Systems and methods for providing real time access monitoring of a removable media device
DC CAFCFirst Claim
Patent Images
1. A method, comprising:
- detecting a removable media device coupled to a digital device;
injecting redirection code into the digital device after detecting the removable media device is coupled to the digital device, the redirection code configured to intercept a first function call and configured to execute a second function call in place of the first function call;
intercepting, with the redirection code, a request for data on the removable media device;
determining whether to allow the intercepted request for data based on a security policy, the security policy implementing content analysis and risk assessment algorithms; and
providing requested data based on the determination.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
A mobile security system connects to a mobile device and filters out attacks and malicious code. Using the mobile security system, a mobile device can be protected by greater security and possibly by the same level of security offered by a corporation, enterprise, or other entity associated with the mobile device.
80 Citations
21 Claims
-
1. A method, comprising:
-
detecting a removable media device coupled to a digital device; injecting redirection code into the digital device after detecting the removable media device is coupled to the digital device, the redirection code configured to intercept a first function call and configured to execute a second function call in place of the first function call; intercepting, with the redirection code, a request for data on the removable media device; determining whether to allow the intercepted request for data based on a security policy, the security policy implementing content analysis and risk assessment algorithms; and providing requested data based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A removable media device comprising:
-
a login engine configured to detect coupling to a digital device, the login engine further configured to inject redirection code into the digital device after detecting the coupling to the digital device, the redirection code being configured to intercept a first function call and configured to execute a second function call in place of the first function call; and a controller configured to intercept a request for the data, determine whether to allow the request for the data based on a security policy, the security policy implementing content analysis and risk assessment algorithms, and provide requested data based on the determination. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer readable storage media comprising instructions, the instructions executable by a processor to perform a method, the method comprising:
-
detecting a removable media device coupled to a digital device; injecting redirection code into the digital device after detecting the removable media device is coupled to the digital device, the redirection code configured to intercept a first function call and configured to execute a second function call in place of the first function call; intercepting, with the redirection code, a request for data on the removable media device; determining whether to allow the intercepted request for data based on a security policy, the security policy implementing content analysis and risk assessment algorithms; and providing requested data based on the determination.
-
Specification