Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

USB security gateway

Inactive Publication Date: 2015-12-17
HIGH SEC LABS LTD
View PDF17 Cites 73 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patent describes a standalone device that can connect to multiple computers using a single keyboard and mouse. The device detects if the connections are proper and prevents any data from leaking between the computers. This makes it a secure way to switch between devices while using a single set of tools. Overall, the device provides improved functionality and security for connecting multiple computers.

Problems solved by technology

Computer networks in many organizations are continuously challenged by various security threats.
The popularity of the internet and the availability of portable mass-storage devices introduce severe internal and external threats to most organizations.
Defense and government organizations with higher security networks are forced to isolate their secure networks from other less secure networks thus creating a situation that a single organization or a single employee need to operate in several different isolated networks having different security levels.
Isolation between these networks is a key concern as a small leakage of data between two networks may cause catastrophic results to the organization involved.
In the past several years many of the traditional and new isolation methods became ineffective and therefore today the physical separation between networks is growing in popularity among high security organizations.
There are several disadvantages for equipping a user with multiple consoles: Desktop space required; Cost of peripherals; Security issues caused by user's confusion; Lack of unified working environment.
There are many information security risks in commercial KVMs and in the past few years these products are regarded as unsafe for high security networks.
Any computer data port, such as a USB port may become a data security risk as unauthorized mass storage device connected to an unprotected port may be used for importing sensitive information and later removing the device with the data for hostile use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB security gateway
  • USB security gateway
  • USB security gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024]Some exemplary embodiments of the current invention provide a stand alone unit that performs at least some of the functionality of dedicated peripheral port switching subsystem. Some exemplary embodiments of the current invention provide improved functionality of the dedicated peripheral port switching subsystem.

[0025]Some exemplary embodiments of the current invention provide improved functionality of the dedicated peripheral port switching subsystem.

[0026]Some exemplary embodiments of the current invention provides the functionality of the dedicated peripheral port switching subsystem in a stand alone unit or in a unit integrated within a host computer.

[0027]Some exemplary embodiments of the current invention add functionality missing in the prior art devices, for example (and not limited to):

[0028]1. Fixed dedicated peripheral filter—for example a USB security filter designed to enable only Human Interface Devices (HID Class USB).

[0029]2. Field updateable profiles used to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A USB gateway connected to a plurality of host computers having a USB device port connect to a peripheral device; and a security circuitry. The security circuitry comprises: a pre-qualification microcontroller; a mode select switch connected to the peripheral device port and selectively connecting it to one of: the pre-qualification microcontroller; or to a host selector switch that switches among the plurality of connected host computes. An enumeration and reset detector is connected to the USB peripheral device port to monitor that port and casing the mode select switch to switch back to the pre-qualification microcontroller when the peripheral device is disconnected or reset. The pre-qualification microcontroller is capable of enumerating a connected peripheral device and controlling the gateway according to a table containing lists of: device qualifications, indication of which device can connect to each host, and direction of data flow between host and device. The table of peripheral device qualifications may be field re-programmed.

Description

FIELD OF THE INVENTION[0001]The present invention relates to a Secure USB Gateway device capable of securely communicate with a plurality of USB peripheral devices and one or more host computers. More specifically the present invention relates to a device capable of enforcing a detailed USB peripherals security policy on connected computer.BACKGROUND OF THE INVENTION[0002]Computer networks in many organizations are continuously challenged by various security threats. The popularity of the internet and the availability of portable mass-storage devices introduce severe internal and external threats to most organizations. Defense and government organizations with higher security networks are forced to isolate their secure networks from other less secure networks thus creating a situation that a single organization or a single employee need to operate in several different isolated networks having different security levels. Isolation between these networks is a key concern as a small lea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3234G06F21/85G06F13/105G06F21/82G06F13/126
Inventor SOFFER, AVIV
Owner HIGH SEC LABS LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products