Unlock instant, AI-driven research and patent intelligence for your innovation.

Portable security device and methods for providing network security

A technology for security equipment and user equipment, which is applied in the field of network security and can solve problems such as data eavesdropping and theft

Active Publication Date: 2013-04-17
AO KASPERSKY LAB
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Known computer and network security solutions such as firewalls, anti-virus applications, active defense mechanisms, cloud detection technologies, and others have limitations and often fail to provide adequate protection for user devices operating in unsecured network environments such as public networks. security where user devices and data transferred to and from those devices over such unsecured networks are exposed to eavesdropping and other forms of data theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable security device and methods for providing network security
  • Portable security device and methods for providing network security
  • Portable security device and methods for providing network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] This document describes exemplary embodiments of the present invention in the context of a system, method, and computer program product for providing secure communication in a non-secure network environment. Those of ordinary skill in the art will recognize that the following description is only illustrative and not intended to be limiting in any way. Those skilled in the art who benefit from the present disclosure will easily think of other embodiments. The implementation scheme of the exemplary embodiment of the present invention shown in the drawings will now be described in detail. Throughout the drawings and the following description, the same reference signs will be used as much as possible to refer to the same or similar objects.

[0022] figure 1 An example of a non-secure network environment in which the present invention can be used is shown. In general, the non-secure network environment may include a public wireless local area network (WLAN) 130, which uses ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed herein are systems, methods and computer program products for providing secure Internet access to a user device in an unsecure network environment, such as a public wireless network. The system includes a portable security device configured to establishing a first secure direct wireless connection with the user device and a second secure network connection through the public wireless network to a security server, which provides Internet access. The security device provides Internet browser and e-mail application, which can be used instead of unsecure applications of the user device to access Web resources through the first and second secure network connections. In addition, the security device includes a secure keyboard, which can be used by the device user instead of the unsecure keyboard of the user device to enter user authentication data for accessing the desired Web resources.

Description

[0001] Cross references to related applications [0002] According to Section 119(e) of Title 35 of the United States Code, this application claims the priority of the provisional application filed on September 30, 2011 with the application number 61 / 541,237, which is incorporated herein by reference . Technical field [0003] The present disclosure generally relates to the field of network security, and particularly relates to systems, methods, and computer program products for providing secure Internet access to user equipment operating in a non-secure network environment. Background technique [0004] Although significant progress has been made in the field of computer and network security, the number of security threats continues to grow. Cybercriminals are developing new types of malicious software, such as viruses, Trojan horses, and worms, to steal confidential personal information from computers, mobile phones, and other electronic devices that use wired, wireless, or cellu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/105H04L63/1433H04W12/088H04L9/32H04L63/02H04L63/08
Inventor 安德烈·P·多克瓦罗夫帕维尔·V·达金谢尔盖·Y·戈洛瓦诺夫伊戈尔·I·索门科夫德米特里·A·库拉基尼阿列克谢·Y·沃伊托夫斯基尤金·V·卡斯佩尔斯基
Owner AO KASPERSKY LAB