Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

USB attack protection

A technology for protecting equipment and accessory equipment, applied in internal/peripheral computer component protection, instruments, computing, etc., can solve problems such as attacking USB hosts, and achieve the effect of preventing attacks, blocking attacks, and improving personalized functions

Active Publication Date: 2018-02-13
ALCATEL LUCENT SAS
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this attack, a custom USB device can perform malicious actions through keyboard emulation to attack the USB host

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB attack protection
  • USB attack protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] refer to figure 1 , the communication system according to the invention comprises a communication device CD, a protection device PD and an accessory device AD, as well as a protection server PS and a monitoring server MS accessible by the communication device CD through the telecommunication network TN.

[0043] The telecommunications network TN may be a wired or wireless network, or a combination of wired and wireless networks.

[0044] The telecommunications network TN may be a packet network, for example an IP ("Internet Protocol") high-speed network such as the Internet or an Intranet, or even a company-specific private network.

[0045] The communication device CD can be directly connected with the accessory device AD ​​via a USB link to access content stored in the accessory device. The communication device may be referred to as a host device that receives the accessory device AD ​​via a plug.

[0046] The communication device CD may be, for example, a personal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

For a universal serial bus, USB, attack protection between a communication device (CD) and an accessory device (AD), a protection device (PD) inserted between the communication device (CD) and the accessory device (AD) through a USB link is able to: receive (S6) a message (Mes) from the accessory device (AD), the message (Mes) including fields of characteristics of the accessory device, generate (S7) a random identifier (Rid), send (S8) the generated random identifier (Rid) to the communication device (CD) that creates a registration rule based on the generated random identifier, modify (S11)an intercepted response from the accessory device (AD) to a request from the communication device (CD), the request being dedicated to get a value associated with a serial number of the accessory device, by including the generated random identifier (Rid), send (S12) the modified response to the communication device (CD), the modified response triggering a query for registration of the accessory device (AD) by means of the content of the modified response and the created registration rule.

Description

technical field [0001] The present invention relates to communication devices. More particularly, the present invention relates to communication devices (such as media players) that receive accessory devices (such as USB devices). Background technique [0002] Modern communication devices, such as computers, allow computer memory expansion by providing a Universal Serial Bus (USB) socket. USB peripheral devices typically have a plug that meets physical and electrical specifications, just as a communication device capable of accepting a USB plug has a receptacle that meets physical and electrical specifications. [0003] USB devices can be of different natures such as storage devices (flash drives), computer mice, computer keyboards, printers or webcams. [0004] In particular, USB storage devices are small, inexpensive, and highly portable, and are ubiquitous in modern computing devices. Due to its portability, a single USB storage device is often plugged into many differ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/73G06F21/85
CPCG06F21/73G06F21/85G06F21/552G06F2213/0042G06F2221/034
Inventor H·埃尔阿贝S·帕彼隆
Owner ALCATEL LUCENT SAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products