arranged to retrieve data from the sandbox application in
`encrypted form forrelaying to expert inspection, and to check decrypted data released from
`the sandbox desktop for potentially harmful content.
`
`The computer system may be linked via a firewall to an external network.
`
`Ina further alternative aspect, the present invention provides computer software for protecting |
`a computer system having a sandbox application for receiving potentially harmful data and
`defining a sandbox desktop, characterised in that the computer software is arranged to:
`
`20
`
`25
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`a)
`
`b)
`
`implement a firewall protecting a checker from an external network to which the system
`is linked,
`
`implement encryption by the checker to encrypt potentially harmful data to render it
`harmless, and
`
`c) decrypt encrypted data for processing by the sandbox application.
`
`In order that the invention might be more fully understood, embodiments thereof will now be
`described, by way of example only, with reference to the accompany drawings, in which:
`
`Figures 1 and 2
`
`are schematic diagramsof prior art computer systems;
`
`Figure 3
`
`is a schematic diagram of computer protection ofthe invention;
`
`10
`
`Figures 4 and 5
`
`illustrate use offirewalls for computer protection;
`
`Figure6 is a flow diagram of a computer protection procedure in accordance with
`the invention; and
`
`Figure 7
`
`illustrates use of main and sandbox desktops on a workstation in
`accordance with the invention.
`
`15
`
`25
`
`Referring to Figure 1, a prior art computer system protection 10 is illustrated which
`corresponds to current industry best practice: an external computer network 12 supplies
`incoming data 14 to automatic inspection software 16 (software checker) as the data enters
`a computer system (not shown). The software checker 16 routes any suspect data 18 to a
`quarantine memory 20, which is implemented as a portion of a server computer’s file
`storage protected by the operating system’s access controls; it transmits harmless data 22 to
`
`an internal receiving network 24. The quarantine area is in a central network operations
`centre and is accessible only by expert inspection staff 26 responsible for manual inspection
`of suspect data. These experts monitor the quarantine storage 20 for harmless data, and
`when it is found it is transmitted as cleared data 28 to the receiving network 24. The
`software checker 16 will both treat as suspect a proportion of data that is in fact harmless,
`and fail to identify new kinds of attack. Expert inspection staff 26 are costly, introduce
`delay and are not infallible.
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`Referring to Figure 2,
`
`the prior art technique known as sandboxing is illustrated. An
`
`external computer network 42 supplies incoming data 44 to a user’s computer 46 which is
`
`patt of an internal computer network 48. The data 44 is not accessible by main desktop
`
`software applications (e.g. word processing) running on the computer 46 and indicated by
`
`circles such as 50: instead the data 44 is passed to a sandbox 52 providing a constrained
`
`environment, and the data cannot corrupt software applications outside it, ie. beyond the
`
`sandbox boundary. The sandbox may be implemented by interpreting the application
`
`software running within it, as is the case with JAVA,and ensuring that noinstruction exists
`
`that gives access to data beyond the sandbox’s boundary. Alternatively, the application
`
`10
`
`software may be directly executed, but operating system access controls are appliedto all
`
`resources beyond the sandbox boundary to prevent the sandboxed software from accessing
`it. Computer system protection in accordance with the invention is illustrated in Figure 3.
`An external computer network 60 (e.g. the Internet) supplies incoming data 62 to checker
`software 64 as the data enters a computer system (not shown). The software checker 64
`passes on any data 65 it deems harmless; it routes any suspect data 66 to an encryptor 68
`which encrypts it to render it unusable and therefore harmless. Any symmetric encryption
`algorithm rendering data unusable would be suitable, such as the standard Data Encryption
`Standard (DES), described by the US Federal Information Processing Standards Publication
`
`15
`
`46-2.
`
`20
`
`Harmless data 65 and encrypted suspect data 70 are passed to a user’s computer 72 which is
`
`part of an internal computer network 74, The computer 72 has within it a desktop quarantine
`area or sandbox 76 for suspect data, and this applies to each computer 72 connected into the
`
`network 74. The computer 72 runs main desktop applications such as 78 which receive the
`encrypted data 70 and can store it and pass it around, but these applications 78 cannotuseit
`in any meaningful way becauseit is encrypted. Equally well the applications 78 cannot be
`interfered with by the encrypted data because encryption makes it impossible to execute or
`
`25
`
`interpret the data.
`
`On entry into the sandbox 76, the encrypted data is decrypted to usable form by a sandbox
`import function 80:
`it
`then becomes accessible by software applications or tools 82
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`executing in the sandbox 76. Release check software 84 is included in the sandbox 76 for
`
`checking whether or not an extract from decrypted data is harmless. Data which does not
`pass through the release check 84 because it is suspect may be important enough to require
`manual inspection by experts. In such cases, a user submits a request 86 that the suspect
`data be inspected, perhaps by e-mail or via a web interface, to a request queue 88. Experts
`90 take requests from the queue 88 and respond by decrypting the suspect data and
`manually checkingit.
`
`The advantage of this approach is that a user can examine the suspect data and even execute
`
`it if necessary while it is constrained by the sandbox, allowing the user to decide the
`
`10
`
`15
`
`importance of suspect data quarantined by encryption. If the user decides the suspectdata is
`irrelevant to the user’s business needs, for example unsolicited advertising material, the
`user can discard it, saving wasted effort on the part of a manual
`inspection team.
`Conversely, if the suspect data is part of an important message relevant to the user’s work,
`
`the whole message is not delayed awaiting scrutiny by a manual inspection team, but
`
`instéad is made available to the user in the constrained environment of their desktop
`sandbox.
`
`The desktop quarantine area 76 implemented by the invention is a type of a sandbox
`
`because within it a user may work with suspect data in decrypted form using constrained
`
`20
`
`sandbox applications 82. The sandbox can be constructed using appropriate tools well
`known in the prior art, for example JAVA or operating system controls. The cryptographic
`mechanism ensures that suspect data cannot be accessed outside the sandbox 76 in non-
`
`encrypted form by a user’s main desktop applications. Suspect data attempting to cause
`damage is inhibited by the sandbox 76.
`
`To carry out a business function, a computer user may well need to make extracts from
`
`suspect data, for example by using cut-and-paste facilities provided by the applications, and
`moove it from the sandbox 76 to make it accessible by main desktop applications 78: it is
`
`then necessary to check that each extract is harmless. In many cases it will be possible for
`
`automatic release check software such as 84 to assert confidently that an extract is harmless,
`
`even thoughit is not possible to do so forthe suspect data as a whole. For example,data in
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`the form of a document containing macros might be considered suspect, but the document
`might contain extracts such as paragraphs of text which might be decreed harmless by
`
`checker software.
`
`In many cases the sandbox 76 avoids the need for a manual inspection: however,data thatis
`suspect will sometimes need to be taken from the sandbox 76 and transferred to a user’s
`main desktop environment for access by applications 78. This will be rejected by the release
`check 84 becauseit is suspect and so will still require manual inspection by experts 90, to
`
`whom requests 86 for manual inspection are submitted.
`
`Since a user is now requesting the manual inspection,it is possible to assign priorities and
`costs according to business needs. Moreover, inspections are performed far less frequently
`and only when strictly necessary because the invention avoids unnecessary checking of
`material which is for example unimportantor for which a “clean”or edited version of it can
`
`be obtained from the senderat the user’s request.
`
`The invention employs standard techniques for detecting Trojan Horse and virus software to
`inspect incoming data for suspect contents. Should any part of the incoming data, for
`example an attachment of an e-mail message, be considered a potential attack,
`it is
`encrypted. The original data is modified by replacing suspect parts of it with an encrypted
`equivalent and the data so modified is allowed to proceed as normal. Thus an e-mail
`message with one suspect attachment would be allowed to proceed with that attachment
`replaced by an encrypted version, but the message body and any other attachments would
`
`remain readable.
`
`Encryption renders data unusable, hence encrypted suspect data can be safely allowed to
`pass to a user’s computer 72: it remains unusable until it is decrypted by an appropriate
`decryption key, which is not available to users or their main desktop applications butis as
`has been said available to the sandbox import function 80.
`
`Havingreceived an encrypted form of some suspect data, a user views or manipulatesit by
`passing it to the sandbox 76 whereupon it is decrypted to usable form as indicated at 80.
`
`16
`
`15
`
`20
`
`25
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`10
`
`When decrypted the suspect data can be accessed by software applications 82 running in the
`sandbox 76. The main desktop and the sandbox may be running the sameapplications, but
`they create separate instances of these applications which cannot communicate with one
`another. For example, Microsoft ® Word could be used to edit documents both on the main
`desktop and in the sandbox: if so, Word would be run in two separate instances,i.e. one for
`the main desktop and the other for the sandbox, and the two instances would not be able to
`
`communicate directly with one another.
`
`Figure 4 (in which parts equivalent to those described earlier are like-referenced) shows the
`internal or corporate network 74 hosting a mail server 102 and a numberof user computers
`(workstations) such as 72. The network 74 is defended fromhostile data on the Internet 60
`by a computer 108 referred to as a firewall which controls communication between
`applications running on computers in different networks. The textbook “Building Internet
`Firewalls” by D B Chapman andE D Zwicky discloses interposing a software application
`proxy in a computer such as 108 between networks. The computer 108is referred to as a
`proxy firewall or bastion host firewall. Software applications on the linked networks 60 and
`74 communicate via an application proxy on the computer 108.
`
`10
`
`15
`
`The computerfirewall 108 is shown in more detail in Figure 5: it comprises a bastion host
`110 that mediates network accesses between the Internet 60 and the corporate network 74,
`
`together with a checker 116 connectedto the bastion host 110 via a secondary network 114
`reserved exclusively for this purpose, commonly called a de-militarised zone.
`
`20
`
`The bastion host 110 is commercially available firewall software, such as Network
`Associates’ Gauntlet. The checker 116 is a computer hosting an e-mail proxy,
`that
`incorporates server side components of desktop quarantine, i.e.
`the checker 64 and the
`
`encryptor 68.
`
`25
`
`The flow diagram illustrated in Figure 6 shows the action of the checker 116 in the present
`embodiment of the invention, although checks on e-mail can be implemented using
`standard virus checker software, such as Sophos Sweep which is commercially available. At
`
`140, an e-mail message is accepted from an external sender via the bastion host 110 (not
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`Ii
`
`shown). The message is decomposed at 142 into individual parts (message body &
`attachments), and a first such part is selected at 144 for checking at 146 by the virus checker
`116. If the part is found at 148 to contain dangerous code, then the whole messageis placed
`in server quarantine 150 and processing of the message is abandonedat 152.If alternatively
`the part is not identified at 148 as containing dangerous code, and alsoifit is verified safe at
`
`154 then it is passed to the next stage 156 whereit is stored temporarily.
`
`If the message part cannotbe verified safe (harmless) at 154 then it is encrypted at 158: the
`resulting encrypted version replaces the unverified message part and passesto the next stage.
`' 156 for temporary storage. If one or moreparts remain in the message, then the next part is
`selected at 160 and the procedure beginning with step 146 is iterated for that part. This
`continues for successive message parts until no more parts remain or until abandonment of
`
`message processing has taken place at 152, whichever occursfirst. If there has been no such
`
`abandonmentby the time the last message part has been processed, a partially encrypted and
`partially non-encrypted e-mail message will have accumulated in storage at 156. This stored
`message is forwarded at 162 to the corporate mail server 102 via the bastion host firewall
`
`110.
`
`The workstations 72 are organised as shown in Figure 7, in which parts equivalent to those
`described earlier are like-referenced. Each workstation 72 has the feature that processing
`and storage are divided and associated with respective user desktops — a main desktop 200°
`in which a user works on trusted data with applications 78, and a sandbox desktop 76 with
`software applications such as 82 for working with data in desktop quarantine. The main and
`sandbox desktop applications 78 and 82 are isolated from one another:i.e. the main desktop
`applications 78 do not have access to data being processed by the sandbox desktop
`applications 82 and therefore cannot be harmed by such data.
`
`Software for three special system processes run on the workstation 72, a decryption process
`80, an encryption process 208 and a check process 210: these provide a user with the ability
`to move data between the two desktops 76 and 200. The decryption process 80 takes
`encrypted data from the main desktop 200, decrypts it and movesit to the sandbox desktop
`76. The encryption process 208 performs a converse action of taking decrypted data from
`
`LO
`
`15
`
`20
`
`25
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`12
`
`the sandbox 76, encrypting it and moving it to the main desktop 200. The checkprocess
`
`210 moves data from the sandbox 76 to the main desktop 200 without encrypting it, subject
`
`to the criterion that data so moved has passed content checks establishing that it does not
`
`contain any potentially damaging code.
`
`Referring to Figures 4 and 5 once more, the firewall 108 may receive a message with an
`
`attachment which appears to be an executable but which is not clearly an attack: the bastion
`
`host 110 then passes the message to the checker 116. If the checker 116 ascertains that the
`
`attachment is suspect, the checker 116 encrypts it with an encryption key. The resulting
`
`message with encrypted attachment is passed back through the bastion host 110 and on to
`
`10
`
`the corporate mail server 102.
`
`The message’s recipient workstation 72 runs a mail client software application 212 on the
`main desktop 200 and retrieves the message fromthe mail server 102. The mail client 212,
`or any other software 78 running on the main desktop 200, is able to access the encrypted
`
`attachment: this software cannot however decrypt the encrypted attachment because it does
`
`15
`
`not have access to the relevant encryption key. Thus suspect data contained in the encrypted
`
`attachment cannot be accessed or executed.
`
`Should a user decide that the encrypted attachment is uninteresting, perhaps by reading the
`
`message to which it is attached, it can be deleted. However, a user wishing to access data in
`
`the encrypted attachment must first use the decrypt process 206 to decrypt the attachment
`and pass its data to the sandbox desktop 76. Once in the sandboxdesktop 76, the data can
`
`20
`
`be accessed or executed by software applications 82, but the sandboxrestrictions constrain
`the applications’ behaviour so if the data in the attachment proves to be an attack any
`
`consequential damage is contained within the sandbox, affecting only applications 82 and
`
`their data, not applications 78.
`
`25
`
`If the user needs to take some of the data contained in the attachment back to the main
`
`desktop 200, it is passed through the check process 210. This applies content checkers to
`
`the data and only allows it to pass if it can be determined safe. Data failing the check
`
`process 210 does not pass from the sandbox desktop 76 to the main desktop 200.
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`13
`
`If the data contained in the attachment is needed but fails the check process 210, the user
`may pass it back to the main desktop 200 through the encryption process 208:this encrypts
`the data which becomes unusable and hencesafe. The encrypted data may be passed(e.g. by
`e-mail) to a central team of security experts for a manual review.
`
`In the above example a message or attachment is placed in server quarantine 150 if it is
`
`proves to contain dangerous code. However, alternative strategies are also possible: for
`
`example, a message could be sent on its way after a suspect part has been replaced by a
`
`notification of the part’s removal. Alternatively, parts found to be potentially dangerous
`
`could be marked as such, encrypted and then sent on their way accompanied by remaining
`
`10
`
`unencrypted parts. The decryption process 80 on a user’s workstation 72 would not decrypt
`
`potentially dangerous data, but the equivalent on the desktop of the central team of security
`
`experts would do so.
`
`The invention improves the handling of data found to be suspect by checker software such
`
`as 116. This reducesthe effort required for expert manual intervention to check suspect.data
`
`15
`
`because in many cases a user will take all necessary action without involving experts: i.e. a
`
`user will delete unwanted data in some cases and in others request repeat messages from a
`
`sender, This user action avoids the need for expert inspection and so eliminates delays
`
`introduced byit.
`
`Appropriate computer software or computer programs to implementthe invention are either
`
`20
`
`commercially available (e.g. sand box, firewall or checker software) or can be implemented
`
`(e.g. where interfacing is required) straightforwardly by a programmer of ordinary skill
`without requiring invention. It can easily be recorded on a carrier medium and run on a
`
`computer system of the kind described above. Such software and system will therefore not
`
`be described further.
`
`25
`
`

`

`WO 02/056156
`
`PCT/GB01/05767
`
`14
`
`CLAIMS
`
`1.
`
`Computer system protection including a sandbox application (76) for receiving
`potentially harmful

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket