| CPC G06F 21/568 (2013.01) [G06F 21/54 (2013.01); G06F 21/563 (2013.01); G06F 21/602 (2013.01); G06F 21/6209 (2013.01)] | 20 Claims |

|
1. A method of disarming malicious code in protected content in an edge device having a processor, the method comprising:
intercepting, by the processor, a protected file transmitted in a network;
requesting, by the processor, a credential for accessing the protected file, wherein the credential is associated with an intended recipient of the protected file;
accessing, by the processor, a content of the protected file based on the credential;
altering, by the processor, at least a portion of digital values of the content to disarm malicious aspect of the content of the protected file without intentionally altering any non-malicious functionality, wherein the altering creates a modified file that is substantially similar to the protected file; and
enabling access to the modified file in the network.
|