Trusted bypass for secure communication
First Claim
1. A device comprising:
- a first port;
a second port;
a encryption module in communication with the first port and the second port, wherein the encryption module is configured to be operable in a first mode and in a second mode, wherein in the first mode the encryption module is configured to encrypt and send first data from the first port to the second port, and in the second mode the encryption module is configured to;
receive second data from the first port, andprevent the second data from being sent unencrypted to the second port until an approval indication is received by a user interface of the device; and
the user interface configured to;
display information indicating that the second data is to be sent unencrypted to the second port prior to the second data being sent to the second port,receive the approval indication, andindicate to the encryption module that the approval indication has been received, wherein the encryption module is further configured to send the second data unencrypted to the second port based on the approval indication being received by the user interface.
2 Assignments
0 Petitions
Accused Products
Abstract
A device having an encryption module in communication with first and second communication ports may facilitate connecting to an access network, without requiring a non-secure hard drive to initiate the network access. The encryption module may define a normal mode and a bypass mode. In normal mode, data from the first port may be sent encrypted to the second port, for communicating securely in an encrypted environment. In bypass mode, data from the first port may be sent unencrypted to the second port. The data being sent may be intercepted and presented to the user for approval in a human readable format. The user may confirm that the data is appropriate for being sent unencrypted. This data may be sent unencrypted in response to a request for information (e.g., an assent to terms and conditions) from the access network, such as at a hotel or public wireless hotspot, for example.
-
Citations
21 Claims
-
1. A device comprising:
-
a first port; a second port; a encryption module in communication with the first port and the second port, wherein the encryption module is configured to be operable in a first mode and in a second mode, wherein in the first mode the encryption module is configured to encrypt and send first data from the first port to the second port, and in the second mode the encryption module is configured to; receive second data from the first port, and prevent the second data from being sent unencrypted to the second port until an approval indication is received by a user interface of the device; and the user interface configured to; display information indicating that the second data is to be sent unencrypted to the second port prior to the second data being sent to the second port, receive the approval indication, and indicate to the encryption module that the approval indication has been received, wherein the encryption module is further configured to send the second data unencrypted to the second port based on the approval indication being received by the user interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A device comprising:
-
a secure-side input; a non-secure-side output; an encryption module configured to operate in a bypass mode and a normal mode, wherein in the normal mode the encryption module is configured to encrypt data from the secure-side input and send the encrypted data to the non-secure-side output, and in the bypass mode the encryption module is configured to; receive unencrypted data from the secure-side input, and prevent the unencrypted data from being sent to the non-secure-side output until an approval indication is received by a user interface of the device; and
the user interface configured to;present at least a portion of the unencrypted data for approval, and receive the approval indication, wherein in the bypass mode the encryption module is further configured to send the unencrypted data to the non-secure-side output based on the approval indication being received by the user interface. - View Dependent Claims (14, 15)
-
-
16. A device comprising;
-
an input; an output; an encryption module configured to operate in a bypass mode and a normal mode, wherein in the normal mode the encryption module is configured to encrypt data from the secure-side input and send the encrypted data to the non-secure-side output, and in the bypass mode the encryption module is configured to prevent unencrypted data received from the input from being sent to the output until an approval indication for the unencrypted data is received by a user interface of the device; and the user interface configured to present a request for approval to send the unencrypted data to the output and receive the approval indication after presenting the request for approval, wherein in the bypass mode the encryption module is further configured to send the unencrypted data to the output based on the approval indication being received by the user interface. - View Dependent Claims (17)
-
-
18. A non-transitory computer readable storage medium to provide a bypass mode in an encryption system, the non-transitory computer readable storage medium including computer executable instructions to perform a method, the method comprising:
-
operate an encryption module in a normal mode, wherein in the normal mode the encryption module encrypts data received from an input and sends the encrypted data to an output; and operate the encryption module in a bypass mode, wherein the bypass mode; the encryption module receives unencrypted data from the input, the encryption module prevents the unencrypted data from being sent to the output until an approval indication is received by a user interface, the user interface presents at least a portion of the unencrypted data for examination, and responsive to an indication received via the user interface that the unencrypted data is approved, the encryption module forwards the unencrypted data to the output. - View Dependent Claims (19, 20, 21)
-
Specification