PORTABLE SECURE COMPUTING NETWORK
First Claim
1. A method for creating a secure online environment for a computing device connected to an untrusted network using a trusted computing device connected to a trusted network, comprising:
- installing a proxy server on a first computing device, from a set of trusted computing devices that use one or more trusted networks for online access;
generating one or more shared encryption keys for the first computing device and a portable storage device;
initiating contact with the first computing device from a second computing device that accesses an untrusted network comprising initiating a proxy server protocol from the portable storage device using the second computing device over the untrusted network; and
creating a secure connection between the second computing device and the first computing device using the shared encryption keys.
2 Assignments
0 Petitions
Accused Products
Abstract
As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first device and a portable storage device. A connection is initiated between a second computing device (e.g., remote device), connected to an untrusted network, and the first computing device, comprising initiating a proxy server protocol from the portable storage device (e.g., attached to the second device), using the second computing device. A secure connection between the first and second devices is created using the encryption keys.
-
Citations
20 Claims
-
1. A method for creating a secure online environment for a computing device connected to an untrusted network using a trusted computing device connected to a trusted network, comprising:
-
installing a proxy server on a first computing device, from a set of trusted computing devices that use one or more trusted networks for online access; generating one or more shared encryption keys for the first computing device and a portable storage device; initiating contact with the first computing device from a second computing device that accesses an untrusted network comprising initiating a proxy server protocol from the portable storage device using the second computing device over the untrusted network; and creating a secure connection between the second computing device and the first computing device using the shared encryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for creating a secure online environment for a computing device connected to an untrusted network using a trusted computing device connected to a trusted network, comprising:
-
a proxy server installer configured to install a proxy server on a first computing device, from a set of trusted computing devices that use one or more trusted networks for network access; an encryption key generator configured to generate one or more shared encryption keys for the first computing device and a portable storage device; and a secure connection generator disposed on the portable storage device, comprising a proxy server initiator configured to initiate a proxy server protocol from the portable storage device using a connected second computing device, where the second computing device accesses an untrusted network, and the secure connection generator configured to; initiate contact with the first computing device from the second computing device over the untrusted network using the proxy server protocol; and create a secure connection between the second computing device and the first computing device using the encryption keys over the untrusted network. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method for creating a secure online environment for a computing device connected to an untrusted network using a trusted computing device connected to a trusted network, comprising:
-
installing a proxy server from the portable storage device on respective computing devices, from a set of trusted computing devices that use one or more trusted networks for network access; generating one or more shared encryption keys for the portable storage device and the respective computing devices in the set of trusted computing devices comprising one of; generating an asymmetric public/private key pair for the first computing device, and writing the public key to the portable storage device; and generating a symmetric key and storing the key on the first computing device and the portable storage device; initiating a proxy server protocol from the portable storage device using a second computing device that accesses an untrusted network; initiating contact with a first computing device from the second computing device over the untrusted network using the proxy server protocol, comprising selecting a desired trusted computing device from the set of trusted computing devices, the desired trusted computing device comprising a trusted computing device that provides a desired proximity to the second computing device and a desired connection speed; creating a secure connection between the second computing device and the first computing device using the shared encryption keys; and proxying data traffic for the second computing device that is using the untrusted network through the first computing device that is using the trusted network.
-
Specification