SYSTEMS AND METHODS FOR COMPUTER SECURITY

A computer security system may include an endpoint authentication interface configured to receive one or more user credentials, an endpoint enrollment controller operatively connected to the endpoint authentication interface, and an endpoint access controller operatively connected to the endpoint en...

Full description

Saved in:
Bibliographic Details
Main Authors Thompson, Eric, Kempf, Wade
Format Patent
LanguageEnglish
Published 06.05.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A computer security system may include an endpoint authentication interface configured to receive one or more user credentials, an endpoint enrollment controller operatively connected to the endpoint authentication interface, and an endpoint access controller operatively connected to the endpoint enrollment controller and configured to enable or disable one or more data connections between a protected device and an endpoint terminal system. An interface interrogator device may receive data from a slave device, analyze the data, and in response to determining whether the slave device is authorized, enable or disable a connection between the slave device and a host device. The computer security system may include the interface interrogator device to further enable or disable connections between the protected device and the endpoint terminal system. Methods of controlling connections between a host computer and a slave device are also disclosed herein. Cable management systems are also disclosed herein.
Bibliography:Application Number: US201917253560