US20200050802A1 - Port security device for computing devices and method of operating such - Google Patents
Port security device for computing devices and method of operating such Download PDFInfo
- Publication number
- US20200050802A1 US20200050802A1 US16/606,117 US201816606117A US2020050802A1 US 20200050802 A1 US20200050802 A1 US 20200050802A1 US 201816606117 A US201816606117 A US 201816606117A US 2020050802 A1 US2020050802 A1 US 2020050802A1
- Authority
- US
- United States
- Prior art keywords
- port
- security device
- port security
- computing device
- housing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Definitions
- the field of the disclosure relates generally to security devices for computing devices. More particularly, this disclosure relates to a security device for a port of a computing device.
- At least some computing devices include at least one port that is configured to receive a cable or other data transfer component. However, the port may allow unauthorized users to access the device and other devices. Accordingly, at least some computing devices include a controller configured to selectively disable the port. However, an unauthorized user may use the computing device to activate the port and, thereby, gain access to the interconnected devices. Accordingly, at least some computing devices include a blocking mechanism inserted into the port to restrict access. However, an unauthorized user may be able to remove and/or disable the mechanism without immediate detection. At least some known blocking mechanisms may include a seal or tamper tape that is broken when the blocking mechanism has been tampered with.
- a system in one aspect, includes a first computing device and a second computing device.
- the first computing device includes a port.
- the second computing device is configured to communicate with the first computing device.
- the system also includes a port security device configured to restrict access to the port.
- the port security device includes a transceiver configured to communicate with a third computing device.
- the third computing device is configured to determine a status of the port security device. At least one of the port security device and the third computing device includes a user interface configured to provide an indication of the status of the port security device.
- the port security device is positionable between a locked position in which the housing inhibits access to the port and an unlocked position in which the housing allows access to the port.
- the port security device also includes a sensor configured to detect when the port security device moves between the locked position and the unlocked position.
- a method of securing a port of an interconnected computing device includes providing a port security device configured to connect to the interconnected computing device adjacent the port.
- the port security device includes a housing.
- the port security device is positionable between a locked position in which the housing inhibits access to the port and an unlocked position in which the housing allows access to the port.
- the method also includes detecting, using a sensor, when the port security device moves between the locked position and the unlocked position.
- the method further includes sending a signal to an access point when the sensor detects that the port security device moves between the locked position and the unlocked position.
- FIG. 1 is a schematic view of a system including interconnected devices.
- FIG. 2 is a sectional view of a port security device in an unlocked position.
- FIG. 3 is a sectional view of a port security device in a locked position.
- Approximating language may be applied to modify any quantitative representation that may permissibly vary without resulting in a change in the basic function to which it is related. Accordingly, a value modified by a term or terms, such as “about”, “approximately”, and “substantially”, are not to be limited to the precise value specified. In at least some instances, the approximating language may correspond to the precision of an instrument for measuring the value.
- range limitations may be combined and/or interchanged; such ranges are identified and include all the sub-ranges contained therein unless context or language indicates otherwise.
- non-transitory computer-readable media is intended to be representative of any tangible computer-based device implemented in any method or technology for short-term and long-term storage of information, such as, computer-readable instructions, data structures, program modules and sub-modules, or other data in any device. Therefore, the methods described herein may be encoded as executable instructions embodied in a tangible, non-transitory, computer readable medium, including, without limitation, a storage device and/or a memory device. Such instructions, when executed by a processor, cause the processor to perform at least a portion of the methods described herein.
- non-transitory computer-readable media includes all tangible, computer-readable media, including, without limitation, non-transitory computer storage devices, including, without limitation, volatile and nonvolatile media, and removable and non-removable media such as a firmware, physical and virtual storage, CD-ROMs, DVDs, and any other digital source such as a network or the Internet, as well as yet to be developed digital means, with the sole exception being a transitory, propagating signal.
- the term “real-time” refers to at least one of the time of occurrence of the associated events, the time of measurement and collection of predetermined data, the time to process the data, and the time of a system response to the events and the environment. In the embodiments described herein, these activities and events occur substantially instantaneously.
- a port security device is configured to obstruct a port of the system and provide an indication when someone attempts to remove the port security device without authorization.
- the port security device has an unlocked position and a locked position. In the unlocked position, the port security device is able to be removed from the port. In the locked position, the security device is inhibited from being removed from the port and the port security device prevents objects from being positioned in the port.
- the port security device provides an indication when the port security device is moved between the locked position and the unlocked position and/or when a person attempts to access the port.
- the port security device includes a sensor, an internal power supply, a controller, a transceiver, and an alarm.
- the sensor is configured to detect when the port security device is displaced and send a signal to the controller.
- the controller is configured to exchange signals with an application server using the transceiver and to provide active indications in real-time to an operator when the sensor detects displacement of the port security device.
- the port security device provides increased security against system threats due to physical access to interconnected devices.
- the port security device operates at the physical location of the potential vulnerability to provide direct protection.
- the port security device is configured to work with an access monitoring system that is external to the system to provide reliable cyber security logging, monitoring, alerting, and/or compliance functionality.
- the system 100 may include at least one device that includes at least one electrical component.
- the system 100 includes an interconnected computing device 102 such as a personal computer, a switch, a router, a server, a communication component, a handheld electronic device, and/or an appliance.
- the interconnected computing device 102 includes a plurality of input/outputs, broadly ports, 104 .
- the ports 104 may be used as inputs and/or outputs and configured to receive, for example and without limitation, a cable 106 , a data storage device (not shown), a wireless networking device (not shown), D-sub combination (DB) class connectors such as DB9 and DB25 connectors, and/or registered jack (RJ) class connectors such as RJ45 and RJ11 connectors.
- the ports 104 may include, without limitation, Universal Serial Bus (USB) ports, serial ports, parallel ports, video graphics array (VGA) ports, Firewire ports, sockets, Ethernet ports, personal system (PS)/2 ports, digital video interface (DVI) ports, and recommended standard (RS) or Electronic Industries Alliance class ports such as RS-232 ports.
- Ports 104 may be used for network connectivity, console commands, removable media, or input/output devices. Accordingly, the ports 104 may allow access to the interconnected computing device 102 and/or allow the interconnected computing device 102 to communicate with other interconnected computing devices 102 . In other embodiments, the interconnected computing device 102 may include any port 104 that enables the interconnected computing device 102 to operate as described herein.
- a port security device 108 is configured to obstruct at least one of the ports 104 of the system 100 .
- the port security device 108 protects a single port 104 .
- the port security devices 108 may protect any of the ports 104 .
- a single port security device 108 may be used to protect multiple ports 104 .
- the port security devices 108 may be used for ports 104 connected to the cable 106 and/or empty ports 104 .
- the port security device 108 may be used with any device including ports 104 and not necessarily with the interconnected computing device 102 shown in FIG. 1 .
- the port security device 108 may be used with a device including at least one electronic component and at least one port.
- the port security device 108 may be used with a device not connected to a network.
- the cable 106 includes a plug 110 (shown in FIG. 2 ) that is configured to extend into and engage the port 104 .
- the cable 106 extends from the port 104 and through the port security device towards a server or other suitable device. Accordingly, the cable 106 provides a physical connection to a network to allow the interconnected computing device 102 to communicate on network infrastructures including, for example and without limitation, industrial control systems, cloud infrastructures, enterprise environments, and the internet.
- the system 100 may include a computing device not connected to a network.
- the computing device 102 may be a stand-alone device such as a consumer appliance and/or a computing device configured for wireless communication.
- the port security device 108 is configured to connect to the cable 106 and allow the cable 106 to be connected to the port 104 (shown in FIG. 1 ).
- FIG. 2 shows the port security device 108 connected to the cable 106 and in an unlocked position.
- FIG. 3 shows the port security device 108 connected to the cable 106 and in a locked position. In the unlocked position, the port security device 108 allows the cable 106 to be removed from the port 104 . In the locked position, the port security device 108 inhibits the cable 106 from being removed from the port 104 and prevents objects from being positioned in the port 104 .
- the port security device 108 may be configured to connect to the port 104 without the cable 106 .
- the port security device 108 includes the plug 110 configured to extend into the port 104 .
- the port security device 108 includes a housing 112 , a sensor 114 , an internal power source 116 , a controller 118 , a transceiver 120 , a light, broadly an alarm, 122 , and a speaker, broadly an alarm, 124 .
- the system 100 may include any suitable components that enable the port security device 108 to function as described herein.
- at least some components of the port security device 108 such as the sensor 114 and/or the transceiver 120 , may be incorporated into the cable 106 and/or the interconnected computing device 102 .
- the housing 112 is configured to at least partially enclose and protect internal components of the system 100 such as the sensor 114 , the power source 116 , the controller 118 , the transceiver 120 , the light 122 , and the speaker 124 .
- the power source 116 , the controller 118 , the transceiver 120 , and the speaker 124 are positioned within an interior space of the housing 112 .
- the light 122 extends at least partially on an exterior of the housing 112 such that the light 122 may be visible on the exterior of the housing 112 .
- the housing 112 includes a first end 126 , a second end 128 , and a sidewall 130 extending between the first end 126 and the second end 128 .
- a partition 132 is positioned intermediate the first end 126 and the second end 128 and divides the interior space of the housing 112 .
- the partition 132 , the second end 128 , and the sidewall 130 prevent objects on the exterior of housing 112 from contacting the controller 118 , the transceiver 120 , and the speaker 124 .
- the first end 126 , the second end 128 , and the partition 132 define openings 134 configured to receive the cable 106 such that the cable 106 extends through the interior space of the housing 112 and the housing 112 extends about the cable 106 .
- the housing 112 is configured to cover the plug 110 and prevent the cable 106 and the plug 110 from being disconnected from the port 104 when the port security device 108 is in the locked position.
- the port security device 108 may include any housing 112 that enables the port security device 108 to function as described herein.
- the housing 112 and the plug 110 are connected in assembly and the port security device 108 is configured to connect to the port 104 without the cable 106 being connected to the port 104 .
- the housing 112 may be assembled in any manner and with any materials that enable the housing 112 to function as described herein.
- the housing 112 may be constructed of resilient materials such as plastics and/or metals.
- the housing 112 and the cable 106 are configured to prevent removal of the housing 112 from the cable 106 .
- the housing 112 and the cable 106 may be assembled as a single unit.
- the housing 112 may be assembled separately and connected to a cable 106 to allow the port security device 108 to be retrofitted to a cable 106 installed in a port 104 .
- the housing 112 may be assembled from multiple parts that connect together and capture the cable 106 to form a permanent assembly.
- the plug 110 may be at least temporarily removed to allow the housing 112 to slide onto the cable 106 .
- the housing 112 includes a hinge to facilitate the housing 112 capturing the cable 106 between two hinged portions.
- the housing 112 includes a locking mechanism to secure the housing 112 to the cable 106 .
- the housing 112 may include, without limitation, a clamp, a padlock, a bolt, a cam, a lever, a keyed opening, magnets, and any other suitable locking feature.
- the port security device 108 includes a collar 136 configured to connect to the cable 106 adjacent the plug 110 and engage the housing 112 .
- the collar 136 engages a lock 138 of the housing 112 .
- the collar 136 has an annular shape and is configured to extend about the cable 106 .
- the collar 136 includes a plate 139 configured to contact the plug 110 and a rim 140 opposite the plate 139 .
- the lock 138 extends from the housing 112 and is configured to contact the rim 140 .
- the lock 138 is displaceable to allow the rim 140 to pass the lock 138 when the port security device 108 moves from the unlocked position to the locked position.
- the port security device 108 When the port security device 108 is in the locked position, the lock 138 contacts the rim 140 and prevents separation of the housing 112 and the collar 136 . A release 142 may be actuated to displace the lock 138 and allow the port security device 108 to be moved from the locked position to the unlocked position. In some embodiments, a tool corresponding to the port security device 108 may be required to actuate the release 142 .
- the port security device 108 may include any locking mechanism that enables the port security device 108 to operate as described herein.
- the port security device 108 may include, without limitation, a clamp, a padlock, a bolt, a cam, a lever, a keyed opening, magnets, and any other suitable locking feature.
- the collar 136 may be attached to the plug 110 in any manner.
- the collar 136 and the plug 110 may be attached using adhesives, welds, fasteners, locking features, and any other suitable attachment means.
- the collar 136 is permanently attached to the plug 110 . Accordingly, the collar 136 prevents movement of the housing 112 relative to the plug 110 when the port security device 108 is in the locked position.
- the collar 136 may be omitted and the housing 112 may directly engage the plug 110 .
- the sensor 114 is configured to detect a position of the port security device 108 relative to the cable 106 and/or the port 104 .
- the port security device 108 may include any suitable sensor.
- the port security device includes, without limitation, a contact sensor, a capacitive sensor, an optical sensor, an accelerometer, and an acoustic sensor.
- the sensor 114 includes a pressure sensor that detects when the collar 132 has engaged the housing 112 .
- the sensor 114 sends a signal to the controller 118 when the port security device 108 moves relative to the cable 106 and/or the port 104 .
- the controller 118 may determine when the port security device 108 has been tampered with and/or removed from the cable 106 and/or the port 104 .
- the controller 118 may activate the speaker 124 , the light 122 , and/or the transceiver 120 to provide an indication to a system administrator and/or other suitable persons when the port security device 108 has been tampered with and/or removed from the cable 106 and/or the port 104 .
- the speaker 124 and the light 122 may be configured to provide an alarm for people in the vicinity of the interconnected computing device 102 .
- the port security device 108 may include any suitable alarm.
- the port security device 108 and/or the controller 118 may be configured to send a notification such as a text message, email, telephone call, and/or other communication to a user.
- the controller 118 includes a control board 143 and a plurality of electronic components mounted on the control board.
- an electrical current sensor 144 and the transceiver 120 are mounted on the control board 143 .
- the electronic components may be connected by a circuit and receive power from the power source 116 .
- the controller 118 is a programmable logic controller (PLC).
- the port security device 108 may include any controller 118 that enables the port security device 108 to operate as described herein.
- the electrical current sensor 144 may detect transmission of signals through the cable 106 . Accordingly, the port security device 108 may be used to monitor usage of the port 104 . For example, the port security device 108 may provide an alarm if the port security device 108 detects transmission of signals through the cable 106 when the port 104 has been previously disabled.
