System and method for providing data and device security between external and host devices
First Claim
Patent Images
1. A security device, comprising:
- a host plug configured to physically interface with a device port of a host, to receive power from the host, and to support data transfer with the host;
an external device port configured to communicatively couple with an external device and to support data transfer with the external device, the external device including a storage device configured to store data;
at least one hardware processor; and
memory storing;
an operating system executable by the at least one hardware processor,one or more device drivers executable by the at least one hardware processor and configured to receive a data transfer request for transferring data between the host and the external device, and to control data transfer between the host and the external device upon receiving a data transfer instruction, anda security system configured to receive the data transfer request, the security system including a security engine and a security policy, the security engine configured to evaluate the data transfer request based on the security policy to determine whether the data transfer request satisfies the security policy, the security policy including a data privacy policy, and to authorize the data transfer instruction when the security policy is satisfied.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.
181 Citations
13 Claims
-
1. A security device, comprising:
-
a host plug configured to physically interface with a device port of a host, to receive power from the host, and to support data transfer with the host; an external device port configured to communicatively couple with an external device and to support data transfer with the external device, the external device including a storage device configured to store data; at least one hardware processor; and memory storing; an operating system executable by the at least one hardware processor, one or more device drivers executable by the at least one hardware processor and configured to receive a data transfer request for transferring data between the host and the external device, and to control data transfer between the host and the external device upon receiving a data transfer instruction, and a security system configured to receive the data transfer request, the security system including a security engine and a security policy, the security engine configured to evaluate the data transfer request based on the security policy to determine whether the data transfer request satisfies the security policy, the security policy including a data privacy policy, and to authorize the data transfer instruction when the security policy is satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
executing an operating system by at least one hardware processor on a security system; executing one or more device drivers on the security system by the at least one hardware processor; establishing a first data communication channel between a host plug of a security device and a device port of a host; receiving power from the host through the host plug; establishing a second data communication channel between an external device and the security device; receiving by the security device automatically before execution a data transfer request from the host, the data transfer request requesting transfer of data between the host and the external device, the external device including a storage device configured to store data; evaluating, using a security engine and a security policy on the security device, the data transfer request based on the security policy to determine whether the data transfer request satisfies the security policy, the security policy including a data privacy policy; authorizing a data transfer instruction by the security engine when the security policy is satisfied; and controlling data transfer by the one or more device drivers upon receiving the data transfer instruction, the data transfer for causing execution of the data transfer request between the host and the external device. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification