US 12,443,715 B2
Disarming malware in protected content
Aviv Grafi, Ramat Gan (IL)
Assigned to VOTIRO CYBERSEC LTD., Tel Aviv (IL)
Filed by Votiro Cybersec Ltd., Tel Aviv (IL)
Filed on Oct. 18, 2023, as Appl. No. 18/489,368.
Application 18/489,368 is a continuation of application No. 17/460,448, filed on Aug. 30, 2021, granted, now 11,822,660.
Application 17/460,448 is a continuation of application No. 16/448,243, filed on Jun. 21, 2019, granted, now 11,106,793, issued on Aug. 31, 2021.
Application 16/448,243 is a continuation of application No. 15/926,484, filed on Mar. 20, 2018, granted, now 10,331,890, issued on Jun. 25, 2019.
Claims priority of provisional application 62/473,902, filed on Mar. 20, 2017.
Prior Publication US 2024/0045965 A1, Feb. 8, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/56 (2013.01); G06F 21/54 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/568 (2013.01) [G06F 21/54 (2013.01); G06F 21/563 (2013.01); G06F 21/602 (2013.01); G06F 21/6209 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of disarming malicious code in protected content in an edge device having a processor, the method comprising:
intercepting, by the processor, a protected file transmitted in a network;
requesting, by the processor, a credential for accessing the protected file, wherein the credential is associated with an intended recipient of the protected file;
accessing, by the processor, a content of the protected file based on the credential;
altering, by the processor, at least a portion of digital values of the content to disarm malicious aspect of the content of the protected file without intentionally altering any non-malicious functionality, wherein the altering creates a modified file that is substantially similar to the protected file; and
enabling access to the modified file in the network.