US20170163691A1 - Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers - Google Patents

Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers Download PDF

Info

Publication number
US20170163691A1
US20170163691A1 US15/378,331 US201615378331A US2017163691A1 US 20170163691 A1 US20170163691 A1 US 20170163691A1 US 201615378331 A US201615378331 A US 201615378331A US 2017163691 A1 US2017163691 A1 US 2017163691A1
Authority
US
United States
Prior art keywords
access
computing platform
port
lease
portender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/378,331
Inventor
Zohar Alon
Roy Feintuch
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Check Point Public Cloud Security Ltd
Original Assignee
Dome 9 Security Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dome 9 Security Ltd filed Critical Dome 9 Security Ltd
Priority to US15/378,331 priority Critical patent/US20170163691A1/en
Publication of US20170163691A1 publication Critical patent/US20170163691A1/en
Assigned to CHECK POINT PUBLIC CLOUD SECURITY LTD reassignment CHECK POINT PUBLIC CLOUD SECURITY LTD ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALON, Zohar, FEINTUCH, Roy
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • Some embodiments relate generally to the field of computer network security and, more particularly, to methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers.
  • Computer networks run by a server or a group of servers, are being used to manage the data for homes and businesses of all types and sizes.
  • a computer network enables the sharing of files and printer resources, enabling easier communication between computers.
  • Productivity is increased with a computer network due to the ease of syncing email, calendars and tasks enabling easier collaboration between employees and personnel.
  • Large data storage systems attached to computer servers are used to backup and protect important data for the entire network.
  • a feature of computer networks that is becoming more widespread is remote on-demand access to the resources of the network.
  • the Internet becoming increasingly popular, more network users are able to connect to a remote server through any device with an internet connection. Users are able to connect to networks from home computers, laptops, tablets, smart phones, e-book readers, and any other mobile Internet device.
  • a computer network open to internet traffic can be a great safety risk.
  • a connection through the internet can come from anyone and from anywhere in the world.
  • Security systems, including firewalls, are needed to protect such a vulnerable connection.
  • a firewall can filter incoming Internet data packets though its system, analyze the data and determine whether the data is secure and from a trustworthy source.
  • a firewall can behave like a proxy server to forward received data while masking the network information of the attached computer network.
  • a typical computer network server firewall includes an administrator account for controlling the policies and settings of the server.
  • the administrator account is accessed using some login method.
  • this login method includes inputting to the server a typically straightforward administrator user name (e.g. Administrator or Admin) and some password. Since the password of the administrator account is the only level of security in place to protecting full access to the server, the security of the server is only as good as the administrator password.
  • Some embodiments disclosed herein include a method for secured access for a computing platform.
  • the method comprises generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings.
  • Some embodiments disclosed herein include system for secured access for a computing platform.
  • the system comprises at least one computing platform comprising at least one resource and at least one firewall port; a policy server configured to control port access security and connectivity settings for the at least one computing platform; and a communication link communicatively connecting between the at least one computing platform and the policy server, the communication link is configured to serve a secure tunnel communication there through; wherein the secure tunnel communication is intermittently established over the at least one communication link; wherein an on-the-fly access lease to the at least one port of the at least one computing platform defining provisions for access the at least one firewall port of the computing platform is acquired, wherein the provisions include at least a lease a duration for accessing the at least one firewall port; and wherein the policy server is configured to send instructions to open the at least one firewall port of the at least one computing platform during a communication over the secure tunnel communication respective of the acquired on-the-fly access lease and the security settings.
  • FIG. 1 shows a general system level diagram showing all constituent computer network elements (including the firewalls in the server OS) as well as a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention
  • FIG. 2 is a flow chart including the steps of a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention
  • FIG. 3A shows a functional level diagram of PorTender inside of a Server/computing platform, according to some embodiments of the present invention
  • FIG. 3B shows a flowchart including the steps performed by the PorTender, according to some embodiments of the present invention.
  • FIG. 4A shows a functional level diagram of a policy server, according to some embodiments of the present invention.
  • FIG. 4B shows a flowchart including the steps performed by the policy server, according to some embodiments of the present invention.
  • the methods, devices and/or systems disclosed herein may be used in many applications, e.g., civil applications, military applications, medical applications, commercial applications, or any other suitable application.
  • the methods, devices and/or systems disclosed herein may be used in the field of consumer electronics, for example, as part of any suitable television, video Accessories, Digital-Versatile-Disc (DVD), multimedia projectors, Audio and/or Video (A/V) receivers/transmitters, gaming consoles, video cameras, video recorders, portable media players, cell phones, mobile devices, and/or automobile A/V accessories.
  • the methods, devices and/or systems disclosed herein may be used in the field of Personal Computers (PC), for example, as part of any suitable desktop PC, notebook PC, monitor, and/or PC accessories.
  • PC Personal Computers
  • the policy server may comprise a direct secured tunnel administrator access to the computing platform, a configuration manager adapted to manage security settings and forward the settings along the tunnel, a secure internet-based graphical user interface (GUI) including security controls adapted to control the configuration manager, a dynamic access lease manager including security controls adapted to generate an on-the-fly access lease to the computing platform, and a secure internet-based GUI including security controls adapted to control the dynamic access lease manager.
  • GUI graphical user interface
  • the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease.
  • the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease according to a schedule.
  • the tunnel may connect to a port-tending agent (PorTender) adapted to monitor and regulate port access to resources of the computing platform.
  • the policy server may be further adapted to transmit administrator settings for port access to the PorTender.
  • transmitting administrator settings for port access may occur periodically according to a predetermined schedule.
  • transmitting administrator settings for port access may occur after a one-time request from the PorTender.
  • a port-tending agent adapted to monitor and regulate port access to resources of a functionally associated or integral computing platform.
  • the PorTender may be further adapted to receive administrator settings for port access from a functionally associated policy server.
  • receiving administrator settings for port access may occur periodically according to a predetermined schedule.
  • receiving administrator settings for port access may occur after a one-time request of the policy server.
  • the PorTender may be further adapted to simultaneously monitor and regulate a group of computing platforms connected to a network
  • the PorTender may be further adapted to be installed into an operating system of the computing platform.
  • a system for providing security on a computing platform comprising: a port-tending agent (PorTender) adapted to monitor and regulate port access to resources on the computing platform; a policy server functionally associated with the PorTender, wherein the policy server is adapted to control port access security and connectivity settings; a dynamic access lease manager associated with the policy server, wherein the dynamic access lease manager is adapted to generate an on-the-fly access lease to the computing platform; and a secure internet-based policy server user interface including controls adapted to adjust the policy server remotely.
  • PorTender port-tending agent
  • the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease. According to further embodiments of the present invention, the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease according to a schedule.
  • the policy server may be further adapted to transmit administrator settings for port access to the PorTender.
  • receiving administrator settings for port access may occur periodically according to a predetermined schedule.
  • receiving administrator settings for port access may occurs after a one-time request from the PorTender.
  • the PorTender may be further adapted to be installed into an operating system of the computing platform.
  • FIG. 1 there is shown a general system level diagram ( 100 ) showing all constituent computer network elements (including the firewalls in the server OS) as well as a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention.
  • System 100 may be described in view of FIG. 2 showing a flow chart ( 200 ) including the steps of a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention.
  • system 100 may comprise a device for user Internet access (e.g. client machine 110 ) which may be any device from the group consisting of: computer terminal, desktop computer, laptop computer, nettop, netbook, tablet, mobile internet device, smartphone etc.
  • System 100 may further comprise a secure web access administrator client (i.e. cloud service 120 ), providing a front-end for a policy server.
  • System 100 may further comprise a secure server ( 130 ) and/or a group of secure servers ( 140 ) accessible from cloud service 120 and adapted with a port tending agent (PorTender).
  • client machine 110 may be any device from the group consisting of: computer terminal, desktop computer, laptop computer, nettop, netbook, tablet, mobile internet device, smartphone etc.
  • System 100 may further comprise a secure web access administrator client (i.e. cloud service 120 ), providing a front-end for a policy server.
  • System 100 may further comprise a secure server ( 130 ) and/or a group of secure servers ( 140 ) accessible from cloud service 120 and adapted
  • an administrator may login ( 205 ) to secure web access administrator client 120 (i.e. policy server) using a password and/or any other predetermined verification technique.
  • the administrator may adjust ( 210 ) port-access and security settings for secure server 130 and/or group of secure servers 140 .
  • the adjusted settings may be saved ( 220 ) to the policy server.
  • the administrator may setup ( 215 ) an access lease for a limited access lease to secure server 130 and/or group of secure servers 140 .
  • the access lease settings may be saved ( 230 ) to the policy server.
  • the access lease information may be sent to a preferred user via an optional combination of secure email, SMS, and/or any other direct or otherwise secure messaging system.
  • the policy server may send ( 240 ) port-access, security and access lease settings to Port tending agent (PorTender) using integral or functionally associated communications controller.
  • the PorTender may adjust ( 250 ) security and port settings on secure server 130 and/or group of secure servers 140 . The preferred user may then use received access lease information to login and access secure server 130 and/or group of secure servers 140 .
  • FIG. 3A there is shown a functional level diagram ( 300 A) of PorTender inside of a Server/computing platform, according to some embodiments of the present invention.
  • System 300 A may be described in view of FIG. 3B , showing a flowchart ( 300 B) including the steps performed by the PorTender, according to some embodiments of the present invention.
  • a server or any computing platform may comprise some processing logic, circuit, device, system and/or associated software for executing processing functions for the sever (e.g. Platform operating memory/space 305 A).
  • Platform operating memory/space (e.g. kernel) 305 A may comprise firewall module 310 A, adapted to control and secure functionally associated networking hardware 315 A integral to or functionally associated with server 300 A.
  • Platform operating memory/space (e.g. kernel) 305 A may further comprise Data storage drivers and interface module 330 A, adapted to control functionally associated storage devices (e.g. main memory, mass storage device(s), removable media/medium 335 A) integral to or functionally associated with server 300 A.
  • Platform operating memory/space (e.g. kernel) 305 A may further comprise CPU drivers and interface module ( 320 A), adapted to control functionally associated CPU(s) 325 A functionally associated with or integral to server 300 A.
  • server/computing platform 300 A may be adapted to communicate to a network (e.g. LAN, WAN, VPN, etc.) via functionally associated networking hardware 315 A integral to or functionally associated with server 300 A.
  • Platform operating memory/space (e.g. kernel) 305 A may include firewall 310 A to control server/computing platform 300 A port access.
  • server/computing platform 300 A may include user space 350 A for running integral or functionally associated applications.
  • User space 350 A may further include a port-tending agent (PorTender 355 A) adapted to provide direct access to firewall module 310 A and control security and/or port access settings.
  • PorTender 355 A may communicate with functionally associated policy server 340 A, through firewall module 310 A and via networking hardware 315 A, to receive updated security policy and/or port access settings.
  • PorTender 355 A may initiate ( 310 B) a secure communication session with policy server 340 A or may wait for a next expected communication request from policy server 340 A.
  • the connection between PorTender 355 A and policy server 340 A may be a substantially real-time open connection.
  • PorTender 355 A may adjust ( 325 B) security settings of firewall 310 A and port settings of server 300 A based on a preconfigured emergency policy.
  • a preconfigured emergency mode timeout setting may determine the length of unavailability that triggers the emergency policy.
  • PorTender 355 A may receive ( 330 B) port-access, security and access lease settings from policy server 340 A. According to further embodiments of the present invention, PorTender 355 A may adjust ( 340 B) security settings of firewall 310 A and port settings of server 300 A based on the received policy.
  • FIG. 4A there is shown a functional level diagram ( 400 A) of a policy server, according to some embodiments of the present invention.
  • System 400 A may be described in view of FIG. 4B , showing a flowchart ( 400 B) including the steps performed by the policy server, according to some embodiments of the present invention.
  • web-based user interface 420 A may provide security policy controls 422 A and access lease controls ( 424 A) for functionally associated policy server 410 A.
  • Policy server 410 A may comprise security policy storage 412 A and access lease scheduler 414 A.
  • policy server 410 A may further comprise communications controller/logic 416 A to transmit and receive information with security policy distributor 450 A and access lease distributor 440 A.
  • policy server 410 A may open ( 410 B) a secure web access administrator session upon receiving a valid password and/or some other verification (e.g. IP address).
  • policy server may receive ( 430 B) access lease settings for a limited access lease to a server or group of servers for a preferred user and save the settings to access lease scheduler 414 A.
  • the access lease information i.e. a unique IP address invitation
  • the preferred access lease user may activate ( 436 B) the unique access IP address access lease (e.g. by clicking a hyperlink trigger).
  • policy server 410 A may receive ( 420 B) input port-access and security policy settings for a server or group of servers and save the settings in security policy storage 412 A.
  • security policy distributor 450 A may communicate with Port Tending agent (PorTender— 430 A) using a scheduled communication module, protocol and/or service (e.g. a polling module and/or a port-knocking module).
  • security policy distributor 450 A may communicate with PorTender— 430 A using a substantially real-time communication module, protocol and/or service (e.g. a push module and/or Extensible messaging and presence protocol—XMPP).
  • Policy server 410 A may send ( 440 B) port-access, security and access lease settings to PorTender 430 A via security policy distributor ( 450 A).
  • Some embodiments of the invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment including both hardware and software elements.
  • Some embodiments may be implemented in software, which includes but is not limited to firmware, resident software, microcode, or the like.
  • some embodiments of the invention may take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • a computer-usable or computer-readable medium may be or may include any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium may be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
  • a computer-readable medium may include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk, and an optical disk.
  • RAM random access memory
  • ROM read-only memory
  • optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W), and DVD.
  • a data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements, for example, through a system bus.
  • the memory elements may include, for example, local memory employed during actual execution of the program code, bulk storage, and cache memories which may provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • I/O devices including but not limited to keyboards, displays, pointing devices, etc.
  • I/O controllers may be coupled to the system either directly or through intervening I/O controllers.
  • network adapters may be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices, for example, through intervening private or public networks.
  • modems, cable modems and Ethernet cards are demonstrative examples of types of network adapters. Other suitable components may be used.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method and system for secured access for a computing platform are provided. The method includes generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 13/106,153 filed on May 12, 2011, now allowed and which claims the benefit of U.S. Provisional Application No. 61/445,089 filed on Feb. 22, 2011, the contents of which are hereby incorporated by reference.
  • TECHNICAL FIELD
  • Some embodiments relate generally to the field of computer network security and, more particularly, to methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers.
  • BACKGROUND
  • Computer networks, run by a server or a group of servers, are being used to manage the data for homes and businesses of all types and sizes. A computer network enables the sharing of files and printer resources, enabling easier communication between computers. Productivity is increased with a computer network due to the ease of syncing email, calendars and tasks enabling easier collaboration between employees and personnel. Large data storage systems attached to computer servers are used to backup and protect important data for the entire network.
  • A feature of computer networks that is becoming more widespread is remote on-demand access to the resources of the network. With the Internet becoming increasingly popular, more network users are able to connect to a remote server through any device with an internet connection. Users are able to connect to networks from home computers, laptops, tablets, smart phones, e-book readers, and any other mobile Internet device.
  • A computer network open to internet traffic can be a great safety risk. A connection through the internet can come from anyone and from anywhere in the world. Security systems, including firewalls, are needed to protect such a vulnerable connection. A firewall can filter incoming Internet data packets though its system, analyze the data and determine whether the data is secure and from a trustworthy source. A firewall can behave like a proxy server to forward received data while masking the network information of the attached computer network.
  • A typical computer network server firewall includes an administrator account for controlling the policies and settings of the server. The administrator account is accessed using some login method. Generally, this login method includes inputting to the server a typically straightforward administrator user name (e.g. Administrator or Admin) and some password. Since the password of the administrator account is the only level of security in place to protecting full access to the server, the security of the server is only as good as the administrator password.
  • There is thus a need in the field of computer network security for improved methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers.
  • SUMMARY
  • Some embodiments disclosed herein include a method for secured access for a computing platform. The method comprises generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings.
  • Some embodiments disclosed herein include system for secured access for a computing platform. The system comprises at least one computing platform comprising at least one resource and at least one firewall port; a policy server configured to control port access security and connectivity settings for the at least one computing platform; and a communication link communicatively connecting between the at least one computing platform and the policy server, the communication link is configured to serve a secure tunnel communication there through; wherein the secure tunnel communication is intermittently established over the at least one communication link; wherein an on-the-fly access lease to the at least one port of the at least one computing platform defining provisions for access the at least one firewall port of the computing platform is acquired, wherein the provisions include at least a lease a duration for accessing the at least one firewall port; and wherein the policy server is configured to send instructions to open the at least one firewall port of the at least one computing platform during a communication over the secure tunnel communication respective of the acquired on-the-fly access lease and the security settings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
  • FIG. 1 shows a general system level diagram showing all constituent computer network elements (including the firewalls in the server OS) as well as a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention;
  • FIG. 2 is a flow chart including the steps of a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention;
  • FIG. 3A shows a functional level diagram of PorTender inside of a Server/computing platform, according to some embodiments of the present invention;
  • FIG. 3B shows a flowchart including the steps performed by the PorTender, according to some embodiments of the present invention;
  • FIG. 4A shows a functional level diagram of a policy server, according to some embodiments of the present invention; and
  • FIG. 4B shows a flowchart including the steps performed by the policy server, according to some embodiments of the present invention.
  • It will be appreciated that for simplicity and clarity of illustration, elements shown in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements.
  • DETAILED DESCRIPTION
  • In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of some embodiments. However, it will be understood by persons of ordinary skill in the art that some embodiments may be practiced without these specific details. In other instances, well-known methods, procedures, components, units and/or circuits have not been described in detail so as not to obscure the discussion.
  • Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing”, “computing”, “calculating”, “determining”, or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices. In addition, the term “plurality” may be used throughout the specification to describe two or more components, devices, elements, parameters and the like.
  • It should be understood that some embodiments may be used in a variety of applications. Although embodiments of the invention are not limited in this respect, one or more of the methods, devices and/or systems disclosed herein may be used in many applications, e.g., civil applications, military applications, medical applications, commercial applications, or any other suitable application. In some demonstrative embodiments the methods, devices and/or systems disclosed herein may be used in the field of consumer electronics, for example, as part of any suitable television, video Accessories, Digital-Versatile-Disc (DVD), multimedia projectors, Audio and/or Video (A/V) receivers/transmitters, gaming consoles, video cameras, video recorders, portable media players, cell phones, mobile devices, and/or automobile A/V accessories. In some demonstrative embodiments the methods, devices and/or systems disclosed herein may be used in the field of Personal Computers (PC), for example, as part of any suitable desktop PC, notebook PC, monitor, and/or PC accessories.
  • According to some embodiments of the present invention, there may be a policy server adapted to secure a functionally associated computing platform. According to further embodiments of the present invention, the policy server may comprise a direct secured tunnel administrator access to the computing platform, a configuration manager adapted to manage security settings and forward the settings along the tunnel, a secure internet-based graphical user interface (GUI) including security controls adapted to control the configuration manager, a dynamic access lease manager including security controls adapted to generate an on-the-fly access lease to the computing platform, and a secure internet-based GUI including security controls adapted to control the dynamic access lease manager. According to further embodiments of the present invention, the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease. According to further embodiments of the present invention, the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease according to a schedule.
  • According to some embodiments of the present invention, the tunnel may connect to a port-tending agent (PorTender) adapted to monitor and regulate port access to resources of the computing platform. The policy server may be further adapted to transmit administrator settings for port access to the PorTender. According to further embodiments of the present invention, transmitting administrator settings for port access may occur periodically according to a predetermined schedule. According to further embodiments of the present invention, transmitting administrator settings for port access may occur after a one-time request from the PorTender.
  • According to some embodiments of the present invention, there may be a port-tending agent (PorTender) adapted to monitor and regulate port access to resources of a functionally associated or integral computing platform. The PorTender may be further adapted to receive administrator settings for port access from a functionally associated policy server. According to further embodiments of the present invention, receiving administrator settings for port access may occur periodically according to a predetermined schedule. According to further embodiments of the present invention, receiving administrator settings for port access may occur after a one-time request of the policy server.
  • According to some embodiments of the present invention, the PorTender may be further adapted to simultaneously monitor and regulate a group of computing platforms connected to a network According to further embodiments of the present invention, the PorTender may be further adapted to be installed into an operating system of the computing platform.
  • According to some embodiments of the present invention, there may be a system for providing security on a computing platform comprising: a port-tending agent (PorTender) adapted to monitor and regulate port access to resources on the computing platform; a policy server functionally associated with the PorTender, wherein the policy server is adapted to control port access security and connectivity settings; a dynamic access lease manager associated with the policy server, wherein the dynamic access lease manager is adapted to generate an on-the-fly access lease to the computing platform; and a secure internet-based policy server user interface including controls adapted to adjust the policy server remotely.
  • According to some embodiments of the present invention, the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease. According to further embodiments of the present invention, the dynamic access lease manager may be further adapted to terminate the on-the-fly access lease according to a schedule.
  • According to some embodiments of the present invention, the policy server may be further adapted to transmit administrator settings for port access to the PorTender. According to further embodiments of the present invention, receiving administrator settings for port access may occur periodically according to a predetermined schedule. According to further embodiments of the present invention, receiving administrator settings for port access may occurs after a one-time request from the PorTender.
  • According to some embodiments of the present invention, the PorTender may be further adapted to be installed into an operating system of the computing platform.
  • Now turning to FIG. 1, there is shown a general system level diagram (100) showing all constituent computer network elements (including the firewalls in the server OS) as well as a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention. System 100 may be described in view of FIG. 2 showing a flow chart (200) including the steps of a basic communication flow from a remote administrator access to a computing platform firewall, according to some embodiments of the present invention.
  • According to some embodiments of the present invention, system 100 may comprise a device for user Internet access (e.g. client machine 110) which may be any device from the group consisting of: computer terminal, desktop computer, laptop computer, nettop, netbook, tablet, mobile internet device, smartphone etc. System 100 may further comprise a secure web access administrator client (i.e. cloud service 120), providing a front-end for a policy server. System 100 may further comprise a secure server (130) and/or a group of secure servers (140) accessible from cloud service 120 and adapted with a port tending agent (PorTender).
  • According to some embodiments of the present invention, an administrator may login (205) to secure web access administrator client 120 (i.e. policy server) using a password and/or any other predetermined verification technique. According to further embodiments of the present invention, the administrator may adjust (210) port-access and security settings for secure server 130 and/or group of secure servers 140. The adjusted settings may be saved (220) to the policy server.
  • According to some embodiments of the present invention, the administrator may setup (215) an access lease for a limited access lease to secure server 130 and/or group of secure servers 140. The access lease settings may be saved (230) to the policy server. According to further embodiments of the present invention, the access lease information may be sent to a preferred user via an optional combination of secure email, SMS, and/or any other direct or otherwise secure messaging system.
  • According to some embodiments of the present invention, the policy server may send (240) port-access, security and access lease settings to Port tending agent (PorTender) using integral or functionally associated communications controller. According to further embodiments of the present invention, the PorTender may adjust (250) security and port settings on secure server 130 and/or group of secure servers 140. The preferred user may then use received access lease information to login and access secure server 130 and/or group of secure servers 140.
  • Now turning to FIG. 3A, there is shown a functional level diagram (300A) of PorTender inside of a Server/computing platform, according to some embodiments of the present invention. System 300A may be described in view of FIG. 3B, showing a flowchart (300B) including the steps performed by the PorTender, according to some embodiments of the present invention.
  • According to some embodiments of the present invention, a server or any computing platform (300A) may comprise some processing logic, circuit, device, system and/or associated software for executing processing functions for the sever (e.g. Platform operating memory/space 305A). Platform operating memory/space (e.g. kernel) 305A may comprise firewall module 310A, adapted to control and secure functionally associated networking hardware 315A integral to or functionally associated with server 300A. Platform operating memory/space (e.g. kernel) 305A may further comprise Data storage drivers and interface module 330A, adapted to control functionally associated storage devices (e.g. main memory, mass storage device(s), removable media/medium 335A) integral to or functionally associated with server 300A. Platform operating memory/space (e.g. kernel) 305A may further comprise CPU drivers and interface module (320A), adapted to control functionally associated CPU(s) 325A functionally associated with or integral to server 300A.
  • According to some embodiments of the present invention, server/computing platform 300A may be adapted to communicate to a network (e.g. LAN, WAN, VPN, etc.) via functionally associated networking hardware 315A integral to or functionally associated with server 300A. Platform operating memory/space (e.g. kernel) 305A may include firewall 310A to control server/computing platform 300A port access.
  • According to some embodiments of the present invention, server/computing platform 300A may include user space 350A for running integral or functionally associated applications. User space 350A may further include a port-tending agent (PorTender 355A) adapted to provide direct access to firewall module 310A and control security and/or port access settings. PorTender 355A may communicate with functionally associated policy server 340A, through firewall module 310A and via networking hardware 315A, to receive updated security policy and/or port access settings.
  • According to some embodiments of the present invention, PorTender 355A may initiate (310B) a secure communication session with policy server 340A or may wait for a next expected communication request from policy server 340A. The connection between PorTender 355A and policy server 340A may be a substantially real-time open connection. According to further embodiments of the present invention when policy server 340A is unavailable (320B), PorTender 355A may adjust (325B) security settings of firewall 310A and port settings of server 300A based on a preconfigured emergency policy. A preconfigured emergency mode timeout setting may determine the length of unavailability that triggers the emergency policy.
  • According to some embodiments of the present invention when policy server 340A is available (320B), PorTender 355A may receive (330B) port-access, security and access lease settings from policy server 340A. According to further embodiments of the present invention, PorTender 355A may adjust (340B) security settings of firewall 310A and port settings of server 300A based on the received policy.
  • Now turning to FIG. 4A, there is shown a functional level diagram (400A) of a policy server, according to some embodiments of the present invention. System 400A may be described in view of FIG. 4B, showing a flowchart (400B) including the steps performed by the policy server, according to some embodiments of the present invention.
  • According to some embodiments of the present invention, web-based user interface 420A (i.e. a cloud service) may provide security policy controls 422A and access lease controls (424A) for functionally associated policy server 410A. Policy server 410A may comprise security policy storage 412A and access lease scheduler 414A. According to some embodiments of the present invention, policy server 410A may further comprise communications controller/logic 416A to transmit and receive information with security policy distributor 450A and access lease distributor 440A.
  • According to some embodiments of the present invention, policy server 410A may open (410B) a secure web access administrator session upon receiving a valid password and/or some other verification (e.g. IP address). According to further embodiments of the present invention, policy server may receive (430B) access lease settings for a limited access lease to a server or group of servers for a preferred user and save the settings to access lease scheduler 414A. According to further embodiments of the present invention, the access lease information (i.e. a unique IP address invitation) may be sent (435B) to the preferred user via access lease distributor 440A. The preferred access lease user may activate (436B) the unique access IP address access lease (e.g. by clicking a hyperlink trigger).
  • According to some embodiments of the present invention, policy server 410A may receive (420B) input port-access and security policy settings for a server or group of servers and save the settings in security policy storage 412A. According to further embodiments of the present invention, security policy distributor 450A may communicate with Port Tending agent (PorTender—430A) using a scheduled communication module, protocol and/or service (e.g. a polling module and/or a port-knocking module). According to further embodiments of the present invention, security policy distributor 450A may communicate with PorTender—430A using a substantially real-time communication module, protocol and/or service (e.g. a push module and/or Extensible messaging and presence protocol—XMPP). Policy server 410A may send (440B) port-access, security and access lease settings to PorTender 430A via security policy distributor (450A).
  • Some embodiments of the invention, for example, may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment including both hardware and software elements. Some embodiments may be implemented in software, which includes but is not limited to firmware, resident software, microcode, or the like.
  • Furthermore, some embodiments of the invention may take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For example, a computer-usable or computer-readable medium may be or may include any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • In some embodiments, the medium may be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Some demonstrative examples of a computer-readable medium may include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk, and an optical disk. Some demonstrative examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W), and DVD.
  • In some embodiments, a data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements, for example, through a system bus. The memory elements may include, for example, local memory employed during actual execution of the program code, bulk storage, and cache memories which may provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • In some embodiments, input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) may be coupled to the system either directly or through intervening I/O controllers. In some embodiments, network adapters may be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices, for example, through intervening private or public networks. In some embodiments, modems, cable modems and Ethernet cards are demonstrative examples of types of network adapters. Other suitable components may be used.
  • Functions, operations, components and/or features described herein with reference to one or more embodiments, may be combined with, or may be utilized in combination with, one or more other functions, operations, components and/or features described herein with reference to one or more other embodiments, or vice versa.
  • While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents will now occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.

