Wireless hotspot with lightweight anti-malware
First Claim
1. A computer-implemented method of providing a wireless hotspot, the method comprising:
- a mobile computing device connecting to a mobile phone by way of a wireless computer network, the mobile phone serving as a wireless hotspot for connecting to the Internet;
the mobile phone receiving network traffic from a web server on the Internet over a mobile phone network, the network traffic being for the mobile computing device;
the mobile phone sending identifying characteristics of an incoming data from the network traffic to a cloud security network for evaluation;
the mobile phone receiving a result of the evaluation from the cloud security network; and
the mobile phone making the forwarding of the incoming data to the mobile computing device over the wireless computer network contingent on the result of the evaluation.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile computing device, such as a mobile phone, serves as a wireless hotspot for other mobile computing devices. The other mobile computing devices connect to the mobile phone over a wireless computer network, and the mobile phone connects to the Internet over a mobile phone network. The wireless computer network may be a WiFi network and the mobile phone network may be a 3G network. The mobile phone may include a lightweight anti-malware client for screening network traffic between the other mobile computing devices and web servers on the Internet. The lightweight anti-malware client may consult a cloud security network for reputation of data included in the network traffic.
-
Citations
19 Claims
-
1. A computer-implemented method of providing a wireless hotspot, the method comprising:
-
a mobile computing device connecting to a mobile phone by way of a wireless computer network, the mobile phone serving as a wireless hotspot for connecting to the Internet; the mobile phone receiving network traffic from a web server on the Internet over a mobile phone network, the network traffic being for the mobile computing device; the mobile phone sending identifying characteristics of an incoming data from the network traffic to a cloud security network for evaluation; the mobile phone receiving a result of the evaluation from the cloud security network; and the mobile phone making the forwarding of the incoming data to the mobile computing device over the wireless computer network contingent on the result of the evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for providing a wireless hotspot, the system comprising:
-
a web server; a plurality of mobile computing devices connected to the Internet by way of a wireless hotspot; and a mobile phone configured to serve as the wireless hotspot for the plurality of mobile computing devices, the mobile phone including a wireless computer network interface for connecting to a wireless computer network and a mobile phone network interface for connecting to a mobile phone network, the mobile phone being connected to the plurality of mobile computing devices over the wireless computer network and to the web server on the Internet over the mobile phone network, the mobile phone including a lightweight anti-malware client configured to receive incoming data transmitted by the web server to a mobile computing device in the plurality of mobile computing devices and to screen the incoming data for malicious content using a remotely located cloud security network, the mobile phone forwarding the incoming data to the mobile computing device depending on a result of evaluation of the incoming data by the remotely located cloud security network. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer-implemented method of providing a wireless hotspot, the method comprising:
-
a first mobile computing device serving as a wireless hotspot for a second mobile computing device; the first mobile computing device receiving network traffic between the second mobile computing device and a web server, the first mobile computing device communicating with the second mobile computing device over a wireless computer network, the first mobile computing device communicating with the web server over a mobile phone network; and the first mobile computing device screening the network traffic for malicious content, the first mobile computing device sending identifying characteristics of the network traffic to a cloud security network for evaluation, and blocking the network traffic to prevent the network traffic from being forwarded out of the first mobile computing device depending on a result of the evaluation of the cloud security network of the identifying characteristics of the network traffic. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification