WO2010099560A1 - Dispositif et procédé de surveillance de paquets de données - Google Patents
Dispositif et procédé de surveillance de paquets de données Download PDFInfo
- Publication number
- WO2010099560A1 WO2010099560A1 PCT/AU2009/000245 AU2009000245W WO2010099560A1 WO 2010099560 A1 WO2010099560 A1 WO 2010099560A1 AU 2009000245 W AU2009000245 W AU 2009000245W WO 2010099560 A1 WO2010099560 A1 WO 2010099560A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data packets
- network
- data packet
- computerised device
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/024—Standardisation; Integration using relational databases for representation of network management data, e.g. managing via structured query language [SQL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
Definitions
- This invention relates to communication and data networking equipment in particular but not limited to a computerised business method and device for monitoring data packets within a network, logging and reporting of data packets or the particulars thereof for use as a productivity tool to be used by both management and staff, and in the management of and compliance with an Acceptable Usage Policy.
- the Internet is a necessary part of life and modern business in providing low-cost access to information. It is a highly effective means of communication and provides the ability to respond quickly to customer issues and competitor strategies. Indeed, few companies can remain competitive without involving the Internet in today's business environment.
- the Internet is thus used for both work related and personal activities. Legitimate work related access such as research, networking and communication is often supplemented with personal activities such as 'surfing' and socialising, resulting in an overall decrease in productivity.
- UK research found the average office worker does just 4 hours productive work a day, costing approximately £40 Billion per year (Daily Mail Online April 21, 2008). PandaLabs research estimated personal use of the Internet at one hour per day, accounting for an estimated £200 billion in lost productivity in 2005.
- employers that do take steps to monitor Internet usage often take a heavy handed approach, such as blocking all access or firing employees detected accessing a forbidden' website. These employers often face a backlash from staff, resulting in an erosion of office morale. Employees are especially sensitive to the idea of a manager monitoring their minute-to-minute activities; however most accept that certain usage is not appropriate in an office context. An amicable balance can be struck between the employer and employee to create an Acceptable Use Policy to codify what Internet usage is acceptable and what is unacceptable in a work environment.
- a firewall is a hardware or software solution which enforces preset security policies to prevent unauthorized electronic access to a PC or networked computer system.
- a firewall When correctly configured, a firewall will only allow authorised packets of information through, while blocking all other packets based on a static set of rules or other pre-defined criteria.
- Most home computer users are familiar with basic firewall software that is often pre-loaded on modern computers and the requests initiated by the software to allow or deny access to a program. Users are rarely educated regarding what should be allowed or blocked, or what a particular request relates to. Many users either automatically confirm access, potentially authorising a dangerous program, or alternatively deny access turning off useful features of programs or system processes. In a business context, such frequent reminders slow productivity in addressing the same security issues of a home system.
- a web filter is a content filtering device or software which can be programmed to block access to particular websites that have been pre-identified on a 'blacklist' as likely to compromise security, or by only allowing pre-identified content with reference to a 'whitelisf. They often work by blocking or only allowing access based on individual IP addresses or address ranges. Some web filters also block specified applications, such as MSN Messenger or Skype, specified file types, such as .exe executable files, or a by comparative reference to a search list.
- Blacklists of suspect sites usually grow at a similar rate, providing an exponential decrease in processing speed as each file is compared to the list in its entirety.
- An average Internet user only visits approximately ten (10) to twenty (20) websites in any given day.
- Web filters usually introduce unnecessary delays in network access to the Internet as they continually compare data content to 'blacklists', "whitelists', and / or banned keywords. Further, unacceptable content that is not found on a blacklist, for example websites not flagged as inappropriate, or not found on a poorly updated blacklist, will be allowed through. Similarly, acceptable content that is included on the blacklist, omitted from the whitelist, or some of the content is included in a banned keyword list will be blocked. Many businesses use a third party black / white //sf to save the time and expense of configuring their own list that is likely not flexible to their particular business needs.
- firewalls and web filters have the potential to create employee resentment and erode staff morale if implemented harshly in the workplace. Further, they are technical blocking solutions, and to be effective the IT manager must know what to block and the device must accordingly be configured correctly. Incorrectly configured systems on the other hand, often build a false sense of security for the system or a false sense of trust in employees.
- the invention resides in a computerised device for monitoring, logging and reporting of data packets detected within a network
- data packet detection means or 'packet sniffer'
- a physical controller adapted to store and retrieve data from a database and the data packet detection means
- a database for storing the data packets or the particulars thereof
- a database management system for logging and recording the data packets or the particulars thereof in conjunction with the data packet detection means, physical controller and database
- a user interface adapted to give the user control over the database management system, the user interface further adapted to display output from the reporting means;
- the device herein described is incorporated into a digital network environment, such as a small business or home network, and located between two network devices, such as a network router and external modem, wherein data packets from the first network device are monitored and recorded
- the data packet detection means consist of one or more network devices, such as a commercially available Local Area Network card.
- the data packet detection means monitors data packets passing along the network in both directions between the two network devices, for example, monitoring both upload and download network activity.
- the data packet detection means monitors every data packet passing along the network between the two network devices.
- the data packet detection means monitors data packets passing along the network between the two network devices in real time.
- the data packet detection means in conjunction with the physical controller, only analyses a data packet's header layer or equivalent (for example an IP header) for the purposes of increasing processing speed, and preventing the storage of potentially private or privileged data contained in the body of the data packet.
- a data packet's header layer or equivalent for example an IP header
- the physical controller comprises in combination a central processing unit, random access memory and a motherboard.
- the database comprises a physical non-volatile storage medium, such as a hard drive, and a logical relational database structure, such as a Comma Separated
- the database management system is an open source database management system such as MySQL.
- the database management system may apply logical rules to the database to deny further transmission of data packets based on set criteria, said criteria preferably based on an Acceptable Usage Policy.
- the logical rules applied may deny further transmission of data packets on the basis of port number, effectively blocking internet access to a particular application.
- the logical rules applied may deny further transmission of data packets on the basis of source or destination IP address, effectively blocking internet access to a particular server, website or user.
- the logical rules are applied distinctly to different user configurations, to monitor, and preferably allow or block data packets applying a discrete set of logical rules for a particular user destination or source IP address.
- the database management system preferably only stores information about data packets that are on-sent to a second network device to improve efficiency.
- the report generation means incorporated into the database management system generates a report containing data accurate to the previous minute.
- the report generation means incorporated into the database management system generates a report based on logical rules relating to specific particulars of the data within the database such as source or destination IP address, port number and or time the data packet was intercepted.
- the user interface may allow for the configuration of different users of different access levels.
- the user interface may allow restricted access for individual (non administrative) users to request reports and view the reports generated from their request or otherwise without the ability to modify the logical rules.
- the user interface may allow for the implementation and application of various sets of logical rules with respect to different user configurations.
- the user interface is accessible by a web browser, for example Microsoft
- the user interface does not require a high standard of background or technical knowledge to utilise.
- the reporting means may output a report for delivery to an email address.
- the device further comprises a network bypass, such that the device will not restrict data packet flow through the network in the event of a power failure.
- the invention resides in a computerised business method for monitoring data packets within a network, utilising the computerised device substantially as herein described, the method comprising the steps of, installation and configuration of the said computerised device for monitoring data packets within the network, analysis of data packets detected, and generation of reports regarding the data packets detected, wherein the reports assist in the creation of an Acceptable Usage Policy, and in the on going maintenance and revision of the Acceptable Usage Policy, and in enforcing compliance with the Acceptable Usage Policy by identification of Internet misuse by users.
- the above method may be used to assist in enforcing compliance with an Acceptable Usage Policy by the additional step of configuring the device to block the transmission of specific data packets in accordance with applied logical rules, for example blocking all data packets addressed to and from the IP address of a website (for example www.facebook.com) deemed unacceptable by the Acceptable Usage Policy.
- logical rules for example blocking all data packets addressed to and from the IP address of a website (for example www.facebook.com) deemed unacceptable by the Acceptable Usage Policy.
- the above method may include the additional step of individual users generating reports and monitoring their own Internet usage in self-compliance with an
- an Acceptable Usage Policy is clearly expressed to the user prior to enforcement, and suitably adapted to the unique individual situation tailored with regard to usage information generated by the device herein described.
