METHODS, SYSTEMS, AND DEVICES FOR DETECTING AND ISOLATING DEVICE POSING SECURITY THREAT
First Claim
1. An apparatus for detecting a security threat, the apparatus comprising:
- a first input/output (I/O) interface and a second I/O interface;
a memory device that stores a set of instructions; and
a processor capable of executing the set of instructions to cause the apparatus to;
detect that a first device is coupled with the first I/O interface;
responsive to the detection that the first device is coupled with the first I/O interface, temporarily disable data communication between the first and second I/O interfaces;
acquire a file from the detected first device via the first I/O interface;
determine whether the acquired file poses a security threat; and
responsive to a determination that the acquired file does not pose a security threat, enable the data communication between the first and second I/O interfaces.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O interface, responsive to the detection that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first and second I/O interfaces, acquiring a file from the detected first device via the first I/O interface, determining whether the acquired file poses a security threat, and responsive to a determination that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces.
-
Citations
20 Claims
-
1. An apparatus for detecting a security threat, the apparatus comprising:
-
a first input/output (I/O) interface and a second I/O interface; a memory device that stores a set of instructions; and a processor capable of executing the set of instructions to cause the apparatus to; detect that a first device is coupled with the first I/O interface; responsive to the detection that the first device is coupled with the first I/O interface, temporarily disable data communication between the first and second I/O interfaces; acquire a file from the detected first device via the first I/O interface; determine whether the acquired file poses a security threat; and responsive to a determination that the acquired file does not pose a security threat, enable the data communication between the first and second I/O interfaces. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method of detecting a security threat, comprising:
-
detecting that a first device is coupled with a first input/output (I/O) interface; responsive to detecting that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first I/O interface and a second I/O interface; acquiring a file from the detected first device via the first I/O interface; determining whether the acquired file poses a security threat; and responsive to determining that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium that stores a set of instructions that are executable by at least one processor of an electronic device to cause the electronic device to perform a method of detecting a security threat, the method comprising:
-
detecting that a first device is coupled with a first input/output (I/O) interface; responsive to detecting that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first I/O interface and a second I/O interface; acquiring a file from the detected first device via the first I/O interface; determining whether the acquired file poses a security threat; and responsive to determining that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification