Port security device for computing devices and method of operating such

ABSTRACT

A system includes a first computing device and a second computing device. The first computing device includes a port. The second computing device is configured to communicate with the first computing device. The system also includes a port security device configured to restrict access to the port. The port security device includes a transceiver configured to communicate with a third computing device. The third computing device is configured to determine a status of the port security device. At least one of the port security device and the third computing device includes a user interface configured to provide an indication of the status of the port security device.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a 371 National Stage of International ApplicationNo. PCT/US2018/026298, filed Apr. 5, 2018, which claims priority to andthe benefits of U.S. patent application Ser. No. 15/490,645, filed Apr.18, 2017, and issued as U.S. Pat. No. 9,965,655. Each of the precedingpatent applications is hereby incorporated by reference in its entirety.

FIELD

The field of the disclosure relates generally to security devices forcomputing devices. More particularly, this disclosure relates to asecurity device for a port of a computing device.

BACKGROUND

At least some computing devices include at least one port that isconfigured to receive a cable or other data transfer component. However,the port may allow unauthorized users to access the device and otherdevices. Accordingly, at least some computing devices include acontroller configured to selectively disable the port. However, anunauthorized user may use the computing device to activate the port and,thereby, gain access to the interconnected devices. Accordingly, atleast some computing devices include a blocking mechanism inserted intothe port to restrict access. However, an unauthorized user may be ableto remove and/or disable the mechanism without immediate detection. Atleast some known blocking mechanisms may include a seal or tamper tapethat is broken when the blocking mechanism has been tampered with.However, such mechanisms rely on a person in the vicinity of the deviceto inspect the mechanisms to determine if tampering has occurred and donot provide real-time indications of tampering to an administrator.Accordingly, tampering may be unobserved and the interconnected devicesmay be vulnerable to unauthorized users for a prolonged period of time.Moreover, such manual inspections may be prone to misinterpretation andfalse positives.

Therefore, there is a need for security devices for ports of a computingdevice that inhibit unauthorized access and provide an alarm if anunauthorized user attempts to access the computing device.

BRIEF DESCRIPTION

In one aspect, a system includes a first computing device and a secondcomputing device. The first computing device includes a port. The secondcomputing device is configured to communicate with the first computingdevice. The system also includes a port security device configured torestrict access to the port. The port security device includes atransceiver configured to communicate with a third computing device. Thethird computing device is configured to determine a status of the portsecurity device. At least one of the port security device and the thirdcomputing device includes a user interface configured to provide anindication of the status of the port security device.

In another aspect, a port security device for use with a computingdevice includes a housing configured to move relative to a plugpositioned in a port of the computing device. The port security deviceis positionable between a locked position in which the housing inhibitsaccess to the port and an unlocked position in which the housing allowsaccess to the port. The port security device also includes a sensorconfigured to detect when the port security device moves between thelocked position and the unlocked position.

In yet another aspect, a method of securing a port of an interconnectedcomputing device includes providing a port security device configured toconnect to the interconnected computing device adjacent the port. Theport security device includes a housing. The port security device ispositionable between a locked position in which the housing inhibitsaccess to the port and an unlocked position in which the housing allowsaccess to the port. The method also includes detecting, using a sensor,when the port security device moves between the locked position and theunlocked position. The method further includes sending a signal to anaccess point when the sensor detects that the port security device movesbetween the locked position and the unlocked position.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic view of a system including interconnected devices.

FIG. 2 is a sectional view of a port security device in an unlockedposition.

FIG. 3 is a sectional view of a port security device in a lockedposition.

Corresponding reference characters indicate corresponding partsthroughout the several views of the drawings.

DETAILED DESCRIPTION

In the following specification and the claims, reference will be made toa number of terms, which shall be defined to have the followingmeanings.

The singular forms “a”, “an”, and “the” include plural references unlessthe context clearly dictates otherwise.

“Optional” or “optionally” means that the subsequently described eventor circumstance may or may not occur, and that the description includesinstances where the event occurs and instances where it does not.

