FIELD: information security.
SUBSTANCE: group of inventions relates to the field of computer security, in particular, to a protective apparatus of an external terminal and to a protection system. The security apparatus of an external terminal includes: an interface control module used to use one or multiple internal interfaces and one or more external interfaces, wherein the internal interfaces are connected with the corresponding interfaces of the protected base computer, as well as external interfaces configured to access one or multiple external apparatuses; and a control module of the system, used to connect the interface control module and control authentication of the external apparatus when accessing one or multiple external interfaces on the interface control module.
EFFECT: increase in the security of the host and elimination of security threats caused by the use of interfaces.
12 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR MANAGING DATA MOVEMENT BASED ON HARDWARE CONTROL LOGIC NODE AND SYSTEM FOR IMPLEMENTING THE METHOD | 2019 |
|
RU2822994C2 |
DEVICE AND METHOD OF CONTROLLING WIRELESS NETWORK ACCESS RIGHTS | 2010 |
|
RU2580810C2 |
PROTECTED STORAGE DEVICE | 2018 |
|
RU2768196C2 |
METHOD AND DEVICE FOR CONNECTION TO NETWORK WITH HIGH SAFETY LEVEL | 2012 |
|
RU2602388C2 |
METHOD FOR USER-COMPUTER INTERACTION FOR USE BY A SET OF FLEXIBLY CONNECTED COMPUTER SYSTEMS, DEVICE, HAVING BLOCK FOR CONNECTION TO FLEXIBLY CONNECTED COMPUTER SYSTEMS, A SET OF DEVICES, HAVING A BLOCK FOR CONNECTION TO FLEXIBLY CONNECTED COMPUTER SYSTEM, UNIVERSAL SERIAL BUS KEY, METHOD FOR INTERACTION WITH MAIN COMPUTER VIA USB AND DATA STORAGE METHOD (VARIANTS) | 1999 |
|
RU2267155C2 |
SECURITY DEVICE, METHOD AND SYSTEM FOR CONTINUOUS AUTHENTICATION | 2021 |
|
RU2786363C1 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
METHOD AND DEVICE FOR TRUSTED COMPUTER BOOTING WITH CONTROL OF PERIPHERAL INTERFACES | 2020 |
|
RU2748575C1 |
Authors
Dates
2022-01-17—Published
2019-01-16—Filed