Information security method and apparatus
First Claim
1. A device for protecting secured areas in a computer system, the device comprising:
- a communication interface for connecting to a network;
a secured device interface for connecting to a secured area;
a managing controller connected to said communication interface and between said secured device interface and said computer system,wherein said managing controller detects independently of a request message by a user of said computer system whether said communication between said computer system and said network is in progress,wherein said managing controller connects said computer system with said secured device interface whether said communication is not in progress, andwherein said managing controller disconnects said computer system from said secured device interface whether said communication is in progress.
4 Assignments
0 Petitions
Accused Products
Abstract
Communication apparatus including a public network, a secured network, a plurality of public nodes connected to the public network and a plurality of secured nodes connected to the secured network and to the public network. The nodes including interfaces for communicating therebetween over the networks, wherein each the secured node includes a communication controller a computer system and a secured storage area. A secured node divides a confidential message into at least two segments and transmits the segments via the networks wherein at least a selected one of the segments is transmitted via at least one of the secured networks. The communication controller is also operative to disconnect the secured storage area from the computer station and the public network when the communication between the computer station and the public network is in progress.
-
Citations
11 Claims
-
1. A device for protecting secured areas in a computer system, the device comprising:
-
a communication interface for connecting to a network; a secured device interface for connecting to a secured area; a managing controller connected to said communication interface and between said secured device interface and said computer system, wherein said managing controller detects independently of a request message by a user of said computer system whether said communication between said computer system and said network is in progress, wherein said managing controller connects said computer system with said secured device interface whether said communication is not in progress, and wherein said managing controller disconnects said computer system from said secured device interface whether said communication is in progress. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for protecting a secured area in a computer system which is connected to a network, the computer system including a secured area, the method comprising the steps of:
-
A. detecting independently of a request message by a user of said computer system the communication status between said computer system and said network, if said communication status is on-line, proceeding to step B, otherwise enabling access to said secured area, B. monitoring all incoming data access requests and detecting if access is requested to said secured area, if so, proceeding to step C, otherwise proceeding to step D; C. executing an alert procedure; D. detecting independently of a request message by a user of said computer system the communication status between said computer system and said network, if on-line, proceeding back to step B, otherwise proceeding to step E; and E. proceeding back to step A. - View Dependent Claims (8)
-
-
9. A method for protecting a secured area in a computer system which is connected to a network, the computer system including a secured area and a public storage area, the method comprising the steps of:
-
A. detecting independently of a request message by user of said computer system the communication status between said computer system and said network, if on-line, proceeding to step B, otherwise enabling access to said secured area; B. monitoring all incoming data access requests and detecting if access is requested to said secured area, if so, proceeding to step C, otherwise proceeding to step D; C. executing an alert procedure; D. detecting independently of a request message by a user of said computer system the communication status between said computer system and said network, if on-line, proceeding back to step B, otherwise proceeding to step E; E. analyzing data contained in said storage area so as to detect harmful software therein, if such harmful software is detected, proceeding to step F, otherwise enabling access to said secured area and proceeding to step A; and F. executing an alert software. - View Dependent Claims (10, 11)
-
Specification