DYNAMIC SUBSTITUTION OF USB DATA FOR EFFICIENT CODING/DECODING Russian patent published in 2009 - IPC G06F21/20 G06F12/14 H04L9/32 

Abstract RU 2352986 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention is related to protection systems. Unit of protection and method realise requests for data from USB device or other similar device, at that protected component may realise protected communication to device without variation of underlying USB bus protocol, or device, even where software that controls the bus is not trusted. Protection unit (physically separated or integrated in device or concentrator) intercepts data transmitted from device into protected component in response to request for data. Signal of data reception confirmation unavailability is transmitted into protected component, and data are coded. The following request for data is intercepted, and coded data are sent in response. Confirmation of data reception from protected component in device is allowed to reach the device. In order to process request for installation, permit command that contains coded and decoded installation command is sent to protection unit. If coding is checked successfully, then installation command sent to device (via protection unit), is allowed to reach the device.

EFFECT: provision of improved protection.

32 cl, 6 dwg

Similar patents RU2352986C2

Title Year Author Number
METHOD FOR TRANSFERRING SOFTWARE LICENSE TO HARDWARE UNIT 1995
  • Derek L.Dehvis
RU2147790C1
METHODS AND SYSTEMS FOR AUTHENTICATION OF COMPONENTS IN GRAPHIC SYSTEM 2003
  • Inglehnd Pol
  • Pejnado Markus
  • Uilt Nikolas P.
RU2310227C2
METHOD FOR USER-COMPUTER INTERACTION FOR USE BY A SET OF FLEXIBLY CONNECTED COMPUTER SYSTEMS, DEVICE, HAVING BLOCK FOR CONNECTION TO FLEXIBLY CONNECTED COMPUTER SYSTEMS, A SET OF DEVICES, HAVING A BLOCK FOR CONNECTION TO FLEXIBLY CONNECTED COMPUTER SYSTEM, UNIVERSAL SERIAL BUS KEY, METHOD FOR INTERACTION WITH MAIN COMPUTER VIA USB AND DATA STORAGE METHOD (VARIANTS) 1999
  • Margalit Janki
  • Margalit Dehni
  • Kastershtin Rami
RU2267155C2
METHODS FOR AUTHENTICATING, ENCRYPTING AND DECODING CLIENT TERMINAL IDENTIFIER AND APPARATUS FOR REALISING SAID METHODS 2007
  • Ur'En Paskal'
  • Badra Mokhamad
RU2451398C2
PORTABLE COMPUTING ENVIRONMENT 2005
  • Shoppa Kristofer A.
  • Majers Mark A.
  • Fillips Tomas Dzh.
  • Vesterinen Uill'Jam Dzh.
RU2402801C2
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS 2001
  • Mur Timoti M.
  • Ajjagari Arun
  • Shetkh Sachin K.
  • Bakhl Pradip
RU2297037C2
ADMINISTRATION OF SECURE DEVICES 2010
  • Smit Ned M.
  • Mur Viktorija K.
  • Grobmehn Stiven L.
RU2557756C2
SAFETY CONNECTION TO KEYBOARD OR RELATED DEVICE 2004
  • Pejnado Markus
  • Benalo Dzhosh
RU2371756C2
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES 2007
  • Medvinskij Gennadij
  • Ilak Kristian
  • Khagiu Kostin
  • Parsonz Dzhon Eh.
  • Fatkhalla Mokhamed Ehmad Ehl' Din
  • Lich Pol Dzh.
  • Kamel' Tarek Bukhaa Ehl'-Din Makhmud
RU2439692C2
METHODS AND SYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF PROTECTED CONTENT 2002
  • Inglehnd Pol
  • Pejnado Markus
  • Uilt Nikolas P.
RU2308077C2

RU 2 352 986 C2

Authors

Rehj Kennet

Kel Teodor

Dates

2009-04-20Published

2004-04-30Filed