A system and method are provided for diagnosing, remedying and blocking harmful information including computer viruses online over a computer network via which a web server and a client are linked to each other. The method includes, on a computer network through which a web server and a client system are linked to each other, the web server receiving a connection request from the client system over the computer network. Then, the web server transmits a harmful information blocking code module to the client system. Once the transmission of the harmful information blocking code module is completed the harmful information blocking code module automatically runs on the client system to block in real time harmful information including computer viruses. The harmful information blocking code module is automatically transmitted to and installed in the client system only by online connecting to the harmful information management server, so that the harmful information detected on the client system can be actively blocked in real time without requiring a manual installation process.

Patent
   RE44249
Priority
Mar 07 1999
Filed
Dec 20 2010
Issued
May 28 2013
Expiry
Nov 28 2020
Assg.orig
Entity
Small
1
16
all paid
0. 40. A client computer comprising:
a connection to a computer network;
a processor, wherein, in response to receipt of a harmful information blocking code module from the computer network, the processor is configured to execute the harmful information blocking code module, which causes the processor to be configured to:
inspect file input/output (I/O) by intercepting I/O data of at least one file I/O routine on the client system;
determine, based on the intercepting, whether at least one file corresponding to the file I/O routine is harmful or not;
determine whether the file determined to be harmful can be treated; and
in response to determining that a file is harmful and cannot be treated, abort execution of the file I/O routine.
0. 28. A method for blocking harmful information at a client system, wherein the client system is connected to a server system via a computer network, the method comprising:
sending a request to download a harmful information blocking code module from the server system;
downloading the harmful information blocking code module;
executing the harmful information blocking code module runs on the client system to block harmful information wherein executing the harmful information blocking code module comprises:
inspecting file input/output (I/O) by intercepting I/O data of at least one file I/O routine on the client system;
determining, based on the intercepting, whether at least one file corresponding to the file I/O routine is harmful or not; and
in response to determining that a file is harmful, aborting execution of the file I/O routine if the file cannot be treated.
0. 48. A non-transitory computer-readable medium on which are stored instructions for execution by a client computer system connected to a server computer system via a computer network, wherein the instructions are received at the client computer system from the server system in response to a request from the client computer system, and wherein the instructions execute on the client computer system after receipt of the instructions from the server computer system, the instructions comprising:
instructions to inspect file input/output (I/O) by intercepting I/O data of at least one file I/O routine on the client system;
instructions to determine, based on the intercepting, whether at least one file corresponding to the file input/output routine is harmful or not; and
instructions to, in response to determining that a file is harmful, abort execution of the file I/O routine if the file cannot be treated.
0. 16. A method performed by a server system for blocking harmful information at a client system, wherein the server system and the client system are connected by a computer network, the method comprising:
receiving a request from the client system;
transmitting to the client system, in response to the request, a harmful information blocking code module, wherein the harmful information blocking code module is configured to execute on the client system to block harmful information in response to completion of transmission of the harmful information blocking code module to the client system, the harmful information blocking code module configured to:
inspect file input/output by intercepting at least one file input/output routine on the client system;
determine whether at least one file corresponding to the file input/output routine is harmful or not; and
in response to determining that a file is harmful, abort execution of the file input/output routine if the file cannot be treated.
0. 1. A method for blocking in real time harmful information in a file to be executed, the method comprising the steps of:
(a) on a computer network through which a web server and a client system are linked to each other, the web server receiving a connection request from the client system over the computer network;
(b) the web server transmitting a harmful information blocking code module to the client system; and
(c) once the transmission of the harmful information blocking code module is completed, the harmful information blocking code module automatically running on the client system to block in real time harmful information including computer viruses,
wherein the step (c) comprises steps of:
(c1) inspecting file input/output (I/O) on the client system by hooking up file I/O routines,
(c2) determining whether the file to be executed corresponding to the inspected file input/output in the step (c1) is harmful or not; and
(c3) treating a file determined to be harmful in the step (c2) and executing the file, if it can be treated, and aborting the execution of the file determined to be harmful in the step (c2), if it cannot be treated.
0. 2. The method of claim 1, wherein in the step (c3), if the file determined to be harmful in the step (c2) cannot be treated, the file is transmitted to the web server.
0. 3. The method of claim 1, wherein the step (c3) comprises requesting the client system user's approval for the execution of the step (c3).
0. 4. The method of claim 1, wherein the step (c) further comprises steps of:
(c4) inspecting network packet input/output (1/0) on the client system;
(c5) determining whether packets inspected in the step (c4) are harmful or not; and
