Method for securing and controlling USB ports
First Claim
Patent Images
1. A method for controlling a USB device, accessed from a USB port on a personal computer comprising the steps of:
- the personal computer monitoring the USB port;
the personal computer detecting the USB device connected to the USB port;
a software module identifying a type of the USB device, the software module stored in a memory on the personal computer and comprising a configuration rule in accordance with a security policy;
the software module determining that the USB device is authorized by comparing the type of the USB device to a list of USB device types stored in a parameter file in the memory of the personal computer;
the software module determining that a file stored on the USB device is authorized by comparing the file to a list of files stored in the parameter file in the memory of the personal computer; and
the software module, in accordance with the configuration rule and determining the USB device is authorized and the file is authorized, either allowing the personal computer to access the USB device or preventing the personal computer from accessing the USB device.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for limiting devices and controlling the applications executed from USB ports on personal computers (PCs). More specifically, the present invention relates to a method for ensuring that only authorized devices and applications are accessed from USB ports using software and configuration files on the PC. Using the software application stored on the PC storage device in conjunction with functionality performed by a designed security file server, the use of USB applications and devices is limited to authorized applications and devices.
-
Citations
14 Claims
-
1. A method for controlling a USB device, accessed from a USB port on a personal computer comprising the steps of:
-
the personal computer monitoring the USB port;
the personal computer detecting the USB device connected to the USB port;
a software module identifying a type of the USB device, the software module stored in a memory on the personal computer and comprising a configuration rule in accordance with a security policy;the software module determining that the USB device is authorized by comparing the type of the USB device to a list of USB device types stored in a parameter file in the memory of the personal computer; the software module determining that a file stored on the USB device is authorized by comparing the file to a list of files stored in the parameter file in the memory of the personal computer; and the software module, in accordance with the configuration rule and determining the USB device is authorized and the file is authorized, either allowing the personal computer to access the USB device or preventing the personal computer from accessing the USB device. - View Dependent Claims (2, 5, 6, 7, 8)
-
-
3. A method for controlling a device, accessed from a USB port on a personal computer comprising the steps of:
-
the personal computer detecting the device connected to the USB port; a software module stored in a memory on the personal computer and comprising a configuration rule in accordance with a security policy, the software module receiving a security update from a remote computer via a network; the software module updating the configuration rule and a parameter file in accordance with the security update; the software module identifying a type of the device; the software module determining that the device is authorized by comparing the type of the device to a list of device types stored in the parameter file; the software module determining that a program stored on the device is authorized by comparing the program to a list of programs stored in the parameter file; and the software module, in accordance with the updated configuration rule and determining the USB device is authorized and the file is authorized, either allowing the personal computer to access the program or preventing the personal computer from accessing the program. - View Dependent Claims (9, 10, 11, 12)
-
-
4. A method for controlling a device accessed from a port on a personal computer wherein the personal computer is in communication with a remote computer, comprising the steps of:
-
detecting that the device is coupled to the personal computer; a software module stored in a memory of the personal computer and comprising a configuration rule in accordance with a security policy, the software module comparing the detected device to a list of devices stored in a parameter file on the personal computer; the software module sending a request for an update from the personal computer to the remote computer; the software module receiving the update from the remote computer and updating the parameter file; and the software module granting or denying access to the device based on the updated parameter file. - View Dependent Claims (13, 14)
-
Specification