TW200834374A - Method, apparatus and system for authentication of external storage devices - Google Patents

Method, apparatus and system for authentication of external storage devices Download PDF

Info

Publication number
TW200834374A
TW200834374A TW096137224A TW96137224A TW200834374A TW 200834374 A TW200834374 A TW 200834374A TW 096137224 A TW096137224 A TW 096137224A TW 96137224 A TW96137224 A TW 96137224A TW 200834374 A TW200834374 A TW 200834374A
Authority
TW
Taiwan
Prior art keywords
storage device
external storage
authentication
host computer
application
Prior art date
Application number
TW096137224A
Other languages
English (en)
Other versions
TWI389006B (zh
Inventor
Teng Pin Poo
Henry Tan
Original Assignee
Trek 2000 Int Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trek 2000 Int Ltd filed Critical Trek 2000 Int Ltd
Publication of TW200834374A publication Critical patent/TW200834374A/zh
Application granted granted Critical
Publication of TWI389006B publication Critical patent/TWI389006B/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/043Masking or blinding of tables, e.g. lookup, substitution or mapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Description

200834374 九、發明說明: 【發明所屬之技術領域】 本發明係關於外部儲存裝置之認證的方法、設備及系 統’特別關於但不限於防止未經授權而於_主機電腦使用 外部儲存裝置之方法、設備及系統。 【先前技術】 目削市面上有多種外部儲存裝置。該等裝置包含如硬碟 =等運用光學技術之儲存裝置’以及包含通料列匯流排 少、,Universal Serial Bus)快閃磁碟機等運用快閃技 術^諸存裝置。而有多種標準介面可用以將該等裝置連接 々故屯月包,包含USB、火線(Firewire)與PCMCIA介 不限於以上所述。此外,亦存在其他專屬介面, 口記憶棒」(memory stick)介面、安全數位卡(sd⑶汍 ecure Digital card)介面等。 =於下載速度快且儲存裝置之體積越來越小,對於公司 ’於安全性與機密性方面便出現了嚴重的威脅。該等 脅包含未經授權而複製具敏感性或機密性之資訊,以及 i傳,含病,等惡意或破壞力強大之應用程式等。舉例而 、二司的員工可輕易攜帶小型的USB快閃磁碟機而隱匿 =被祭覺。接著該磁韻可插人公司的任何電腦上的USB ,埠,下載並儲存具敏感性或機密性之資料及/或上傳 明從而迴避了所有的病毒過濾機制。除非封鎖、實體 :閉=有的外部介面或使使用者無法自公司的電腦系統 載貧料或將資料上傳,否則公司根本無法控制此種情 31_發明說明書_:)/97挪96137224 200834374 形。然對於獲得授權可執行上述操作者而言’此種作法將 造成極大的限制。 ^ 【發明内容】 依據一較佳態樣,本發明提供一種外部儲存裝置之認證 的方法,該外部儲存裝置係以可操作之方式與一主機電腦 之連接埠相連接,該方法包含:該主機電腦與該外部儲存 裝置執行一交握程序,以自該外部儲存裝置尋找一認證金 鑰;若該認證金鑰為至少一選自錯誤以及未於一預先決定 _之時間内提供之情形,則中斷該外部儲存裝置與該主機電 腦之電氣連接;以及若該認證金鑰正確且於該預先決定之 時間内提供,則允許該外部儲存裝置對於該主機電腦之存 取。 依據一第二較佳態樣,本發明提供一種外部儲存裝置, 可藉由該外部儲存裝置之連接器與一主機電腦之連接埠 以可操作之方式相連接,該外部儲存裝置包含一認證模 鲁組,該認證模組經設計以與該主機電腦之一認證應用程式 進行通訊,該認證模組亦經設計而包含一認證金鑰,該認 證金錄係用以傳送至該認證應用程式,以針對該外部儲存 裝置進行認證。 v 依據一第三較佳態樣,本發明提供一種外部儲存裝置之 認證的系統,可藉由該外部儲存裝置之連接器與一主機電 腦之連接埠以可操作之方式相連接,其中該外部儲存裝置 包含一認證模組,該認證模組係用以與該主機電腦之一認 證應用程式進行通訊,該認證模組包含一認證金鑰,而該 312XP/發明說明書(補件)/97-01/96137224 7 200834374 金鎗係用以傳送至該認證應用程式,以 存裝置進行認證。 +该外部儲 對於所有的·4樣,正確的認 維護。而該查詢查珣表中加以 之一網路贿k ^主機電腦以及該主機電腦所連接 選自ϋ 中加以維護。該認證金鑰係由至少— :疋使用者、一特定主機電腦以及該 :之一,網路終端機所限制。該特定使用者可以使: :入:_ ’該特定主機電腦可以主機電 斷。該使用^ 端機可以網路終端機識別資料判 別貧料可儲存於該查詢表中。 、鸲枝减 程腦之存取可限於該主機電腦之特定應用 斜上J貝料’而該等限制係於該查詢表中加以維護。 箄PF=路之存取可限於特定應用程式或特定資料,而該 專限制係於該㈣表巾加以維護。 •涊d金鑰+可分配予一未具有該認證金鑰之外部儲存裝 置士而其係藉由詢問是否需要該認證金鑰、於該預先決定 之時間内接收—肯定之回應時檢查該外部儲存裝置、以及 ^亥外部健存裝置通過檢查時將該認證金鑰分配予該外 =儲存裝置。而對於該外部儲存裝置之檢查可包含至β少一 ,1外部儲存裝置之識別資料、使用者之識別資料、主機 电腦之識別資料、網路終端機之識別資料、以及病毒或其 他惡意之應用程式或資料之掃瞄。 該認證模組可於該認證金鑰被傳送至該外部儲存裝置 312ΧΡ/發明說明書(補件)/97-01/96137224 8 200834374 前下载至該外部儲存裝置。 若回應為否定或未於該預先決定之 斷該外部儲存#罟盥兮士德士 】内美供’則可中 减仔衣置與该主機電腦之電氣連接。 【貫施方式】 首先請參閱圖!所示,其 電腦1〇。雷腦連接至£域網路12之 电知10具有數個連接埠14,佯如I丨 儲存裝詈1R梦ala USB快閃記憶 诫仔衣置16 4外部儲存裝置連 置16,可自雷腦m 由外部儲存裝 ^ 目月〇及/或網路12下载資料,以十
將資料上傳至電腦10及/ θ S 存裝置16具有一連接哭Μ裕以如圖所不’外部儲 接哭。m2 接益18,而於本例中,其為一哪連 ,但该連接器可為任何適合之連接器,可與 '妾埠14以可進行操作之方式相連接即可。一 於圖2中,外部儲存裝置⑺係 裝置16具有一連接哭入;〇Λ 万式壬現。 單元可或一連接TO;丨面20以及儲存單元22。該儲存 為一硬碟、快閃記憶體或其他所需或所欲採用者 儲存單元22係由一μ左⑽_ , "而飞尸/Γ奴知用者。 糸由储存早兀控制器26所控制。一; 器24係控制裝置16之所古.軍此 斤径钔裰處理 m1R ▲ 所有運作。一認證模組28則用以 Γ4中模組⑼可為_、可包含於微處理器 芝°位於一與微處理器24分離之處理器中。 ^腦10包含一控制器I#㈣^ 3 應用程式32,告遠桩哭10 且 接迫w 士士田連接18以可進行操作之方式插入一連 守’認證應用程4 32可與認證模組28進行 =若存取未經紐,_程式Μ將關任何 操作之方式與連接埠14中之任一相連接之外部儲存= 312ΧΡ/發明說明書(補件)/97-01/96137224 g 200834374 i6過對1 電们G之系統及/或網路12的存取;若存取已 通過吻祖,則應用程式3 已 式與連接埠U中之丄二何以可進行操作之方 …二=二接二外部儲存川^ 入碼限於特定之n = 證之通過可藉由登 之電腦。 及"猎由電腦識別資料限於特定 於衣置16以可進行操作之方式盥電腦丨n 4 * 證之進行可#由|锸m ^飞/、包細10相連接時,認 丁了错由數種不同的方式。裝置16可能於 通過認證,於此種情形將依#别已 當裝置16以可進行操作之方二電 認證,認證之結果可決定』使用=始進行 流程示於圖5。 之後鎮使用情形。此 無:針者产否為特定之使用者及,或電腦, 權限之管理者執行,而為由一具有職責與 16與電腦1D及/或網路12進行功能方面2 對於非由渠等配發,但可加以認證 ▲ :對圖5之具體例,所有後續之認證動 動=)4二=二’二證r式⑽自 .^ τ執仃,除前述之營 L:使用者:無法對之進行存取。如此使用者無法影 曰、干板、妨礙或迴避應用程式3 2 $、s ly -般於電腦!〇上執行之其他「\:運:。此種作法與 文全化」應用程式所採用 312XP/發明說明書(補件)/97-01/96137224 1〇 200834374 之作法相同。應用程式32包含一監控模組34,其監控連 接埠14以偵测一外部儲存裝置16與連接埠14之任一相 連接的情形(4 0 2)。此運作可藉由如定時探詢連接埠 14(403)等方式完成。若未偵測到裝置之插入(404),則繼 續探詢的動作。若偵測到一裝置16插入一連接埠 14(405),接著應用程式32將藉由執行查問與回應程序, 嘗試與裝置16建立認證交握(406)。若裝置16於電腦10 開機前便插入於連接埠14中,所依循之流程仍然相同, 參儲存裝置16對於電腦10之系統及/或網路12之存取將 遭到拒絕直到通過認證為止。 於認證程序(406)中,應用程式32呼叫裝置16要求其 提供一認證碼或認證金鑰。若認證模組28提供了認證碼 或認證金鑰(407),則應用程式32檢查一目前認證碼或認 證金鑰之查詢表,以判斷該認證碼或認證金鑰是否列於其 上(408)。若存在相符者(409),則可允許裝置16存取電 $腦10及/或網路12(410)。上述查詢表亦可包含限制 (411)。舉例而言,裝置16之認證金鑰或認證碼可與一特 定個人及/或電腦10相關連。上述關連性可藉由參照使 用者登入碼、電腦10及/或其所連接之網路12之終端機 的識別資料加以檢查。而上述存取可限於電腦10及/或 網路12之特定應用程式及/或資料。若存在限制,則應 用程式32將檢查查詢表以確保符合限制之要求(412)。 若於(407)該認證模組28於交握程序中無法正確地回 應應用程式32、於(40 9)未存在相符者或於(412)不符合 312XP/發明說明書(補件)/97-01/96137224 11 200834374 =,:::應用程式32將立即中斷裝置16與電腦ι〇 二,接或將之隔離,以避免裝置16存取電腦1〇之系 、、、 /或網路12(413)。但於此同時,穿晉 於連接埠14中。 衣置16可仍插入 上於圖5之具體例中,可於認證之流程中對裝置^予以 =可。此,針對類似之流程將使用類似之元件符號,僅其 子首之數字由4改成5。 動=地’當電腦10開機時’認證應用程式32將自動啟 動(501)。該程式於電腦1〇中執行,除前述之管理者 2使时並無法狀進行存取。如此使用者無法影響、 干k、妨礙或迴避應用程式32之運作。此種作法盘 於電腦10上執行之其他「安全化」應用程式所採用之作又 法相R。同樣地,應用程式32包含監控模組34,其監控 連接埠14以偵測一外部儲存裝置16與連接埠14之:二 相連接的情形(5G2)。此運作可藉由如定時探詢連 14(503)等方式完成。若未偵測到裝置之插入(5〇4),則 續探詢的動作。若偵測到一裝置16插入一連接埠 14(505),接著應用程式32將藉由執行查問與回應程序, 嘗試與裝置16建立認證交握(506)。若裝置16於電腦1〇 開機前已插人於連接埠14 +,所依循之流程仍然相同, 儲存裝置16對於電腦10之系統及/或網路12之存取 遭到拒絕直到通過認證為止。 ; 於認證程序(506)中,應用程式32呼叫裝置16要求其 提供一認證碼或認證金鑰。若認證模組28提供了認磴^ 馬 312ΧΡ/發明說明書(補件)/97-01/96137224 12 200834374 2證切(507),職隸式32檢查-目前認證碼或認 證金鑰之查詢表,以判斷該認證碼或認證金鑰是否列於其 上(508)。若存在相符者(5〇9),則可允許裝置a存取電 腦1〇及/或網路12(51〇)。上述查詢表亦可包含限制 )*例而5 ’裝置16之認證金鑰或認證碼可與一特 疋们人及/或電腦丨〇相關連。上述關連性可藉由參照使 用者登=碼、電腦U及/或其所連接之網路12之終職 的識別貧料加以檢查。而上述存取可限於電腦W及/或 網路12之衫應用程式及,或資料。若存在限制,則應 用程式32將檢查查詢表以確保符合限制之要求。 若由於裝置16先前未經認可,認證模組28於(5〇7)交 f程序中無法正確地回應應用程< 32,則可進行認證: 序’由應用程式32對裝置16提出關(514)。上述 將顯不於-顯示幕上,且要求使用者輸入資料。若於一預 先決定之時間如讲秒内無回應或回應為否^,則應 32將立即中斷裝置16與電腦1()之電氣連接或將之隔離, 以避免裝置16存取電腦1〇之系統及,或 但=此同時,裝置16可仍插入於連接埠14中。 右於(514)於該預先決定之時間内有回應且為肯定 應用程式32即對裝置16進行檢查。此檢查可包含檢_ 置、使用者、電腦與網路終端機之識別 ^ 項,以及病毒或其他惡意之應用程式或資料 = 一金鑰分配予裝置i6,並將該: …己錄於查询表中。而針對使用者及/或電腦/終端機之 312XP/發明說明書(補件)/97·〇1/96137224 13 200834374 任何限制可於此時產生並附加於查詢表中 必要之模組28,接著便將之下载至裝置16。^ =載 式32將金鑰傳送至裝置16以 /壬 Γ /中。攸 所產生之限制的範圍内即可對恭f« If) 及/或網路12進行存取。 P 了對电恥10 :於(5G9)未有相符者或於⑸2)不符 :用程式32將立即中斷裝置16與電腦】之:求』 將之隔離,以避免裳置16存 接f 似5⑻。但於此同時, ϋ之系統及/或網路 卜、十.在a生J 了衣置16可仍插入於連接埠14中。 处—询表謂存於電腦1G t並 若電腦10與網路12相、康aif . ^ ^ 考力以、准濩。 伺服哭中n ,則查珣表以儲存於網路12之 ,,亦由管理者加以維護。然而,無論電腦 疋否與網路12相連,鹿用寇彳q 9 於前述之說明中雖已;=白存在於電腦10中。 說,但習於所、/二 發明之較佳具體例加以解 本發明之情形下,可斜士饮 白應㈣’於未偏離 面進行諸多變I。了對本發明之設計、建構及/或操作方 【圖式簡單說明】 例===瞭解且易於實施,將_ 例,其中? 限制性之範例說明本發明之較佳具體 體^明之—具體例之外部館存裝置將用於一具 肢例之主機電腦之立體圖; 圖2為圖1之外部儲存裴置之方塊圖; 312XP/發明說明書(補件)/97·〇聰 14 200834374 圖3為圖1之主機電腦之局部方塊圖; 圖4為本發明之一具體例之流程圖;以 圖5為本發明之另一具體例之流程圖。 【主要元件符號說明】 10 電腦 12 網路 14 連接埠 16 外部儲存裝置 18 連接器 20 連接器介面 22 儲存單元 24 微處理器 26 儲存單元控制器 28 認證模組 30 控制器 32 認證應用程式 34 監控模組 312XP/發明說明書(補件)/97-01/96137224 15

