Method for preventing the spreading of malware via the use of a data security device

ABSTRACT

Embodiments of the present invention set forth methods for preventing the spreading of malware via the use of a data security device. Specifically, one embodiment of the present invention sets forth a method, which includes the steps of activating a malware scanning engine in the data security device after the data security device is attached to a computer and a mobile device but before data communication between the computer and the mobile device occurs; invoke malware scanning engine before permitting any data communication between the mobile device and the computer to occur.

BACKGROUND OF THE INVENTION

1. Field of the Invention

Embodiments of the present invention relate generally to techniques forguarding against malware and more specifically to a data security devicefor preventing the spreading of malware.

2. Description of the Related Art

Unless otherwise indicated herein, the approaches described in thissection are not prior art to the claims in this application and are notadmitted to be prior art by inclusion in this section.

As more and more mobile devices become susceptible to security breaches,they are also becoming a convenient channel to spread malware. Themobile device may be implemented as a program product for use with acomputer system. The program(s) of the program product define functionsof the embodiments (including the methods described herein) and can becontained on a variety of computer-readable storage media.

For example, a mobile device infected with one type of malware, acomputer virus, can easily infect a computer after it is attached to it.Conversely, if the computer is already infected another computer virus,then it can also quickly infect the mobile device after the two systemsare connected. In one conventional anti-virus solution, certainanti-virus software needs to be loaded onto at least the computer andalso activated before the mobile device is attached to the computer. Inanother convention solution, at least the mobile device needs to beconfigured with certain anti-virus software to prevent the mobile devicefrom becoming a carrier of unwanted malware. The aforementionedconventional approaches are costly, burdensome, and ineffective.

As the foregoing illustrates, what is needed is thus an improvedmechanism to guard against the spreading of malware and address at leastthe problems discussed above.

SUMMARY OF THE INVENTION

Embodiments of the present invention set forth methods for preventingthe spreading of malware via the use of a data security device.Specifically one embodiment of the present invention sets forth amethod, which includes the steps of activating a malware scanning enginein the data security device after the data security device is attachedto a computer and a mobile device but before data communication betweenthe computer and the mobile device occurs,further comprising;

a) after detecting a power-up event or a reset event, a suspend signalis asserted to the communication control circuit responsible for themobile device port of the data security device; and

b) after the malware scanning engine is invoked, a resume signal isasserted to the communication control circuit to cause the communicationbetween the mobile device and the computer to resume thus the datacommunication is then scanned by the malware scanning engine.

The data security device follows to obtain updates via a networkconnection of a computer, comprising:

a) after the malware scanning engine is invoked, the engine checkswhether there is any update via network connection of a computer;

b) if update existed, it automatically downloads the necessary updateand causes the update to be stores in the data security device; and

c) the data security device is configured to cause the malware scanningengine to be upgraded with the download update.

BRIEF DESCRIPTION OF THE DRAWINGS

The accomplishment of this and other objects of the invention willbecome apparent from the following descriptions and its accompanyingfigures of which:

FIG. 1 illustrates how the data security device is connected to a mobiledevice and also a computer;

FIG. 2 is a conceptual diagram of a data security device configured toimplement one or more aspects of the present invention;

FIG. 3 is a flow chart illustrating a process that the data securitydevice is configured to follow;

FIG. 4 is a flow chart illustrating how the data security devicesuspends the data communication between the mobile device and thecomputer; and

FIG. 5 is a flow chart illustrating a process that the data securitydevice follows to obtain updates via a network connection of thecomputer.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The background information and the technical details set forth inExhibit A, attached hereto, enable a person skilled in the art toimplement one embodiment of the present invention to guard against thespreading of malware. A simplified block diagram of a data securitydevice configured to perform one or more aspects of the presentinvention is also illustrated. One embodiment of the present inventionincludes among other things, at least the following features andfunctionalities:

According to one embodiment of the present invention, FIG. 1 illustrateshow this data security device 30 is connected to a mobile device 20 andalso a computer 10. In one implementation, the connections adhere to theUSB specification.

According to one embodiment of the present invention, FIG. 2 is aconceptual diagram of the data security device 30 configured toimplement one or more aspects of the present invention. The datasecurity device 30 comprises a case 31, a computer port communicationunit 32, a plug 33, a mobile device port communication unit 34, a socket35, a malware scanning engine 36, a communication control circuit37,wherein the communication control circuit 37 connected to the mobiledevice port communication unit 34 and the malware scanning engine 36.The malware scanning engine 36 connected to the computer portcommunication unit 32 and the communication control circuit 37. Thecomputer port communication unit 32 connects to the malware scanningengine 36 and the plug 33 therein. The mobile device port communicationunit 34 connects to the socket 35 and the communication control circuit37 therein.

The data security device 30 communicates to a computer 10 through theplug 33 and it communicates to a mobile device 20 through the socket 35.The communication control circuit 37 is configured to control thecommunication between the computer 10 and the mobile device 20.

According to one embodiment of the present invention, FIG. 3 is a flowchart illustrating a process that the data security device is configuredto follow. Specifically, the malware scanning engine in the datasecurity device is invoked after the connection of the mobile device andthe computer is detected. Before the malware scanning engine isactivated, any data communication between the mobile device and thecomputer is suspended.

According to one embodiment of the present invention, FIG. 4 is a flowchart illustrating how the data security device suspends the datacommunication between the mobile device and the computer. Specifically,after detecting a power-up event or a reset event, a suspend signal isasserted to the communication control circuit responsible for the mobiledevice port of the data security device. The mobile device port of thedata security device, in one implementation, is configured to connect tothe mobile device. After the malware scanning engine is invoked, aresume signal is asserted to the communication control circuit to causethe communication between the mobile device and the computer to resume.This data communication is then scanned by the malware scanning engine.

According to one embodiment of the present invention, FIG. 5 is a flowchart illustrating a process that the data security device follows toobtain updates via a network connection of the computer. After themalware scanning engine is invoked, the engine checks whether there isany update via the network connection of a computer. If update existed,it automatically downloads the necessary update and causes the update tobe stored in the data security device. The data security device isconfigured to cause the malware scanning engine to be upgraded with thedownload update. This way, the malware scanning engine in the datasecurity device can stay current and remain effective against newlyintroduced malware.

Therefore, the above examples, embodiments and drawings should not bedeemed to be the only embodiments, and are presented to illustrate theflexibility and advantages of the present invention as defined by thefollowing claims.

1. A method for preventing the spreading of malware via the use of adata security device, comprising: activating a malware scanning enginein the data security device after the data security device is attachedto a computer and a mobile device but before data communication betweenthe computer and the mobile device occurs; invoke malware scanningengine before permitting any data communication between the mobiledevice and the computer to occur, further comprising; a) after detectinga power-up event or a reset event, a suspend signal is asserted to thecommunication control circuit responsible for the mobile device port ofthe data security device; and b) after the malware scanning engine isinvoked, a resume signal is asserted to the communication controlcircuit to cause the communication between the mobile device and thecomputer to resume thus the data communication is then scanned by themalware scanning engine.
 2. The method of claim 1, wherein the datasecurity device follows to obtain updates via a network connection of acomputer, comprising: a) after the malware scanning engine is invoked,the engine checks whether there is any update via network connection ofa computer; b) if update existed, it automatically downloads thenecessary update and causes the update to be stores in the data securitydevice; and c) the data security device is configured to cause themalware scanning engine to be upgraded with the download update.
 3. Themethod of claim 1, wherein the data security device comprises: a case, acomputer port communication unit, a plug, a mobile device portcommunication unit, a socket, a malware scanning engine, and acommunication control circuit; wherein the communication control circuitconnected to the mobile device port communication unit and the malwarescanning engine; the malware scanning engine connected to the computerport communication unit and the communication control circuit; thecomputer port communication unit connects to the malware scanning engineand the plug therein; and the mobile device port communication unitconnects to the socket and the communication control circuit therein.