Portable Proxy For Security Management And Privacy Protection And Method Of Use
First Claim
1. A portable proxy for network security management, comprising:
- a communication interface configured to connect to a user device and to securely connect to a virtual private network;
a memory configured to store proxy authentication data; and
a processor coupled to the memory and configured to execute code, comprising;
an authentication module configured to perform a proxy authentication protocol with the virtual private network using the proxy authentication data through the secure connection;
a user module configured to provide through the secure connection user credentials upon a successful completion of the proxy authentication protocol; and
a routing module configured to route at least a portion of user device Internet traffic between the user device and the virtual private network through the secure connection and the connection to the user device following an acceptance of the credentials by the virtual private network.
6 Assignments
0 Petitions
Accused Products
Abstract
A portable proxy for security management and privacy protection and methods of use are provided. The proxy establishes a connection to a user device. The proxy also establishes a secure connection to a virtual private network (VPN), performs authentication of the proxy to the VPN, and upon successful completion of the proxy authentication provides access to the VPN through the secure connection user credentials. Once the VPN accepts the credentials, the proxy routes at least a portion of Internet traffic between the user device and the VPN through the secure connection and the connection to the user device. The proxy can also establish a secure connection to an anonymizing service and route all Internet traffic of the user device through the anonymizing service using the secure connection and the connection to the user device.
29 Citations
20 Claims
-
1. A portable proxy for network security management, comprising:
-
a communication interface configured to connect to a user device and to securely connect to a virtual private network; a memory configured to store proxy authentication data; and a processor coupled to the memory and configured to execute code, comprising; an authentication module configured to perform a proxy authentication protocol with the virtual private network using the proxy authentication data through the secure connection; a user module configured to provide through the secure connection user credentials upon a successful completion of the proxy authentication protocol; and a routing module configured to route at least a portion of user device Internet traffic between the user device and the virtual private network through the secure connection and the connection to the user device following an acceptance of the credentials by the virtual private network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A portable proxy for privacy protection, comprising:
-
a communication interface configured to connect to a user device and to securely connect to an anonymizing service; and a processor coupled to a memory to execute code, comprising; a routing module to route substantially all Internet traffic of the user device through the anonymizing service using the connection to the user device and the secure connection. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification