The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 14, 2010

Filed:

Feb. 26, 2007
Applicants:

Ambrose T. Treacy, Woodinville, WA (US);

Maithili V. Dandige, Sammamish, WA (US);

Eric Fox, Seattle, WA (US);

Robert A. Little, Redmond, WA (US);

Christopher C. White, Seattle, WA (US);

David Leblanc, Monroe, WA (US);

Benjamin J. Bunker, Bellevue, WA (US);

Aaron E. Erlandson, Redmond, WA (US);

Inventors:

Ambrose T. Treacy, Woodinville, WA (US);

Maithili V. Dandige, Sammamish, WA (US);

Eric Fox, Seattle, WA (US);

Robert A. Little, Redmond, WA (US);

Christopher C. White, Seattle, WA (US);

David LeBlanc, Monroe, WA (US);

Benjamin J. Bunker, Bellevue, WA (US);

Aaron E. Erlandson, Redmond, WA (US);

Assignee:

Microsoft Corporation, Redmond, WA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); H04L 9/00 (2006.01); G06F 12/14 (2006.01);
U.S. Cl.
CPC ...
Abstract

Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.


Find Patent Forward Citations

Loading…