Claims (1)

  1. 200834374 十、申請專利範圍·· 1· 一種外部儲存裝置之認證 以可操作之方式與一主機電腦 含: 的方法,該外部儲存裝置係 之連接埠相連接,該方法包 該主機電腦與該外部儲存 ^ (handshake)以自該外部儲存枣:二<丁 一父握程序 若該認證金錄為至少一選二:找一認證金餘; 之時間内提供之情形,則中斷^缺以及未於一預先決定 腦之電氣連接^及㈣外部儲存裝置與該主機電 若該認證金鍮正確且於該預先決定之時_提供,則允 許5亥外部儲存n料魅機t腦之麵。 範圍第1項之外部儲存裝置之認證的方 3 :、之:證金鑰係於一查詢表中加以維護。 3·如申明專利範圍第2項之外i 、$ # tb ^ ^ ^ ^ 又外邛储存裝置之認證的方 /,,、中忒查珣表係於該主機電 -網路伺服器之-中加以維自及❹機電腦所連接之 法4:中申範圍,2項之外部儲存裝置之認證的方 法Ί亥㈣金鑰係由至少一選自一特定使用者、一特 戶電腦以及該主機電腦所連接之—特定網路終端機 5·:申广專利範圍第4項之外部館存裝置之認證的方 2其!:仙使用者登人碼判斷該特定使用者,以主機電 所該特定主機電腦’以及以網路終端機識別 貧料判断之該特定網路終端機。 312ΧΡ/發明說明書(補件)/97-01/96137224 16 200834374 法外部館存裝置之認證的方 機識別資料係儲存:該杳詢1機广^ 7.如申請專利範圍第 之認證的方法,其中對^^=任—項之外部储存裝置 電腦之特定應用程式或特定資子::限於該主機 表申加以維護。 、 ^等、制係於該查詢 8·如申睛專利範圍第 之認證的方法,㈠你兮1中任_項之夕卜部儲存褒置 式或特定資料/而tr 之存取係限於特定應用程 制係於該查詢表中加以維護。 之簡的方法:圍第1至6項中任-項之外部儲存裝置 乙⑽也的方法,進_步包紙 咕甘衣罝 認證金鑰之該外部儲存襄置,而未具有該 認證金鑰’於該預先決定之 :一; 查該外部館存裝置,以及於該外,壯月疋之回應時檢 將該認證金鑰分配予該外部儲存裝置。子衣置通過檢查時, ίο·如申請專利範圍第9項之外 法,對於該外部儲存裝置之檢 ::::賴的二 裝置之識別資料、使广邊自外部儲存 料、網路終端機之識別資料=二主:電腦之識別資 程式或資料之掃瞄。 /督或其他惡意之應用 U·如申請專利範圍第9項之外部館 法,其令於該認證金餘被傳 衣置之适过的方 證模組被預先下載至;储存裝置前,-- 312XP/發明說明書贿牛)/97·㈣6137224 厂 200834374 12.如申請專利範圍第9項之外部館存裝置之認證的方 内^一/包含於該回應為否定或未於該預先決定之時間 接。…、T巾斷該外部館存裝置與該主機電腦之電氣連 法'W/t專利㈣第9項之外部儲存裝置之認證的方 彳/、中"亥認證金鑰係由一管理者所分配。 接哭盘儲存農置’其可藉由該外部儲存裝置之連 ^與:主機電腦之連接埠以可操作之方式相連接,其中 ;主=存裝置包含一認證模組,該認證模組經設計以盥 ,—認證應用程式進行通訊,該認證模組亦經 t而包含一認證金鑰,而該認證金餘係用以傳送至,切 證應用程式以針對該外部儲存裝置進行認證。— :5·如中請專利範圍帛14項之外部儲存裝置, 1證應用載至少㈣證偷與該贿金鍮之一 證全::Λ專利範圍第14項之外部儲存裝置’其中該認 μ餘係由至少—選自—特线用者、—特定主機 及该主機電腦所連接之一特定網路終端機所限制。包 蚀1田7·土如中請專利範圍第16項之外部儲存裝置,其中係以 使用者登入碼判斷該特定使用者,以主機電腦 ,該特定主機電腦,以及以網路終端機識別資料二奸 定網路終端機。 t列峤該斗寸 18·—種外部儲存裝置之認證的系統,其可 =裝置之連接ϋ與-线電腦之連接埠 ^ = 式相連接’其t該外部儲存裝置包含1證模組 312XP/發明說明書(補件)/97-01/96137224 18 200834374 模組係用以與該主機電滕之一認證應用 認證模組亦包含―認證:進订通訊,該 ,該認證應用程式以 二=金输係用以傳送至 19.如申請專利範圍第進行認證。 系統,其t該主機€腦*、卜錢存裝置之認證的 序,以自該外部儲存裝置衣置執仃-交握程 20.如申請專利/圍第Γ忍證金鎗。 糸統,其中正確之認證金鑰 子衣置之-祖的 該查詢表係於診拿撼帝;一"旬表中加以維護,而 路飼服器之加以維以及該主機電腦所連接之一網 …之外部儲存裝置之認證的 /、甲邊6忍證金鑰係由至 :二,以及該主機電腦所連接之:特:者㈣ 系=圍者=,儲存裝置之· 電腦識別資料判斷外馬判斷5亥特定使用者,以主機 別資料判斷該電腦,以及以網路終端機識 23·如申請專利範圍 系統,其中該使用者登入二 =部儲存裝置之認證的 網路終端機識別資料係=::亥主機電腦識別資料以及該 ?4 Λ 储存於該查詢表中。 .如申S月專利範圍第 裝置之認證的系統,1中至23項中任一項之外部儲存 主機電腦之特定應主機電腦之存取係限於該 飞或4寸疋貧料,而該等限制係於該 3聽潑明說明書(補件)/97·_6 19 200834374 查詢表中加以維護。 25. 如申請專利範圍第20至23項中任一項之外部儲存 裝置之認證的系統,其中對於該網路之存取係限於特定應 用程式或特定資料,而該等限制係於該查詢表中加以維 護。 26. 如申請專利範圍第20至23項中任一項之外部儲存 裝置之認證的系統,其中該認證金鑰係由一管理者所分 配。
    312XP/發明說明書(補件)/97-01/96137224 20
TW096137224A 2006-10-04 2007-10-04 外部儲存裝置之認證的方法、設備及系統 TWI389006B (zh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2006/000296 WO2008041950A2 (en) 2006-10-04 2006-10-04 Method, apparatus and system for authentication of external storage devices

