×

Device for preventing, detecting and responding to security threats

  • US 9,485,218 B2
  • Filed: 03/23/2010
  • Issued: 11/01/2016
  • Est. Priority Date: 03/23/2010
  • Status: Active Grant
First Claim
Patent Images

1. A device to prevent, detect, and respond to one or more security threats between a controlled host and one or more services used by the controlled host, the device comprising:

  • a processing resource;

    one or more communication ports for connecting the device to the controlled host and for connecting the one or more services directly to the device such that communications between the one or more services and the controlled host are examined by the device,wherein the one or more services are one or more of a display unit, a keyboard, and a mousememory for storing;

    information pertaining to one or more users permitted to use the controlled host; and

    one or more communication protocols associated with controlling the communications between the one or more services and the controlled host;

    an input device for collecting, at the device, information pertaining to a user; and

    a user authenticator for;

    comparing the information pertaining to the user with the information pertaining to the one or more user permitted to use the controlled host; and

    designating the user as one of;

    an authorized user of the controlled host if the information pertaining to the user matches the information pertaining to one or more users permitted to use the controlled host; and

    an unauthorized user of the controlled host if the information pertaining to the user does not match the information pertaining to one or more users permitted to use the controlled host,wherein, prior to the user authenticator designating the user as one of the authorized user and the unauthorized user, attempted communications from the one or more services to the controlled host are monitored by the device and are prevented from being received by the controlled host,wherein, responsive to the user authenticator designating the user as the authorized user, attempted communications from the one or more services are allowed to be received by the controlled host,wherein, responsive to the user authenticator designating the user as the unauthorized user, attempted communications from the one or more services are prevented from being received by the controlled host,wherein a characteristic of attempted communications from the one or more services to the controlled host is stored in the memory; and

    wherein the one or more communication protocols;

    in response to the user authenticator designating the user as the authorized user, authorize the communications between the one or more services and the controlled host; and

    in response to the user authenticator designating the user as the unauthorized user, prevent the communications from the one or more services from being received by the controlled host;

    log content of the attempted communications from the one or more services; and

    analyze the logged content.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×