AU2011200015A1 - An Internet Security Device - Google Patents

An Internet Security Device Download PDF

Info

Publication number
AU2011200015A1
AU2011200015A1 AU2011200015A AU2011200015A AU2011200015A1 AU 2011200015 A1 AU2011200015 A1 AU 2011200015A1 AU 2011200015 A AU2011200015 A AU 2011200015A AU 2011200015 A AU2011200015 A AU 2011200015A AU 2011200015 A1 AU2011200015 A1 AU 2011200015A1
Authority
AU
Australia
Prior art keywords
internet
computer
security device
switch
internet security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
AU2011200015A
Inventor
Wai Tong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2011200015A priority Critical patent/AU2011200015A1/en
Publication of AU2011200015A1 publication Critical patent/AU2011200015A1/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

Abstract This invention relates to a "plug and play firewall" device, providing a solution to internet security by minimizing unwanted, unauthorized and illegal 5 exploitation of personal computers. <0 (/)

Description

AUSTRALIA Patents Act 1990 COMPLETE PATENT SPECIFICATION Name of Applicant: Wai Tong Actual Inventor: Wai Tong Address for Service: Cullens Patent & Trade Mark Attorneys Level 32, 239 George Street Brisbane QLD 4000 Australia Invention Title: An Internet Security Device The following statement is a full description of this invention, including the best method of performing it, known to the applicant: Title of the Invention An Internet security device Field of the Invention The invention relates to protecting security of a computer for use over the 5 internet. Background of the Invention Internet users need to feel secure when accessing the internet on their computers. Users require security in terms of protection of information on their o computer whilst accessing, downloading material from the internet, or even when the computer is idle. The arrival of new high-speed, fulltime internet connections has lead to an unwanted problem of the user or users being continually susceptible to intrusion and attacks through the internet. This security problem is far more prevalent now with the 15 increased number of users utilizing high- speed, fulltime broadband connections to the internet. In addition, inherent weaknesses in network protocols have made attacks against the availability of network services extremely tempting for many would-be attackers Therefore, broadband internet users are much more vulnerable to intrusion and or attacks and are at a much greater security risk from unauthorized 20 perpetrators. 1 Previous solutions to protecting information assets have included systems providing more secure computers by installing software with virus detection and prevention, firewalls, host and network intrusion detection, encryption, and secure host configurations. Such systems, however, suffer from continuous software-patch 5 management, access control and review, penetration testing, and vulnerability assessments. The process involved in each of these systems is labor intensive and expensive manner of ensuring adequate and timely connectivity and security. Furthermore, users of desk-top computers without firewalls and software to detect fraudulent access via the internet are most vulnerable to unauthorised access o to personal computers by hackers who exploit weaknesses in software. The object of this invention is to at least overcome the problem of the prior art related to security of computers when used to access the internet. It is also the object of this invention to provide a high level of security over the internet with low cost and complexity. 5 Summary of the Invention According to one aspect of the present invention, there is provided an Internet security device including: a first connector interface for connecting in communication with a computer; 20 a second connector interface for connecting in communication with the Internet; and 2 a mechanical switch for disabling Internet communication between the connector interfaces. Advantageously, the switch can simply disable the Internet connection when 5 the computer is not in use to avoid the possibility of an unauthorised attack at that time. The Internet security device may further include a housing and the switch may be mounted to the housing. The connector interfaces may include CAT 5 sockets, or 0 any otherlike signal transmission socket and cable arrangements, mounted to oppostie ends of the housing. The switch may be configured to disable each CAT5 communication line between the sockets. The switch may be a rocker switch. The Internet security device may further include pair of cables terminating in 5 CAT 5 plugs for engaging in the sockets. One of the cables may be connectable to the computer and the other cable may be connectable to a modem. In an alternative embodiment, the Internet security device may be provided on a personal computer manufacturer interface adaptor (PCMIA) card. 20 In yet another alternative embodiment, the Internet security device may be built into the computer with the switch mounted to either a housing of the computer, a keyboard of the computer or a mouse of the computer. 3 Brief Description of the drawings Figure 1 illustrates an Internet security device according to an embodiment of the invention. 5 Detailed Description of the Invention This invention relates to a "plug and play firewall" device, providing a solution to internet security by minimizing unwanted, unauthorized and illegal exploitation of personal computers. Figure 1 illustrates a device according to an embodiment of the invention. 0 A represents a connector plug terminating a cable for "line in" at one end and "line out" at the other end; B represents a switch body housing; C represents a CAT 5 connector socket or adapter; and D represents an on/off rocker switch component. 15 The device comprises a switch and means to receive lead or cable connections to enable connection to the computer and/or modem or other internet facility. The device works for both the dial-up and broadband connection, the only difference is based on the socket size. 4 The switch enables and disables connection to the internet. After disabling the connection, the user needs to manually switch on in order 5 to connect back to the internet, whilst all of the other computer operations remain unchanged except that it is totally and physically disconnected from all outside communication so that the hacker cannot access information or data on the computer. The only way to reconnect to the computer is for the user to put the connection physically ON again via the switch. D An alternative version is a built-in unit for use in desktop personal computers. These personal computers are older versions without an inbuilt switch. The idea is to retrofit with the switch existing old personal computers which do not have means to disconnect to the internet. Thus the device 5 according to the instant invention is easy to install and designed to retrofit into a pre-existing personal computer system. The device or switch only disconnects connection to the internet. All of the other functions of the computer are available to the user. This means that the user does not need to reboot the computer, thereby avoiding lengthy details 20 and inconvenience to the user. The switch includes a manually operated switch to enable and disable link to the internet connection. The switch is selected from a toggle; on-off selection; rocket; button, push button, rotary, knob, slide or sensor or variations thereof. 5 The lead which connects to the device is a Category 5 (CAT 5) lead or variations thereof. In the laptop version, the CAT 5 lead connects to a device including a slide-in type of device such as a personal computer manufacturer interface 5 adaptor (PCMIA) card, the slide-in type of device comprising the switch in which the device is connected to the computer. One end of the lead connects to the device, whilst the other end connects to the modem or router for internet connection. The use of the device reduces excessive damage to the lead and the o internal parts of the computer when the lead is directly linked to the computer. Without the device, the CAT 5 lead connection will eventually break due to excessive use. The device comprising the switch enables disconnection without the inconvenience to remove the CAT 5 lead each time, thereby preventing wear and tear on the lead connection and damage to the interior 5 connection of the computer. In the desktop version, the CAT 5 lead connects to a modem at one end. The other end of the lead is connected to the device. The other end of the device comprises an additional CAT 5 lead which connects the device to the desktop. 20 A variation to the desktop version includes a built in device with a built in switch wherein the lead is connected to a broadband connection or dial up modem or other internet connection facility. The device in this variation is 6 fitted or installed directly to the motherboard of the desktop computer. The connection to the computer is redirected to the switch. The switch may be installed or built-in on any part of the computer, preferably on the front or top part of the computer to enable the user easy access to the connection. The 5 switch may be also installed at the back or side ends of the computer, and variations thereof. The switch can be mounted to either a housing of the computer, a keyboard of the computer or a mouse of the computer. In another example of the instant invention, the device disconnects all lines on the CAT 5 lead. The CAT 5 cable includes multiple connections and o upto 10 pairs of cables. The device cuts all 10 connections; custom made switch. Normally only 2 pairs of wire in cable lead is sufficient to disconnect broad band signal. However, some hackers may still illegally exploit the computer despite the disconnection. This invention prevents the hacker to exploit the computer because all 10 pairs or part thereof are disconnected. 7

Claims (9)

1. An Internet security device including: a first connector interface for connecting in communication with a computer; a second connector interface for connecting in communication with the Internet; and a mechanical switch for disabling Internet communication between the connector interfaces.
2. An Internet security device as claimed in claim 1, further including a housing wherein the switch is mounted to the housing.
3. An Internet security device as claimed in claim 2, wherein the connector interfaces include CAT 5 sockets mounted to oppostie ends of the housing.
4. An Internet security device as claimed in claim 3, wherein the switch is configured to disable each CAT 5 communication line between the sockets.
5. An Internet security device as claimed in claim 1, wherein the switch is a rocker switch.
6. An Internet security device as claimed in claim 3, further including a pair of cables terminating in CAT 5 plugs for engaging in the sockets. 8
7. An Internet security device as claimed in claim 6, wherein one of the cables is connectable to the computer and the other cable is connectable to a modem.
8. An Internet security device as claimed in claim 1 and provided on a personal computer manufacturer interface adaptor (PCMIA) card.
9. An Internet security device as claimed in claim 1 and built into the computer. 9
AU2011200015A 2011-01-04 2011-01-04 An Internet Security Device Pending AU2011200015A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2011200015A AU2011200015A1 (en) 2011-01-04 2011-01-04 An Internet Security Device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2011200015A AU2011200015A1 (en) 2011-01-04 2011-01-04 An Internet Security Device

Publications (1)

Publication Number Publication Date
AU2011200015A1 true AU2011200015A1 (en) 2012-07-19

Family

ID=46615053

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2011200015A Pending AU2011200015A1 (en) 2011-01-04 2011-01-04 An Internet Security Device

Country Status (1)

Country Link
AU (1) AU2011200015A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107425383A (en) * 2017-07-14 2017-12-01 联想(北京)有限公司 External equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107425383A (en) * 2017-07-14 2017-12-01 联想(北京)有限公司 External equipment
CN107425383B (en) * 2017-07-14 2020-07-24 联想(北京)有限公司 External device

Similar Documents

Publication Publication Date Title
US10970423B2 (en) Method and apparatus for securing KVM matrix
CN109543475B (en) External terminal protection device and protection system
US8281114B2 (en) Security system with methodology for defending against security breaches of peripheral devices
CN109561071B (en) Data flow control&#39;s external terminal protective equipment and protection system
US7818790B1 (en) Router for use in a monitored network
US10291599B2 (en) Systems, methods and apparatus for keystroke encryption
US9245118B2 (en) Methods for identifying key logging activities with a portable device and devices thereof
GB2525248A (en) A computer security system and method
US7409563B2 (en) Method and apparatus for preventing un-authorized attachment of computer peripherals
CN101355459A (en) Method for monitoring network based on credible protocol
WO2013042108A1 (en) Security plug for preventing access to a usb socket and secured usb device
CN113961984B (en) Host computing system and method for host computing system
AU2006298428B2 (en) Method and system for securing input from an external device to a host
CN111901418B (en) External terminal protection equipment and system based on unidirectional file transfer protocol
CN103824014A (en) Isolation certificating and monitoring method of USB (universal serial bus) port within local area network
US20070020976A1 (en) Methods and apparatus for proving secure communication ports using a universal port device
AU2011101715A4 (en) An Internet Security Device
AU2011200015A1 (en) An Internet Security Device
US20100132046A1 (en) Electronic Circuit for Securing Data Interchanges Between a Computer Station and a Network
US11677743B2 (en) Ethernet key
CN111885179B (en) External terminal protection device and protection system based on file monitoring service
US11936738B2 (en) System, method, and computer program product for managing a connection between a device and a network
CN202085191U (en) Data safe storage and transmission system
JP6138224B1 (en) Interface security system, peripheral device connection method, electronic device, and computer program
KR100537930B1 (en) Guarding method for input data by usb keyboard and guarding system

Legal Events

Date Code Title Description
DA3 Amendments made section 104

Free format text: THE NATURE OF THE AMENDMENT IS: APPLICATION IS TO PROCEED UNDER THE NUMBER 2011101715