[go: up one dir, main page]

WO2010099560A1 - Dispositif et procédé de surveillance de paquets de données - Google Patents

Dispositif et procédé de surveillance de paquets de données Download PDF

Info

Publication number
WO2010099560A1
WO2010099560A1 PCT/AU2009/000245 AU2009000245W WO2010099560A1 WO 2010099560 A1 WO2010099560 A1 WO 2010099560A1 AU 2009000245 W AU2009000245 W AU 2009000245W WO 2010099560 A1 WO2010099560 A1 WO 2010099560A1
Authority
WO
WIPO (PCT)
Prior art keywords
data packets
network
data packet
computerised device
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/AU2009/000245
Other languages
English (en)
Inventor
Adam Parnell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MORETONSOFT Pty Ltd
Original Assignee
MORETONSOFT Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MORETONSOFT Pty Ltd filed Critical MORETONSOFT Pty Ltd
Priority to PCT/AU2009/000245 priority Critical patent/WO2010099560A1/fr
Publication of WO2010099560A1 publication Critical patent/WO2010099560A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/024Standardisation; Integration using relational databases for representation of network management data, e.g. managing via structured query language [SQL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration

Definitions

  • This invention relates to communication and data networking equipment in particular but not limited to a computerised business method and device for monitoring data packets within a network, logging and reporting of data packets or the particulars thereof for use as a productivity tool to be used by both management and staff, and in the management of and compliance with an Acceptable Usage Policy.
  • the Internet is a necessary part of life and modern business in providing low-cost access to information. It is a highly effective means of communication and provides the ability to respond quickly to customer issues and competitor strategies. Indeed, few companies can remain competitive without involving the Internet in today's business environment.
  • the Internet is thus used for both work related and personal activities. Legitimate work related access such as research, networking and communication is often supplemented with personal activities such as 'surfing' and socialising, resulting in an overall decrease in productivity.
  • UK research found the average office worker does just 4 hours productive work a day, costing approximately £40 Billion per year (Daily Mail Online April 21, 2008). PandaLabs research estimated personal use of the Internet at one hour per day, accounting for an estimated £200 billion in lost productivity in 2005.
  • employers that do take steps to monitor Internet usage often take a heavy handed approach, such as blocking all access or firing employees detected accessing a forbidden' website. These employers often face a backlash from staff, resulting in an erosion of office morale. Employees are especially sensitive to the idea of a manager monitoring their minute-to-minute activities; however most accept that certain usage is not appropriate in an office context. An amicable balance can be struck between the employer and employee to create an Acceptable Use Policy to codify what Internet usage is acceptable and what is unacceptable in a work environment.
  • a firewall is a hardware or software solution which enforces preset security policies to prevent unauthorized electronic access to a PC or networked computer system.
  • a firewall When correctly configured, a firewall will only allow authorised packets of information through, while blocking all other packets based on a static set of rules or other pre-defined criteria.
  • Most home computer users are familiar with basic firewall software that is often pre-loaded on modern computers and the requests initiated by the software to allow or deny access to a program. Users are rarely educated regarding what should be allowed or blocked, or what a particular request relates to. Many users either automatically confirm access, potentially authorising a dangerous program, or alternatively deny access turning off useful features of programs or system processes. In a business context, such frequent reminders slow productivity in addressing the same security issues of a home system.
  • a web filter is a content filtering device or software which can be programmed to block access to particular websites that have been pre-identified on a 'blacklist' as likely to compromise security, or by only allowing pre-identified content with reference to a 'whitelisf. They often work by blocking or only allowing access based on individual IP addresses or address ranges. Some web filters also block specified applications, such as MSN Messenger or Skype, specified file types, such as .exe executable files, or a by comparative reference to a search list.
  • Blacklists of suspect sites usually grow at a similar rate, providing an exponential decrease in processing speed as each file is compared to the list in its entirety.
  • An average Internet user only visits approximately ten (10) to twenty (20) websites in any given day.
  • Web filters usually introduce unnecessary delays in network access to the Internet as they continually compare data content to 'blacklists', "whitelists', and / or banned keywords. Further, unacceptable content that is not found on a blacklist, for example websites not flagged as inappropriate, or not found on a poorly updated blacklist, will be allowed through. Similarly, acceptable content that is included on the blacklist, omitted from the whitelist, or some of the content is included in a banned keyword list will be blocked. Many businesses use a third party black / white //sf to save the time and expense of configuring their own list that is likely not flexible to their particular business needs.
  • firewalls and web filters have the potential to create employee resentment and erode staff morale if implemented harshly in the workplace. Further, they are technical blocking solutions, and to be effective the IT manager must know what to block and the device must accordingly be configured correctly. Incorrectly configured systems on the other hand, often build a false sense of security for the system or a false sense of trust in employees.
  • the invention resides in a computerised device for monitoring, logging and reporting of data packets detected within a network
  • data packet detection means or 'packet sniffer'
  • a physical controller adapted to store and retrieve data from a database and the data packet detection means
  • a database for storing the data packets or the particulars thereof
  • a database management system for logging and recording the data packets or the particulars thereof in conjunction with the data packet detection means, physical controller and database
  • a user interface adapted to give the user control over the database management system, the user interface further adapted to display output from the reporting means;
  • the device herein described is incorporated into a digital network environment, such as a small business or home network, and located between two network devices, such as a network router and external modem, wherein data packets from the first network device are monitored and recorded
  • the data packet detection means consist of one or more network devices, such as a commercially available Local Area Network card.
  • the data packet detection means monitors data packets passing along the network in both directions between the two network devices, for example, monitoring both upload and download network activity.
  • the data packet detection means monitors every data packet passing along the network between the two network devices.
  • the data packet detection means monitors data packets passing along the network between the two network devices in real time.
  • the data packet detection means in conjunction with the physical controller, only analyses a data packet's header layer or equivalent (for example an IP header) for the purposes of increasing processing speed, and preventing the storage of potentially private or privileged data contained in the body of the data packet.
  • a data packet's header layer or equivalent for example an IP header
  • the physical controller comprises in combination a central processing unit, random access memory and a motherboard.
  • the database comprises a physical non-volatile storage medium, such as a hard drive, and a logical relational database structure, such as a Comma Separated
  • the database management system is an open source database management system such as MySQL.
  • the database management system may apply logical rules to the database to deny further transmission of data packets based on set criteria, said criteria preferably based on an Acceptable Usage Policy.
  • the logical rules applied may deny further transmission of data packets on the basis of port number, effectively blocking internet access to a particular application.
  • the logical rules applied may deny further transmission of data packets on the basis of source or destination IP address, effectively blocking internet access to a particular server, website or user.
  • the logical rules are applied distinctly to different user configurations, to monitor, and preferably allow or block data packets applying a discrete set of logical rules for a particular user destination or source IP address.
  • the database management system preferably only stores information about data packets that are on-sent to a second network device to improve efficiency.
  • the report generation means incorporated into the database management system generates a report containing data accurate to the previous minute.
  • the report generation means incorporated into the database management system generates a report based on logical rules relating to specific particulars of the data within the database such as source or destination IP address, port number and or time the data packet was intercepted.
  • the user interface may allow for the configuration of different users of different access levels.
  • the user interface may allow restricted access for individual (non administrative) users to request reports and view the reports generated from their request or otherwise without the ability to modify the logical rules.
  • the user interface may allow for the implementation and application of various sets of logical rules with respect to different user configurations.
  • the user interface is accessible by a web browser, for example Microsoft
  • the user interface does not require a high standard of background or technical knowledge to utilise.
  • the reporting means may output a report for delivery to an email address.
  • the device further comprises a network bypass, such that the device will not restrict data packet flow through the network in the event of a power failure.
  • the invention resides in a computerised business method for monitoring data packets within a network, utilising the computerised device substantially as herein described, the method comprising the steps of, installation and configuration of the said computerised device for monitoring data packets within the network, analysis of data packets detected, and generation of reports regarding the data packets detected, wherein the reports assist in the creation of an Acceptable Usage Policy, and in the on going maintenance and revision of the Acceptable Usage Policy, and in enforcing compliance with the Acceptable Usage Policy by identification of Internet misuse by users.
  • the above method may be used to assist in enforcing compliance with an Acceptable Usage Policy by the additional step of configuring the device to block the transmission of specific data packets in accordance with applied logical rules, for example blocking all data packets addressed to and from the IP address of a website (for example www.facebook.com) deemed unacceptable by the Acceptable Usage Policy.
  • logical rules for example blocking all data packets addressed to and from the IP address of a website (for example www.facebook.com) deemed unacceptable by the Acceptable Usage Policy.
  • the above method may include the additional step of individual users generating reports and monitoring their own Internet usage in self-compliance with an
  • an Acceptable Usage Policy is clearly expressed to the user prior to enforcement, and suitably adapted to the unique individual situation tailored with regard to usage information generated by the device herein described.
  • an Acceptable Usage Policy may define between what hours internet usage is allowed, or what web-sites are not permissible, said policy to be enforced by blocking data based on logical rules, such as blocking specific applications by port number, or IP addresses within a defined time period.
  • Figure 1 shows a diagram of the architecture of the computerised device according to the invention.
  • Figure 2 shows a diagram of the device of Figure 1 in use depicting data packet flow within a local area network.
  • FIG. 1 there is shown a diagram of a preferred architecture of the computerised device for monitoring, logging and reporting of data packets within a network according to invention.
  • the data packet detection means (14) will monitor data packet flow (12) in both directions as shown.
  • the physical controller (16) in association with the database (here depicted incorporated with the physical controller 16) processes the data gathered from the data packet detection means by applying the Logical Layer (20).
  • the Logical or Business Logic Layer (20) there is shown the logical business engine (22), where logical rules are applied and processed, and the user interface (24), where a user may interact with the logical business engine.
  • the core of the logical business engine is the Database Management System (DBMS) (26).
  • the DBMS determines the logical process applied by the physical controller to processes data.
  • the DBMS on a logical level organises and retrieves data in the database for comparison, processing or storage.
  • Logical rules are applied to the DBMS to be carried out by the physical controller (16) to determine what data is monitored and in a preferred example, blocked or allowed. If the DBMS instructs that a data packet be blocked, the data packet will not be forwarded to the second network device (not shown).
  • instructions may be applied directly (28) from the user interface (24) to the physical controller (16).
  • the reporting means may process a query to extract particular data from the database, to be expressed in a logical form (such as comma separated value data), and output to the user interface.
  • a query may be generated from logical rules defined in the DBMS, or by instruction from the user interface.
  • a logical rule may output a report every hour containing the particulars of data flow over the previous hour.
  • a user may, through the user interface, request a report of number of times a particular IP address was accessed over the previous week.
  • the user interface (24) includes the output from the reporting means (30), an interface for setting logical rules (32) to be applied to the DBMS or physical controller, and where appropriate output from a logical rule (34).
  • the user interface may take any appropriate form, including an email to a specific address, a web page, or client side application.
  • reports generated (30) may be analysed to assist in the creation, maintenance and enforcement of an Acceptable Usage Policy.
  • the Acceptable Usage Policy will define at a business level what constitutes acceptable usage, to be applied to the device as logical rules through the user interface (24, specifically 32).
  • a data packet will be monitored from the data packet flow (12) by the data packet detection means (14).
  • the physical controller (16) will analyse the particulars of the data packet and compare them, using the logical DBMS (26), to existing logical rules. If the data packet meets the criteria set according to those rules, the particulars of the data packet will be logged in the database and the data packet will proceed onto the second network device (not shown). Preferably, if the data packet does not meets the criteria set according to those rules, the particulars of the data packet will be logged in the database and the data packet will be terminated, that is it will not proceed onto the second network device. Preferably where applicable in such a situation, notification (36) of this will be sent to the user interface or first network device, for example instructions to display a 'blocked content' web page.
  • FIG. 2 there is shown a diagram of a preferred example of a computerised device and method for monitoring, logging and reporting of data packets within a network according to invention, in use within a network.
  • the diagram depicts the device of invention (2) incorporated into an internal network (38) between a first network device (4, 6) and a second network device (Q, 4).
  • Data packet flow (12), or network traffic through the network is depicted in this preferred example to show all network traffic between the internal network (38) and the external network, or Internet (8) processed through the device of invention (2).
  • the network traffic (12) is analysed by the device utilising the process described above.
  • the DBMS (26) will only log and store particulars of data packets that are allowed (40) by the logical rules with the aim of improving efficiency. Further in this preferred example, data packets that are blocked (42) will not proceed through the device to the second network device (6, 4) and notification of such
  • the diagram further depicts an example report (30) of output from the reporting means. In use such a report may be used according to the method described herein to assist in the creation, maintenance and enforcement of an Acceptable Usage Policy.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un procédé et un dispositif professionnels informatisés pour surveiller des paquets de données dans un réseau, enregistrer et rapporter un paquet de données ou les particularités de celui-ci pour une utilisation en tant qu'outil de productivité à utiliser à la fois par la direction et le personnel, et pour la gestion d'une politique d'utilisation acceptable et la mise en conformité avec cette politique. Le dispositif informatisé comprend des moyens de détection de paquet de données (ou un « renifleur de paquets »), un contrôleur physique, une base de données, un système de gestion de base de données, des moyens de rapport et une interface utilisateur. Lors de l'utilisation, le dispositif est incorporé dans un environnement de réseau numérique entre deux dispositifs en réseau, les paquets de données provenant du premier dispositif en réseau étant surveillés et enregistrés par les moyens de détection de paquet de données, et acheminés vers le deuxième dispositif en réseau. De plus, il existe un procédé professionnel informatisé qui utilise le dispositif ci-dessus pour aider à la création, la maintenance et la mise en application d'une politique d'utilisation acceptable.
PCT/AU2009/000245 2009-03-03 2009-03-03 Dispositif et procédé de surveillance de paquets de données Ceased WO2010099560A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/AU2009/000245 WO2010099560A1 (fr) 2009-03-03 2009-03-03 Dispositif et procédé de surveillance de paquets de données

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/AU2009/000245 WO2010099560A1 (fr) 2009-03-03 2009-03-03 Dispositif et procédé de surveillance de paquets de données

Publications (1)

Publication Number Publication Date
WO2010099560A1 true WO2010099560A1 (fr) 2010-09-10

Family

ID=42709134

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2009/000245 Ceased WO2010099560A1 (fr) 2009-03-03 2009-03-03 Dispositif et procédé de surveillance de paquets de données

Country Status (1)

Country Link
WO (1) WO2010099560A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9191523B1 (en) 2014-04-28 2015-11-17 Tangoe, Inc. Cost allocation for derived data usage
RU2591050C2 (ru) * 2013-10-31 2016-07-10 Федеральное государственное казенное военное образовательное учреждение высшего профессионального образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации Способ функционального поражения информационно-технических средств
US9584672B2 (en) 2014-04-28 2017-02-28 Tangoe, Inc. Cost allocation for derived data usage
US9773121B2 (en) 2015-09-24 2017-09-26 Tangoe, Inc. Security application for data security formatting, tagging and control
US10819861B2 (en) 2014-04-28 2020-10-27 Tangoe Us, Inc. Real-time usage detection of software applications
US10931543B2 (en) 2014-04-28 2021-02-23 Tangoe Us, Inc. Data usage analysis and reporting
RU2788377C1 (ru) * 2022-07-11 2023-01-18 Федеральное государственное казенное военное образовательное учреждение высшего образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации Способ воздействия на информационно-технические средства радиосвязи
US20230028585A1 (en) * 2011-03-18 2023-01-26 Zscaler, Inc. Mobile device security, device management, and policy enforcement in a cloud-based system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998040987A1 (fr) * 1997-03-11 1998-09-17 Sequel Technology Corporation Procede et appareil de gestion de l'activite interreseau et intrareseau
WO2002023805A2 (fr) * 2000-09-13 2002-03-21 Karakoram Limited Surveillance de l'activite d'un reseau
WO2002057935A1 (fr) * 2001-01-16 2002-07-25 Captus Networks Corporation Procede et dispositif de surveillance de trafic de donnees et de prevention d'acces non autorise a un reseau
US20040111507A1 (en) * 2002-12-05 2004-06-10 Michael Villado Method and system for monitoring network communications in real-time
US20050198252A1 (en) * 1998-08-26 2005-09-08 Sts Systems Ltd. Communication management system for computer network-based telephones

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998040987A1 (fr) * 1997-03-11 1998-09-17 Sequel Technology Corporation Procede et appareil de gestion de l'activite interreseau et intrareseau
US20050198252A1 (en) * 1998-08-26 2005-09-08 Sts Systems Ltd. Communication management system for computer network-based telephones
WO2002023805A2 (fr) * 2000-09-13 2002-03-21 Karakoram Limited Surveillance de l'activite d'un reseau
WO2002057935A1 (fr) * 2001-01-16 2002-07-25 Captus Networks Corporation Procede et dispositif de surveillance de trafic de donnees et de prevention d'acces non autorise a un reseau
US20040111507A1 (en) * 2002-12-05 2004-06-10 Michael Villado Method and system for monitoring network communications in real-time

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Network Bypass Targets Appliance OEMs", ELECTRONICSTALK, 14 March 2008 (2008-03-14), Retrieved from the Internet <URL:http://www.electronicstalk.com/news/iei/iei101.html> [retrieved on 20090609] *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230028585A1 (en) * 2011-03-18 2023-01-26 Zscaler, Inc. Mobile device security, device management, and policy enforcement in a cloud-based system
US11716359B2 (en) * 2011-03-18 2023-08-01 Zscaler, Inc. Mobile device security, device management, and policy enforcement in a cloud-based system
RU2591050C2 (ru) * 2013-10-31 2016-07-10 Федеральное государственное казенное военное образовательное учреждение высшего профессионального образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации Способ функционального поражения информационно-технических средств
US9584672B2 (en) 2014-04-28 2017-02-28 Tangoe, Inc. Cost allocation for derived data usage
US11916760B2 (en) 2014-04-28 2024-02-27 Tangoe, Inc. Data usage analysis and reporting
US9948790B2 (en) 2014-04-28 2018-04-17 Tangoe, Inc. Cost allocation for derived data usage
US10264139B2 (en) 2014-04-28 2019-04-16 Tangoe Us, Inc. Cost allocation for derived data usage
US9191523B1 (en) 2014-04-28 2015-11-17 Tangoe, Inc. Cost allocation for derived data usage
US10819861B2 (en) 2014-04-28 2020-10-27 Tangoe Us, Inc. Real-time usage detection of software applications
US10931543B2 (en) 2014-04-28 2021-02-23 Tangoe Us, Inc. Data usage analysis and reporting
US11622047B2 (en) 2014-04-28 2023-04-04 Tangoe Us, Inc. Real-time usage detection of software applications
US10482277B2 (en) 2015-09-24 2019-11-19 Tangoe Us, Inc. Security application for data security formatting, tagging and control
US11372994B2 (en) 2015-09-24 2022-06-28 Tangoe Us, Inc. Security application for data security formatting, tagging and control
US9773121B2 (en) 2015-09-24 2017-09-26 Tangoe, Inc. Security application for data security formatting, tagging and control
RU2788377C1 (ru) * 2022-07-11 2023-01-18 Федеральное государственное казенное военное образовательное учреждение высшего образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации Способ воздействия на информационно-технические средства радиосвязи

Similar Documents

Publication Publication Date Title
US12314396B2 (en) Systems and methods for providing security services during power management mode
US20230216869A1 (en) Method and system for detecting restricted content associated with retrieved content
US20210084063A1 (en) Insider threat management
US20220159015A1 (en) System and method for providing data and device security between external and host devices
EP2837131B1 (fr) Système et procédé permettant de déterminer et d&#39;utiliser la réputation locale d&#39;utilisateurs et d&#39;hôtes pour protéger des informations dans un environnement de réseau
RU2510982C2 (ru) Система и способ оценки пользователей для фильтрации сообщений
CN107395570B (zh) 基于大数据管理分析的云平台审计系统
US20080282338A1 (en) System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network
US20090247125A1 (en) Method and system for controlling access of computer resources of mobile client facilities
US20090172772A1 (en) Method and system for processing security data of a computer network
WO2010099560A1 (fr) Dispositif et procédé de surveillance de paquets de données
Parsons Deep packet inspection and its predecessors
Mohtasebi et al. A mitigation approach to the privacy and malware threats of social network services
US12126633B2 (en) Administration of electronic mail unsubscribe links
Soghoian The spies we trust: Third party service providers and law enforcement surveillance
Joachim et al. The enforcers—The University of Florida’s ICARUS P2P-blocking software has clipped students’ file-sharing wings. Do its policy-enforcing capabilities go too far
Urbaczewski Monitoring Strategies for Internet Technologies
Licari Protecting the information workplace
Guynes et al. Privacy and security
US20080148385A1 (en) Sectionalized Terminal System And Method
Co-Exist Employee Monitoring and Ethics
Harsha Overview on Developing Better Ways of Protecting Users while Respecting the SNS Business Model
Carmo Effects of Network Quality of Service on Workplace Productivity

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09840958

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09840958

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 17-11-2011)

122 Ep: pct application non-entry in european phase

Ref document number: 09840958

Country of ref document: EP

Kind code of ref document: A1