Not Applicable
Not Applicable
The present invention generally relates to the field of computer security for personal computing server system and more specifically to a system and method to enhance personal server security using personal server owner's location data.
Personal Computing became popular in the 1980s with the advent of Personal Computers (PCs). During the 1980's, people used PCs for a number of things such as gaming, document creation, word processing, printing document and storing personal data. The personal data remained on the Personal Computer and was backed up using floppies or other external storage medium. PCs were not connected and personal data privacy was not an issue.
With the advent of networking; PCs became connected with other PCs and limited data sharing started between PCs. External networks were created through gateway computers that let PCs talk to other PCs outside a Local Area Network. All data sharing was between systems and usually between trusted parties. Once the data was transferred to other PCs via network, the users slowly lost control of their data. Data on other PCs and systems started to be defined by a different set of terms that are beyond the control of the original user that owned the data.
1990's saw the advent of Internet and Web technologies where PCs started to talk to computer systems from far flung locations. Web technologies introduced software applications that could reside on remote servers and could be accessible to number of users simultaneously. More and more people started to use the PC to connect to the Internet and Web Applications and people started to lose further control of their personal data as their personal data was stored on remote servers. Once the data leaves the PC, the data is managed by the owner of remote servers and policies of the application service providers. PCs soon started to become just a device to access and manage personal data stored on remote servers.
2000's introduced free web based electronic mail services offered by number of companies that lured many to share their personal electronic mail exchanges with companies that would scan mail messages to serve advertisements. Securing privacy and confidentiality to personal data became challenging. Surveillance of personal data exchanged through third party remote servers raised concern on the privacy and confidentiality of personal data.
Today Personal Computing focuses on personal computer desktops and laptops that requires interaction and are being only used to access data or share data through a remote server owned by a separate entity or an application service provider. Applications are owned and managed by third parties. Currently users have a number of personal applications to manage personal data, but this data sits on remote computer servers where the user doesn't have direct control of their data. Data privacy is also not guaranteed as number of other entities may have access to the personal data through data sharing terms that the users may not even be aware of. The remote computer server also hosts data for millions or billions of users. A single security breach makes the personal data of all the users vulnerable. Decentralizing the personal data from remote computer servers into private computer servers called Personal Server (PS); which are placed in the premises of the personal server owner will reduce the risk of such vulnerability to personal data. Users can also have complete control of their data and can share or use the data on their own terms.
Despite advances in computer security computer servers are still vulnerable to sustained attacks that can exploit known vulnerabilities in a computer server. The greater the amount of time a server is exposed to the Wide Area Network (Internet) greater is the risk of being attacked from the internet. Third party remote servers are used by number of different users and hence the access to applications on remote servers needs to be available at all times. Personal servers only serve the personal server owner or a limited set of users authorized by the personal server owner. This enables controlling access to personal servers much easier. Personal servers can be setup to access from multiple networks for example it can be setup to be accessed from Wide Area Network and also Local Area Network. The duration of access can be controlled based on personal server owner's preference.
Some applications on personal servers rely on the personal server being connected to the internet at all times. While other applications only serve the personal server owner and need not be connected to the internet at all times but available only to the Local Area Network or Wide Area Network based on how and when the personal server owner would access such application. The personal server owner can access the personal server applications from the Wide Area Network (Internet) when the personal server owner is away from residential or office premises where the personal server computer is physically located. When in close proximity of the personal server, the personal server owner can access the personal server using the trusted private Local Area Network instead of less trusted Wide Area Network. Applications that doesn't rely on being connected to the Wide Area Network when the personal server owner can access the personal server application from within the trusted Local Area Network can be disabled until such time the personal server owner is away from the personal server location and outside the reach of the Local Area Network. In such cases the personal server applications can be enabled to have access from the Wide Area Network. Selectively disabling applications from the Wide Area Network during the period when the personal server owner is at his premises and therefore can access the personal server from Local Area Network; will greatly enhance the security of the personal server by reducing the time the personal server and personal server applications are exposed to less trusted Wide Area Network (Internet).