Publications (2)

Publication Number Publication Date
TW200834374A true TW200834374A (en) 2008-08-16
TWI389006B TWI389006B (zh) 2013-03-11

Family

ID=39268917

Family Applications (1)

Application Number Title Priority Date Filing Date
TW096137224A TWI389006B (zh) 2006-10-04 2007-10-04 外部儲存裝置之認證的方法、設備及系統

Country Status (8)

Country Link
US (1) US8412865B2 (zh)
EP (1) EP2080100A4 (zh)
JP (1) JP5087088B2 (zh)
KR (1) KR101052128B1 (zh)
CN (1) CN101542452B (zh)
SG (1) SG176471A1 (zh)
TW (1) TWI389006B (zh)
WO (1) WO2008041950A2 (zh)

Families Citing this family (178)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9106694B2 (en) 2004-04-01 2015-08-11 Fireeye, Inc. Electronic message analysis for malware detection
US8881282B1 (en) 2004-04-01 2014-11-04 Fireeye, Inc. Systems and methods for malware attack detection and identification
US7587537B1 (en) 2007-11-30 2009-09-08 Altera Corporation Serializer-deserializer circuits formed from input-output circuit registers
US8898788B1 (en) 2004-04-01 2014-11-25 Fireeye, Inc. Systems and methods for malware attack prevention
US8171553B2 (en) 2004-04-01 2012-05-01 Fireeye, Inc. Heuristic based capture with replay to virtual machine
US8528086B1 (en) 2004-04-01 2013-09-03 Fireeye, Inc. System and method of detecting computer worms
US8793787B2 (en) 2004-04-01 2014-07-29 Fireeye, Inc. Detecting malicious network content using virtual environment components
US9027135B1 (en) 2004-04-01 2015-05-05 Fireeye, Inc. Prospective client identification using malware attack detection
US8584239B2 (en) 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
US8566946B1 (en) 2006-04-20 2013-10-22 Fireeye, Inc. Malware containment on connection
US8549638B2 (en) 2004-06-14 2013-10-01 Fireeye, Inc. System and method of containing computer worms
US20100011442A1 (en) * 2008-07-09 2010-01-14 Sumwintek Corp. Data security device for preventing the spreading of malware
US8997219B2 (en) 2008-11-03 2015-03-31 Fireeye, Inc. Systems and methods for detecting malicious PDF network content
US8850571B2 (en) 2008-11-03 2014-09-30 Fireeye, Inc. Systems and methods for detecting malicious network content
KR101129380B1 (ko) * 2008-12-01 2012-03-27 한국전자통신연구원 외부 저장장치로부터 컨텐츠를 제공받는 디지털 컨텐츠 제공 장치 및 그 방법
US8943409B2 (en) * 2008-12-26 2015-01-27 Sandisk Il Ltd. Storage device managing playable content
US20100169395A1 (en) * 2008-12-26 2010-07-01 Sandisk Il Ltd. Device and method for filtering a file system
US8166067B2 (en) * 2008-12-26 2012-04-24 Sandisk Il Ltd. Method and apparatus for providing access to files based on user identity
US8239395B2 (en) * 2008-12-26 2012-08-07 Sandisk Il Ltd. Storage device presenting to hosts only files compatible with a defined host capability
DE102009036863A1 (de) * 2009-08-10 2011-02-17 Bizerba Gmbh & Co Kg Verfahren zum Betrieb eines Messgeräts
US8832829B2 (en) 2009-09-30 2014-09-09 Fireeye, Inc. Network-based binary file extraction and analysis for malware detection
US8561207B2 (en) * 2010-08-20 2013-10-15 Apple Inc. Authenticating a multiple interface device on an enumerated bus
US9519782B2 (en) * 2012-02-24 2016-12-13 Fireeye, Inc. Detecting malicious network content
US8641545B2 (en) * 2012-03-06 2014-02-04 Brunswick Bowling & Billiards Corporation Distributed scoring system
US10572665B2 (en) 2012-12-28 2020-02-25 Fireeye, Inc. System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
US9176843B1 (en) 2013-02-23 2015-11-03 Fireeye, Inc. Framework for efficient security coverage of mobile software applications
US9367681B1 (en) 2013-02-23 2016-06-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9009823B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications installed on mobile devices
US8990944B1 (en) 2013-02-23 2015-03-24 Fireeye, Inc. Systems and methods for automatically detecting backdoors
US9009822B1 (en) 2013-02-23 2015-04-14 Fireeye, Inc. Framework for multi-phase analysis of mobile applications
US9824209B1 (en) 2013-02-23 2017-11-21 Fireeye, Inc. Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
US9159035B1 (en) 2013-02-23 2015-10-13 Fireeye, Inc. Framework for computer application analysis of sensitive information tracking
US9195829B1 (en) 2013-02-23 2015-11-24 Fireeye, Inc. User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9626509B1 (en) 2013-03-13 2017-04-18 Fireeye, Inc. Malicious content analysis with multi-version application support within single operating environment
US9565202B1 (en) 2013-03-13 2017-02-07 Fireeye, Inc. System and method for detecting exfiltration content
US9104867B1 (en) 2013-03-13 2015-08-11 Fireeye, Inc. Malicious content analysis using simulated user interaction without user involvement
US9355247B1 (en) 2013-03-13 2016-05-31 Fireeye, Inc. File extraction from memory dump for malicious content analysis
US9430646B1 (en) 2013-03-14 2016-08-30 Fireeye, Inc. Distributed systems and methods for automatically detecting unknown bots and botnets
US9311479B1 (en) 2013-03-14 2016-04-12 Fireeye, Inc. Correlation and consolidation of analytic data for holistic view of a malware attack
US9251343B1 (en) 2013-03-15 2016-02-02 Fireeye, Inc. Detecting bootkits resident on compromised computers
US10713358B2 (en) 2013-03-15 2020-07-14 Fireeye, Inc. System and method to extract and utilize disassembly features to classify software intent
WO2014145805A1 (en) 2013-03-15 2014-09-18 Mandiant, Llc System and method employing structured intelligence to verify and contain threats at endpoints
US9495180B2 (en) 2013-05-10 2016-11-15 Fireeye, Inc. Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en) 2013-05-13 2017-04-25 Fireeye, Inc. Classifying sets of malicious indicators for detecting command and control communications associated with malware
US9536091B2 (en) 2013-06-24 2017-01-03 Fireeye, Inc. System and method for detecting time-bomb malware
US10133863B2 (en) 2013-06-24 2018-11-20 Fireeye, Inc. Zero-day discovery system
US9888016B1 (en) 2013-06-28 2018-02-06 Fireeye, Inc. System and method for detecting phishing using password prediction
US9300686B2 (en) 2013-06-28 2016-03-29 Fireeye, Inc. System and method for detecting malicious links in electronic messages
US9736179B2 (en) 2013-09-30 2017-08-15 Fireeye, Inc. System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9628507B2 (en) 2013-09-30 2017-04-18 Fireeye, Inc. Advanced persistent threat (APT) detection center
US9294501B2 (en) 2013-09-30 2016-03-22 Fireeye, Inc. Fuzzy hash of behavioral results
US9690936B1 (en) 2013-09-30 2017-06-27 Fireeye, Inc. Multistage system and method for analyzing obfuscated content for malware
US10089461B1 (en) 2013-09-30 2018-10-02 Fireeye, Inc. Page replacement code injection
US10192052B1 (en) 2013-09-30 2019-01-29 Fireeye, Inc. System, apparatus and method for classifying a file as malicious using static scanning
US10515214B1 (en) 2013-09-30 2019-12-24 Fireeye, Inc. System and method for classifying malware within content created during analysis of a specimen
US9171160B2 (en) 2013-09-30 2015-10-27 Fireeye, Inc. Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9921978B1 (en) 2013-11-08 2018-03-20 Fireeye, Inc. System and method for enhanced security of storage devices
US9189627B1 (en) 2013-11-21 2015-11-17 Fireeye, Inc. System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
JP6273800B2 (ja) 2013-11-29 2018-02-07 株式会社リコー 画像投影装置、画像投影システム及びプログラム
US9756074B2 (en) 2013-12-26 2017-09-05 Fireeye, Inc. System and method for IPS and VM-based detection of suspicious objects
US9747446B1 (en) 2013-12-26 2017-08-29 Fireeye, Inc. System and method for run-time object classification
US9292686B2 (en) 2014-01-16 2016-03-22 Fireeye, Inc. Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
US9262635B2 (en) 2014-02-05 2016-02-16 Fireeye, Inc. Detection efficacy of virtual machine-based analysis with application specific events
US9241010B1 (en) 2014-03-20 2016-01-19 Fireeye, Inc. System and method for network behavior detection
US10242185B1 (en) 2014-03-21 2019-03-26 Fireeye, Inc. Dynamic guest image creation and rollback
US9591015B1 (en) 2014-03-28 2017-03-07 Fireeye, Inc. System and method for offloading packet processing and static analysis operations
US9223972B1 (en) 2014-03-31 2015-12-29 Fireeye, Inc. Dynamically remote tuning of a malware content detection system
US9432389B1 (en) 2014-03-31 2016-08-30 Fireeye, Inc. System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9973531B1 (en) 2014-06-06 2018-05-15 Fireeye, Inc. Shellcode detection
US9438623B1 (en) 2014-06-06 2016-09-06 Fireeye, Inc. Computer exploit detection using heap spray pattern matching
US9594912B1 (en) 2014-06-06 2017-03-14 Fireeye, Inc. Return-oriented programming detection
US10084813B2 (en) 2014-06-24 2018-09-25 Fireeye, Inc. Intrusion prevention and remedy system
US10805340B1 (en) 2014-06-26 2020-10-13 Fireeye, Inc. Infection vector and malware tracking with an interactive user display
US9398028B1 (en) 2014-06-26 2016-07-19 Fireeye, Inc. System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US10002252B2 (en) 2014-07-01 2018-06-19 Fireeye, Inc. Verification of trusted threat-aware microvisor
US9363280B1 (en) 2014-08-22 2016-06-07 Fireeye, Inc. System and method of detecting delivery of malware using cross-customer data
US10671726B1 (en) 2014-09-22 2020-06-02 Fireeye Inc. System and method for malware analysis using thread-level event monitoring
US10027689B1 (en) 2014-09-29 2018-07-17 Fireeye, Inc. Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9773112B1 (en) 2014-09-29 2017-09-26 Fireeye, Inc. Exploit detection of malware and malware families
US9690933B1 (en) 2014-12-22 2017-06-27 Fireeye, Inc. Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en) 2014-12-26 2018-09-11 Fireeye, Inc. Zero-day rotating guest image profile
US9934376B1 (en) 2014-12-29 2018-04-03 Fireeye, Inc. Malware detection appliance architecture
US9838417B1 (en) 2014-12-30 2017-12-05 Fireeye, Inc. Intelligent context aware user interaction for malware detection
US9690606B1 (en) 2015-03-25 2017-06-27 Fireeye, Inc. Selective system call monitoring
US10148693B2 (en) 2015-03-25 2018-12-04 Fireeye, Inc. Exploit detection system
US9438613B1 (en) 2015-03-30 2016-09-06 Fireeye, Inc. Dynamic content activation for automated analysis of embedded objects
US9483644B1 (en) 2015-03-31 2016-11-01 Fireeye, Inc. Methods for detecting file altering malware in VM based analysis
US10417031B2 (en) 2015-03-31 2019-09-17 Fireeye, Inc. Selective virtualization for security threat detection
US10474813B1 (en) 2015-03-31 2019-11-12 Fireeye, Inc. Code injection technique for remediation at an endpoint of a network
US9654485B1 (en) 2015-04-13 2017-05-16 Fireeye, Inc. Analytics-based security monitoring system and method
US9594904B1 (en) 2015-04-23 2017-03-14 Fireeye, Inc. Detecting malware based on reflection
US10726127B1 (en) 2015-06-30 2020-07-28 Fireeye, Inc. System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10642753B1 (en) 2015-06-30 2020-05-05 Fireeye, Inc. System and method for protecting a software component running in virtual machine using a virtualization layer
US11113086B1 (en) 2015-06-30 2021-09-07 Fireeye, Inc. Virtual system and method for securing external network connectivity
US10454950B1 (en) 2015-06-30 2019-10-22 Fireeye, Inc. Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10715542B1 (en) 2015-08-14 2020-07-14 Fireeye, Inc. Mobile application risk analysis
US10176321B2 (en) 2015-09-22 2019-01-08 Fireeye, Inc. Leveraging behavior-based rules for malware family classification
US10033747B1 (en) 2015-09-29 2018-07-24 Fireeye, Inc. System and method for detecting interpreter-based exploit attacks
US10210329B1 (en) 2015-09-30 2019-02-19 Fireeye, Inc. Method to detect application execution hijacking using memory protection
US10601865B1 (en) 2015-09-30 2020-03-24 Fireeye, Inc. Detection of credential spearphishing attacks using email analysis
US10706149B1 (en) 2015-09-30 2020-07-07 Fireeye, Inc. Detecting delayed activation malware using a primary controller and plural time controllers
US10817606B1 (en) 2015-09-30 2020-10-27 Fireeye, Inc. Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
US9825989B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Cyber attack early warning system
US9825976B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Detection and classification of exploit kits
US10284575B2 (en) 2015-11-10 2019-05-07 Fireeye, Inc. Launcher for setting analysis environment variations for malware detection
US10846117B1 (en) 2015-12-10 2020-11-24 Fireeye, Inc. Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10447728B1 (en) 2015-12-10 2019-10-15 Fireeye, Inc. Technique for protecting guest processes using a layered virtualization architecture
US10108446B1 (en) 2015-12-11 2018-10-23 Fireeye, Inc. Late load technique for deploying a virtualization layer underneath a running operating system
US10621338B1 (en) 2015-12-30 2020-04-14 Fireeye, Inc. Method to detect forgery and exploits using last branch recording registers
US10050998B1 (en) 2015-12-30 2018-08-14 Fireeye, Inc. Malicious message analysis system
US10133866B1 (en) 2015-12-30 2018-11-20 Fireeye, Inc. System and method for triggering analysis of an object for malware in response to modification of that object
US10565378B1 (en) 2015-12-30 2020-02-18 Fireeye, Inc. Exploit of privilege detection framework
US9824216B1 (en) 2015-12-31 2017-11-21 Fireeye, Inc. Susceptible environment detection system
US11552986B1 (en) 2015-12-31 2023-01-10 Fireeye Security Holdings Us Llc Cyber-security framework for application of virtual features
US10581874B1 (en) 2015-12-31 2020-03-03 Fireeye, Inc. Malware detection system with contextual analysis
US10476906B1 (en) 2016-03-25 2019-11-12 Fireeye, Inc. System and method for managing formation and modification of a cluster within a malware detection system
US10601863B1 (en) 2016-03-25 2020-03-24 Fireeye, Inc. System and method for managing sensor enrollment
US10785255B1 (en) 2016-03-25 2020-09-22 Fireeye, Inc. Cluster configuration within a scalable malware detection system
US10671721B1 (en) 2016-03-25 2020-06-02 Fireeye, Inc. Timeout management services
US10826933B1 (en) 2016-03-31 2020-11-03 Fireeye, Inc. Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
