WO2013042108A1 - Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé - Google Patents
Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé Download PDFInfo
- Publication number
- WO2013042108A1 WO2013042108A1 PCT/IL2012/000343 IL2012000343W WO2013042108A1 WO 2013042108 A1 WO2013042108 A1 WO 2013042108A1 IL 2012000343 W IL2012000343 W IL 2012000343W WO 2013042108 A1 WO2013042108 A1 WO 2013042108A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- usb
- plug
- socket
- usb socket
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4063—Device-to-bus coupling
- G06F13/409—Mechanical coupling
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01R—ELECTRICALLY-CONDUCTIVE CONNECTIONS; STRUCTURAL ASSOCIATIONS OF A PLURALITY OF MUTUALLY-INSULATED ELECTRICAL CONNECTING ELEMENTS; COUPLING DEVICES; CURRENT COLLECTORS
- H01R13/00—Details of coupling devices of the kinds covered by groups H01R12/70 or H01R24/00 - H01R33/00
- H01R13/44—Means for preventing access to live contacts
- H01R13/447—Shutter or cover plate
Definitions
- This invention relates in general to computer security and in particular to disabling a computer's USB port.
- USB universal serial bus
- US 2005/0202698 addresses this problem and discloses a USB connector lock having a tubular body, a rotatably limit, a lock activator, a plug and a faceplate that abuts the outer edge of a USB socket when the connector lock is inserted therein and thwarts tampering.
- the plug includes a resilient latch tongue having a pair of outwardly protruding notches that engage complementary apertures that are a standard feature of a USB socket, thereby preventing removal.
- the lock is opened by the lock activator which serves to bend the resilient latch tongue inward out of the apertures, thus allowing the lock to be removed.
- Such a device is bulky and expensive, particularly when large numbers of computers are to be protected.
- WO 2005/053109 discloses a lockable dummy terminal inserted, in place of a cable connector terminal, into a connector terminal socket to which the other connector terminal is not connected but of which use is not allowed to prevent the other connector terminal to be erroneously inserted therein.
- the dummy terminal comprises a body that is dimensioned for insertion into the terminal socket and a resilient locking piece that engages an internal edge of the socket, thereby preventing removal.
- WO 2003/028166 discloses a locking plug for protecting an RSJ- 1 type jack socket.
- the plug has both a key-receiving member and a locking member.
- the key- receiving member range from something as simple as a hole, slot, or other physical opening, to a pad for a fingerprint sensor, or a data activated switch.
- JP 2000-100515 discloses a seal plug for an electrical power socket that protects against electrocution.
- the seal plug has a body portion dimensioned for flush fitting into a recessed socket.
- the body portion is formed with a tab that allows the plug to be removed from the socket by applying a prescribed tensile force, but which is torn in the process. Accordingly, even if the plug is re-fitted into the recessed socket, the missing tab provides a visual indication of tampering.
- WO/2005/006159 discloses a computer system including a central processing unit (CPU), and a chipset coupled to the CPU including protected registers and a host controller.
- the computer system also includes a bus coupled to the host controller and a peripheral device coupled the bus. Trusted software accesses the protected registers to transmit encrypted data between the host controller and the peripheral device upon startup of the computer system to verify that the peripheral device is trustworthy.
- DeviceLock® manufactured by DeviceLock, Inc.
- Such dongles include a memory storing an ID that is checked by the software application on initialization so that the dongle has to be present in order for the software application to run.
- a security plug for preventing access to a USB socket having a frame and at least one aperture in the frame, said security plug comprising:
- At least one resilient prong supported by a major surface of the body portion for engaging a corresponding aperture in the frame and impeding removal of the plug from the socket.
- a frangible tab is attached to the end surface of the body portion and is adapted for easy removal therefrom after insertion of the plug into the USB socket.
- the frangible tab may serve to facilitate handling the security plug when inserting it to the USB socket. It may also be left intact so that attempted removal causes it to fracture, such that when present it serves as a visible indicator that the security plug is intact.