Approximating language, as used herein throughout the specification andclaims, may be applied to modify any quantitative representation thatmay permissibly vary without resulting in a change in the basic functionto which it is related. Accordingly, a value modified by a term orterms, such as “about”, “approximately”, and “substantially”, are not tobe limited to the precise value specified. In at least some instances,the approximating language may correspond to the precision of aninstrument for measuring the value. Here and throughout thespecification and claims, range limitations may be combined and/orinterchanged; such ranges are identified and include all the sub-rangescontained therein unless context or language indicates otherwise.

As used herein, the term “non-transitory computer-readable media” isintended to be representative of any tangible computer-based deviceimplemented in any method or technology for short-term and long-termstorage of information, such as, computer-readable instructions, datastructures, program modules and sub-modules, or other data in anydevice. Therefore, the methods described herein may be encoded asexecutable instructions embodied in a tangible, non-transitory, computerreadable medium, including, without limitation, a storage device and/ora memory device. Such instructions, when executed by a processor, causethe processor to perform at least a portion of the methods describedherein. Moreover, as used herein, the term “non-transitorycomputer-readable media” includes all tangible, computer-readable media,including, without limitation, non-transitory computer storage devices,including, without limitation, volatile and nonvolatile media, andremovable and non-removable media such as a firmware, physical andvirtual storage, CD-ROMs, DVDs, and any other digital source such as anetwork or the Internet, as well as yet to be developed digital means,with the sole exception being a transitory, propagating signal.

Furthermore, as used herein, the term “real-time” refers to at least oneof the time of occurrence of the associated events, the time ofmeasurement and collection of predetermined data, the time to processthe data, and the time of a system response to the events and theenvironment. In the embodiments described herein, these activities andevents occur substantially instantaneously.

The embodiments described herein inhibit unauthorized access to systems.For example, a port security device is configured to obstruct a port ofthe system and provide an indication when someone attempts to remove theport security device without authorization. The port security device hasan unlocked position and a locked position. In the unlocked position,the port security device is able to be removed from the port. In thelocked position, the security device is inhibited from being removedfrom the port and the port security device prevents objects from beingpositioned in the port. In addition, in some embodiments, the portsecurity device provides an indication when the port security device ismoved between the locked position and the unlocked position and/or whena person attempts to access the port. In some embodiments, the portsecurity device includes a sensor, an internal power supply, acontroller, a transceiver, and an alarm. The sensor is configured todetect when the port security device is displaced and send a signal tothe controller. The controller is configured to exchange signals with anapplication server using the transceiver and to provide activeindications in real-time to an operator when the sensor detectsdisplacement of the port security device.

As a result, the port security device provides increased securityagainst system threats due to physical access to interconnected devices.In addition, the port security device operates at the physical locationof the potential vulnerability to provide direct protection. Moreover,the port security device is configured to work with an access monitoringsystem that is external to the system to provide reliable cyber securitylogging, monitoring, alerting, and/or compliance functionality.

Referring now to the drawings and in particular to FIG. 1, oneembodiment of a system is designated in its entirety by the referencenumber 100. In suitable embodiments, the system 100 may include at leastone device that includes at least one electrical component. In theillustrated embodiment, the system 100 includes an interconnectedcomputing device 102 such as a personal computer, a switch, a router, aserver, a communication component, a handheld electronic device, and/oran appliance. The interconnected computing device 102 includes aplurality of input/outputs, broadly ports, 104. The ports 104 may beused as inputs and/or outputs and configured to receive, for example andwithout limitation, a cable 106, a data storage device (not shown), awireless networking device (not shown), D-sub combination (DB) classconnectors such as DB9 and DB25 connectors, and/or registered jack (RJ)class connectors such as RJ45 and RJ11 connectors. For example, theports 104 may include, without limitation, Universal Serial Bus (USB)ports, serial ports, parallel ports, video graphics array (VGA) ports,Firewire ports, sockets, Ethernet ports, personal system (PS)/2 ports,digital video interface (DVI) ports, and recommended standard (RS) orElectronic Industries Alliance class ports such as RS-232 ports. Ports104 may be used for network connectivity, console commands, removablemedia, or input/output devices. Accordingly, the ports 104 may allowaccess to the interconnected computing device 102 and/or allow theinterconnected computing device 102 to communicate with otherinterconnected computing devices 102. In other embodiments, theinterconnected computing device 102 may include any port 104 thatenables the interconnected computing device 102 to operate as describedherein.

A port security device 108 is configured to obstruct at least one of theports 104 of the system 100. In the illustrated embodiment, the portsecurity device 108 protects a single port 104. In other embodiments,the port security devices 108 may protect any of the ports 104. Forexample, in some embodiments, a single port security device 108 may beused to protect multiple ports 104. The port security devices 108 may beused for ports 104 connected to the cable 106 and/or empty ports 104. Insome embodiments, the port security device 108 may be used with anydevice including ports 104 and not necessarily with the interconnectedcomputing device 102 shown in FIG. 1. For example, the port securitydevice 108 may be used with a device including at least one electroniccomponent and at least one port. In some embodiments, the port securitydevice 108 may be used with a device not connected to a network.

The cable 106 includes a plug 110 (shown in FIG. 2) that is configuredto extend into and engage the port 104. The cable 106 extends from theport 104 and through the port security device towards a server or othersuitable device. Accordingly, the cable 106 provides a physicalconnection to a network to allow the interconnected computing device 102to communicate on network infrastructures including, for example andwithout limitation, industrial control systems, cloud infrastructures,enterprise environments, and the internet. In other embodiments, thesystem 100 may include a computing device not connected to a network.For example, in some embodiments, the computing device 102 may be astand-alone device such as a consumer appliance and/or a computingdevice configured for wireless communication.

As shown in FIG. 2, the port security device 108 is configured toconnect to the cable 106 and allow the cable 106 to be connected to theport 104 (shown in FIG. 1). FIG. 2 shows the port security device 108connected to the cable 106 and in an unlocked position. FIG. 3 shows theport security device 108 connected to the cable 106 and in a lockedposition. In the unlocked position, the port security device 108 allowsthe cable 106 to be removed from the port 104. In the locked position,the port security device 108 inhibits the cable 106 from being removedfrom the port 104 and prevents objects from being positioned in the port104. In other embodiments, the port security device 108 may beconfigured to connect to the port 104 without the cable 106. Forexample, in some embodiments, the port security device 108 includes theplug 110 configured to extend into the port 104.

The port security device 108 includes a housing 112, a sensor 114, aninternal power source 116, a controller 118, a transceiver 120, a light,broadly an alarm, 122, and a speaker, broadly an alarm, 124. Inalternative embodiments, the system 100 may include any suitablecomponents that enable the port security device 108 to function asdescribed herein. In some embodiments, at least some components of theport security device 108, such as the sensor 114 and/or the transceiver120, may be incorporated into the cable 106 and/or the interconnectedcomputing device 102.

The housing 112 is configured to at least partially enclose and protectinternal components of the system 100 such as the sensor 114, the powersource 116, the controller 118, the transceiver 120, the light 122, andthe speaker 124. The power source 116, the controller 118, thetransceiver 120, and the speaker 124 are positioned within an interiorspace of the housing 112. The light 122 extends at least partially on anexterior of the housing 112 such that the light 122 may be visible onthe exterior of the housing 112. The housing 112 includes a first end126, a second end 128, and a sidewall 130 extending between the firstend 126 and the second end 128. In addition, a partition 132 ispositioned intermediate the first end 126 and the second end 128 anddivides the interior space of the housing 112. The partition 132, thesecond end 128, and the sidewall 130 prevent objects on the exterior ofhousing 112 from contacting the controller 118, the transceiver 120, andthe speaker 124. The first end 126, the second end 128, and thepartition 132 define openings 134 configured to receive the cable 106such that the cable 106 extends through the interior space of thehousing 112 and the housing 112 extends about the cable 106. The housing112 is configured to cover the plug 110 and prevent the cable 106 andthe plug 110 from being disconnected from the port 104 when the portsecurity device 108 is in the locked position. In alternativeembodiments, the port security device 108 may include any housing 112that enables the port security device 108 to function as describedherein. For example, in some embodiments, the housing 112 and the plug110 are connected in assembly and the port security device 108 isconfigured to connect to the port 104 without the cable 106 beingconnected to the port 104.

In suitable embodiments, the housing 112 may be assembled in any mannerand with any materials that enable the housing 112 to function asdescribed herein. For example, in some embodiments, the housing 112 maybe constructed of resilient materials such as plastics and/or metals.Suitably, the housing 112 and the cable 106 are configured to preventremoval of the housing 112 from the cable 106. For example, in someembodiments, the housing 112 and the cable 106 may be assembled as asingle unit. In other embodiments, the housing 112 may be assembledseparately and connected to a cable 106 to allow the port securitydevice 108 to be retrofitted to a cable 106 installed in a port 104. Forexample, the housing 112 may be assembled from multiple parts thatconnect together and capture the cable 106 to form a permanent assembly.In further embodiments, the plug 110 may be at least temporarily removedto allow the housing 112 to slide onto the cable 106. In furtherembodiments, the housing 112 includes a hinge to facilitate the housing112 capturing the cable 106 between two hinged portions. In addition, insome embodiments, the housing 112 includes a locking mechanism to securethe housing 112 to the cable 106. For example, in some embodiments, thehousing 112 may include, without limitation, a clamp, a padlock, a bolt,a cam, a lever, a keyed opening, magnets, and any other suitable lockingfeature.

The port security device 108 includes a collar 136 configured to connectto the cable 106 adjacent the plug 110 and engage the housing 112. Inparticular, when the port security device 108 is in the locked position,the collar 136 engages a lock 138 of the housing 112. The collar 136 hasan annular shape and is configured to extend about the cable 106. Thecollar 136 includes a plate 139 configured to contact the plug 110 and arim 140 opposite the plate 139. The lock 138 extends from the housing112 and is configured to contact the rim 140. The lock 138 isdisplaceable to allow the rim 140 to pass the lock 138 when the portsecurity device 108 moves from the unlocked position to the lockedposition. When the port security device 108 is in the locked position,the lock 138 contacts the rim 140 and prevents separation of the housing112 and the collar 136. A release 142 may be actuated to displace thelock 138 and allow the port security device 108 to be moved from thelocked position to the unlocked position. In some embodiments, a toolcorresponding to the port security device 108 may be required to actuatethe release 142. In alternative embodiments, the port security device108 may include any locking mechanism that enables the port securitydevice 108 to operate as described herein. For example, in someembodiments, the port security device 108 may include, withoutlimitation, a clamp, a padlock, a bolt, a cam, a lever, a keyed opening,magnets, and any other suitable locking feature.

In suitable embodiments, the collar 136 may be attached to the plug 110in any manner. For example, the collar 136 and the plug 110 may beattached using adhesives, welds, fasteners, locking features, and anyother suitable attachment means. In the illustrated embodiment, thecollar 136 is permanently attached to the plug 110. Accordingly, thecollar 136 prevents movement of the housing 112 relative to the plug 110when the port security device 108 is in the locked position. Inalternative embodiments, the collar 136 may be omitted and the housing112 may directly engage the plug 110.

The sensor 114 is configured to detect a position of the port securitydevice 108 relative to the cable 106 and/or the port 104. The portsecurity device 108 may include any suitable sensor. For example, insome embodiments, the port security device includes, without limitation,a contact sensor, a capacitive sensor, an optical sensor, anaccelerometer, and an acoustic sensor. In the illustrated embodiment,the sensor 114 includes a pressure sensor that detects when the collar132 has engaged the housing 112.

The sensor 114 sends a signal to the controller 118 when the portsecurity device 108 moves relative to the cable 106 and/or the port 104.As a result, the controller 118 may determine when the port securitydevice 108 has been tampered with and/or removed from the cable 106and/or the port 104. The controller 118 may activate the speaker 124,the light 122, and/or the transceiver 120 to provide an indication to asystem administrator and/or other suitable persons when the portsecurity device 108 has been tampered with and/or removed from the cable106 and/or the port 104. For example, the speaker 124 and the light 122may be configured to provide an alarm for people in the vicinity of theinterconnected computing device 102. Accordingly, such alarms or activesignals may deter unauthorized users. In addition, the alarms areconfigured to attract attention and reduce the possibility of people notobserving and/or ignoring the indication of tampering. In contrast, atleast some known tamper indicators are passive and require a person toinspect a tamper indicator and determine if tampering has occurred. Inalternative embodiments, the port security device 108 may include anysuitable alarm. For example, in some embodiments, the port securitydevice 108 and/or the controller 118 may be configured to send anotification such as a text message, email, telephone call, and/or othercommunication to a user.

The controller 118 includes a control board 143 and a plurality ofelectronic components mounted on the control board. For example, in theillustrated embodiment, an electrical current sensor 144 and thetransceiver 120 are mounted on the control board 143. The electroniccomponents may be connected by a circuit and receive power from thepower source 116. In the exemplary embodiment, the controller 118 is aprogrammable logic controller (PLC). In alternative embodiments, theport security device 108 may include any controller 118 that enables theport security device 108 to operate as described herein.

The electrical current sensor 144 may detect transmission of signalsthrough the cable 106. Accordingly, the port security device 108 may beused to monitor usage of the port 104. For example, the port securitydevice 108 may provide an alarm if the port security device 108 detectstransmission of signals through the cable 106 when the port 104 has beenpreviously disabled.

In reference to FIGS. 1 and 2, the transceiver 120 is configured toexchange signals with at least one other electronic device. For example,the transceiver 120 may enable the port security device 108 tocommunicate using one or more wireless communication systems. Thetransceiver 120 may utilize electromagnetic waves, acoustic frequencies,visual signals, and/or any suitable communication signal. Thetransceiver 120 may send the signal to the access point 146, a relay,and/or any other suitable component. In some embodiments, the system 100may communicate through a wired connection in addition to and/or inplace of a wireless connection. For example, in some embodiments, thetransceiver 120 is connected to a cable extending from the housing 112and configured to provide a wired connection between the port securitydevice 108, the access point 146, and/or a remote computing device. Infurther embodiments, a plurality of the port security devices 108 may beconnected together in assembly by a wired connection and the assemblymay communicate information with a remote computing device. In someembodiments, the transceiver 120 is incorporated into a separate housingconnected to the assembly of port security devices 108. In alternativeembodiments, the port security device 108 may include any communicationcomponent that enables the port security device 108 to operate asdescribed herein. In some embodiments, the transceiver 120 may beomitted or selectively turned off and the port security device 108 maybe configured to not communicate with other devices, i.e., the portsecurity device 108 may operate “off the grid.”

Accordingly, the transceiver 120 allows the port security device 108 tocommunicate with an access point 146 and an application server, broadlya computing device, 148 remote from the port security device 108 and theinterconnected computing device 102. The access point 146 provides aconnection between the transceiver 120 and the application server 148 toallow communication between the transceiver and the application server.In some embodiments, the access point 146 may be a separate computingdevice or incorporated into the application server 148. Suitably, thetransceiver 120 and the application server 148 communicate on a networkthat excludes the interconnected computing device 102. In other words,the interconnected computing device 102 may communicate on a firstnetwork and the port security device 108 may communicate on a secondnetwork such that the application server 148 and the port securitydevice 108 are out-of-band of the interconnected computing device 102.As a result, an unauthorized user cannot control the port securitydevice 108 from the interconnected computing device 102. In contrast, atleast some known computing devices rely on a controller and/orprogramming on the computing device itself to provide security forports. As a result, in the known computing devices, an unauthorized usermay deactivate security measures at the computing device itself or atother devices on the same network. Accordingly, such internalprogramming measures have provided a false sense of security and haveprevented persons from recognizing the vulnerability of the ports 104.In contrast, the port security device 108 described herein is controlledseparately and may be isolated from the interconnected computing device102 and other devices on the same network. In suitable embodiments, theport security device 108 may be incorporated into a standalone securitysystem and/or may be integrated into Security Information EventMonitoring (SIEM) infrastructure.

In addition, the port security device 108 is configured to provide datarelating to the operational status of the port security device 108and/or the port 104. Accordingly, the port security device 108 allowsmonitoring and/or logging of operation of the system 100. For example,the port security device 108 may transmit and/or store informationrelating to an operational status of the port security device 108 and/orthe port 104. In some embodiments, the port security device 108 maytransmit information at regular intervals and/or respond to requests forinformation from remote computing devices. The operational status mayinclude power levels, activity data, diagnostic data, communicationdata, sensor status, alerts, inputs, outputs, and any other operationaldata. In alternative embodiments, the port security device 108 may storeand/or transmit any information that enables the system 100 to operateas described herein.

In some embodiments, the port security device 108 may include a userinterface configured to receive inputs from a user and to displayinformation to the user. In the exemplary embodiment, the port securitydevice 108 includes the light 122 which provides a visual indication tothe user of a status of the port security device 108. For example, insome embodiments, the light 122 may be activated when the housing 112 isdisplaced. In further embodiments, the light 122 may change colors todisplay different operational states of the port security device 108. Inalternative embodiments, the system may include any user interface thatenables the port security device 108 to operate as described herein. Forexample, in some embodiments, the port security device 108 may include,without limitation, a touch screen, a display screen, a keyboard, alight, a speaker, a joystick, a computer mouse, a scroll ball, amicrophone, a camera, a sensor, and any other suitable user interfacecomponent. In some embodiments, the user interface may be incorporatedinto the application server 148.

In addition, as shown in FIGS. 2 and 3, the power source 116 is sized tofit within the housing 112. In particular, in the illustratedembodiment, the power source 116 is completely enclosed in the housing112. Accordingly, the housing 112 and the power source 116 areconfigured to prevent tampering with the power source 116. In someembodiments, a portion of the power source 116, such as an input/outputconnector, may extend to the exterior of the housing 112. The powersource 116 allows the port security device 108 to have a compact andportable configuration because the power source 116 is within thehousing 112. In alternative embodiments, the power source 116 may beremovable from other components of the system 100. In furtherembodiments, the power source 116 may be positioned in a second housing(not shown) that is positioned within and/or attached to the housing112. In some embodiments, the port security device 108 may draw at leastsome power from an external power supply such as the port 104. In suchembodiments, the power source 116 may be omitted.

In reference to FIGS. 1 and 2, during operation, the housing 112 of theport security device 108 is coupled about the cable 106 such that thehousing 112 is movable along the cable 106 relative to the plug 110 ofthe cable 106. To move the port security device 108 into the lockedposition, the housing 112 is moved toward the port 104 until the housing112 covers the port 104 and the plug 110. The lock 138 engages thecollar 136 to secure the housing 112 in position relative to the plug110 and the port 104. Accordingly, in the locked position, the portsecurity device 108 prevents access to the port 104. In addition, theport security device detects if a user attempts to displace the housing112. For example, the sensor 114 is configured to detect when the portsecurity device 108 moves between the locked position and the unlockedposition. In some embodiments, the sensor 144 is configured to detecttransmission of a signal through the port 104 and/or the cable 106. Insome embodiments, the port security device 108 provides an alarm and/ortransmits a signal to the access point 146 when the sensor 144 detectsmovement of the port security device 108.

The access point 146 is configured to receive signals from the portsecurity device 108 and determine a status of the port security device108. In addition, the application server 148 and/or the access point 146may be configured to send a signal to the port security device 108 to atleast partially disable the port security device 108 and allow removalof the port security device 108. In some embodiments, the port securitydevice 108 may be inactive, i.e., in a sleep mode, when the portsecurity device 108 remains in the locked position and activates whenthe sensor 114 detects movement and/or when the port security device 108receives a signal from the access point 146. In such embodiments, theaccess point 146 may be configured to periodically send signals to theport security device 108, i.e., ping the port security device 108, tocheck the status. In addition, a computing device connected to theaccess point 146, such as the application server 148, may be configuredto provide an indication to the operator if the access point 146 doesnot receive a signal or response from the port security device 108.

The port security device 108 provides increased protection of systems byinhibiting access to interconnected computing devices through ports.Accordingly, the port security device 108 may facilitate compliance withregulatory standards issued by organizations such as the North AmericanElectric Reliability Corporation (NERC). For example, the port securitydevice 108 is configured to facilitate compliance with NERC's CriticalInfrastructure Protection (CIP) Standard CIP-007-6 R1.2, which requiresprotection against the use of unnecessary physical input/output portsused for network connectivity, console commands, or removable media.

When introducing elements of the present invention or the preferredembodiment(s) thereof, the articles “a”, “an”, “the” and “said” areintended to mean that there are one or more of the elements. The terms“comprising”, “including” and “having” are intended to be inclusive andmean that there may be additional elements other than the listedelements.

As various changes could be made in the above constructions withoutdeparting from the scope of the invention, it is intended that allmatter contained in the above description and shown in the accompanyingdrawings shall be interpreted as illustrative and not in a limitingsense. Although specific features of various embodiments of theinvention may be shown in some drawings and not in others, this is forconvenience only. In accordance with the principles of the invention,any feature of a drawing may be referenced and/or claimed in combinationwith any feature of any other drawing.

This written description uses examples to disclose the invention,including the best mode, and also to enable any person skilled in theart to practice the invention, including making and using any devices orsystems and performing any incorporated methods. The patentable scope ofthe invention is defined by the claims, and may include other examplesthat occur to those skilled in the art. Such other examples are intendedto be within the scope of the claims if they have structural elementsthat do not differ from the literal language of the claims, or if theyinclude equivalent structural elements with insubstantial differencesfrom the literal languages of the claims.

What is claimed is:
 1. A system including: a first computing deviceincluding a port; a second computing device configured to communicate ona first network with the first computing device; a port security deviceconfigured to restrict access to the port and allow monitoring of theport, wherein the port security device includes a transceiver configuredto communicate with a third computing device, wherein the thirdcomputing device is configured to determine a status of the portsecurity device, and wherein at least one of the port security deviceand the third computing device includes a user interface configured toprovide an indication of the status of the port security device; and anaccess point configured to receive a signal from the port securitydevice when the status of the port security device changes, wherein theaccess point is configured to communicate with the third computingdevice to allow monitoring of the status of the port, wherein the accesspoint, the third computing device, and the port security device areout-of-band of the first computing device and communicate on a secondnetwork isolated from the first network to prevent the first computingdevice accessing communications between the port security device, theaccess point, and the third computing device and to prevent a user fromcontrolling the port security device from the first computing.
 2. Thesystem in accordance with claim 1, wherein the port security deviceincludes a housing and is positionable between a locked position inwhich the housing inhibits access to the port and an unlocked positionin which the housing allows access to the port, wherein the transceiveris configured to send a signal to the third computing device when theport security device moves between the locked position and the unlockedposition.
 3. The system in accordance with claim 2 further comprising acable connected to the port, wherein the port security device isconfigured to receive the cable within an interior space of the housing,wherein the port security device further comprises a current sensorconfigured to detect if a signal is transmitted through the cable. 4.The system in accordance with claim 2, wherein the port security deviceincludes a power source located in an interior space of the housing andconfigured to provide power to the transceiver.
 5. The system inaccordance with claim 2, wherein the port security device is configuredto receive power from an external power source.
 6. The system inaccordance with claim 2, wherein the port security device includes asensor configured to detect when the housing moves between the lockedposition and the unlocked position.
 7. The system in accordance withclaim 2, wherein the port security device is further configured toprovide an alarm when the port security device is moved between thelocked position and the unlocked position.
 8. The system in accordancewith claim 2 further comprising a plug configured to extend into theport, wherein the housing is spaced from the plug when the port securitydevice is in the unlocked position, and wherein the housing is securedto the plug when the housing is in the locked position.
 9. The system inaccordance with claim 1, wherein the port security device is configuredto send a signal to the third computing device relating to anoperational status of the port security device.
 10. The system inaccordance with claim 1 further a cable connecting the port securitydevice and the third computing device to allow the transceiver and thethird computing device to communicate using a wired connection.
 11. Thesystem in accordance with claim 1, wherein the port security device andthe third computing device are configured to communicate using awireless communication system.
 12. A port security device for use with afirst computing device that communicates on a first network, the portsecurity device comprising: a plug positionable in a port of the firstcomputing device; a housing configured to restrict access to the plugwhen the plug is positioned in the port of the first computing device,wherein the port security device is positionable between a lockedposition in which the housing inhibits access to the port and anunlocked position in which the housing allows access to the port, theplug being accessible and removable from the port when the port securitydevice is in the unlocked position; a sensor configured to detect whenthe port security device moves between the locked position and theunlocked position; and a transceiver configured to send a signal to anaccess point when the port security device moves between the lockedposition and the unlocked position, wherein the access point isconfigured to communicate with a second computing device to allowmonitoring of the status of the port, wherein the access point, thesecond computing device, and the port security device are out-of-band ofthe first computing device and communicate on a second network isolatedfrom the first network to prevent the first computing device accessingcommunications between the port security device, the access point, andthe second computing device and to prevent a user from controlling theport security device from the first computing device.
 13. The portsecurity device in accordance with claim 12 further comprising a powersource disposed within an interior space of the housing and configuredto provide power to the sensor.
 14. The port security device inaccordance with claim 12, wherein the housing defines an interior spaceand includes a first end and a second end, and wherein the housing isconfigured to receive a cable connected to the port, the cable extendingthrough the interior space from the first end to the second end, theplug being connected to the cable.
 15. The port security device inaccordance with claim 14, wherein the housing includes a sidewallextending about the cable, the sidewall defining an opening on each ofthe first end and the second end for the cable to extend through. 16.The port security device in accordance with claim 14 further comprisinga lock configured to secure the housing in the locked position.
 17. Theport security device in accordance with claim 16 further comprising acollar configured to attach to the cable and engage the lock when theport security device is in the locked position.
 18. The port securitydevice in accordance with claim 12, wherein the plug and the housing areconnected in assembly, and wherein the port security device isconfigured to connect to the port without a cable being connected to theport.
 19. The port security device in accordance with claim 18, whereinthe housing is spaced from the plug when the port security device is inthe unlocked position.
 20. A method of securing a port of aninterconnected computing device that communicates on a first network,the method comprising: providing a port security device configured toconnect to the interconnected computing device adjacent the port, theport security device including a housing, wherein the port securitydevice is positionable between a locked position in which the housinginhibits access to the port and an unlocked position in which thehousing allows access to the port; detecting, using a sensor, when theport security device moves between the locked position and the unlockedposition; and sending a signal to an access point when the sensordetects that the port security device moves between the locked positionand the unlocked position, wherein the access point is configured tocommunicate with a computing device remote from the interconnectedcomputing device to allow monitoring of the status of the port, whereinthe remote computing device, the access point, and the port securitydevice are out-of-band of the interconnected computing device andcommunicate on a second network isolated from the first network toprevent the interconnected computing device accessing communicationsbetween the port security device, the access point, and the remotecomputing device and to prevent a user from controlling the portsecurity device from the interconnected computing device.
 21. The methodin accordance with claim 20 further comprising providing an alarm whenthe port security device moves between the locked position and theunlocked position.
 22. The method in accordance with claim 20 furthercomprising connecting the port security device to the interconnectedcomputing device adjacent the port and positioning the port securitydevice in the locked position to prevent access to the port.
 23. Themethod in accordance with claim 20 further comprising detectingtransmission of a signal through a cable connected to the port.
 24. Themethod in accordance with claim 20 further comprising receiving, thesignal from the port security device at an application server connectedto the access point, and determining a status of the port securitydevice using the application server.