US10893059B1 (en) 2016-03-31 2021-01-12 Fireeye, Inc. Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10169585B1 (en) 2016-06-22 2019-01-01 Fireeye, Inc. System and methods for advanced malware detection through placement of transition events
US10462173B1 (en) 2016-06-30 2019-10-29 Fireeye, Inc. Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10592678B1 (en) 2016-09-09 2020-03-17 Fireeye, Inc. Secure communications between peers using a verified virtual trusted platform module
US9779405B1 (en) * 2016-09-26 2017-10-03 Stripe, Inc. Systems and methods for authenticating a user commerce account associated with a merchant of a commerce platform
US10491627B1 (en) 2016-09-29 2019-11-26 Fireeye, Inc. Advanced malware detection using similarity analysis
US10795991B1 (en) 2016-11-08 2020-10-06 Fireeye, Inc. Enterprise search
US10587647B1 (en) 2016-11-22 2020-03-10 Fireeye, Inc. Technique for malware detection capability comparison of network security devices
US10552610B1 (en) 2016-12-22 2020-02-04 Fireeye, Inc. Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10581879B1 (en) 2016-12-22 2020-03-03 Fireeye, Inc. Enhanced malware detection for generated objects
US10523609B1 (en) 2016-12-27 2019-12-31 Fireeye, Inc. Multi-vector malware detection and analysis
US10904286B1 (en) 2017-03-24 2021-01-26 Fireeye, Inc. Detection of phishing attacks using similarity analysis
US10554507B1 (en) 2017-03-30 2020-02-04 Fireeye, Inc. Multi-level control for enhanced resource and object evaluation management of malware detection system
US10798112B2 (en) 2017-03-30 2020-10-06 Fireeye, Inc. Attribute-controlled malware detection
US10902119B1 (en) 2017-03-30 2021-01-26 Fireeye, Inc. Data extraction system for malware analysis
US10791138B1 (en) 2017-03-30 2020-09-29 Fireeye, Inc. Subscription-based malware detection
US11023575B2 (en) * 2017-06-26 2021-06-01 Fortinet, Inc. Security sanitization of USB devices
US10855700B1 (en) 2017-06-29 2020-12-01 Fireeye, Inc. Post-intrusion detection of cyber-attacks during lateral movement within networks
US10503904B1 (en) 2017-06-29 2019-12-10 Fireeye, Inc. Ransomware detection and mitigation
US10601848B1 (en) 2017-06-29 2020-03-24 Fireeye, Inc. Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10893068B1 (en) 2017-06-30 2021-01-12 Fireeye, Inc. Ransomware file modification prevention technique
US10747872B1 (en) 2017-09-27 2020-08-18 Fireeye, Inc. System and method for preventing malware evasion
US10805346B2 (en) 2017-10-01 2020-10-13 Fireeye, Inc. Phishing attack detection
US11108809B2 (en) 2017-10-27 2021-08-31 Fireeye, Inc. System and method for analyzing binary code for malware classification using artificial neural network techniques
US11240275B1 (en) 2017-12-28 2022-02-01 Fireeye Security Holdings Us Llc Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US11271955B2 (en) 2017-12-28 2022-03-08 Fireeye Security Holdings Us Llc Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US11005860B1 (en) 2017-12-28 2021-05-11 Fireeye, Inc. Method and system for efficient cybersecurity analysis of endpoint events
US10826931B1 (en) 2018-03-29 2020-11-03 Fireeye, Inc. System and method for predicting and mitigating cybersecurity system misconfigurations
US11003773B1 (en) 2018-03-30 2021-05-11 Fireeye, Inc. System and method for automatically generating malware detection rule recommendations
US10956477B1 (en) 2018-03-30 2021-03-23 Fireeye, Inc. System and method for detecting malicious scripts through natural language processing modeling
US11558401B1 (en) 2018-03-30 2023-01-17 Fireeye Security Holdings Us Llc Multi-vector malware detection data sharing system for improved detection
CN111988989A (zh) * 2018-04-18 2020-11-24 先锋国际良种公司 通过修饰内源性mads盒转录因子改善玉蜀黍中的农艺特征
US11314859B1 (en) 2018-06-27 2022-04-26 FireEye Security Holdings, Inc. Cyber-security system and method for detecting escalation of privileges within an access token
US11075930B1 (en) 2018-06-27 2021-07-27 Fireeye, Inc. System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11228491B1 (en) 2018-06-28 2022-01-18 Fireeye Security Holdings Us Llc System and method for distributed cluster configuration monitoring and management
US11316900B1 (en) 2018-06-29 2022-04-26 FireEye Security Holdings Inc. System and method for automatically prioritizing rules for cyber-threat detection and mitigation
US11182473B1 (en) 2018-09-13 2021-11-23 Fireeye Security Holdings Us Llc System and method for mitigating cyberattacks against processor operability by a guest process
US11763004B1 (en) 2018-09-27 2023-09-19 Fireeye Security Holdings Us Llc System and method for bootkit detection
CN112631965A (zh) * 2018-10-19 2021-04-09 华为技术有限公司 控制硬盘接入的方法和装置
US11743290B2 (en) 2018-12-21 2023-08-29 Fireeye Security Holdings Us Llc System and method for detecting cyberattacks impersonating legitimate sources
US11176251B1 (en) 2018-12-21 2021-11-16 Fireeye, Inc. Determining malware via symbolic function hash analysis
US11368475B1 (en) 2018-12-21 2022-06-21 Fireeye Security Holdings Us Llc System and method for scanning remote services to locate stored objects with malware
US11601444B1 (en) 2018-12-31 2023-03-07 Fireeye Security Holdings Us Llc Automated system for triage of customer issues
US11310238B1 (en) 2019-03-26 2022-04-19 FireEye Security Holdings, Inc. System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources
US11677786B1 (en) 2019-03-29 2023-06-13 Fireeye Security Holdings Us Llc System and method for detecting and protecting against cybersecurity attacks on servers
US11636198B1 (en) 2019-03-30 2023-04-25 Fireeye Security Holdings Us Llc System and method for cybersecurity analyzer update and concurrent management system
TWI741294B (zh) * 2019-05-10 2021-10-01 新加坡商核智科技私人有限公司 用於執行存取裝置之控制系統及其方法
US11258806B1 (en) 2019-06-24 2022-02-22 Mandiant, Inc. System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11556640B1 (en) 2019-06-27 2023-01-17 Mandiant, Inc. Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en) 2019-06-28 2022-07-19 Fireeye Security Holdings Us Llc System and method for supporting cross-platform data verification
US11886585B1 (en) 2019-09-27 2024-01-30 Musarubra Us Llc System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en) 2019-09-30 2023-04-25 Mandiant, Inc. System and method for surfacing cyber-security threats with a self-learning recommendation engine
US11838300B1 (en) 2019-12-24 2023-12-05 Musarubra Us Llc Run-time configurable cybersecurity system
US11436327B1 (en) 2019-12-24 2022-09-06 Fireeye Security Holdings Us Llc System and method for circumventing evasive code for cyberthreat detection
US11522884B1 (en) 2019-12-24 2022-12-06 Fireeye Security Holdings Us Llc Subscription and key management system
CN111414652A (zh) * 2020-03-15 2020-07-14 黎明职业大学 一种计算机与存储设备相互绑定认证系统及其装置
EP3916600A1 (en) * 2020-05-27 2021-12-01 Mettler-Toledo (Albstadt) GmbH Method for operating an electronic data processing system and electronic data processing system
CN112052201A (zh) * 2020-09-27 2020-12-08 中孚安全技术有限公司 一种基于Linux内核层实现的USB设备管控方法与系统

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778421A (en) * 1992-11-26 1998-07-07 Nintendo Co., Ltd. Information processing system which can check disk-like storage medium having prescribed relation therewith and disk-like storage medium therefor
JP3844648B2 (ja) * 1994-05-24 2006-11-15 ソニー株式会社 受信装置及び受信方法
US5774821A (en) * 1994-11-25 1998-06-30 Itt Automotive Europe Gmbh System for driving stability control
JP2000187647A (ja) 1998-12-21 2000-07-04 Fuji Electric Co Ltd ネットワークシステムのユーザの認証方法、ネットワークコンピュータにおける使用環境設定方法、ネットワークに接続されたサーバのアクセス方法、ネットワークコンピュータ及びプログラムを記録した記録媒体
US7032240B1 (en) * 1999-12-07 2006-04-18 Pace Anti-Piracy, Inc. Portable authorization device for authorizing use of protected information and associated method
IL149804A0 (en) 1999-12-07 2002-11-10 Pace Anti Piracy Inc Portable authorization device for authorizing use of protected information and associated method
US6901511B1 (en) * 2000-01-13 2005-05-31 Casio Computer Co., Ltd. Portable terminals, servers, systems, and their program recording mediums
JP4486199B2 (ja) 2000-01-13 2010-06-23 カシオ計算機株式会社 携帯端末装置、サーバ装置及び記録媒体
JP4651212B2 (ja) 2001-03-22 2011-03-16 大日本印刷株式会社 携帯可能情報記憶媒体およびその認証方法
JP2002312326A (ja) 2001-04-17 2002-10-25 Smart Card Technologies:Kk Usbインターフェイスを備える電子デバイスを用いた複数認証方法
US20030063750A1 (en) 2001-09-26 2003-04-03 Alexander Medvinsky Unique on-line provisioning of user terminals allowing user authentication
JP2003216585A (ja) 2002-01-18 2003-07-31 Dainippon Printing Co Ltd 認証アプリケーション、管理アプリケーション、要認証アプリケーション及びicカード
CN1435761A (zh) * 2002-01-29 2003-08-13 记忆科技(深圳)有限公司 能够实现在线离线加解密的移动数据存储设备
DE10211036A1 (de) * 2002-03-13 2003-10-09 Fujitsu Siemens Computers Gmbh Zugangsschutz
KR100888471B1 (ko) * 2002-07-05 2009-03-12 삼성전자주식회사 링크 접속권한을 등급화 한 암호화 키 차등분배방법 및이를 이용한 로밍방법
TW588243B (en) 2002-07-31 2004-05-21 Trek 2000 Int Ltd System and method for authentication
JP2004086584A (ja) 2002-08-27 2004-03-18 Ntt Comware Corp パーソナルコンピュータにおける認証装置
US7475240B2 (en) * 2002-11-06 2009-01-06 Symantec Corporation System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems
EP1607906A4 (en) 2003-03-25 2006-04-12 Toyoki Sasakura AUTHENTICATION CARD AND RADIO AUTHENTICATION SYSTEM FOR MUTUAL AUTHENTICATION WITH THE AUTHENTICATION CARD
CN1302382C (zh) * 2003-06-13 2007-02-28 联想(北京)有限公司 基于usb闪存盘存储介质私有空间的验证方法
DE10336246A1 (de) 2003-08-07 2005-03-10 Fujitsu Siemens Computers Gmbh Verfahren zur Sicherung eines Computersystems
JP4397675B2 (ja) * 2003-11-12 2010-01-13 株式会社日立製作所 計算機システム
TWI261175B (en) 2004-02-27 2006-09-01 Faraday Tech Corp Method for authentication of USB OTG product
JP4097623B2 (ja) * 2004-04-26 2008-06-11 システムニーズ株式会社 本人認証インフラストラクチャシステム
US20050251589A1 (en) 2004-05-04 2005-11-10 Jung-Chung Wang Method of authenticating universal serail bus on-the-go device
KR100976040B1 (ko) * 2004-06-01 2010-08-18 에스케이 텔레콤주식회사 Usb 저장장치를 이용한 사용자 인증 방법과 시스템
JP2006092081A (ja) 2004-09-22 2006-04-06 Hitachi Software Eng Co Ltd 不特定者または多数者が利用するパソコンの安全な起動利用方法及びそのような利用を実現する記録媒体
KR100618386B1 (ko) 2004-10-18 2006-08-31 삼성전자주식회사 하드디스크드라이브의 사용제한이 가능한 화상형성장치 및그 하드디스크드라이브의 사용제한방법
JP4709556B2 (ja) 2005-01-13 2011-06-22 株式会社東芝 端末機器に装着される電子装置及び通信システム
JP2006221566A (ja) 2005-02-14 2006-08-24 Dainippon Printing Co Ltd ネットワークを利用した介護サービス支援システム
JP3799379B1 (ja) * 2005-11-24 2006-07-19 クオリティ株式会社 情報処理システム
US20080148057A1 (en) * 2006-12-19 2008-06-19 Ohanae, Inc. Security token

Also Published As

Publication number Publication date
JP2010506292A (ja) 2010-02-25
JP5087088B2 (ja) 2012-11-28
WO2008041950A3 (en) 2008-05-22
US8412865B2 (en) 2013-04-02
KR101052128B1 (ko) 2011-07-26
EP2080100A2 (en) 2009-07-22
CN101542452A (zh) 2009-09-23
TWI389006B (zh) 2013-03-11
US20100017546A1 (en) 2010-01-21
SG176471A1 (en) 2011-12-29
WO2008041950A2 (en) 2008-04-10
EP2080100A4 (en) 2011-03-02
CN101542452B (zh) 2016-04-20
KR20090094240A (ko) 2009-09-04

Similar Documents

Publication Publication Date Title
TW200834374A (en) Method, apparatus and system for authentication of external storage devices
KR102144528B1 (ko) 블루투스 인터페이스를 갖는 인증 장치
US6895502B1 (en) Method and system for securely displaying and confirming request to perform operation on host computer
JP6437433B2 (ja) 医療デバイスとその遠隔デバイスの間の保護された通信
JP6364026B2 (ja) コンピューティングデバイスアクセサリをセキュアにすること
ES2292737T3 (es) Metodo y sistema para asegurar una red informatica y dispositivo de identificacion personal usado en ella para controlar el acceso a los componentes de la red.
TWI475860B (zh) 可攜式裝置關聯性
DE60002893T2 (de) Computerplattformen und deren betriebsverfahren
US11269984B2 (en) Method and apparatus for securing user operation of and access to a computer system
US20080147831A1 (en) Method and System for Configuring a Device with a Wireless Mobile Configurator
US20090199272A1 (en) Authentication using a turing test to block automated attacks
TWI435272B (zh) 基於行動智慧卡之鑑認
JP2005529433A (ja) ネットワークに対するデータアクセスを制御するための記憶著作権侵害防止キー暗号化(sake)デバイスの方法および装置
US20070288689A1 (en) USB apparatus and control method therein
EP3031001A1 (en) Secure data storage
TW201229768A (en) Secure upgrade supplies and methods
KR102439881B1 (ko) 컨트롤러 기반의 네트워크 접속을 제어하기 위한 시스템 및 그에 관한 방법
JP2007280393A (ja) コンピューターログインをコントロールする装置およびその方法
Götzfried et al. Mutual authentication and trust bootstrapping towards secure disk encryption
US20170279609A1 (en) Data management method, computer program for same, recording medium thereof, user client for executing data management method, and security policy server
Liou et al. On improving feasibility and security measures of online authentication.
KR100991191B1 (ko) 컴퓨터 보안 모듈 및 이를 적용한 컴퓨터 장치
EP3480718B1 (en) System and method for facilitating authentication via a shortrange wireless token
KR102663133B1 (ko) 전자 장치의 무결성 검사
KR20080013837A (ko) 웹서버 상호 인증을 위한 스마트카드 및 리더기

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees