1. Field of the Invention
The present invention generally relates to system and methods for protecting computer networks, and more particularly to a system and method for preventing malicious code from being introduced into a protected network.
2. Discussion of the Background
In recent years, a substantial number of computer cyber attacks are executed by introducing malicious code into a computer through a network connection and which can be activated at a later time (e.g., viruses, worms, etc.). One solution is to close the network and to make the connections to the network only available to authorized computers. Some organizations indeed close their networks, requiring a security protocol to be followed to connect to a computer on the network. While such degree of protection substantially varies, the owners of such networks often consider such networks to be “secure” networks.
However, as illustrated in
One solution for addressing the above problem is to completely close the secure network and exclude such “dual” connections for secure computers. For a variety of reasons, many organizations resist such measures. Furthermore, even if implemented by an organization, such separation is very difficult to enforce in cases of employees traveling with supposedly secure laptop or notebook computers authorized to connect to the secure network outside the control area of the organization, such as when an employee with a secure laptop computer of an organization connects to the Internet while in a hotel room. In this scenario, one simple Internet browsing session in the hotel room can end up with the introduction of malicious code into the secure computer and which then can be introduced into the closed network of the organizational during the next secure session connection with the closed network, even with the most sophisticated security mechanism deployed during such connection.
Therefore, there is a need for a method, system, and device that address the above and other problems with network security systems, and methods. The above and other needs are addressed by the exemplary embodiments of the present invention, which provide a method, system, and device for secure communications. The exemplary embodiments include a computer, such as a laptop, a notebook, a PC, etc., with a possible dual use or dual connections, configured as two or more computers, including an “internal” or “secure” computer, and an “external” or “insecure” computer, and which can be separated to varying degrees. For example, the internal or secure computer can be configured to connect to a corresponding secure network or networks through the Internet or otherwise, while the external or insecure computer can be configured to connect to the Internet with fewer restrictions or without any restrictions at all, as compared to the internal or secure computer. Advantageously, malicious code introduced into the external or insecure computer can be prevented from being introduced into the secure network, wherein damage caused by the malicious code can be limited to the external or insecure computer.
Accordingly, in exemplary aspects of the present invention, a method, system, and device for secure communications are provided, including at least one of means for configuring two or more computer devices as a single computer device; and means for separating the two or more computer devices from one or more computer networks.
Still other aspects, features, and advantages of the present invention are readily apparent from the following detailed description, simply by illustrating a number of exemplary embodiments and implementations, including the best mode contemplated for carrying out the present invention. The present invention also is capable of other and different embodiments, and its several details can be modified in various respects, all without departing from the spirit and scope of the present invention. Accordingly, the drawings and descriptions are to be regarded as illustrative in nature, and not as restrictive.
The embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings, in which like reference numerals refer to similar elements, and in which:
An improved method, system, and device for secure communications are described. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It is apparent to one skilled in the art, however, that the present invention can be practiced without these specific details or with an equivalent arrangement. In some instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention.
Referring now to the drawings,
In an exemplary embodiment, the separation or integration mechanism can include optional common computing mechanisms (e.g., BIOS, OS, memory, etc.) shared between the secure and insecure computers, optional common communications mechanisms (e.g., hardware and/or software ports, communications devices, modems, etc.) shared between secure and insecure computers, and the like. Accordingly, the degree of separation provided by the separation or integration mechanism to the secure and insecure computers can vary, for example, depending on preferences of the user computer manufacturer, preferences of the user, and the like. For example, in a case of fall separation, the separation or integration mechanism can include two separate computers sharing a common display and keyboard, with a manual switch for switching between the secure and insecure computer for respectively connecting to a secure and insecure network. In exemplary embodiments, the user computer combining the secure and insecure computers can be configured to have respective processors, a dual processor arrangement, and the like.
In further exemplary embodiments, a single processor can be employed, while the secure and insecure computers can be separated in various ways. For example, the secure and insecure computers can be configured to share a Basic Input Output System (BIOS), while having different or similar operating systems (e.g., Windows, Linux, and/or Macintosh OS, etc). In still further exemplary embodiments, the secure and insecure computers can be configured to share a hardware communications port, and the like. The separation or integration mechanism can be configured for switching from the secure computer to the insecure computer, and visa versa, and for example, can be implemented with hardware and/or software switching mechanisms, and the like. In an exemplary embodiment, communications mechanisms of the secure computer can be restricted only to communications to one or more designated networks.
With the exemplary separation or integration mechanisms, the combined secure and insecure computers can include respective communications restrictions. In further exemplary embodiments, such a combination can include more than two computers with respective restrictions on their communications. Such restrictions can be achieved through software and/or hardware, for example, by mechanical or other differentiation in ports used for communications connections, and the like.
The above-described devices and subsystems of the exemplary embodiments of
One or more interface mechanisms can be used with the exemplary embodiments of
It is to be understood that the devices and subsystems of the exemplary embodiments of
To implement such variations as well as other variations, a single computer system can be programmed to perform the special purpose functions of one or more of the devices and subsystems of the exemplary embodiments of
The devices and subsystems of the exemplary embodiments of
All or a portion of the devices and subsystems of the exemplary embodiments of
Stored on any one or on a combination of computer readable media, the exemplary embodiments of the present invention can include software for controlling the devices and subsystems of the exemplary embodiments of
As stated above, the devices and subsystems of the exemplary embodiments of
While the present invention have been described in connection with a number of exemplary embodiments and implementations, the present invention is not so limited, but rather covers various modifications and equivalent arrangements, which fall within the purview of the appended claims.
| Filing Document | Filing Date | Country | Kind | 371c Date |
|---|---|---|---|---|
| PCT/US2005/044040 | 12/5/2005 | WO | 00 | 4/2/2008 |
| Number | Date | Country | |
|---|---|---|---|
| 60633176 | Dec 2004 | US |