Patent classifications
G06F21/82
System and method for securely connecting to a peripheral device
A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.
Echo detection of Man-in-the-Middle LAN attacks
Systems and methods are provided for detecting anomalous messages on a multipoint serial communications bus by extracting features from a first and a second message, including a time delay between the first and the second messages and, for each message, a sender address, a recipient address, a bus number, and a word count. A message transition pattern including the extracted features is generated. A probability of occurrence of the message transition pattern is determined by comparing the message transition pattern to a pattern dictionary, and the second message is determined to be anomalous when the probability is less than a predetermined threshold.
END USER PRIVACY PROTECTION SYSTEM AND METHOD THEREOF
An end user privacy Protection system and method thereof is disclosed. Said system comprises of an Hardware Processing Unit (HPU) featuring a means to set the time duration to allow the application access to mobile phone hardware components, a comparator unit to read the remaining permitted time on a counter at any given time, wherein said comparator unit activates a driver unit to activate a set of electric/electronic switches or relays to disconnect said mobile phone hardware components when the permitted time duration set by the user expires. The system also features a means to bypass the access restriction at any moment. This security method is implementable to the all the computers, laptops, smart devices and wearable devices other than mobile phone irrespective of its operating system.
COMMUNICATION ASSET USAGE METRICS
Examples disclosed herein relate to tracking a usage metric for each of a plurality of communication assets, determining whether the usage metric fails to meet a threshold for each of the plurality of communication assets, and in response to determining that the usage metric fails to meet the threshold for at least one of the plurality of communication assets, causing the at least one of the plurality of communication assets to be disabled.
Secure device operating with a secure tamper resistant platform, corresponding system, method and computer program product
A secure device operating with a secure tamper-resistant platform including a tamper-resistant hardware platform and a virtual primary platform operating with a low level operating system performing an abstraction of resources of the hardware platform, and a secondary platform with a high level operating system providing a further abstraction of resources to applications in which respective internal hosts are embedded, the secure device including an internal host domain including the internal hosts, the secure device including a plurality of physical and/or logical input/output interfaces through which external hosts can access the internal hosts, the virtual primary platform being configured to set interactions between the external hosts and the internal hosts, wherein the internal host domain includes a further set of virtual hosts each configured to operate as a proxy between an input/output interface and an application, each input/output interface being configured to address only one among the virtual hosts.
Secure device operating with a secure tamper resistant platform, corresponding system, method and computer program product
A secure device operating with a secure tamper-resistant platform including a tamper-resistant hardware platform and a virtual primary platform operating with a low level operating system performing an abstraction of resources of the hardware platform, and a secondary platform with a high level operating system providing a further abstraction of resources to applications in which respective internal hosts are embedded, the secure device including an internal host domain including the internal hosts, the secure device including a plurality of physical and/or logical input/output interfaces through which external hosts can access the internal hosts, the virtual primary platform being configured to set interactions between the external hosts and the internal hosts, wherein the internal host domain includes a further set of virtual hosts each configured to operate as a proxy between an input/output interface and an application, each input/output interface being configured to address only one among the virtual hosts.
Technologies for establishing secure channel between I/O subsystem and trusted application for secure I/O data transfer
Technologies for secure I/O data transfer includes a compute device, which includes a processor to execute a trusted application, an input/output (I/O) device, and an I/O subsystem. The I/O subsystem is configured to establish a secured channel between the I/O subsystem and a trusted application running on the compute device, and receive, in response to an establishment of the secured channel, I/O data from the I/O device via an unsecured channel. The I/O subsystem is further configured to encrypt, in response to a receipt of the I/O data, the I/O data using a security key associated with the trusted application that is to process the I/O data and transmit the encrypted I/O data to the trusted application via the secured channel, wherein the secured channel has a data transfer rate that is higher than a data transfer rate of the unsecured channel between the I/O device and the I/O subsystem.
Systems and Methods for Control System Security
A component security device may be disposed at an interface between a component and a cyber-physical system. The disclosed component security device may be physically and/or electrically coupled between the component and infrastructure of the cyber-physical system, such as a backplane, bus, and/or the like. The component security device may be configured to monitor the component, and selectively isolate the component from the cyber-physical system. Since the component security device is interposed at the interface of the component, the component security device may be capable of isolating the component regardless of whether the component has been compromised (e.g., regardless of whether the component is capable of complying with system commands).
Systems and Methods for Control System Security
A component security device may be disposed at an interface between a component and a cyber-physical system. The disclosed component security device may be physically and/or electrically coupled between the component and infrastructure of the cyber-physical system, such as a backplane, bus, and/or the like. The component security device may be configured to monitor the component, and selectively isolate the component from the cyber-physical system. Since the component security device is interposed at the interface of the component, the component security device may be capable of isolating the component regardless of whether the component has been compromised (e.g., regardless of whether the component is capable of complying with system commands).
SECURE USER INTERFACE SIDE-CHANNEL ATTACK PROTECTION
A method for providing a secure user interface on a computing device comprising: receiving, from a user application, a request to utilise a secure user interface on the computing device; obtaining, by a first countermeasure module, first information associated with a security context of the computing device; generating, by the first countermeasure module, a first security assessment based on analysis of the first information; determining, by a security determination module, whether to permit the request to utilise the secure user interface based on the first security assessment; and responsive to a positive determination, enabling access by the user application to the secure user interface.