GB2358996A - Network security device - Google Patents
Network security device Download PDFInfo
- Publication number
- GB2358996A GB2358996A GB0002385A GB0002385A GB2358996A GB 2358996 A GB2358996 A GB 2358996A GB 0002385 A GB0002385 A GB 0002385A GB 0002385 A GB0002385 A GB 0002385A GB 2358996 A GB2358996 A GB 2358996A
- Authority
- GB
- United Kingdom
- Prior art keywords
- network
- security device
- network security
- connection
- remote system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 239000007787 solid Substances 0.000 claims 1
- 238000013475 authorization Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A network security device 1 has a switching circuit which prevents any physical connection being made to a protected network until a connection has been authorised by the network. A remote system wishing to gain access to the protected network dials and connects to the input section 1a of the device. The device prompts the remote system for identification. After receiving identification the processing section 1b disconnects the input section 1a thereby isolating the remote system from the device. The processing section then connects to the output section 1c, establishes a secure connection to the protected network and passes on the identification information. The processing section erases the identification information supplied and disconnects from the output section before reconnecting to the input section enabling it to accept the next request. The protected network authenticates then contacts the remote system.
Description
2358996 1 Network Security Device The invention is an electronic
communications network security device that prevents any unauthorised access to any electronically controlled network.
Many types of network security devices exist but there are none more secure than this device or that could not be enhanced by its addition.
Existing systems suffer from the drawback of allowing potential intruders to physically connect to the network before they are recognised by the network as not having authorisation. This physical connection allows intruders the potential to gain access to confidential information that would include authorised users details.
An object of this invention is to prevent any connection to the targeted network before the connection has been fully authenticated by the network.
Our invention prevents any physical connection being made to the protected network/s until a validated connection is authorised by the network. In short, at no time is the potential intruder physically attached to the targeted device. The invention holds no information that would be of help to a potential hacker, in so much as it stores no names, passwords or any details of the authorised users.
The invention is an electronic device that does not have to be at the same location as the network/s that it is protecting. It can be a stand- alone device or incorporated into a computer.
A specific embodiment will now be described by way of an example with reference to the accompanying line drawings in which:- Figure 1: Shows a simple block diagram of the Network Security Device.
Figure 2: Shows a typical remote access application.
Referring to the drawing, Figure 1, the Network Security Device 1. Comprises of an Input Section 1 a. A Processing Section lb. And an Output Section 1 c. The Processing Section lb. incorporates Fail Safe circuitry that prevents the Input Section 1 a. and the Output Section 1 c. from being connected to the Processing Section lb. simultaneously Referring to the drawing figure 2, In order for a Remote System 2. to gain access to the Protected Network 3. the Remote System 2. dials and connects to the Input Section 1 a. of the Network Security Device 1. The Network Security Device 1. prompts the Remote System 2. for identification. After receiving the identification from the Remote System 2. the Processing Section lb. disconnects the Input Section 1 a. thereby breaking, the Remote System 2. connection from the Network Security Device 1. The Processing Section lb. then connects to the Output Section lc. establishing a secure connection to the Protected Network 3. And passes on the identification supplied. The Processing Section 1 b. erases the identification supplied and disconnects from the Output Section 1 c. before reconnecting the Input Section 1 a. enabling it to accept the next request.
The Protected Network 3. authenticates the Remote System 2. using the identification forwarded from the Network Security Device 1. Authenticated Remote Systems are contacted by the Protected Network 3. using the identification information stored. Non-authenticated attempts are not contacted but the attempt may be logged for future reference.
In the example in figure 2, the Remote System 2. is contacted by the Protected Network using a dial out only Public Service Telephone Network connection, PSTN 5.
I-
Claims (7)
- A network security device that prevents any unauthorised access to any electronically controlled network. The object of this invention is to prevent any connection to the targeted network/s before the connection has been fully authenticated by the network. The invention prevents any physical connection being made to the protected network/s until a validated connection is authorised by the network. This is accomplished by a Fail Safe switching circuit incorporated within the device. In short, at no time is a potential hacker physically attached to the targeted device.
- 2. A Network Security Device as claimed in claim 1 That holds no information that would be of help to a potential hacker, in so much as it stores no names, passwords or any details of the authorised users.
- A Network Security Device as claimed in claims 1 & 2 That does not have to be at the same location as the network/s that it is protecting.
- 4. A Network Security Device as claimed in claims 1, 2, & 3. But using a solid state switching device.
- 5. A Network Security Device as claimed in claims 1. 2, & 3. But using an electromechanical switching device.
- 6. A Network Security Device as claimed in claims 4, & 5. Incorporating any combination of industry standard and proprietary interfaces in the input output sections.
- 7. A Network Security Device as claimed in claims 4, 5, & 6. Incorporating any combination of industry standard and proprietary security protocols in the input output sections.A Network Security Device as claimed in claims 4, 5, & 6. Manufactured as a stand alone item or as a device incorporated into a larger system.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0002385A GB2358996A (en) | 2000-02-03 | 2000-02-03 | Network security device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0002385A GB2358996A (en) | 2000-02-03 | 2000-02-03 | Network security device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB0002385D0 GB0002385D0 (en) | 2000-03-22 |
| GB2358996A true GB2358996A (en) | 2001-08-08 |
Family
ID=9884825
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0002385A Withdrawn GB2358996A (en) | 2000-02-03 | 2000-02-03 | Network security device |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2358996A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6578089B1 (en) * | 1999-04-19 | 2003-06-10 | Emcon Emanation Control Ltd. | Multi-computer access secure switching system |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3984637A (en) * | 1974-11-29 | 1976-10-05 | The Singer Company | Computer terminal security system |
| US4484306A (en) * | 1982-03-22 | 1984-11-20 | Exide Electronics Corporation | Method and apparatus for controlling access in a data transmission system |
| GB2322035A (en) * | 1997-02-05 | 1998-08-12 | Stuart Justin Nash | Computer connected to telecommunication network modem via buffer computer |
| JPH10264439A (en) * | 1997-03-27 | 1998-10-06 | Sharp Corp | Image forming device |
| WO2000025194A1 (en) * | 1998-10-27 | 2000-05-04 | Saios Technologies Holding S.A. | Security interface for data exchange |
-
2000
- 2000-02-03 GB GB0002385A patent/GB2358996A/en not_active Withdrawn
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3984637A (en) * | 1974-11-29 | 1976-10-05 | The Singer Company | Computer terminal security system |
| US4484306A (en) * | 1982-03-22 | 1984-11-20 | Exide Electronics Corporation | Method and apparatus for controlling access in a data transmission system |
| GB2322035A (en) * | 1997-02-05 | 1998-08-12 | Stuart Justin Nash | Computer connected to telecommunication network modem via buffer computer |
| JPH10264439A (en) * | 1997-03-27 | 1998-10-06 | Sharp Corp | Image forming device |
| WO2000025194A1 (en) * | 1998-10-27 | 2000-05-04 | Saios Technologies Holding S.A. | Security interface for data exchange |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6578089B1 (en) * | 1999-04-19 | 2003-06-10 | Emcon Emanation Control Ltd. | Multi-computer access secure switching system |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0002385D0 (en) | 2000-03-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1303843B1 (en) | Integrated security and communications system with secure communications link | |
| US6078908A (en) | Method for authorizing in data transmission systems | |
| CA2650282C (en) | Security system interface module | |
| US7675402B2 (en) | Network communication for a security system | |
| GB2325548A (en) | Security alarm systems | |
| WO2001040912A2 (en) | Security system linked to the internet | |
| WO2001037511A3 (en) | Method and system for remotely configuring and monitoring a communication device | |
| US12175843B2 (en) | Smart sensor device and early warning notification system and method | |
| GB2358996A (en) | Network security device | |
| US7510580B2 (en) | Method and apparatus to eliminate theft of electronic equipment using existing telephone jack | |
| EP2028601A1 (en) | Secure mobile environment policy realization based on timed one-time upkeep codes | |
| US20200226293A1 (en) | Anti-Tampering Switch for Electronic Access Control Readers | |
| KR100944246B1 (en) | Security Management System and Method using Mobile Communication Terminal with Universal Subscriber Identity Module | |
| EP1261941A1 (en) | Management of permit codes | |
| RU2295775C2 (en) | Monitoring system | |
| KR100387708B1 (en) | Security system using mobile station | |
| JP4564180B2 (en) | Monitoring system | |
| JP2002091600A (en) | Method and device for preventing and controlling network remote input by using caller id | |
| KR102565723B1 (en) | Integrated wiring panel alarm guidance system | |
| US12452229B2 (en) | Entry authorization system and method therefor | |
| JP2795101B2 (en) | Public-private service illegal use detection method | |
| KR20080073802A (en) | How to provide security service using the Internet | |
| KR100693339B1 (en) | Redundancy Unlocking System and Method Using Public Telephone Network | |
| EP3956874B1 (en) | System for managing a plurality of alarmed individual spaces | |
| EP1039363A1 (en) | Methof of providing secured data traffic in a computer |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |