FIELD: computer security.
SUBSTANCE: system contains the first hardware processor and a protected storage device (hereinafter – SD). The protected SD contains the second hardware processor and a non-volatile SD element. The first hardware processor is configured so that: when the software running on the first hardware processor detects a request to save a data packet in the SD element, this processor encrypts the specified data packet, transmits an initial SD access request to a SD interface, wherein this initial SD access request contains an encrypted data packet, generates a simulated SD access request in accordance with a SD transfer protocol, which contains at least part of a cryptographic key, and transmits this simulated SD access request to the SD interface. The second hardware processor is configured so that: after receiving a message through the SD interface, the processor determines whether the message contains a simulated SD access request, if the message contains such a simulated SD access request, the processor determines a cryptographic key in accordance with the simulated SD access request, after receiving the initial SD access request, the processor uses the cryptographic key and decrypts the data packet, after which it determines whether the decrypted data packet contains malware.
EFFECT: increase in the reliability of data protection.
21 cl, 8 dwg
Title | Year | Author | Number |
---|---|---|---|
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS | 2020 |
|
RU2807463C2 |
SYSTEMS AND METHODS OF MONITORING MALWARE BEHAVIOR TO MULTIPLE OBJECTS OF SOFTWARE | 2016 |
|
RU2683152C1 |
SYSTEM AND METHOD FOR AUTOMATIC DEVICE DETECTION, DEVICE CONTROL AND REMOTE ASSISTANCE | 2015 |
|
RU2691858C2 |
DOUBLE SELF-TEST OF MEMORY FOR PROTECTION OF MULTIPLE NETWORK ENDPOINTS | 2016 |
|
RU2714607C2 |
USER INTERFACE FOR PROVIDING SECURITY AND REMOTE CONTROL OF NETWORK ENDPOINTS | 2015 |
|
RU2697935C2 |
ENDPOINT SECURITY SYSTEM AND METHOD | 2015 |
|
RU2693922C2 |
EVENT FILTERING FOR SECURITY APPLICATIONS OF VIRTUAL MACHINES | 2017 |
|
RU2723668C1 |
SECURITY AGENT, OPERATING AT EMBEDDED SOFTWARE LEVEL WITH SUPPORT OF OPERATING SYSTEM SECURITY LEVEL | 2013 |
|
RU2583714C2 |
METHOD OF COMBINING LARGE LANGUAGE MODEL AND SECURITY AGENT | 2023 |
|
RU2825975C1 |
ROBUST AND SECURE HARDWARE-COMPUTER SYSTEM IN CLOUD COMPUTING ENVIRONMENT | 2013 |
|
RU2557476C2 |
Authors
Dates
2022-03-23—Published
2018-07-31—Filed