This invention provides system and method to enhance the personal server security using the location data generated from the GPS (Global Positioning System) from a client computer such as laptop, smart phone and other forms of client computing device that is mobile and in possession and also owned by the Personal Server owner.
The invention generally relates to a system related with personal server security; the system includes Personal Server (8.10), Personal Server Security Application (8.20), Personal Server Owner's Mobile Device (8.30), Network Router (8.40), Local Area Network (8.50), External IP Address (8.60), Internal IP Address (8.70), Security Client Application (8.80), Personal Server Applications (8.90), Security Client Key And Certificate (8.100), Personal Server Security Application Key (8.110), Personal Server Operating System (8.120), Mobile Device Operating System (8.130), Wide Area Network (internet) (8.140), Domain Name Service (8.150)
There has thus been outlined, rather broadly, some of the features of the invention in order that the detailed description thereof may be better understood, and in order that the present contribution to the art may be better appreciated. There are additional features of the invention that will be described hereinafter.
In this respect, before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not limited in its application to the details of construction or to the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of the description and should not be regarded as limiting.
An object is to provide a System and Method to enhance Personal Server security using Personal Server owner's location data derived from the Personal Server owner's mobile device also called client computer that is equipped with a global positioning system (GPS) or other means of determining the location of the client computer and hence the location of the Personal Server owner at any given time.
Another object is to provide a System and Method to enhance Personal Server Security using Personal Server Owner's location data from the Personal Server owner's mobile computing device by securely sending the location information to the Personal Server automatically to disable Personal Server application access from Wide Area Network (Internet) when the owner is inside or in close proximity to location of the Personal Server where the Personal Server owner can access the Personal Server using the Local Area Network.
Another object is to provide a System and Method to enhance Personal Server Security using Personal Server Owner's location data from the Personal Server owner's mobile computing device by securely sending the location information to the Personal Server automatically to enable Personal Server application access from the Wide Area Network (Internet) when the owner is away from the local premises where the Personal Server cannot access the Personal Server using the Local Area Network
Another object is to provide a System and Method to enhance Personal Server Security using the Personal Server owner's mobile computing device by securely sending commands to the Personal Server manually or on demand to enable or disable the Personal Server applications access from the less trusted Wide Area Network (Internet) when the owner is away from the vicinity of local premises where Personal Server is located.
Another object is to provide a System and Method to enhance Personal Server Security using Personal Server Owner's location data using a pre-loaded security key and certificate on the Personal Server Owner's mobile application to securely authenticate to the Personal Server when communicating to the Personal Server.
Another object is to provide a System and Method to enhance Personal Server Security using Personal Server Owner's last location data as additional authentication data to enhance the authenticity of the request from Wide Area Network for Personal Server applications.
Other objects and advantages of the present invention will become obvious to the reader and it is intended that these objects and advantages are within the scope of the present invention. To the accomplishment of the above and related objects, this invention may be embodied in the form illustrated in the accompanying drawings, attention being called to the fact, however, that the drawings are illustrative only, and that changes may be made in the specific construction illustrated and described within the scope of this application.
Various other objects, features and advantages of the present invention will become fully appreciated as the same becomes better understood when considered in conjunction with the accompanying drawings.
NOTE: Figures use the (N.MMM) format follows the convention where ‘N’ denotes the Figure number to easily locate a referencing item in a Figure. For example—Personal Server (1.110) refers to the Personal Server element marked 1.110 in
Personal Server (8.10) consists of hardware components—Processor (8.11), Memory (8.12), Bus (8.13), I/O Controller (8.17), Storage (8.15), I/O Ports (8.16), and Network Interface (8.14). Personal Server (8.10) run an operating system (8.120) that loads and manages Personal Server Applications (8.90) and Personal Server Security Application (8.20) as it relates to this invention. Personal Server also hosts the Security Key (8.110) that is used to decrypt the secure communication from the Personal Server 337 Security Client Application (8.80) running on the Personal Server Owner's Mobile Device (8.30).
Personal Server Owner's Mobile device (8.30) can communicate with the Personal Server (8.10) over the Wide Area Network (Internet) (8.140) when the Personal Server Owner is away from the home location of the Personal Server, and it can also communicate with Personal Server on the Local Area Network (8.50) using an internal hostname or domain name or Internal IP Address (8.70) when the Personal Server Owner's Mobile Device (8.30) and hence the Personal Server Owner is within the range of the Local Area Network (8.50). When the Personal Server Security Client Application (8.80) is resolving connections to the Personal Server (8.10) from the Wide Area Network (Internet) (8.140), it may resolve the Personal Server using a hostname and domain name that is associated with the External IP address (8.60) of the of the internet service for the premises and routed to the Personal Server with the Local Area Network router. The host name and domain name resolution is done by Domain Name System (DNS) Servers. The DNS Servers receive the association via the Domain Name Service (8.150). The Domain Name Service is subscribed by the Personal Server Owner. Alternatively the in the absence of the Domain Name Service, the Personal Server can also be accessed by the external IP address of the internet service for the premises directly.
This present invention is a method and system for enhancing the Personal Server Security based on the Personal Server Owner's location in relation to location of the Personal Server (8.10) and Local Area Network (8.50). The location of the Personal Server Owner is deduced from the Personal Server Owner's Mobile Device (8.30) such as smart phone, tablet or laptop computer that the Personal Server Owner keeps in their possession.
The system comprising of the Personal Server (8.10) can be used in a home or office environment. A Personal Server (8.10) is a computing server that is designed to manage the personal data and personal automation tasks and runs continuously even when the Personal Server Owner is not in the vicinity of the Personal Server. Unlike a Personal Computer that requires a display monitor and input devices such as mouse and keyboard and constant interaction while seated near the Personal Computer, a Personal Server does not require a display monitor or input devices. It is connected to the Local Area Network (8.50) at home or in an office environment. When the Personal Server Owner is in the vicinity of the Personal Server, it can use a mobile device such as smart phone, tablet or laptop device that can connect to the Personal Server remotely over a Local Area Network or when the Personal Server Owner is away from the reach of the Local Area Network (8.40), it can access the Personal Server over a Wide Area Network (Internet) (8.140). A Local Area Network (8.40) is more trusted and secure as it consists of computing devices that are trusted and usually owned by the Personal Server Owner. A Wide Area Network (Internet) (8.140) is considered less trusted and less secure as it is a network of computers where not all computing devices are trusted. Malicious users can send request to Personal Server and install malicious code that can compromise the Personal Server data.
This invention provides the system and method to reduce the time the Personal Server is exposed to the internet by tracking the location of the Personal Server Owner via the Personal Server Owner's Mobile Device and to disable access from to certain Personal Server applications from the Wide Area Network (Internet) (8.140) when the Personal Server Owner is known to be in the vicinity of the Personal Server (8.10) and can therefore access the Personal Server via the trusted Local Area Network (8.50). When accessing from the trusted Local Area Network (8.50), Personal Server Applications can be disabled from access from the Wide Area Network (Internet). (8.140)
The Personal Server Security Application (8.20) installed on the Personal Server (8.10) receives the Personal Server Owner's location data sent by the Personal Server Security Client Application (8.80) installed on the Personal Server Owner's Mobile Device (1.130). It shuts off access to the Personal Server applications over the Wide Area Network (Internet) (1.140) when it detects the Personal Server Owner is able to access the Personal Server (1.110) using the Local Area Network (1.140). It enables access over the Wide Area Network (8.140) when it detects the Personal Server Owner is outside the Local Area Network (8.50) coverage. The Personal Server owner can also override the automatic behavior by overriding the access control manually.
Enhancing the Personal Server security is a key element of this invention. The Personal Server is accessed via the network using client devices such as a smart phone, tablet, laptop or desktop computer. It is setup to be accessed over the Local Area Network (8.50) or over Wide Area Network (Internet) (8.140). The Personal Server (8.10) runs an operating system and applications that manages the Personal Server Owner's data and personal automation tasks.
Overview of relationship between Main Elements and Sub-Elements
This invention provides a system and method to enhance the Personal Server Security by automatically or manually disabling the access from less trusted and less secure Wide Area Network (Internet) (8.140) when the Personal Server determines the Personal Server Owner is within the domain of the Local Area Network (8.50). The Personal Server Owner's location is periodically read by the Personal Server Security application (8.20). The location data is sent to the Personal Server Security Application (8.20) securely by the Personal Server Security Client Application (8.80) running on the Personal Server Owner's Mobile device (8.30).
Client Applications accessing Personal Server Applications (8.90) can connect using both the External IP address (and external hostname) (8.60) and Internal IP address (or internal hostname) (8.70). When access via External IP address (8.60) (or external hostname) is disabled, the client applications can only connect to the Personal Server Applications (8.90) using the internal IP address (or internal hostname) (8.70) only.
Personal Server Security Client Application (8.80) running on the Personal Server Owner's Mobile Device (8.30) is configured and paired with the Personal Server Security Application (8.20) running on the Personal Server.
Personal Server Security Application (8.20) runs on the Personal Server (8.10) and listens for requests from the Personal Server Security Client Application (8.80).
Personal Server Security Client Application (8.80) runs on the Personal Server Owner's Mobile Device (8.30) such as a smart phone, tablet, laptop or similar computing devices that are portable and can be carried by the Personal Server Owner while away from home or office environment. The Personal Server Security Client Application (8.80) can run in automatic update mode or on-demand manual override mode.
The Personal Server Client Security Application (8.80) is setup using the flow chart as described in
Personal Server Security Client Application (8.80) also provides a manual override mode where the Personal Server Owner can manually enable or disable access to Personal Server Applications from Wide Area Network (internet) by sending specific commands to enable or disable irrespective of the location of the Personal Server Owner's Mobile device (8.30) location.
What has been described and illustrated herein is a preferred embodiment of the invention along with some of its variations. The terms, descriptions and FIGS. used herein are set forth by way of illustration only and are not meant as limitations. Those skilled in the art will recognize that many variations are possible within the spirit and scope of the invention in which all terms are meant in their broadest, reasonable sense unless otherwise indicated. Any headings utilized within the description are for convenience only and have no legal or limiting effect.
Alternative embodiment of this invention could include scheduled control of the security application. The Personal Server Owner can set schedules enabling and disabling of access of Personal Server applications that can override the location specific control as outlined in this invention.
Another embodiment of this invention could involve multiple Mobile devices owned by the Personal Server where the Personal Server may be accessible to all the Mobile Devices or Mobile Devices belonging to a group of users specifically authorized by the Personal Server Owner. In such scenario the Mobile Device of additional users' needs to be configured and setup by sharing the Personal Server Security Client Key and Certificate (8.100) as authorized by the Personal Server Owner.
Another embodiment of this invention may include multiple Personal Servers in the system each owned by individual owners within a premise and each individually addressable and controlled by their respective owners.
Turning now descriptively to the drawings the figures including
A personal server (8.10) is a minicomputer that serves a person or a small group of persons authorized by the personal serve owner. It is typically used in a home residential environment or a location owned or assigned to the person or group of person in a home or office location. It is runs 24/7 and can provide application services to its owner when the owner is at his residence via Local Area Network (8.50) or away from his residence via Wide Area Network (Internet) (8.140).
Personal Server comprises of a computer processor, memory, mass storage device, network interface and optional input and output ports. It stores the operating system code in the storage device and loads the operating system into memory that controls the hardware and software running on the Personal Server. Personal Server has a set of basic applications and additional custom applications can be installed or downloaded over the network. Personal Server can use asymmetric or symmetric cryptographic software to securely store and transmit user data and all communication between Personal Server and connecting devices.
Personal Server security application is a software application that runs on the Personal Server. This application validates security certificates that are installed on the client device for secure access. The application accepts commands to enable and disable access to Personal Server Applications (8.90).
Personal Server Security Application (8.20) is a software application that runs on Personal Server (8.10) and manages the security aspects of this invention in conjunction with the Personal Server Security Client Application (8.80) running on Personal Server Owner's Mobile (8.30) device. Personal Server Security Application (8.20) uses asymmetric cryptography to authenticate and secure all requests to the Personal Server Security Application (8.20)
Personal Server Security Application (8.20) is a software application that would consist of multiple modules to handle authentication and commands to provide the security functions as described in this invention.
Personal Server Owner's Mobile Device (8.30) is a mobile device—such as smart phones, that is carried by the owner of the Personal Server. This mobile device has the ability to connect to the Personal Server via the Wide Area Network (Internet) (8.140) and Local Area Network (8.50). The Personal Server Owner's Mobile Device (8.30) has the capability to determine the location of the mobile device and hence the location of the Personal Server Owner at any given time. The location data can be communicated to the Personal Server via the network.
Personal Server Owner's Mobile Device (8.30) is a personal computing device that is portable and can be carried easily by the Personal Server Owner outside the home or office location.
The Personal Server Owner's Mobile Device (8.30) may be a smart phone, a tablet computing device, a laptop computer that has the capability to get the current location data of the device.
A Network Router (8.40) is a device that sits behind the home or office Wide Area Network (Internet) (8.140) service provider's Internet modem (8.60). Network Router can also be used as a firewall and has the ability to block or allow network traffic to computing devices inside a home or office running a Local Area Network. All traffic from and to Personal Server passes through the Network Router (8.40). The Network Router (8.40) also provides wireless or wired network access to mobile devices inside the home or office network.
Local Area Network (8.50) is the private trusted network in home or office where computing devices are connected and interact with each other. Traffic from other Local Area Network (8.50) or Wide Area Network (Internet) (8.140) needs to go via Network Router (8.40) to reach the Personal Server (8.10). Local Area Network (8.50) uses a private set of IP (Internet Protocol) addresses. The Personal Server is connected to the Local Area Network (8.50) through its network interface. Other client computer devices of the Personal Server Owner also share the same Local Area Network (8.40) when interacting with the Personal Server in the home or office environment.
A home or office location may have multiple Local Area Networks (8.50) that may be managed by the same network router. Multiple Local Area Networks provides additional isolation and control on the Local Area Network (8.50). This invention relates to securing a Personal Server from Wide Area Network (Internet) (8.140) in relation to the more secure Local Area Network (8.50) at home or office environment.
Another variation of this invention can apply to two separate network domains that differ in network threat classification for example two separate network environment that can be located uniquely via the location services of the Personal Server Owner's mobile device within a company network or a home network can be replaced for Wide Area Network (Internet) (8.140) and Local Area Network (8.50) references in this invention.
A typical home internet access has a unique internet address called External IP Address (8.60) that is assigned by the Internet Service Provider through which traffic from Wide Area Network (Internet) (8.140) can reach the home or office network where the Personal Server is connected. This address may be dynamic or static based on the service subscribed by the Personal Server Owner. Network Router (8.40) can be configured to pass traffic with destination to External IP address (8.60) and a specific port to be forwarded to the Personal Server. This enables the Personal Server Owner to access the Personal Server from outside the home or office environment.
A domain name and host name can also be associated with the External IP address (8.60). Network traffic destined to a domain name associated with the External IP address (8.60) and a specific port will resolve to Personal Server Application listening on that port, if the Network Router (8.40) is configured to forward such a request to Personal Server. Multiple domain names and host names can also be assigned to the External IP address (8.60) that can resolve to individual Personal Server Applications. This enables accessing different Personal Server Applications with its own host and domain name. The domain name to External IP Address (8.60) mapping is made possible through the Domain Name Service (8.150). Domain Name Service is a registry of the association of the host and domain name with an External IP Address (8.60). The Domain Name Service ensures the Domain Name System Servers (DNS Servers) on the Internet are updated with this association. If the External IP Address (8.60) is a dynamic address that changes over time, all modern Network Router (8.40) has the capability to update the External IP Address (8.60) for a host and domain with the Domain Name Service (8.150).
A home or office network location could have multiple external IP addresses that can be connected to multiple routers managing multiple Local Area Networks. A Personal Server can be connected within each Local Area Network. Another variation of the network topology is Multiple Personal Server can be connected to the same network with one of the Personal Server acting as the master and forwarding request to other slave Personal Server on the network. This way a single external IP Address can be used to host multiple Personal Servers.
An Internal IP address (8.70) is the network addressed assigned to a computing device within the home or office network managed by the Network Router (8.70). A Personal Server is assigned an Internal IP address (8.70). The Internal IP address (8.70) can only be directly resolved within the home or office network. The Internal IP address (8.70) can also be associated with a hostname. Any request coming from outside the home or office network uses the External IP Address (8.60) or its associated host and domain name. The request is then forwarded by the Network Router (8.40) to the Personal Server based on the forwarding rules that apply to the Personal Server.
The Internal IP address (8.70) assigned to the Personal Server could be 747 dynamic or static based on the Personal Server configuration. Static internal IP address is preferred as the dynamic internal IP address can change. This would involve re-configuration on the Network Router to forward Wide Area Network (Internet) (8.140) requests to the Personal Server. To avoid the reconfiguration the Personal Server is assigned a static IP address.
Personal Server Security Client Application (8.80) is an application that runs on the Personal Server Owner's Mobile device (8.30) and communicates with the secured Personal Server Security Application (8.20) running on the Personal Server. Personal Server Security Client Application (8.80) and the Personal Server Security Application (8.20) use asymmetric cryptography to ensure the communication between the client and server is secured and authenticated. The security client application uses the installed key to encrypt request that is sent to the Personal Server and decrypt the responses from the Personal Server. Personal Server Security Client Application (8.80) uses a pre-defined port to communicate to the Personal Server Security Application (8.20). This port is separate from the Personal Server Application ports. The port used for Personal Server Security Client Application (8.80) needs to be configured on the Network Router (8.40) to forward request to the Internal IP address (8.70) and a pre-defined port on the Personal Server.
The security client application can either be a native application or an internet browser based application. In either case the security client key and certificate will have to be installed during the setup process. The setup process is done using the Local Area Network (8.50) only. It also requires and Administrator ID and password for the Personal Server. In case of browser based application the security client key and certificate will need to be stored in the browser key vault.
Personal Server Applications (8.90) are software programs that run on the Personal Server (8.10) and provide a number of personal data and automation services to the owner of the Personal Server including support for location based services for the personal server owner. These applications are accessed through a pre-defined port for example web applications are accessed by port 80 and port 443, mail server application is accessed by port 25 and so on. Personal Server (8.10) may come with additional controller software that can help configure the Personal Server Applications (8.90). Personal Server Applications can be installed or updated using Personal Server controller application or Personal Server Operating System (8.120).
Personal Server Applications (8.90) are one or more applications that are available in the software distribution on Personal Server or custom applications that can be downloaded or installed separately. Each Personal Server Application (8.90) provides a specific function to the Personal Server Owner.
Personal Server Applications (8.90) can be part of the Personal Server Operating System. The Personal Server Application may be a web application that has a server component that runs on the Personal Server which can be accessed using a general purpose internet browser using HTTP or HTTPS protocol or it may offer a native client application that runs on the laptop, tablet, smart phone or desktop client computer that may use standard or proprietary connection protocols.
The security Client Key and Certificate (8.100) is the Personal Server Security Client key part of the asymmetric key cryptography key pair that is used to encrypt and decrypt requests originating from the Personal Server Security Client Application (8.80) in the context of this invention. The Security Client Certificate is used to authenticate the request by the Personal Server Security Application (8.20). The Security Client Key and Certificate is downloaded to the mobile device securely within the home or office network during the initial setup and configuration of the Personal Server Security Client Application (8.80). All communication from the Personal Server Security Client Application (8.80) is encrypted with this key. The resulting data can only be decrypted by the Personal Server Security Application (8.90) that holds the other part of the asymmetric key cryptography pair.
The Security Client Key and Certificate (8.100) may use various forms of asymmetric cryptography technologies.
Personal Server Security Application Key (8.110) is the Personal Server Security Application part of the asymmetric key cryptography key pair that is stored on the Personal Server (8.10). All communication data originating from the Personal Server Security Client Application (8.80) will require this key to decrypt. This ensures the data is obtained by the Personal Server Security application securely. All communication data originating from The Personal Server Security Application (8.90) uses this key to encrypt. The encrypted message can only be decrypted by the Personal Server Security Client Application (8.80) running on the Personal Server Owner's Mobile Device (8.30).
The Personal Server Security Application Key may use various forms of asymmetric cryptographic technologies.
Personal Server Operating System (8.120) is the software that controls the Personal Server hardware and software components including all Personal Server Applications. Personal Server Operating System provides security, memory management, power management, network protocol support, storage management functions amongst other core functions to run the Personal Server.
Personal Server may run various kinds of operating system such as Linux, UNIX and others that is customized to consume low power and includes security features customized for Personal Server applications.
Mobile Device Operating System (8.130) is the software that controls the Mobile Device and mobile applications installed on the mobile device. Mobile Device Operating System (8.130) controls the Mobile Device hardware and mobile applications.
Mobile Device may run various kinds of operative system depending on the Mobile Device. Some popular Mobile Device Operating Systems are Apple iOS, Google Android, Microsoft Windows and Linux. The Mobile Device Operating Systems are not limited to this list.
O. Wide Area Network (internet) (8.140)
Wide Area Network (Internet) (8.140) is the network of computing devices and network resources connected to the Wide Area Network (Internet). Wide Area Network is geographically dispersed telecommunications network that can span the globe in a different city, state or country. Wide Area Network (Internet) is the network of computers connected and directly addressable computers by other computers on the Internet. The home or office network is connected to the Network Router (8.40) that is connected to the Wide Area Network (8.140) through the Internet Modem (8.60) enabling the home or office network to connect to the Wide Area Network (8.140) or Internet.
This invention relates to enhancing security of the Personal Server (8.10) from less trusted Wide Area Network (Internet) (8.140) in relation to more trusted Local Area Network (8.50) at home or office environment. Another variation of this invention can apply to two separate network domains that differ in network security classification for example two separate network environment that can be located uniquely via the location services of the Personal Server Owner's mobile device within a company network or a home network can be replaced for Wide Area Network (Internet) and Local Area Network (8.50) references in this invention.
The Wide Area Network (Internet) (8.20) connection to a home or office location is assigned an external IP address (8.60). Accessing the home or office network away from the home or office requires the use of this external IP address (8.60). To make the access easier to humans a hostname and domain name can be associated with the external IP address.
A Domain Name Service (8.150) facilitates the use of a host name and domain name when accessing the Personal Server (8.10). The hostname and domain name is registered with the Domain Name Service along with the associated external IP address (8.60) that is used to connect to the Personal Server (8.10). This association is done by registering the hostname and domain name to a Domain Name Service (8.150). The Domain Name Service (8.140) broadcasts this association to all the Domain Name System Servers (DNS Servers) in the Wide Area Network (Internet) (8.140) so that all client computers connected to the Wide Area Network (Internet) is able to connect to the Personal Server (8.10) using the hostname and domain name automatically. The domain name service is a third party service the Personal Server owner subscribes to be able to access the Personal Server (8.10) without remembering the External IP Address (8.60). The Domain Name Service (8.150) is also useful when the External IP Address (8.60) is assigned by the Internet Service Provider as a dynamic address. All modern Network Routers (8.40) have the capability to detect a change in the External IP Address (8.60) and communicate the new External IP Address (8.60) to the Domain Name Service (8.150) automatically. This greatly facilitates the use of the Personal Server by the Personal Server owner when accessing the Personal Server (8.10) away from home or office location. While the use of host name and domain name is not required for all Personal Server application the use of a host name and domain name enables ease of using the Personal Server Applications (8.90) from the Personal Server Owner's Mobile Devices (8.30).
Other forms of standard lookup may be employed, where the Personal Server Owner's Mobile Devices (8.30) can bypass the Domain Name System Servers by associating the name to external IP address mapping in a local file or configuration in the Personal Server Owner's Mobile Devices (8.30). However some Personal Server Applications (8.90) may require the use of a hostname or domain name to function correctly. In other embodiment of this invention other technologies and standards can be used for mapping a hostname and domain name to the external IP address (8.60) of the target Personal Server without a Domain Name Service (8.150).
The Personal Server (8.10) is connected to the Local Area Network (8.50). Personal Server (8.10) contains the sub elements of Processor (8.11), Memory (8.12), Bus (8.13), Network Interface (8.14), Mass Storage (8.15), Input/Output Ports (8.16). The Personal Server runs the Personal Operating System Software (8.120), Personal Server Applications (8.90), and also Personal Server Security Application (8.20) related with this invention. Personal Server Security Application Key (8.110) is stored on the Personal Server.
Personal Server (8.10) is assigned an internal IP address (8.70). Personal Server (8.10) is also addressable via the external IP address (8.60) at specific pre-defined port via the configuration on the Network Router (8.40) from the Wide Area Network (8.40).
Personal Server Owner's Mobile Device (8.30) can connect to the Personal Server (8.10) via the Wide Area Network (Internet) (8.140) using a domain name that maps to the external IP Address (8.60) or via the internal IP Address when the Personal Server Owner's Mobile device is within the vicinity and range of the Local Area Network (8.50).
The main element Personal Server Owner's Mobile Device (8.30) consists of Bus (8.32) that interconnects all the sub elements. The sub elements are a Processor (8.31), Memory (8.33), Network Interface (8.34), Global Positioning System (GPS) (8.36), Display, Touch Input/Keyboard and Pointing Devices (8.37). The Mobile Device (8.30) runs a Mobile Operating System (8.130) that manages the hardware sub elements of the Mobile Device (8.30) and Mobile Applications including the Personal Server Security Client Application (8.80) specific to this invention. Personal Server Security Client Key and Certificate (8.100) is downloaded and installed on the Personal Server Owner's Mobile Device (8.30) during the onetime setup when configuring the Security Client Application.
The main elements and sub-elements of the system for this invention and their inter-connections are shown in
8.10: Personal Server
8.20: Personal Server Security Application
8.30: Personal Server Owner's Mobile Device
8.40: Network Router
8.50: Local Area Network
8.60: Internet Modem/External IP Address
8.70: Internal IP Address
8.80: Security Client Application
8.90: Personal Server Applications
8.100: Security Client Key and Certificate
8.110: Personal Server Security Application Key
8.120: Personal Server Operating System
8.130: Mobile Device Operating System
8.140: Wide Area Network (internet)
8.150: Domain Name Service
This application is based on provisional application Ser. No. 61/874,374, filed on Sep. 6, 2013.
Number | Date | Country | |
---|---|---|---|
61874374 | Sep 2013 | US |