×

Apparatus and method for enhancing security of data on a host computing device and a peripheral device

  • US 9,875,354 B1
  • Filed: 09/17/2014
  • Issued: 01/23/2018
  • Est. Priority Date: 01/21/2011
  • Status: Active Grant
First Claim
Patent Images

1. A security device for coupling between a first device, configured to act at a given time as a host computing device (“

  • host”

    ) and a plurality of second devices, each second device configured to act at the same time as a peripheral device (“

    peripheral”

    ), wherein a protocol governs communications between the first device and the second devices, the protocol requiring any command sent by the first device to be sent to all of the second devices, each peripheral being assigned an address, and the first device operates invariably according to the protocol, the security device comprising;

    an upstream interface configured to be coupled via an upstream link to the host and to receive commands and data according to the protocol without exception from the host via the upstream link and to send data to the host via the upstream link according to the protocol, each of at least some of the commands including an address of a respective peripheral;

    a plurality of downstream interfaces, each downstream interface configured to be coupled via a respective downstream link to one of the peripherals and to receive data from the one peripheral via the respective downstream link and to send commands and data to the one peripheral via the respective downstream link; and

    a controller coupled between the upstream and downstream interfaces and configured to;

    receive a command and data via the upstream interface;

    perform a security process to analyze the received command;

    if the security process does not identify a security risk, select one of the downstream interfaces, and if the security process identifies a security risk, select none of the downstream interfaces; and

    if one of the downstream interfaces is selected as a result of the security process having not identified a security risk, forward the received command and data to only the selected one of the downstream interfaces.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×