(c6) if any packet is determined to be harmful, blocking a communication port assigned for the packet I/O.
0. 5. The method of claim 1, wherein the harmful information blocking code module executed in the step (c) checks whether current processes running on the client system are harmful or not.
0. 6. The method of claim 1, wherein the harmful information blocking code module executed in the step (c) displays its running status in a separate window, and the execution of the harmful information blocking code module is aborted when the separate window is closed.
0. 7. The method of claim 1, wherein the harmful information blocking code module executed in the step (c) continues to run on the client system even when the client system accesses another web server.
0. 8. A method for blocking in real time harmful information in a file to be executed, the method comprising the steps of:
(a) on a computer network through which a first web server, a second web server and a client system are linked to each other, the client system connecting to the second web server over the computer network;
(b) the client system connecting to the first web server over the computer network, according to information provided from the second web server to the client system;
(c) the first web server transmitting a harmful information blocking code module to the client system; and
(d) once the transmission of the harmful information blocking code module is completed, the harmful information blocking code module automatically running on the client system to block in real time harmful information including computer viruses,
wherein the step (d) comprises steps of:
(d1) inspecting file input/output (I/O) on the client system by hooking up file I/O routines;
(d2) determining whether the file to be executed corresponding to the inspected file input/output in the step (d1) is harmful or not; and
(d3) treating a file determined to be harmful in the step (d2) and executing the file, if it can be treated, and aborting execution of the file determined to be harmful in the step (d2), if it cannot be treated.
0. 9. The method of claim 8, wherein the harmful information blocking code module executed in the step (d) continues to run on the client system even when the client system accesses another web server.
0. 10. A method for blocking in a real time harmful information in a file to be executed in real time, the method comprising steps of:
(a) on a computer network through which a first web server and a client system are linked to each other, the first web server receiving a connection request from the client system over the computer network;
(b) the connection request is issued by the client system according to information provided from a second web server after the client system is connected to the second web server separated from the first web server;
(c) once the first web server transmits a harmful information blocking code module to the client system, the harmful information blocking code module automatically running on the client system to block in real time harmful information including computer viruses,
wherein the step (d) comprises steps of:
(c1) inspecting file input/output (I/O) on the client system by hooking up file I/O routines;
(c2) determining whether the file to be executed corresponding to the inspected file input/output in the step (c1) is harmful or not; and
(c3) treating a file determined to be harmful in the step (c2) and executing the file, if it can be treated, and aborting execution of the file determined to be harmful in the step (c2), if it cannot be treated.
0. 11. The method of claim 10, wherein the harmful information blocking code module transmitted in the step (c) continues to run on the client system even when the client system accesses another web server.
0. 12. A system for blocking in real time harmful information in a file to be executed, comprising:
a first web server for providing online services through a computer network; and
a client computer linked with the first web server via the computer network,
wherein when the first web server receives a connection request from the client system, the first web server transmits a harmful information blocking code module to the client computer, and the harmful information blocking code module is automatically executed on the client computer to block in real time harmful information including computer viruses, and wherein the harmful information blocking code module inspect file input/output (I/O) on the client system by hooking up file I/O routines, and
determines whether the file to be executed corresponding to the inspected file input/output is harmful or not: and
treats a file determined to be harmful and executes the file, if it can be treated, and aborts the execution of the file determined to be harmful, if it cannot be treated.
0. 13. The system of claim 12, wherein the harmful information blocking code module displays its running status on a separate window, and the execution of the harmful information blocking code module is aborted when the separate window is closed.
0. 14. The system of claim 12, further comprising a second web server linked to the client computer through the computer network to provide online services through the computer network, and
wherein when the client computer is connected to the second web server through the computer network, the second web server provides the client computer with hyperlink information used to access to the first web server.
0. 15. The system of claim 12, wherein the harmful information blocking code module continues to run on the client computer even when the client computer accesses another web server.
0. 17. The method of claim 16, wherein the harmful information blocking code module is further configured to allow execution of the file input/output routine, if the file is determined not to be harmful.
0. 18. The method of claim 16, wherein the harmful information blocking code module is further configured to treat the file determined to be harmful, if it can be treated.
0. 19. The method of claim 16, wherein the harmful information blocking code module is further configured to transmit the file to a web server, if the file determined to be harmful cannot be treated.
0. 20. The method of claim 16, wherein the harmful information blocking code module automatically runs on the client system when transmission of the harmful information blocking code module to the client system is completed.
0. 21. The method of claim 16, wherein the harmful information blocking code module is further configured to:
inspect network packet input/output (I/O) on the client system,
determine whether at least one inspected packet is harmful or not; and
abort an internal process supporting the network packet I/O if any packet is determined to be harmful.
0. 22. The method of claim 21, wherein the internal process comprises at least one socket I/O routines.
0. 23. The method of claim 21, wherein at least one packet comprises at least one of a HTTP request message header and a DNS lookup message header.
0. 24. The method of claim 16, wherein the harmful information blocking code module displays its running status in a separate window.
0. 25. The method of claim 16, wherein the harmful information blocking code module is further configured to display advertising contents in a separate window.
0. 26. The method of claim 16, wherein the harmful information blocking code module is an object coded program linked to a web browser.
0. 27. The method of claim 26, wherein the object coded program is one of an ActiveX control, Java applet or Java script.
0. 29. The method of claim 28, wherein executing the harmful information blocking code module further comprises allowing execution of the file, if the file is determined not to be harmful.
0. 30. The method of claim 28, wherein executing the harmful information blocking code module further comprises treating the file determined to be harmful, if it can be treated.
0. 31. The method of claim 28, wherein executing the harmful information blocking code module further comprises causing display of a separate window to display a running status of the harmful information blocking code module.
0. 32. The method of claim 28, wherein executing the harmful information blocking code module further comprises transmitting the file to another web server, if the file determined to be harmful cannot be treated.
0. 33. The method of claim 28, wherein the harmful information blocking code module automatically runs on the client system when transmission of the harmful information blocking code module to the client system is completed.
0. 34. The method of claim 28, wherein executing the harmful information blocking code module further comprises:
inspecting network packet input/output (I/O) on the client system,
determining whether at least inspected packet is harmful or not; and
aborting an internal process supporting the network packet I/O, if any packet is determined to be harmful.
0. 35. The method of claim 34, wherein the internal process comprises at least one of socket I/O routines.
0. 36. The method of claim 34, wherein the network packet comprises at least one of a HTTP request message header and a DNS lookup message header.
0. 37. The method of claim 28, wherein the harmful information blocking code module displays advertising contents in a separate window.
0. 38. The method of claim 28, wherein the harmful information blocking code module is an object coded program linked to a web browser.
0. 39. The method of claim 38, wherein the object coded program is one of an ActiveX control, Java applet or Java script.
0. 41. The client computer of claim 40, wherein execution of the harmful information blocking code module by the processor further configures the processor to allow execution of the file I/O routine, if the file is determined not to be harmful.
0. 42. The client computer of claim 40, wherein execution of the harmful information blocking code module by the processor further configures the processor to:
treat the file determined to be harmful, in response to determining that the file determined to be harmful can be treated.
0. 43. The client computer of claim 40, wherein execution of the harmful information blocking code module by the processor further configures the processor to:
transmit the file determined to be harmful to a web server, in response to determining that the file determined to be harmful cannot be treated.
0. 44. The client computer of claim 40, wherein the processor is configured to execute the harmful information blocking code module automatically when receipt of the harmful information blocking code module at the client system is completed.
0. 45. The client computer of claim 40, wherein execution of the harmful information blocking code module by the processor further configures the processor to:
inspect network packet I/O on the client computer,
determine whether at least one inspected packet is harmful or not; and
abort an internal process supporting the network packet I/O if any packet is determined to be harmful.
0. 46. The client computer of claim 40, wherein execution of the harmful information blocking code module by the processor further configures the processor to:
display running status of the harmful information blocking code in a separate window.
0. 47. The client computer of claim 40, wherein execution of the harmful information blocking code module by the processor further configures the processor to:
display advertising contents in a separate window.
0. 49. The non-transitory computer-readable medium of claim 48, further comprising:
instructions to allow execution of the file I/O routine, if the file is determined not to be harmful.
0. 50. The non-transitory computer-readable medium of claim 48, further comprising:
instructions to treat the file determined to be harmful, in response to determining that the file determined to be harmful can be treated.
0. 51. The non-transitory computer-readable medium of claim 48, further comprising:
instructions to transmit the file determined to be harmful to a web server, in response to determining that the file determined to be harmful cannot be treated.
0. 52. The non-transitory computer-readable medium of claim 48, further comprising:
instructions to inspect network packet I/O on the client computer,
instructions to determine whether at least one inspected packet is harmful or not; and
instructions to abort an internal process supporting the network packet I/O if any packet is determined to be harmful.
0. 53. (The non-transitory computer-readable medium of claim 48, further comprising:
instructions to display running status of the harmful information blocking code in a separate window.
0. 54. The non-transitory computer-readable medium of claim 48, further comprising:
instructions to display advertising contents in a separate window.

firstis which prevents preventing the accessing of undesirable lascivious web sites. This monitoring for preventing undesirable accessing can be accomplished by checking the header of a HTTP request message or a Domain Name Service (DNS) lookup message.

In other words, step 420 may involve additional functions for checking for possible occurrences of harmful information on the client 130. Subsequent operations of the harmful information blocking code module will be described with reference to file I/O inspection, however, file I/O inspection is only an example and should not be contrived as limiting the scope of the invention.

Next, it is determined whether files, which are monitored in step 420, are harmful or not (step 430). This determination can be performed by various methods, according to the type of harmful information or the necessities of applications. For example, a pattern comparison with known harmful information, for example, identified computer viruses, may be performed for the purpose of the determination. In general, computer viruses operate in a predetermined pattern, and thus the pattern comparison technique can be a tool for identifying new species of viruses.

In step 430, it is preferable to make a determination as to whether or not a network packet is harmful, or whether the client 130 attempts to access an undesirable lascivious web site.

If it is determined that the monitored information is safe, the harmful information code module performs no specified treatment on the file. Accordingly, a user is allowed to continue his or her task on the client 130 irrespective of the harmful information code blocking module.

If the monitored information is determined to be harmful, it is further determined whether the monitored information is related to file I/O or packet I/O to provide a proper treatment consistent with the harmful file or packet. Although not shown in FIG. 4, as for blocking access to an desirable lascivious web site, a HTTP request message can be reformulated to guide the client 130 to a desirable web site good for users.

In the case where the monitored information is related to file I/O, it is determined whether the harmful file can be properly treated (step 450). If the treatment is possible, the related file is treated (step 454). If the treatment is impossible, execution of the corresponding file is merely aborted (step 452). In step 454, it is preferable to notify a user that harmful information was detected, and to request approval for performing treatment on the harmful information.

Lastly, it is preferable to notify the harmful information management server 110 if information indicative of harmful information is detected from the client 130 online, using the harmful information blocking code module (step 470). If the detected information is a new kind of harmful information and thus cannot be treated, it is preferable to transmit the entire file related to the unidentified harmful information to the harmful information management server 110. Of course, it is preferable to get pre-approval regarding notification of the harmful information detection and/or the transmission of the unidentified harmful information file to the harmful information management server 110.

In other words, the present embodiment provides the function of automatically providing the harmful information management server 110 with information on harmful information detected in the client 130. Accordingly, the harmful information management server 110 is allowed to acquire statistical data on harmful information, and can thus instantaneously counteract the occurrence of an unidentified computer virus, for example, by developing an effective antivirus program. In this manner, the harmful information management server 110 analyzes the unidentified harmful information from the client 130 to develop a proper treatment program, and provides an appropriate security service for blocking harmful information from attacking the client 130, with the latest version of the harmful information blocking code module. Therefore,-the present invention can prevent user computers operating in an open network environment from damage caused by various harmful information.

In the present embodiment, a communications channel for use by the harmful information blocking code module in automatically transmitting harmful information to the harmful information management server 110 may be implemented with Internet mail transfer protocol such as Simple Mail Transfer Protocol (SMTP), or File Transfer Protocol (FTP). More preferably, a specified communication channel is provided exclusively for the transmission of the harmful information.

Meanwhile, if it is determined in step 440 that harmful information is related with packet I/O, a communication port assigned for the packet I/O is blocked (step 460). If internal processes for supporting the network packet I/O via the communication channel is in progress, it is preferable to abort the processes.

Next, a proper treatment is performed on the harmful information infiltrating through the communications port in a similar way as for the harmful information related with file I/O (step 462). In step 470, the harmful information management server 110 is informed of the detection of the harmful information from the network packet I/O.

The present embodiments may be implemented as a computer readable program code. The invention may be embodied in a general purpose digital computer by running a program from a computer readable medium, including but not limited to magnetic storage media (e.g., ROM's, floppy disks, hard disks, etc.), optically readable media (e.g., CD-ROMs, DVDs, etc.) and carrier waves (e.g., transmissions over the Internet).

While this invention has been particularly shown and described with reference to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made thereto without departing from the spirit and scope of the invention as defined by the appended claims. The embodiments should be construed as being illustrative and not as limiting the scope of the invention. Accordingly, the scope of the present invention is defined by the appended claims rather than the foregoing description.

As previously described, according to the present invention, the harmful information blocking code module is automatically provided to and installed in the client system by only online connecting to the harmful information management server, so that harmful information detected on the client system can be actively blocked in real time without requiring a manual installation process.

The harmful information blocking code module has a function of informing the harmful information management server of information indicative of an unidentified computer virus detected in the client system. Accordingly, the harmful information management server can acquire useful statistical data relating to harmful information, and keeps up-to-date with the latest releases of the harmful information blocking code module, which ensures latest security service for user computers.

Furthermore, the harmful information blocking code module is able to inspect the network packet I/O, which warrants secured electronic commerce through the Internet. In particular, for private enterprises or government organizations, the present invention can be effective in actively protecting business information, or confidential information relating to national security from various harmful information. The present invention is effective in terms of both security and efficiency.

It will be appreciated by those skilled in the art that changes could be made to the embodiments described above without departing from the broad inventive concept thereof. It is understood, therefore, that this invention is not limited to the particular embodiments disclosed, but it is intended to cover modifications within the spirit and scope of the present invention as defined by the appended claims.

Jung, Yeon-Sub

Patent Priority Assignee Title
9386036, Jul 23 2009 AHNLAB, INC Method for detecting and preventing a DDoS attack using cloud computing, and server
Patent Priority Assignee Title
5960170, Mar 18 1997 Trend Micro, Incorporated Event triggered iterative virus detection
6014698, May 19 1997 AT HOME BONDHOLDERS LIQUIDATING TRUST System using first banner request that can not be blocked from reaching a server for accurately counting displays of banners on network terminals
6075863, Feb 28 1996 FLAT CONNECTIONS, INC Intelligent communication device
6088803, Mar 27 1997 Intel Corporation System for virus-checking network data during download to a client device
6119165, Nov 17 1997 Trend Micro, Incorporated Controlled distribution of application programs in a computer network
6125352, Jun 28 1996 Microsoft Technology Licensing, LLC System and method for conducting commerce over a distributed network
6672775, Aug 01 1997 International Business Machines Corporation Cross-machine web page download and storage
6742047, Mar 27 1997 Intel Corporation Method and apparatus for dynamically filtering network content
6785732, Sep 11 2000 FINJAN BLUE, INC Web server apparatus and method for virus checking
7058822, Mar 30 2000 FINJAN LLC Malicious mobile code runtime monitoring system and methods
7496960, Oct 30 2000 TREND MICRO INCORPORATED Tracking and reporting of computer virus information
EP805397,
JP10240828,
JP10320336,
JP11025176,
WO9926161,
//
Executed onAssignorAssigneeConveyanceFrameReelDoc
Dec 20 2010Cap Co., Ltd.(assignment on the face of the patent)
Dec 07 2012INCA INTERNET CO , LTD CAP CO , LTD ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0295720831 pdf
Date Maintenance Fee Events
Nov 26 2013M2552: Payment of Maintenance Fee, 8th Yr, Small Entity.
Apr 01 2015ASPN: Payor Number Assigned.
Sep 22 2017M2553: Payment of Maintenance Fee, 12th Yr, Small Entity.


Date Maintenance Schedule
May 28 20164 years fee payment window open
Nov 28 20166 months grace period start (w surcharge)
May 28 2017patent expiry (for year 4)
May 28 20192 years to revive unintentionally abandoned end. (for year 4)
May 28 20208 years fee payment window open
Nov 28 20206 months grace period start (w surcharge)
May 28 2021patent expiry (for year 8)
May 28 20232 years to revive unintentionally abandoned end. (for year 8)
May 28 202412 years fee payment window open
Nov 28 20246 months grace period start (w surcharge)
May 28 2025patent expiry (for year 12)
May 28 20272 years to revive unintentionally abandoned end. (for year 12)