AU2011200015A1 - An Internet Security Device - Google Patents
An Internet Security Device Download PDFInfo
- Publication number
- AU2011200015A1 AU2011200015A1 AU2011200015A AU2011200015A AU2011200015A1 AU 2011200015 A1 AU2011200015 A1 AU 2011200015A1 AU 2011200015 A AU2011200015 A AU 2011200015A AU 2011200015 A AU2011200015 A AU 2011200015A AU 2011200015 A1 AU2011200015 A1 AU 2011200015A1
- Authority
- AU
- Australia
- Prior art keywords
- internet
- computer
- security device
- switch
- internet security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims description 9
- 238000001514 detection method Methods 0.000 description 2
- 238000000034 method Methods 0.000 description 2
- 102100029272 5-demethoxyubiquinone hydroxylase, mitochondrial Human genes 0.000 description 1
- 241001559589 Cullen Species 0.000 description 1
- 101000770593 Homo sapiens 5-demethoxyubiquinone hydroxylase, mitochondrial Proteins 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
Abstract
Abstract This invention relates to a "plug and play firewall" device, providing a solution to internet security by minimizing unwanted, unauthorized and illegal 5 exploitation of personal computers. <0 (/)
Description
AUSTRALIA Patents Act 1990 COMPLETE PATENT SPECIFICATION Name of Applicant: Wai Tong Actual Inventor: Wai Tong Address for Service: Cullens Patent & Trade Mark Attorneys Level 32, 239 George Street Brisbane QLD 4000 Australia Invention Title: An Internet Security Device The following statement is a full description of this invention, including the best method of performing it, known to the applicant: Title of the Invention An Internet security device Field of the Invention The invention relates to protecting security of a computer for use over the 5 internet. Background of the Invention Internet users need to feel secure when accessing the internet on their computers. Users require security in terms of protection of information on their o computer whilst accessing, downloading material from the internet, or even when the computer is idle. The arrival of new high-speed, fulltime internet connections has lead to an unwanted problem of the user or users being continually susceptible to intrusion and attacks through the internet. This security problem is far more prevalent now with the 15 increased number of users utilizing high- speed, fulltime broadband connections to the internet. In addition, inherent weaknesses in network protocols have made attacks against the availability of network services extremely tempting for many would-be attackers Therefore, broadband internet users are much more vulnerable to intrusion and or attacks and are at a much greater security risk from unauthorized 20 perpetrators. 1 Previous solutions to protecting information assets have included systems providing more secure computers by installing software with virus detection and prevention, firewalls, host and network intrusion detection, encryption, and secure host configurations. Such systems, however, suffer from continuous software-patch 5 management, access control and review, penetration testing, and vulnerability assessments. The process involved in each of these systems is labor intensive and expensive manner of ensuring adequate and timely connectivity and security. Furthermore, users of desk-top computers without firewalls and software to detect fraudulent access via the internet are most vulnerable to unauthorised access o to personal computers by hackers who exploit weaknesses in software. The object of this invention is to at least overcome the problem of the prior art related to security of computers when used to access the internet. It is also the object of this invention to provide a high level of security over the internet with low cost and complexity. 5 Summary of the Invention According to one aspect of the present invention, there is provided an Internet security device including: a first connector interface for connecting in communication with a computer; 20 a second connector interface for connecting in communication with the Internet; and 2 a mechanical switch for disabling Internet communication between the connector interfaces. Advantageously, the switch can simply disable the Internet connection when 5 the computer is not in use to avoid the possibility of an unauthorised attack at that time. The Internet security device may further include a housing and the switch may be mounted to the housing. The connector interfaces may include CAT 5 sockets, or 0 any otherlike signal transmission socket and cable arrangements, mounted to oppostie ends of the housing. The switch may be configured to disable each CAT5 communication line between the sockets. The switch may be a rocker switch. The Internet security device may further include pair of cables terminating in 5 CAT 5 plugs for engaging in the sockets. One of the cables may be connectable to the computer and the other cable may be connectable to a modem. In an alternative embodiment, the Internet security device may be provided on a personal computer manufacturer interface adaptor (PCMIA) card. 20 In yet another alternative embodiment, the Internet security device may be built into the computer with the switch mounted to either a housing of the computer, a keyboard of the computer or a mouse of the computer. 