[go: up one dir, main page]

WO2013042108A1 - Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé - Google Patents

Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé Download PDF

Info

Publication number
WO2013042108A1
WO2013042108A1 PCT/IL2012/000343 IL2012000343W WO2013042108A1 WO 2013042108 A1 WO2013042108 A1 WO 2013042108A1 IL 2012000343 W IL2012000343 W IL 2012000343W WO 2013042108 A1 WO2013042108 A1 WO 2013042108A1
Authority
WO
WIPO (PCT)
Prior art keywords
usb
plug
socket
usb socket
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IL2012/000343
Other languages
English (en)
Inventor
Zadok Reuveni
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2013042108A1 publication Critical patent/WO2013042108A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4063Device-to-bus coupling
    • G06F13/409Mechanical coupling
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • HELECTRICITY
    • H01ELECTRIC ELEMENTS
    • H01RELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
    • H01R13/00Details of coupling devices of the kinds covered by groups H01R12/70 or H01R24/00 - H01R33/00
    • H01R13/44Means for preventing access to live contacts
    • H01R13/447Shutter or cover plate

Definitions

  • This invention relates in general to computer security and in particular to disabling a computer's USB port.
  • USB universal serial bus
  • US 2005/0202698 addresses this problem and discloses a USB connector lock having a tubular body, a rotatably limit, a lock activator, a plug and a faceplate that abuts the outer edge of a USB socket when the connector lock is inserted therein and thwarts tampering.
  • the plug includes a resilient latch tongue having a pair of outwardly protruding notches that engage complementary apertures that are a standard feature of a USB socket, thereby preventing removal.
  • the lock is opened by the lock activator which serves to bend the resilient latch tongue inward out of the apertures, thus allowing the lock to be removed.
  • Such a device is bulky and expensive, particularly when large numbers of computers are to be protected.
  • WO 2005/053109 discloses a lockable dummy terminal inserted, in place of a cable connector terminal, into a connector terminal socket to which the other connector terminal is not connected but of which use is not allowed to prevent the other connector terminal to be erroneously inserted therein.
  • the dummy terminal comprises a body that is dimensioned for insertion into the terminal socket and a resilient locking piece that engages an internal edge of the socket, thereby preventing removal.
  • WO 2003/028166 discloses a locking plug for protecting an RSJ- 1 type jack socket.
  • the plug has both a key-receiving member and a locking member.
  • the key- receiving member range from something as simple as a hole, slot, or other physical opening, to a pad for a fingerprint sensor, or a data activated switch.
  • JP 2000-100515 discloses a seal plug for an electrical power socket that protects against electrocution.
  • the seal plug has a body portion dimensioned for flush fitting into a recessed socket.
  • the body portion is formed with a tab that allows the plug to be removed from the socket by applying a prescribed tensile force, but which is torn in the process. Accordingly, even if the plug is re-fitted into the recessed socket, the missing tab provides a visual indication of tampering.
  • WO/2005/006159 discloses a computer system including a central processing unit (CPU), and a chipset coupled to the CPU including protected registers and a host controller.
  • the computer system also includes a bus coupled to the host controller and a peripheral device coupled the bus. Trusted software accesses the protected registers to transmit encrypted data between the host controller and the peripheral device upon startup of the computer system to verify that the peripheral device is trustworthy.
  • DeviceLock® manufactured by DeviceLock, Inc.
  • Such dongles include a memory storing an ID that is checked by the software application on initialization so that the dongle has to be present in order for the software application to run.
  • a security plug for preventing access to a USB socket having a frame and at least one aperture in the frame, said security plug comprising:
  • At least one resilient prong supported by a major surface of the body portion for engaging a corresponding aperture in the frame and impeding removal of the plug from the socket.
  • a frangible tab is attached to the end surface of the body portion and is adapted for easy removal therefrom after insertion of the plug into the USB socket.
  • the frangible tab may serve to facilitate handling the security plug when inserting it to the USB socket. It may also be left intact so that attempted removal causes it to fracture, such that when present it serves as a visible indicator that the security plug is intact.
  • the planar body portion is dimensioned so that the end surface does not protrude from an outer edge of the frame when the plug is fully inserted therein, thereby militating against forced removal of the plug.
  • a method for preventing access to a USB socket having a frame and at least one aperture in the frame comprising:
  • a plug having a planar body portion dimensioned for insertion into said frame and having an end surface that does not protrude from an outer edge of the frame when the plug is fully inserted therein so that at least one resilient prong supported by a major surface of the body portion engages said aperture.
  • Security is further enhanced by removing a frangible tab attached to the end surface of the body portion and which is preferably adapted to tear or shear automatically upon attempted removal of the plug from the socket.
  • the security plug completes an electrical circuit when inserted into the USB such that its removal breaks the circuit and is detected by the host computer.
  • Software in the host computer can monitor the USB port and take precautionary or evasive action upon removal of the security plug. Likewise, software is responsive to the computer being switched on without the security plug in place for taking precautionary or evasive action.
  • This aspect of the invention is capable of extension to any USB peripheral device in order to check whether a USB device has been connected or removed.
  • the USB device has an internal ID that is known to the host computer so that on removing or inserting the device the host computer detects a change in status relating to a known USB device and prompts the user to enter a password that indicates whether or not he is authorized to perform the detected action.
  • software in the host computer is adapted continually to monitor all the USB ports of the computer and identify each USB device according to its internal ID.
  • the software forces the computer to ignore any unrecognized device so that trying to connect an unauthorized device to a USB port of the computer poses no security risk.
  • This is the opposite to known security dongles where the software is authorized to run only when the correct dongle is connected, whereas in the invention the software serves to verify if the USB device is recognized and/or authorized.
  • Fig. 1 is a perspective view showing pictorially a USB socket for use with the invention
  • Figs. 2 to 4 are pictorial views of a security plug according to an embodiment of the invention for preventing access to the USB socket of Fig. 1 ;
  • Fig. 5 is a schematic diagram of a secured plug or device according to another embodiment of the invention.
  • Figs. 6a and 6b are a flow diagram showing principal operating steps carried out in accordance with a method for monitoring insertion and withdrawal of the plug or device shown in Fig. 5.
  • Fig. 1 shows a USB socket 10 having a frame 11 containing USB terminals 12 mounted on an insulated mount 13.
  • resilient leaf springs 14 are formed in the frame and are urged away from the frame by an outer casing of the plug upon insertion thereof into the USB socket 10. Doing this creates a counteracting spring force that presses against the outer casing of the plug and secures the plug inside the socket with the respective plug and socket terminals in good contact.
  • Each of the leaf springs 14 is formed by cutting a respective generally U-shaped aperture 15 in the frame 11 so as to form an inner tongue or leaf 16 that is resiliently deformable about a hinge axis constituted by an imaginary line 17 where an edge of the leaf is attached to the outer surface of the frame.
  • the frame 11 is adapted for securing to a printed circuit board (PCB) via clips 18 that are inserted into holes in the PCB, the terminals 12 of the socket being connected to electrically conductive pins 19 that are likewise inserted into holes of the PCB and soldered to solder pads in known manner.
  • PCB printed circuit board
  • Figs. 2 to 4 show a security plug 20 for preventing access to the USB socket 11.
  • the security plug 20 has a planar body portion 21 dimensioned for insertion into the frame 11 of the USB socket 10.
  • the body portion 21 may also be dimensioned such that an end surface 22 thereof is flush with an outer edge 23 of the frame when the plug is fully inserted therein.
  • At least one prong 24 is supported by a major surface 25 of the body portion for engaging a corresponding aperture 15 in the frame whereby an edge 26 of the aperture engages the prong 24 and impedes removal of the plug from the socket.
  • each prong 24 is believed to be sufficient to retain the plug inside the socket, as shown in Figs. 2 and 3 preferably a pair of resilient prongs is provided, each prong being adapted for engaging a corresponding aperture in the frame of the USB socket. Since USB sockets are equipped as standard with a pair of leaf springs on each major surface of the frame, this means that both apertures are utilized. In the case where the prongs protrude out of the major surface of the frame as shown in the figures, there must inevitably be some play between the plug and socket. This makes it possible to insert a sharp object such as a screwdriver or blade into the USB socket and forcibly withdraw the plug.
  • a sharp object such as a screwdriver or blade
  • a flange or face plate 27 may be mounted on the end surface 22 so that when the plug is inserted the face plate obscures the front edge of the frame, thereby preventing insertion of any object within the gap between the outer edge of the plug and the inner edge of the frame.
  • the security plug includes a frangible tab 28 fixed to the end surface 22 of the plug and adapted for easy removal therefrom after insertion of the plug into the USB socket.
  • the frangible tab 28 is adapted to be fractured from the body portion upon attempting to remove the plug from the socket leaving a facture mark 29. This both prevents removal while also providing an immediate visual indication that the plug has been tampered with.
  • the planar body portion is dimensioned so that the end surface is flush with an outer edge of the frame when the plug is fully inserted therein, thereby militating against forced removal of the plug.
  • it may be dimensioned so that the end surface is recessed within frame of the USB socket, making it even more difficult to gain purchase.
  • the body portion need not be uniform.
  • the major surfaces thereof may be inclined and curved in order to make it harder to grip after insertion into the USB socket.
  • the security plug can be a slim plastic insert that is pushed with a probe or screwdriver or other suitable object into the far end of the USB socket so as to become lodged therein and prevent subsequent insertion of a USB connector.
