WO2008108132A1 - Network utilization control system, network utilization control method, recording medium, and program - Google Patents
Network utilization control system, network utilization control method, recording medium, and program Download PDFInfo
- Publication number
- WO2008108132A1 WO2008108132A1 PCT/JP2008/051775 JP2008051775W WO2008108132A1 WO 2008108132 A1 WO2008108132 A1 WO 2008108132A1 JP 2008051775 W JP2008051775 W JP 2008051775W WO 2008108132 A1 WO2008108132 A1 WO 2008108132A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- terminal
- network utilization
- utilization control
- networks
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
In a terminal capable of utilizing a plurality of networks, a leakage of the information between the networks is prevented. The terminal, upon acquiring data from the networks, extracts a data attribute such as a hash value, size, a magic number, or the presence or absence of encryption and stores it in the terminal. Subsequently, when an application attempts to access another network to transmit some sort of data, the terminal extracts the characteristics of the data and compares them with the data attributes stored so far. If there is no matching among them, the terminal permits the transmission of the data. If there is any matching, the terminal permits or inhibits the transmission according to the content of the data control policy that the terminal holds. The data control policy describes the data attributes and a policy for judging whether to permit or inhibit the transmission/reception of the data matching the data attributes.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2007056706 | 2007-03-07 | ||
| JP2007-056706 | 2007-03-07 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008108132A1 true WO2008108132A1 (en) | 2008-09-12 |
Family
ID=39738029
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2008/051775 Ceased WO2008108132A1 (en) | 2007-03-07 | 2008-02-04 | Network utilization control system, network utilization control method, recording medium, and program |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2008108132A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2010123112A (en) * | 2008-10-22 | 2010-06-03 | Hitachi Software Eng Co Ltd | Content authorization device |
| WO2017216906A1 (en) * | 2016-06-15 | 2017-12-21 | 三菱電機株式会社 | Security monitoring device, communication system, security monitoring method, and security monitoring program |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001005757A (en) * | 1999-06-23 | 2001-01-12 | Hitachi Ltd | Data filtering system using digital watermark |
| JP2001078167A (en) * | 1999-09-08 | 2001-03-23 | Sony Corp | Communication system, communication method, receiving terminal device, certificate authority device |
| JP2006031578A (en) * | 2004-07-21 | 2006-02-02 | Nippon Telegr & Teleph Corp <Ntt> | Personal information disclosure method and system |
| WO2006051899A1 (en) * | 2004-11-11 | 2006-05-18 | Nec Corporation | Data processing system and method, and data processing device |
| JP2006344156A (en) * | 2005-06-10 | 2006-12-21 | Nec Corp | Personal information distribution management system, personal information distribution management method, personal information provision program, and personal information utilization program |
-
2008
- 2008-02-04 WO PCT/JP2008/051775 patent/WO2008108132A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2001005757A (en) * | 1999-06-23 | 2001-01-12 | Hitachi Ltd | Data filtering system using digital watermark |
| JP2001078167A (en) * | 1999-09-08 | 2001-03-23 | Sony Corp | Communication system, communication method, receiving terminal device, certificate authority device |
| JP2006031578A (en) * | 2004-07-21 | 2006-02-02 | Nippon Telegr & Teleph Corp <Ntt> | Personal information disclosure method and system |
| WO2006051899A1 (en) * | 2004-11-11 | 2006-05-18 | Nec Corporation | Data processing system and method, and data processing device |
| JP2006344156A (en) * | 2005-06-10 | 2006-12-21 | Nec Corp | Personal information distribution management system, personal information distribution management method, personal information provision program, and personal information utilization program |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2010123112A (en) * | 2008-10-22 | 2010-06-03 | Hitachi Software Eng Co Ltd | Content authorization device |
| WO2017216906A1 (en) * | 2016-06-15 | 2017-12-21 | 三菱電機株式会社 | Security monitoring device, communication system, security monitoring method, and security monitoring program |
| JPWO2017216906A1 (en) * | 2016-06-15 | 2018-09-20 | 三菱電機株式会社 | Security monitoring device, communication system, security monitoring method, and security monitoring program |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10181043B1 (en) | Method and apparatus for cookie validation and scoring | |
| EP3251293A1 (en) | Secure dynamic communication network and protocol | |
| WO2008047223A3 (en) | Access control for a mobile server in a communication system | |
| US11876827B2 (en) | Multiple sourced classification | |
| WO2007084973A3 (en) | Network security system and method | |
| CN105210042A (en) | Internet protocol threat prevention | |
| WO2005017655A3 (en) | System and methods for providing increases computer security | |
| WO2010006112A3 (en) | Secure high performance multi-level security database systems and methods | |
| US20170244759A1 (en) | Policy-Managed Secure Code Execution and Messaging for Computing Devices and Computing Device Security. | |
| US9491625B2 (en) | Access point apparatus for configuring multiple security tunnel, and system having the same and method thereof | |
| US9544376B1 (en) | Method and apparatus for securely discovering services in a wireless network | |
| WO2008097780A3 (en) | System and method for adding context to prevent data leakage over a computer network | |
| US10187428B2 (en) | Identifying data usage via active data | |
| Everett | Social media: opportunity or risk? | |
| CA2579909A1 (en) | System and method for determining a security encoding to be applied to outgoing messages | |
| Bu et al. | Approaching the time lower bound on cloned-tag identification for large RFID systems | |
| US11621950B2 (en) | Data processing methods, servers, client devices and media for security authentication | |
| US20150296052A1 (en) | Method for incorporating network port hopping with minimal or no impact to underlying systems | |
| WO2008108132A1 (en) | Network utilization control system, network utilization control method, recording medium, and program | |
| US8239548B2 (en) | Endpoint discriminator in network transport protocol startup packets | |
| Atlam et al. | Role of Blockchain and AI in Security and Privacy of 6G | |
| Rehman et al. | An overview of radio frequency fingerprinting for low-end devices | |
| Wang et al. | A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent | |
| Liang et al. | Towards robust and stealthy communication for wireless intelligent terminals | |
| CN102045361A (en) | Network security processing method and wireless communications device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08710754 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| NENP | Non-entry into the national phase |
Ref country code: JP |