Methods For Firewall Protection Of Mass-Storage Devices
First Claim
1. A method for protecting a host system from information-security risks posed by a URD, the method comprising the steps of:
- (a) operationally connecting the URD to the host system;
(b) communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and
(c) configuring said firewall to provide security measures related to the URD.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention discloses methods for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to provide security measures related to the URD. Preferably, the firewall is a software firewall or a hardware firewall. A method for protecting a host system from information-security risks posed by a URD, the method including the steps of: operationally connecting the URD to the host system; communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and configuring said firewall to restrict access of at least one application to the URD. Preferably, the firewall is a software firewall or a hardware firewall.
-
Citations
6 Claims
-
1. A method for protecting a host system from information-security risks posed by a URD, the method comprising the steps of:
-
(a) operationally connecting the URD to the host system; (b) communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and (c) configuring said firewall to provide security measures related to the URD. - View Dependent Claims (2, 3)
-
-
4. A method for protecting a host system from information-security risks posed by a URD, the method comprising the steps of:
-
(a) operationally connecting the URD to the host system; (b) communicating, between the URD and the host system, via a network protocol, through a firewall residing in the host system; and (c) configuring said firewall to restrict access of at least one application to the URD. - View Dependent Claims (5, 6)
-
Specification