  • Fig. 5 is a schematic diagram of a secured plug or device according to another embodiment of the invention.
  • the following table shows the pin layout of a standard USB plug.
  • a resistor R of sufficiently high value e.g. 100 kQ to impose little current drain.
  • Software in the host computer monitors the current flowing between VBUS and Ground so as to detect whether the security plug is connected or removed as a function of current flow. Specifically, any status in the connection or disconnection of the security plug while the computer is operating can be detected in this manner.
  • a memory device storing a unique ID may be connected across the data pins 2 and 3 so as to allow the host computer to identify the device.
  • the host computer monitors the USB ports and detects when a device is removed or inserted and uses the ID to establish the ID of the device. The user is then prompted to enter an authorization code that is matched to a database of authorized users stored in the computer in order to determine whether the user is authorized to remove or insert the identified device and take precautionary or evasive action if necessary.
  • Figs. 6a and 6b are a flow diagram showing principal operating steps carried out in accordance with a method for monitoring insertion and withdrawal of the plug or device shown in Fig. 5.
  • the host computer stores in a non- volatile memory a security flag setting for each authorized USB device that is indicative of whether or not the device is connected.
  • a security flag is set and the user is requested to enter a password to continue, thus ensuring that only authorized users can continue.
  • the operating system Upon entry of a valid password or if no security flag is set, the operating system (OS) is initialized and the last status of each device is accessed from the non-volatile memory and stored in working memory (RAM) with the ID of each device and the port number.
  • OS operating system
  • RAM working memory
  • a working record for the current session is established that determines the ID of each device and its location.
  • the database also associates with each device ID authorized users as well as their permissions, i.e. whether a given user is authorized to insert the device and/or to remove it.
  • the security flag is set and the user is prompted to enter a password. Apart from the alphanumeric keys required to enter the password, control keys and all other interfaces and applications are locked pending entry of a valid password.
  • the system is unlocked, the security flag is released and the status of each USB device is checked. If no change in the status of any of the USB devices from the previous session is detected, system status is monitored at 60 in order to determine if a USB device is removed during the current session.
  • a USB device can be an input/output device such as a mouse, keyboard or printer that is coupled to the system via the USB bus or it can be a USB security device as described above. So when the status check reveals at 61 that a USB device has been removed, a further check is made at 62 to determine if the USB security plug has been removed. If not, this means that a USB input/output device of known ID has been removed. The software now checks at 63 if this device is in the database of authorized input/output devices. If not, the event is stored in non- volatile memory, the security flag is set indicating that the device is removed, any current application windows are locked pending entry of a valid password and the user is requested to enter a password to continue, thus ensuring that only authorized users can continue. Upon entry of a valid password, current application windows are unlocked and the software continues to monitor system status at 60.
  • the software checks at 64 whether the device is authorized for removal. If not, the event is stored in non-volatile memory, the security flag is set indicating that the device is removed, any current application windows are locked pending entry of a valid password and the user is requested to enter a password to continue, thus ensuring that only authorized users can continue. Upon entry of a valid password, current application windows are unlocked and the software continues to monitor system status at 60. On the other hand, if at 64 permission to remove the device is granted no action is taken and the software continues to monitor system status at 60.
  • the software checks at 65 if a USB device has been inserted into a USB socket. If so, the event is recorded at 66, the ID of the new device is determined and a check is made at 67 whether the new device is in the database. If the device is authorized i.e. appears in the database, any current application windows are permitted to run normally and the software continues to monitor system status at 60 in the background. If not, the user is prompted to enter a password confirming his or permission to connect a new device. If a valid user password is entered, the software checks whether this user is also permitted to remove the device. The database is updated accordingly and the software continues to monitor system status at 60.
  • the software checks at 68 whether a command has been entered to shut down the OS. If not, the software continues to monitor system status at 60 and the whole process continues as described above. If at 68 the user has initiated shut down, the status of all USB devices is recorded at 69 prior to shutdown.
  • the software is preferably integral with the operating system and provides a high level of security on a standalone host computer without the need for external monitoring over a network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Details Of Connecting Devices For Male And Female Coupling (AREA)

Abstract

Une fiche de sécurité (20) destinée à empêcher un accès à une prise USB (10), qui a un cadre (11) et au moins une ouverture (15) dans le cadre, comprend une partie corps plane (21) qui est dimensionnée pour son insertion dans le cadre de la prise USB et qui a une surface terminale (22) et au moins un ergot (24). Ledit ergot, supporté par une surface principale de la partie corps, est destiné à s'engager dans une ouverture correspondante (15) dans le cadre et à entraver le retrait de la fiche de la prise. La fiche de sécurité (20) peut être n'importe quel dispositif adapté pour terminer un circuit électrique lorsqu'elle est insérée dans la prise USB de sorte que son retrait de la prise USB interrompe le circuit et soit détecté par un ordinateur hôte. Un tel dispositif peut avoir un identifiant unique autorisant un logiciel dans l'ordinateur hôte à prendre une action de précaution ou d'évitement lors de l'insertion ou du retrait du dispositif USB par un utilisateur non autorisé.
PCT/IL2012/000343 2011-09-20 2012-09-20 Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé Ceased WO2013042108A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IL215263 2011-09-20
IL215263A IL215263A (en) 2011-09-20 2011-09-20 Security plug prevent usb socket access

Publications (1)

Publication Number Publication Date
WO2013042108A1 true WO2013042108A1 (fr) 2013-03-28

Family

ID=45773931

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2012/000343 Ceased WO2013042108A1 (fr) 2011-09-20 2012-09-20 Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé

Country Status (2)

Country Link
IL (1) IL215263A (fr)
WO (1) WO2013042108A1 (fr)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2827279A1 (fr) 2013-07-09 2015-01-21 High Sec Labs Ltd. Dispositif de verrouillage d'USB électro-mécanique
CN105161884A (zh) * 2015-09-23 2015-12-16 连展科技电子(昆山)有限公司 Usb插座电连接器
EP2966630A1 (fr) * 2014-07-09 2016-01-13 Harris Corporation Dispositif de communication dans lequel un enlèvement non autorisé d'un connecteur électrique est détecté
EP3040902A1 (fr) 2015-01-02 2016-07-06 High Sec Labs Ltd. Dispositif et procédé de sécurité usb
US9460319B1 (en) 2016-05-20 2016-10-04 Foxrun Development Co., LLC Device for securing a computer port
US9646179B1 (en) 2016-12-30 2017-05-09 Foxrun Development Co., LLC Mechanical locking device for computer ports and portable storage devices
EP3073410A4 (fr) * 2013-12-17 2017-06-28 Chang Hoon Ahn Dispositif de verrouillage de liaison usb
US10381780B2 (en) 2015-09-01 2019-08-13 Signify Holding B.V. System and method for monitoring the connection of a pluggable lighting unit to a socket
WO2020148763A1 (fr) * 2019-01-15 2020-07-23 Electronic Stock Ltd. Dispositif de sécurité à port électrique
CN115732999A (zh) * 2022-11-01 2023-03-03 国网浙江省电力有限公司杭州市富阳区供电公司 一种usb接口提示牌及检测方法
WO2023149936A1 (fr) * 2022-02-01 2023-08-10 Microsoft Technology Licensing, Llc Mécanisme de détection d'intrusion pour composants de pcb sensibles à la sécurité

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000100515A (ja) 1998-09-22 2000-04-07 Shurutaa Kk コンセント用シール栓
WO2003028166A1 (fr) 2001-09-25 2003-04-03 Jim Valentine Protection pour fiche de communication
WO2005006159A1 (fr) 2003-06-30 2005-01-20 Intel Corporation Mecanisme peripherique fiable
WO2005053109A1 (fr) 2003-11-26 2005-06-09 Lintec Co., Ltd. Borne factice
US20050202698A1 (en) 2004-03-12 2005-09-15 Jin Tay Industries Co., Ltd. Connector lock for a universal serial bus port
US7428834B1 (en) * 2007-09-20 2008-09-30 Aba Ufo International Corp. Lock for universal serial bus ports
GB2448354A (en) * 2007-04-12 2008-10-15 David Land Security device for blocking a USB port
US20100031710A1 (en) * 2008-08-06 2010-02-11 Yen-Hsiang Chen Locking device for a connecting port on a computer

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000100515A (ja) 1998-09-22 2000-04-07 Shurutaa Kk コンセント用シール栓
WO2003028166A1 (fr) 2001-09-25 2003-04-03 Jim Valentine Protection pour fiche de communication
WO2005006159A1 (fr) 2003-06-30 2005-01-20 Intel Corporation Mecanisme peripherique fiable
WO2005053109A1 (fr) 2003-11-26 2005-06-09 Lintec Co., Ltd. Borne factice
US20050202698A1 (en) 2004-03-12 2005-09-15 Jin Tay Industries Co., Ltd. Connector lock for a universal serial bus port
GB2448354A (en) * 2007-04-12 2008-10-15 David Land Security device for blocking a USB port
US7428834B1 (en) * 2007-09-20 2008-09-30 Aba Ufo International Corp. Lock for universal serial bus ports
US20100031710A1 (en) * 2008-08-06 2010-02-11 Yen-Hsiang Chen Locking device for a connecting port on a computer

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2827279A1 (fr) 2013-07-09 2015-01-21 High Sec Labs Ltd. Dispositif de verrouillage d'USB électro-mécanique
EP3073410A4 (fr) * 2013-12-17 2017-06-28 Chang Hoon Ahn Dispositif de verrouillage de liaison usb
EP2966630A1 (fr) * 2014-07-09 2016-01-13 Harris Corporation Dispositif de communication dans lequel un enlèvement non autorisé d'un connecteur électrique est détecté
US9426904B2 (en) 2014-07-09 2016-08-23 Harris Corporation Communication device in which an unauthorized removal of an electrical connector is detected
EP3040902A1 (fr) 2015-01-02 2016-07-06 High Sec Labs Ltd. Dispositif et procédé de sécurité usb
US10381780B2 (en) 2015-09-01 2019-08-13 Signify Holding B.V. System and method for monitoring the connection of a pluggable lighting unit to a socket
CN105161884B (zh) * 2015-09-23 2024-04-02 连展科技电子(昆山)有限公司 Usb插座电连接器
CN105161884A (zh) * 2015-09-23 2015-12-16 连展科技电子(昆山)有限公司 Usb插座电连接器
US9460319B1 (en) 2016-05-20 2016-10-04 Foxrun Development Co., LLC Device for securing a computer port
US9646179B1 (en) 2016-12-30 2017-05-09 Foxrun Development Co., LLC Mechanical locking device for computer ports and portable storage devices
WO2020148763A1 (fr) * 2019-01-15 2020-07-23 Electronic Stock Ltd. Dispositif de sécurité à port électrique
WO2023149936A1 (fr) * 2022-02-01 2023-08-10 Microsoft Technology Licensing, Llc Mécanisme de détection d'intrusion pour composants de pcb sensibles à la sécurité
US12124571B2 (en) 2022-02-01 2024-10-22 Microsoft Technology Licensing, Llc Intrusion detection mechanism for security sensitive PCB components
CN115732999A (zh) * 2022-11-01 2023-03-03 国网浙江省电力有限公司杭州市富阳区供电公司 一种usb接口提示牌及检测方法

Also Published As

Publication number Publication date
IL215263A0 (en) 2011-11-30
IL215263A (en) 2014-01-30

Similar Documents

Publication Publication Date Title
WO2013042108A1 (fr) Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé
US10460132B2 (en) Security keys associated with identification of physical USB protection devices
CN103109294B (zh) 具有外围保护功能的计算机母板
US7877788B1 (en) Method and apparatus for securing a peripheral data interface
US8412865B2 (en) Method, apparatus and system for authentication of external storage devices
US20060268507A1 (en) Computer input/output (I/O) connector assembly having a security circuit disposed therein
EP2827279A1 (fr) Dispositif de verrouillage d'USB électro-mécanique
US11514196B2 (en) Method and apparatus for a modular digital chassis lock assembly in an information handling system
CN104484629A (zh) 一种计算机启动方法及装置
RU2006116233A (ru) Устройство защиты информации от несанкционированного доступа для компьютеров информационно-вычислительных систем
US7409563B2 (en) Method and apparatus for preventing un-authorized attachment of computer peripherals
EP2695069B1 (fr) Procédé et système pour bus usb avec une clé de contact cryptographique intégrée
CN114556343B (zh) 经由物理接口的基板管理控制器固件的安全安装
US8954624B2 (en) Method and system for securing input from an external device to a host
IL278132B (en) Security plug for preventing access to a miniature usb socket
TWI597619B (zh) 抑制穿透攻擊之技術
US11475152B1 (en) Systems and methods for securing stored computer files from modification with control circuit
EP2892161B1 (fr) Terminal mobile pourvu d'une fonction de sécurité
KR101554625B1 (ko) Usb 보안 시스템 및 보안 방법
CN107392067A (zh) 防篡改盖
US20220108041A1 (en) External secure and encrypted ssd device and a secure operating system on an external ssd device
KR101914610B1 (ko) 유에스비포트 보안장치
AU2011200015A1 (en) An Internet Security Device
KR200247675Y1 (ko) 인터넷 침입차단용 서버
TWM462980U (zh) Usb碟定位結構

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12784078

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23/07/2014)

122 Ep: pct application non-entry in european phase

Ref document number: 12784078

Country of ref document: EP

Kind code of ref document: A1