SYSTEMS AND METHODS FOR COMPUTER SECURITY
A computer security system may include an endpoint authentication interface configured to receive one or more user credentials, an endpoint enrollment controller operatively connected to the endpoint authentication interface, and an endpoint access controller operatively connected to the endpoint en...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
06.05.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A computer security system may include an endpoint authentication interface configured to receive one or more user credentials, an endpoint enrollment controller operatively connected to the endpoint authentication interface, and an endpoint access controller operatively connected to the endpoint enrollment controller and configured to enable or disable one or more data connections between a protected device and an endpoint terminal system. An interface interrogator device may receive data from a slave device, analyze the data, and in response to determining whether the slave device is authorized, enable or disable a connection between the slave device and a host device. The computer security system may include the interface interrogator device to further enable or disable connections between the protected device and the endpoint terminal system. Methods of controlling connections between a host computer and a slave device are also disclosed herein. Cable management systems are also disclosed herein. |
---|---|
Bibliography: | Application Number: US201917253560 |