摘要 |
A system comprises an inspector (125) and a protection engine (180). The inspector (125) includes a content inspection engine (160) that uses a set of rules (165) to generate a Downloadable security profile corresponding to a Downloadable (150), e.g., Java<TM> applets, Active X<TM> controls, JavaScript<TM> scripts, or Visual Basic scripts. The content inspection engine (160) links the Downloadable security profile to the Downloadable. The set of rules (165) may include a list of suspicious operations, or a list of suspicious code patterns. The first content inspection engine may link to the Downloadable (150) a certificate that identifies the content inspection engine (160) which created the Downloadable security profile. Additional content inspection engines may generate and link additional Downloadable security profiles to the Downloadable (150). Each content inspection engine (160) preferably creates a Downloadable ID that identifies the Downloadable (150) to which the Downloadable security profile corresponds. |