Claims (20)

What is claimed is:
1. A method for secured access for a computing platform comprising:
generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and
controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings.
2. The method of claim 1, wherein the access to resources of the computing platform is triggered by passing an instruction to the computing platform during a secure tunnel communication requested by the computing platform.
3. The method of claim 2, further comprising:
monitoring the port access to the resources of the computing platform by a port-tending agent (PorTender) connected to the secure tunnel.
4. The method of claim 2, further comprising:
regulating the port access to the resources of the computing platform by a port-tending agent (PorTender) connected to the secure tunnel.
5. The method of claim 2, further comprising:
establishing a secure tunnel communication with the computing platform responsive to an intermittent connection request from the computing platform.
6. The method of claim 5, further comprising:
managing security settings of the computing platform; and
forwarding the security settings along the secure tunnel.
7. The method of claim 1, further comprising:
terminating the on-the-fly access lease according to a schedule.
8. The method of claim 1, further comprising:
transmitting administrator settings for port access of the one or more firewalls ports to a port-tending agent (PorTender) connected to the secure tunnel.
9. The method of claim 8, wherein the transmitting administrator settings occurs periodically according to a predetermined schedule.
10. The method of claim 8, wherein the transmitting administrator settings for port access occurs after a one-time request from the PorTender.
11. A system for secured access for a computing platform comprising:
at least one computing platform comprising at least one resource and at least one firewall port;
a policy server configured to control port access security and connectivity settings for the at least one computing platform; and
a communication link communicatively connecting between the at least one computing platform and the policy server, the communication link is configured to serve a secure tunnel communication there through, wherein the secure tunnel communication is intermittently established over the communication link;
wherein an on-the-fly access lease to the at least one port of the at least one computing platform defining provisions for access the at least one firewall port of the computing platform is acquired, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and
wherein the policy server is configured to send instructions to open the at least one firewall port of the at least one computing platform during a communication using the secure tunnel communication respective of the acquired on-the-fly access lease and the security settings.
12. The system of claim 11, wherein the on-the-fly access lease is performed by a dynamic access lease manager of the system.
13. The system of claim 12, wherein the dynamic access lease manager is configured to terminate the on-the-fly access lease.
14. The system of claim 13, wherein the dynamic access lease manager is further configured to terminate the on-the-fly access lease according to a schedule.
15. The system of claim 11, wherein access to the at least one resource is monitored and regulated by a port-tending agent (PorTender).
16. The system of claim 15, wherein the PorTender intermittently triggers the secure tunnel communication. 17, The system of claim 15, wherein the policy server is configured to transmit administrator settings for port access to said PorTender.
18. The system of claim 17, wherein receiving administrator settings for access to the at least one port occurs periodically according to a predetermined schedule.
19. The system of claim 17, wherein receiving administrator settings to access the at least one firewall port occurs after a one-time request from the PorTender.
20. The system of claim 15, wherein the PorTender is installed into an operating system of the computing platform.
21. A non-transitory computer readable medium having stored thereon instructions for causing one or more processors to execute a process comprising:
generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and
controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings.
US15/378,331 2011-02-22 2016-12-14 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers Abandoned US20170163691A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/378,331 US20170163691A1 (en) 2011-02-22 2016-12-14 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161445089P 2011-02-22 2011-02-22
US13/106,153 US9531754B2 (en) 2011-02-22 2011-05-12 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers
US15/378,331 US20170163691A1 (en) 2011-02-22 2016-12-14 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/106,153 Continuation US9531754B2 (en) 2011-02-22 2011-05-12 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers

Publications (1)

Publication Number Publication Date
US20170163691A1 true US20170163691A1 (en) 2017-06-08

Family

ID=46653836

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/106,153 Active 2031-06-25 US9531754B2 (en) 2011-02-22 2011-05-12 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers
US15/378,331 Abandoned US20170163691A1 (en) 2011-02-22 2016-12-14 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/106,153 Active 2031-06-25 US9531754B2 (en) 2011-02-22 2011-05-12 Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers

Country Status (2)

Country Link
US (2) US9531754B2 (en)
WO (1) WO2012114271A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160294884A1 (en) * 2015-03-31 2016-10-06 Bose Corporation Establishing Communication between Digital Media Servers and Audio Playback Devices in Audio Systems
US20200045015A1 (en) * 2018-07-31 2020-02-06 Ca, Inc. Dynamically controlling firewall ports based on server transactions to reduce risks

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG11201403482TA (en) 2011-12-21 2014-07-30 Ssh Comm Security Oyj Automated access, key, certificate, and credential management
US20130191630A1 (en) 2012-01-24 2013-07-25 Ssh Communications Security Corp Auditing and controlling encrypted communications
US9548962B2 (en) * 2012-05-11 2017-01-17 Alcatel Lucent Apparatus and method for providing a fluid security layer
DE102014101835A1 (en) * 2014-02-13 2015-08-13 Fujitsu Technology Solutions Intellectual Property Gmbh Method for communication between secure computer systems and computer network infrastructure
DE102014107793B9 (en) * 2014-06-03 2018-05-09 Fujitsu Technology Solutions Intellectual Property Gmbh Method of routing data between computer systems, computer network infrastructure and computer program product
JP6354857B2 (en) * 2014-12-08 2018-07-11 日本電気株式会社 Wireless terminal and method for messaging
US10104123B2 (en) * 2015-09-23 2018-10-16 Ca, Inc. Fetching a policy definition library from a policy server at mobile device runtime of an application package to control access to mobile device resources
US10616235B2 (en) * 2015-11-25 2020-04-07 Check Point Public Cloud Security Ltd. On-demand authorization of access to protected resources
US11709695B2 (en) * 2020-01-31 2023-07-25 Vmware, Inc. Generation, actuation, and enforcement of policies for resources within a distributed computing system
US11675917B2 (en) 2021-04-22 2023-06-13 Bank Of America Corporation Electronic system for dynamically permitting and restricting access to and modification of computer resources

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020007837A1 (en) * 1999-05-07 2002-01-24 Coty S.A. Ablation process involving bristles on a mascara brush and the mascara brush obtained by such process
US20020078377A1 (en) * 2000-12-15 2002-06-20 Ching-Jye Chang Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications
US20060075478A1 (en) * 2004-09-30 2006-04-06 Nortel Networks Limited Method and apparatus for enabling enhanced control of traffic propagation through a network firewall

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6243815B1 (en) * 1997-04-25 2001-06-05 Anand K. Antur Method and apparatus for reconfiguring and managing firewalls and security devices
US6009103A (en) * 1997-12-23 1999-12-28 Mediaone Group, Inc. Method and system for automatic allocation of resources in a network
GB9920834D0 (en) * 1999-09-04 1999-11-10 Hewlett Packard Co Providing secure access through network firewalls
US7827278B2 (en) * 2001-07-23 2010-11-02 At&T Intellectual Property Ii, L.P. System for automated connection to virtual private networks related applications
US8776050B2 (en) * 2003-08-20 2014-07-08 Oracle International Corporation Distributed virtual machine monitor for managing multiple virtual resources across multiple physical nodes
US7594268B1 (en) * 2003-09-19 2009-09-22 Symantec Corporation Preventing network discovery of a system services configuration
US20060122955A1 (en) * 2004-12-02 2006-06-08 Alex Bethlehem System and method for launching a resource in a network
CN1917426B (en) * 2005-08-17 2010-12-08 国际商业机器公司 Port scanning method and device, port scanning detection method and device, port scanning system
US7383366B2 (en) * 2005-12-22 2008-06-03 Dell Products L.P. Keypad user interface and port sequence mapping algorithm
US8413248B2 (en) * 2006-03-22 2013-04-02 Michael B. Rash Method for secure single-packet remote authorization
CN101918926B (en) * 2007-10-24 2013-05-01 乔纳森·彼得·多伊奇 Various methods and apparatuses for accessing networked devices without accessible addresses via virtual IP addresses

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020007837A1 (en) * 1999-05-07 2002-01-24 Coty S.A. Ablation process involving bristles on a mascara brush and the mascara brush obtained by such process
US20020078377A1 (en) * 2000-12-15 2002-06-20 Ching-Jye Chang Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications
US20060075478A1 (en) * 2004-09-30 2006-04-06 Nortel Networks Limited Method and apparatus for enabling enhanced control of traffic propagation through a network firewall

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160294884A1 (en) * 2015-03-31 2016-10-06 Bose Corporation Establishing Communication between Digital Media Servers and Audio Playback Devices in Audio Systems
US10419497B2 (en) * 2015-03-31 2019-09-17 Bose Corporation Establishing communication between digital media servers and audio playback devices in audio systems
US20200045015A1 (en) * 2018-07-31 2020-02-06 Ca, Inc. Dynamically controlling firewall ports based on server transactions to reduce risks
US10834056B2 (en) * 2018-07-31 2020-11-10 Ca, Inc. Dynamically controlling firewall ports based on server transactions to reduce risks

Also Published As

Publication number Publication date
WO2012114271A2 (en) 2012-08-30
WO2012114271A3 (en) 2012-11-01
US9531754B2 (en) 2016-12-27
US20120216241A1 (en) 2012-08-23

Similar Documents

Publication Publication Date Title
US20170163691A1 (en) Methods, circuits, apparatus, systems and associated software applications for providing security on one or more servers, including virtual servers
US10560517B1 (en) Remote management of a storage array
US10042555B2 (en) Automatically managing the storage of a virtual machine
US9753786B2 (en) Client server communication system
US10200354B2 (en) Switching between networks
US10078762B1 (en) Systems and methods for digitally enforcing computer parental controls
US20150020164A1 (en) Automatic management of secure connections
US20130201519A1 (en) Bridging Non-Network Interfaces and Network Interfaces
US8566847B2 (en) Out-of-band host management via a management controller
TW201928671A (en) Chahssis monitoring system and chassis monitoring method
US20220345371A1 (en) Control configuration for a plurality of endpoint devices
US20080320581A1 (en) Systems, methods, and media for firewall control via process interrogation
US10009425B1 (en) Synchronization of transactions utilizing multiple distributed cloud-based services
US8984129B2 (en) Remote session management
US20130007841A1 (en) Client server communication system
US9571331B1 (en) Techniques for accessing local networks via a virtualized gateway
US9450906B2 (en) Managing a messaging queue in an asynchronous messaging system
US10505897B2 (en) Automated firewall-compliant customer support resolution provisioning system
CN114244700B (en) Port processing method and device, electronic equipment and computer readable storage medium
EP4018629B1 (en) Desktop virtualization with a dedicated cellular network connection for client devices
US10567387B1 (en) Systems and methods for managing computing device access to local area computer networks
US10791116B1 (en) Systems and methods for securing universal plug and play connections
WO2023241351A1 (en) Virtual machine monitoring method and apparatus, and storage medium
US20220207134A1 (en) Systems and methods for securing cloud meetings using containers
CN102594865B (en) Virtualized application-based permission and measurement

Legal Events

Date Code Title Description
STCV Information on status: appeal procedure

Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

AS Assignment

Owner name: CHECK POINT PUBLIC CLOUD SECURITY LTD, ISRAEL

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ALON, ZOHAR;FEINTUCH, ROY;SIGNING DATES FROM 20200902 TO 20200909;REEL/FRAME:053729/0083

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION