AR076351A1 - Metodo de funcionamiento de un dispositivo cliente cuando se conecta a una red y su correspondiente sistema y dispositivo - Google Patents

Metodo de funcionamiento de un dispositivo cliente cuando se conecta a una red y su correspondiente sistema y dispositivo

Info

Publication number
AR076351A1
AR076351A1 ARP090104093A ARP090104093A AR076351A1 AR 076351 A1 AR076351 A1 AR 076351A1 AR P090104093 A ARP090104093 A AR P090104093A AR P090104093 A ARP090104093 A AR P090104093A AR 076351 A1 AR076351 A1 AR 076351A1
Authority
AR
Argentina
Prior art keywords
network
firewall
client computer
client
operate
Prior art date
Application number
ARP090104093A
Other languages
English (en)
Inventor
Bill Begorre
Scott Roberts
Rob M Trace
Srinivas Raghu Gatta
David Thaler
Deon C Brewis
Arun K Buduri
Cullar Gerardo Diaz
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of AR076351A1 publication Critical patent/AR076351A1/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)

Abstract

Una computadora cliente soporta, cuando se conecta a una red privada detrás de un firewall de red, comportamientos diferentes a cuando lo hace fuera del firewall de red conectada indirectamente a través de un dispositivo de acceso. La computadora cliente se configura para establecer una comunicacion con un dispositivo sobre la red. Dependiendo de la respuesta, la computadora cliente puede determinar si está protegida por un firewall y operar entonces con menos restricciones de seguridad o con una configuracion de parámetros apropiada para la conexion directa del cliente a la red. Por otro lado, la computadora cliente puede determinar si está conectada indirectamente a la red a través de Internet u otra red externa, y en consecuencia, debido a que se encuentra sin la proteccion del firewall de la red privada, debería operar con mayores restricciones de seguridad o con una configuracion de parámetros más apropiados para su uso desde esa ubicacion de red. El enfoque descripto se aplica aun cuando el cliente remoto tenga una conexion directa a la red que le permita identificarse con un controlador de dominio.
ARP090104093A 2008-10-24 2009-10-23 Metodo de funcionamiento de un dispositivo cliente cuando se conecta a una red y su correspondiente sistema y dispositivo AR076351A1 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10847208P 2008-10-24 2008-10-24
US12/357,812 US20100107240A1 (en) 2008-10-24 2009-01-22 Network location determination for direct access networks

Publications (1)

Publication Number Publication Date
AR076351A1 true AR076351A1 (es) 2011-06-08

Family

ID=42118814

Family Applications (1)

Application Number Title Priority Date Filing Date
ARP090104093A AR076351A1 (es) 2008-10-24 2009-10-23 Metodo de funcionamiento de un dispositivo cliente cuando se conecta a una red y su correspondiente sistema y dispositivo

Country Status (7)

Country Link
US (1) US20100107240A1 (es)
EP (1) EP2342672A4 (es)
JP (1) JP5535229B2 (es)
CN (2) CN106850642A (es)
AR (1) AR076351A1 (es)
TW (1) TWI497337B (es)
WO (1) WO2010048031A2 (es)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5305999B2 (ja) * 2009-03-16 2013-10-02 キヤノン株式会社 情報処理装置、その制御方法、及びプログラム
US8949411B2 (en) * 2010-12-16 2015-02-03 Microsoft Corporation Determining whether a device is inside a network
US9313085B2 (en) 2010-12-16 2016-04-12 Microsoft Technology Licensing, Llc DNS-based determining whether a device is inside a network
US20140310776A1 (en) * 2012-01-26 2014-10-16 Christoph J. Graham Control Access Based on Network Status
US9843603B2 (en) * 2012-10-16 2017-12-12 Dell Products, L.P. Techniques for dynamic access control of input/output devices
US9137205B2 (en) 2012-10-22 2015-09-15 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US9565213B2 (en) 2012-10-22 2017-02-07 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US9203806B2 (en) 2013-01-11 2015-12-01 Centripetal Networks, Inc. Rule swapping in a packet network
US9124552B2 (en) 2013-03-12 2015-09-01 Centripetal Networks, Inc. Filtering network data transfers
US9094445B2 (en) 2013-03-15 2015-07-28 Centripetal Networks, Inc. Protecting networks from cyber attacks and overloading
EP3002922A1 (en) * 2014-09-30 2016-04-06 Alcatel Lucent Method and system for operating a user equipment device in a private network
US10805337B2 (en) * 2014-12-19 2020-10-13 The Boeing Company Policy-based network security
US9264370B1 (en) 2015-02-10 2016-02-16 Centripetal Networks, Inc. Correlating packets in communications networks
US9866576B2 (en) 2015-04-17 2018-01-09 Centripetal Networks, Inc. Rule-based network-threat detection
US9917856B2 (en) 2015-12-23 2018-03-13 Centripetal Networks, Inc. Rule-based network-threat detection for encrypted communications
US11729144B2 (en) 2016-01-04 2023-08-15 Centripetal Networks, Llc Efficient packet capture for cyber threat analysis
US10503899B2 (en) 2017-07-10 2019-12-10 Centripetal Networks, Inc. Cyberanalysis workflow acceleration
US10284526B2 (en) 2017-07-24 2019-05-07 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US11233777B2 (en) 2017-07-24 2022-01-25 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US10333898B1 (en) 2018-07-09 2019-06-25 Centripetal Networks, Inc. Methods and systems for efficient network protection
US11075999B2 (en) * 2018-08-28 2021-07-27 Citrix Systems, Inc. Accessing resources in a remote access or cloud-based network environment
US11362996B2 (en) 2020-10-27 2022-06-14 Centripetal Networks, Inc. Methods and systems for efficient adaptive logging of cyber threat incidents
US11159546B1 (en) 2021-04-20 2021-10-26 Centripetal Networks, Inc. Methods and systems for efficient threat context-aware packet filtering for network protection

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6308273B1 (en) 1998-06-12 2001-10-23 Microsoft Corporation Method and system of security location discrimination
US6081900A (en) * 1999-03-16 2000-06-27 Novell, Inc. Secure intranet access
US6931529B2 (en) * 2001-01-05 2005-08-16 International Business Machines Corporation Establishing consistent, end-to-end protection for a user datagram
US7127742B2 (en) * 2001-01-24 2006-10-24 Microsoft Corporation Establishing a secure connection with a private corporate network over a public network
US7631084B2 (en) * 2001-11-02 2009-12-08 Juniper Networks, Inc. Method and system for providing secure access to private networks with client redirection
US7325248B2 (en) * 2001-11-19 2008-01-29 Stonesoft Corporation Personal firewall with location dependent functionality
JP4315696B2 (ja) * 2002-03-29 2009-08-19 富士通株式会社 ホスト端末エミュレーションプログラム、中継用プログラムおよびホスト端末エミュレーション方法
US20030200299A1 (en) * 2002-04-23 2003-10-23 International Business Machines Corporation Method and system for providing pervasive computing services through a middle tier service provider utilizing public wired and/or wireless communication networks
US7249262B2 (en) * 2002-05-06 2007-07-24 Browserkey, Inc. Method for restricting access to a web site by remote users
US7448067B2 (en) * 2002-09-30 2008-11-04 Intel Corporation Method and apparatus for enforcing network security policies
US7249187B2 (en) * 2002-11-27 2007-07-24 Symantec Corporation Enforcement of compliance with network security policies
US20080109679A1 (en) * 2003-02-28 2008-05-08 Michael Wright Administration of protection of data accessible by a mobile device
US20050081045A1 (en) * 2003-08-15 2005-04-14 Fiberlink Communications Corporation System, method, apparatus and computer program product for facilitating digital communications
CN100456729C (zh) * 2003-08-29 2009-01-28 诺基亚公司 个人远程防火墙
KR20050064119A (ko) * 2003-12-23 2005-06-29 한국전자통신연구원 인터넷접속을 위한 확장인증프로토콜 인증시 단말에서의서버인증서 유효성 검증 방법
US20050166070A1 (en) * 2003-12-24 2005-07-28 Ling Dynamic Systems Ltd. Web based user interface
US8838699B2 (en) * 2004-02-27 2014-09-16 International Business Machines Corporation Policy based provisioning of Web conferences
US7640288B2 (en) * 2004-03-15 2009-12-29 Microsoft Corporation Schema for location awareness
US7499998B2 (en) * 2004-12-01 2009-03-03 Cisco Technology, Inc. Arrangement in a server for providing dynamic domain name system services for each received request
US20060203815A1 (en) * 2005-03-10 2006-09-14 Alain Couillard Compliance verification and OSI layer 2 connection of device using said compliance verification
US7827593B2 (en) * 2005-06-29 2010-11-02 Intel Corporation Methods, apparatuses, and systems for the dynamic evaluation and delegation of network access control
WO2007062004A2 (en) * 2005-11-22 2007-05-31 The Trustees Of Columbia University In The City Of New York Methods, media, and devices for moving a connection from one point of access to another point of access
US20070143827A1 (en) * 2005-12-21 2007-06-21 Fiberlink Methods and systems for intelligently controlling access to computing resources
US8160062B2 (en) * 2006-01-31 2012-04-17 Microsoft Corporation Network connectivity determination based on passive analysis of connection-oriented path information
US7711800B2 (en) * 2006-01-31 2010-05-04 Microsoft Corporation Network connectivity determination
US8151322B2 (en) * 2006-05-16 2012-04-03 A10 Networks, Inc. Systems and methods for user access authentication based on network access point
US8024806B2 (en) * 2006-10-17 2011-09-20 Intel Corporation Method, apparatus and system for enabling a secure location-aware platform
US9137663B2 (en) * 2006-11-02 2015-09-15 Cisco Technology, Inc. Radio frequency firewall coordination
US20080163332A1 (en) * 2006-12-28 2008-07-03 Richard Hanson Selective secure database communications

Also Published As

Publication number Publication date
WO2010048031A2 (en) 2010-04-29
JP5535229B2 (ja) 2014-07-02
US20100107240A1 (en) 2010-04-29
EP2342672A4 (en) 2013-04-10
TW201106196A (en) 2011-02-16
JP2012507193A (ja) 2012-03-22
WO2010048031A3 (en) 2010-07-15
CN106850642A (zh) 2017-06-13
TWI497337B (zh) 2015-08-21
CN102197400A (zh) 2011-09-21
EP2342672A2 (en) 2011-07-13

Similar Documents

Publication Publication Date Title
AR076351A1 (es) Metodo de funcionamiento de un dispositivo cliente cuando se conecta a una red y su correspondiente sistema y dispositivo
AR073672A1 (es) Aparato de base de nodo-b y protocolos de seguridad
CO2018010965A2 (es) Sistemas y métodos para proteger dispositivos de red con un cortafuegos
CO2018009316A2 (es) Protección de los dispositivos de red por un cortafuegos
EP4221076A3 (en) Dynamic adaptive defense for cyber-security threats
BR112017020675A2 (pt) acordo de autenticação e chave com sigilo perfeito de emissão
BR112015030544A2 (pt) sistemas de autenticação eletrônica
WO2014059037A3 (en) Transaction security systems and methods
BR112012031924A2 (pt) método e equipamento para vincular autenticação de assinante e autenticação de dispositivo em sistemas de comunicação.
WO2014182727A3 (en) Selectively performing man in the middle decryption
WO2013184199A3 (en) Merchandise security device including strain relief block
ECSP15020350A (es) Selección de sistema dirigido por red por el uso de entrada de dispositivo inalámbrico
WO2013013189A3 (en) Security gateway communication
WO2015123611A3 (en) Systems and methods for providing network security using a secure digital device
WO2015012933A3 (en) Instant data security in un-trusted environments
ES2609457T3 (es) Procedimiento de acceso inverso para proteger aplicaciones de entrada y otras
BR112018071643A2 (pt) métodos e sistemas para detectar inteligentemente malware e ataques em dispositivos de computação de cliente e redes corporativas
WO2015050587A3 (en) Method and system for isolating secure communication events from a non-secure application
DOP2014000126A (es) Caja fuerte transportable
AR080690A1 (es) Operacion de un dispositivo de comunicacion movil
AR098379A1 (es) Método de verificación de seguridad de una aplicación, un servidor de aplicaciones, una aplicación cliente y un sistema
WO2013103640A3 (en) Methods and apparatuses for maintaining secure communication between a group of users in a social network
BR112012023977A2 (pt) método para proteger o acesso a dados ou serviços que são acessíveis por meio de um dispositivo implementando o método e o dispositivo correspondente
WO2014169030A3 (en) Near field communication security devices
WO2013072774A3 (en) Systems and methods for recovering low power devices

Legal Events

Date Code Title Description
FC Refusal
FG Grant, registration
FD Application declared void or lapsed, e.g., due to non-payment of fee