WO2000036515A1 - Method and apparatus for isolating a computer system upon detection of viruses and similar data - Google Patents

Method and apparatus for isolating a computer system upon detection of viruses and similar data Download PDF

Info

Publication number
WO2000036515A1
WO2000036515A1 PCT/US1998/026377 US9826377W WO0036515A1 WO 2000036515 A1 WO2000036515 A1 WO 2000036515A1 US 9826377 W US9826377 W US 9826377W WO 0036515 A1 WO0036515 A1 WO 0036515A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data channel
channel
virus
processor
Prior art date
Application number
PCT/US1998/026377
Other languages
French (fr)
Inventor
Steven D. Mann
Original Assignee
Rvt Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rvt Technologies, Inc. filed Critical Rvt Technologies, Inc.
Priority to PCT/US1998/026377 priority Critical patent/WO2000036515A1/en
Priority to MXPA01007044A priority patent/MXPA01007044A/en
Priority to EP98963862A priority patent/EP1137992A4/en
Priority to AU19101/99A priority patent/AU758189B2/en
Priority to CA002360782A priority patent/CA2360782A1/en
Publication of WO2000036515A1 publication Critical patent/WO2000036515A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/567Computer malware detection or handling, e.g. anti-virus arrangements using dedicated hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations

Abstract

An apparatus (10) for isolating a data receiving entity (30) from a data sending entity (20) includes a first data channel (22), coupled to the data sending entity, and a second data channel (32), coupled to the data receiving entity. A processor (30) is programmed to compare a plurality of data words received from the first data channel to at least one data word characteristic of a data virus and to assert a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus. An optical isolator (14) is capable of isolating the first data channel from the second data channel when the processor detects a data virus. A controllable power supply (54) is responsive to the control signal (42) from the processor and coupled to the optical isolator, which provides power to the optical isolator only when the control signal from the processor is not asserted.

Description

METHOD AND APPARATUS FOR ISOLATING A COMPUTER SYSTEM UPON DETECTION OF VIRUSES AND SIMILAR DATA
BACKGROUND OF THE INVENTION
1. Field of the Invention:
This invention relates to computer systems. More particularly, this invention relates to a method and apparatus for isolating a computer system upon detection of a virus and similar data.
2. The Prior Art:
Recently, transmission of data viruses over the Internet has become a serious concern for Internet users. To reduce the concern, several methods are used to isolate computers from the Internet while the users are in local mode. However, when users of such methods are in a connected mode, they become prey to any virus that they may unwittingly download.
Computer virus scanners are common and can be used to detect a virus once it is downloaded. However, such scanners cannot prevent the virus from being downloaded. They can only aid in the identification of a virus once it has already infected the user's computer.
Nowhere does the prior art disclose a method or apparatus for detecting a virus as it is being received from a network and isolating the user's computer from the Internet when an incoming virus is detected. SUMMARY OF THE INVENTION
The above-noted disadvantages of the prior art are overcome by the present invention, which in one aspect is an apparatus for isolating a data receiving entity from a data sending entity. A first data channel is coupled to the data sending entity and a second data channel is coupled to the data receiving entity. A processor is operationally coupled to the first data channel and detects a data virus received from the first data channel. An isolation circuit that is responsive to the processor couples the first data channel to the second data channel when the processor does not detect a data virus and isolates the first data channel from the second data channel when the processor detects a data virus.
In another aspect, the invention includes a first data channel coupled to the data sending entity and a second data channel coupled to the data receiving entity. A processor that is programmed to compare a plurality of data words received from the first data channel to at least one data word characteristic of a data virus asserts a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus. A memory, that is operationally coupled to the processor, stores at least one data word characteristic of a data virus. The memory presents to the processor at least one data word characteristic of a data virus and an input buffer stores data received by the processor from the first data channel. An optical isolator, coupled to the first data channel and the second data channel and having an enable signal input, is capable of isolating the first data channel from the second data channel when the enable signal input is not asserted and is also capable of placing the first data channel and the second data channel in optical communication with each other when the enable signal input is asserted. A controllable power supply that is responsive to the control signal from the processor is coupled to the enable signal input of the optical isolator. The power supply asserts the enable signal when the control signal is not asserted and does not assert the enable signal when the control signal is asserted, thereby causing the optical isolator to isolate the first data channel from the second data channel.
In yet another aspect, the invention is a method for isolating data receiving entity from a data sending entity. When a data virus received from the data sending entity is detected, the data sending entity is isolated from the data receiving entity.
An advantage of the invention is that it prevents a data receiving entity, such as a computer, from receiving a virus from a data sending entity, such as a computer network.
A further advantage of the invention is that it isolates the data sending entity from the data receiving entity without disrupting normal operation of either entity.
These and other advantages will become apparent from the following description of the preferred embodiment taken in conjunction with the following drawings, although variations and modifications may be effected without departing from the spirit and scope of the novel concepts of the disclosure.
BRIEF DESCRIPTION OF THE FIGURES OF THE DRAWINGS
FIG. 1 is a simplified schematic diagram of the invention.
FIG. 2 is a detailed schematic diagram of the invention.
DETAILED DESCRIPTION OF THE INVENTION
A preferred embodiment of the invention is now described in detail. Referring to the drawings, like numbers indicate like parts throughout the views. As used in the description herein and throughout the claims that follow, "a," "an," and "the" includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein and throughout the claims that follow, the meaning of "in" includes "in" and "on" unless the context clearly dictates otherwise.
As shown in FIG. 1, the apparatus 10 of the invention evaluates data received from a data sending entity 20, such as the Internet, by a data receiving entity 30, such as a personal computer or even a local area network. The data is received via a first data channel 22 coupled to the data sending entity 20 and a second data channel 32 coupled to the data receiving entity. A data comparitor 40 is operationally coupled to the first data channel 22 and is used to detect data viruses received from the first data channel 22. When a virus is detected, a data isolator 60, that is responsive to a control signal 42 from the data comparator 40, isolates the first data channel 22 from the second data channel 32. Thus, viruses are detected and prevented from being received by the data receiving entity 30.
As shown in FIG. 2, the apparatus 10 of one preferred embodiment of the invention interfaces with a peripheral control interface (PCI) 12 of a data receiving entity 30, such as a personal computer, to provide isolation from a data sending entity 20, such as the Internet. The data sending entity 20 is connected to an input interface 24, such as a standard PBX interface, via a first data channel 22. The data stream received by the input interface 24 is demodulated using a demodulator circuit 26 so as to conform to the data format of the data receiving entity 30.
The data stream is then fed into the data comparator 40. In the comparitor circuit 40, a UART chip 46 formats the incoming serial data into parallel data words and a processor 44, such as a PCI host controller, using an asynchronous transfer mode segmentation and reassembly, compares the parallel data with known virus signatures stored in a memory 48, such as an EEPROM. The processor 44, which is controlled by a control memory 50, buffers data from the UART chip 46 in a memory chip 52 as it awaits virus scanning analysis.
After the processor 44 has analyzed an incoming word, it is then sent to the data isolator 60 for eventual transfer to the data receiving entity 30. The data isolator 60 comprises an optical isolator 62 that is driven by a power enable signal 66 received from a power supply conditioning ISO drive 64. The power supply conditioning ISO drive 64 receives power from a power up control logic circuit 54 which receives power from a power line 74 in the PCI bus 12.
If no virus is found, the data stream is transferred through the optical isolator 62 to a modulation level shifting circuit 68, that conditions the data for receipt by the data receiving entity 30, to a modem interface 34. The modem interface 34 provides protocol matching to the input interface 24 and sends the data to the data receiving entity 30.
When a virus is detected in the incoming data stream, a control line 42 from the processor 44 causes the power up control logic circuit 54 to cause the power supply conditioning ISO drive 64 to cut off power to the optical isolator 62, thereby causing the optical isolator 62 to prevent passage of data therethrough. A modem standby circuit 36 then takes over and simulates protocol exchanges with the input interface 24, thereby preventing an abnormal disconnect.
During power-up, the processor 40 runs the system through a self checking routine. If any system abnormalities are detected, an interrupt line 70 is asserted. The interrupt line 70 passes through an optical isolator 14 to ensure unidirectional data transmission to the PCI bus 12. The power up control logic circuit 54 also performs a self check, a battery reference 56 is compared to the value on the incoming power line 74 from the PCI bus 12, and if the system is improperly powered, an interrupt line 72 is asserted. The interrupt line 72 is also passed through an optical isolator 16 that ensures that the interrupt line 72 is unidirectional to the PCI bus 12.
The above described embodiment is given as an illustrative example only. It will be readily appreciated that many deviations may be made from the specific embodiment disclosed in this specification without departing from the invention. Accordingly, the scope of the invention is to be determined by the claims below rather than being limited to the specifically described embodiment above.

Claims

CLAIMSWhat is claimed is:
1. An apparatus for isolating data receiving entity from a data sending entity, comprising: a. a first data channel, coupled to the data sending entity; b. a second data channel, coupled to the data receiving entity; c. means, operationally coupled to the first data channel, for detecting a data virus received from the first data channel; and d. means, responsive to the detecting means, for coupling the first data channel to the second data channel when the detecting means does not detect a data virus and for isolating the first data channel from the second data channel when the detecting means detects a data virus.
2. An apparatus for isolating data receiving entity from a data sending entity, comprising: a. a first data channel, coupled to the data sending entity; b. a second data channel, coupled to the data receiving entity; c. means for comparing a plurality of data words received from the first data channel to at least one data word characteristic of a data virus and for asserting a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus; and d. means, coupled to the first data channel and the second data channel and operationally coupled to the control signal, for isolating the first data channel from the second data channel when the control signal is asserted and for placing the first data channel and the second data channel in optical communication when the control signal is not asserted.
3. The apparatus of Claim 2, wherein the comparing means comprises: a. a processor; and b. means for presenting to the processor at least one data word characteristic of a data virus.
4. The apparatus of Claim 3, wherein the processor comprises a PCI host controller.
5. The apparatus of Claim 3, wherein the presenting means comprises a memory, operationally coupled to the processor, that stores at least one data word characteristic of a data virus.
6. The apparatus of Claim 3, further comprising an input buffer that stores data received by the processor
7. The apparatus of Claim 2, wherein data on the first data channel is transmitted in a serial format and wherein the apparatus further comprises means for converting segments of serial data received from the first data channel to data in a parallel format.
8. The apparatus of Claim 2, wherein the isolating means comprises an optical isolator.
9. The apparatus of Claim 8, further comprising a controllable power supply responsive to the control signal from the comparing means, the power supply generating an enable signal when the control signal is not asserted, wherein the optical isolator is powered by the enable signal so that when the optical isolator receives power from the enable signal, the first data channel and the second data channel are in optical communication with each other.
0. An apparatus for isolating data receiving entity from a data sending entity, comprising: a. a first data channel, coupled to the data sending entity; b. a second data channel, coupled to the data receiving entity; c. a processor that is programmed to compare a plurality of data words received from the first data channel to at least one data word characteristic of a data virus and to assert a control signal when a data word received from the first data channel corresponds to a data word characteristic of a data virus; d. a memory, operationally coupled to the processor, that stores at least one data word characteristic of a data virus that presents to the processor at least one data word characteristic of a data virus; e. an input buffer that stores data received by the processor from the first data channel; f. an optical isolator, coupled to the first data channel and the second data channel and having an enable signal input, that is capable of isolating the first data channel from the second data channel when the enable signal input is not asserted and is capable of placing the first data channel and the second data channel in optical communication with each other when the enable signal input is asserted; and g. a controllable power supply responsive to the control signal from the processor and coupled to the enable signal input of the optical isolator, the power supply asserting the enable signal when the control signal is not asserted and the power supply not asserting the enable signal when the control signal is asserted, thereby causing the optical isolator to isolate the first data channel from the second data channel.
11. The apparatus of Claim 10, wherein the processor comprises a PCI host controller.
12. The apparatus of Claim 10, wherein data on the first data channel is transmitted in a serial format and wherein the apparatus further comprises means for converting segments of serial data received from the first data channel to data in a parallel format.
13. A method for isolating data receiving entity from a data sending entity, comprising: a detecting a data virus received from the data sending entity; and b. isolating the data sending entity from the data receiving entity upon detecting a data virus received from the data sending entity.
PCT/US1998/026377 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data WO2000036515A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
PCT/US1998/026377 WO2000036515A1 (en) 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data
MXPA01007044A MXPA01007044A (en) 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data.
EP98963862A EP1137992A4 (en) 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data
AU19101/99A AU758189B2 (en) 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data
CA002360782A CA2360782A1 (en) 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1998/026377 WO2000036515A1 (en) 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data

Publications (1)

Publication Number Publication Date
WO2000036515A1 true WO2000036515A1 (en) 2000-06-22

Family

ID=22268464

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/026377 WO2000036515A1 (en) 1998-12-11 1998-12-11 Method and apparatus for isolating a computer system upon detection of viruses and similar data

Country Status (5)

Country Link
EP (1) EP1137992A4 (en)
AU (1) AU758189B2 (en)
CA (1) CA2360782A1 (en)
MX (1) MXPA01007044A (en)
WO (1) WO2000036515A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002025413A2 (en) * 2000-09-22 2002-03-28 Ge Medical Systems Global Technology Company Llc Ultrasound imaging system having virus protection
WO2004025481A1 (en) * 2002-09-12 2004-03-25 Jarmo Talvitie Security arrangement, method and apparatus for repelling computer viruses and isolating data
DE10064658B4 (en) * 2000-12-22 2004-04-08 Siemens Ag Computer arrangement which can be connected to a data transmission network
WO2005124561A1 (en) * 2004-06-21 2005-12-29 Anatoly Kopytko Method for protecting computer devices against viral codes
AU2004200951B2 (en) * 2003-03-06 2007-02-01 Rod Holding Extension for information processing using photon image transmission

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826013A (en) * 1995-09-28 1998-10-20 Symantec Corporation Polymorphic virus detection module
US5832208A (en) * 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4405829A (en) * 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US5319776A (en) * 1990-04-19 1994-06-07 Hilgraeve Corporation In transit detection of computer virus with safeguard
JPH10501354A (en) * 1994-06-01 1998-02-03 クワンタム・リープ・イノヴェーションズ・インコーポレーテッド Computer virus trap device
US5606474A (en) * 1995-01-17 1997-02-25 Latsu, Inc. High density disk drive with accelerated disk access
GB2322035B (en) * 1997-02-05 2001-09-19 Stuart Justin Nash Improvements in and relating to computers

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826013A (en) * 1995-09-28 1998-10-20 Symantec Corporation Polymorphic virus detection module
US5832208A (en) * 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1137992A4 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002025413A2 (en) * 2000-09-22 2002-03-28 Ge Medical Systems Global Technology Company Llc Ultrasound imaging system having virus protection
WO2002025413A3 (en) * 2000-09-22 2003-09-18 Ge Med Sys Global Tech Co Llc Ultrasound imaging system having virus protection
US7263616B1 (en) 2000-09-22 2007-08-28 Ge Medical Systems Global Technology Company, Llc Ultrasound imaging system having computer virus protection
DE10064658B4 (en) * 2000-12-22 2004-04-08 Siemens Ag Computer arrangement which can be connected to a data transmission network
US8171073B2 (en) 2000-12-22 2012-05-01 Siemens Aktiengesellschsft Computer system connected to a data communications network
WO2004025481A1 (en) * 2002-09-12 2004-03-25 Jarmo Talvitie Security arrangement, method and apparatus for repelling computer viruses and isolating data
AU2004200951B2 (en) * 2003-03-06 2007-02-01 Rod Holding Extension for information processing using photon image transmission
WO2005124561A1 (en) * 2004-06-21 2005-12-29 Anatoly Kopytko Method for protecting computer devices against viral codes
RU2462750C2 (en) * 2004-06-21 2012-09-27 Анатолий Владимирович Копытко Method to protect computer equipment against viral codes
RU2462750C9 (en) * 2004-06-21 2019-10-18 Анатолий Владимирович Копытко Method to protect computer equipment against viral codes

Also Published As

Publication number Publication date
CA2360782A1 (en) 2000-06-22
EP1137992A1 (en) 2001-10-04
MXPA01007044A (en) 2002-09-18
AU1910199A (en) 2000-07-03
EP1137992A4 (en) 2003-02-05
AU758189B2 (en) 2003-03-20

Similar Documents

Publication Publication Date Title
US6003132A (en) Method and apparatus for isolating a computer system upon detection of viruses and similar data
US6081894A (en) Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
CA1287905C (en) Method and apparatus for detecting a rate of data transmission
US5418812A (en) Radio network initialization method and apparatus
US7668169B2 (en) Device and method that allows single data recovery circuit to support multiple USB ports
CA2253933A1 (en) Half duplex uart control for single channel bi-directional wireless communications
US20070245404A1 (en) Information processing apparatus, management method therefor, computer-readable recording medium recording management program, information processing system
AU758189B2 (en) Method and apparatus for isolating a computer system upon detection of viruses and similar data
US20030088318A1 (en) Device control system
CN101561876A (en) Method and system for collecting and identifying ID card information
US20020073342A1 (en) Verifying physical universal serial bus keystrokes
JPH11110211A (en) Computer system, computer virus opposition method and storage medium for recording computer virus opposition program
EP3234850B1 (en) Methods, systems, and devices for detecting and isolating device posing security threat
US6252874B1 (en) Ethernet card and ethernet card improvement methods
JP4145171B2 (en) Image processing device unauthorized use monitoring device
JPH10307776A (en) Computer virus reception monitor device and its system
US6665314B1 (en) Wireless printer adjunct
US6643717B1 (en) Flow control
CN109635596B (en) Safety protection system and method for multimedia touch control integrated machine
KR100537930B1 (en) Guarding method for input data by usb keyboard and guarding system
JP2634711B2 (en) Data transmission device using digital wireless network
JP3682403B2 (en) Information transmission system
US20230259369A1 (en) Method and microcontroller for driving in-system-programming
WO2010115308A1 (en) Login system and login method
JPH10294756A (en) Electronic mail terminal equipment

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: PA/a/2001/007044

Country of ref document: MX

Ref document number: 512896

Country of ref document: NZ

Ref document number: 1998963862

Country of ref document: EP

Ref document number: 19101/99

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 2360782

Country of ref document: CA

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 1998963862

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 1998963862

Country of ref document: EP

WWG Wipo information: grant in national office

Ref document number: 19101/99

Country of ref document: AU