Apparatus and Method for Enhancing Security of Data on a Host Computing Device and a Peripheral Device
First Claim
1. A security device for coupling between a host computing device (“
- host”
) and at least one peripheral device (“
peripheral”
), each peripheral being assigned an address, the security device comprising;
an upstream interface configured to be coupled via an upstream link to the host and to receive commands and data from the host via the upstream link and to send data to the host via the upstream link, each of at least some of the commands including an address of one of the at least one peripheral;
at least one downstream interface, each downstream interface configured to be coupled via a respective downstream link to one of the at least one peripheral and to receive data from the one peripheral via the respective downstream link and to send commands and data to the one peripheral via the respective downstream link; and
a controller coupled to the upstream and downstream interfaces and configured to;
receive commands and data via the upstream interface;
select at least one of the at least one downstream interface, based on an address in the received commands and data;
forward the received commands and data to the selected at least one of the at least one downstream interface.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication interface. Data is transparently received from the peripheral device or the host computing device, and the received data is stored. The stored data is analyzed to detect a circumstance associated with a security risk. If such a circumstance is not detected, then the data is transparently forwarded to the other of the peripheral device or the host. However, if a circumstance associated with a security risk is detected, then a security process, defined by a rule, is performed. Related apparatus are provided, as well as other methods and apparatus.
-
Citations
26 Claims
-
1. A security device for coupling between a host computing device (“
- host”
) and at least one peripheral device (“
peripheral”
), each peripheral being assigned an address, the security device comprising;an upstream interface configured to be coupled via an upstream link to the host and to receive commands and data from the host via the upstream link and to send data to the host via the upstream link, each of at least some of the commands including an address of one of the at least one peripheral; at least one downstream interface, each downstream interface configured to be coupled via a respective downstream link to one of the at least one peripheral and to receive data from the one peripheral via the respective downstream link and to send commands and data to the one peripheral via the respective downstream link; and a controller coupled to the upstream and downstream interfaces and configured to; receive commands and data via the upstream interface; select at least one of the at least one downstream interface, based on an address in the received commands and data; forward the received commands and data to the selected at least one of the at least one downstream interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
- host”
-
13. A security device for coupling between a host computing device (“
- host”
) and at least one peripheral device (“
peripheral”
), the security device comprising;an upstream interface configured to be coupled via an upstream link to the host and to receive data from the host via the upstream link and to send data to the host via the upstream link; at least one downstream interface, each downstream interface configured to be coupled via a respective downstream link to one of the at least one peripheral and to receive data from the one peripheral via the respective downstream link and to send data to the one peripheral via the respective downstream link; and a controller coupled to the upstream and downstream interfaces and configured to; receive data via the upstream interface; analyze the received data to ascertain if the received data poses a security risk; if the received data is ascertained not to pose a security risk, forward the received data to at least one of the at least one downstream interface; and if the received data is ascertained to pose a security risk, prevent forwarding the received data to any of the at least one downstream interface. - View Dependent Claims (14, 15)
- host”
-
16. A security device-implemented method of enhancing security of at least one of a host computing device (“
- host”
) and at least one peripheral device (“
peripheral”
), the security device comprising an upstream interface configured to be coupled via an upstream link to the host and to receive commands and data from the host via the upstream link and to send data to the host via the upstream link, each of at least some of the commands including an address of one of the at least one peripheral, the security device further comprising at least one downstream interface, each downstream interface configured to be coupled via a respective downstream link to one of the at least one peripheral and to receive data from the one peripheral via the respective downstream link and to send commands and data to the one peripheral via the respective downstream link, each peripheral being assigned an address, the method comprising;receiving commands and data via the upstream interface; selecting at least one of the at least one downstream interface, based on an address in the received commands and data; forwarding the received commands and data to the selected at least one of the at least one downstream interface. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
- host”
Specification