Security System with Methodology for Defending Against Security Breaches of Peripheral Devices
First Claim
1. A method for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprising:
- when a device is first attached to the computer, specifying authorization information indicating that the device is allowed to communicate with the computer;
detecting detachment of the device from the computer;
updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and
upon reattachment of the device, blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device.
4 Assignments
0 Petitions
Accused Products
Abstract
A security system with methodology for defending against security breaches of peripheral devices is described. In one embodiment, for example, a method is described for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprises steps of: when a device is first attached to the computer, specifying authorization information indicating that the device is allowed to communicate with the computer; detecting detachment of the device from the computer; updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and upon reattachment of the device, blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device.
314 Citations
58 Claims
-
1. A method for protecting a computer from security breaches involving devices that may be attached to the computer, the method comprising:
-
when a device is first attached to the computer, specifying authorization information indicating that the device is allowed to communicate with the computer;
detecting detachment of the device from the computer;
updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and
upon reattachment of the device, blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for protecting a computer from security breaches involving devices that may be attached to the computer, the system comprising:
-
an agent module for specifying authorization information indicating that a device is allowed to communicate with the computer when the device is first attached to the computer;
for detecting detachment of the device from the computer; and
for updating the authorization information to indicate that the device is no longer authorized to communicate with the computer; and
a filter module for blocking communication with the device while the device remains unauthorized, thereby preventing a security breach involving the device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A method for securing a computer from security breaches involving peripheral devices, the method comprising:
-
specifying a password to be supplied for authorizing a peripheral device to communicate with the computer;
detecting each attachment of the peripheral device to the computer;
upon each attachment, blocking communications with the peripheral device until the password is supplied; and
if the password is supplied, permitting the peripheral device to communicate with the computer. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
Specification