3 Brief Description of the drawings Figure 1 illustrates an Internet security device according to an embodiment of the invention. 5 Detailed Description of the Invention This invention relates to a "plug and play firewall" device, providing a solution to internet security by minimizing unwanted, unauthorized and illegal exploitation of personal computers. Figure 1 illustrates a device according to an embodiment of the invention. 0 A represents a connector plug terminating a cable for "line in" at one end and "line out" at the other end; B represents a switch body housing; C represents a CAT 5 connector socket or adapter; and D represents an on/off rocker switch component. 15 The device comprises a switch and means to receive lead or cable connections to enable connection to the computer and/or modem or other internet facility. The device works for both the dial-up and broadband connection, the only difference is based on the socket size. 4 The switch enables and disables connection to the internet. After disabling the connection, the user needs to manually switch on in order 5 to connect back to the internet, whilst all of the other computer operations remain unchanged except that it is totally and physically disconnected from all outside communication so that the hacker cannot access information or data on the computer. The only way to reconnect to the computer is for the user to put the connection physically ON again via the switch. D An alternative version is a built-in unit for use in desktop personal computers. These personal computers are older versions without an inbuilt switch. The idea is to retrofit with the switch existing old personal computers which do not have means to disconnect to the internet. Thus the device 5 according to the instant invention is easy to install and designed to retrofit into a pre-existing personal computer system. The device or switch only disconnects connection to the internet. All of the other functions of the computer are available to the user. This means that the user does not need to reboot the computer, thereby avoiding lengthy details 20 and inconvenience to the user. The switch includes a manually operated switch to enable and disable link to the internet connection. The switch is selected from a toggle; on-off selection; rocket; button, push button, rotary, knob, slide or sensor or variations thereof. 5 The lead which connects to the device is a Category 5 (CAT 5) lead or variations thereof. In the laptop version, the CAT 5 lead connects to a device including a slide-in type of device such as a personal computer manufacturer interface 5 adaptor (PCMIA) card, the slide-in type of device comprising the switch in which the device is connected to the computer. One end of the lead connects to the device, whilst the other end connects to the modem or router for internet connection. The use of the device reduces excessive damage to the lead and the o internal parts of the computer when the lead is directly linked to the computer. Without the device, the CAT 5 lead connection will eventually break due to excessive use. The device comprising the switch enables disconnection without the inconvenience to remove the CAT 5 lead each time, thereby preventing wear and tear on the lead connection and damage to the interior 5 connection of the computer. In the desktop version, the CAT 5 lead connects to a modem at one end. The other end of the lead is connected to the device. The other end of the device comprises an additional CAT 5 lead which connects the device to the desktop. 20 A variation to the desktop version includes a built in device with a built in switch wherein the lead is connected to a broadband connection or dial up modem or other internet connection facility. The device in this variation is 6 fitted or installed directly to the motherboard of the desktop computer. The connection to the computer is redirected to the switch. The switch may be installed or built-in on any part of the computer, preferably on the front or top part of the computer to enable the user easy access to the connection. The 5 switch may be also installed at the back or side ends of the computer, and variations thereof. The switch can be mounted to either a housing of the computer, a keyboard of the computer or a mouse of the computer. In another example of the instant invention, the device disconnects all lines on the CAT 5 lead. The CAT 5 cable includes multiple connections and o upto 10 pairs of cables. The device cuts all 10 connections; custom made switch. Normally only 2 pairs of wire in cable lead is sufficient to disconnect broad band signal. However, some hackers may still illegally exploit the computer despite the disconnection. This invention prevents the hacker to exploit the computer because all 10 pairs or part thereof are disconnected. 7
Claims (9)
1. An Internet security device including: a first connector interface for connecting in communication with a computer; a second connector interface for connecting in communication with the Internet; and a mechanical switch for disabling Internet communication between the connector interfaces.
2. An Internet security device as claimed in claim 1, further including a housing wherein the switch is mounted to the housing.
3. An Internet security device as claimed in claim 2, wherein the connector interfaces include CAT 5 sockets mounted to oppostie ends of the housing.
4. An Internet security device as claimed in claim 3, wherein the switch is configured to disable each CAT 5 communication line between the sockets.
5. An Internet security device as claimed in claim 1, wherein the switch is a rocker switch.
6. An Internet security device as claimed in claim 3, further including a pair of cables terminating in CAT 5 plugs for engaging in the sockets. 8
7. An Internet security device as claimed in claim 6, wherein one of the cables is connectable to the computer and the other cable is connectable to a modem.
8. An Internet security device as claimed in claim 1 and provided on a personal computer manufacturer interface adaptor (PCMIA) card.
9. An Internet security device as claimed in claim 1 and built into the computer. 9
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2011200015A AU2011200015A1 (en) | 2011-01-04 | 2011-01-04 | An Internet Security Device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2011200015A AU2011200015A1 (en) | 2011-01-04 | 2011-01-04 | An Internet Security Device |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2011200015A1 true AU2011200015A1 (en) | 2012-07-19 |
Family
ID=46615053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2011200015A Pending AU2011200015A1 (en) | 2011-01-04 | 2011-01-04 | An Internet Security Device |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2011200015A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107425383A (en) * | 2017-07-14 | 2017-12-01 | 联想(北京)有限公司 | External equipment |
-
2011
- 2011-01-04 AU AU2011200015A patent/AU2011200015A1/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107425383A (en) * | 2017-07-14 | 2017-12-01 | 联想(北京)有限公司 | External equipment |
CN107425383B (en) * | 2017-07-14 | 2020-07-24 | 联想(北京)有限公司 | External device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10970423B2 (en) | Method and apparatus for securing KVM matrix | |
CN109543475B (en) | External terminal protection device and protection system | |
US9940487B2 (en) | USB security device, apparatus, method and system | |
US8281114B2 (en) | Security system with methodology for defending against security breaches of peripheral devices | |
CN109561071B (en) | Data flow control's external terminal protective equipment and protection system | |
US8954624B2 (en) | Method and system for securing input from an external device to a host | |
US10291599B2 (en) | Systems, methods and apparatus for keystroke encryption | |
CN113961984B (en) | Host computing system and method for host computing system | |
US7818790B1 (en) | Router for use in a monitored network | |
US9245118B2 (en) | Methods for identifying key logging activities with a portable device and devices thereof | |
CN114556343B (en) | Secure installation of baseboard management controller firmware via a physical interface | |
GB2525248A (en) | A computer security system and method | |
WO2013042108A1 (en) | Security plug for preventing access to a usb socket and secured usb device | |
US11023575B2 (en) | Security sanitization of USB devices | |
CN111901418B (en) | External terminal protection equipment and system based on unidirectional file transfer protocol | |
AU2011101715A4 (en) | An Internet Security Device | |
US8577035B2 (en) | Electronic circuit for securing data interchanges between a computer station and a network | |
AU2011200015A1 (en) | An Internet Security Device | |
WO2009088577A1 (en) | Management engine secured input | |
CN111885179B (en) | External terminal protection device and protection system based on file monitoring service | |
US20190097991A1 (en) | Ethernet key | |
US11936738B2 (en) | System, method, and computer program product for managing a connection between a device and a network | |
JP6138224B1 (en) | Interface security system, peripheral device connection method, electronic device, and computer program | |
KR20240116499A (en) | Power outage monitoring devices, methods and external protection devices | |
KR100537930B1 (en) | Guarding method for input data by usb keyboard and guarding system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
DA3 | Amendments made section 104 |
Free format text: THE NATURE OF THE AMENDMENT IS: APPLICATION IS TO PROCEED UNDER THE NUMBER 2011101715 |