- an Acceptable Usage Policy may define between what hours internet usage is allowed, or what web-sites are not permissible, said policy to be enforced by blocking data based on logical rules, such as blocking specific applications by port number, or IP addresses within a defined time period.
- Figure 1 shows a diagram of the architecture of the computerised device according to the invention.
- Figure 2 shows a diagram of the device of Figure 1 in use depicting data packet flow within a local area network.
- FIG. 1 there is shown a diagram of a preferred architecture of the computerised device for monitoring, logging and reporting of data packets within a network according to invention.
- the data packet detection means (14) will monitor data packet flow (12) in both directions as shown.
- the physical controller (16) in association with the database (here depicted incorporated with the physical controller 16) processes the data gathered from the data packet detection means by applying the Logical Layer (20).
- the Logical or Business Logic Layer (20) there is shown the logical business engine (22), where logical rules are applied and processed, and the user interface (24), where a user may interact with the logical business engine.
- the core of the logical business engine is the Database Management System (DBMS) (26).
- the DBMS determines the logical process applied by the physical controller to processes data.
- the DBMS on a logical level organises and retrieves data in the database for comparison, processing or storage.
- Logical rules are applied to the DBMS to be carried out by the physical controller (16) to determine what data is monitored and in a preferred example, blocked or allowed. If the DBMS instructs that a data packet be blocked, the data packet will not be forwarded to the second network device (not shown).
- instructions may be applied directly (28) from the user interface (24) to the physical controller (16).
- the reporting means may process a query to extract particular data from the database, to be expressed in a logical form (such as comma separated value data), and output to the user interface.
- a query may be generated from logical rules defined in the DBMS, or by instruction from the user interface.
- a logical rule may output a report every hour containing the particulars of data flow over the previous hour.
- a user may, through the user interface, request a report of number of times a particular IP address was accessed over the previous week.
- the user interface (24) includes the output from the reporting means (30), an interface for setting logical rules (32) to be applied to the DBMS or physical controller, and where appropriate output from a logical rule (34).
- the user interface may take any appropriate form, including an email to a specific address, a web page, or client side application.
- reports generated (30) may be analysed to assist in the creation, maintenance and enforcement of an Acceptable Usage Policy.
- the Acceptable Usage Policy will define at a business level what constitutes acceptable usage, to be applied to the device as logical rules through the user interface (24, specifically 32).
- a data packet will be monitored from the data packet flow (12) by the data packet detection means (14).
- the physical controller (16) will analyse the particulars of the data packet and compare them, using the logical DBMS (26), to existing logical rules. If the data packet meets the criteria set according to those rules, the particulars of the data packet will be logged in the database and the data packet will proceed onto the second network device (not shown). Preferably, if the data packet does not meets the criteria set according to those rules, the particulars of the data packet will be logged in the database and the data packet will be terminated, that is it will not proceed onto the second network device. Preferably where applicable in such a situation, notification (36) of this will be sent to the user interface or first network device, for example instructions to display a 'blocked content' web page.
- FIG. 2 there is shown a diagram of a preferred example of a computerised device and method for monitoring, logging and reporting of data packets within a network according to invention, in use within a network.
- the diagram depicts the device of invention (2) incorporated into an internal network (38) between a first network device (4, 6) and a second network device (Q, 4).
- Data packet flow (12), or network traffic through the network is depicted in this preferred example to show all network traffic between the internal network (38) and the external network, or Internet (8) processed through the device of invention (2).
- the network traffic (12) is analysed by the device utilising the process described above.
- the DBMS (26) will only log and store particulars of data packets that are allowed (40) by the logical rules with the aim of improving efficiency. Further in this preferred example, data packets that are blocked (42) will not proceed through the device to the second network device (6, 4) and notification of such
- the diagram further depicts an example report (30) of output from the reporting means. In use such a report may be used according to the method described herein to assist in the creation, maintenance and enforcement of an Acceptable Usage Policy.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/AU2009/000245 WO2010099560A1 (fr) | 2009-03-03 | 2009-03-03 | Dispositif et procédé de surveillance de paquets de données |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/AU2009/000245 WO2010099560A1 (fr) | 2009-03-03 | 2009-03-03 | Dispositif et procédé de surveillance de paquets de données |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2010099560A1 true WO2010099560A1 (fr) | 2010-09-10 |
Family
ID=42709134
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/AU2009/000245 Ceased WO2010099560A1 (fr) | 2009-03-03 | 2009-03-03 | Dispositif et procédé de surveillance de paquets de données |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2010099560A1 (fr) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9191523B1 (en) | 2014-04-28 | 2015-11-17 | Tangoe, Inc. | Cost allocation for derived data usage |
| RU2591050C2 (ru) * | 2013-10-31 | 2016-07-10 | Федеральное государственное казенное военное образовательное учреждение высшего профессионального образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации | Способ функционального поражения информационно-технических средств |
| US9584672B2 (en) | 2014-04-28 | 2017-02-28 | Tangoe, Inc. | Cost allocation for derived data usage |
| US9773121B2 (en) | 2015-09-24 | 2017-09-26 | Tangoe, Inc. | Security application for data security formatting, tagging and control |
| US10819861B2 (en) | 2014-04-28 | 2020-10-27 | Tangoe Us, Inc. | Real-time usage detection of software applications |
| US10931543B2 (en) | 2014-04-28 | 2021-02-23 | Tangoe Us, Inc. | Data usage analysis and reporting |
| RU2788377C1 (ru) * | 2022-07-11 | 2023-01-18 | Федеральное государственное казенное военное образовательное учреждение высшего образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации | Способ воздействия на информационно-технические средства радиосвязи |
| US20230028585A1 (en) * | 2011-03-18 | 2023-01-26 | Zscaler, Inc. | Mobile device security, device management, and policy enforcement in a cloud-based system |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1998040987A1 (fr) * | 1997-03-11 | 1998-09-17 | Sequel Technology Corporation | Procede et appareil de gestion de l'activite interreseau et intrareseau |
| WO2002023805A2 (fr) * | 2000-09-13 | 2002-03-21 | Karakoram Limited | Surveillance de l'activite d'un reseau |
| WO2002057935A1 (fr) * | 2001-01-16 | 2002-07-25 | Captus Networks Corporation | Procede et dispositif de surveillance de trafic de donnees et de prevention d'acces non autorise a un reseau |
| US20040111507A1 (en) * | 2002-12-05 | 2004-06-10 | Michael Villado | Method and system for monitoring network communications in real-time |
| US20050198252A1 (en) * | 1998-08-26 | 2005-09-08 | Sts Systems Ltd. | Communication management system for computer network-based telephones |
-
2009
- 2009-03-03 WO PCT/AU2009/000245 patent/WO2010099560A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1998040987A1 (fr) * | 1997-03-11 | 1998-09-17 | Sequel Technology Corporation | Procede et appareil de gestion de l'activite interreseau et intrareseau |
| US20050198252A1 (en) * | 1998-08-26 | 2005-09-08 | Sts Systems Ltd. | Communication management system for computer network-based telephones |
| WO2002023805A2 (fr) * | 2000-09-13 | 2002-03-21 | Karakoram Limited | Surveillance de l'activite d'un reseau |
| WO2002057935A1 (fr) * | 2001-01-16 | 2002-07-25 | Captus Networks Corporation | Procede et dispositif de surveillance de trafic de donnees et de prevention d'acces non autorise a un reseau |
| US20040111507A1 (en) * | 2002-12-05 | 2004-06-10 | Michael Villado | Method and system for monitoring network communications in real-time |
Non-Patent Citations (1)
| Title |
|---|
| "Network Bypass Targets Appliance OEMs", ELECTRONICSTALK, 14 March 2008 (2008-03-14), Retrieved from the Internet <URL:http://www.electronicstalk.com/news/iei/iei101.html> [retrieved on 20090609] * |
Cited By (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230028585A1 (en) * | 2011-03-18 | 2023-01-26 | Zscaler, Inc. | Mobile device security, device management, and policy enforcement in a cloud-based system |
| US11716359B2 (en) * | 2011-03-18 | 2023-08-01 | Zscaler, Inc. | Mobile device security, device management, and policy enforcement in a cloud-based system |
| RU2591050C2 (ru) * | 2013-10-31 | 2016-07-10 | Федеральное государственное казенное военное образовательное учреждение высшего профессионального образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации | Способ функционального поражения информационно-технических средств |
| US9584672B2 (en) | 2014-04-28 | 2017-02-28 | Tangoe, Inc. | Cost allocation for derived data usage |
| US11916760B2 (en) | 2014-04-28 | 2024-02-27 | Tangoe, Inc. | Data usage analysis and reporting |
| US9948790B2 (en) | 2014-04-28 | 2018-04-17 | Tangoe, Inc. | Cost allocation for derived data usage |
| US10264139B2 (en) | 2014-04-28 | 2019-04-16 | Tangoe Us, Inc. | Cost allocation for derived data usage |
| US9191523B1 (en) | 2014-04-28 | 2015-11-17 | Tangoe, Inc. | Cost allocation for derived data usage |
| US10819861B2 (en) | 2014-04-28 | 2020-10-27 | Tangoe Us, Inc. | Real-time usage detection of software applications |
| US10931543B2 (en) | 2014-04-28 | 2021-02-23 | Tangoe Us, Inc. | Data usage analysis and reporting |
| US11622047B2 (en) | 2014-04-28 | 2023-04-04 | Tangoe Us, Inc. | Real-time usage detection of software applications |
| US10482277B2 (en) | 2015-09-24 | 2019-11-19 | Tangoe Us, Inc. | Security application for data security formatting, tagging and control |
| US11372994B2 (en) | 2015-09-24 | 2022-06-28 | Tangoe Us, Inc. | Security application for data security formatting, tagging and control |
| US9773121B2 (en) | 2015-09-24 | 2017-09-26 | Tangoe, Inc. | Security application for data security formatting, tagging and control |
| RU2788377C1 (ru) * | 2022-07-11 | 2023-01-18 | Федеральное государственное казенное военное образовательное учреждение высшего образования "Военный учебно-научный центр Военно-воздушных сил "Военно-воздушная академия имени профессора Н.Е. Жуковского и Ю.А. Гагарина" (г. Воронеж) Министерства обороны Российской Федерации | Способ воздействия на информационно-технические средства радиосвязи |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12314396B2 (en) | Systems and methods for providing security services during power management mode | |
| US20230216869A1 (en) | Method and system for detecting restricted content associated with retrieved content | |
| US20210084063A1 (en) | Insider threat management | |
| US20220159015A1 (en) | System and method for providing data and device security between external and host devices | |
| EP2837131B1 (fr) | Système et procédé permettant de déterminer et d'utiliser la réputation locale d'utilisateurs et d'hôtes pour protéger des informations dans un environnement de réseau | |
| RU2510982C2 (ru) | Система и способ оценки пользователей для фильтрации сообщений | |
| CN107395570B (zh) | 基于大数据管理分析的云平台审计系统 | |
| US20080282338A1 (en) | System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network | |
| US20090247125A1 (en) | Method and system for controlling access of computer resources of mobile client facilities | |
| US20090172772A1 (en) | Method and system for processing security data of a computer network | |
| WO2010099560A1 (fr) | Dispositif et procédé de surveillance de paquets de données | |
| Parsons | Deep packet inspection and its predecessors | |
| Mohtasebi et al. | A mitigation approach to the privacy and malware threats of social network services | |
| US12126633B2 (en) | Administration of electronic mail unsubscribe links | |
| Soghoian | The spies we trust: Third party service providers and law enforcement surveillance | |
| Joachim et al. | The enforcers—The University of Florida’s ICARUS P2P-blocking software has clipped students’ file-sharing wings. Do its policy-enforcing capabilities go too far | |
| Urbaczewski | Monitoring Strategies for Internet Technologies | |
| Licari | Protecting the information workplace | |
| Guynes et al. | Privacy and security | |
| US20080148385A1 (en) | Sectionalized Terminal System And Method | |
| Co-Exist | Employee Monitoring and Ethics | |
| Harsha | Overview on Developing Better Ways of Protecting Users while Respecting the SNS Business Model | |
| Carmo | Effects of Network Quality of Service on Workplace Productivity |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09840958 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 09840958 Country of ref document: EP Kind code of ref document: A1 |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 17-11-2011) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 09840958 Country of ref document: EP Kind code of ref document: A1 |