OS security filter
First Claim
1. A virtual keyboard device external to a computer comprising:
- a radio-frequency identification (RFID) reader;
a processor;
a transmitter to couple the virtual keyboard device to the computer in a manner that emulates the coupling of a physical keyboard to the computer; and
a memory module to store instructions that, when executed by the processor, cause the processor to;
convert RFID signals captured by the RFID reader into a sequence of characters that emulates indications of keypresses of keyboard keys;
recognize at least one character in the sequence of characters that is interpretable by an operating system of the computer as a system level command to point a cursor generated by the operating system to a command line of the operating system to enable entry of a further one or more characters of the sequence of characters at the command line;
filter the further one or more characters from the sequence of characters in response to the further one or more characters comprising a malicious command to prevent provision of the malicious command to the computer in the sequence of characters; and
operate the transmitter to transmit the sequence of characters, following the filtration of the further one or more characters from the sequence of characters, from the virtual keyboard device and to the computer, wherein;
the operating system is to be executed within the computer to support basic functions of the computer; and
the basic functions comprise interpretation of sequences of characters received by the computer to identify commands to cause the computer to execute tasks.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting against the unauthorized use of operating system level commands is disclosed. The system includes a computer module including: a processor configured for performing data operations; a memory unit configured to store instructions executable by the processor; and an operating system module for supporting basic functions of the computer module, such as scheduling tasks, executing applications, and controlling peripherals. A virtual keyboard is connected to the computer module for creating one or more events or sequences of events recognizable by the operating system module. A system level command filter module is provided for filtering system level commands from the one or more recognizable events or sequences of events.
11 Citations
20 Claims
-
1. A virtual keyboard device external to a computer comprising:
-
a radio-frequency identification (RFID) reader; a processor; a transmitter to couple the virtual keyboard device to the computer in a manner that emulates the coupling of a physical keyboard to the computer; and a memory module to store instructions that, when executed by the processor, cause the processor to; convert RFID signals captured by the RFID reader into a sequence of characters that emulates indications of keypresses of keyboard keys; recognize at least one character in the sequence of characters that is interpretable by an operating system of the computer as a system level command to point a cursor generated by the operating system to a command line of the operating system to enable entry of a further one or more characters of the sequence of characters at the command line; filter the further one or more characters from the sequence of characters in response to the further one or more characters comprising a malicious command to prevent provision of the malicious command to the computer in the sequence of characters; and operate the transmitter to transmit the sequence of characters, following the filtration of the further one or more characters from the sequence of characters, from the virtual keyboard device and to the computer, wherein; the operating system is to be executed within the computer to support basic functions of the computer; and the basic functions comprise interpretation of sequences of characters received by the computer to identify commands to cause the computer to execute tasks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
capturing, by a radio-frequency identification (RFID) reader of a virtual keyboard device external to a computer, RFID signals; decoding, at the virtual keyboard device, the RFID signals into a sequence of characters that emulates indications of keypresses of keyboard keys of a physical keyboard; recognizing, by a processor of the virtual keyboard device, at least one character in the sequence of characters that is interpretable by an operating system of the computer as a system level command to point a cursor generated by the operating system to a command line of the operating system to enable entry of a further one or more characters of the sequence of characters at the command line; replacing, by the processor of the virtual keyboard device, the further one or more characters in the sequence of characters with a dummy code in response to the further one or more characters comprising a malicious command to prevent provision of the malicious command to the computer; and transmitting the sequence of characters in a wrapper defined by a communication protocol with the further one or more characters replaced by the dummy code from the virtual keyboard device to the computer in a manner that emulates a physical keyboard coupled to the computer, wherein; the operating system is to be executed within the computer to support basic functions of the computer; and the basic functions comprise interpretation of sequences of characters generated by a keyboard and received by the computer. - View Dependent Claims (16, 17, 18)
-
-
19. A method comprising:
-
capturing, by a radio-frequency identification (RFID) reader of a virtual keyboard device external to a computer, RFID signals; decoding, at the virtual keyboard device, the RFID signals into a sequence of characters that emulates indications of keypresses of keyboard keys of a physical keyboard; recognizing, by a processor of the virtual keyboard device, at least one character in the sequence of characters that is interpretable by an operating system of the computer as a system level command to point a cursor generated by the operating system to a command line of the operating system to enable entry of a further one or more characters of the sequence of characters at the command line; allowing, by the processor, the at least one character to remain in the sequence of characters as transmitted in a wrapper defined by a communication protocol from the virtual keyboard device to the computer; and filtering, by the processor, the further one or more characters from the sequence of characters, prior to transmission of the sequence of characters from the virtual keyboard device to the computer, in response to the further one or more characters comprising a malicious instruction to prevent provision of the malicious instruction to the computer, wherein; the operating system is to be executed within the computer to support basic functions of the computer, and the basic functions comprise interpretation of sequences of characters generated by a keyboard and received by the computer. - View Dependent Claims (20)
-
Specification