Apparatus and method for protecting a computer system against computer viruses and unauthorized access
First Claim
1. A virus trap computer system for protecting a host computer system from an intrusion such as a computer virus or an unauthorized access, said virus trap computer system comprising:
- an embedded personal computer coupled to the host computer system, said embedded personal computer receiving all external computer communications that are directed to the host computer system;
means for monitoring the external computer communications and detecting whether the intrusion is present in the external computer communications; and
a password controller coupled to the embedded personal computer and a network interface, said password controller receiving an external communication from the network interface, identifying a password in the external communication, and in response to receiving a valid password, allowing the external communication access to the embedded personal computer.
1 Assignment
0 Petitions
Accused Products
Abstract
There is disclosed an apparatus and method for protecting a first computer system against an intrusion such as a computer virus or an unauthorized access. The apparatus comprises a second computer system that is coupled to the first computer system in a manner that permits the second computer system to receive all computer communications that are directed to the first computer system. The second computer system detects an intrusion before the intrusion reaches the first computer system. The second computer system deletes the intrusion by deleting the operating system and all other data on the second computer system. After the compromised operating system and data have been erased, a clean version of the operating system and data is supplied to the second computer system from a restoration controller within the second computer system, or from the first computer system, or from a backup copy of the clean version of the data.
-
Citations
41 Claims
-
1. A virus trap computer system for protecting a host computer system from an intrusion such as a computer virus or an unauthorized access, said virus trap computer system comprising:
-
an embedded personal computer coupled to the host computer system, said embedded personal computer receiving all external computer communications that are directed to the host computer system;
means for monitoring the external computer communications and detecting whether the intrusion is present in the external computer communications; and
a password controller coupled to the embedded personal computer and a network interface, said password controller receiving an external communication from the network interface, identifying a password in the external communication, and in response to receiving a valid password, allowing the external communication access to the embedded personal computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A virus trap computer system for protecting a host computer system from an intrusion such as a computer virus or an unauthorized access, said virus trap computer system comprising:
-
an embedded personal computer coupled to the host computer system, said embedded personal computer receiving all external computer communications that are directed to the host computer system, and detecting an intrusion before the intrusion reaches the host computer system;
a mass storage device coupled to the embedded personal computer;
a mass storage integrity controller coupled to the embedded personal computer and to the mass storage device, said mass storage integrity controller detecting an intrusion on the mass storage device;
a restoration controller coupled to the embedded personal computer and to the mass storage device, said restoration controller deleting the intrusion by erasing data within the embedded personal computer and within the mass storage device, said restoration controller thereafter supplying a clean version of the erased data to the embedded personal computer and to the mass storage device; and
a password controller coupled to the embedded personal computer and to a network interface, said password controller receiving a computer communication from the network interface, identifying a password in the computer communication, and in response to receiving a valid password, allowing the external computer communication access to one of;
the embedded personal computer and the host computer system. - View Dependent Claims (15, 16)
-
-
17. A method of protecting a host computer system from an intrusion such as a computer virus or an unauthorized access, method comprising:
-
coupling a virus trap computer system to the host computer system, said virus trap computer system comprising an embedded personal computer coupled to the host computer through a data transfer switch;
coupling a password controller to the embedded personal computer and to a network interface;
receiving a computer communication in the password controller from the network interface, said computer communication being directed to the host computer system;
identifying a password in the computer communication;
in response to receiving a valid password, sending the external computer communication to the embedded personal computer for transfer to the host computer system; and
detecting the intrusion by the embedded personal computer before the intrusion reaches the host computer system. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A virus trap for protecting an associated host computer from a computer virus received from an external source, virus trap comprising:
-
a mass storage device that stores data and application programs;
an embedded processor that controls the virus trap and runs the application programs;
means for receiving communications from the external source and supplying the communications to the embedded processor;
an integrity controller that monitors the data and application programs to detect unauthorized read or write operations;
a restoration controller, responsive to a detection of an unauthorized read or write operation, for taking corrective action to erase corrupted data and/or applications associated with the detected unauthorized read or write operation, and to restore the erased data and/or applications with uncorrupted data and/or applications;
a data transfer switch that transfers data to or from the host computer; and
a password controller that verifies a password received from the external source and allows access to the data transfer switch only when the password controller positively verifies the password.
-
-
28. A virus trap for protecting an associated host computer from a computer virus received from an external source, said virus trap comprising:
-
a mass storage device for storing data and application programs;
an embedded processor for controlling the virus trap and running the application programs;
a password controller for receiving and verifying a first-level password from the external source;
means, responsive to a positive verification of the first-level password, for receiving communications from the external source and supplying the communications to the embedded processor;
an integrity controller for monitoring the data and application programs to detect unauthorized read or write operations; and
a restoration controller, responsive to a detection of an unauthorized read or write operation, for taking corrective action to erase corrupted data and/or applications associated with the detected unauthorized read or write operation, and to restore the erased data and/or applications with uncorrupted data and/or applications. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
Specification