- the transceiver 120 is configured to exchange signals with at least one other electronic device.
- the transceiver 120 may enable the port security device 108 to communicate using one or more wireless communication systems.
- the transceiver 120 may utilize electromagnetic waves, acoustic frequencies, visual signals, and/or any suitable communication signal.
- the transceiver 120 may send the signal to the access point 146 , a relay, and/or any other suitable component.
- the system 100 may communicate through a wired connection in addition to and/or in place of a wireless connection.
- the transceiver 120 is connected to a cable extending from the housing 112 and configured to provide a wired connection between the port security device 108 , the access point 146 , and/or a remote computing device.
- a plurality of the port security devices 108 may be connected together in assembly by a wired connection and the assembly may communicate information with a remote computing device.
- the transceiver 120 is incorporated into a separate housing connected to the assembly of port security devices 108 .
- the port security device 108 may include any communication component that enables the port security device 108 to operate as described herein.
- the transceiver 120 may be omitted or selectively turned off and the port security device 108 may be configured to not communicate with other devices, i.e., the port security device 108 may operate “off the grid.”
- the transceiver 120 allows the port security device 108 to communicate with an access point 146 and an application server, broadly a computing device, 148 remote from the port security device 108 and the interconnected computing device 102 .
- the access point 146 provides a connection between the transceiver 120 and the application server 148 to allow communication between the transceiver and the application server.
- the access point 146 may be a separate computing device or incorporated into the application server 148 .
- the transceiver 120 and the application server 148 communicate on a network that excludes the interconnected computing device 102 .
- the interconnected computing device 102 may communicate on a first network and the port security device 108 may communicate on a second network such that the application server 148 and the port security device 108 are out-of-band of the interconnected computing device 102 .
- an unauthorized user cannot control the port security device 108 from the interconnected computing device 102 .
- at least some known computing devices rely on a controller and/or programming on the computing device itself to provide security for ports.
- an unauthorized user may deactivate security measures at the computing device itself or at other devices on the same network. Accordingly, such internal programming measures have provided a false sense of security and have prevented persons from recognizing the vulnerability of the ports 104 .
- the port security device 108 described herein is controlled separately and may be isolated from the interconnected computing device 102 and other devices on the same network.
- the port security device 108 may be incorporated into a standalone security system and/or may be integrated into Security Information Event Monitoring (SIEM) infrastructure.
- SIEM Security Information Event Monitoring
- the port security device 108 is configured to provide data relating to the operational status of the port security device 108 and/or the port 104 . Accordingly, the port security device 108 allows monitoring and/or logging of operation of the system 100 .
- the port security device 108 may transmit and/or store information relating to an operational status of the port security device 108 and/or the port 104 .
- the port security device 108 may transmit information at regular intervals and/or respond to requests for information from remote computing devices.
- the operational status may include power levels, activity data, diagnostic data, communication data, sensor status, alerts, inputs, outputs, and any other operational data.
- the port security device 108 may store and/or transmit any information that enables the system 100 to operate as described herein.
- the port security device 108 may include a user interface configured to receive inputs from a user and to display information to the user.
- the port security device 108 includes the light 122 which provides a visual indication to the user of a status of the port security device 108 .
- the light 122 may be activated when the housing 112 is displaced.
- the light 122 may change colors to display different operational states of the port security device 108 .
- the system may include any user interface that enables the port security device 108 to operate as described herein.
- the port security device 108 may include, without limitation, a touch screen, a display screen, a keyboard, a light, a speaker, a joystick, a computer mouse, a scroll ball, a microphone, a camera, a sensor, and any other suitable user interface component.
- the user interface may be incorporated into the application server 148 .
- the power source 116 is sized to fit within the housing 112 .
- the power source 116 is completely enclosed in the housing 112 .
- the housing 112 and the power source 116 are configured to prevent tampering with the power source 116 .
- a portion of the power source 116 such as an input/output connector, may extend to the exterior of the housing 112 .
- the power source 116 allows the port security device 108 to have a compact and portable configuration because the power source 116 is within the housing 112 .
- the power source 116 may be removable from other components of the system 100 .
- the power source 116 may be positioned in a second housing (not shown) that is positioned within and/or attached to the housing 112 .
- the port security device 108 may draw at least some power from an external power supply such as the port 104 .
- the power source 116 may be omitted.
- the housing 112 of the port security device 108 is coupled about the cable 106 such that the housing 112 is movable along the cable 106 relative to the plug 110 of the cable 106 .
- the housing 112 is moved toward the port 104 until the housing 112 covers the port 104 and the plug 110 .
- the lock 138 engages the collar 136 to secure the housing 112 in position relative to the plug 110 and the port 104 .
- the port security device 108 prevents access to the port 104 .
- the port security device detects if a user attempts to displace the housing 112 .
- the senor 114 is configured to detect when the port security device 108 moves between the locked position and the unlocked position.
- the sensor 144 is configured to detect transmission of a signal through the port 104 and/or the cable 106 .
- the port security device 108 provides an alarm and/or transmits a signal to the access point 146 when the sensor 144 detects movement of the port security device 108 .
- the access point 146 is configured to receive signals from the port security device 108 and determine a status of the port security device 108 .
- the application server 148 and/or the access point 146 may be configured to send a signal to the port security device 108 to at least partially disable the port security device 108 and allow removal of the port security device 108 .
- the port security device 108 may be inactive, i.e., in a sleep mode, when the port security device 108 remains in the locked position and activates when the sensor 114 detects movement and/or when the port security device 108 receives a signal from the access point 146 .
- the access point 146 may be configured to periodically send signals to the port security device 108 , i.e., ping the port security device 108 , to check the status.
- a computing device connected to the access point 146 such as the application server 148 , may be configured to provide an indication to the operator if the access point 146 does not receive a signal or response from the port security device 108 .
- the port security device 108 provides increased protection of systems by inhibiting access to interconnected computing devices through ports. Accordingly, the port security device 108 may facilitate compliance with regulatory standards issued by organizations such as the North American Electric Reliability Corporation (NERC). For example, the port security device 108 is configured to facilitate compliance with NERC's Critical Infrastructure Protection (CIP) Standard CIP-007-6 R1.2, which requires protection against the use of unnecessary physical input/output ports used for network connectivity, console commands, or removable media.
- CIP Critical Infrastructure Protection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Alarm Systems (AREA)
Abstract
Description
- This application is a 371 National Stage of International Application No. PCT/US2018/026298, filed Apr. 5, 2018, which claims priority to and the benefits of U.S. patent application Ser. No. 15/490,645, filed Apr. 18, 2017, and issued as U.S. Pat. No. 9,965,655. Each of the preceding patent applications is hereby incorporated by reference in its entirety.
- The field of the disclosure relates generally to security devices for computing devices. More particularly, this disclosure relates to a security device for a port of a computing device.
- At least some computing devices include at least one port that is configured to receive a cable or other data transfer component. However, the port may allow unauthorized users to access the device and other devices. Accordingly, at least some computing devices include a controller configured to selectively disable the port. However, an unauthorized user may use the computing device to activate the port and, thereby, gain access to the interconnected devices. Accordingly, at least some computing devices include a blocking mechanism inserted into the port to restrict access. However, an unauthorized user may be able to remove and/or disable the mechanism without immediate detection. At least some known blocking mechanisms may include a seal or tamper tape that is broken when the blocking mechanism has been tampered with. However, such mechanisms rely on a person in the vicinity of the device to inspect the mechanisms to determine if tampering has occurred and do not provide real-time indications of tampering to an administrator. Accordingly, tampering may be unobserved and the interconnected devices may be vulnerable to unauthorized users for a prolonged period of time. Moreover, such manual inspections may be prone to misinterpretation and false positives.
- Therefore, there is a need for security devices for ports of a computing device that inhibit unauthorized access and provide an alarm if an unauthorized user attempts to access the computing device.
- In one aspect, a system includes a first computing device and a second computing device. The first computing device includes a port. The second computing device is configured to communicate with the first computing device. The system also includes a port security device configured to restrict access to the port. The port security device includes a transceiver configured to communicate with a third computing device. The third computing device is configured to determine a status of the port security device. At least one of the port security device and the third computing device includes a user interface configured to provide an indication of the status of the port security device.
- In another aspect, a port security device for use with a computing device includes a housing configured to move relative to a plug positioned in a port of the computing device. The port security device is positionable between a locked position in which the housing inhibits access to the port and an unlocked position in which the housing allows access to the port. The port security device also includes a sensor configured to detect when the port security device moves between the locked position and the unlocked position.
- In yet another aspect, a method of securing a port of an interconnected computing device includes providing a port security device configured to connect to the interconnected computing device adjacent the port. The port security device includes a housing. The port security device is positionable between a locked position in which the housing inhibits access to the port and an unlocked position in which the housing allows access to the port. The method also includes detecting, using a sensor, when the port security device moves between the locked position and the unlocked position. The method further includes sending a signal to an access point when the sensor detects that the port security device moves between the locked position and the unlocked position.
-
FIG. 1 is a schematic view of a system including interconnected devices. -
FIG. 2 is a sectional view of a port security device in an unlocked position. -
FIG. 3 is a sectional view of a port security device in a locked position. - Corresponding reference characters indicate corresponding parts throughout the several views of the drawings.
- In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings.
- The singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise.
- “Optional” or “optionally” means that the subsequently described event or circumstance may or may not occur, and that the description includes instances where the event occurs and instances where it does not.
- Approximating language, as used herein throughout the specification and claims, may be applied to modify any quantitative representation that may permissibly vary without resulting in a change in the basic function to which it is related. Accordingly, a value modified by a term or terms, such as “about”, “approximately”, and “substantially”, are not to be limited to the precise value specified. In at least some instances, the approximating language may correspond to the precision of an instrument for measuring the value. Here and throughout the specification and claims, range limitations may be combined and/or interchanged; such ranges are identified and include all the sub-ranges contained therein unless context or language indicates otherwise.
- As used herein, the term “non-transitory computer-readable media” is intended to be representative of any tangible computer-based device implemented in any method or technology for short-term and long-term storage of information, such as, computer-readable instructions, data structures, program modules and sub-modules, or other data in any device. Therefore, the methods described herein may be encoded as executable instructions embodied in a tangible, non-transitory, computer readable medium, including, without limitation, a storage device and/or a memory device. Such instructions, when executed by a processor, cause the processor to perform at least a portion of the methods described herein. Moreover, as used herein, the term “non-transitory computer-readable media” includes all tangible, computer-readable media, including, without limitation, non-transitory computer storage devices, including, without limitation, volatile and nonvolatile media, and removable and non-removable media such as a firmware, physical and virtual storage, CD-ROMs, DVDs, and any other digital source such as a network or the Internet, as well as yet to be developed digital means, with the sole exception being a transitory, propagating signal.
- Furthermore, as used herein, the term “real-time” refers to at least one of the time of occurrence of the associated events, the time of measurement and collection of predetermined data, the time to process the data, and the time of a system response to the events and the environment. In the embodiments described herein, these activities and events occur substantially instantaneously.
- The embodiments described herein inhibit unauthorized access to systems. For example, a port security device is configured to obstruct a port of the system and provide an indication when someone attempts to remove the port security device without authorization. The port security device has an unlocked position and a locked position. In the unlocked position, the port security device is able to be removed from the port. In the locked position, the security device is inhibited from being removed from the port and the port security device prevents objects from being positioned in the port. In addition, in some embodiments, the port security device provides an indication when the port security device is moved between the locked position and the unlocked position and/or when a person attempts to access the port. In some embodiments, the port security device includes a sensor, an internal power supply, a controller, a transceiver, and an alarm. The sensor is configured to detect when the port security device is displaced and send a signal to the controller. The controller is configured to exchange signals with an application server using the transceiver and to provide active indications in real-time to an operator when the sensor detects displacement of the port security device.
- As a result, the port security device provides increased security against system threats due to physical access to interconnected devices. In addition, the port security device operates at the physical location of the potential vulnerability to provide direct protection. Moreover, the port security device is configured to work with an access monitoring system that is external to the system to provide reliable cyber security logging, monitoring, alerting, and/or compliance functionality.
- Referring now to the drawings and in particular to
FIG. 1 , one embodiment of a system is designated in its entirety by thereference number 100. In suitable embodiments, thesystem 100 may include at least one device that includes at least one electrical component. In the illustrated embodiment, thesystem 100 includes aninterconnected computing device 102 such as a personal computer, a switch, a router, a server, a communication component, a handheld electronic device, and/or an appliance. Theinterconnected computing device 102 includes a plurality of input/outputs, broadly ports, 104. Theports 104 may be used as inputs and/or outputs and configured to receive, for example and without limitation, acable 106, a data storage device (not shown), a wireless networking device (not shown), D-sub combination (DB) class connectors such as DB9 and DB25 connectors, and/or registered jack (RJ) class connectors such as RJ45 and RJ11 connectors. For example, theports 104 may include, without limitation, Universal Serial Bus (USB) ports, serial ports, parallel ports, video graphics array (VGA) ports, Firewire ports, sockets, Ethernet ports, personal system (PS)/2 ports, digital video interface (DVI) ports, and recommended standard (RS) or Electronic Industries Alliance class ports such as RS-232 ports.Ports 104 may be used for network connectivity, console commands, removable media, or input/output devices. Accordingly, theports 104 may allow access to theinterconnected computing device 102 and/or allow theinterconnected computing device 102 to communicate with otherinterconnected computing devices 102. In other embodiments, theinterconnected computing device 102 may include anyport 104 that enables theinterconnected computing device 102 to operate as described herein. - A
port security device 108 is configured to obstruct at least one of theports 104 of thesystem 100. In the illustrated embodiment, theport security device 108 protects asingle port 104. In other embodiments, theport security devices 108 may protect any of theports 104. For example, in some embodiments, a singleport security device 108 may be used to protectmultiple ports 104. Theport security devices 108 may be used forports 104 connected to thecable 106 and/orempty ports 104. In some embodiments, theport security device 108 may be used with anydevice including ports 104 and not necessarily with theinterconnected computing device 102 shown inFIG. 1 . For example, theport security device 108 may be used with a device including at least one electronic component and at least one port. In some embodiments, theport security device 108 may be used with a device not connected to a network. - The
cable 106 includes a plug 110 (shown inFIG. 2 ) that is configured to extend into and engage theport 104. Thecable 106 extends from theport 104 and through the port security device towards a server or other suitable device. Accordingly, thecable 106 provides a physical connection to a network to allow theinterconnected computing device 102 to communicate on network infrastructures including, for example and without limitation, industrial control systems, cloud infrastructures, enterprise environments, and the internet. In other embodiments, thesystem 100 may include a computing device not connected to a network. For example, in some embodiments, thecomputing device 102 may be a stand-alone device such as a consumer appliance and/or a computing device configured for wireless communication. - As shown in
FIG. 2 , theport security device 108 is configured to connect to thecable 106 and allow thecable 106 to be connected to the port 104 (shown inFIG. 1 ).FIG. 2 shows theport security device 108 connected to thecable 106 and in an unlocked position.FIG. 3 shows theport security device 108 connected to thecable 106 and in a locked position. In the unlocked position, theport security device 108 allows thecable 106 to be removed from theport 104. In the locked position, theport security device 108 inhibits thecable 106 from being removed from theport 104 and prevents objects from being positioned in theport 104. In other embodiments, theport security device 108 may be configured to connect to theport 104 without thecable 106. For example, in some embodiments, theport security device 108 includes theplug 110 configured to extend into theport 104. - The
port security device 108 includes ahousing 112, asensor 114, aninternal power source 116, acontroller 118, atransceiver 120, a light, broadly an alarm, 122, and a speaker, broadly an alarm, 124. In alternative embodiments, thesystem 100 may include any suitable components that enable theport security device 108 to function as described herein. In some embodiments, at least some components of theport security device 108, such as thesensor 114 and/or thetransceiver 120, may be incorporated into thecable 106 and/or theinterconnected computing device 102. - The
housing 112 is configured to at least partially enclose and protect internal components of thesystem 100 such as thesensor 114, thepower source 116, thecontroller 118, thetransceiver 120, the light 122, and thespeaker 124. Thepower source 116, thecontroller 118, thetransceiver 120, and thespeaker 124 are positioned within an interior space of thehousing 112. The light 122 extends at least partially on an exterior of thehousing 112 such that the light 122 may be visible on the exterior of thehousing 112. Thehousing 112 includes afirst end 126, asecond end 128, and asidewall 130 extending between thefirst end 126 and thesecond end 128. In addition, apartition 132 is positioned intermediate thefirst end 126 and thesecond end 128 and divides the interior space of thehousing 112. Thepartition 132, thesecond end 128, and thesidewall 130 prevent objects on the exterior ofhousing 112 from contacting thecontroller 118, thetransceiver 120, and thespeaker 124. Thefirst end 126, thesecond end 128, and thepartition 132 defineopenings 134 configured to receive thecable 106 such that thecable 106 extends through the interior space of thehousing 112 and thehousing 112 extends about thecable 106. Thehousing 112 is configured to cover theplug 110 and prevent thecable 106 and theplug 110 from being disconnected from theport 104 when theport security device 108 is in the locked position. In alternative embodiments, theport security device 108 may include anyhousing 112 that enables theport security device 108 to function as described herein. For example, in some embodiments, thehousing 112 and theplug 110 are connected in assembly and theport security device 108 is configured to connect to theport 104 without thecable 106 being connected to theport 104. - In suitable embodiments, the
housing 112 may be assembled in any manner and with any materials that enable thehousing 112 to function as described herein. For example, in some embodiments, thehousing 112 may be constructed of resilient materials such as plastics and/or metals. Suitably, thehousing 112 and thecable 106 are configured to prevent removal of thehousing 112 from thecable 106. For example, in some embodiments, thehousing 112 and thecable 106 may be assembled as a single unit. In other embodiments, thehousing 112 may be assembled separately and connected to acable 106 to allow theport security device 108 to be retrofitted to acable 106 installed in aport 104. For example, thehousing 112 may be assembled from multiple parts that connect together and capture thecable 106 to form a permanent assembly. In further embodiments, theplug 110 may be at least temporarily removed to allow thehousing 112 to slide onto thecable 106. In further embodiments, thehousing 112 includes a hinge to facilitate thehousing 112 capturing thecable 106 between two hinged portions. In addition, in some embodiments, thehousing 112 includes a locking mechanism to secure thehousing 112 to thecable 106. For example, in some embodiments, thehousing 112 may include, without limitation, a clamp, a padlock, a bolt, a cam, a lever, a keyed opening, magnets, and any other suitable locking feature. - The
port security device 108 includes acollar 136 configured to connect to thecable 106 adjacent theplug 110 and engage thehousing 112. In particular, when theport security device 108 is in the locked position, thecollar 136 engages alock 138 of thehousing 112. Thecollar 136 has an annular shape and is configured to extend about thecable 106. Thecollar 136 includes aplate 139 configured to contact theplug 110 and arim 140 opposite theplate 139. Thelock 138 extends from thehousing 112 and is configured to contact therim 140. Thelock 138 is displaceable to allow therim 140 to pass thelock 138 when theport security device 108 moves from the unlocked position to the locked position. When theport security device 108 is in the locked position, thelock 138 contacts therim 140 and prevents separation of thehousing 112 and thecollar 136. Arelease 142 may be actuated to displace thelock 138 and allow theport security device 108 to be moved from the locked position to the unlocked position. In some embodiments, a tool corresponding to theport security device 108 may be required to actuate therelease 142. In alternative embodiments, theport security device 108 may include any locking mechanism that enables theport security device 108 to operate as described herein. For example, in some embodiments, theport security device 108 may include, without limitation, a clamp, a padlock, a bolt, a cam, a lever, a keyed opening, magnets, and any other suitable locking feature. - In suitable embodiments, the
collar 136 may be attached to theplug 110 in any manner. For example, thecollar 136 and theplug 110 may be attached using adhesives, welds, fasteners, locking features, and any other suitable attachment means. In the illustrated embodiment, thecollar 136 is permanently attached to theplug 110. Accordingly, thecollar 136 prevents movement of thehousing 112 relative to theplug 110 when theport security device 108 is in the locked position. In alternative embodiments, thecollar 136 may be omitted and thehousing 112 may directly engage theplug 110. - The
sensor 114 is configured to detect a position of theport security device 108 relative to thecable 106 and/or theport 104. Theport security device 108 may include any suitable sensor. For example, in some embodiments, the port security device includes, without limitation, a contact sensor, a capacitive sensor, an optical sensor, an accelerometer, and an acoustic sensor. In the illustrated embodiment, thesensor 114 includes a pressure sensor that detects when thecollar 132 has engaged thehousing 112. - The
sensor 114 sends a signal to thecontroller 118 when theport security device 108 moves relative to thecable 106 and/or theport 104. As a result, thecontroller 118 may determine when theport security device 108 has been tampered with and/or removed from thecable 106 and/or theport 104. Thecontroller 118 may activate thespeaker 124, the light 122, and/or thetransceiver 120 to provide an indication to a system administrator and/or other suitable persons when theport security device 108 has been tampered with and/or removed from thecable 106 and/or theport 104. For example, thespeaker 124 and the light 122 may be configured to provide an alarm for people in the vicinity of theinterconnected computing device 102. Accordingly, such alarms or active signals may deter unauthorized users. In addition, the alarms are configured to attract attention and reduce the possibility of people not observing and/or ignoring the indication of tampering. In contrast, at least some known tamper indicators are passive and require a person to inspect a tamper indicator and determine if tampering has occurred. In alternative embodiments, theport security device 108 may include any suitable alarm. For example, in some embodiments, theport security device 108 and/or thecontroller 118 may be configured to send a notification such as a text message, email, telephone call, and/or other communication to a user. - The
controller 118 includes acontrol board 143 and a plurality of electronic components mounted on the control board. For example, in the illustrated embodiment, an electricalcurrent sensor 144 and thetransceiver 120 are mounted on thecontrol board 143. The electronic components may be connected by a circuit and receive power from thepower source 116. In the exemplary embodiment, thecontroller 118 is a programmable logic controller (PLC). In alternative embodiments, theport security device 108 may include anycontroller 118 that enables theport security device 108 to operate as described herein. - The electrical
current sensor 144 may detect transmission of signals through thecable 106. Accordingly, theport security device 108 may be used to monitor usage of theport 104. For example, theport security device 108 may provide an alarm if theport security device 108 detects transmission of signals through thecable 106 when theport 104 has been previously disabled. - In reference to
FIGS. 1 and 2 , thetransceiver 120 is configured to exchange signals with at least one other electronic device. For example, thetransceiver 120 may enable theport security device 108 to communicate using one or more wireless communication systems. Thetransceiver 120 may utilize electromagnetic waves, acoustic frequencies, visual signals, and/or any suitable communication signal. Thetransceiver 120 may send the signal to theaccess point 146, a relay, and/or any other suitable component. In some embodiments, thesystem 100 may communicate through a wired connection in addition to and/or in place of a wireless connection. For example, in some embodiments, thetransceiver 120 is connected to a cable extending from thehousing 112 and configured to provide a wired connection between theport security device 108, theaccess point 146, and/or a remote computing device. In further embodiments, a plurality of theport security devices 108 may be connected together in assembly by a wired connection and the assembly may communicate information with a remote computing device. In some embodiments, thetransceiver 120 is incorporated into a separate housing connected to the assembly ofport security devices 108. In alternative embodiments, theport security device 108 may include any communication component that enables theport security device 108 to operate as described herein. In some embodiments, thetransceiver 120 may be omitted or selectively turned off and theport security device 108 may be configured to not communicate with other devices, i.e., theport security device 108 may operate “off the grid.” - Accordingly, the
transceiver 120 allows theport security device 108 to communicate with anaccess point 146 and an application server, broadly a computing device, 148 remote from theport security device 108 and theinterconnected computing device 102. Theaccess point 146 provides a connection between thetransceiver 120 and theapplication server 148 to allow communication between the transceiver and the application server. In some embodiments, theaccess point 146 may be a separate computing device or incorporated into theapplication server 148. Suitably, thetransceiver 120 and theapplication server 148 communicate on a network that excludes theinterconnected computing device 102. In other words, theinterconnected computing device 102 may communicate on a first network and theport security device 108 may communicate on a second network such that theapplication server 148 and theport security device 108 are out-of-band of theinterconnected computing device 102. As a result, an unauthorized user cannot control theport security device 108 from theinterconnected computing device 102. In contrast, at least some known computing devices rely on a controller and/or programming on the computing device itself to provide security for ports. As a result, in the known computing devices, an unauthorized user may deactivate security measures at the computing device itself or at other devices on the same network. Accordingly, such internal programming measures have provided a false sense of security and have prevented persons from recognizing the vulnerability of theports 104. In contrast, theport security device 108 described herein is controlled separately and may be isolated from theinterconnected computing device 102 and other devices on the same network. In suitable embodiments, theport security device 108 may be incorporated into a standalone security system and/or may be integrated into Security Information Event Monitoring (SIEM) infrastructure. - In addition, the
port security device 108 is configured to provide data relating to the operational status of theport security device 108 and/or theport 104. Accordingly, theport security device 108 allows monitoring and/or logging of operation of thesystem 100. For example, theport security device 108 may transmit and/or store information relating to an operational status of theport security device 108 and/or theport 104. In some embodiments, theport security device 108 may transmit information at regular intervals and/or respond to requests for information from remote computing devices. The operational status may include power levels, activity data, diagnostic data, communication data, sensor status, alerts, inputs, outputs, and any other operational data. In alternative embodiments, theport security device 108 may store and/or transmit any information that enables thesystem 100 to operate as described herein. - In some embodiments, the
port security device 108 may include a user interface configured to receive inputs from a user and to display information to the user. In the exemplary embodiment, theport security device 108 includes the light 122 which provides a visual indication to the user of a status of theport security device 108. For example, in some embodiments, the light 122 may be activated when thehousing 112 is displaced. In further embodiments, the light 122 may change colors to display different operational states of theport security device 108. In alternative embodiments, the system may include any user interface that enables theport security device 108 to operate as described herein. For example, in some embodiments, theport security device 108 may include, without limitation, a touch screen, a display screen, a keyboard, a light, a speaker, a joystick, a computer mouse, a scroll ball, a microphone, a camera, a sensor, and any other suitable user interface component. In some embodiments, the user interface may be incorporated into theapplication server 148. - In addition, as shown in
FIGS. 2 and 3 , thepower source 116 is sized to fit within thehousing 112. In particular, in the illustrated embodiment, thepower source 116 is completely enclosed in thehousing 112. Accordingly, thehousing 112 and thepower source 116 are configured to prevent tampering with thepower source 116. In some embodiments, a portion of thepower source 116, such as an input/output connector, may extend to the exterior of thehousing 112. Thepower source 116 allows theport security device 108 to have a compact and portable configuration because thepower source 116 is within thehousing 112. In alternative embodiments, thepower source 116 may be removable from other components of thesystem 100. In further embodiments, thepower source 116 may be positioned in a second housing (not shown) that is positioned within and/or attached to thehousing 112. In some embodiments, theport security device 108 may draw at least some power from an external power supply such as theport 104. In such embodiments, thepower source 116 may be omitted. - In reference to
FIGS. 1 and 2 , during operation, thehousing 112 of theport security device 108 is coupled about thecable 106 such that thehousing 112 is movable along thecable 106 relative to theplug 110 of thecable 106. To move theport security device 108 into the locked position, thehousing 112 is moved toward theport 104 until thehousing 112 covers theport 104 and theplug 110. Thelock 138 engages thecollar 136 to secure thehousing 112 in position relative to theplug 110 and theport 104. Accordingly, in the locked position, theport security device 108 prevents access to theport 104. In addition, the port security device detects if a user attempts to displace thehousing 112. For example, thesensor 114 is configured to detect when theport security device 108 moves between the locked position and the unlocked position. In some embodiments, thesensor 144 is configured to detect transmission of a signal through theport 104 and/or thecable 106. In some embodiments, theport security device 108 provides an alarm and/or transmits a signal to theaccess point 146 when thesensor 144 detects movement of theport security device 108. - The
access point 146 is configured to receive signals from theport security device 108 and determine a status of theport security device 108. In addition, theapplication server 148 and/or theaccess point 146 may be configured to send a signal to theport security device 108 to at least partially disable theport security device 108 and allow removal of theport security device 108. In some embodiments, theport security device 108 may be inactive, i.e., in a sleep mode, when theport security device 108 remains in the locked position and activates when thesensor 114 detects movement and/or when theport security device 108 receives a signal from theaccess point 146. In such embodiments, theaccess point 146 may be configured to periodically send signals to theport security device 108, i.e., ping theport security device 108, to check the status. In addition, a computing device connected to theaccess point 146, such as theapplication server 148, may be configured to provide an indication to the operator if theaccess point 146 does not receive a signal or response from theport security device 108. - The
port security device 108 provides increased protection of systems by inhibiting access to interconnected computing devices through ports. Accordingly, theport security device 108 may facilitate compliance with regulatory standards issued by organizations such as the North American Electric Reliability Corporation (NERC). For example, theport security device 108 is configured to facilitate compliance with NERC's Critical Infrastructure Protection (CIP) Standard CIP-007-6 R1.2, which requires protection against the use of unnecessary physical input/output ports used for network connectivity, console commands, or removable media. - When introducing elements of the present invention or the preferred embodiment(s) thereof, the articles “a”, “an”, “the” and “said” are intended to mean that there are one or more of the elements. The terms “comprising”, “including” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements.
- As various changes could be made in the above constructions without departing from the scope of the invention, it is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative and not in a limiting sense. Although specific features of various embodiments of the invention may be shown in some drawings and not in others, this is for convenience only. In accordance with the principles of the invention, any feature of a drawing may be referenced and/or claimed in combination with any feature of any other drawing.
- This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the invention is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal languages of the claims.
Claims (24)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15490645 | 2017-04-18 | ||
US15/490,645 US9965655B1 (en) | 2017-04-18 | 2017-04-18 | Port security device for computing devices and methods of operating such |
PCT/US2018/026298 WO2018194842A1 (en) | 2017-04-18 | 2018-04-05 | Port security device for computing devices and method of operating such |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200050802A1 true US20200050802A1 (en) | 2020-02-13 |
Family
ID=62045129
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/490,645 Active 2037-04-29 US9965655B1 (en) | 2017-04-18 | 2017-04-18 | Port security device for computing devices and methods of operating such |
US16/606,117 Pending US20200050802A1 (en) | 2017-04-18 | 2018-04-05 | Port security device for computing devices and method of operating such |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/490,645 Active 2037-04-29 US9965655B1 (en) | 2017-04-18 | 2017-04-18 | Port security device for computing devices and methods of operating such |
Country Status (4)
Country | Link |
---|---|
US (2) | US9965655B1 (en) |
EP (2) | EP4312142A3 (en) |
CN (2) | CN110731075B (en) |
WO (1) | WO2018194842A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10699013B2 (en) * | 2017-03-20 | 2020-06-30 | Honeywell International Inc. | Systems and methods for USB/firewire port monitoring, filtering, and security |
US11289852B2 (en) * | 2020-02-07 | 2022-03-29 | International Business Machines Corporation | Detecting cable movement in physical ports |
US11947714B2 (en) * | 2021-11-09 | 2024-04-02 | Haier Us Appliance Solutions, Inc. | System and method for authorizing appliance access |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050243059A1 (en) * | 2004-03-16 | 2005-11-03 | Morris Martin G | High-reliability computer interface for wireless input devices |
US20060014441A1 (en) * | 2001-09-18 | 2006-01-19 | Fujitsu Limited | LAN connector having a stopper portion selectively stopping the insertion of a modem cable connector |
US7086876B1 (en) * | 2005-05-03 | 2006-08-08 | John Mezzalingua Associates, Inc. | Coaxial cable port security device and method of use thereof |
US20070140199A1 (en) * | 2002-02-25 | 2007-06-21 | Palm, Inc. | Power saving in multi-processor device |
US20110187532A1 (en) * | 2010-02-02 | 2011-08-04 | Fredric Edelstein | Pluggable security device |
US20110241776A1 (en) * | 2008-02-26 | 2011-10-06 | Dell Products L.P. | Information handling system port security |
US20130040709A1 (en) * | 2009-11-10 | 2013-02-14 | At&T Mobility Ii Llc | Devices, Systems and Methods for Identification Through a Mobile Device |
US20130147626A1 (en) * | 2009-04-06 | 2013-06-13 | Hassan Hammoud | Electronic Mailbox System |
US20140049368A1 (en) * | 2012-08-16 | 2014-02-20 | Schlage Lock Company Llc | Remote notification of phone for home security |
US20140130555A1 (en) * | 2012-11-15 | 2014-05-15 | Jeff Clark | Data port lock |
US20160012258A1 (en) * | 2014-07-09 | 2016-01-14 | Portal Locks, Llc | System and method for securing an input/output port using shape memory alloys in a locking mechanism |
US20160234356A1 (en) * | 2014-09-09 | 2016-08-11 | Ppip Llc | Privacy and security systems and methods of use |
US9460319B1 (en) * | 2016-05-20 | 2016-10-04 | Foxrun Development Co., LLC | Device for securing a computer port |
US9888337B1 (en) * | 2015-07-25 | 2018-02-06 | Gary M. Zalewski | Wireless coded communication (WCC) devices with power harvesting power sources for WiFi communication |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6032256A (en) * | 1995-01-09 | 2000-02-29 | Bernard; Peter Andrew | Power controlled computer security system and method |
US6778100B2 (en) * | 2002-03-06 | 2004-08-17 | Automatika, Inc. | Conduit network system |
US7660316B2 (en) * | 2002-07-02 | 2010-02-09 | Emulex Design & Manufacturing Corporation | Methods and apparatus for device access fairness in fibre channel arbitrated loop systems |
US20050182962A1 (en) * | 2004-02-17 | 2005-08-18 | Paul Given | Computer security peripheral |
US7635272B2 (en) * | 2006-08-17 | 2009-12-22 | Acco Brands Usa Llc | USB port locking and blocking device |
US7530824B2 (en) | 2006-09-05 | 2009-05-12 | Padjack, Inc. | Locking seal for data ports and associated methods |
US7452239B2 (en) | 2006-10-26 | 2008-11-18 | John Mezzalingua Associates Inc. | Coax cable port locking terminator device |
US20090184822A1 (en) * | 2007-12-21 | 2009-07-23 | Acco Brands Usa Llc | Security apparatus with identification mechanism |
WO2010086420A1 (en) * | 2009-01-30 | 2010-08-05 | Precise Biometrics Ab | Password protected secure device |
JP5319573B2 (en) * | 2010-02-23 | 2013-10-16 | 株式会社東海理化電機製作所 | Outlet unauthorized connection prevention device and outlet unit |
JP5443270B2 (en) * | 2010-05-27 | 2014-03-19 | 株式会社東海理化電機製作所 | Plug lock device |
US9075205B2 (en) * | 2012-07-11 | 2015-07-07 | Tyco Electronics Corporation | Connectors and adapters with auto-latching features |
US20140033774A1 (en) * | 2012-08-06 | 2014-02-06 | Kevin OFCHUS | Anti-theft system and method for fuel or other cargo in mobile storage containers |
JP2014121111A (en) * | 2012-12-13 | 2014-06-30 | Tokai Rika Co Ltd | Lock device |
US20140181345A1 (en) * | 2012-12-21 | 2014-06-26 | Nvidia Corporation | Hidden i/o connector assembly for mobile computing devices |
US20150020189A1 (en) * | 2013-07-09 | 2015-01-15 | High Sec Labs Ltd. | Electro-mechanic usb locking device |
EP3050037B1 (en) * | 2013-09-29 | 2018-11-14 | InVue Security Products, Inc. | Systems and methods for protecting retail display merchandise from theft |
US9650814B2 (en) * | 2013-12-31 | 2017-05-16 | Henge Docks Llc | Alignment and drive system for motorized horizontal docking station |
US10056766B2 (en) * | 2014-01-07 | 2018-08-21 | Limitless Innovations, Inc. | System for charging multiple devices |
CN103870765A (en) * | 2014-03-11 | 2014-06-18 | 凤阳广农信息科技有限公司 | USB (Universal Serial Bus) security lock and method for protecting data by using USB security lock |
US20150264784A1 (en) * | 2014-03-17 | 2015-09-17 | Shafrir Romano | Wireless ready lighting driver |
KR101554626B1 (en) * | 2014-05-30 | 2015-09-24 | 김주동 | Usb security system and security method |
US9734358B2 (en) * | 2015-01-02 | 2017-08-15 | High Sec Labs Ltd | Self-locking USB protection pug device having LED to securely protect USB jack |
US9672674B2 (en) * | 2015-07-06 | 2017-06-06 | Acsys Ip Holding, Inc. | Systems and methods for secure lock systems with redundant access control |
US10107646B2 (en) * | 2015-11-18 | 2018-10-23 | Nanoport Technology Inc. | Orientation sensor |
US9646179B1 (en) * | 2016-12-30 | 2017-05-09 | Foxrun Development Co., LLC | Mechanical locking device for computer ports and portable storage devices |
-
2017
- 2017-04-18 US US15/490,645 patent/US9965655B1/en active Active
-
2018
- 2018-04-05 CN CN201880038620.0A patent/CN110731075B/en active Active
- 2018-04-05 EP EP23216015.0A patent/EP4312142A3/en active Pending
- 2018-04-05 EP EP18787611.5A patent/EP3613202B1/en active Active
- 2018-04-05 US US16/606,117 patent/US20200050802A1/en active Pending
- 2018-04-05 CN CN202110564413.2A patent/CN113364837B/en active Active
- 2018-04-05 WO PCT/US2018/026298 patent/WO2018194842A1/en unknown
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060014441A1 (en) * | 2001-09-18 | 2006-01-19 | Fujitsu Limited | LAN connector having a stopper portion selectively stopping the insertion of a modem cable connector |
US20070140199A1 (en) * | 2002-02-25 | 2007-06-21 | Palm, Inc. | Power saving in multi-processor device |
US20050243059A1 (en) * | 2004-03-16 | 2005-11-03 | Morris Martin G | High-reliability computer interface for wireless input devices |
US7086876B1 (en) * | 2005-05-03 | 2006-08-08 | John Mezzalingua Associates, Inc. | Coaxial cable port security device and method of use thereof |
US20110241776A1 (en) * | 2008-02-26 | 2011-10-06 | Dell Products L.P. | Information handling system port security |
US20130147626A1 (en) * | 2009-04-06 | 2013-06-13 | Hassan Hammoud | Electronic Mailbox System |
US20130040709A1 (en) * | 2009-11-10 | 2013-02-14 | At&T Mobility Ii Llc | Devices, Systems and Methods for Identification Through a Mobile Device |
US20110187532A1 (en) * | 2010-02-02 | 2011-08-04 | Fredric Edelstein | Pluggable security device |
US20140049368A1 (en) * | 2012-08-16 | 2014-02-20 | Schlage Lock Company Llc | Remote notification of phone for home security |
US20140130555A1 (en) * | 2012-11-15 | 2014-05-15 | Jeff Clark | Data port lock |
US20160012258A1 (en) * | 2014-07-09 | 2016-01-14 | Portal Locks, Llc | System and method for securing an input/output port using shape memory alloys in a locking mechanism |
US20160234356A1 (en) * | 2014-09-09 | 2016-08-11 | Ppip Llc | Privacy and security systems and methods of use |
US9888337B1 (en) * | 2015-07-25 | 2018-02-06 | Gary M. Zalewski | Wireless coded communication (WCC) devices with power harvesting power sources for WiFi communication |
US9460319B1 (en) * | 2016-05-20 | 2016-10-04 | Foxrun Development Co., LLC | Device for securing a computer port |
Also Published As
Publication number | Publication date |
---|---|
CN110731075B (en) | 2021-05-11 |
CN110731075A (en) | 2020-01-24 |
EP3613202A1 (en) | 2020-02-26 |
WO2018194842A1 (en) | 2018-10-25 |
US9965655B1 (en) | 2018-05-08 |
EP3613202B1 (en) | 2023-12-13 |
EP3613202A4 (en) | 2020-12-16 |
EP4312142A3 (en) | 2024-03-20 |
EP4312142A2 (en) | 2024-01-31 |
CN113364837B (en) | 2024-02-27 |
CN113364837A (en) | 2021-09-07 |
EP3613202C0 (en) | 2023-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9222285B1 (en) | Theft deterrent device and method of use | |
EP3613202B1 (en) | Port security device for computing devices and method of operating such | |
KR101811393B1 (en) | Remote Control System for Automatic Fire Alarm Equiment | |
CN105046899A (en) | System and method for identifying alarm system problems | |
US20150325940A1 (en) | Protecting connector cover with attaching means | |
WO2014098993A1 (en) | Alarm detection and notification system | |
WO2007027345A3 (en) | Anti-theft security device and perimeter detection system | |
US10817605B2 (en) | System and method for detecting activities within a computerized device based on monitoring of its power consumption | |
US9777510B2 (en) | Tamper switch activation without power | |
EP3125209B1 (en) | Logging into a system with a bluetooth device | |
CN108572003B (en) | Environment sensor, and method and program for authenticating user thereof | |
CN106608572A (en) | Remote monitoring system capable of monitoring elevator in real time | |
GB2527504A (en) | Monitoring system for data communication / electrical signalling cables | |
CN105225298A (en) | Gate inhibition's telephone system and the safety detection method utilizing it | |
CN104167074B (en) | Residual current type electrical fire regional type monitoring detector | |
US20230118448A1 (en) | Add-on module for manipulation protection of a sensor | |
US20200226293A1 (en) | Anti-Tampering Switch for Electronic Access Control Readers | |
US20160112211A1 (en) | System and method for controlling an electrically actuated device | |
CN105097336A (en) | Password keyboard protection cover and using method thereof | |
US20200168060A1 (en) | Warning System, Monitor Device and Warning Device for Merchandise Security | |
TWM508750U (en) | Automatic setting and relieved security system | |
JP2001160190A (en) | Monitoring terminal, communication module and home control system | |
AU2013101112A4 (en) | Anti-skimming device for automated teller machine | |
KR20200119361A (en) | System for managing gas pressure room based on internet of things | |
CN201213036Y (en) | Simple intelligent anti-theft alarm device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION COUNTED, NOT YET MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |