DE602005012466D1 - Verfahren, Vorrichtungen und Computersoftware zum Erlauben einer Kommunikation innerhalb eines virtuellen Netzwerks, wobei die Netzwerkkommunikation auf Grund von Sicherheitsrisiken beschränkt ist - Google Patents
Verfahren, Vorrichtungen und Computersoftware zum Erlauben einer Kommunikation innerhalb eines virtuellen Netzwerks, wobei die Netzwerkkommunikation auf Grund von Sicherheitsrisiken beschränkt istInfo
- Publication number
- DE602005012466D1 DE602005012466D1 DE602005012466T DE602005012466T DE602005012466D1 DE 602005012466 D1 DE602005012466 D1 DE 602005012466D1 DE 602005012466 T DE602005012466 T DE 602005012466T DE 602005012466 T DE602005012466 T DE 602005012466T DE 602005012466 D1 DE602005012466 D1 DE 602005012466D1
- Authority
- DE
- Germany
- Prior art keywords
- network
- security
- communication
- activities
- network device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/923,349 US7353390B2 (en) | 2004-08-20 | 2004-08-20 | Enabling network devices within a virtual network to communicate while the networks's communications are restricted due to security threats |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602005012466D1 true DE602005012466D1 (de) | 2009-03-12 |
Family
ID=35447203
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602005012466T Active DE602005012466D1 (de) | 2004-08-20 | 2005-08-18 | Verfahren, Vorrichtungen und Computersoftware zum Erlauben einer Kommunikation innerhalb eines virtuellen Netzwerks, wobei die Netzwerkkommunikation auf Grund von Sicherheitsrisiken beschränkt ist |
Country Status (7)
Country | Link |
---|---|
US (1) | US7353390B2 (de) |
EP (1) | EP1628455B1 (de) |
JP (1) | JP4684802B2 (de) |
KR (1) | KR101150123B1 (de) |
CN (1) | CN1783879B (de) |
AT (1) | ATE421827T1 (de) |
DE (1) | DE602005012466D1 (de) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US9118709B2 (en) * | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US8462808B2 (en) * | 2004-09-02 | 2013-06-11 | Brother Kogyo Kabushiki Kaisha | Information server and communication apparatus |
US7793338B1 (en) * | 2004-10-21 | 2010-09-07 | Mcafee, Inc. | System and method of network endpoint security |
US8245294B1 (en) * | 2004-11-23 | 2012-08-14 | Avaya, Inc. | Network based virus control |
JP2006262141A (ja) * | 2005-03-17 | 2006-09-28 | Fujitsu Ltd | Ipアドレス適用方法、vlan変更装置、vlan変更システム、および検疫処理システム |
WO2007030812A2 (en) * | 2005-09-09 | 2007-03-15 | Hoshiko, Llc | Network router mac-filtering |
US8528070B2 (en) * | 2007-09-05 | 2013-09-03 | Hewlett-Packard Development Company, L.P. | System and method for secure service delivery |
US8713450B2 (en) * | 2008-01-08 | 2014-04-29 | International Business Machines Corporation | Detecting patterns of abuse in a virtual environment |
US8312511B2 (en) * | 2008-03-12 | 2012-11-13 | International Business Machines Corporation | Methods, apparatus and articles of manufacture for imposing security measures in a virtual environment based on user profile information |
US20100262688A1 (en) * | 2009-01-21 | 2010-10-14 | Daniar Hussain | Systems, methods, and devices for detecting security vulnerabilities in ip networks |
US9344455B2 (en) * | 2014-07-30 | 2016-05-17 | Motorola Solutions, Inc. | Apparatus and method for sharing a hardware security module interface in a collaborative network |
US9526024B2 (en) * | 2014-08-07 | 2016-12-20 | At&T Intellectual Property I, L.P. | Personal virtual core networks |
US9609541B2 (en) | 2014-12-31 | 2017-03-28 | Motorola Solutions, Inc. | Method and apparatus for device collaboration via a hybrid network |
US10038671B2 (en) * | 2016-12-31 | 2018-07-31 | Fortinet, Inc. | Facilitating enforcement of security policies by and on behalf of a perimeter network security device by providing enhanced visibility into interior traffic flows |
US10517326B2 (en) * | 2017-01-27 | 2019-12-31 | Rai Strategic Holdings, Inc. | Secondary battery for an aerosol delivery device |
US10574654B1 (en) * | 2017-11-07 | 2020-02-25 | United Services Automobile Asociation (USAA) | Segmentation based network security |
CN109861961B (zh) * | 2017-11-30 | 2022-10-28 | 松下电器(美国)知识产权公司 | 网络防御装置以及网络防御系统 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3426832B2 (ja) * | 1996-01-26 | 2003-07-14 | 株式会社東芝 | ネットワークアクセス制御方法 |
US6158010A (en) | 1998-10-28 | 2000-12-05 | Crosslogix, Inc. | System and method for maintaining security in a distributed computer network |
AU2001265035A1 (en) | 2000-05-25 | 2001-12-03 | Thomas R Markham | Distributed firewall system and method |
US7181618B2 (en) * | 2001-01-12 | 2007-02-20 | Hewlett-Packard Development Company, L.P. | System and method for recovering a security profile of a computer system |
JP4052983B2 (ja) * | 2002-06-28 | 2008-02-27 | 沖電気工業株式会社 | 警戒システム及び広域ネットワーク防護システム |
FI20021802A (fi) | 2002-10-09 | 2004-04-10 | Tycho Technologies Oy | Hajautetun palomuurin hallinta |
US7743158B2 (en) | 2002-12-04 | 2010-06-22 | Ntt Docomo, Inc. | Access network dynamic firewall |
AU2003299729A1 (en) | 2002-12-18 | 2004-07-14 | Senforce Technologies, Inc. | Methods and apparatus for administration of policy based protection of data accessible by a mobile device |
JP2004234378A (ja) * | 2003-01-30 | 2004-08-19 | Fujitsu Ltd | セキュリティ管理装置及びセキュリティ管理方法 |
-
2004
- 2004-08-20 US US10/923,349 patent/US7353390B2/en active Active
-
2005
- 2005-08-18 EP EP05107587A patent/EP1628455B1/de active Active
- 2005-08-18 DE DE602005012466T patent/DE602005012466D1/de active Active
- 2005-08-18 AT AT05107587T patent/ATE421827T1/de not_active IP Right Cessation
- 2005-08-19 CN CN200510092730XA patent/CN1783879B/zh active Active
- 2005-08-19 KR KR1020050076191A patent/KR101150123B1/ko active IP Right Grant
- 2005-08-22 JP JP2005240059A patent/JP4684802B2/ja active Active
Also Published As
Publication number | Publication date |
---|---|
JP2006074760A (ja) | 2006-03-16 |
US7353390B2 (en) | 2008-04-01 |
CN1783879B (zh) | 2011-07-06 |
US20060041937A1 (en) | 2006-02-23 |
ATE421827T1 (de) | 2009-02-15 |
JP4684802B2 (ja) | 2011-05-18 |
KR20060053166A (ko) | 2006-05-19 |
EP1628455A1 (de) | 2006-02-22 |
EP1628455B1 (de) | 2009-01-21 |
CN1783879A (zh) | 2006-06-07 |
KR101150123B1 (ko) | 2012-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602005012466D1 (de) | Verfahren, Vorrichtungen und Computersoftware zum Erlauben einer Kommunikation innerhalb eines virtuellen Netzwerks, wobei die Netzwerkkommunikation auf Grund von Sicherheitsrisiken beschränkt ist | |
MY149417A (en) | System architecture and related methods for dynamically adding software components to extend functionality of system processes | |
WO2004062164A3 (en) | Methods and apparatus for managing secured software for a wireless device | |
ATE424688T1 (de) | System, verfahren und mobile vorrichtung zum management von drahtlosen verbindungen | |
CN103795745A (zh) | 一种智能移动终端的监控方法和系统 | |
PT1713228E (pt) | Servidor e método para comunicação por computador para realizar e administrar, automaticamente, uma comparação | |
GB0714756D0 (en) | Method, apparatus and system for interfering with distribution of protected content | |
ATE306689T1 (de) | Verfahren und anordnung zum schutz von software | |
DE69105024D1 (de) | System zum Bezahlen von Dienstleistungen per Telefon. | |
ATE549686T1 (de) | System und verfahren um mit einem arbeitsplatz- daten-manager auf netzwerk-daten zuzugreifen, sie zu manipulieren und sie zu synchronisieren | |
ATE550898T1 (de) | Verfahren und vorrichtung zum aktiven überwachen von persönlichen zellularen geräten und zur kontrolle des zugangs zu einem zellularen kommunikationsnetz in einer luftgestützten mobilplattform | |
ATE479138T1 (de) | Vorrichtung und verfahren für direktspeicherzugriff in einem speichersystem auf hub-basis | |
ATE536580T1 (de) | Verfahren zum kontrollieren des zugriffs auf gesicherte inhaltsdaten | |
ATE415658T1 (de) | Verfahren und vorrichtung zum schützen von systemdaten auf einer computerfestplatte | |
WO2006036959A3 (en) | Electronic computer system secured form unauthorized access to and manipulation of data | |
WO2004109470A3 (en) | System and method for distribution of software licenses in a networked computing environment | |
CN101950296A (zh) | 云数据审计的方法及系统 | |
DE60203277D1 (de) | Verfahren und system zur authentifizierung eines personal security device gegenüber mindestens einem fernrechnersystem | |
DE602004027492D1 (de) | System und verfahren zur überwachung von netzwerkeinrichtungen auf agent-basis | |
CN106127031A (zh) | 一种保护进程的方法、装置及电子设备 | |
DE60327919D1 (de) | Verfahren und Computerprogrammprodukt zur Überprüfung der Authentizität der in einer Anfrage von einem drahtlosen Gerät übermittelten Telefonnummer | |
CN106203092A (zh) | 一种拦截恶意程序关机的方法、装置及电子设备 | |
DE60312490D1 (de) | Verfahrensermöglichte vertragsbasierte verwaltung eines netzwerkbetriebsunterstützungssystems | |
ATE473479T1 (de) | Verfahren zum betreiben eines datenübertragungsnetzes unter verwendung von lizenzdaten und zugehöriger vorrichtungsverbund | |
ATE264530T1 (de) | Verfahren und vorrichtung zum computerunterstützten training in der verwendung von geräten mit betriebsmittelsteuerung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition |