Detection of a malicious peripheral
First Claim
Patent Images
1. At least one non-transitory computer-readable medium comprising one or more instructions that when executed by at least one processor, cause the at least one processor to:
- determine that a peripheral is connected to an electronic device;
determine a peripheral identification for the peripheral;
determine whether the peripheral identification matches an entry in a blacklist;
monitor data from the peripheral;
determine a type for the peripheral based on the monitored data;
determine whether the peripheral identification matches the determined type for the peripheral; and
block communication to and from the peripheral based on a determination that the peripheral identification does not match the determined type for the peripheral.
10 Assignments
0 Petitions
Accused Products
Abstract
Particular embodiments described herein provide for an electronic device that can be configured to determine when a peripheral is connected to the electronic device, determine a peripheral identification for the peripheral, and monitor the data going to and from the peripheral. Based on the monitored data, a type for the peripheral can be determine. The peripheral identification can be compared with the determined type for the peripheral and if they do not match, then communication to and from the peripheral can be blocked.
13 Citations
24 Claims
-
1. At least one non-transitory computer-readable medium comprising one or more instructions that when executed by at least one processor, cause the at least one processor to:
-
determine that a peripheral is connected to an electronic device; determine a peripheral identification for the peripheral; determine whether the peripheral identification matches an entry in a blacklist; monitor data from the peripheral; determine a type for the peripheral based on the monitored data; determine whether the peripheral identification matches the determined type for the peripheral; and block communication to and from the peripheral based on a determination that the peripheral identification does not match the determined type for the peripheral. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
a hardware processor configured to; determine that a peripheral is connected to an electronic device; determine a peripheral identification for the peripheral; determine whether the peripheral identification matches an entry in a blacklist; monitor data from the peripheral; determine a type for the peripheral based on the monitored data; determine whether the peripheral identification matches the determined type for the peripheral; and block communication to and from the peripheral based on a determination that the peripheral identification does not match the determined type for the peripheral. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
determining that a peripheral is connected to an electronic device; determining a peripheral identification for the peripheral; determining whether the peripheral identification matches an entry in a blacklist; monitoring data from the peripheral; determining a type for the peripheral based on the monitored data; determining whether the peripheral identification matches the determined type for the peripheral; and blocking communication to and from the peripheral based on a determination that the peripheral identification does not match the determined type for the peripheral. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A system for detection of a malicious peripheral, the system comprising:
-
a memory; and a hardware processor configured for; determining that a peripheral is connected to an electronic device; determining a peripheral identification for the peripheral; determining whether the peripheral identification matches an entry in a blacklist; monitoring data from the peripheral; determining a type for the peripheral based on the monitored data; determining whether the peripheral identification matches the determined type for the peripheral; and blocking communication to and from the peripheral based on a determination that the peripheral identification does not match the determined type for the peripheral. - View Dependent Claims (21, 22, 23, 24)
-
Specification