-
公开(公告)号:WO2010048031A3
公开(公告)日:2010-04-29
申请号:PCT/US2009/060876
申请日:2009-10-15
Applicant: MICROSOFT CORPORATION
Inventor: TRACE, Rob M. , BREWIS, Deon C. , THALER, David , BUDURI, Arun K. , BEGORRE, Bill , ROBERTS, Scott , GATTA, Srinivas Raghu , CUELLAR, Gerardo Diaz
Abstract: A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall. The client computer attempts communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall and operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through an outside network, and therefore should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller.
-
2.
公开(公告)号:EP2342672A2
公开(公告)日:2011-07-13
申请号:EP09822462.9
申请日:2009-10-15
Applicant: Microsoft Corporation
Inventor: TRACE, Rob M. , BREWIS, Deon C. , THALER, David , BUDURI, Arun K. , BEGORRE, Bill , ROBERTS, Scott , GATTA, Srinivas Raghu , CUELLAR, Gerardo Diaz
CPC classification number: H04L63/20 , H04L63/0236 , H04L63/0272 , H04L63/107
Abstract: A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall. The client computer attempts communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall and operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through an outside network, and therefore should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller.
-