- the planar body portion is dimensioned so that the end surface does not protrude from an outer edge of the frame when the plug is fully inserted therein, thereby militating against forced removal of the plug.
- a method for preventing access to a USB socket having a frame and at least one aperture in the frame comprising:
- a plug having a planar body portion dimensioned for insertion into said frame and having an end surface that does not protrude from an outer edge of the frame when the plug is fully inserted therein so that at least one resilient prong supported by a major surface of the body portion engages said aperture.
- Security is further enhanced by removing a frangible tab attached to the end surface of the body portion and which is preferably adapted to tear or shear automatically upon attempted removal of the plug from the socket.
- the security plug completes an electrical circuit when inserted into the USB such that its removal breaks the circuit and is detected by the host computer.
- Software in the host computer can monitor the USB port and take precautionary or evasive action upon removal of the security plug. Likewise, software is responsive to the computer being switched on without the security plug in place for taking precautionary or evasive action.
- This aspect of the invention is capable of extension to any USB peripheral device in order to check whether a USB device has been connected or removed.
- the USB device has an internal ID that is known to the host computer so that on removing or inserting the device the host computer detects a change in status relating to a known USB device and prompts the user to enter a password that indicates whether or not he is authorized to perform the detected action.
- software in the host computer is adapted continually to monitor all the USB ports of the computer and identify each USB device according to its internal ID.
- the software forces the computer to ignore any unrecognized device so that trying to connect an unauthorized device to a USB port of the computer poses no security risk.
- This is the opposite to known security dongles where the software is authorized to run only when the correct dongle is connected, whereas in the invention the software serves to verify if the USB device is recognized and/or authorized.
- Fig. 1 is a perspective view showing pictorially a USB socket for use with the invention
- Figs. 2 to 4 are pictorial views of a security plug according to an embodiment of the invention for preventing access to the USB socket of Fig. 1 ;
- Fig. 5 is a schematic diagram of a secured plug or device according to another embodiment of the invention.
- Figs. 6a and 6b are a flow diagram showing principal operating steps carried out in accordance with a method for monitoring insertion and withdrawal of the plug or device shown in Fig. 5.
- Fig. 1 shows a USB socket 10 having a frame 11 containing USB terminals 12 mounted on an insulated mount 13.
- resilient leaf springs 14 are formed in the frame and are urged away from the frame by an outer casing of the plug upon insertion thereof into the USB socket 10. Doing this creates a counteracting spring force that presses against the outer casing of the plug and secures the plug inside the socket with the respective plug and socket terminals in good contact.
- Each of the leaf springs 14 is formed by cutting a respective generally U-shaped aperture 15 in the frame 11 so as to form an inner tongue or leaf 16 that is resiliently deformable about a hinge axis constituted by an imaginary line 17 where an edge of the leaf is attached to the outer surface of the frame.
- the frame 11 is adapted for securing to a printed circuit board (PCB) via clips 18 that are inserted into holes in the PCB, the terminals 12 of the socket being connected to electrically conductive pins 19 that are likewise inserted into holes of the PCB and soldered to solder pads in known manner.
- PCB printed circuit board
- Figs. 2 to 4 show a security plug 20 for preventing access to the USB socket 11.
- the security plug 20 has a planar body portion 21 dimensioned for insertion into the frame 11 of the USB socket 10.
- the body portion 21 may also be dimensioned such that an end surface 22 thereof is flush with an outer edge 23 of the frame when the plug is fully inserted therein.
- At least one prong 24 is supported by a major surface 25 of the body portion for engaging a corresponding aperture 15 in the frame whereby an edge 26 of the aperture engages the prong 24 and impedes removal of the plug from the socket.
- each prong 24 is believed to be sufficient to retain the plug inside the socket, as shown in Figs. 2 and 3 preferably a pair of resilient prongs is provided, each prong being adapted for engaging a corresponding aperture in the frame of the USB socket. Since USB sockets are equipped as standard with a pair of leaf springs on each major surface of the frame, this means that both apertures are utilized. In the case where the prongs protrude out of the major surface of the frame as shown in the figures, there must inevitably be some play between the plug and socket. This makes it possible to insert a sharp object such as a screwdriver or blade into the USB socket and forcibly withdraw the plug.
- a sharp object such as a screwdriver or blade
- a flange or face plate 27 may be mounted on the end surface 22 so that when the plug is inserted the face plate obscures the front edge of the frame, thereby preventing insertion of any object within the gap between the outer edge of the plug and the inner edge of the frame.
- the security plug includes a frangible tab 28 fixed to the end surface 22 of the plug and adapted for easy removal therefrom after insertion of the plug into the USB socket.
- the frangible tab 28 is adapted to be fractured from the body portion upon attempting to remove the plug from the socket leaving a facture mark 29. This both prevents removal while also providing an immediate visual indication that the plug has been tampered with.
- the planar body portion is dimensioned so that the end surface is flush with an outer edge of the frame when the plug is fully inserted therein, thereby militating against forced removal of the plug.
- it may be dimensioned so that the end surface is recessed within frame of the USB socket, making it even more difficult to gain purchase.
- the body portion need not be uniform.
- the major surfaces thereof may be inclined and curved in order to make it harder to grip after insertion into the USB socket.
- the security plug can be a slim plastic insert that is pushed with a probe or screwdriver or other suitable object into the far end of the USB socket so as to become lodged therein and prevent subsequent insertion of a USB connector.
- Fig. 5 is a schematic diagram of a secured plug or device according to another embodiment of the invention.
- the following table shows the pin layout of a standard USB plug.
- a resistor R of sufficiently high value e.g. 100 kQ to impose little current drain.
- Software in the host computer monitors the current flowing between VBUS and Ground so as to detect whether the security plug is connected or removed as a function of current flow. Specifically, any status in the connection or disconnection of the security plug while the computer is operating can be detected in this manner.
- a memory device storing a unique ID may be connected across the data pins 2 and 3 so as to allow the host computer to identify the device.
- the host computer monitors the USB ports and detects when a device is removed or inserted and uses the ID to establish the ID of the device. The user is then prompted to enter an authorization code that is matched to a database of authorized users stored in the computer in order to determine whether the user is authorized to remove or insert the identified device and take precautionary or evasive action if necessary.
- Figs. 6a and 6b are a flow diagram showing principal operating steps carried out in accordance with a method for monitoring insertion and withdrawal of the plug or device shown in Fig. 5.
- the host computer stores in a non- volatile memory a security flag setting for each authorized USB device that is indicative of whether or not the device is connected.
- a security flag is set and the user is requested to enter a password to continue, thus ensuring that only authorized users can continue.
- the operating system Upon entry of a valid password or if no security flag is set, the operating system (OS) is initialized and the last status of each device is accessed from the non-volatile memory and stored in working memory (RAM) with the ID of each device and the port number.
- OS operating system
- RAM working memory
- a working record for the current session is established that determines the ID of each device and its location.
- the database also associates with each device ID authorized users as well as their permissions, i.e. whether a given user is authorized to insert the device and/or to remove it.
- the security flag is set and the user is prompted to enter a password. Apart from the alphanumeric keys required to enter the password, control keys and all other interfaces and applications are locked pending entry of a valid password.
- the system is unlocked, the security flag is released and the status of each USB device is checked. If no change in the status of any of the USB devices from the previous session is detected, system status is monitored at 60 in order to determine if a USB device is removed during the current session.
- a USB device can be an input/output device such as a mouse, keyboard or printer that is coupled to the system via the USB bus or it can be a USB security device as described above. So when the status check reveals at 61 that a USB device has been removed, a further check is made at 62 to determine if the USB security plug has been removed. If not, this means that a USB input/output device of known ID has been removed. The software now checks at 63 if this device is in the database of authorized input/output devices. If not, the event is stored in non- volatile memory, the security flag is set indicating that the device is removed, any current application windows are locked pending entry of a valid password and the user is requested to enter a password to continue, thus ensuring that only authorized users can continue. Upon entry of a valid password, current application windows are unlocked and the software continues to monitor system status at 60.
- the software checks at 64 whether the device is authorized for removal. If not, the event is stored in non-volatile memory, the security flag is set indicating that the device is removed, any current application windows are locked pending entry of a valid password and the user is requested to enter a password to continue, thus ensuring that only authorized users can continue. Upon entry of a valid password, current application windows are unlocked and the software continues to monitor system status at 60. On the other hand, if at 64 permission to remove the device is granted no action is taken and the software continues to monitor system status at 60.
- the software checks at 65 if a USB device has been inserted into a USB socket. If so, the event is recorded at 66, the ID of the new device is determined and a check is made at 67 whether the new device is in the database. If the device is authorized i.e. appears in the database, any current application windows are permitted to run normally and the software continues to monitor system status at 60 in the background. If not, the user is prompted to enter a password confirming his or permission to connect a new device. If a valid user password is entered, the software checks whether this user is also permitted to remove the device. The database is updated accordingly and the software continues to monitor system status at 60.
- the software checks at 68 whether a command has been entered to shut down the OS. If not, the software continues to monitor system status at 60 and the whole process continues as described above. If at 68 the user has initiated shut down, the status of all USB devices is recorded at 69 prior to shutdown.
- the software is preferably integral with the operating system and provides a high level of security on a standalone host computer without the need for external monitoring over a network.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Details Of Connecting Devices For Male And Female Coupling (AREA)
Abstract
Une fiche de sécurité (20) destinée à empêcher un accès à une prise USB (10), qui a un cadre (11) et au moins une ouverture (15) dans le cadre, comprend une partie corps plane (21) qui est dimensionnée pour son insertion dans le cadre de la prise USB et qui a une surface terminale (22) et au moins un ergot (24). Ledit ergot, supporté par une surface principale de la partie corps, est destiné à s'engager dans une ouverture correspondante (15) dans le cadre et à entraver le retrait de la fiche de la prise. La fiche de sécurité (20) peut être n'importe quel dispositif adapté pour terminer un circuit électrique lorsqu'elle est insérée dans la prise USB de sorte que son retrait de la prise USB interrompe le circuit et soit détecté par un ordinateur hôte. Un tel dispositif peut avoir un identifiant unique autorisant un logiciel dans l'ordinateur hôte à prendre une action de précaution ou d'évitement lors de l'insertion ou du retrait du dispositif USB par un utilisateur non autorisé.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IL215263 | 2011-09-20 | ||
| IL215263A IL215263A (en) | 2011-09-20 | 2011-09-20 | Security plug prevent usb socket access |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013042108A1 true WO2013042108A1 (fr) | 2013-03-28 |
Family
ID=45773931
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IL2012/000343 Ceased WO2013042108A1 (fr) | 2011-09-20 | 2012-09-20 | Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé |
Country Status (2)
| Country | Link |
|---|---|
| IL (1) | IL215263A (fr) |
| WO (1) | WO2013042108A1 (fr) |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2827279A1 (fr) | 2013-07-09 | 2015-01-21 | High Sec Labs Ltd. | Dispositif de verrouillage d'USB électro-mécanique |
| CN105161884A (zh) * | 2015-09-23 | 2015-12-16 | 连展科技电子(昆山)有限公司 | Usb插座电连接器 |
| EP2966630A1 (fr) * | 2014-07-09 | 2016-01-13 | Harris Corporation | Dispositif de communication dans lequel un enlèvement non autorisé d'un connecteur électrique est détecté |
| EP3040902A1 (fr) | 2015-01-02 | 2016-07-06 | High Sec Labs Ltd. | Dispositif et procédé de sécurité usb |
| US9460319B1 (en) | 2016-05-20 | 2016-10-04 | Foxrun Development Co., LLC | Device for securing a computer port |
| US9646179B1 (en) | 2016-12-30 | 2017-05-09 | Foxrun Development Co., LLC | Mechanical locking device for computer ports and portable storage devices |
| EP3073410A4 (fr) * | 2013-12-17 | 2017-06-28 | Chang Hoon Ahn | Dispositif de verrouillage de liaison usb |
| US10381780B2 (en) | 2015-09-01 | 2019-08-13 | Signify Holding B.V. | System and method for monitoring the connection of a pluggable lighting unit to a socket |
| WO2020148763A1 (fr) * | 2019-01-15 | 2020-07-23 | Electronic Stock Ltd. | Dispositif de sécurité à port électrique |
| CN115732999A (zh) * | 2022-11-01 | 2023-03-03 | 国网浙江省电力有限公司杭州市富阳区供电公司 | 一种usb接口提示牌及检测方法 |
| WO2023149936A1 (fr) * | 2022-02-01 | 2023-08-10 | Microsoft Technology Licensing, Llc | Mécanisme de détection d'intrusion pour composants de pcb sensibles à la sécurité |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000100515A (ja) | 1998-09-22 | 2000-04-07 | Shurutaa Kk | コンセント用シール栓 |
| WO2003028166A1 (fr) | 2001-09-25 | 2003-04-03 | Jim Valentine | Protection pour fiche de communication |
| WO2005006159A1 (fr) | 2003-06-30 | 2005-01-20 | Intel Corporation | Mecanisme peripherique fiable |
| WO2005053109A1 (fr) | 2003-11-26 | 2005-06-09 | Lintec Co., Ltd. | Borne factice |
| US20050202698A1 (en) | 2004-03-12 | 2005-09-15 | Jin Tay Industries Co., Ltd. | Connector lock for a universal serial bus port |
| US7428834B1 (en) * | 2007-09-20 | 2008-09-30 | Aba Ufo International Corp. | Lock for universal serial bus ports |
| GB2448354A (en) * | 2007-04-12 | 2008-10-15 | David Land | Security device for blocking a USB port |
| US20100031710A1 (en) * | 2008-08-06 | 2010-02-11 | Yen-Hsiang Chen | Locking device for a connecting port on a computer |
-
2011
- 2011-09-20 IL IL215263A patent/IL215263A/en active IP Right Grant
-
2012
- 2012-09-20 WO PCT/IL2012/000343 patent/WO2013042108A1/fr not_active Ceased
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000100515A (ja) | 1998-09-22 | 2000-04-07 | Shurutaa Kk | コンセント用シール栓 |
| WO2003028166A1 (fr) | 2001-09-25 | 2003-04-03 | Jim Valentine | Protection pour fiche de communication |
| WO2005006159A1 (fr) | 2003-06-30 | 2005-01-20 | Intel Corporation | Mecanisme peripherique fiable |
| WO2005053109A1 (fr) | 2003-11-26 | 2005-06-09 | Lintec Co., Ltd. | Borne factice |
| US20050202698A1 (en) | 2004-03-12 | 2005-09-15 | Jin Tay Industries Co., Ltd. | Connector lock for a universal serial bus port |
| GB2448354A (en) * | 2007-04-12 | 2008-10-15 | David Land | Security device for blocking a USB port |
| US7428834B1 (en) * | 2007-09-20 | 2008-09-30 | Aba Ufo International Corp. | Lock for universal serial bus ports |
| US20100031710A1 (en) * | 2008-08-06 | 2010-02-11 | Yen-Hsiang Chen | Locking device for a connecting port on a computer |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2827279A1 (fr) | 2013-07-09 | 2015-01-21 | High Sec Labs Ltd. | Dispositif de verrouillage d'USB électro-mécanique |
| EP3073410A4 (fr) * | 2013-12-17 | 2017-06-28 | Chang Hoon Ahn | Dispositif de verrouillage de liaison usb |
| EP2966630A1 (fr) * | 2014-07-09 | 2016-01-13 | Harris Corporation | Dispositif de communication dans lequel un enlèvement non autorisé d'un connecteur électrique est détecté |
| US9426904B2 (en) | 2014-07-09 | 2016-08-23 | Harris Corporation | Communication device in which an unauthorized removal of an electrical connector is detected |
| EP3040902A1 (fr) | 2015-01-02 | 2016-07-06 | High Sec Labs Ltd. | Dispositif et procédé de sécurité usb |
| US10381780B2 (en) | 2015-09-01 | 2019-08-13 | Signify Holding B.V. | System and method for monitoring the connection of a pluggable lighting unit to a socket |
| CN105161884B (zh) * | 2015-09-23 | 2024-04-02 | 连展科技电子(昆山)有限公司 | Usb插座电连接器 |
| CN105161884A (zh) * | 2015-09-23 | 2015-12-16 | 连展科技电子(昆山)有限公司 | Usb插座电连接器 |
| US9460319B1 (en) | 2016-05-20 | 2016-10-04 | Foxrun Development Co., LLC | Device for securing a computer port |
| US9646179B1 (en) | 2016-12-30 | 2017-05-09 | Foxrun Development Co., LLC | Mechanical locking device for computer ports and portable storage devices |
| WO2020148763A1 (fr) * | 2019-01-15 | 2020-07-23 | Electronic Stock Ltd. | Dispositif de sécurité à port électrique |
| WO2023149936A1 (fr) * | 2022-02-01 | 2023-08-10 | Microsoft Technology Licensing, Llc | Mécanisme de détection d'intrusion pour composants de pcb sensibles à la sécurité |
| US12124571B2 (en) | 2022-02-01 | 2024-10-22 | Microsoft Technology Licensing, Llc | Intrusion detection mechanism for security sensitive PCB components |
| CN115732999A (zh) * | 2022-11-01 | 2023-03-03 | 国网浙江省电力有限公司杭州市富阳区供电公司 | 一种usb接口提示牌及检测方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| IL215263A0 (en) | 2011-11-30 |
| IL215263A (en) | 2014-01-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2013042108A1 (fr) | Fiche de sécurité pour empêcher un accès à une prise usb et dispositif usb sécurisé | |
| US10460132B2 (en) | Security keys associated with identification of physical USB protection devices | |
| CN103109294B (zh) | 具有外围保护功能的计算机母板 | |
| US7877788B1 (en) | Method and apparatus for securing a peripheral data interface | |
| US8412865B2 (en) | Method, apparatus and system for authentication of external storage devices | |
| US20060268507A1 (en) | Computer input/output (I/O) connector assembly having a security circuit disposed therein | |
| EP2827279A1 (fr) | Dispositif de verrouillage d'USB électro-mécanique | |
| US11514196B2 (en) | Method and apparatus for a modular digital chassis lock assembly in an information handling system | |
| CN104484629A (zh) | 一种计算机启动方法及装置 | |
| RU2006116233A (ru) | Устройство защиты информации от несанкционированного доступа для компьютеров информационно-вычислительных систем | |
| US7409563B2 (en) | Method and apparatus for preventing un-authorized attachment of computer peripherals | |
| EP2695069B1 (fr) | Procédé et système pour bus usb avec une clé de contact cryptographique intégrée | |
| CN114556343B (zh) | 经由物理接口的基板管理控制器固件的安全安装 | |
| US8954624B2 (en) | Method and system for securing input from an external device to a host | |
| IL278132B (en) | Security plug for preventing access to a miniature usb socket | |
| TWI597619B (zh) | 抑制穿透攻擊之技術 | |
| US11475152B1 (en) | Systems and methods for securing stored computer files from modification with control circuit | |
| EP2892161B1 (fr) | Terminal mobile pourvu d'une fonction de sécurité | |
| KR101554625B1 (ko) | Usb 보안 시스템 및 보안 방법 | |
| CN107392067A (zh) | 防篡改盖 | |
| US20220108041A1 (en) | External secure and encrypted ssd device and a secure operating system on an external ssd device | |
| KR101914610B1 (ko) | 유에스비포트 보안장치 | |
| AU2011200015A1 (en) | An Internet Security Device | |
| KR200247675Y1 (ko) | 인터넷 침입차단용 서버 | |
| TWM462980U (zh) | Usb碟定位結構 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12784078 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23/07/2014) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12784078 Country of ref document: EP Kind code of ref document: A1 |