Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for surely limiting access from a machine having a status, such as invalidity to a network resource. SOLUTION: A quarantine control client (QCC) that is positioned on a client machine acquires statements of health from a plurality of quarantine policy clients. The QCC packages these statements and provides the package to a quarantine execution client (QEC). The QEC transmits the package to a quarantine execution server (QES) together with a request of network access. The QES delivers the package to a quarantine control server (QCS) and the QCS decomposes the package and delivers each of the statements to a corresponding quarantine policy server (QPS). The QPS inspects the validity of the statement and notifies the QCS of a result. If a client provides a valid statement, the QES permits the client to access a network. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for facilitating automatic wireless network detection. SOLUTION: A wireless network client can automatically detect the "type" of a network (e.g., method of authentication and encryption) without requiring input from the user. For example, unencrypted network, WEP encrypted network requiring a WEP key, WPA encrypted network requiring a pre-shared key, an IEEE 802.1x enabled network supporting WPA and/or an IEEE 802.1x enabled network not supporting WPA. In a wireless network detection system having a connection component and a detection component, the connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identifies a type of an available wireless network. Identification can be performed based upon information received in an information element and/or repeated probing of the wireless network beacon. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
Implementations of the present invention relate to a communication framework that is readily adaptable to a wide variety of resources intended to be accessible through a firewall. In general, a communication framework at a gateway server can provide a specific connection to a requested resource in accordance with a wide range of resource and/or network access policies. In one instance, a client requests a connection to a specific resource behind a firewall. The communication framework authenticates the connection, and quarantines the connection until determining, for example, that the client is using an appropriate resource features. If appropriately authenticated, the communication framework can pass control of the connection to an appropriately identified protocol plug-in processor, which facilitates a direct connection to the requested resource at an application layer of a communication stack.
Abstract:
An integration system is disclosed that provides a virtual desktop integration with terminal services. A client computer is connected to one the virtual desktops operating in a server. The client computer examines information contained in a remote desktop protocol (RDP) compliant packet supplied by the server. The client computer connects to one of the many virtual desktops based on information. Use of the information enables integration of the virtual desktop with the existing terminal session deployment model. Client devices can establish a session using a single network name and can be appropriately directed to either a virtual desktop or terminal session.
Abstract:
Techniques for configuring and operating a virtual desktop session are disclosed herein. In an exemplary embodiment, an inter-partition communication channel can be established between a virtualization platform and a virtual machine. The inter-partition communication channel can be used to configure a guest operating system to conduct virtual desktop sessions and manage running virtual desktop sessions. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.
Abstract:
Techniques for configuring a commodity server to host virtual hard disks are disclosed herein. In an exemplary embodiment, a virtual hard disk file can be split into a plurality of differencing VHD files and one or more of the files can be downloaded to a virtualization host as it runs off the VHD files stored on the server. After the one or more VHD files are downloaded, the virtualization host can be configured to use the local copy instead of the copy on the commodity server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.
Abstract:
FIELD: information technology. ^ SUBSTANCE: method involves receiving a connection request from a client, where the connection request identifies a resource, identification, based on the resource, of an access policy from communication infrastructure installed on a gateway, wherein said one or more access policies are general for said communication infrastructure and are not created specifically for said resource, quarantining the connection with the client in order to determine whether the minimum set of one or more features which are determined by said one or more policies is installed on the client, identification of the plug-in of the protocol processor, wherein the identified plug-in processes the connection to multiple resources which have the same resource type, and redirecting the connection with the client to the identified plug-in of the protocol processor by controlling the channel of the tunnel connection to the plug-in of the protocol processor such that the next communications between the client and the resource is processed through the plug-in of the protocol process independent of the communication infrastructure. ^ EFFECT: faster operation. ^ 17 cl, 3 dwg
Abstract:
FIELD: information technology. ^ SUBSTANCE: method involves receiving a connection request from a client, where the connection request identifies a resource, identification, based on the resource, of an access policy from communication infrastructure installed on a gateway, wherein said one or more access policies are general for said communication infrastructure and are not created specifically for said resource, quarantining the connection with the client in order to determine whether the minimum set of one or more features which are determined by said one or more policies is installed on the client, identification of the plug-in of the protocol processor, wherein the identified plug-in processes the connection to multiple resources which have the same resource type, and redirecting the connection with the client to the identified plug-in of the protocol processor by controlling the channel of the tunnel connection to the plug-in of the protocol processor such that the next communications between the client and the resource is processed through the plug-in of the protocol process independent of the communication infrastructure. ^ EFFECT: faster operation. ^ 17 cl, 3 dwg
Abstract:
Un sistema implementado por ordenador para facilitar la detección automática de un tipo de red inalámbrica sinrequerir indicaciones del usuario, refiriéndose el tipo al procedimiento de autenticación y cifrado que requiere lared, comprendiendo el sistema:un componente (110) de conexión que puede conectar un dispositivo con una pluralidad de redesinalámbricas (210-250); yun componente (120) de detección que identifica automáticamente un tipo de cifrado de una red inalámbricadisponible (140), en el que la identificación del tipo de cifrado se basa en la detección de un fallo de unaporción de una secuencia de autenticación de la red inalámbrica disponible o en la superación de un umbralde tiempo sin haber detectado una porción esperada de la secuencia de autenticación de la red inalámbricadisponible, en el que la identificación del tipo de cifrado incluye:que el componente de detección intente (310) una secuencia de autenticación 802.1x con la redinalámbrica y determine (330) que la red inalámbrica, como una red (222) de privacidad equivalente auna cableada, requiere una clave de privacidad equivalente a una cableada cuando ocurren un fallo deuna porción de la secuencia de autenticación 802.1x o la superación de un umbral de tiempo sin haberdetectado una porción esperada de la secuencia de autenticación 802.1x;que el componente de detección, en respuesta a la tentativa de una secuencia de autenticación 802.1x,identifique (432) la red inalámbrica como una red 802.1x (224) cuando no ocurren el fallo de una porciónde la secuencia de autenticación 802.1x ni la superación de un umbral de tiempo sin haber detectado laporción esperada de la secuencia de autenticación 802.1x;que el componente de detección, en respuesta a la identificación de la red inalámbrica como una red802.1x, intente una secuencia de servicios de dotación inalámbrica y determine (444) que la redinalámbrica no soporta servicios (244) de dotación inalámbrica cuando ocurren un fallo de una porciónde la secuencia de autenticación de servicios de dotación inalámbrica o la superación de un umbral detiempo sin haber detectado una porción esperada de la secuencia de autenticación de servicios dedotación inalámbrica; yque el componente de detección, en respuesta a la tentativa de una secuencia de servicios de dotacióninalámbrica, identifique (370) la red inalámbrica como una red (242) de servicios de dotación inalámbricacon soporte de 802.1x cuando no ocurren el fallo de una porción de la secuencia de autenticación deservicios de dotación inalámbrica ni la superación de un umbral de tiempo sin haber detectado unaporción esperada de la secuencia de autenticación de servicios de dotación inalámbrica.