System and Method for Providing Data and Device Security Between External and Host Devices
First Claim
Patent Images
1. A security device, comprising:
- an external device plug operative to communicatively couple with a host;
an external device port operative to communicatively couple with an external device;
a processor; and
memory storingan operating system,an external device driver operative to control communication with the external device, anda security engine operative to enforce a security policy on a data transfer request between the external device and the host.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure data exchange system comprising a security device including a first external device plug, and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug, a second external device port operative to communicatively couple with the second external device plug, and a driver, e.g., a redirect driver, operative to transfer a data transfer request to the security device before executing the data transfer request.
-
Citations
27 Claims
-
1. A security device, comprising:
-
an external device plug operative to communicatively couple with a host; an external device port operative to communicatively couple with an external device; a processor; and memory storing an operating system, an external device driver operative to control communication with the external device, and a security engine operative to enforce a security policy on a data transfer request between the external device and the host. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A secure data exchange system, comprising:
-
a security device including a first external device plug; and a security engine operative to enforce a security policy on data transfer requests received from the host; an external device including a second external device plug; and a host including a first external device port operative to communicatively couple with the first external device plug; a second external device port operative to communicatively couple with the second external device plug; and a redirect driver operative to transfer a data transfer request from the host to the security device before executing the data transfer request. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method comprising:
-
communicatively coupling a security device to a host; communicatively coupling an external device to the security device; receiving by the security device a data transfer request from the host; and enforcing by the security device a security policy on the data transfer request before allowing the data transfer request to be performed. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method, comprising:
-
communicatively coupling a security device to a host; communicatively coupling an external device to the host; receiving by the host a data transfer request; using a redirect driver on the host to redirect the data transfer request to the security device; and enforcing by the security device a security policy on the data transfer request before allowing the data transfer request to be performed. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
Specification