Methods, systems, and devices for detecting and isolating device posing security threat
First Claim
Patent Images
1. An apparatus for detecting a security threat, the apparatus comprising:
- a first input/output (I/O) interface and a second I/O interface;
a memory device that stores a set of instructions; and
a processor configured to execute the set of instructions to;
detect that a first device is coupled with the first I/O interface;
responsive to the detection that the first device is coupled with the first I/O interface, temporarily disable data communication between the first and second I/O interfaces;
acquire a file from the detected first device via the first I/O interface;
monitor for a request to communicate data to the second I/O interface;
if the request to communicate data to the second I/O interface is detected, determine that the first device poses a security threat;
responsive to a determination that the acquired file does not pose a security threat, enable the data communication between the first and second I/O interfaces.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O interface, responsive to the detection that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first and second I/O interfaces, acquiring a file from the detected first device via the first I/O interface, determining whether the acquired file poses a security threat, and responsive to a determination that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces.
-
Citations
17 Claims
-
1. An apparatus for detecting a security threat, the apparatus comprising:
-
a first input/output (I/O) interface and a second I/O interface; a memory device that stores a set of instructions; and a processor configured to execute the set of instructions to; detect that a first device is coupled with the first I/O interface; responsive to the detection that the first device is coupled with the first I/O interface, temporarily disable data communication between the first and second I/O interfaces; acquire a file from the detected first device via the first I/O interface; monitor for a request to communicate data to the second I/O interface; if the request to communicate data to the second I/O interface is detected, determine that the first device poses a security threat; responsive to a determination that the acquired file does not pose a security threat, enable the data communication between the first and second I/O interfaces. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method of detecting a security threat, comprising:
-
detecting that a first device is coupled with a first input/output (I/O) interface; responsive to detecting that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first I/O interface and a second I/O interface; acquiring a file from the detected first device via the first I/O interface; monitoring for a request to communicate data to the second I/O interface; if the request to communicate data to the second I/O interface is detected, determine that the first device poses a security threat; responsive to determining that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium that stores a set of instructions that are executable by at least one processor of an electronic device to cause the electronic device to perform a method of detecting a security threat, the method comprising:
-
detecting that a first device is coupled with a first input/output (I/O) interface; responsive to detecting that the first device is coupled with the first I/O interface, temporarily disabling data communication between the first I/O interface and a second I/O interface; acquiring a file from the detected first device via the first I/O interface; monitoring for a request to communicate data to the second I/O interface; if the request to communicate data to the second I/O interface is detected, determine that the first device poses a security threat; and responsive to determining that the acquired file does not pose a security threat, enabling the data communication between the first and second I/O interfaces. - View Dependent Claims (14, 15, 16, 17)
-
Specification