H04L12/22

System and method for controlling a DNS request

A system and method of controlling communication. An appliance is provided with a program suitable for issuing a DNS request and a control program enabling the DNS request to be intercepted. The control program includes communications elements for communicating with a DNS server to which the DNS request is transmitted, and for communicating with another server for authorization. An authorization request, distinct from the DNS request, including an identifier of the user of the appliance and the domain name, is transmitted to the DNS server. The authorization server returns to the DNS server a response established as a function of the identifier of the user of the appliance and as a function of the domain name contained in the authorization request. The communications elements for communicating with the issuing program transmit to the issuing program an IP address defined as a function of the response from the authorization server.

FILTERING SYSTEM, MANAGEMENT DEVICE, FILTERING METHOD AND MANAGEMENT PROGRAM
20170171155 · 2017-06-15 · ·

The present invention prevents all of the filter rules from leaking and the filter functions of an entire network from stopping, even if problems arise in a filter device, etc. performing filtering. A management device of a filtering system, which includes a plurality of devices which perform filtering of communication data based on filter rules, and a management device which manages the filter rules, in a case of a first of the devices that is connected to an external network not through another of the devices having entered a predetermined state, reconstructs decentralized filter rules set in the first of the devices based on a plurality of decentralized filter rules received from a plurality of second of the devices connected to an external network via the first of the devices, and sets the decentralized filter rules thus reconstructed in the plurality of second devices, in which the decentralized filter rules are decentralized to be able to reconstruct the filter rules without using all of the decentralized filter rules.

Security control apparatus and method for cloud-based virtual desktop

The security control apparatus includes a network control unit for receiving a security protocol-based packet that includes a protocol control header and data and that is transmitted between a cloud-based virtual desktop interaction remote agent unit and a virtual machine of a cloud-based virtual desktop interaction device, and blocking network traffic between cloud-based virtual desktop interaction remote agent unit and the virtual machine, depending on received results of checking. A policy checking unit checks whether information extracted from the security protocol-based packet is compliant with control policies, and transmits results of checking to the network control unit. If the information is not compliant with the control policies, a security solution interaction unit transmits the extracted information to an external security solution, and transmits results of checking by a corresponding security solution to the network control unit.

Security control apparatus and method for cloud-based virtual desktop

The security control apparatus includes a network control unit for receiving a security protocol-based packet that includes a protocol control header and data and that is transmitted between a cloud-based virtual desktop interaction remote agent unit and a virtual machine of a cloud-based virtual desktop interaction device, and blocking network traffic between cloud-based virtual desktop interaction remote agent unit and the virtual machine, depending on received results of checking. A policy checking unit checks whether information extracted from the security protocol-based packet is compliant with control policies, and transmits results of checking to the network control unit. If the information is not compliant with the control policies, a security solution interaction unit transmits the extracted information to an external security solution, and transmits results of checking by a corresponding security solution to the network control unit.

IN-VEHICLE DEVICE, PROGRAM, AND INFORMATION PROCESSING METHOD

An in-vehicle device is an in-vehicle device connected to an in-vehicle ECU mounted on a vehicle such that communication is available, and includes a control unit performing processing relevant to transmission data transmitted from the in-vehicle ECU, in which the control unit receives transmission data transmitted from the in-vehicle ECU, registers the received transmission data in association with a reception time point of the transmission data in a chronological database, specifies abnormal transmission data from the transmission data registered in the chronological database, and registers information relevant to the specified abnormal transmission data in an abnormality history database.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
20250063048 · 2025-02-20 · ·

An information processing apparatus according to an example embodiment of the present disclosure includes at least one memory configured to store instructions; and at least one processor configured to execute the instructions to: acquire a data set in which a plurality of combinations of a pattern of a plurality of elements indicating an access attribute and an access control action associated with the pattern of the elements are defined and request a user to input an action associated with a pattern of an element not covered by the data set in a case in which the data set does not cover an action associated with one or more assumed patterns of an element.

Virtual sensors
09665778 · 2017-05-30 · ·

Virtual sensor technology, in which a camera is controlled to capture at least one configuration image of an area monitored by a monitoring system and input is received that defines one or more characteristics of the at least one configuration image that enable sensing of an event in the area. Based on the received input, configuration data used in sensing the event is generated and stored. After storage of the configuration data, the camera is controlled to capture one or more images of the area, the one or more images are analyzed based on the configuration data, and occurrence of the event is detected based on the analysis of the one or more images. Based on detecting occurrence of the event, a transmitting device is controlled to send, to a controller of the monitoring system, a signal that indicates the detection of the occurrence of the event.

METHOD AND SYSTEM FOR DETECTING CLIENT CAUSING NETWORK PROBLEM USING CLIENT ROUTE CONTROL SYSTEM
20170141984 · 2017-05-18 ·

Provided are a method and a system for identifying an IP of a DDoS attack orderer by using a client route control server. A method for detecting a network problem-causing client by using a client route control server includes: forming an edge server IP allocation matrix; checking a network problem occurrence in an edge server; allocating an edge server IP according to the edge server IP allocation matrix when a network problem occurs in an edge server; and detecting user information or a client IP, which has no edge server IP to be allocated according to the edge server IP allocation matrix, as a network problem-causing client, wherein an edge server IP is allocated differently for each user information or client IP in the edge server IP allocation matrix, and the edge server IP allocation is performed by at least two-stage edge server IP for each user information or client IP.

Systems and methods for device detection and authorization in a IOT framework

Provided herein are a method, a device, and a computer-readable medium operable to perform a method of automatically admitting a device to a network. The method can include receiving, from the one or more authorized devices in the network, first data that is associated with one or more sensing modalities, wherein the one or more sensing modalities are detected by the one or more of the one or more of the authorized devices during a defined time window; identifying a new device to be admitted to the network; constructing a time sequence of proximity events of the new device, within the defined time window, based on the first data; determining that the time sequence of the proximity events matches an expected time sequence of expected of proximity events; and admitting the new device to the network based on the determining.

Information Display Regarding Playback Queue Subscriptions
20250077165 · 2025-03-06 ·

Example techniques relate to playback queue subscriptions. An example implementation involves a computing system receiving, from a first computing device associated with a first user account, an instruction to enable subscription to a first playback queue associated with a first media playback system. In response to the instruction, the computing system enables second user accounts to subscribe to the first playback queue. The second user accounts are registered with respective second media playback systems in respective second household. The computing system receives, from a particular second media playback system, a request to subscribe to the first playback queue; and in response, sends one or more messages that update a control interface of the first control device to display a subscriber indication and (ii) sends one or more messages that populate a second playback queue of the particular second media playback system with audio tracks of the first playback queue.