Security keys associated with identification of physical USB protection devices
First Claim
Patent Images
1. A method of protecting a protected computing device comprising:
- A) a preparation stage comprising;
providing a plurality of USB protection devices, wherein each of the protection devices comprises an authentication chip for interacting with a security software;
obtaining identification of said plurality of USB protection devices;
entering said identification of said plurality of USB protection devices into an organization database;
installing said security application in the protected computing device;
loading security keys associated with each of said identification of said plurality of USB protection devices from said organization database to said security application in the protected computing device;
installing said plurality of USB protection devices into USB connectors of the protected device; and
qualifying said plurality of USB protection devices by said security application; and
B) an operation stage comprising;
monitoring said plurality of USB protection devices by said security application;
detecting at least one security event associated with at least one of said USB protection devices by said security application; and
disabling the normal operation of the protected computing device by said security application.
1 Assignment
0 Petitions
Accused Products
Abstract
A self-locking USB filter device is disclosed that comprises at least one permanently attachable self-locking USB plug having at least one locking tooth to permanently connect the permanently attachable self-locking USB plug to a USB jack of a protected computing apparatus. The self-locking USB filter protects the protected computing apparatus by blocking unauthorized data transfer and blocks all communication unless the authenticator is authenticated by software installed in the protected computing apparatus. A method of protecting USB jacks of a computing device is also disclosed.
48 Citations
7 Claims
-
1. A method of protecting a protected computing device comprising:
-
A) a preparation stage comprising; providing a plurality of USB protection devices, wherein each of the protection devices comprises an authentication chip for interacting with a security software; obtaining identification of said plurality of USB protection devices; entering said identification of said plurality of USB protection devices into an organization database; installing said security application in the protected computing device; loading security keys associated with each of said identification of said plurality of USB protection devices from said organization database to said security application in the protected computing device; installing said plurality of USB protection devices into USB connectors of the protected device; and qualifying said plurality of USB protection devices by said security application; and B) an operation stage comprising; monitoring said plurality of USB protection devices by said security application; detecting at least one security event associated with at least one of said USB protection devices by said security application; and disabling the normal operation of the protected computing device by said security application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification