TWM254016U - An improved network connection device - Google Patents

An improved network connection device Download PDF

Info

Publication number
TWM254016U
TWM254016U TW92219855U TW92219855U TWM254016U TW M254016 U TWM254016 U TW M254016U TW 92219855 U TW92219855 U TW 92219855U TW 92219855 U TW92219855 U TW 92219855U TW M254016 U TWM254016 U TW M254016U
Authority
TW
Taiwan
Prior art keywords
connection device
network
improvement
scope
item
Prior art date
Application number
TW92219855U
Other languages
Chinese (zh)
Inventor
Chih-Chiang Chou
Original Assignee
Chuang Guan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chuang Guan Technology Co Ltd filed Critical Chuang Guan Technology Co Ltd
Priority to TW92219855U priority Critical patent/TWM254016U/en
Publication of TWM254016U publication Critical patent/TWM254016U/en

Links

Description

M254016 四、創作說明(1) 【新型所屬之技術領域_ 本創作係有關於一種 別卡不僅作為以啟動網路連結=結裝置之改良,該用戶識 其本身需經過身份驗證通過置之主要元件,並且利用 用戶識別卡具有加密的功能才此f通網路,更進一步利用 的過程處理過才得以動作,於負料傳輪時均須經由加密 外洩之目的。 此可達到防止資料被盜取或 【先前技術】 於現今之科技一日千里 訊相關的技術已日漸成孰,i B夺=裡,-貝訊處理装置與通 ,所以資訊處理裝置且廣A的應用在I一個領域 訊爆炸的時内元化,同時在這資 邊設備可跟上現今潮流之李;;z加強f資訊處理裝置週 ,·而當企業努力於提升資升企業的競爭力 對的,於安全,管之裝置週邊設備的同時,相 、文王衩吕之問喊也將相繼衍生出來。 的管ί ί::ϊ外界聯繫的網路通訊系統’該系統安全上 現今有許多中小企業(SME)或個人工作 、片 均以虛擬私人網路(Virtual Private Network =下簡稱VPN)作為相互傳遞資料的通道,其目的在追求資 珥於,輸時的安全性,建構VPN通道(Tunnel)需讀取許多 ,私密資料,如憑證(CA)、Preshare Key(預先分享鍵)、 么員工ID(帳號’ identification)、Password(密石馬)或私人 、、罔路(Private Network)等,因此如何使公司内部的資料 M254016 四、創作說明(2) 不至於被盜取或是洩密是相當重要的。 如第1圖所示係習知技術之架構示意圖,圖中之網路 連結裝置1A主要係由一記憶裝置11A、一傳輸裝置12A及一 中央處理器1 3A所構成。 其中,該記憶裝置1 1A係可儲存網路連結裝置丨4之相 關基本設定資料,並更可儲存公司之機密資料及加密軟體 ,而加密軟體係為保護公司之機密資料不被竊取或外洩的 要素;該傳輸裝置12A係包括一外部連結裝置i2iA及一内 部連結裝置1 22A ’以提供與外界網域丨4A及内部網域1 5 A間 之 > 料輸出或輸入之功能’而該外部連結裝置1 2 1 a係一數M254016 IV. Creation Instructions (1) [Technical Field to which the New Type belongs_ This creation is about the improvement of a kind of card not only as a means to activate the network connection = knot device, the user recognizes that it is the main component that needs to pass identity verification And, the user identification card has the encryption function to communicate with the network, and the process of further utilization can only be processed after it is processed. When the negative material is transferred, it must be leaked through encryption. This can prevent the theft of data or [previous technology] In today's science and technology, the relevant technology has gradually become more and more difficult, i B win = li,-Bessun processing device and communication, so the information processing device and widely A Applied in the field of information explosion in one area, at the same time, the capital equipment can keep up with current trends; z strengthen the f information processing device week, and when enterprises strive to improve the competitiveness of capital-raising enterprises At the same time as the safety and control of the peripheral equipment, Xiang and Wen Wang's questioning will also be derived one after another. Management ί :: ϊThe network communication system for external contact 'This system is secure. Nowadays, many small and medium-sized enterprises (SMEs) or individuals work and use Virtual Private Network (VPN) The purpose of the data channel is to pursue the security of the resources and the time of loss. To construct a VPN tunnel, you need to read a lot of private data, such as credentials (CA), Preshare Key (pre-share key), and employee ID ( Account 'identification), Password (secret stone horse) or private, Kushiro (Private Network), etc., so how to make the company's internal data M254016 Fourth, creation instructions (2) not to be stolen or leaked is very important . As shown in Figure 1, it is a schematic diagram of a conventional technology. The network connection device 1A in the figure is mainly composed of a memory device 11A, a transmission device 12A, and a central processing unit 13A. Among them, the memory device 11A can store related basic setting data of the network connection device 丨 4, and can also store the company's confidential data and encryption software, and the encryption software system is to protect the company's confidential data from being stolen or leaked The transmission device 12A includes an external connection device i2iA and an internal connection device 1 22A 'to provide a function of exporting or inputting data between the external network domain 4A and the internal network domain 15 A' and the External connection device 1 2 1 a

據機(Μ 〇 d e m )以接通该外界網域1 4 A ;該内部連結裝置1 2 2 A 係一網内連接埠,且内部連結裝置122人可搭配;:交~換集線 器(Switch Hub) 16A,使内部連結裝£122A具有複數個網 内連接埠,可連結接通複數個使用者端以構成内部網域 15A,且亦可搭配一無線介面裝置17A與一訊號傳輸器18八 達到與内部網域15A之使用者端連結之目的;該中央處理 益1 3A係與記憶裝置丨丨A及傳輸裝置〗2A具有電性之連蛀, 並處理資料於記憶裝置丨1A及傳輸裝置12A之間的運行'以 ί ί制貝料於網域間之傳輸動#,而該習知技術之網路 連、π裝置1 Α運作方式如下所述。 八η Ϊ使用者欲讀取記憶裝置11 A内之公司機密資料或將 二司機密資料儲存於記憶裝置11A時,首先 端 呼叫”上再經由中央處理器13 。己隐裝置11A ’若該記憶裝置11A儲存有加密功能之4Data relay (M odem) to connect to the external network domain 1 4 A; the internal connection device 1 2 2 A is a network port, and 122 internal connection devices can be used; ) 16A, make the internal connection £ 122A have multiple intranet ports, which can be connected to multiple users to form the internal network domain 15A, and can also be used with a wireless interface device 17A and a signal transmitter 18 The purpose of connecting with the user end of the internal network domain 15A; the central processing unit 13A is connected to the memory device 丨 A and the transmission device 2A is electrically connected, and processes the data in the memory device 1A and the transmission device 12A The operation of the network is based on the transmission between the network domains, and the network connection and the device 1 of the conventional technology operate as described below. Eight η 时 When the user wants to read the company confidential data in the memory device 11A or store the second driver ’s confidential data in the memory device 11A, first call "on" and then go through the central processor 13. The hidden device 11A 'if the memory Device 11A has encryption function 4

第7頁 創作說明(3) 體’則該軟體會回傳一封包 序,如輪入密碼,接著當其使用者輸入通行的程 自由的於記憶裝置m進行讀取體二通二之上’使咖^ 但,闵止a一一 及儲存的動作。 固先刖各家廠商將VPN >加A 士 設定資料铗六*立σ 之、,罔路連結裝置1Α的基本 口又疋貝针储存在產品上的 ^ r L7 ίγ ^ r,, u襄置11A,如快閃唯讀記憶 體(以下間稱Flash ROM)或快閃呓情士广“ + , Γ^τΛ , lv 丁 々々J σ匕隐卡(Compact Flash Lard u 下簡稱CF card)上,η i\ η, 嬙资之眘m妙七a 且终多公司也將其較私密及Creation instructions on page 7 (3) System 'The software will return a packet sequence, such as a turn-on password, and then when its user enters the pass, he will read the system on the memory device m freely.' Make coffee ^ but, Min Zhi a one by one and stored action. Guxian: various manufacturers will add the VPN > plus setting data (6) * σ, the basic port of the road connection device 1A is stored in the product ^ r L7 ίγ ^ r ,, uxiang Set 11A, such as on a flash read-only memory (hereinafter referred to as Flash ROM) or on a flash memory card “+, Γ ^ τΛ, lv 丁 々 々 J σ dagger card (hereinafter referred to as Compact Flash card) , Η i \ η, the prudent asset manager, and finally many companies also make it more private and

械4 I貝科儲存於記情获番1】AMachine 4 I Beco stored in the memory to gain Fan 1] A

&UP ^ 衷置山内,耗讀取記憶裝置11A 必、、&過已儲存之加密軟體給予 六户w u ^ 子版、口卞防護的功能,但,因資訊儲 :用妗二哭二、_^F card或其它記憶體中’非常容易讓他 m 得到私人資m,並可輕易破解具加密 之軟體’因此習知技術中掛於日a u 丁对%目刖所要求保密的功能已逐 漸顯的不足’目此廠商極力找尋—種更佳的防止f料被盜 用或外洩之方式。 【新型内容】 有鑑於此,本創作係提供一種網路連結裝置之改良, 利用一用戶識別卡本身上具有天然的驗證 (Authentication)、加密(Encryption)之能力,以達到可 防止資料被盜用或外洩之目的,並於用戶識別卡内已事先 儲存主要之設定資料,可讓使用者只需將用戶識別卡置入 網路系統裝置,就可以輕鬆使用VPN,而免除繁雜的專業 設定。& UP ^ I set in the mountain, and the read memory device 11A must be used, & the stored encryption software will give six households wu ^ sub-version, mouth protection function, but because of information storage: 妗 二 哭 二, _ ^ F card or other memory, 'It is very easy for him to get private information m, and it is easy to crack the software with encryption'. Therefore, the conventional technology has been linked to Japan, and the function of confidentiality required by% 刖 has been Increasing deficiencies' Now the manufacturers are trying to find a better way to prevent the theft or leakage of materials. [New content] In view of this, this creation is an improvement of a network connection device, which uses a user identification card with its natural authentication and encryption capabilities to prevent data from being stolen or used. For the purpose of leakage, the main setting data has been stored in the user identification card in advance, which allows users to simply use the user identification card into the network system device, and can easily use the VPN without the complicated professional settings.

第8頁 M254016 四、創作說明(4) 1 ' '--- 【實施方式】 如第2圖所不係本創作之架構示意圖,該網路連結裳 置1 (如路由器)主要係由一用戶識別卡丨〇、一記憶裝置Η 、一傳輸裝置1 2及一中央處理器丨3所構成; 該用戶識別卡1 〇係為啟動網路連結裝置1之主要元件 ;該記憶裝置11係可儲存網路連結裝置之相關基本設定資 料,該傳輸裝置1 2係包括一外部連結裝置丨2 j及一内部連 結裝置1 2 2 ’以提供與一外界網域丨4,如網際網路 (internet)及一内部網域15間如區域網路(LAN)或廣域網 路(WAN)之資料輸出或輸入的功能;該中央處理器丨3係與 用戶識別卡1 0、記憶裝置丨丨及傳輸裝置丨2具有電性之連結 ,並處理資料於用戶識別卡丨〇、記憶裝置丨丨及傳輸裝置工2 之間的運行。 當一使用者端透過外界網域丨4或内部網域丨5連接傳輸 裝置1 2欲通行於網域時,此時,使用者端會傳遞一封包資 料經傳輸裝置1 2至該中央處理器丨3,再經由中央處理器j 3 傳遞至該用戶識別卡丨〇,用戶識別卡丨〇於收到此封包資料 =將立即以原路徑回傳另一封包資料,以要求作一身份驗 也之動作’等待身份驗證通過後,該使用者端即可於網域 間傳輪資料’以確定透過該網路連結裝置傳輸資料之使用 者連接網路的使用權利均是被允許,以可防止有心人士 思竊取資料。 6而該用戶識別卡10具有儲存之功能,且本身也因具有 加迸之軟體,因此可將公司之機密資料,如憑證、預先分Page 8 M254016 IV. Creation Instructions (4) 1 '' --- [Embodiment Mode] As shown in Figure 2 is not a schematic diagram of the creation, the network link 1 (such as a router) is mainly used by a user The identification card 丨 〇, a memory device Η, a transmission device 12 and a central processing unit 丨 3; the user identification card 10 is the main component for starting the network connection device 1; the memory device 11 is storable Relevant basic setting data of the network connection device. The transmission device 12 includes an external connection device 丨 2 j and an internal connection device 1 2 2 ′ to provide an external network domain 4, such as the Internet. And 15 internal network domains such as local area network (LAN) or wide area network (WAN) data output or input function; the central processing unit 丨 3 and the user identification card 10, memory device 丨 丨 and transmission device 丨2 has an electrical connection and processes data between the user identification card 丨 0, the memory device 丨 丨, and the transmission device worker 2. When a user connects to the transmission device 12 through an external network domain 4 or an internal network domain 5 and wants to pass through the network domain, at this time, the user terminal transmits a packet of data to the central processor via the transmission device 12丨 3, and then passed to the user identification card via the central processor j 3 丨 〇, the user identification card 丨 〇 Upon receipt of this packet information = will immediately return another packet information in the original path, in order to request an identity check also The action 'Wait for the client to pass data between domains after the identity verification is passed' to ensure that the user's right to use the Internet to transmit data through the network-connected device is allowed to prevent People interested in stealing information. 6 And the user identification card 10 has a storage function, and because it has enhanced software, the company's confidential information, such as credentials, pre-distribution

M254016 ^、創作說明(5) 享鍵(Preshare Key)、員工帳號、密碼或私人網路等儲存 於用戶識別卡10内,若有一使用者端透過傳輸裝置12之一 外部連結裝置1 2 1 (如數據機)或一内部連結裝置1 22 (如網 内連接埠)以讀取用戶識別卡1 0内之機密資料時,該用戶 識別卡1 0將回傳另一封包資料,以確認該使用者端是否可 讀取儲存於用戶識別卡1 0内之機密資料,但,若輸入錯誤 訊息之次數超過用戶識別卡1 0原本的設定,該用戶識別卡 1 0將啟動一防護功能,將阻斷所有欲讀取儲存於内部資料 之路徑,以阻止任何使用者端再讀取機密資料,以達防護 之功能,且目前用戶識別卡1 〇尚無法被拷貝其内部資料, 進而防止資料被盜取或外;,而該内部連結裝置1 2 2係一 網内連接埠’且内部連結裝置122可搭配一交換集線器16 (Switch Hub),使内部連結裝置122具有複數個網内連接 埠,以可連結更多使用端架構成—區域網路(L A N)或一 域網路(WAN),以連結網路連結裝置i,或網路連結 R 搭配-無線介面裝置17與—訊號 網域1 5之使用者端之目的,以冬队从 逆』廷、,〇内口 p 並且,若該網二免之除;佈局網路線之麻煩。 設定具有加密軟體,則可^用卢°己隐裝置1 1的相關基本 具雙重保護之功能心;卡1◦相互搭配已形成 雜些,但若考量於網路需多-步驟,會顯得繁 貝抖之女全性,也是具有其進步性 兹歸納本創作之特點如下M254016 ^, creation instructions (5) Preshare Key, employee account number, password or private network are stored in the user identification card 10, if a user terminal is externally connected to the device through one of the transmission devices 12 1 2 ( (Such as a modem) or an internal connection device 1 22 (such as a network port) to read confidential information in the user identification card 10, the user identification card 10 will return another packet to confirm the use Whether the client can read the confidential information stored in the user identification card 10, but if the number of times of entering an error message exceeds the original setting of the user identification card 10, the user identification card 10 will activate a protection function, which will prevent the Disconnect all paths to read the internal data to prevent any user from reading the confidential data again to achieve the protection function, and the current user identification card 10 cannot copy its internal data yet, thus preventing the data from being stolen Or external; and the internal connection device 1 2 2 is a network port and the internal connection device 122 can be used with a switching hub 16 (Switch Hub), so that the internal connection device 122 has multiple internal connections Port, which can be used to connect more end frames—Local area network (LAN) or a local area network (WAN), to connect network connection device i, or network connection R—Wireless interface device 17 and—Signal network The purpose of the user end of domain 15 is to use the winter team from the back, the internal port p, and if the network two is eliminated, the trouble of laying out the network route. If you have encryption software, you can use the basic functions of dual protection of the device 1 1; the card 1◦ has become more mixed with each other, but if you consider that the network requires many steps, it will be complicated. The full nature of the daughter of Pui Chiu is also progressive. The characteristics of this creation are summarized as follows

第10頁 M254016 、創作說明(6) 網路連結裝置,使用者將無法進入網域做資料傳輸動作, 且外界的駭客也更加無法入侵該區域網路以竊取資料,因 此其保密性可更加提高。 Z、因用戶識別卡本身具有驗正之功能,可要求輸入 密碼’而於輸入密碼時,若一次或多次密碼輸入錯誤,該 用戶識別卡則將被鎖起無法使用,因此能預防遭受他人竊 取盜用,進而增加其安全性。Page 10 M254016, creation instructions (6) Network connection devices, users will not be able to enter the domain to perform data transfer actions, and outside hackers will be more unable to invade the local network to steal data, so its confidentiality can be more confidential improve. Z. Because the user identification card itself has a verification function, you can ask for a password. If you enter the password incorrectly one or more times, the user identification card will be locked and cannot be used, so it can prevent being stolen by others. Misappropriation, which in turn increases its security.

3、因用戶識別卡本身更具有加密之功能,可於使用 者讀取或儲存私密及機密資料於用戶識別卡時,必先經由 用戶識別卡的通行許可後,方可進行上述之動作,因此對 於資料的保護更加具有保障。 ’方便 輕鬆使 Η 疋 ’不僅 被盜取 ’因此 依法提 以 本創作 圍。即 應仍屬 、用戶識別卡内可於事先儲存一些主要的設定資料 使用者只需將用戶識別卡置入網路連結裝置,就玎 用VPN,因此免除一些繁雜的專業設定。3. As the user identification card itself has more encryption function, when the user reads or stores private and confidential data on the user identification card, the above-mentioned actions can only be carried out after the user's identification card has passed. Therefore, The protection of data is more guaranteed. ‘Convenient and easy to make Η 疋’ Not only has been stolen ’, so I ’m referring to this creation according to law. That is to say, the user identification card can store some main setting data in advance. The user only needs to insert the user identification card into the network connection device, and then use the VPN, thus eliminating some complicated professional settings.

以’本創作係提供有關於一種網路連結裝置之改良 能有效的提高資料的保密性,以防止公司内部資料 或是外洩,且其使用之方式可免除習知繁雜的設定 本創作極具進步性及符合申請新型專利之要件,爰 出申請,祈鈞局早日賜准專利,實感德便。 上已將本創作做一詳細說明,惟以上所述者,僅 之一較佳實施例而已,者^能限宁 :創作申請範圍所作之均等變化與修飾J之J 本創作之專利涵蓋範圍内。Based on 'this creation is provided with an improvement on a network-connected device, it can effectively improve the confidentiality of the data to prevent the company's internal data or leakage, and its use can avoid the complicated and complicated settings. This creation is extremely useful Progressive and in line with the requirements for applying for a new patent, the application was submitted, and the Bureau would like to grant a quasi-patent at an early date. The creation has been described in detail above, but the above is only one of the preferred embodiments, which can only be limited: equal changes in the scope of the creation application and modification of J. The scope of the patent of this creation .

$ 11頁 M254016 圖式簡單說明 【圖式簡單說 明 ] 第1圖係一習 知 技 術 之 架 第2圖係本創 作 之 架 構 示 〔圖號i 烏號說 明 ] 1 A 網 路 連 結 裝 置 1 1 A 1己 憶 裝 置 12A 傳 裝 置 121 A 外 部 連 接 裝 置 122A 内 部 連 接 裝 置 13A 中 央 處 理 器 14A 外 界 網 域 15A 内 部 網 域 16A 交 換 集 線 器 17A 無 線 介 面 裝 置 18A 訊 號 傳 m 器 1 網 路 系 統 裝 置 10 用 戶 識 別 卡 11 1己 憶 裝 置 12 傳 裝 置 121 外 部 連 接 裝 置 122 内 部 連 接 裝 置 13 中 央 處 理 器 14 外 界 網 域 15 内 部 網 域$ 11 pages M254016 Schematic illustrations [Schematic illustrations] Figure 1 is a frame of known technology. Figure 2 is a framework illustration of this creation. [Illustration i. No. U] 1 A Network connection device 1 1 A 1 Jiyi device 12A transmission device 121 A external connection device 122A internal connection device 13A CPU 14A external network domain 15A internal network domain 16A switching hub 17A wireless interface device 18A signal transmission device 1 network system device 10 user identification card 11 1 Jiyi device 12 transmission device 121 external connection device 122 internal connection device 13 central processing unit 14 external network domain 15 internal network domain

第12頁 M254016 圖式簡單說明 16 交換集線器 17 無線介面裝置 18 訊號傳輸器Page 12 M254016 Brief Description of Drawings 16 Switching Hub 17 Wireless Interface Device 18 Signal Transmitter

11·1Ι 第13頁11.1 page 13

Claims (1)

M254016 五 2 4 '申請專利範圍 .j網路連結裝置之改良,該裝置係包括·· 置之用二識別卡,《用戶識別卡係啟動該網路連結裝 且 < 兀件; 相關^憶裝置’該記憶裝置係可儲存網路連結裝置之 相關基本設定資料; 網輪f置,該傳輸裝置係提供與外界網域及内部 、域間之資料輸出或輸入的功能; 二中央處理器,該中央處理器係與用戶識別卡、記 玲请^上連結,並處理資料於用 戶識別卡、記憶裝置及傳輸裝置之間的運行。 •如申請專利範圍第i項所述之一種網路連結裝置之改 良,該網路系統裝置係可為一路由器。 、 •如申請專利範圍第i項所述之一種網路連結裝置之改 良,該=戶識別卡係為-SIM卡,且具有提供身份驗 5正及加密之功能。 •如申請專利範圍第i項所述之一種網路連結裝置之改 良,該記憶元件係為一快閃唯讀記憶體(FUsh r⑽)。 •如申靖專利範圍第1項所述之一種網路連結裝置之改 良,該記憶元件係為一快閃記憶卡(CF car^)\ •如申請專利範圍第i項所述之一種網路連結裝置之改 良,該傳輸裝置係包括一外部連結裝置及一内结 裝置。 7 ’如申明專利範圍第6項所述之一種網路連結裝置之改 良’ 4外部連接裝置係一數據機,達到與外界網域連M254016 5 2 4 'Scope of patent application. J The improvement of the network connection device, the device includes the use of two identification cards, "the user identification card is to activate the network connection device and < Device 'The memory device can store the basic setting data of the network connection device; the network wheel f is set, and the transmission device provides the function of outputting or inputting data to and from the external network domain and internal or inter-domain; two central processing units, The central processing unit is connected with the user identification card and the memory card, and processes data between the user identification card, the memory device and the transmission device. • As an improvement of a network connection device described in item i of the patent application scope, the network system device may be a router. • As an improvement of a network connection device described in item i of the scope of patent application, the household identification card is a -SIM card and has the function of providing identity verification and encryption. • As an improvement of a network-connected device described in item i of the patent application scope, the memory element is a flash read-only memory (FUsh r⑽). • An improvement of a network connection device as described in item 1 of the Jingjing patent scope, the memory element is a flash memory card (CF car ^) \ • A network as described in item i of the patent scope The improvement of the connection device, the transmission device includes an external connection device and an internal connection device. 7 ‘Improvement of a network connection device as described in item 6 of the declared patent scope’ 4 The external connection device is a modem that connects to the external network domain 第14頁 M254016 五、申請專利範圍 接之功能。 8 .如申請專利範圍第6項所述之一種網路連結裝置之改 良,該内部連接裝置係一網内連接埠,達到與内部網 域連接之功能。 9 ·如申請專利範圍第8項所述之一種網路連結裝置之改 良,該内部連接裝置係可搭配一交換集線器,使該網 路連結裝置具有複數個網内連接埠。Page 14 M254016 5. Application scope of patent application. 8. According to the improvement of a network connection device described in item 6 of the scope of the patent application, the internal connection device is an intranet port to achieve the function of connecting to the internal network domain. 9 · As an improvement of a network connection device described in item 8 of the scope of the patent application, the internal connection device can be matched with a switching hub, so that the network connection device has a plurality of intranet connection ports. 1 0.如申請專利範圍第6項所述之一種網路連結裝置之改 良,該内部連接裝置係一無線介面裝置,以無線傳輸 方式連接内部網域。 11.如申請專利範圍第1項所述之一種網路連結裝置之改 良,該外界網域係可為網際網路(Internet)。 1 2.如申請專利範圍第1項所述之一種網路連結裝置之改 良,該内部網域係可為區域網路(LAN)。 1 3.如申請專利範圍第1項所述之一種網路連結裝置之改 良,該内部網域係可為廣域網路(WAN)。10. The improvement of a network connection device as described in item 6 of the scope of patent application, the internal connection device is a wireless interface device, and is connected to the internal network domain by wireless transmission. 11. According to the improvement of a network connection device described in item 1 of the scope of patent application, the external network domain may be the Internet. 1 2. As an improvement of a network connection device described in item 1 of the scope of patent application, the internal network domain may be a local area network (LAN). 1 3. As an improvement of a network connection device described in item 1 of the scope of patent application, the internal network domain may be a wide area network (WAN). 第15頁Page 15
TW92219855U 2003-11-07 2003-11-07 An improved network connection device TWM254016U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW92219855U TWM254016U (en) 2003-11-07 2003-11-07 An improved network connection device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW92219855U TWM254016U (en) 2003-11-07 2003-11-07 An improved network connection device

Publications (1)

Publication Number Publication Date
TWM254016U true TWM254016U (en) 2004-12-21

Family

ID=34588504

Family Applications (1)

Application Number Title Priority Date Filing Date
TW92219855U TWM254016U (en) 2003-11-07 2003-11-07 An improved network connection device

Country Status (1)

Country Link
TW (1) TWM254016U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351121A (en) * 2014-10-13 2019-10-18 柏思科技有限公司 For configuring the method and system of electronic device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351121A (en) * 2014-10-13 2019-10-18 柏思科技有限公司 For configuring the method and system of electronic device

Similar Documents

Publication Publication Date Title
US10554420B2 (en) Wireless connections to a wireless access point
TWI271076B (en) Security gateway with SSL protection and method for the same
US10855668B2 (en) Wireless device authentication and service access
US10033701B2 (en) Enhanced 2CHK authentication security with information conversion based on user-selected persona
US7689211B2 (en) Secure login method for establishing a wireless local area network connection, and wireless local area network system
CN108881304A (en) A kind of pair of internet of things equipment carries out the method and system of safety management
CN101897166A (en) Systems and methods for establishing a secure communication channel using a browser component
CN101488952A (en) Mobile storage apparatus, data secured transmission method and system
CN103237305B (en) Password protection method for smart card on facing moving terminal
JP2008299617A (en) Information processing device, and information processing system
US20090313691A1 (en) Identity verification system applicable to virtual private network architecture and method of the same
CN103886263A (en) Method and system for protecting data in mobile terminal
WO2011020350A1 (en) Client terminal for providing service, wireless terminal and binding implementation method
CN101232377A (en) Authentication method and authentication system
CN102984044B (en) The method and apparatus realizing data transmission security based on VPN (virtual private network)
WO2005057841A1 (en) The method for generating the dynamic cryptogram in network transmission and the method for transmitting network data
WO2013004039A1 (en) Method, device and wireless terminal for file processing
Sathyan et al. Multi-layered collaborative approach to address enterprise mobile security challenges
CN106559779B (en) Data transmission method, device and system
CN105812218A (en) Method for realizing multi-VPN-protocol application access, middleware and mobile terminal
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
TW515182B (en) Establishing network security using Internet protocol security policies
JP2014527786A (en) Communication system for authentication by fingerprint information and use thereof
TWM254016U (en) An improved network connection device
WO2017143541A1 (en) Data security protection method and apparatus

Legal Events

Date Code Title Description
MK4K Expiration of patent term of a granted utility model