Wireless connectivity security technique
First Claim
1. A method of transmitting data from a wireless device to a destination on the Internet, the method comprising:
- forming a request for data on the wireless device;
encrypting the request;
transmitting the encrypted request via a Wi-Fi signal to an access point;
transmitting the encrypted request from the access point to a security server;
decrypting the request at the security server; and
forwarding the decrypted request to the destination.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are described for providing security for data being transmitted from a device at a public Wi-Fi enabled zone (e.g. a Wi-Fi Hotspot) to a destination on the Internet. Methods and systems are also described for enabling users to send e-mail from these zones and bypassing outgoing e-mail blocks enforced by WISPs. Data are encrypted either entirely or partially on the device by a security application resident on the device. The encrypted data are sent out via a dedicated port on the device. The security application controls this port and closes all the other ports. The encrypted data are transmitted via a wireless Wi-Fi signal to a network component, such a router or other access point. From there the data are transmitted over the Internet to a security server controlled by a Wi-Fi security provider. There they are decrypted and forwarded to a destination. If the data are an e-mail message, the decrypted data are transmitted to an e-mail relay server also under the control of a Wi-Fi security provider. From there it is forwarded to a destination e-mail server.
-
Citations
4 Claims
-
1. A method of transmitting data from a wireless device to a destination on the Internet, the method comprising:
-
forming a request for data on the wireless device;
encrypting the request;
transmitting the encrypted request via a Wi-Fi signal to an access point;
transmitting the encrypted request from the access point to a security server;
decrypting the request at the security server; and
forwarding the decrypted request to the destination.
-
-
2. A method of transmitting an e-mail message from a wireless device to a destination on the Internet, the method comprising:
-
forming an e-mail message on the wireless device;
encrypting the e-mail message;
transmitting the encrypted e-mail message via a Wi-Fi signal to an access point;
transmitting the encrypted e-mail message from the access point to a security server;
decrypting the e-mail message at the security server;
transmitting the decrypted e-mail message from the security server to an e-mail relay server; and
transmitting the e-mail message from the relay server to the destination.
-
-
3. A method of securely transmitting data from a device at a Wi-Fi enabled zone to a destination on the Internet, the method comprising:
-
on the device, encrypting data to be transmitted;
transmitting via a Wi-Fi connection the encrypted data to the Intenet;
at a security server, receiving the encrypted data and decrypting the data;
transmitting the decrypted data to the destination. - View Dependent Claims (4)
-
Specification