×

Security system with methodology for defending against security breaches of peripheral devices

  • US 8,281,114 B2
  • Filed: 12/23/2003
  • Issued: 10/02/2012
  • Est. Priority Date: 12/23/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for protecting a computer from security breaches involving a hardware-based key logger installed between the computer and an attached input device, the method comprising:

  • when the computer is first powered on, storing authorization information received from an administrative user to indicate that the input device is authorized to communicate with the computer;

    detecting a potential tampering attempt by an unauthorized user comprising detachment of the input device from the computer, installation of a hardware-based key logger, and reattachment of the input device, so that the hardware-based key logger is installed between the computer and the input device;

    requiring entry of a password for authorizing the input device;

    if the required password is entered, authorizing the input device to communicate with the computer and, otherwise, continuing to block communication from the input device to the computer;

    storing authorization information indicating whether or not the input device is allowed to communicate with the computer;

    detecting detachment of the input device from the computer;

    when said potential tampering attempt is detected, updating the authorization information to indicate that the input device is no longer authorized to communicate with the computer; and

    upon said reattachment of the input device, blocking communication from the input device to the computer until the input device is again authorized.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×